Explore threshold cryptography in this comprehensive lecture covering Schnorr signatures, multisignatures, distributed key generation (DKGs), and FROST standardization. Delve into important concepts such as multiparty signatures, proof of security, and parallel security. Examine the security model, performance considerations, and various proof types. Investigate concurrent attacks, straight-line extractability, and the challenges of non-local parties. Learn about blockchain applications for secret management and discuss the advantages of threshold cryptography. Gain insights into efficient deterministic signatures and understand the implications of losing a device in threshold systems.
Threshold Cryptography: From Schnorr Signatures to FROST - Session Overview