Secure two-party threshold ECDSA from ECDSA assumptions

J Doerner, Y Kondi, E Lee… - 2018 IEEE Symposium on …, 2018 - ieeexplore.ieee.org
The Elliptic Curve Digital Signature Algorithm (ECDSA) is one of the most widely used
schemes in deployed cryptography. Through its applications in code and binary …

Practical key-extraction attacks in leading MPC wallets

N Makriyannis, O Yomtov, A Galansky - Proceedings of the 2024 on ACM …, 2024 - dl.acm.org
Multi-Party Computation (MPC) has become a major tool for protecting hundreds of billions
of dollars in cryptocurrency wallets. MPC protocols are currently powering the wallets of …

[PDF][PDF] LaKey: Efficient lattice-based distributed PRFs enable scalable distributed key management

M Geihs, H Montgomery - … USENIX Security Symposium, D. Balzarotti and …, 2024 - usenix.org
Distributed key management (DKM) services are multi-party services that allow their users to
outsource the generation, storage, and usage of cryptographic private keys, while …

Sometimes you can't distribute random-oracle-based proofs

J Doerner, Y Kondi, LN Rosenbloom - Annual International Cryptology …, 2024 - Springer
We investigate the conditions under which straight-line extractable NIZKs in the random
oracle model (ie without a CRS) permit multiparty realizations that are black-box in the same …

Secure multiparty computation with identifiable abort via vindicating release

R Cohen, J Doerner, Y Kondi, A Shelat - Annual International Cryptology …, 2024 - Springer
In the dishonest-majority setting, secure multiparty computation (MPC) with identifiable abort
(IA) guarantees that honest parties can identify and agree upon at least one cheating party if …

FATF Travel Rule's Technical Challenges and Solution Taxonomy

Y Takei, K Shudo - 2024 IEEE International Conference on …, 2024 - ieeexplore.ieee.org
Virtual assets are globally recognized as a decentralized digital currency system. They are
also being used to transfer criminal proceeds. In 2019, the Financial Action Task Force …

Exponent-VRFs and Their Applications

D Boneh, I Haitner, Y Lindell - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Verifiable random functions (VRFs) are pseudorandom functions with the addition that the
function owner can prove that a generated output is correct, with respect to a committed key …

Batch Range Proof: How to Make Threshold ECDSA More Efficient

G Tang, S Han, L Lin, C Wei, Y Yan - Proceedings of the 2024 on ACM …, 2024 - dl.acm.org
With the demand of cryptocurrencies, threshold ECDSA recently regained popularity. So far,
several methods have been proposed to construct threshold ECDSA, including the usage of …

Secure Multiparty Computation with Identifiable Abort via Vindicating

R Cohen, J Doerner, Y Kondi¹… - Advances in Cryptology …, 2024 - books.google.com
In the dishonest-majority setting, secure multiparty compu-tation (MPC) with identifiable
abort (IA) guarantees that honest parties can identify and agree upon at least one cheating …

Direct Range Proofs for Paillier Cryptosystem and Their Applications

Z Xie, M Liu, H Xue, MH Au, RH Deng… - Proceedings of the 2024 …, 2024 - dl.acm.org
The Paillier cryptosystem is renowned for its applications in electronic voting, threshold
ECDSA, multi-party computation, and more, largely due to its additive homomorphism. In …