Skip to content
Snippets Groups Projects
Commit 2608c562 authored by Philipp Muth's avatar Philipp Muth
Browse files

minor

parent 612f87cd
No related branches found
No related tags found
No related merge requests found
\newif\ifpublic
\publictrue
\newif\ifshamir
\shamirtrue
\newif\ifsubsection
\subsectiontrue
%\documentclass[conference]{IEEEtran}
\documentclass[runningheads]{llncs}
%\pagestyle{plain}
\input{preamble}
% correct bad hyphenation here
%\hyphenation{op-tical net-works semi-conduc-tor}
\begin{document}
%
% paper title
% can use linebreaks \\ within to get better formatting as desired
\title{On Actively Secure Fine-Grained Access Structures from Isogeny Assumptions}
\titlerunning{On Actively Secure Access Structures from Isogeny Assumptions}
\ifpublic
\author{Fabio Campos\inst{1,2} \and Philipp Muth\inst{3}}
\authorrunning{}
\institute{\relax
RheinMain University of Applied Sciences, Wiesbaden, Germany
\and
Radboud University, Nijmegen, The Netherlands \\
\email{campos@sopmac.de}
\and
Technische Universität Darmstadt, Germany\\
\email{philipp.muth@tu-darmstadt.de}
}
\else
\author{}
\institute{}
\fi
%\author{\IEEEauthorblockN{Michael Shell}
%\IEEEauthorblockA{Georgia Institute of Technology\\someemail@somedomain.com}
%\and
%\IEEEauthorblockN{Homer Simpson}
%\IEEEauthorblockA{Twentieth Century Fox\\homer@thesimpsons.com}
%\and
%\IEEEauthorblockN{James Kirk\\ and Montgomery Scott}
%\IEEEauthorblockA{Starfleet Academy\\someemail@somedomain.com}}
%\IEEEoverridecommandlockouts
%\makeatletter\def\@IEEEpubidpullup{6.5\baselineskip}\makeatother
%\IEEEpubid{\parbox{\columnwidth}{
% Network and Distributed Systems Security (NDSS) Symposium 2021\\
% 21-24 February 2021\\
% ISBN 1-891562-66-5\\
% https://dx.doi.org/10.14722/ndss.2021.23xxx\\
% www.ndss-symposium.org
%}
%\hspace{\columnsep}\makebox[\columnwidth]{}}
% make the title area
\maketitle
\begin{abstract}
We present an actively secure threshold scheme in the setting of Hard Homogeneous Spaces (HHS) which allows fine-grained access structures. More precisely, we elevate a
%given
passively secure isogeny-based threshold scheme to an actively secure setting. We prove the active security and simulatability of our advanced schemes.
By characterising the necessary properties, we open our schemes to a significantly wider field of applicable secret sharing schemes. Furthermore, we show that Shamir's scheme has our generalised properties, and thereby our approach truly represents a less restrictive generalisation.
%In their recent work \cite{FeoM20}, DeFeo and Meyer introduced a method for executing isogeny based public key encryptions on a private key, that had been stored in Shamir's information theoretical secret sharing scheme \cite{Shamir:1979:HSS}. While their approach enables a distributed en- and decryption for a threshold scheme, it is rather restrictive in that the access structure is limited to sets of a minimum size and lacks granularity. Furthermore their approach is only passively secure, i.e., a misbehaving adversary can not be detected.
%In this work we elevate \cite{PKC:DeFMey20}'s scheme to an actively secure setting, that is misbehaving player's are detected while the protocol is being executed. We prove the active security and simulatability of our advanced schemes. Furthermore we expand the range of secret sharing schemes able to support DeFeo's and Meyer's approach by defining some characterising properties of suitable schemes. For schemes fulfilling said properties the same security guarantees hold in regards to \cite{PKC:DeFMey20}'s approach. Furthermore we show that Shamir's scheme has our generalised properties, and thereby our approach truly is a generalisation of \cite{PKC:DeFMey20}.
\begin{comment}In their recent work \cite{PKC:DeFMey20}, De Feo and Meyer introduced a method for executing isogeny-based public key encryption on a private key, that had been stored in Shamir's information theoretical secret sharing scheme \cite{Shamir:1979:HSS}. While their approach enables a distributed en- and decryption for a threshold scheme, it is rather restrictive in that the access structure is limited to sets of a minimum size and lacks granularity. Furthermore, their approach is only passively secure, i.e., a misbehaving adversary can not be detected.
In this work we elevate \cite{PKC:DeFMey20}'s scheme to an actively secure setting, that is misbehaving players are detected while the protocol is being executed. We prove the active security and simulatability of our advanced schemes. Furthermore, we expand the range of secret sharing schemes able to support De Feo's and Meyer's approach by defining some characterising properties of suitable schemes. For schemes fulfilling said properties the same security guarantees hold in regard to \cite{PKC:DeFMey20}'s approach. Furthermore, we show that Shamir's scheme has our generalised properties, and thereby our approach truly is a generalisation of \cite{PKC:DeFMey20}.
\end{comment}
\keywords{post-quantum cryptography
\and isogeny-based cryptography
\and threshold cryptography
}
\end{abstract}
% IEEEtran.cls defaults to using nonbold math in the Abstract.
% This preserves the distinction between vectors and scalars. However,
% if the conference you are submitting to favors bold math in the abstract,
% then you can use LaTeX's standard command \boldmath at the very start
% of the abstract to achieve this. Many IEEE journals/conferences frown on
% math in the abstract anyway.
\begingroup
\makeatletter
\def\@thefnmark{} \@footnotetext{\relax
Author list in alphabetical order; see
\url{https://www.ams.org/profession/leaders/culture/CultureStatement04.pdf}.}
\endgroup
%\tableofcontents
%\input{roadmap}
\input{introduction}
\input{preliminaries}
\input{keyexchange}
\input{signatures}
\input{generalsss}
\input{conclusion}
\ifpublic
\input{acknowledgements}
\fi
%\input{algorithms}
%\bibliographystyle{plain}
\bibliographystyle{splncs04}
\bibliography{pqc}
% Appendix
\newpage
\input{appendix}
% that's all folks
\end{document}
@inproceedings{DBLP:conf/crypto/DonFMS19,
author = {Jelle Don and
Serge Fehr and
Christian Majenz and
Christian Schaffner},
editor = {Alexandra Boldyreva and
Daniele Micciancio},
title = {Security of the Fiat-Shamir Transformation in the Quantum Random-Oracle
Model},
booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
Proceedings, Part {II}},
series = {Lecture Notes in Computer Science},
volume = {11693},
pages = {356--383},
publisher = {Springer},
year = {2019},
url = {https://doi.org/10.1007/978-3-030-26951-7\_13},
doi = {10.1007/978-3-030-26951-7\_13},
timestamp = {Fri, 09 Apr 2021 18:35:29 +0200},
biburl = {https://dblp.org/rec/conf/crypto/DonFMS19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BonnetainS20,
author = {Xavier Bonnetain and
Andr{\'{e}} Schrottenloher},
editor = {Anne Canteaut and
Yuval Ishai},
title = {Quantum Security Analysis of {CSIDH}},
booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International
Conference on the Theory and Applications of Cryptographic Techniques,
Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}},
series = {Lecture Notes in Computer Science},
volume = {12106},
pages = {493--522},
publisher = {Springer},
year = {2020},
url = {https://doi.org/10.1007/978-3-030-45724-2\_17},
timestamp = {Mon, 04 May 2020 14:35:02 +0200},
biburl = {https://dblp.org/rec/conf/eurocrypt/BonnetainS20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Peikert20,
author = {Chris Peikert},
editor = {Anne Canteaut and
Yuval Ishai},
title = {He Gives C-Sieves on the {CSIDH}},
booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International
Conference on the Theory and Applications of Cryptographic Techniques,
Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}},
series = {Lecture Notes in Computer Science},
volume = {12106},
pages = {463--492},
publisher = {Springer},
year = {2020},
url = {https://doi.org/10.1007/978-3-030-45724-2\_16},
timestamp = {Mon, 04 May 2020 14:35:02 +0200},
biburl = {https://dblp.org/rec/conf/eurocrypt/Peikert20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@misc{Brandao_Davidson_Vassilev_2020,
title={{NIST roadmap toward criteria for threshold schemes for cryptographic primitives}},
url={http://dx.doi.org/10.6028/NIST.IR.8214A},
institution={National Institute of Standards and Technology},
author={Brandao, Luis T A N and Davidson, Michael and Vassilev, Apostol},
year={2020},
month={Jul} }
@inproceedings{DBLP:conf/ccs/LindellN18,
author = {Yehuda Lindell and
Ariel Nof},
editor = {David Lie and
Mohammad Mannan and
Michael Backes and
XiaoFeng Wang},
title = {Fast Secure Multiparty {ECDSA} with Practical Distributed Key Generation
and Applications to Cryptocurrency Custody},
booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
Communications Security, {CCS} 2018, Toronto, ON, Canada, October
15-19, 2018},
pages = {1837--1854},
publisher = {{ACM}},
year = {2018},
url = {https://doi.org/10.1145/3243734.3243788},
timestamp = {Tue, 10 Nov 2020 20:00:51 +0100},
biburl = {https://dblp.org/rec/conf/ccs/LindellN18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Couveignes06,
author = {Jean Marc Couveignes},
title = {Hard Homogeneous Spaces},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {291},
year = {2006},
url = {http://eprint.iacr.org/2006/291},
timestamp = {Mon, 11 May 2020 16:00:12 +0200},
biburl = {https://dblp.org/rec/journals/iacr/Couveignes06.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/CozzoS20,
author = {Daniele Cozzo and
Nigel P. Smart},
editor = {Jintai Ding and
Jean{-}Pierre Tillich},
title = {Sashimi: Cutting up {CSI-FiSh} Secret Keys to Produce an Actively Secure
Distributed Signing Protocol},
booktitle = {Post-Quantum Cryptography - 11th International Conference, PQCrypto
2020, Paris, France, April 15-17, 2020, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {12100},
pages = {169--186},
publisher = {Springer},
year = {2020},
url = {{https://doi.org/10.1007/978-3-030-44223-1\_10}},
timestamp = {Mon, 04 May 2020 13:23:15 +0200},
biburl = {https://dblp.org/rec/conf/pqcrypto/CozzoS20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BeullensKV19,
author = {Ward Beullens and
Thorsten Kleinjung and
Frederik Vercauteren},
editor = {Steven D. Galbraith and
Shiho Moriai},
title = {{CSI-FiSh:} Efficient Isogeny Based Signatures Through Class Group Computations},
booktitle = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
on the Theory and Application of Cryptology and Information Security,
Kobe, Japan, December 8-12, 2019, Proceedings, Part {I}},
series = {Lecture Notes in Computer Science},
volume = {11921},
pages = {227--247},
publisher = {Springer},
year = {2019},
url = {{https://doi.org/10.1007/978-3-030-34578-5\_9}},
timestamp = {Tue, 26 Nov 2019 14:13:27 +0100},
biburl = {https://dblp.org/rec/conf/asiacrypt/BeullensKV19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/CozzoS19,
author = {Daniele Cozzo and
Nigel P. Smart},
editor = {Martin Albrecht},
title = {Sharing the {LUOV:} Threshold Post-quantum Signatures},
booktitle = {Cryptography and Coding - 17th {IMA} International Conference, {IMACC}
2019, Oxford, UK, December 16-18, 2019, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {11929},
pages = {128--153},
publisher = {Springer},
year = {2019},
url = {https://doi.org/10.1007/978-3-030-35199-1\_7},
timestamp = {Thu, 19 Dec 2019 09:27:27 +0100},
biburl = {https://dblp.org/rec/conf/ima/CozzoS19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/TraversoD018,
author = {Giulia Traverso and
Denise Demirel and
Johannes Buchmann},
editor = {Antoine Joux and
Abderrahmane Nitaj and
Tajjeeddine Rachidi},
title = {Performing Computations on Hierarchically Shared Secrets},
booktitle = {Progress in Cryptology - {AFRICACRYPT} 2018 - 10th International Conference
on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {10831},
pages = {141--161},
publisher = {Springer},
year = {2018},
url = {{https://doi.org/10.1007/978-3-319-89339-6\_9}},
timestamp = {Tue, 14 May 2019 10:00:52 +0200},
biburl = {https://dblp.org/rec/conf/africacrypt/TraversoD018.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/TraversoDB16,
author = {Giulia Traverso and
Denise Demirel and
Johannes Buchmann},
editor = {Anderson C. A. Nascimento and
Paulo S. L. M. Barreto},
title = {Dynamic and Verifiable Hierarchical Secret Sharing},
booktitle = {Information Theoretic Security - 9th International Conference, {ICITS}
2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers},
series = {Lecture Notes in Computer Science},
volume = {10015},
pages = {24--43},
year = {2016},
url = {https://doi.org/10.1007/978-3-319-49175-2\_2},
timestamp = {Mon, 16 Nov 2020 15:55:52 +0100},
biburl = {https://dblp.org/rec/conf/icits/TraversoDB16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/HerranzS03,
author = {Javier Herranz and
Germ{\'{a}}n S{\'{a}}ez},
editor = {Rebecca N. Wright},
title = {Verifiable Secret Sharing for General Access Structures, with Application
to Fully Distributed Proxy Signatures},
booktitle = {Financial Cryptography, 7th International Conference, {FC} 2003, Guadeloupe,
French West Indies, January 27-30, 2003, Revised Papers},
series = {Lecture Notes in Computer Science},
volume = {2742},
pages = {286--302},
publisher = {Springer},
year = {2003},
url = {{https://doi.org/10.1007/978-3-540-45126-6\_21}},
timestamp = {Tue, 14 May 2019 10:00:38 +0200},
biburl = {https://dblp.org/rec/conf/fc/HerranzS03.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Stadler96,
author = {Markus Stadler},
editor = {Ueli M. Maurer},
title = {Publicly Verifiable Secret Sharing},
booktitle = {Advances in Cryptology - {EUROCRYPT} '96, International Conference
on the Theory and Application of Cryptographic Techniques, Saragossa,
Spain, May 12-16, 1996, Proceeding},
series = {Lecture Notes in Computer Science},
volume = {1070},
pages = {190--199},
publisher = {Springer},
year = {1996},
url = {https://doi.org/10.1007/3-540-68339-9\_17},
timestamp = {Tue, 14 May 2019 10:00:53 +0200},
biburl = {https://dblp.org/rec/conf/eurocrypt/Stadler96.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Pedersen91,
author = {Torben P. Pedersen},
editor = {Joan Feigenbaum},
title = {Non-Interactive and Information-Theoretic Secure Verifiable Secret
Sharing},
booktitle = {Advances in Cryptology - {CRYPTO} '91, 11th Annual International Cryptology
Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {576},
pages = {129--140},
publisher = {Springer},
year = {1991},
url = {{https://doi.org/10.1007/3-540-46766-1\_9}},
timestamp = {Fri, 17 Jul 2020 16:12:45 +0200},
biburl = {https://dblp.org/rec/conf/crypto/Pedersen91.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BackesKP11,
author = {Michael Backes and
Aniket Kate and
Arpita Patra},
editor = {Dong Hoon Lee and
Xiaoyun Wang},
title = {Computational Verifiable Secret Sharing Revisited},
booktitle = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
on the Theory and Application of Cryptology and Information Security,
Seoul, South Korea, December 4-8, 2011. Proceedings},
series = {Lecture Notes in Computer Science},
volume = {7073},
pages = {590--609},
publisher = {Springer},
year = {2011},
url = {https://doi.org/10.1007/978-3-642-25385-0\_32},
timestamp = {Tue, 14 May 2019 10:00:40 +0200},
biburl = {https://dblp.org/rec/conf/asiacrypt/BackesKP11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BethKO93,
author = {Thomas Beth and
Hans{-}Joachim Knobloch and
Marcus Otten},
editor = {Dorothy E. Denning and
Raymond Pyle and
Ravi Ganesan and
Ravi S. Sandhu and
Victoria Ashby},
title = {Verifiable Secret Sharing for Monotone Access Structures},
booktitle = {{CCS} '93, Proceedings of the 1st {ACM} Conference on Computer and
Communications Security, Fairfax, Virginia, USA, November 3-5, 1993},
pages = {189--194},
publisher = {{ACM}},
year = {1993},
url = {https://doi.org/10.1145/168588.168612},
timestamp = {Tue, 10 Nov 2020 20:00:40 +0100},
biburl = {https://dblp.org/rec/conf/ccs/BethKO93.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Tassa04,
author = {Tamir Tassa},
editor = {Moni Naor},
title = {Hierarchical Threshold Secret Sharing},
booktitle = {Theory of Cryptography, First Theory of Cryptography Conference, {TCC}
2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {2951},
pages = {473--490},
publisher = {Springer},
year = {2004},
url = {{https://doi.org/10.1007/978-3-540-24638-1\_26}},
timestamp = {Tue, 14 May 2019 10:00:47 +0200},
biburl = {https://dblp.org/rec/conf/tcc/Tassa04.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Thorbek09,
author = {Rune Thorbek},
title = {Proactive Linear Integer Secret Sharing},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {183},
year = {2009},
url = {http://eprint.iacr.org/2009/183},
timestamp = {Mon, 11 May 2020 15:58:29 +0200},
biburl = {https://dblp.org/rec/journals/iacr/Thorbek09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DamgardT06,
author = {Ivan Damg{\aa}rd and
Rune Thorbek},
editor = {Moti Yung and
Yevgeniy Dodis and
Aggelos Kiayias and
Tal Malkin},
title = {Linear Integer Secret Sharing and Distributed Exponentiation},
booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference
on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
April 24-26, 2006, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {3958},
pages = {75--90},
publisher = {Springer},
year = {2006},
url = {{https://doi.org/10.1007/11745853\_6}},
timestamp = {Fri, 01 May 2020 18:32:25 +0200},
biburl = {https://dblp.org/rec/conf/pkc/DamgardT06.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/BeullensDPV21,
author = {Ward Beullens and
Lucas Disson and
Robi Pedersen and
Frederik Vercauteren},
editor = {Jung Hee Cheon and
Jean{-}Pierre Tillich},
title = {{CSI-RAShi:} Distributed Key Generation for {CSIDH}},
booktitle = {Post-Quantum Cryptography - 12th International Workshop, PQCrypto
2021, Daejeon, South Korea, July 20-22, 2021, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {12841},
pages = {257--276},
publisher = {Springer},
year = {2021},
url = {{https://doi.org/10.1007/978-3-030-81293-5\_14}},
timestamp = {Wed, 21 Jul 2021 15:51:05 +0200},
biburl = {https://dblp.org/rec/conf/pqcrypto/BeullensDPV21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@Article{Shamir:1979:HSS,
author = {Adi Shamir},
title = {How to Share a Secret},
journal = {Commun. {ACM}},
volume = {22},
number = {11},
pages = {612--613},
year = {1979},
url = {http://doi.acm.org/10.1145/359168.359176},
timestamp = {Wed, 14 Nov 2018 10:22:34 +0100},
biburl = {https://dblp.org/rec/journals/cacm/Shamir79.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@InProceedings{Blakley:1979:SCK,
author = "G. R. Blakley",
title = "Safeguarding cryptographic keys",
editor = "Richard E. Merwin and Jacqueline T. Zanca and Merlin.
Smith",
booktitle = "1979 National Computer Conference: June 4--7, 1979,
New York, New York",
volume = "48",
publisher = "AFIPS Press",
address = "pub-AFIPS:adr",
series = "AFIPS Conference proceedings",
pages = "313--317",
year = "1979",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = "Nelson H. F. Beebe, University of Utah, Department
of Mathematics, 110 LCB, 155 S 1400 E RM 233, Salt Lake
City, UT 84112-0090, USA, Tel: +1 801 581 5254, FAX: +1
801 581 4148, e-mail: \path|beebe@math.utah.edu|,
\path|beebe@acm.org|, \path|beebe@computer.org|
(Internet), URL:
\path|http://www.math.utah.edu/~beebe/|",
referencedin = "Referenced in \cite[Ref. 3]{Canetti:1997:PSL},
\cite[Ref. 2]{Gemmell:1997:ITC}.",
xxauthor = "R. Blakley",
}
@inproceedings{LindellN18,
author = {Yehuda Lindell and
Ariel Nof},
editor = {David Lie and
Mohammad Mannan and
Michael Backes and
XiaoFeng Wang},
title = {Fast Secure Multiparty {ECDSA} with Practical Distributed Key Generation
and Applications to Cryptocurrency Custody},
booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
Communications Security, {CCS} 2018, Toronto, ON, Canada, October
15-19, 2018},
pages = {1837--1854},
publisher = {{ACM}},
year = {2018},
url = {https://doi.org/10.1145/3243734.3243788},
timestamp = {Tue, 10 Nov 2020 20:00:51 +0100},
biburl = {https://dblp.org/rec/conf/ccs/LindellN18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DoernerKLS19,
author = {Jack Doerner and
Yashvanth Kondi and
Eysa Lee and
Abhi Shelat},
title = {Threshold {ECDSA} from {ECDSA} Assumptions: The Multiparty Case},
booktitle = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco,
CA, USA, May 19-23, 2019},
pages = {1051--1066},
publisher = {{IEEE}},
year = {2019},
url = {https://doi.org/10.1109/SP.2019.00024},
timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
biburl = {https://dblp.org/rec/conf/sp/DoernerKLS19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DoernerKLS18,
author = {Jack Doerner and
Yashvanth Kondi and
Eysa Lee and
Abhi Shelat},
title = {Secure Two-party Threshold {ECDSA} from {ECDSA} Assumptions},
booktitle = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings,
21-23 May 2018, San Francisco, California, {USA}},
pages = {980--997},
publisher = {{IEEE} Computer Society},
year = {2018},
url = {https://doi.org/10.1109/SP.2018.00036},
timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
biburl = {https://dblp.org/rec/conf/sp/DoernerKLS18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{FeoM20,
author = {Luca De Feo and
Michael Meyer},
editor = {Aggelos Kiayias and
Markulf Kohlweiss and
Petros Wallden and
Vassilis Zikas},
title = {Threshold Schemes from Isogeny Assumptions},
booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
May 4-7, 2020, Proceedings, Part {II}},
series = {Lecture Notes in Computer Science},
volume = {12111},
pages = {187--212},
publisher = {Springer},
year = {2020},
url = {{https://doi.org/10.1007/978-3-030-45388-6\_7}},
timestamp = {Fri, 22 May 2020 21:56:39 +0200},
biburl = {https://dblp.org/rec/conf/pkc/FeoM20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment