Secure Two-party Threshold ECDSA from ECDSA Assumptions.
Jack DoernerYashvanth KondiEysa LeeAbhi ShelatPublished in: IACR Cryptol. ePrint Arch. (2018)
Keyphrases
- digital signature
- smart card
- security requirements
- elliptic curve
- authentication scheme
- security mechanisms
- key management
- authentication protocol
- secure communication
- security analysis
- secret key
- public key
- sensitive data
- security model
- key agreement protocol
- database
- information security
- data integrity
- security issues
- key distribution
- security level
- web services
- diffie hellman
- key exchange
- data sets