Fast secure multiparty ECDSA with practical distributed key generation and applications to cryptocurrency custody

Y Lindell, A Nof - Proceedings of the 2018 ACM SIGSAC Conference on …, 2018 - dl.acm.org
ECDSA is a standardized signing algorithm that is widely used in TLS, code signing,
cryptocurrency and more. Due to its importance, the problem of securely computing ECDSA …

Fast secure two-party ECDSA signing

Y Lindell - Advances in Cryptology–CRYPTO 2017: 37th Annual …, 2017 - Springer
ECDSA is a standard digital signature schemes that is widely used in TLS, Bitcoin and
elsewhere. Unlike other schemes like RSA, Schnorr signatures and more, it is particularly …

Simple three-round multiparty schnorr signing with full simulatability

Y Lindell - Cryptology eprint Archive, 2022 - eprint.iacr.org
In a multiparty signing protocol, also known as a threshold signature scheme, the private
signing key is shared amongst a set of parties and only a quorum of those parties can …

Highly-efficient universally-composable commitments based on the DDH assumption

Y Lindell - Annual International Conference on the Theory and …, 2011 - Springer
Universal composability (aka UC security) provides very strong security guarantees for
protocols that run in complex real-world environments. In particular, security is guaranteed to …

Compactly hiding linear spans: Tightly secure constant-size simulation-sound QA-NIZK proofs and applications

B Libert, T Peters, M Joye, M Yung - … on the Theory and Application of …, 2015 - Springer
Quasi-adaptive non-interactive zero-knowledge (QA-NIZK) proofs is a recent paradigm,
suggested by Jutla and Roy (Asiacrypt'13), which is motivated by the Groth-Sahai seminal …

A flexible and scalable malicious secure aggregation protocol for federated learning

J Tang, H Xu, M Wang, T Tang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Secure aggregation becomes a major solution to providing privacy for federated learning.
Secure aggregation for mobile devices typically relies on Shamir secret sharing (SSS) to …

A Stronger Secure Ciphertext Fingerprint-Based Commitment Scheme for Robuster Verifiable OD-CP-ABE in IMCC

Z Zhang, W Huang, L Yang, Y Liao… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Outsourced decryption attribute-based encryption (OD-ABE) is emerging as a promising
cryptographic tool to provide efficient fine-grained access control for data accessing and …

Rate-1, linear time and additively homomorphic UC commitments

I Cascudo, I Damgård, B David, N Döttling… - Advances in Cryptology …, 2016 - Springer
We construct the first UC commitment scheme for binary strings with the optimal properties of
rate approaching 1 and linear time complexity (in the amortised sense, using a small …

Practical, anonymous, and publicly linkable universally-composable reputation systems

J Blömer, F Eidens, J Juhnke - Topics in Cryptology–CT-RSA 2018: The …, 2018 - Springer
We consider reputation systems in the Universal Composability Framework where users can
anonymously rate each others products that they purchased previously. To obtain …

On the complexity of additively homomorphic UC commitments

TK Frederiksen, TP Jakobsen, JB Nielsen… - Theory of Cryptography …, 2015 - Springer
We present a new constant round additively homomorphic commitment scheme with
(amortized) computational and communication complexity linear in the size of the string …