Better than Advertised Security for Non-interactive Threshold Signatures

8Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We give a unified syntax, and a hierarchy of definitions of security of increasing strength, for non-interactive threshold signature schemes. These are schemes having a single-round signing protocol, possibly with one prior round of message-independent pre-processing. We fit FROST1 and BLS, which are leading practical schemes, into our hierarchy, in particular showing they meet stronger security definitions than they have been shown to meet so far. We also fit in our hierarchy a more efficient version FROST2 of FROST1 that we give. These definitions and results, for simplicity, all assume trusted key generation. Finally, we prove the security of FROST2 with key generation performed by an efficient distributed key generation protocol.

Cite

CITATION STYLE

APA

Bellare, M., Crites, E., Komlo, C., Maller, M., Tessaro, S., & Zhu, C. (2022). Better than Advertised Security for Non-interactive Threshold Signatures. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 13510 LNCS, pp. 517–550). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-031-15985-5_18

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free