Bandwidth-Efficient Threshold EC-DSA

Bandwidth-Efficient Threshold EC-DSA

TheIACR via YouTube Direct link

Main differences with the Gennaro Goldfeder protocol

17 of 22

17 of 22

Main differences with the Gennaro Goldfeder protocol

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Bandwidth-Efficient Threshold EC-DSA

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Motivation for distributed ECDSA
  3. 3 (t, n)-threshold signature scheme
  4. 4 ECDSA protocol
  5. 5 Difficulty in the signing Algorithm
  6. 6 Table of contents
  7. 7 Previous works comparable to ours
  8. 8 Full threshold ECDSA-GG @ CCS'18
  9. 9 Removing range proofs
  10. 10 CL framework
  11. 11 Instantiation in class groups of an imaginary quadratic field
  12. 12 Interactive set up and key generation
  13. 13 Interactive signing - Phase 1
  14. 14 Interactive signing - Phase 2 (peer to peer)
  15. 15 At the end of Phase 2
  16. 16 Phases 3, 4 and 5
  17. 17 Main differences with the Gennaro Goldfeder protocol
  18. 18 Improving Phase 1
  19. 19 Proof that a ciphertext is well formed
  20. 20 Improving ZKAOK
  21. 21 Computational assumptions for soundness
  22. 22 Efficiency of full threshold protocol

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.