Welcome to the resource topic for 2023/765
Title:
Threshold ECDSA in Three Rounds
Authors: Jack Doerner, Yashvanth Kondi, Eysa Lee, abhi shelat
Abstract:We present a three-round protocol for threshold ECDSA signing with malicious security against a dishonest majority, which information-theoretically UC-realizes a standard threshold signing functionality, assuming ideal commitment and two-party multiplication primitives. Our work improves upon and fully subsumes the DKLs t-of-n and 2-of-n protocols. This document focuses on providing a succinct but complete description of the protocol and its security proof, and contains little expository text.
ePrint: https://eprint.iacr.org/2023/765
See all topics related to this paper.
Feel free to post resources that are related to this paper below.
Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.
For more information, see the rules for Resource Topics .