Meta tags:
Headings (most frequently used words):
implementations, source, open, dkls, of, party, third, concept, proof, info, our, techniques, and, papers, auxilliary, useful, proprietary,
Text of the page (most frequently used words):
#available (14), the (14), and (9), #threshold (7), #code (7), signing (6), #dkls19 (6), #protocol (6), #this (6), with (6), our (6), #rust (5), #ecdsa (5), license (5), under (5), information (5), refresh (5), 2023 (4), eprint (4), implementations (4), 2019 (4), dkls18 (4), that (3), 1328 (3), which (3), key (3), apache (3), works (3), #paper (3), dkls23 (3), for (3), dkls (3), proactive (3), may (2), #proof (2), have (2), security (2), form (2), parties (2), original (2), many (2), useful (2), protocols (2), talk (2), round (2), coming (2), their (2), shares (2), new (2), other (2), offline (2), against (2), techniques (2), you (2), soon (2), info (2), consider (2), party (2), dklst23 (2), open (2), source (2), resources, collects, website, related, sodot, 523, 499, 2018, copper, revised, schemes, nevertheless, subsumed, otherwise, online, topic, proprietary, deprecated, variation, iacr, real, world, crypto, part, focused, web3auth, things, marked, learned, via, deployments, previous, known, 192, blockdaemon, abhi, along, full, closed, cost, analysis, 765, shelat, complete, eysa, lee, yashvanth, kondi, jack, doerner, description, find, present, five, malicious, visa, dishonest, majority, theoretically, realizes, primitives, standard, functionality, assuming, ideal, commitment, two, multiplication, three, was, superseded, those, third, secret, state, even, some, are, ours, laboratories, silence, time, provides, defense, npm, bsd, including, called, proposes, 546, 2022, see, depricated, concept, work, mechanism, note, allows, extension, kos, uses, library, utila, now, issuance, group, bbs, taurus, distributed, anonymous, credential, lakyah, coinbase, 602, authors, 2015, originally, announced, tyner, joined, mobile, non, proactively, also, when, commercial, wake, wallets, were, devices, custom, auxilliary, papers, network, addition, dock, adversaries,
Text of the page (random words):
dkls info dkls info this website collects information and resources related to the threshold ecdsa signing schemes of jack doerner yashvanth kondi eysa lee and abhi shelat otherwise known as dkls as of may 2023 we have a new paper available we present a three round protocol for threshold ecdsa signing with malicious security against a dishonest majority which information theoretically uc realizes a standard threshold signing functionality assuming ideal commitment and two party multiplication primitives you may find a complete description of the protocol along with a full proof of security and closed form cost analysis in eprint 2023 765 our new protocol was originally announced in a now superseded five round variation at iacr real world crypto 2023 as part of a talk that focused on the things we have learned via deployments and implementations of our previous works on this topic the talk is available online we consider our original t of n and 2 of n threshold ecdsa signing protocols to be subsumed nevertheless the original t of n protocol is available as eprint 2019 523 and the 2 of n protocol is available in revised form as eprint 2018 499 in addition to our works on threshold ecdsa we were joined by lakyah tyner for a paper on threshold bbs signing which is useful for distributed anonymous credential issuance this paper shares many techniques with our other works it is available as eprint 2023 602 useful auxilliary papers and techniques refresh when you wake up proactive threshold wallets with offline devices 2019 1328 this work proposes a mechanism that allows the parties in many 2 of n ecdsa protocols including ours to proactively refresh their shares of the signing key and their other secret state even if some of those parties are offline at the time of refresh this provides a defense against so called mobile adversaries our proof of concept open source implementations dkls23 rust code coming soon dklst23 rust code coming soon dkls19 dkls18 with proactive key refresh 2019 1328 rust code available under the bsd license note that this library uses the kos ot extension protocol 2015 546 which we consider to be depricated see 2022 192 third party open source implementations silence laboratories dkls23 with proactive key refresh 2019 1328 rust code available under a custom non commercial license also available on npm dock network dklst23 rust code available under the apache license taurus group dkls18 go code available under the apache license coinbase dkls18 go code available under the apache license marked as deprecated by authors proprietary implementations copper dkls23 sodot dkls19 information available web3auth dkls19 information available blockdaemon dkls19 dkls18 information available visa dkls19 utila dkls19
|