Paper 2019/523
Threshold ECDSA from ECDSA Assumptions: The Multiparty Case
Jack Doerner, Yashvanth Kondi, Eysa Lee, and abhi shelat
Abstract
Cryptocurrency applications have spurred a resurgence of interest in the computation of ECDSA signatures using threshold protocols---that is, protocols in which the signing key is secret-shared among
Metadata
- Available format(s)
-
PDF
- Category
- Cryptographic protocols
- Publication info
- Published elsewhere. Major revision. IEEE S&P 2019
- DOI
- 10.1109/SP.2019.00024
- Keywords
- threshold cryptographyelliptic curve cryptographymulti-party computationECDSAconcrete efficiency
- Contact author(s)
- j @ ckdoerner net
- History
- 2020-05-22: revised
- 2019-05-20: received
- See all versions
- Short URL
- https://ia.cr/2019/523
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2019/523, author = {Jack Doerner and Yashvanth Kondi and Eysa Lee and abhi shelat}, title = {Threshold {ECDSA} from {ECDSA} Assumptions: The Multiparty Case}, howpublished = {Cryptology {ePrint} Archive, Paper 2019/523}, year = {2019}, doi = {10.1109/SP.2019.00024}, url = {https://eprint.iacr.org/2019/523} }