Papers (25)

#Title
Citations
1.Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security Gennaro, Rosario and Goldfeder, Steven and Narayanan, Arvind. 2016
162
2.Simple schnorr multi-signatures with applications to bitcoin Maxwell, Gregory and Poelstra, Andrew and Seurin, Yannick and Wuille, Pieter. 2018
161
3.Fast secure two-party ECDSA signing Lindell, Yehuda. 2017
113
4.Fast multiparty threshold ecdsa with fast trustless setup Gennaro, Rosario and Goldfeder, Steven. 2018
94
5.Fast secure multiparty ecdsa with practical distributed key generation and applications to cryptocurrency custody Lindell, Yehuda and Nof, Ariel. 2018
87
6.Secure two-party threshold ECDSA from ECDSA assumptions Doerner, Jack and Kondi, Yashvanth and Lee, Eysa and Shelat, Abhi. 2018
79
7.Securing Bitcoin wallets via a new DSA/ECDSA threshold signature scheme Goldfeder, Steven and Gennaro, Rosario and Kalodner, Harry and Bonneau, Joseph and Kroll, Joshua A and Felten, Edward W and Narayanan, Arvind. 2015
52
8.Hierarchical deterministic Bitcoin wallets that tolerate key leakage Gutoski, Gus and Stebila, Douglas. 2015
49
9.Threshold ECDSA from ECDSA Assumptions: The Multiparty Case Doerner, Jack and Kondi, Yashvanth and Lee, Eysa and Shelat, Abhi. 2019
44
10.Calypso: Auditable sharing of private data over blockchains Kokoris-Kogias, Eleftherios and Alp, Enis Ceyhun and Siby, Sandra Deepthy and Gailly, Nicolas and Gasser, Linus and Jovanovic, Philipp and Syta, Ewa and Ford, Bryan. 2018
29
11.Using level-1 homomorphic encryption to improve threshold dsa signatures for bitcoin wallet security Boneh, Dan and Gennaro, Rosario and Goldfeder, Steven. 2017
27
12.Two-party ECDSA from hash proof systems and efficient instantiations Castagnos, Guilhem and Catalano, Dario and Laguillaumie, Fabien and Savasta, Federico and Tucker, Ida. 2019
23
13.CHURP: Dynamic-Committee Proactive Secret Sharing. Maram, Sai Krishna Deepak and Zhang, Fan and Wang, Lun and Low, Andrew and Zhang, Yupeng and Juels, Ari and Song, Dawn. 2019
22
14.Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management, Wallet and Cold Storage Solutions in Presence of Poor RNG Events. Courtois, Nicolas T and Valsorda, Filippo and Emirdag, Pinar. 2014
22
15.BeatCoin: Leaking Private Keys from Air-Gapped Cryptocurrency Wallets Guri, Mordechai. 2018
20
16.Can a Blockchain Keep a Secret? Benhamouda, Fabrice and Gentry, Craig and Gorbunov, Sergey and Halevi, Shai and Krawczyk, Hugo and Lin, Chengyu and Rabin, Tal and Reyzin, Leonid. 2020
15
17.Fast Threshold ECDSA with Honest Majority Ivan Damgård and Thomas Pelle Jakobsen and Jesper Buus Nielsen and Jakob Illeborg Pagter and Michael Bæksvang Østergård. 2020
11
18.Paralysis Proofs: Safe Access-Structure Updates for Cryptocurrencies and More Fan Zhang and Philip Daian and Iddo Bentov and Ari Juels. 2018
4
19.Reaching Consensus for Asynchronous Distributed Key Generation Ittai Abraham and Philipp Jovanovic and Mary Maller and Sarah Meiklejohn and Gilad Stern and Alin Tomescu. 2021
3
20.Aggregatable Distributed Key Generation Kobi Gurkan and Philipp Jovanovic and Mary Maller and Sarah Meiklejohn and Gilad Stern and Alin Tomescu. 2021
2
21.Implementing a Smart Contract PKI Patsonakis, Christos and Samari, Katerina and Kiayias, Aggelos and Roussopoulos, Mema. 2020
0
22.Custody Protocols Using Bitcoin Vaults Swambo, Jacob and Hommel, Spencer and McElrath, Bob and Bishop, Bryan. 2020
0
23.Phoenix: A Formally Verified Regenerating Vault Kirstein, Uri and Grossman, Shelly and Mirkin, Michael and Wilcox, James and Eyal, Ittay and Sagiv, Mooly. 2021
0
24.Hours of Horus: Keyless Cryptocurrency Wallets Dionysis Zindros. 2021
0
25.Towards Accountability in CRS Generation Prabhanjan Ananth and Gilad Asharov and Hila Dahari and Vipul Goyal. 2021
0

Videos