Главная
Study mode:
on
1
Introduction
2
Schnur signatures
3
Schnur signature
4
Threshold properties
5
Multisignatures
6
DKGs
7
Frost
8
Frost Standardization
9
nist call
10
implementations
11
Efficient deterministic signatures
12
Important point
13
Multiparty signature
14
What is a DKG
15
Proof of Security
16
Summary
17
Parallel Security
18
Security Model
19
Learnings
20
Performance
21
Straight Line Extractability
22
Concurrent Attacks
23
Proof Types
24
Environment
25
When Parties Arent Local
26
I Lost My Phone
27
Is Threshold Better
28
How a Blockchain Can Keep Many Secrets
Description:
Explore threshold cryptography in this comprehensive lecture covering Schnorr signatures, multisignatures, distributed key generation (DKGs), and FROST standardization. Delve into important concepts such as multiparty signatures, proof of security, and parallel security. Examine the security model, performance considerations, and various proof types. Investigate concurrent attacks, straight-line extractability, and the challenges of non-local parties. Learn about blockchain applications for secret management and discuss the advantages of threshold cryptography. Gain insights into efficient deterministic signatures and understand the implications of losing a device in threshold systems.

Threshold Cryptography: From Schnorr Signatures to FROST - Session Overview

TheIACR
Add to list
0:00 / 0:00