{"id":"https://openalex.org/W4402265706","doi":"https://doi.org/10.1109/sp54263.2024.00178","title":"Threshold ECDSA in Three Rounds","display_name":"Threshold ECDSA in Three Rounds","publication_year":2024,"publication_date":"2024-05-19","ids":{"openalex":"https://openalex.org/W4402265706","doi":"https://doi.org/10.1109/sp54263.2024.00178"},"language":"en","primary_location":{"id":"doi:10.1109/sp54263.2024.00178","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sp54263.2024.00178","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE Symposium on Security and Privacy (SP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075332247","display_name":"Jack Doerner","orcid":"https://orcid.org/0009-0007-0409-2132"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Jack Doerner","raw_affiliation_strings":["Technion, Reichman U, Brown U"],"affiliations":[{"raw_affiliation_string":"Technion, Reichman U, Brown U","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061724724","display_name":"Yashvanth Kondi","orcid":"https://orcid.org/0009-0008-1848-9234"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yashvanth Kondi","raw_affiliation_strings":["Silence Labs (Deel)"],"affiliations":[{"raw_affiliation_string":"Silence Labs (Deel)","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009945265","display_name":"Eysa Lee","orcid":"https://orcid.org/0009-0003-2860-2417"},"institutions":[{"id":"https://openalex.org/I175594653","display_name":"John Brown University","ror":"https://ror.org/02ct41q97","country_code":"US","type":"education","lineage":["https://openalex.org/I175594653"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Eysa Lee","raw_affiliation_strings":["Brown University"],"affiliations":[{"raw_affiliation_string":"Brown University","institution_ids":["https://openalex.org/I175594653"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001754506","display_name":"Abhi Shelat","orcid":null},"institutions":[{"id":"https://openalex.org/I87182695","display_name":"Universidad del Noreste","ror":"https://ror.org/02ahky613","country_code":"MX","type":"education","lineage":["https://openalex.org/I87182695"]}],"countries":["MX"],"is_corresponding":false,"raw_author_name":"Abhi Shelat","raw_affiliation_strings":["Northeastern University"],"affiliations":[{"raw_affiliation_string":"Northeastern University","institution_ids":["https://openalex.org/I87182695"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5075332247"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":8.0015,"has_fulltext":false,"cited_by_count":23,"citation_normalized_percentile":{"value":0.97872434,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"3053","last_page":"3071"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9865000247955322,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9830999970436096,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5971688628196716},{"id":"https://openalex.org/keywords/elliptic-curve-digital-signature-algorithm","display_name":"Elliptic Curve Digital Signature Algorithm","score":0.5628573298454285},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.18522951006889343},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.12561088800430298},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.11985206604003906},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.055267393589019775}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5971688628196716},{"id":"https://openalex.org/C197966572","wikidata":"https://www.wikidata.org/wiki/Q915079","display_name":"Elliptic Curve Digital Signature Algorithm","level":5,"score":0.5628573298454285},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.18522951006889343},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.12561088800430298},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.11985206604003906},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.055267393589019775}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/sp54263.2024.00178","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sp54263.2024.00178","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE Symposium on Security and Privacy (SP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":49,"referenced_works":["https://openalex.org/W5294680","https://openalex.org/W44936433","https://openalex.org/W173953576","https://openalex.org/W1499934958","https://openalex.org/W1505345253","https://openalex.org/W1534112425","https://openalex.org/W1595522037","https://openalex.org/W1610688607","https://openalex.org/W1764277633","https://openalex.org/W1867048327","https://openalex.org/W1888768993","https://openalex.org/W2077315235","https://openalex.org/W2113085788","https://openalex.org/W2132172731","https://openalex.org/W2275295769","https://openalex.org/W2402235285","https://openalex.org/W2468121714","https://openalex.org/W2728543642","https://openalex.org/W2882981146","https://openalex.org/W2890219821","https://openalex.org/W2890748062","https://openalex.org/W2933493434","https://openalex.org/W2963820254","https://openalex.org/W2970282636","https://openalex.org/W2993523858","https://openalex.org/W3021321836","https://openalex.org/W3021332472","https://openalex.org/W3021703869","https://openalex.org/W3026923845","https://openalex.org/W3032559458","https://openalex.org/W3049486278","https://openalex.org/W3096294846","https://openalex.org/W3108205245","https://openalex.org/W3196416048","https://openalex.org/W3204827650","https://openalex.org/W3206175866","https://openalex.org/W4288057776","https://openalex.org/W4306632346","https://openalex.org/W4312996893","https://openalex.org/W4320155028","https://openalex.org/W4324007517","https://openalex.org/W4385405602","https://openalex.org/W6629035642","https://openalex.org/W6629563985","https://openalex.org/W6636797535","https://openalex.org/W6766534824","https://openalex.org/W6801576547","https://openalex.org/W6864108264","https://openalex.org/W6871517140"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2356622127","https://openalex.org/W107387387","https://openalex.org/W2781707110","https://openalex.org/W3160302493","https://openalex.org/W2620701594","https://openalex.org/W3143639864","https://openalex.org/W2551738595","https://openalex.org/W2047347004"],"abstract_inverted_index":{"We":[0,70,117],"present":[1],"a":[2,13,19,83,103],"three-round":[3],"protocol":[4,33,78,107,122],"for":[5,75],"threshold":[6,21],"ECDSA":[7,39],"signing":[8,22,77],"with":[9,50],"malicious":[10],"security":[11],"against":[12],"dishonest":[14],"majority,":[15],"which":[16],"information-theoretically":[17],"UC-realizes":[18],"standard":[20],"functionality,":[23],"assuming":[24],"only":[25],"ideal":[26],"commitment":[27],"and":[28,92,139],"two-party":[29],"multiplication":[30,106],"primitives.":[31],"Our":[32],"combines":[34],"an":[35,51],"intermediate":[36,96],"representation":[37,97],"of":[38,57,64,90,98,125,131,145],"signatures":[40],"that":[41,72,112,120,140],"was":[42],"recently":[43],"introduced":[44],"by":[45,61,129],"Abram":[46],"et":[47,66,127],"al.":[48,67,128],"[2]":[49],"efficient":[52],"statistical":[53],"consistency":[54],"check":[55],"reminiscent":[56],"the":[58,62,95],"ones":[59],"used":[60],"protocols":[63],"Doerner":[65,126],"[3],":[68],"[4].":[69],"show":[71],"shared":[73],"keys":[74],"our":[76,121],"can":[79],"be":[80],"generated":[81],"using":[82],"simple":[84],"commit-release-and-complain":[85],"procedure,":[86],"without":[87],"any":[88],"proofs":[89],"knowledge,":[91],"to":[93],"compute":[94],"each":[99],"signature,":[100],"we":[101],"propose":[102],"two-round":[104],"vectorized":[105],"based":[108],"on":[109],"oblivious":[110],"transfer":[111],"outperforms":[113,123],"all":[114],"similar":[115],"constructions.":[116],"demonstrate":[118],"empirically":[119],"those":[124],"factors":[130],"as":[132,134],"much":[133],"six":[135],"in":[136],"high-latency":[137],"environments,":[138],"it":[141],"is":[142],"multiple":[143],"orders":[144],"magnitude":[146],"faster":[147],"than":[148],"Paillier-based":[149],"approaches.":[150]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":16},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":1}],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
