{"id":"https://openalex.org/W3091435255","doi":"https://doi.org/10.3233/jcs-200112","title":"Fast threshold ECDSA with honest majority1","display_name":"Fast threshold ECDSA with honest majority1","publication_year":2021,"publication_date":"2021-11-05","ids":{"openalex":"https://openalex.org/W3091435255","doi":"https://doi.org/10.3233/jcs-200112","mag":"3091435255"},"language":"en","primary_location":{"id":"doi:10.3233/jcs-200112","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jcs-200112","pdf_url":null,"source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079826922","display_name":"Ivan Damg\u00e5rd","orcid":"https://orcid.org/0009-0003-6164-0896"},"institutions":[{"id":"https://openalex.org/I204337017","display_name":"Aarhus University","ror":"https://ror.org/01aj84f44","country_code":"DK","type":"education","lineage":["https://openalex.org/I204337017"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Ivan Damg\u00e5rd","raw_affiliation_strings":["Department of Computer Science, Aarhus University, Aarhus, Denmark. E-mails:\u00a0ivan@cs.au.dk,\u00a0jbn@cs.au.dk"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Aarhus University, Aarhus, Denmark. E-mails:\u00a0ivan@cs.au.dk,\u00a0jbn@cs.au.dk","institution_ids":["https://openalex.org/I204337017"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027067538","display_name":"Thomas P. Jakobsen","orcid":"https://orcid.org/0000-0002-1768-2488"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Thomas P. Jakobsen","raw_affiliation_strings":["Sepior, Aarhus, Denmark. E-mails:\u00a0tpj@sepior.com,\u00a0jip@sepior.com,\u00a0mbo@sepior.com"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Sepior, Aarhus, Denmark. E-mails:\u00a0tpj@sepior.com,\u00a0jip@sepior.com,\u00a0mbo@sepior.com","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067885668","display_name":"Jesper Buus Nielsen","orcid":"https://orcid.org/0000-0002-7074-0683"},"institutions":[{"id":"https://openalex.org/I204337017","display_name":"Aarhus University","ror":"https://ror.org/01aj84f44","country_code":"DK","type":"education","lineage":["https://openalex.org/I204337017"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Jesper Buus Nielsen","raw_affiliation_strings":["Department of Computer Science, Aarhus University, Aarhus, Denmark. E-mails:\u00a0ivan@cs.au.dk,\u00a0jbn@cs.au.dk"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Aarhus University, Aarhus, Denmark. E-mails:\u00a0ivan@cs.au.dk,\u00a0jbn@cs.au.dk","institution_ids":["https://openalex.org/I204337017"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004568771","display_name":"Jakob Pagter","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jakob Illeborg Pagter","raw_affiliation_strings":["Sepior, Aarhus, Denmark. E-mails:\u00a0tpj@sepior.com,\u00a0jip@sepior.com,\u00a0mbo@sepior.com"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Sepior, Aarhus, Denmark. E-mails:\u00a0tpj@sepior.com,\u00a0jip@sepior.com,\u00a0mbo@sepior.com","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009966801","display_name":"Michael B\u00e6ksvang \u00d8stergaard","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Michael B\u00e6ksvang \u00d8stergaard","raw_affiliation_strings":["Sepior, Aarhus, Denmark. E-mails:\u00a0tpj@sepior.com,\u00a0jip@sepior.com,\u00a0mbo@sepior.com"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Sepior, Aarhus, Denmark. E-mails:\u00a0tpj@sepior.com,\u00a0jip@sepior.com,\u00a0mbo@sepior.com","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5027067538"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.00535834,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"30","issue":"1","first_page":"167","last_page":"196"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11447","display_name":"Blind Source Separation Techniques","score":0.98580002784729,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11447","display_name":"Blind Source Separation Techniques","score":0.98580002784729,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10901","display_name":"Advanced Data Compression Techniques","score":0.9587000012397766,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11269","display_name":"Algorithms and Data Compression","score":0.9376000165939331,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/elliptic-curve-digital-signature-algorithm","display_name":"Elliptic Curve Digital Signature Algorithm","score":0.6529453992843628},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.56927889585495},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.37950706481933594},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.3312532603740692},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.18824630975723267},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.1038152277469635},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.09981980919837952},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.07176956534385681}],"concepts":[{"id":"https://openalex.org/C197966572","wikidata":"https://www.wikidata.org/wiki/Q915079","display_name":"Elliptic Curve Digital Signature Algorithm","level":5,"score":0.6529453992843628},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.56927889585495},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37950706481933594},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.3312532603740692},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.18824630975723267},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.1038152277469635},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.09981980919837952},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.07176956534385681}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.3233/jcs-200112","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jcs-200112","pdf_url":null,"source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},{"id":"mag:3091435255","is_oa":false,"landing_page_url":"https://eprint.iacr.org/2020/501.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S2764847869","display_name":"IACR Cryptology ePrint Archive","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":["https://openalex.org/P4322614454"],"host_organization_lineage_names":["Cryptology ePrint Archive"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Cryptology ePrint Archive","raw_type":null},{"id":"pmh:oai:pure.atira.dk:publications/494a3496-4583-49db-b3f0-dfd9feaf34f3","is_oa":false,"landing_page_url":"https://pure.au.dk/portal/en/publications/494a3496-4583-49db-b3f0-dfd9feaf34f3","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Damg\u00e5rd, I, Jakobsen, T P, Nielsen, J B, Pagter, J I & \u00d8stergaard, M B 2022, 'Fast threshold ECDSA with honest majority', Journal of Computer Security, vol. 30, no. 1, pp. 167-196. https://doi.org/10.3233/JCS-200112","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W48039395","https://openalex.org/W1498129884","https://openalex.org/W1595522037","https://openalex.org/W1730634423","https://openalex.org/W1867048327","https://openalex.org/W1867273832","https://openalex.org/W1885156594","https://openalex.org/W1888768993","https://openalex.org/W1892798954","https://openalex.org/W2006453614","https://openalex.org/W2013613544","https://openalex.org/W2019616576","https://openalex.org/W2025322090","https://openalex.org/W2027471022","https://openalex.org/W2080911030","https://openalex.org/W2088492763","https://openalex.org/W2112138431","https://openalex.org/W2113929724","https://openalex.org/W2121640981","https://openalex.org/W2132172731","https://openalex.org/W2141420453","https://openalex.org/W2468121714","https://openalex.org/W2539273492","https://openalex.org/W2728543642","https://openalex.org/W2882981146","https://openalex.org/W2884909828","https://openalex.org/W2890219821","https://openalex.org/W2890748062","https://openalex.org/W2912577494","https://openalex.org/W2933493434","https://openalex.org/W2968538997","https://openalex.org/W2986933415","https://openalex.org/W2993523858","https://openalex.org/W3021332472","https://openalex.org/W3108205245"],"related_works":["https://openalex.org/W3032700127","https://openalex.org/W3096664316"],"abstract_inverted_index":{"ECDSA":[0,14,42,77],"is":[1,65,93,177,182],"a":[2,20,75,126],"widely":[3],"adopted":[4],"digital":[5],"signature":[6,131,181],"standard.":[7],"A":[8],"number":[9],"of":[10,22,61,71,97,111,129,158],"threshold":[11,76],"protocols":[12,40],"for":[13,41,53],"have":[15,43],"been":[16],"developed":[17],"that":[18,115,165],"let":[19],"set":[21],"parties":[23,107,190],"jointly":[24],"generate":[25],"the":[26,36,51,62,85,106,112,117,130,152,156,170,180],"secret":[27,127],"signing":[28,37,63],"key":[29,64],"and":[30,100,103],"compute":[31,125],"signatures,":[32],"without":[33],"ever":[34],"revealing":[35],"key.":[38],"Threshold":[39],"seen":[44],"recent":[45],"interest,":[46],"in":[47,56,84,95,151,173],"particular":[48],"due":[49],"to":[50,67,108,119,142,184,187],"need":[52],"additional":[54,160],"security":[55],"cryptocurrency":[57],"wallets":[58],"where":[59],"leakage":[60],"equivalent":[66],"an":[68,81],"immediate":[69],"loss":[70],"money.":[72],"We":[73,138],"propose":[74],"protocol":[78,92],"secure":[79],"against":[80],"active":[82],"adversary":[83],"honest":[86,189],"majority":[87],"model":[88],"with":[89],"abort.":[90],"Our":[91],"efficient":[94],"terms":[96],"both":[98],"computation":[99],"bandwidth":[101],"usage,":[102],"it":[104,166],"allows":[105],"pre-process":[109],"parts":[110],"signature,":[113],"such":[114,164],"once":[116],"message":[118],"sign":[120],"becomes":[121],"known,":[122],"they":[123],"can":[124],"sharing":[128],"very":[132],"efficiently,":[133],"using":[134],"only":[135],"local":[136],"operations.":[137],"also":[139,149],"show":[140],"how":[141],"obtain":[143],"guaranteed":[144,183],"output":[145],"delivery":[146],"(and":[147],"hence":[148],"fairness)":[150],"online":[153],"phase":[154],"at":[155],"cost":[157],"some":[159],"pre-processing":[161,171],"work,":[162],"i.e.,":[163],"either":[167],"aborts":[168],"during":[169],"phase,":[172],"which":[174],"case":[175],"nothing":[176],"revealed,":[178],"or":[179],"be":[185],"delivered":[186],"all":[188],"online.":[191]},"counts_by_year":[],"updated_date":"2026-04-30T09:15:22.047038","created_date":"2025-10-10T00:00:00"}
