Papers (39)

#Title
Citations
1.Simple schnorr multi-signatures with applications to bitcoin Maxwell, Gregory and Poelstra, Andrew and Seurin, Yannick and Wuille, Pieter. 2018.
404
2.Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security Gennaro, Rosario and Goldfeder, Steven and Narayanan, Arvind. 2016.
325
3.Fast multiparty threshold ecdsa with fast trustless setup Gennaro, Rosario and Goldfeder, Steven. 2018.   
320
4.Fast secure multiparty ecdsa with practical distributed key generation and applications to cryptocurrency custody Lindell, Yehuda and Nof, Ariel. 2018.
245
5.Fast secure two-party ECDSA signing Lindell, Yehuda. 2017.   
241
6.Secure two-party threshold ECDSA from ECDSA assumptions Doerner, Jack and Kondi, Yashvanth and Lee, Eysa and Shelat, Abhi. 2018.
191
7.Threshold ECDSA from ECDSA Assumptions: The Multiparty Case Doerner, Jack and Kondi, Yashvanth and Lee, Eysa and Shelat, Abhi. 2019.
188
8.Asynchronous Distributed Key Generation for Computationally-Secure Randomness, Consensus, and Threshold Signatures. Kokoris Kogias, Eleftherios and Malkhi, Dahlia and Spiegelman, Alexander. 2020.   
142
9.Can a Blockchain Keep a Secret? Benhamouda, Fabrice and Gentry, Craig and Gorbunov, Sergey and Halevi, Shai and Krawczyk, Hugo and Lin, Chengyu and Rabin, Tal and Reyzin, Leonid. 2020.
141
10.CHURP: Dynamic-Committee Proactive Secret Sharing. Maram, Sai Krishna Deepak and Zhang, Fan and Wang, Lun and Low, Andrew and Zhang, Yupeng and Juels, Ari and Song, Dawn. 2019.
122
11.Asynchronous data dissemination and its applications Das, Sourav and Xiang, Zhuolun and Ren, Ling. 2021.   
117
12.Practical asynchronous distributed key generation Das, Sourav and Yurek, Thomas and Xiang, Zhuolun and Miller, Andrew and Kokoris-Kogias, Lefteris and Ren, Ling. 2022.   
116
13.Hierarchical deterministic Bitcoin wallets that tolerate key leakage Gutoski, Gus and Stebila, Douglas. 2015.
114
14.Reaching consensus for asynchronous distributed key generation Abraham, Ittai and Jovanovic, Philipp and Maller, Mary and Meiklejohn, Sarah and Stern, Gilad and Tomescu, Alin. 2021.   
113
15.Towards scalable threshold cryptosystems Tomescu, Alin and Chen, Robert and Zheng, Yiming and Abraham, Ittai and Pinkas, Benny and Gueta, Guy Golan and Devadas, Srinivas. 2020.   
103
16.Two-party ECDSA from hash proof systems and efficient instantiations Castagnos, Guilhem and Catalano, Dario and Laguillaumie, Fabien and Savasta, Federico and Tucker, Ida. 2019.
99
17.Distributed key generation in the wild Kate, Aniket and Huang, Yizhou and Goldberg, Ian. 2012.
89
18.Securing Bitcoin wallets via a new DSA/ECDSA threshold signature scheme Goldfeder, Steven and Gennaro, Rosario and Kalodner, Harry and Bonneau, Joseph and Kroll, Joshua A and Felten, Edward W and Narayanan, Arvind. 2015.
86
19.Albatross: publicly attestable batched randomness based on secret sharing Cascudo, Ignacio and David, Bernardo. 2020.   
79
20.Fast Threshold ECDSA with Honest Majority Ivan Damgård and Thomas Pelle Jakobsen and Jesper Buus Nielsen and Jakob Illeborg Pagter and Michael Bæksvang Østergård. 2020.
77
21.Non-interactive distributed key generation and key resharing Jens Groth. 2021.   
74
22.Using level-1 homomorphic encryption to improve threshold dsa signatures for bitcoin wallet security Boneh, Dan and Gennaro, Rosario and Goldfeder, Steven. 2017.
72
23.Aggregatable Distributed Key Generation Kobi Gurkan and Philipp Jovanovic and Mary Maller and Sarah Meiklejohn and Gilad Stern and Alin Tomescu. 2021.  
69
24.BeatCoin: Leaking Private Keys from Air-Gapped Cryptocurrency Wallets Guri, Mordechai. 2018.
62
25.Powers-of-Tau to the People: Decentralizing Setup Ceremonies Nikolaenko, Valeria and Ragsdale, Sam and Bonneau, Joseph and Boneh, Dan. 2022.
52
26.hbACSS: How to Robustly Share Many Secrets Thomas Yurek and Licheng Luo and Jaiden Fairoze and Aniket Kate and Andrew Miller. 2021.
50
27.Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management, Wallet and Cold Storage Solutions in Presence of Poor RNG Events. Courtois, Nicolas T and Valsorda, Filippo and Emirdag, Pinar. 2014.
49
28.COBRA: Dynamic Proactive Secret Sharing for Confidential BFT Services Vassantlal, Robin and Alchieri, Eduardo and Ferreira, Bernardo and Bessani, Alysson. 2022.
48
29.Practical Asynchronous High-threshold Distributed Key Generation and Distributed Polynomial Sampling Das, Sourav and Xiang, Zhuolun and Kokoris-Kogias, Lefteris and Ren, Ling. 2022.
43
30.Efficient asynchronous byzantine agreement without private setups Gao, Yingzi and Lu, Yuan and Lu, Zhenliang and Tang, Qiang and Xu, Jing and Zhang, Zhenfeng. 2022.
41
31.Large-Scale Non-Interactive Threshold Cryptosystems in the YOSO Model Andreas Erwig and Sebastian Faust and Siavash Riahi. 2021.
16
32.Practical Asynchronous Proactive Secret Sharing and Key Refresh G\"unther, Christoph U. and Das, Sourav and Kokoris-Kogias, Lefteris. 2022.
10
33.Paralysis Proofs: Safe Access-Structure Updates for Cryptocurrencies and More Fan Zhang and Philip Daian and Iddo Bentov and Ari Juels. 2018.
6
34.Towards Accountability in CRS Generation Prabhanjan Ananth and Gilad Asharov and Hila Dahari and Vipul Goyal. 2021.
6
35.Custody Protocols Using Bitcoin Vaults Swambo, Jacob and Hommel, Spencer and McElrath, Bob and Bishop, Bryan. 2020.
4
36.Phoenix: A Formally Verified Regenerating Vault Kirstein, Uri and Grossman, Shelly and Mirkin, Michael and Wilcox, James and Eyal, Ittay and Sagiv, Mooly. 2021.
4
37.Hours of Horus: Keyless Cryptocurrency Wallets Dionysis Zindros. 2021.
4
38.Calypso: Auditable sharing of private data over blockchains Kokoris-Kogias, Eleftherios and Alp, Enis Ceyhun and Siby, Sandra Deepthy and Gailly, Nicolas and Gasser, Linus and Jovanovic, Philipp and Syta, Ewa and Ford, Bryan. 2018.
0
39.Implementing a Smart Contract PKI Patsonakis, Christos and Samari, Katerina and Kiayias, Aggelos and Roussopoulos, Mema. 2020.
0

Videos