Compact multi-signatures for smaller blockchains

D Boneh, M Drijvers, G Neven - … Conference on the Theory and Application …, 2018 - Springer
We construct new multi-signature schemes that provide new functionality. Our schemes are
designed to reduce the size of the Bitcoin blockchain, but are useful in many other settings …

Simple schnorr multi-signatures with applications to bitcoin

G Maxwell, A Poelstra, Y Seurin, P Wuille - Designs, Codes and …, 2019 - Springer
We describe a new Schnorr-based multi-signature scheme (ie, a protocol which allows a
group of signers to produce a short, joint signature on a common message) called MuSig …

MuSig2: Simple two-round Schnorr multi-signatures

J Nick, T Ruffing, Y Seurin - Annual International Cryptology Conference, 2021 - Springer
Multi-signatures enable a group of signers to produce a joint signature on a joint message.
Recently, Drijvers et al.(S&P'19) showed that all thus far proposed two-round multi-signature …

{DupLESS}:{Server-Aided} encryption for deduplicated storage

S Keelveedhi, M Bellare, T Ristenpart - 22nd USENIX security …, 2013 - usenix.org
Cloud storage service providers such as Dropbox, Mozy, and others perform deduplication
to save space by only storing one copy of each file uploaded. Should clients conventionally …

On the adaptive security of the threshold BLS signature scheme

R Bacho, J Loss - Proceedings of the 2022 ACM SIGSAC Conference on …, 2022 - dl.acm.org
Threshold signatures are a crucial tool for many distributed protocols. As shown by Cachin,
Kursawe, and Shoup (PODC'00), schemes with unique signatures are of particular …

Fully adaptive schnorr threshold signatures

E Crites, C Komlo, M Maller - Annual International Cryptology Conference, 2023 - Springer
We prove adaptive security of a simple three-round threshold Schnorr signature scheme,
which we call Sparkle. The standard notion of security for threshold signatures considers a …

OPAQUE: an asymmetric PAKE protocol secure against pre-computation attacks

S Jarecki, H Krawczyk, J Xu - … 37th Annual International Conference on the …, 2018 - Springer
Abstract Password-Authenticated Key Exchange (PAKE) protocols allow two parties that
only share a password to establish a shared key in a way that is immune to offline attacks …

Threshold signatures, multisignatures and blind signatures based on the gap-Diffie-Hellman-group signature scheme

A Boldyreva - International Workshop on Public Key Cryptography, 2002 - Springer
We propose a robust proactive threshold signature scheme, a multisignature scheme and a
blind signature scheme which work in any Gap Diffie-Hellman (GDH) group (where the …

[PDF][PDF] Private set intersection: Are garbled circuits better than custom protocols?

Y Huang, D Evans, J Katz - NDSS, 2012 - homes.luddy.indiana.edu
Abstract Cryptographic protocols for Private Set Intersection (PSI) are the basis for many
important privacy-preserving applications. Over the past few years, intensive research has …

Fine-grained and controlled rewriting in blockchains: Chameleon-hashing gone attribute-based

D Derler, K Samelin, D Slamanig… - Cryptology ePrint …, 2019 - eprint.iacr.org
Blockchain technologies recently received a considerable amount of attention. While the
initial focus was mainly on the use of blockchains in the context of cryptocurrencies such as …