搜索结果: 1-5 共查到“军事学 Threshold ECDSA”相关记录5条 . 查询时间(0.061 秒)
Securing DNSSEC Keys via Threshold ECDSA From Generic MPC
Multiparty computation Threshold ECDSA Honest majority
2019/8/6
A surge in DNS cache poisoning attacks in the recent years generated an incentive to push the deployment of DNSSEC forward. ICANN accredited registrars are required to support DNSSEC signing for their...
Threshold ECDSA from ECDSA Assumptions: The Multiparty Case
threshold cryptography elliptic curve cryptography multi-party computation
2019/5/21
Cryptocurrency applications have spurred a resurgence of interest in the computation of ECDSA signatures using threshold protocols---that is, protocols in which the signing key is secret-shared among ...
A threshold signature scheme enables distributed signing among nn players such that any subgroup of size t+1t+1 can sign, whereas any group with tt or fewer players cannot. While there exist previous ...
Secure Two-party Threshold ECDSA from ECDSA Assumptions
threshold cryptography elliptic curve cryptography multi-party computation
2018/5/28
The Elliptic Curve Digital Signature Algorithm (ECDSA) is one of the most widely used schemes in deployed cryptography. Through its applications in code and binary authentication, web security, and cr...
Strength in Numbers: Threshold ECDSA to Protect Keys in the Cloud
Threshold Cryptography Elliptic Curve Cryptography ECDSA
2015/12/18
Side-channel attacks utilize information leakage in the implementation
of an otherwise secure cryptographic algorithm to extract secret
information. For example, adversaries can extract the secret k...