Overview
Explore threshold cryptography in this comprehensive lecture covering Schnorr signatures, multisignatures, distributed key generation (DKGs), and FROST standardization. Delve into important concepts such as multiparty signatures, proof of security, and parallel security. Examine the security model, performance considerations, and various proof types. Investigate concurrent attacks, straight-line extractability, and the challenges of non-local parties. Learn about blockchain applications for secret management and discuss the advantages of threshold cryptography. Gain insights into efficient deterministic signatures and understand the implications of losing a device in threshold systems.
Syllabus
Introduction
Schnur signatures
Schnur signature
Threshold properties
Multisignatures
DKGs
Frost
Frost Standardization
nist call
implementations
Efficient deterministic signatures
Important point
Multiparty signature
What is a DKG
Proof of Security
Summary
Parallel Security
Security Model
Learnings
Performance
Straight Line Extractability
Concurrent Attacks
Proof Types
Environment
When Parties Arent Local
I Lost My Phone
Is Threshold Better
How a Blockchain Can Keep Many Secrets
Taught by
TheIACR