搜索结果: 1-15 共查到“军事学 ECDSA”相关记录27条 . 查询时间(0.171 秒)
Securing DNSSEC Keys via Threshold ECDSA From Generic MPC
Multiparty computation Threshold ECDSA Honest majority
font style='font-size:12px;'>
2019/8/6
A surge in DNS cache poisoning attacks in the recent years generated an incentive to push the deployment of DNSSEC forward. ICANN accredited registrars are required to support DNSSEC signing for their...
A Tale of Three Signatures: practical attack of ECDSA with wNAF
ECDSA lattice techniques cryptanalysis
font style='font-size:12px;'>
2019/7/25
Attacking ECDSA with wNAF implementation for the scalar multiplication first requires some side channel analysis to collect information, then lattice based methods to recover the secret key. In this p...
ShareLock: Mixing for Cryptocurrencies from Multiparty ECDSA
Cryptocurrency Cryptographic protocol Privacy
font style='font-size:12px;'>
2019/5/28
Many cryptocurrencies, such as Bitcoin and Ethereum, do not provide any financial privacy to their users. These systems cannot be used as a medium of exchange as long as they are transparent. Therefor...
Two-Party ECDSA from Hash Proof Systems and Efficient Instantiations
threshold cryptography two-party ECDSA
font style='font-size:12px;'>
2019/5/21
ECDSA is a widely adopted digital signature standard. Unfortunately, efficient distributed variants of this primitive are notoriously hard to achieve and known solutions often require expensive zero k...
Threshold ECDSA from ECDSA Assumptions: The Multiparty Case
threshold cryptography elliptic curve cryptography multi-party computation
font style='font-size:12px;'>
2019/5/21
Cryptocurrency applications have spurred a resurgence of interest in the computation of ECDSA signatures using threshold protocols---that is, protocols in which the signing key is secret-shared among ...
Fast Multiparty Threshold ECDSA with Fast Trustless Setup
ECDSA cryptographic protocols
font style='font-size:12px;'>
2019/2/27
A threshold signature scheme enables distributed signing among nn players such that any subgroup of size t+1t+1 can sign, whereas any group with tt or fewer players cannot. While there exist previous ...
Biased Nonce Sense: Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies
Hidden number problem ECDSA Lattices
font style='font-size:12px;'>
2019/1/10
In this paper, we compute hundreds of Bitcoin private keys and dozens of Ethereum, Ripple, SSH, and HTTPS private keys by carrying out cryptanalytic attacks against digital signatures contained in pub...
Fast Secure Multiparty ECDSA with Practical Distributed Key Generation and Applications to Cryptocurrency Custody
ECDSA threshold cryptography
font style='font-size:12px;'>
2018/11/5
ECDSA is a standardized signing algorithm that is widely used in TLS, code signing, cryptocurrency and more. Due to its importance, the problem of securely computing ECDSA in a distributed manner (kno...
A New Blind ECDSA Scheme for Bitcoin Transaction Anonymity
Blind signature ECDSA Paillier cryptosystem
font style='font-size:12px;'>
2018/7/9
In this paper, we consider a scenario where a bitcoin liquidity provider sells bitcoins to clients. When a client pays for a bitcoin online, the provider is able to link the client's payment informati...
Secure Two-party Threshold ECDSA from ECDSA Assumptions
threshold cryptography elliptic curve cryptography multi-party computation
font style='font-size:12px;'>
2018/5/28
The Elliptic Curve Digital Signature Algorithm (ECDSA) is one of the most widely used schemes in deployed cryptography. Through its applications in code and binary authentication, web security, and cr...
Short Double- and N-Times-Authentication-Preventing Signatures from ECDSA and More
signatures ECDSA Schnorr
font style='font-size:12px;'>
2017/12/19
Double-authentication-preventing signatures (DAPS) are signatures designed with the aim that signing two messages with an identical first part (called address) but different second parts (called paylo...
Fast Secure Two-Party ECDSA Signing
distributed signing ECDSA/DSA secure computation
font style='font-size:12px;'>
2017/6/9
ECDSA is a standard digital signature schemes that is widely used in TLS, Bitcoin and elsewhere. Unlike other schemes like RSA, Schnorr signatures and more, it is particularly hard to construct effici...
ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels
side-channel attack elliptic curve cryptography electromagnetic analysis
font style='font-size:12px;'>
2016/3/3
We show that elliptic-curve cryptography implementations on mobile devices are vulnerable
to electromagnetic and power side-channel attacks. We demonstrate full extraction of ECDSA
secret signing ke...
Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android Smartphones
Side-Channel Analysis Elliptic Curve Cryptography Smartphones
font style='font-size:12px;'>
2016/3/3
In this paper, we study the side-channel resistance of the implementation of the ECDSA
signature scheme in Android’s standard cryptographic library. We show that, for elliptic curves over prime
fiel...
Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security
DSA ECDSA threshold signatures
font style='font-size:12px;'>
2016/1/27
While threshold signature schemes have been presented before,
there has never been an optimal threshold signature algorithm for
DSA. Due to the properties of DSA, it is far more difficult to create ...