Secure Two-party Threshold ECDSA from ECDSA Assumptions.
Jack DoernerYashvanth KondiEysa LeeAbhi ShelatPublished in: IEEE Symposium on Security and Privacy (2018)
Keyphrases
- digital signature
- smart card
- elliptic curve
- authentication scheme
- security requirements
- public key
- security mechanisms
- security analysis
- authentication protocol
- secure communication
- security model
- key management
- signcryption scheme
- private key
- sensitive data
- diffie hellman
- standard model
- record linkage
- information security
- security protocols
- data integrity
- key exchange
- underlying assumptions
- data mining