Verifiable delay functions, CRYPTO 2018, Part I, vol.10991, pp.757-788, 2018. ,
A survey of two verifiable delay functions. Cryptology ePrint Archive, vol.712, 2018. ,
A signature scheme based on the intractability of computing roots. Designs, Codes and Cryptography, vol.25, pp.223-236, 2002. ,
, On quadratic fields with large 3-rank. Mathematics of Computation, vol.73, pp.2061-2074, 2004.
Using level-1 homomorphic encryption to improve threshold dsa signatures for bitcoin wallet security, LATINCRYPT, 2017. ,
Security estimates for quadratic field based cryptosystems, Public Key Cryptography and Computational Number Theory, vol.6168, pp.233-247, 2001. ,
Cryptography and Coding, Bue76. D. A. Buell. Class groups of quadratic fields. Mathematics of Computation, vol.30, pp.610-623, 1976. ,
Two-party ECDSA from hash proof systems and efficient instantiations, CRYPTO 2019, Part III, vol.11694, pp.191-221, 2019. ,
Public-key cryptography and reusable shared secret. Cryptography and Coding, CRYPTO 2017, Part I, vol.10401, pp.255-287, 1989. ,
On the portability of generalized Schnorr proofs, EUROCRYPT 2009, vol.5479, pp.425-442 ,
, , 2009.
Castagnos and F. Laguillaumie. Linearly homomorphic encryption from DDH, Number Theory, vol.9048, pp.487-505, 1984. ,
Practical fully secure unrestricted inner product functional encryption modulo p, ASI-ACRYPT 2018, Part II, vol.11273, pp.733-764, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01934296
Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption, EURO-CRYPT 2002, vol.1294, pp.45-64, 1997. ,
Practical verifiable encryption and decryption of discrete logarithms, CRYPTO 2003, vol.2729, pp.126-144 ,
DF02. I. Damgård and E. Fujisaki. A statistically-hiding integer commitment scheme based on groups with hidden order, ASIACRYPT 2002, vol.30, pp.125-142, 1988. ,
Secure two-party threshold ECDSA from ECDSA assumptions, 2018 IEEE Symposium on Security and Privacy, pp.980-997, 2018. ,
Threshold ECDSA from ECDSA assumptions: The multiparty case, 2019 IEEE Symposium on Security and Privacy, pp.1051-1066, 2019. ,
Securing dnssec keys via threshold ecdsa from generic mpc, IACR Cryptology ePrint Archive, p.889, 2019. ,
A practical scheme for non-interactive verifiable secret sharing, Proc. of FOCS 87, pp.1179-1194, 1987. ,
, DSA/ECDSA signatures and an application to bitcoin wallet security, CRYPTO'99, vol.9696, pp.116-129, 1999.
Robust and efficient sharing of RSA functions, CRYPTO'96, vol.1109, pp.157-172 ,
, , 1996.
Robust threshold DSS signatures, EUROCRYPT'96, vol.1070, pp.354-371, 1996. ,
A digital signature scheme secure against adaptive chosen-message attacks, SIAM Journal on Computing, vol.17, issue.2, pp.281-308, 1988. ,
Arithmetic properties of class numbers of imaginary quadratic fields, JP Journal of Algebra, Number Theory and Application, vol.6, issue.1, pp.129-148, 2006. ,
Fast secure multiparty ECDSA with practical distributed key generation and applications to cryptocurrency custody, CRYPTO 2017, Part II, vol.1, pp.1837-1854, 1980. ,
Two-party generation of DSA signatures, CRYPTO 2001, vol.2139, pp.137-154, 2001. ,
Two-party generation of DSA signatures, Int. J. Inf. Sec, vol.2, issue.3-4, p.19, 2004. ,
Distributing any elliptic curve based protocol: With an application to mixnets, :15. LIPIcs, vol.60, p.768, 1987. ,
Securing threshold cryptosystems against chosen ciphertext attack, EUROCRYPT'98, vol.4, pp.1-16, 1991. ,
, , 1998.
Sho00. V. Shoup. Practical threshold signatures, EUROCRYPT 2000, vol.22, pp.207-220, 1979. ,
Responses to nist's proposal, Communications of the ACM, vol.35, pp.50-52, 1992. ,
Efficient verifiable delay functions, EUROCRYPT 2019, Part III, vol.11478, pp.379-407, 2019. ,