Главная
Study mode:
on
1
Intro
2
Challenges
3
Solution
4
Implementation
5
How it works
6
Final remarks
Description:
Explore the challenges and solutions of securely computing ECDSA in a distributed manner through this 21-minute conference talk presented at the Association for Computing Machinery (ACM). Delve into the importance of threshold signing for the widely used ECDSA algorithm, which is crucial in TLS, code signing, and cryptocurrency. Learn about the implementation details, understand how the proposed solution works, and gain insights from the final remarks on fast secure multiparty ECDSA.

Fast Secure Multiparty ECDSA

Association for Computing Machinery (ACM)
Add to list