Threshold ECDSA in three rounds

J Doerner, Y Kondi, E Lee… - 2024 IEEE Symposium on …, 2024 - ieeexplore.ieee.org
We present a three-round protocol for threshold ECDSA signing with malicious security
against a dishonest majority, which information-theoretically UC-realizes a standard …

Threshold bbs+ signatures for distributed anonymous credential issuance

J Doerner, Y Kondi, E Lee, A Shelat… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
We propose a secure multiparty signing protocol for the BBS+ signature scheme; in other
words, an anonymous credential scheme with threshold issuance. We prove that due to the …

Psi from ring-ole

W Chongchitmate, Y Ishai, S Lu… - Proceedings of the 2022 …, 2022 - dl.acm.org
Private set intersection (PSI) is one of the most extensively studied instances of secure
computation. PSI allows two parties to compute the intersection of their input sets without …

Actively Secure Private Set Intersection in the Client-Server Setting

Y Sun, J Katz, M Raykova, P Schoppmann… - Proceedings of the 2024 …, 2024 - dl.acm.org
Private set intersection (PSI) allows two parties to compute the intersection of their sets
without revealing anything else. In some applications of PSI, a server holds a large set and …

Distefano: Decentralized infrastructure for sharing trusted encrypted facts and nothing more

S Celi, A Davidson, H Haddadi, G Pestana… - Cryptology ePrint …, 2023 - eprint.iacr.org
We design DiStefano: an efficient, maliciously-secure framework for generating private
commitments over TLS-encrypted web traffic, for a designated third-party. DiStefano …

Securely Computing Threshold Variants of Signature Schemes (and More!)

E Lee - 2023 - search.proquest.com
This thesis looks at two lines of study aiming at bringing privacy-enhancing technologies
closer to deployment: using techniques from multiparty computation (MPC) to distribute …

Verifiable Threshold Multiplication Protocol based on Oblivious Transfer

S Ng, T Tauber, L Cheung - 2023 7th International Conference …, 2023 - ieeexplore.ieee.org
Shamir Secrets Sharing (SSS) is a foundational element of many Multi-Party Computation
(MPC) protocols. Although SSS has the ability to handle linear combinations of multiple …

Fast Secure Multiparty ECDSA with Practical Distributed Key Generation and Applications to Cryptocurrency Custody

I Haitner, Y Lindell, A Nof, S Ranellucci - Cryptology ePrint Archive, 2018 - eprint.iacr.org
ECDSA is a standardized signing algorithm that is widely used in TLS, code signing,
cryptocurrency and more. Due to its importance, the problem of securely computing ECDSA …