Threshold Cryptography: From Schnorr Signatures to FROST - Session Overview

Threshold Cryptography: From Schnorr Signatures to FROST - Session Overview

TheIACR via YouTube Direct link

Security Model

18 of 28

18 of 28

Security Model

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Threshold Cryptography: From Schnorr Signatures to FROST - Session Overview

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Schnur signatures
  3. 3 Schnur signature
  4. 4 Threshold properties
  5. 5 Multisignatures
  6. 6 DKGs
  7. 7 Frost
  8. 8 Frost Standardization
  9. 9 nist call
  10. 10 implementations
  11. 11 Efficient deterministic signatures
  12. 12 Important point
  13. 13 Multiparty signature
  14. 14 What is a DKG
  15. 15 Proof of Security
  16. 16 Summary
  17. 17 Parallel Security
  18. 18 Security Model
  19. 19 Learnings
  20. 20 Performance
  21. 21 Straight Line Extractability
  22. 22 Concurrent Attacks
  23. 23 Proof Types
  24. 24 Environment
  25. 25 When Parties Arent Local
  26. 26 I Lost My Phone
  27. 27 Is Threshold Better
  28. 28 How a Blockchain Can Keep Many Secrets

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.