Fully adaptive schnorr threshold signatures

E Crites, C Komlo, M Maller - Annual International Cryptology Conference, 2023 - Springer
We prove adaptive security of a simple three-round threshold Schnorr signature scheme,
which we call Sparkle. The standard notion of security for threshold signatures considers a …

A Comprehensive Survey of Threshold Digital Signatures: NIST Standards, Post-Quantum Cryptography, Exotic Techniques, and Real-World Applications

K Sedghighadikolaei, AA Yavuz - arXiv preprint arXiv:2311.05514, 2023 - arxiv.org
Threshold digital signatures enable a distributed execution of signature functionalities and
will play a crucial role in the security of emerging decentralized next-generation networked …

Cutting the grass: threshold group action signature schemes

M Battagliola, G Borin, A Meneghetti… - Cryptographers' Track at …, 2024 - Springer
Group actions are fundamental mathematical tools, with a long history of use in
cryptography. Indeed, the action of finite groups at the basis of the discrete logarithm …

A formal treatment of distributed key generation, and new constructions

C Komlo, I Goldberg, D Stebila - Cryptology ePrint Archive, 2023 - eprint.iacr.org
In this work, we present a novel generic construction for a Distributed Key Generation (DKG)
scheme. Our generic construction relies on three modular cryptographic building blocks. The …

Provably unforgeable threshold EdDSA with an offline participant and trustless setup

M Battagliola, R Longo, A Meneghetti… - Mediterranean Journal of …, 2023 - Springer
We present an EdDSA-compatible multi-party digital signature scheme that supports an
offline participant during the key-generation phase, without relying on a trusted third party …

How (not) to build threshold EdDSA

HWH Wong, JPK Ma, HHF Yin, SSM Chow - Proceedings of the 26th …, 2023 - dl.acm.org
Edwards-curve digital signature algorithm (EdDSA) is a highly efficient scheme with a short
key size. It is derived from the threshold-friendly Schnorr signatures and is covered by the …

Distributed Fiat-Shamir Transform: from Threshold Identification Protocols to Signatures

M Battagliola, A Flamini - Cryptology ePrint Archive, 2024 - eprint.iacr.org
The recent surge of distribute technologies caused an increasing interest towards threshold
signature protocols, that peaked with the recent NIST First Call for Multi-Party Threshold …

[PDF][PDF] Virtual and Distributed Hardware Security Module for Secure Key Management

D Novo, R Vassantlal, A Bessani, B Ferreira - inforum.pt
Hardware Security Modules (HSMs) play a crucial role in enterprise environments by
safeguarding sensitive cryptographic keys and performing essential cryptographic …