From 4846432ed156b39e31b475eecb92877aa2eb3a32 Mon Sep 17 00:00:00 2001
From: Philipp Muth <muth@seceng.informatik.tu-darmstadt.de>
Date: Wed, 7 Sep 2022 16:55:53 +0200
Subject: [PATCH] first slides

---
 ACNS/presentation/generalsss.tex   |   4 +
 ACNS/presentation/key_exchange.tex |   4 +
 ACNS/presentation/main.tex         |  14 +-
 ACNS/presentation/motivation.tex   |  82 +++++
 ACNS/presentation/pqc.bib          | 493 +++++++++++++++++++++++++++++
 ACNS/presentation/preamble.tex     |   5 +-
 ACNS/presentation/signatures.tex   |   4 +
 7 files changed, 601 insertions(+), 5 deletions(-)
 create mode 100644 ACNS/presentation/generalsss.tex
 create mode 100644 ACNS/presentation/key_exchange.tex
 create mode 100644 ACNS/presentation/motivation.tex
 create mode 100644 ACNS/presentation/pqc.bib
 create mode 100644 ACNS/presentation/signatures.tex

diff --git a/ACNS/presentation/generalsss.tex b/ACNS/presentation/generalsss.tex
new file mode 100644
index 0000000..807e2a9
--- /dev/null
+++ b/ACNS/presentation/generalsss.tex
@@ -0,0 +1,4 @@
+
+\section{General Access Structures and Secret Sharing Schemes}
+\begin{frame}
+\end{frame}
diff --git a/ACNS/presentation/key_exchange.tex b/ACNS/presentation/key_exchange.tex
new file mode 100644
index 0000000..87ca351
--- /dev/null
+++ b/ACNS/presentation/key_exchange.tex
@@ -0,0 +1,4 @@
+
+\section{Actively Secure Key Exchange}
+\begin{frame}
+\end{frame}
diff --git a/ACNS/presentation/main.tex b/ACNS/presentation/main.tex
index c9eba66..85e1df6 100644
--- a/ACNS/presentation/main.tex
+++ b/ACNS/presentation/main.tex
@@ -20,9 +20,17 @@
 \begin{document}
 \maketitle
 
-\section{Motivation}
-\begin{frame}
-\end{frame}
+\input{motivation}
+
+\input{key_exchange}
 
+\input{signatures}
 
+\input{generalsss}
+
+\section{References}
+\begin{frame}[allowframebreaks]
+	\bibliographystyle{amsalpha}
+	\bibliography{pqc}
+\end{frame}
 \end{document}
diff --git a/ACNS/presentation/motivation.tex b/ACNS/presentation/motivation.tex
new file mode 100644
index 0000000..eb09918
--- /dev/null
+++ b/ACNS/presentation/motivation.tex
@@ -0,0 +1,82 @@
+\section{Motivation}
+
+\begin{frame}
+	\frametitle{Where are we?}
+	\begin{block}{Hard Homogeneous Spaces}
+		A hard homogeneous space \(\left(\mathcal E,\mathcal G\right)\) is
+		\begin{itemize}
+			\item a set \(\mathcal E\),
+			\item a group \(\left(\mathcal G,\odot\right)\) and
+			\item an action \(\ast: \mathcal G\times \mathcal E \to \mathcal E\)
+		\end{itemize}
+	\end{block}
+
+	\pause
+	\begin{block}{Properties of \(\ast\)}
+		\begin{itemize}
+			\item Compatibility: \(\forall g,g' \in \mathcal G ~\forall E \in \mathcal E \colon g \ast \left(g'\ast E\right) = \left(g\odot g'\right) E\)
+			\item Identity: \(\forall E \in \mathcal E \colon  i \ast E = E \Leftrightarrow i\) is the neutral element in \(\mathcal G\)
+			\item Transitivity: \(\forall E,E'\in \mathcal E ~\exists ! g \in \mathcal G \colon g \ast E = E'\)
+		\end{itemize}
+	\end{block}
+\end{frame}
+
+\begin{frame}
+	\frametitle{Key Exchange Mechanisms}
+
+	\begin{center}
+	\begin{tikzpicture}
+		\begin{scope}[minimum size = .7cm]
+			\node [alice] (alice) at (-3,0){Alice};
+			\node [bob] (bob) at (3,0){Bob};
+		\end{scope}
+		\pause
+		\node [left = .5 of alice] (pair) {$\left(\sk,\pk\right)$};
+		%\node [above = 3 of alice] (pk) {$\pk$};
+		%\draw [->] (alice) -- (pk);
+		\pause
+		\node [above = 2.5 of bob] (encaps) {$\encaps \paren* \pk$};
+		\node [above = 0.5 of bob] (keybob) {$\key$};
+		\node [above = 2.5 of alice] (cipher) {$c$};
+		\draw [->] (encaps) -- (cipher);
+		\draw [->] (encaps) -- (keybob);
+		\pause
+
+		\node [above = 1.5 of alice] (decaps) {$\decaps\paren *{\sk,c}$};
+		\draw [->] (cipher) -- (decaps);
+
+		\node [above = 0.5 of alice] (keyalice) {$\key$};
+		\draw [->] (decaps) -- (keyalice);
+
+		\pause
+		\node [draw, red, inner sep = -.1em, shape = rectangle, fit=(decaps)] {};
+	\end{tikzpicture}
+	\end{center}
+\end{frame}
+
+\begin{frame}
+	\frametitle{A Decapsulation Protocol with Shared Secret Key \cite{FeoM20}}
+
+	\begin{center}
+	\begin{tikzpicture}
+		\def\radius{2.5cm}
+		\begin{scope}[minimum size = .7cm]
+			\node [charlie] (sh1) at (40:3cm) {$s_1$};
+			\node [dave](sh2) at (140:3cm){$s_2$};
+			\node [maninblack] (sh3) at (220:3cm){$s_3$};
+			\node [physician] (sh4) at (320:3cm){$s_4$};
+
+			\node (sk) at (0,0) {$\sk$};
+			\draw [help lines] (sk) edge (sh1) edge (sh2) edge (sh3) edge (sh4);
+			
+			\pause
+			\node [right=of sh1] (cipher) {$c$};
+			\coordinate [left = of sh2] (bla) ;
+			\draw [->] (cipher) -- (sh1);
+
+		\end{scope}
+	\end{tikzpicture}
+	\end{center}
+
+\end{frame}
+
diff --git a/ACNS/presentation/pqc.bib b/ACNS/presentation/pqc.bib
new file mode 100644
index 0000000..ef81628
--- /dev/null
+++ b/ACNS/presentation/pqc.bib
@@ -0,0 +1,493 @@
+@inproceedings{DBLP:conf/crypto/DonFMS19,
+  author    = {Jelle Don and
+               Serge Fehr and
+               Christian Majenz and
+               Christian Schaffner},
+  editor    = {Alexandra Boldyreva and
+               Daniele Micciancio},
+  title     = {Security of the Fiat-Shamir Transformation in the Quantum Random-Oracle
+               Model},
+  booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
+               Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
+               Proceedings, Part {II}},
+  series    = {Lecture Notes in Computer Science},
+  volume    = {11693},
+  pages     = {356--383},
+  publisher = {Springer},
+  year      = {2019},
+  url       = {https://doi.org/10.1007/978-3-030-26951-7\_13},
+  doi       = {10.1007/978-3-030-26951-7\_13},
+  timestamp = {Fri, 09 Apr 2021 18:35:29 +0200},
+  biburl    = {https://dblp.org/rec/conf/crypto/DonFMS19.bib},
+  bibsource = {dblp computer science bibliography, https://dblp.org}
+}
+
+@inproceedings{DBLP:conf/eurocrypt/BonnetainS20,
+  author    = {Xavier Bonnetain and
+               Andr{\'{e}} Schrottenloher},
+  editor    = {Anne Canteaut and
+               Yuval Ishai},
+  title     = {Quantum Security Analysis of {CSIDH}},
+  booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International
+               Conference on the Theory and Applications of Cryptographic Techniques,
+               Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}},
+  series    = {Lecture Notes in Computer Science},
+  volume    = {12106},
+  pages     = {493--522},
+  publisher = {Springer},
+  year      = {2020},
+  url       = {https://doi.org/10.1007/978-3-030-45724-2\_17},
+  timestamp = {Mon, 04 May 2020 14:35:02 +0200},
+  biburl    = {https://dblp.org/rec/conf/eurocrypt/BonnetainS20.bib},
+  bibsource = {dblp computer science bibliography, https://dblp.org}
+}
+
+@inproceedings{DBLP:conf/eurocrypt/Peikert20,
+  author    = {Chris Peikert},
+  editor    = {Anne Canteaut and
+               Yuval Ishai},
+  title     = {He Gives C-Sieves on the {CSIDH}},
+  booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International
+               Conference on the Theory and Applications of Cryptographic Techniques,
+               Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}},
+  series    = {Lecture Notes in Computer Science},
+  volume    = {12106},
+  pages     = {463--492},
+  publisher = {Springer},
+  year      = {2020},
+  url       = {https://doi.org/10.1007/978-3-030-45724-2\_16},
+  timestamp = {Mon, 04 May 2020 14:35:02 +0200},
+  biburl    = {https://dblp.org/rec/conf/eurocrypt/Peikert20.bib},
+  bibsource = {dblp computer science bibliography, https://dblp.org}
+}
+
+@misc{Brandao_Davidson_Vassilev_2020, 
+title={{NIST roadmap toward criteria for threshold schemes for cryptographic primitives}}, 
+url={http://dx.doi.org/10.6028/NIST.IR.8214A}, 
+institution={National Institute of Standards and Technology}, 
+author={Brandao, Luis T A N and Davidson, Michael and Vassilev, Apostol}, 
+year={2020}, 
+month={Jul} } 
+
+@inproceedings{DBLP:conf/ccs/LindellN18,
+  author    = {Yehuda Lindell and
+               Ariel Nof},
+  editor    = {David Lie and
+               Mohammad Mannan and
+               Michael Backes and
+               XiaoFeng Wang},
+  title     = {Fast Secure Multiparty {ECDSA} with Practical Distributed Key Generation
+               and Applications to Cryptocurrency Custody},
+  booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
+               Communications Security, {CCS} 2018, Toronto, ON, Canada, October
+               15-19, 2018},
+  pages     = {1837--1854},
+  publisher = {{ACM}},
+  year      = {2018},
+  url       = {https://doi.org/10.1145/3243734.3243788},
+  timestamp = {Tue, 10 Nov 2020 20:00:51 +0100},
+  biburl    = {https://dblp.org/rec/conf/ccs/LindellN18.bib},
+  bibsource = {dblp computer science bibliography, https://dblp.org}
+}
+
+@article{DBLP:journals/iacr/Couveignes06,
+  author    = {Jean Marc Couveignes},
+  title     = {Hard Homogeneous Spaces},
+  journal   = {{IACR} Cryptol. ePrint Arch.},
+  pages     = {291},
+  year      = {2006},
+  url       = {http://eprint.iacr.org/2006/291},
+  timestamp = {Mon, 11 May 2020 16:00:12 +0200},
+  biburl    = {https://dblp.org/rec/journals/iacr/Couveignes06.bib},
+  bibsource = {dblp computer science bibliography, https://dblp.org}
+}
+
+
+@inproceedings{DBLP:conf/pqcrypto/CozzoS20,
+  author    = {Daniele Cozzo and
+               Nigel P. Smart},
+  editor    = {Jintai Ding and
+               Jean{-}Pierre Tillich},
+  title     = {Sashimi: Cutting up {CSI-FiSh} Secret Keys to Produce an Actively Secure
+               Distributed Signing Protocol},
+  booktitle = {Post-Quantum Cryptography - 11th International Conference, PQCrypto
+               2020, Paris, France, April 15-17, 2020, Proceedings},
+  series    = {Lecture Notes in Computer Science},
+  volume    = {12100},
+  pages     = {169--186},
+  publisher = {Springer},
+  year      = {2020},
+  url       = {{https://doi.org/10.1007/978-3-030-44223-1\_10}},
+  timestamp = {Mon, 04 May 2020 13:23:15 +0200},
+  biburl    = {https://dblp.org/rec/conf/pqcrypto/CozzoS20.bib},
+  bibsource = {dblp computer science bibliography, https://dblp.org}
+}
+
+@inproceedings{DBLP:conf/asiacrypt/BeullensKV19,
+  author    = {Ward Beullens and
+               Thorsten Kleinjung and
+               Frederik Vercauteren},
+  editor    = {Steven D. Galbraith and
+               Shiho Moriai},
+  title     = {{CSI-FiSh:} Efficient Isogeny Based Signatures Through Class Group Computations},
+  booktitle = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
+               on the Theory and Application of Cryptology and Information Security,
+               Kobe, Japan, December 8-12, 2019, Proceedings, Part {I}},
+  series    = {Lecture Notes in Computer Science},
+  volume    = {11921},
+  pages     = {227--247},
+  publisher = {Springer},
+  year      = {2019},
+  url       = {{https://doi.org/10.1007/978-3-030-34578-5\_9}},
+  timestamp = {Tue, 26 Nov 2019 14:13:27 +0100},
+  biburl    = {https://dblp.org/rec/conf/asiacrypt/BeullensKV19.bib},
+  bibsource = {dblp computer science bibliography, https://dblp.org}
+}
+
+
+@inproceedings{DBLP:conf/ima/CozzoS19,
+  author    = {Daniele Cozzo and
+               Nigel P. Smart},
+  editor    = {Martin Albrecht},
+  title     = {Sharing the {LUOV:} Threshold Post-quantum Signatures},
+  booktitle = {Cryptography and Coding - 17th {IMA} International Conference, {IMACC}
+               2019, Oxford, UK, December 16-18, 2019, Proceedings},
+  series    = {Lecture Notes in Computer Science},
+  volume    = {11929},
+  pages     = {128--153},
+  publisher = {Springer},
+  year      = {2019},
+  url       = {https://doi.org/10.1007/978-3-030-35199-1\_7},
+  timestamp = {Thu, 19 Dec 2019 09:27:27 +0100},
+  biburl    = {https://dblp.org/rec/conf/ima/CozzoS19.bib},
+  bibsource = {dblp computer science bibliography, https://dblp.org}
+}
+
+
+@inproceedings{DBLP:conf/africacrypt/TraversoD018,
+  author    = {Giulia Traverso and
+               Denise Demirel and
+               Johannes Buchmann},
+  editor    = {Antoine Joux and
+               Abderrahmane Nitaj and
+               Tajjeeddine Rachidi},
+  title     = {Performing Computations on Hierarchically Shared Secrets},
+  booktitle = {Progress in Cryptology - {AFRICACRYPT} 2018 - 10th International Conference
+               on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings},
+  series    = {Lecture Notes in Computer Science},
+  volume    = {10831},
+  pages     = {141--161},
+  publisher = {Springer},
+  year      = {2018},
+  url       = {{https://doi.org/10.1007/978-3-319-89339-6\_9}},
+  timestamp = {Tue, 14 May 2019 10:00:52 +0200},
+  biburl    = {https://dblp.org/rec/conf/africacrypt/TraversoD018.bib},
+  bibsource = {dblp computer science bibliography, https://dblp.org}
+}
+
+@inproceedings{DBLP:conf/icits/TraversoDB16,
+  author    = {Giulia Traverso and
+               Denise Demirel and
+               Johannes Buchmann},
+  editor    = {Anderson C. A. Nascimento and
+               Paulo S. L. M. Barreto},
+  title     = {Dynamic and Verifiable Hierarchical Secret Sharing},
+  booktitle = {Information Theoretic Security - 9th International Conference, {ICITS}
+               2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers},
+  series    = {Lecture Notes in Computer Science},
+  volume    = {10015},
+  pages     = {24--43},
+  year      = {2016},
+  url       = {https://doi.org/10.1007/978-3-319-49175-2\_2},
+  timestamp = {Mon, 16 Nov 2020 15:55:52 +0100},
+  biburl    = {https://dblp.org/rec/conf/icits/TraversoDB16.bib},
+  bibsource = {dblp computer science bibliography, https://dblp.org}
+}
+
+@inproceedings{DBLP:conf/fc/HerranzS03,
+  author    = {Javier Herranz and
+               Germ{\'{a}}n S{\'{a}}ez},
+  editor    = {Rebecca N. Wright},
+  title     = {Verifiable Secret Sharing for General Access Structures, with Application
+               to Fully Distributed Proxy Signatures},
+  booktitle = {Financial Cryptography, 7th International Conference, {FC} 2003, Guadeloupe,
+               French West Indies, January 27-30, 2003, Revised Papers},
+  series    = {Lecture Notes in Computer Science},
+  volume    = {2742},
+  pages     = {286--302},
+  publisher = {Springer},
+  year      = {2003},
+  url       = {{https://doi.org/10.1007/978-3-540-45126-6\_21}},
+  timestamp = {Tue, 14 May 2019 10:00:38 +0200},
+  biburl    = {https://dblp.org/rec/conf/fc/HerranzS03.bib},
+  bibsource = {dblp computer science bibliography, https://dblp.org}
+}
+
+@inproceedings{DBLP:conf/eurocrypt/Stadler96,
+  author    = {Markus Stadler},
+  editor    = {Ueli M. Maurer},
+  title     = {Publicly Verifiable Secret Sharing},
+  booktitle = {Advances in Cryptology - {EUROCRYPT} '96, International Conference
+               on the Theory and Application of Cryptographic Techniques, Saragossa,
+               Spain, May 12-16, 1996, Proceeding},
+  series    = {Lecture Notes in Computer Science},
+  volume    = {1070},
+  pages     = {190--199},
+  publisher = {Springer},
+  year      = {1996},
+  url       = {https://doi.org/10.1007/3-540-68339-9\_17},
+  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
+  biburl    = {https://dblp.org/rec/conf/eurocrypt/Stadler96.bib},
+  bibsource = {dblp computer science bibliography, https://dblp.org}
+}
+
+@inproceedings{DBLP:conf/crypto/Pedersen91,
+  author    = {Torben P. Pedersen},
+  editor    = {Joan Feigenbaum},
+  title     = {Non-Interactive and Information-Theoretic Secure Verifiable Secret
+               Sharing},
+  booktitle = {Advances in Cryptology - {CRYPTO} '91, 11th Annual International Cryptology
+               Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings},
+  series    = {Lecture Notes in Computer Science},
+  volume    = {576},
+  pages     = {129--140},
+  publisher = {Springer},
+  year      = {1991},
+  url       = {{https://doi.org/10.1007/3-540-46766-1\_9}},
+  timestamp = {Fri, 17 Jul 2020 16:12:45 +0200},
+  biburl    = {https://dblp.org/rec/conf/crypto/Pedersen91.bib},
+  bibsource = {dblp computer science bibliography, https://dblp.org}
+}
+
+@inproceedings{DBLP:conf/asiacrypt/BackesKP11,
+  author    = {Michael Backes and
+               Aniket Kate and
+               Arpita Patra},
+  editor    = {Dong Hoon Lee and
+               Xiaoyun Wang},
+  title     = {Computational Verifiable Secret Sharing Revisited},
+  booktitle = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
+               on the Theory and Application of Cryptology and Information Security,
+               Seoul, South Korea, December 4-8, 2011. Proceedings},
+  series    = {Lecture Notes in Computer Science},
+  volume    = {7073},
+  pages     = {590--609},
+  publisher = {Springer},
+  year      = {2011},
+  url       = {https://doi.org/10.1007/978-3-642-25385-0\_32},
+  timestamp = {Tue, 14 May 2019 10:00:40 +0200},
+  biburl    = {https://dblp.org/rec/conf/asiacrypt/BackesKP11.bib},
+  bibsource = {dblp computer science bibliography, https://dblp.org}
+}
+
+@inproceedings{DBLP:conf/ccs/BethKO93,
+  author    = {Thomas Beth and
+               Hans{-}Joachim Knobloch and
+               Marcus Otten},
+  editor    = {Dorothy E. Denning and
+               Raymond Pyle and
+               Ravi Ganesan and
+               Ravi S. Sandhu and
+               Victoria Ashby},
+  title     = {Verifiable Secret Sharing for Monotone Access Structures},
+  booktitle = {{CCS} '93, Proceedings of the 1st {ACM} Conference on Computer and
+               Communications Security, Fairfax, Virginia, USA, November 3-5, 1993},
+  pages     = {189--194},
+  publisher = {{ACM}},
+  year      = {1993},
+  url       = {https://doi.org/10.1145/168588.168612},
+  timestamp = {Tue, 10 Nov 2020 20:00:40 +0100},
+  biburl    = {https://dblp.org/rec/conf/ccs/BethKO93.bib},
+  bibsource = {dblp computer science bibliography, https://dblp.org}
+}
+
+@inproceedings{DBLP:conf/tcc/Tassa04,
+  author    = {Tamir Tassa},
+  editor    = {Moni Naor},
+  title     = {Hierarchical Threshold Secret Sharing},
+  booktitle = {Theory of Cryptography, First Theory of Cryptography Conference, {TCC}
+               2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings},
+  series    = {Lecture Notes in Computer Science},
+  volume    = {2951},
+  pages     = {473--490},
+  publisher = {Springer},
+  year      = {2004},
+  url       = {{https://doi.org/10.1007/978-3-540-24638-1\_26}},
+  timestamp = {Tue, 14 May 2019 10:00:47 +0200},
+  biburl    = {https://dblp.org/rec/conf/tcc/Tassa04.bib},
+  bibsource = {dblp computer science bibliography, https://dblp.org}
+}
+
+@article{DBLP:journals/iacr/Thorbek09,
+  author    = {Rune Thorbek},
+  title     = {Proactive Linear Integer Secret Sharing},
+  journal   = {{IACR} Cryptol. ePrint Arch.},
+  pages     = {183},
+  year      = {2009},
+  url       = {http://eprint.iacr.org/2009/183},
+  timestamp = {Mon, 11 May 2020 15:58:29 +0200},
+  biburl    = {https://dblp.org/rec/journals/iacr/Thorbek09.bib},
+  bibsource = {dblp computer science bibliography, https://dblp.org}
+}
+
+@inproceedings{DBLP:conf/pkc/DamgardT06,
+  author    = {Ivan Damg{\aa}rd and
+               Rune Thorbek},
+  editor    = {Moti Yung and
+               Yevgeniy Dodis and
+               Aggelos Kiayias and
+               Tal Malkin},
+  title     = {Linear Integer Secret Sharing and Distributed Exponentiation},
+  booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference
+               on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
+               April 24-26, 2006, Proceedings},
+  series    = {Lecture Notes in Computer Science},
+  volume    = {3958},
+  pages     = {75--90},
+  publisher = {Springer},
+  year      = {2006},
+  url       = {{https://doi.org/10.1007/11745853\_6}},
+  timestamp = {Fri, 01 May 2020 18:32:25 +0200},
+  biburl    = {https://dblp.org/rec/conf/pkc/DamgardT06.bib},
+  bibsource = {dblp computer science bibliography, https://dblp.org}
+}
+
+@inproceedings{DBLP:conf/pqcrypto/BeullensDPV21,
+  author    = {Ward Beullens and
+               Lucas Disson and
+               Robi Pedersen and
+               Frederik Vercauteren},
+  editor    = {Jung Hee Cheon and
+               Jean{-}Pierre Tillich},
+  title     = {{CSI-RAShi:} Distributed Key Generation for {CSIDH}},
+  booktitle = {Post-Quantum Cryptography - 12th International Workshop, PQCrypto
+               2021, Daejeon, South Korea, July 20-22, 2021, Proceedings},
+  series    = {Lecture Notes in Computer Science},
+  volume    = {12841},
+  pages     = {257--276},
+  publisher = {Springer},
+  year      = {2021},
+  url       = {{https://doi.org/10.1007/978-3-030-81293-5\_14}},
+  timestamp = {Wed, 21 Jul 2021 15:51:05 +0200},
+  biburl    = {https://dblp.org/rec/conf/pqcrypto/BeullensDPV21.bib},
+  bibsource = {dblp computer science bibliography, https://dblp.org}
+}
+
+
+@Article{Shamir:1979:HSS,
+  author    = {Adi Shamir},
+  title     = {How to Share a Secret},
+  journal   = {Commun. {ACM}},
+  volume    = {22},
+  number    = {11},
+  pages     = {612--613},
+  year      = {1979},
+  url       = {http://doi.acm.org/10.1145/359168.359176},
+  timestamp = {Wed, 14 Nov 2018 10:22:34 +0100},
+  biburl    = {https://dblp.org/rec/journals/cacm/Shamir79.bib},
+  bibsource = {dblp computer science bibliography, https://dblp.org}
+}
+
+@InProceedings{Blakley:1979:SCK,
+  author =	"G. R. Blakley",
+  title =	"Safeguarding cryptographic keys",
+  editor =	"Richard E. Merwin and Jacqueline T. Zanca and Merlin.
+		 Smith",
+  booktitle =	"1979 National Computer Conference: June 4--7, 1979,
+		 New York, New York",
+  volume =	"48",
+  publisher =	"AFIPS Press",
+  address =	"pub-AFIPS:adr",
+  series =	"AFIPS Conference proceedings",
+  pages =	"313--317",
+  year = 	"1979",
+  bibdate =	"Fri Nov 20 15:54:39 MST 1998",
+  bibsource =	"http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
+  acknowledgement = "Nelson H. F. Beebe, University of Utah, Department
+		 of Mathematics, 110 LCB, 155 S 1400 E RM 233, Salt Lake
+		 City, UT 84112-0090, USA, Tel: +1 801 581 5254, FAX: +1
+		 801 581 4148, e-mail: \path|beebe@math.utah.edu|,
+		 \path|beebe@acm.org|, \path|beebe@computer.org|
+		 (Internet), URL:
+		 \path|http://www.math.utah.edu/~beebe/|",
+  referencedin = "Referenced in \cite[Ref. 3]{Canetti:1997:PSL},
+		 \cite[Ref. 2]{Gemmell:1997:ITC}.",
+  xxauthor =	"R. Blakley",
+}
+
+@inproceedings{LindellN18,
+  author    = {Yehuda Lindell and
+               Ariel Nof},
+  editor    = {David Lie and
+               Mohammad Mannan and
+               Michael Backes and
+               XiaoFeng Wang},
+  title     = {Fast Secure Multiparty {ECDSA} with Practical Distributed Key Generation
+               and Applications to Cryptocurrency Custody},
+  booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
+               Communications Security, {CCS} 2018, Toronto, ON, Canada, October
+               15-19, 2018},
+  pages     = {1837--1854},
+  publisher = {{ACM}},
+  year      = {2018},
+  url       = {https://doi.org/10.1145/3243734.3243788},
+  timestamp = {Tue, 10 Nov 2020 20:00:51 +0100},
+  biburl    = {https://dblp.org/rec/conf/ccs/LindellN18.bib},
+  bibsource = {dblp computer science bibliography, https://dblp.org}
+}
+
+@inproceedings{DoernerKLS19,
+  author    = {Jack Doerner and
+               Yashvanth Kondi and
+               Eysa Lee and
+               Abhi Shelat},
+  title     = {Threshold {ECDSA} from {ECDSA} Assumptions: The Multiparty Case},
+  booktitle = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco,
+               CA, USA, May 19-23, 2019},
+  pages     = {1051--1066},
+  publisher = {{IEEE}},
+  year      = {2019},
+  url       = {https://doi.org/10.1109/SP.2019.00024},
+  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
+  biburl    = {https://dblp.org/rec/conf/sp/DoernerKLS19.bib},
+  bibsource = {dblp computer science bibliography, https://dblp.org}
+}
+
+@inproceedings{DoernerKLS18,
+  author    = {Jack Doerner and
+               Yashvanth Kondi and
+               Eysa Lee and
+               Abhi Shelat},
+  title     = {Secure Two-party Threshold {ECDSA} from {ECDSA} Assumptions},
+  booktitle = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings,
+               21-23 May 2018, San Francisco, California, {USA}},
+  pages     = {980--997},
+  publisher = {{IEEE} Computer Society},
+  year      = {2018},
+  url       = {https://doi.org/10.1109/SP.2018.00036},
+  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
+  biburl    = {https://dblp.org/rec/conf/sp/DoernerKLS18.bib},
+  bibsource = {dblp computer science bibliography, https://dblp.org}
+}
+
+@inproceedings{FeoM20,
+  author    = {Luca De Feo and
+               Michael Meyer},
+  editor    = {Aggelos Kiayias and
+               Markulf Kohlweiss and
+               Petros Wallden and
+               Vassilis Zikas},
+  title     = {Threshold Schemes from Isogeny Assumptions},
+  booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
+               on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
+               May 4-7, 2020, Proceedings, Part {II}},
+  series    = {Lecture Notes in Computer Science},
+  volume    = {12111},
+  pages     = {187--212},
+  publisher = {Springer},
+  year      = {2020},
+  url       = {{https://doi.org/10.1007/978-3-030-45388-6\_7}},
+  timestamp = {Fri, 22 May 2020 21:56:39 +0200},
+  biburl    = {https://dblp.org/rec/conf/pkc/FeoM20.bib},
+  bibsource = {dblp computer science bibliography, https://dblp.org}
+}
diff --git a/ACNS/presentation/preamble.tex b/ACNS/presentation/preamble.tex
index bc5a108..d5a23e8 100644
--- a/ACNS/presentation/preamble.tex
+++ b/ACNS/presentation/preamble.tex
@@ -11,7 +11,7 @@
 \newcommand\assignTo[2]{#1 \leftarrow #2}
 %\usepackage{todonotes} %remove for submission
 %\let\labelindent\relax
-\usepackage{enumitem}
+%\usepackage{enumitem}
 \usepackage[english]{babel}
 \usepackage[utf8]{inputenc}
 \usepackage{amsmath}
@@ -43,7 +43,8 @@
 \usepackage{hyphenat}
 
 \usepackage{tikz}
-\usetikzlibrary{calc,arrows,intersections, through,positioning, matrix}
+\usetikzlibrary{arrows,calc,fit, matrix,intersections,positioning, through}
+\usepackage{tikzpeople}
 \usepackage{tcolorbox}
 
 %\usepackage{titlesec}
diff --git a/ACNS/presentation/signatures.tex b/ACNS/presentation/signatures.tex
new file mode 100644
index 0000000..abbe11a
--- /dev/null
+++ b/ACNS/presentation/signatures.tex
@@ -0,0 +1,4 @@
+
+\section{Deriving a Signature Scheme}
+\begin{frame}
+\end{frame}
-- 
GitLab