From 2608c56209ae81b569cc946b3d2babb3e3fd137e Mon Sep 17 00:00:00 2001
From: Philipp Muth <muth@seceng.informatik.tu-darmstadt.de>
Date: Wed, 10 Aug 2022 12:50:51 +0200
Subject: [PATCH] minor

---
 ACNS/main.tex | 136 ++++++++++++++
 ACNS/pqc.bib  | 493 ++++++++++++++++++++++++++++++++++++++++++++++++++
 2 files changed, 629 insertions(+)
 create mode 100644 ACNS/main.tex
 create mode 100644 ACNS/pqc.bib

diff --git a/ACNS/main.tex b/ACNS/main.tex
new file mode 100644
index 0000000..30d5e51
--- /dev/null
+++ b/ACNS/main.tex
@@ -0,0 +1,136 @@
+\newif\ifpublic
+\publictrue
+
+\newif\ifshamir
+\shamirtrue
+
+\newif\ifsubsection
+\subsectiontrue
+
+
+%\documentclass[conference]{IEEEtran}
+\documentclass[runningheads]{llncs}
+
+%\pagestyle{plain}
+
+\input{preamble}
+
+
+% correct bad hyphenation here
+%\hyphenation{op-tical net-works semi-conduc-tor}
+
+
+\begin{document}
+%
+% paper title
+% can use linebreaks \\ within to get better formatting as desired
+\title{On Actively Secure Fine-Grained Access Structures from Isogeny Assumptions}
+
+\titlerunning{On Actively Secure Access Structures from Isogeny Assumptions}
+\ifpublic
+\author{Fabio Campos\inst{1,2} \and Philipp Muth\inst{3}}
+
+\authorrunning{}
+
+
+\institute{\relax
+  RheinMain University of Applied Sciences, Wiesbaden, Germany
+  \and
+  Radboud University, Nijmegen, The Netherlands \\
+  \email{campos@sopmac.de}
+  \and
+  Technische Universität Darmstadt, Germany\\
+  \email{philipp.muth@tu-darmstadt.de}
+}
+
+\else
+\author{}
+\institute{}
+\fi
+
+
+%\author{\IEEEauthorblockN{Michael Shell}
+%\IEEEauthorblockA{Georgia Institute of Technology\\someemail@somedomain.com}
+%\and
+%\IEEEauthorblockN{Homer Simpson}
+%\IEEEauthorblockA{Twentieth Century Fox\\homer@thesimpsons.com}
+%\and
+%\IEEEauthorblockN{James Kirk\\ and Montgomery Scott}
+%\IEEEauthorblockA{Starfleet Academy\\someemail@somedomain.com}}
+
+
+
+%\IEEEoverridecommandlockouts
+%\makeatletter\def\@IEEEpubidpullup{6.5\baselineskip}\makeatother
+%\IEEEpubid{\parbox{\columnwidth}{
+%    Network and Distributed Systems Security (NDSS) Symposium 2021\\
+%    21-24 February 2021\\
+%    ISBN 1-891562-66-5\\
+%    https://dx.doi.org/10.14722/ndss.2021.23xxx\\
+%    www.ndss-symposium.org
+%}
+%\hspace{\columnsep}\makebox[\columnwidth]{}}
+
+
+% make the title area
+\maketitle
+
+\begin{abstract}
+
+We present an actively secure threshold scheme in the setting of Hard Homogeneous Spaces (HHS) which allows fine-grained access structures. More precisely, we elevate a
+%given
+passively secure isogeny-based threshold scheme to an actively secure setting. We prove the active security and simulatability of our advanced schemes. 
+By characterising the necessary properties, we open our schemes to a significantly wider field of applicable secret sharing schemes. Furthermore, we show that Shamir's scheme has our generalised properties, and thereby our approach truly represents a less restrictive generalisation. 
+
+	%In their recent work \cite{FeoM20}, DeFeo and Meyer introduced a method for executing isogeny based public key encryptions on a private key, that had been stored in Shamir's information theoretical secret sharing scheme \cite{Shamir:1979:HSS}. While their approach enables a distributed en- and decryption for a threshold scheme, it is rather restrictive in that the access structure is limited to sets of a minimum size and lacks granularity. Furthermore their approach is only passively secure, i.e., a misbehaving adversary can not be detected.
+
+	%In this work we elevate \cite{PKC:DeFMey20}'s scheme to an actively secure setting, that is misbehaving player's are detected while the protocol is being executed. We prove the active security and simulatability of our advanced schemes. Furthermore we expand the range of secret sharing schemes able to support DeFeo's and Meyer's approach by defining some characterising properties of suitable schemes. For schemes fulfilling said properties the same security guarantees hold in regards to \cite{PKC:DeFMey20}'s approach. Furthermore we show that Shamir's scheme has our generalised properties, and thereby our approach truly is a generalisation of \cite{PKC:DeFMey20}. 
+	\begin{comment}In their recent work \cite{PKC:DeFMey20}, De Feo and Meyer introduced a method for executing isogeny-based public key encryption on a private key, that had been stored in Shamir's information theoretical secret sharing scheme \cite{Shamir:1979:HSS}. While their approach enables a distributed en- and decryption for a threshold scheme, it is rather restrictive in that the access structure is limited to sets of a minimum size and lacks granularity. Furthermore, their approach is only passively secure, i.e., a misbehaving adversary can not be detected.
+
+	In this work we elevate \cite{PKC:DeFMey20}'s scheme to an actively secure setting, that is misbehaving players are detected while the protocol is being executed. We prove the active security and simulatability of our advanced schemes. Furthermore, we expand the range of secret sharing schemes able to support De Feo's and Meyer's approach by defining some characterising properties of suitable schemes. For schemes fulfilling said properties the same security guarantees hold in regard to \cite{PKC:DeFMey20}'s approach. Furthermore, we show that Shamir's scheme has our generalised properties, and thereby our approach truly is a generalisation of \cite{PKC:DeFMey20}. 
+    \end{comment}
+    
+    
+\keywords{post-quantum cryptography
+\and isogeny-based cryptography
+\and threshold cryptography
+}    
+\end{abstract}
+% IEEEtran.cls defaults to using nonbold math in the Abstract.
+% This preserves the distinction between vectors and scalars. However,
+% if the conference you are submitting to favors bold math in the abstract,
+% then you can use LaTeX's standard command \boldmath at the very start
+% of the abstract to achieve this. Many IEEE journals/conferences frown on
+% math in the abstract anyway.
+
+\begingroup
+\makeatletter
+\def\@thefnmark{} \@footnotetext{\relax
+Author list in alphabetical order; see
+\url{https://www.ams.org/profession/leaders/culture/CultureStatement04.pdf}.}
+\endgroup
+
+%\tableofcontents
+%\input{roadmap}
+\input{introduction}
+\input{preliminaries}
+\input{keyexchange}
+\input{signatures}
+\input{generalsss}
+\input{conclusion}
+\ifpublic
+\input{acknowledgements}
+\fi
+%\input{algorithms}
+
+%\bibliographystyle{plain}
+\bibliographystyle{splncs04}
+\bibliography{pqc}
+
+% Appendix
+\newpage
+\input{appendix}
+% that's all folks
+\end{document}
+
+
diff --git a/ACNS/pqc.bib b/ACNS/pqc.bib
new file mode 100644
index 0000000..ef81628
--- /dev/null
+++ b/ACNS/pqc.bib
@@ -0,0 +1,493 @@
+@inproceedings{DBLP:conf/crypto/DonFMS19,
+  author    = {Jelle Don and
+               Serge Fehr and
+               Christian Majenz and
+               Christian Schaffner},
+  editor    = {Alexandra Boldyreva and
+               Daniele Micciancio},
+  title     = {Security of the Fiat-Shamir Transformation in the Quantum Random-Oracle
+               Model},
+  booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
+               Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
+               Proceedings, Part {II}},
+  series    = {Lecture Notes in Computer Science},
+  volume    = {11693},
+  pages     = {356--383},
+  publisher = {Springer},
+  year      = {2019},
+  url       = {https://doi.org/10.1007/978-3-030-26951-7\_13},
+  doi       = {10.1007/978-3-030-26951-7\_13},
+  timestamp = {Fri, 09 Apr 2021 18:35:29 +0200},
+  biburl    = {https://dblp.org/rec/conf/crypto/DonFMS19.bib},
+  bibsource = {dblp computer science bibliography, https://dblp.org}
+}
+
+@inproceedings{DBLP:conf/eurocrypt/BonnetainS20,
+  author    = {Xavier Bonnetain and
+               Andr{\'{e}} Schrottenloher},
+  editor    = {Anne Canteaut and
+               Yuval Ishai},
+  title     = {Quantum Security Analysis of {CSIDH}},
+  booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International
+               Conference on the Theory and Applications of Cryptographic Techniques,
+               Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}},
+  series    = {Lecture Notes in Computer Science},
+  volume    = {12106},
+  pages     = {493--522},
+  publisher = {Springer},
+  year      = {2020},
+  url       = {https://doi.org/10.1007/978-3-030-45724-2\_17},
+  timestamp = {Mon, 04 May 2020 14:35:02 +0200},
+  biburl    = {https://dblp.org/rec/conf/eurocrypt/BonnetainS20.bib},
+  bibsource = {dblp computer science bibliography, https://dblp.org}
+}
+
+@inproceedings{DBLP:conf/eurocrypt/Peikert20,
+  author    = {Chris Peikert},
+  editor    = {Anne Canteaut and
+               Yuval Ishai},
+  title     = {He Gives C-Sieves on the {CSIDH}},
+  booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International
+               Conference on the Theory and Applications of Cryptographic Techniques,
+               Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}},
+  series    = {Lecture Notes in Computer Science},
+  volume    = {12106},
+  pages     = {463--492},
+  publisher = {Springer},
+  year      = {2020},
+  url       = {https://doi.org/10.1007/978-3-030-45724-2\_16},
+  timestamp = {Mon, 04 May 2020 14:35:02 +0200},
+  biburl    = {https://dblp.org/rec/conf/eurocrypt/Peikert20.bib},
+  bibsource = {dblp computer science bibliography, https://dblp.org}
+}
+
+@misc{Brandao_Davidson_Vassilev_2020, 
+title={{NIST roadmap toward criteria for threshold schemes for cryptographic primitives}}, 
+url={http://dx.doi.org/10.6028/NIST.IR.8214A}, 
+institution={National Institute of Standards and Technology}, 
+author={Brandao, Luis T A N and Davidson, Michael and Vassilev, Apostol}, 
+year={2020}, 
+month={Jul} } 
+
+@inproceedings{DBLP:conf/ccs/LindellN18,
+  author    = {Yehuda Lindell and
+               Ariel Nof},
+  editor    = {David Lie and
+               Mohammad Mannan and
+               Michael Backes and
+               XiaoFeng Wang},
+  title     = {Fast Secure Multiparty {ECDSA} with Practical Distributed Key Generation
+               and Applications to Cryptocurrency Custody},
+  booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
+               Communications Security, {CCS} 2018, Toronto, ON, Canada, October
+               15-19, 2018},
+  pages     = {1837--1854},
+  publisher = {{ACM}},
+  year      = {2018},
+  url       = {https://doi.org/10.1145/3243734.3243788},
+  timestamp = {Tue, 10 Nov 2020 20:00:51 +0100},
+  biburl    = {https://dblp.org/rec/conf/ccs/LindellN18.bib},
+  bibsource = {dblp computer science bibliography, https://dblp.org}
+}
+
+@article{DBLP:journals/iacr/Couveignes06,
+  author    = {Jean Marc Couveignes},
+  title     = {Hard Homogeneous Spaces},
+  journal   = {{IACR} Cryptol. ePrint Arch.},
+  pages     = {291},
+  year      = {2006},
+  url       = {http://eprint.iacr.org/2006/291},
+  timestamp = {Mon, 11 May 2020 16:00:12 +0200},
+  biburl    = {https://dblp.org/rec/journals/iacr/Couveignes06.bib},
+  bibsource = {dblp computer science bibliography, https://dblp.org}
+}
+
+
+@inproceedings{DBLP:conf/pqcrypto/CozzoS20,
+  author    = {Daniele Cozzo and
+               Nigel P. Smart},
+  editor    = {Jintai Ding and
+               Jean{-}Pierre Tillich},
+  title     = {Sashimi: Cutting up {CSI-FiSh} Secret Keys to Produce an Actively Secure
+               Distributed Signing Protocol},
+  booktitle = {Post-Quantum Cryptography - 11th International Conference, PQCrypto
+               2020, Paris, France, April 15-17, 2020, Proceedings},
+  series    = {Lecture Notes in Computer Science},
+  volume    = {12100},
+  pages     = {169--186},
+  publisher = {Springer},
+  year      = {2020},
+  url       = {{https://doi.org/10.1007/978-3-030-44223-1\_10}},
+  timestamp = {Mon, 04 May 2020 13:23:15 +0200},
+  biburl    = {https://dblp.org/rec/conf/pqcrypto/CozzoS20.bib},
+  bibsource = {dblp computer science bibliography, https://dblp.org}
+}
+
+@inproceedings{DBLP:conf/asiacrypt/BeullensKV19,
+  author    = {Ward Beullens and
+               Thorsten Kleinjung and
+               Frederik Vercauteren},
+  editor    = {Steven D. Galbraith and
+               Shiho Moriai},
+  title     = {{CSI-FiSh:} Efficient Isogeny Based Signatures Through Class Group Computations},
+  booktitle = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
+               on the Theory and Application of Cryptology and Information Security,
+               Kobe, Japan, December 8-12, 2019, Proceedings, Part {I}},
+  series    = {Lecture Notes in Computer Science},
+  volume    = {11921},
+  pages     = {227--247},
+  publisher = {Springer},
+  year      = {2019},
+  url       = {{https://doi.org/10.1007/978-3-030-34578-5\_9}},
+  timestamp = {Tue, 26 Nov 2019 14:13:27 +0100},
+  biburl    = {https://dblp.org/rec/conf/asiacrypt/BeullensKV19.bib},
+  bibsource = {dblp computer science bibliography, https://dblp.org}
+}
+
+
+@inproceedings{DBLP:conf/ima/CozzoS19,
+  author    = {Daniele Cozzo and
+               Nigel P. Smart},
+  editor    = {Martin Albrecht},
+  title     = {Sharing the {LUOV:} Threshold Post-quantum Signatures},
+  booktitle = {Cryptography and Coding - 17th {IMA} International Conference, {IMACC}
+               2019, Oxford, UK, December 16-18, 2019, Proceedings},
+  series    = {Lecture Notes in Computer Science},
+  volume    = {11929},
+  pages     = {128--153},
+  publisher = {Springer},
+  year      = {2019},
+  url       = {https://doi.org/10.1007/978-3-030-35199-1\_7},
+  timestamp = {Thu, 19 Dec 2019 09:27:27 +0100},
+  biburl    = {https://dblp.org/rec/conf/ima/CozzoS19.bib},
+  bibsource = {dblp computer science bibliography, https://dblp.org}
+}
+
+
+@inproceedings{DBLP:conf/africacrypt/TraversoD018,
+  author    = {Giulia Traverso and
+               Denise Demirel and
+               Johannes Buchmann},
+  editor    = {Antoine Joux and
+               Abderrahmane Nitaj and
+               Tajjeeddine Rachidi},
+  title     = {Performing Computations on Hierarchically Shared Secrets},
+  booktitle = {Progress in Cryptology - {AFRICACRYPT} 2018 - 10th International Conference
+               on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings},
+  series    = {Lecture Notes in Computer Science},
+  volume    = {10831},
+  pages     = {141--161},
+  publisher = {Springer},
+  year      = {2018},
+  url       = {{https://doi.org/10.1007/978-3-319-89339-6\_9}},
+  timestamp = {Tue, 14 May 2019 10:00:52 +0200},
+  biburl    = {https://dblp.org/rec/conf/africacrypt/TraversoD018.bib},
+  bibsource = {dblp computer science bibliography, https://dblp.org}
+}
+
+@inproceedings{DBLP:conf/icits/TraversoDB16,
+  author    = {Giulia Traverso and
+               Denise Demirel and
+               Johannes Buchmann},
+  editor    = {Anderson C. A. Nascimento and
+               Paulo S. L. M. Barreto},
+  title     = {Dynamic and Verifiable Hierarchical Secret Sharing},
+  booktitle = {Information Theoretic Security - 9th International Conference, {ICITS}
+               2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers},
+  series    = {Lecture Notes in Computer Science},
+  volume    = {10015},
+  pages     = {24--43},
+  year      = {2016},
+  url       = {https://doi.org/10.1007/978-3-319-49175-2\_2},
+  timestamp = {Mon, 16 Nov 2020 15:55:52 +0100},
+  biburl    = {https://dblp.org/rec/conf/icits/TraversoDB16.bib},
+  bibsource = {dblp computer science bibliography, https://dblp.org}
+}
+
+@inproceedings{DBLP:conf/fc/HerranzS03,
+  author    = {Javier Herranz and
+               Germ{\'{a}}n S{\'{a}}ez},
+  editor    = {Rebecca N. Wright},
+  title     = {Verifiable Secret Sharing for General Access Structures, with Application
+               to Fully Distributed Proxy Signatures},
+  booktitle = {Financial Cryptography, 7th International Conference, {FC} 2003, Guadeloupe,
+               French West Indies, January 27-30, 2003, Revised Papers},
+  series    = {Lecture Notes in Computer Science},
+  volume    = {2742},
+  pages     = {286--302},
+  publisher = {Springer},
+  year      = {2003},
+  url       = {{https://doi.org/10.1007/978-3-540-45126-6\_21}},
+  timestamp = {Tue, 14 May 2019 10:00:38 +0200},
+  biburl    = {https://dblp.org/rec/conf/fc/HerranzS03.bib},
+  bibsource = {dblp computer science bibliography, https://dblp.org}
+}
+
+@inproceedings{DBLP:conf/eurocrypt/Stadler96,
+  author    = {Markus Stadler},
+  editor    = {Ueli M. Maurer},
+  title     = {Publicly Verifiable Secret Sharing},
+  booktitle = {Advances in Cryptology - {EUROCRYPT} '96, International Conference
+               on the Theory and Application of Cryptographic Techniques, Saragossa,
+               Spain, May 12-16, 1996, Proceeding},
+  series    = {Lecture Notes in Computer Science},
+  volume    = {1070},
+  pages     = {190--199},
+  publisher = {Springer},
+  year      = {1996},
+  url       = {https://doi.org/10.1007/3-540-68339-9\_17},
+  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
+  biburl    = {https://dblp.org/rec/conf/eurocrypt/Stadler96.bib},
+  bibsource = {dblp computer science bibliography, https://dblp.org}
+}
+
+@inproceedings{DBLP:conf/crypto/Pedersen91,
+  author    = {Torben P. Pedersen},
+  editor    = {Joan Feigenbaum},
+  title     = {Non-Interactive and Information-Theoretic Secure Verifiable Secret
+               Sharing},
+  booktitle = {Advances in Cryptology - {CRYPTO} '91, 11th Annual International Cryptology
+               Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings},
+  series    = {Lecture Notes in Computer Science},
+  volume    = {576},
+  pages     = {129--140},
+  publisher = {Springer},
+  year      = {1991},
+  url       = {{https://doi.org/10.1007/3-540-46766-1\_9}},
+  timestamp = {Fri, 17 Jul 2020 16:12:45 +0200},
+  biburl    = {https://dblp.org/rec/conf/crypto/Pedersen91.bib},
+  bibsource = {dblp computer science bibliography, https://dblp.org}
+}
+
+@inproceedings{DBLP:conf/asiacrypt/BackesKP11,
+  author    = {Michael Backes and
+               Aniket Kate and
+               Arpita Patra},
+  editor    = {Dong Hoon Lee and
+               Xiaoyun Wang},
+  title     = {Computational Verifiable Secret Sharing Revisited},
+  booktitle = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
+               on the Theory and Application of Cryptology and Information Security,
+               Seoul, South Korea, December 4-8, 2011. Proceedings},
+  series    = {Lecture Notes in Computer Science},
+  volume    = {7073},
+  pages     = {590--609},
+  publisher = {Springer},
+  year      = {2011},
+  url       = {https://doi.org/10.1007/978-3-642-25385-0\_32},
+  timestamp = {Tue, 14 May 2019 10:00:40 +0200},
+  biburl    = {https://dblp.org/rec/conf/asiacrypt/BackesKP11.bib},
+  bibsource = {dblp computer science bibliography, https://dblp.org}
+}
+
+@inproceedings{DBLP:conf/ccs/BethKO93,
+  author    = {Thomas Beth and
+               Hans{-}Joachim Knobloch and
+               Marcus Otten},
+  editor    = {Dorothy E. Denning and
+               Raymond Pyle and
+               Ravi Ganesan and
+               Ravi S. Sandhu and
+               Victoria Ashby},
+  title     = {Verifiable Secret Sharing for Monotone Access Structures},
+  booktitle = {{CCS} '93, Proceedings of the 1st {ACM} Conference on Computer and
+               Communications Security, Fairfax, Virginia, USA, November 3-5, 1993},
+  pages     = {189--194},
+  publisher = {{ACM}},
+  year      = {1993},
+  url       = {https://doi.org/10.1145/168588.168612},
+  timestamp = {Tue, 10 Nov 2020 20:00:40 +0100},
+  biburl    = {https://dblp.org/rec/conf/ccs/BethKO93.bib},
+  bibsource = {dblp computer science bibliography, https://dblp.org}
+}
+
+@inproceedings{DBLP:conf/tcc/Tassa04,
+  author    = {Tamir Tassa},
+  editor    = {Moni Naor},
+  title     = {Hierarchical Threshold Secret Sharing},
+  booktitle = {Theory of Cryptography, First Theory of Cryptography Conference, {TCC}
+               2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings},
+  series    = {Lecture Notes in Computer Science},
+  volume    = {2951},
+  pages     = {473--490},
+  publisher = {Springer},
+  year      = {2004},
+  url       = {{https://doi.org/10.1007/978-3-540-24638-1\_26}},
+  timestamp = {Tue, 14 May 2019 10:00:47 +0200},
+  biburl    = {https://dblp.org/rec/conf/tcc/Tassa04.bib},
+  bibsource = {dblp computer science bibliography, https://dblp.org}
+}
+
+@article{DBLP:journals/iacr/Thorbek09,
+  author    = {Rune Thorbek},
+  title     = {Proactive Linear Integer Secret Sharing},
+  journal   = {{IACR} Cryptol. ePrint Arch.},
+  pages     = {183},
+  year      = {2009},
+  url       = {http://eprint.iacr.org/2009/183},
+  timestamp = {Mon, 11 May 2020 15:58:29 +0200},
+  biburl    = {https://dblp.org/rec/journals/iacr/Thorbek09.bib},
+  bibsource = {dblp computer science bibliography, https://dblp.org}
+}
+
+@inproceedings{DBLP:conf/pkc/DamgardT06,
+  author    = {Ivan Damg{\aa}rd and
+               Rune Thorbek},
+  editor    = {Moti Yung and
+               Yevgeniy Dodis and
+               Aggelos Kiayias and
+               Tal Malkin},
+  title     = {Linear Integer Secret Sharing and Distributed Exponentiation},
+  booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference
+               on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
+               April 24-26, 2006, Proceedings},
+  series    = {Lecture Notes in Computer Science},
+  volume    = {3958},
+  pages     = {75--90},
+  publisher = {Springer},
+  year      = {2006},
+  url       = {{https://doi.org/10.1007/11745853\_6}},
+  timestamp = {Fri, 01 May 2020 18:32:25 +0200},
+  biburl    = {https://dblp.org/rec/conf/pkc/DamgardT06.bib},
+  bibsource = {dblp computer science bibliography, https://dblp.org}
+}
+
+@inproceedings{DBLP:conf/pqcrypto/BeullensDPV21,
+  author    = {Ward Beullens and
+               Lucas Disson and
+               Robi Pedersen and
+               Frederik Vercauteren},
+  editor    = {Jung Hee Cheon and
+               Jean{-}Pierre Tillich},
+  title     = {{CSI-RAShi:} Distributed Key Generation for {CSIDH}},
+  booktitle = {Post-Quantum Cryptography - 12th International Workshop, PQCrypto
+               2021, Daejeon, South Korea, July 20-22, 2021, Proceedings},
+  series    = {Lecture Notes in Computer Science},
+  volume    = {12841},
+  pages     = {257--276},
+  publisher = {Springer},
+  year      = {2021},
+  url       = {{https://doi.org/10.1007/978-3-030-81293-5\_14}},
+  timestamp = {Wed, 21 Jul 2021 15:51:05 +0200},
+  biburl    = {https://dblp.org/rec/conf/pqcrypto/BeullensDPV21.bib},
+  bibsource = {dblp computer science bibliography, https://dblp.org}
+}
+
+
+@Article{Shamir:1979:HSS,
+  author    = {Adi Shamir},
+  title     = {How to Share a Secret},
+  journal   = {Commun. {ACM}},
+  volume    = {22},
+  number    = {11},
+  pages     = {612--613},
+  year      = {1979},
+  url       = {http://doi.acm.org/10.1145/359168.359176},
+  timestamp = {Wed, 14 Nov 2018 10:22:34 +0100},
+  biburl    = {https://dblp.org/rec/journals/cacm/Shamir79.bib},
+  bibsource = {dblp computer science bibliography, https://dblp.org}
+}
+
+@InProceedings{Blakley:1979:SCK,
+  author =	"G. R. Blakley",
+  title =	"Safeguarding cryptographic keys",
+  editor =	"Richard E. Merwin and Jacqueline T. Zanca and Merlin.
+		 Smith",
+  booktitle =	"1979 National Computer Conference: June 4--7, 1979,
+		 New York, New York",
+  volume =	"48",
+  publisher =	"AFIPS Press",
+  address =	"pub-AFIPS:adr",
+  series =	"AFIPS Conference proceedings",
+  pages =	"313--317",
+  year = 	"1979",
+  bibdate =	"Fri Nov 20 15:54:39 MST 1998",
+  bibsource =	"http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
+  acknowledgement = "Nelson H. F. Beebe, University of Utah, Department
+		 of Mathematics, 110 LCB, 155 S 1400 E RM 233, Salt Lake
+		 City, UT 84112-0090, USA, Tel: +1 801 581 5254, FAX: +1
+		 801 581 4148, e-mail: \path|beebe@math.utah.edu|,
+		 \path|beebe@acm.org|, \path|beebe@computer.org|
+		 (Internet), URL:
+		 \path|http://www.math.utah.edu/~beebe/|",
+  referencedin = "Referenced in \cite[Ref. 3]{Canetti:1997:PSL},
+		 \cite[Ref. 2]{Gemmell:1997:ITC}.",
+  xxauthor =	"R. Blakley",
+}
+
+@inproceedings{LindellN18,
+  author    = {Yehuda Lindell and
+               Ariel Nof},
+  editor    = {David Lie and
+               Mohammad Mannan and
+               Michael Backes and
+               XiaoFeng Wang},
+  title     = {Fast Secure Multiparty {ECDSA} with Practical Distributed Key Generation
+               and Applications to Cryptocurrency Custody},
+  booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
+               Communications Security, {CCS} 2018, Toronto, ON, Canada, October
+               15-19, 2018},
+  pages     = {1837--1854},
+  publisher = {{ACM}},
+  year      = {2018},
+  url       = {https://doi.org/10.1145/3243734.3243788},
+  timestamp = {Tue, 10 Nov 2020 20:00:51 +0100},
+  biburl    = {https://dblp.org/rec/conf/ccs/LindellN18.bib},
+  bibsource = {dblp computer science bibliography, https://dblp.org}
+}
+
+@inproceedings{DoernerKLS19,
+  author    = {Jack Doerner and
+               Yashvanth Kondi and
+               Eysa Lee and
+               Abhi Shelat},
+  title     = {Threshold {ECDSA} from {ECDSA} Assumptions: The Multiparty Case},
+  booktitle = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco,
+               CA, USA, May 19-23, 2019},
+  pages     = {1051--1066},
+  publisher = {{IEEE}},
+  year      = {2019},
+  url       = {https://doi.org/10.1109/SP.2019.00024},
+  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
+  biburl    = {https://dblp.org/rec/conf/sp/DoernerKLS19.bib},
+  bibsource = {dblp computer science bibliography, https://dblp.org}
+}
+
+@inproceedings{DoernerKLS18,
+  author    = {Jack Doerner and
+               Yashvanth Kondi and
+               Eysa Lee and
+               Abhi Shelat},
+  title     = {Secure Two-party Threshold {ECDSA} from {ECDSA} Assumptions},
+  booktitle = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings,
+               21-23 May 2018, San Francisco, California, {USA}},
+  pages     = {980--997},
+  publisher = {{IEEE} Computer Society},
+  year      = {2018},
+  url       = {https://doi.org/10.1109/SP.2018.00036},
+  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
+  biburl    = {https://dblp.org/rec/conf/sp/DoernerKLS18.bib},
+  bibsource = {dblp computer science bibliography, https://dblp.org}
+}
+
+@inproceedings{FeoM20,
+  author    = {Luca De Feo and
+               Michael Meyer},
+  editor    = {Aggelos Kiayias and
+               Markulf Kohlweiss and
+               Petros Wallden and
+               Vassilis Zikas},
+  title     = {Threshold Schemes from Isogeny Assumptions},
+  booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
+               on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
+               May 4-7, 2020, Proceedings, Part {II}},
+  series    = {Lecture Notes in Computer Science},
+  volume    = {12111},
+  pages     = {187--212},
+  publisher = {Springer},
+  year      = {2020},
+  url       = {{https://doi.org/10.1007/978-3-030-45388-6\_7}},
+  timestamp = {Fri, 22 May 2020 21:56:39 +0200},
+  biburl    = {https://dblp.org/rec/conf/pkc/FeoM20.bib},
+  bibsource = {dblp computer science bibliography, https://dblp.org}
+}
-- 
GitLab