Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Threshold Cryptography: From Schnorr Signatures to FROST - Session Overview

TheIACR via YouTube

Overview

Explore threshold cryptography in this comprehensive lecture covering Schnorr signatures, multisignatures, distributed key generation (DKGs), and FROST standardization. Delve into important concepts such as multiparty signatures, proof of security, and parallel security. Examine the security model, performance considerations, and various proof types. Investigate concurrent attacks, straight-line extractability, and the challenges of non-local parties. Learn about blockchain applications for secret management and discuss the advantages of threshold cryptography. Gain insights into efficient deterministic signatures and understand the implications of losing a device in threshold systems.

Syllabus

Introduction
Schnur signatures
Schnur signature
Threshold properties
Multisignatures
DKGs
Frost
Frost Standardization
nist call
implementations
Efficient deterministic signatures
Important point
Multiparty signature
What is a DKG
Proof of Security
Summary
Parallel Security
Security Model
Learnings
Performance
Straight Line Extractability
Concurrent Attacks
Proof Types
Environment
When Parties Arent Local
I Lost My Phone
Is Threshold Better
How a Blockchain Can Keep Many Secrets

Taught by

TheIACR

Reviews

Start your review of Threshold Cryptography: From Schnorr Signatures to FROST - Session Overview

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.