Multiple Bugs in Multi-Party Computation - Breaking Cryptocurrency's Strongest Wallets

Multiple Bugs in Multi-Party Computation - Breaking Cryptocurrency's Strongest Wallets

Black Hat via YouTube Direct link

Threshold signatures (TSS)

7 of 20

7 of 20

Threshold signatures (TSS)

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Multiple Bugs in Multi-Party Computation - Breaking Cryptocurrency's Strongest Wallets

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 The speakers
  3. 3 What's a wallet?
  4. 4 Enterprise wallets
  5. 5 Distributing trust
  6. 6 Multi-party computation (MPC)
  7. 7 Threshold signatures (TSS)
  8. 8 Distributed key generation
  9. 9 Commitments
  10. 10 Threshold secret-sharing
  11. 11 Zero-knowledge proofs
  12. 12 Setup
  13. 13 Attacker Model
  14. 14 Our attacks
  15. 15 Attacks taxonomy
  16. 16 Lather, Rinse, Repeat
  17. 17 Golden Shoe
  18. 18 Minimize complexity
  19. 19 Careful with academic papers
  20. 20 Should I use MPC and TSS?

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.