搜索结果: 1-15 共查到“军事学 ECDSA”相关记录27条 . 查询时间(0.076 秒)
Securing DNSSEC Keys via Threshold ECDSA From Generic MPC
Multiparty computation Threshold ECDSA Honest majority
2019/8/6
A surge in DNS cache poisoning attacks in the recent years generated an incentive to push the deployment of DNSSEC forward. ICANN accredited registrars are required to support DNSSEC signing for their...
A Tale of Three Signatures: practical attack of ECDSA with wNAF
ECDSA lattice techniques cryptanalysis
2019/7/25
Attacking ECDSA with wNAF implementation for the scalar multiplication first requires some side channel analysis to collect information, then lattice based methods to recover the secret key. In this p...
ShareLock: Mixing for Cryptocurrencies from Multiparty ECDSA
Cryptocurrency Cryptographic protocol Privacy
2019/5/28
Many cryptocurrencies, such as Bitcoin and Ethereum, do not provide any financial privacy to their users. These systems cannot be used as a medium of exchange as long as they are transparent. Therefor...
Two-Party ECDSA from Hash Proof Systems and Efficient Instantiations
threshold cryptography two-party ECDSA
2019/5/21
ECDSA is a widely adopted digital signature standard. Unfortunately, efficient distributed variants of this primitive are notoriously hard to achieve and known solutions often require expensive zero k...
Threshold ECDSA from ECDSA Assumptions: The Multiparty Case
threshold cryptography elliptic curve cryptography multi-party computation
2019/5/21
Cryptocurrency applications have spurred a resurgence of interest in the computation of ECDSA signatures using threshold protocols---that is, protocols in which the signing key is secret-shared among ...
A threshold signature scheme enables distributed signing among nn players such that any subgroup of size t+1t+1 can sign, whereas any group with tt or fewer players cannot. While there exist previous ...
Biased Nonce Sense: Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies
Hidden number problem ECDSA Lattices
2019/1/10
In this paper, we compute hundreds of Bitcoin private keys and dozens of Ethereum, Ripple, SSH, and HTTPS private keys by carrying out cryptanalytic attacks against digital signatures contained in pub...
Fast Secure Multiparty ECDSA with Practical Distributed Key Generation and Applications to Cryptocurrency Custody
ECDSA threshold cryptography
2018/11/5
ECDSA is a standardized signing algorithm that is widely used in TLS, code signing, cryptocurrency and more. Due to its importance, the problem of securely computing ECDSA in a distributed manner (kno...
A New Blind ECDSA Scheme for Bitcoin Transaction Anonymity
Blind signature ECDSA Paillier cryptosystem
2018/7/9
In this paper, we consider a scenario where a bitcoin liquidity provider sells bitcoins to clients. When a client pays for a bitcoin online, the provider is able to link the client's payment informati...
Secure Two-party Threshold ECDSA from ECDSA Assumptions
threshold cryptography elliptic curve cryptography multi-party computation
2018/5/28
The Elliptic Curve Digital Signature Algorithm (ECDSA) is one of the most widely used schemes in deployed cryptography. Through its applications in code and binary authentication, web security, and cr...
Short Double- and N-Times-Authentication-Preventing Signatures from ECDSA and More
signatures ECDSA Schnorr
2017/12/19
Double-authentication-preventing signatures (DAPS) are signatures designed with the aim that signing two messages with an identical first part (called address) but different second parts (called paylo...
ECDSA is a standard digital signature schemes that is widely used in TLS, Bitcoin and elsewhere. Unlike other schemes like RSA, Schnorr signatures and more, it is particularly hard to construct effici...
ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels
side-channel attack elliptic curve cryptography electromagnetic analysis
2016/3/3
We show that elliptic-curve cryptography implementations on mobile devices are vulnerable
to electromagnetic and power side-channel attacks. We demonstrate full extraction of ECDSA
secret signing ke...
Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android Smartphones
Side-Channel Analysis Elliptic Curve Cryptography Smartphones
2016/3/3
In this paper, we study the side-channel resistance of the implementation of the ECDSA
signature scheme in Android’s standard cryptographic library. We show that, for elliptic curves over prime
fiel...
Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security
DSA ECDSA threshold signatures
2016/1/27
While threshold signature schemes have been presented before,
there has never been an optimal threshold signature algorithm for
DSA. Due to the properties of DSA, it is far more difficult to create ...