{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T17:02:07Z","timestamp":1767891727638,"version":"3.49.0"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031918254","type":"print"},{"value":"9783031918261","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-91826-1_5","type":"book-chapter","created":{"date-parts":[[2025,5,7]],"date-time":"2025-05-07T04:28:29Z","timestamp":1746592109000},"page":"137-168","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["BUFFing Threshold Signature Schemes"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0597-8297","authenticated-orcid":false,"given":"Marc","family":"Fischlin","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7073-0258","authenticated-orcid":false,"given":"Aikaterini","family":"Mitrokotsa","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-5329-0138","authenticated-orcid":false,"given":"Jenit","family":"Tomy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,5]]},"reference":[{"key":"5_CR1","doi-asserted-by":"publisher","unstructured":"Aulbach, T., D\u00fczl\u00fc, S., Meyer, M., Struck, P., Weish\u00e4upl, M.: Hash your keys before signing. In: Saarinen, M.J., Smith-Tone, D. (eds.) Post-Quantum Cryptography. PQCrypto 2024. LNCS, vol. 14772. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-62746-0_13","DOI":"10.1007\/978-3-031-62746-0_13"},{"key":"5_CR2","doi-asserted-by":"publisher","unstructured":"Bacho, R., Loss, J., Tessaro, S., Wagner, B., Zhu, C.: Twinkle: threshold signatures from DDH with full adaptive security. In: Joye, M., Leander, G. (eds.) Advances in Cryptology \u2013 EUROCRYPT 2024. EUROCRYPT 2024. LNCS, vol. 14651. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-58716-0_15","DOI":"10.1007\/978-3-031-58716-0_15"},{"key":"5_CR3","doi-asserted-by":"publisher","unstructured":"Bellare, M., Crites, E., Komlo, C., Maller, M., Tessaro, S., Zhu, C.: Better than advertised security for non-interactive threshold signatures. In: Dodis, Y., Shrimpton, T. (eds.) Advances in Cryptology \u2013 CRYPTO 2022. CRYPTO 2022. LNCS, vol. 13510. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-15985-5_18","DOI":"10.1007\/978-3-031-15985-5_18"},{"key":"5_CR4","unstructured":"Bernstein, D.J.: Multi-user Schnorr security, revisited. IACR Cryptology ePrint Archive, p. 996 (2015)"},{"key":"5_CR5","doi-asserted-by":"publisher","unstructured":"Blake-Wilson, S., Menezes, A.: Unknown key-share attacks on the station-to-station (STS) protocol. In: Public Key Cryptography. PKC 1999. LNCS, vol. 1560. Springer, Berlin, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-49162-7_12","DOI":"10.1007\/3-540-49162-7_12"},{"key":"5_CR6","doi-asserted-by":"publisher","unstructured":"Boldyreva, A.: Threshold signatures, multisignatures and blind signatures based on the Gap-Diffie-Hellman-Group signature scheme. In: Desmedt, Y.G. (ed.) Public Key Cryptography \u2014 PKC 2003. PKC 2003. LNCS, vol. 2567. Springer, Berlin, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36288-6_3","DOI":"10.1007\/3-540-36288-6_3"},{"key":"5_CR7","doi-asserted-by":"publisher","unstructured":"Boneh, D., et al.: Threshold cryptosystems from threshold fully homomorphic encryption. In: Shacham, H., Boldyreva, A. (eds.) Advances in Cryptology \u2013 CRYPTO 2018. CRYPTO 2018. LNCS, vol. 10991. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-96884-1_19","DOI":"10.1007\/978-3-319-96884-1_19"},{"issue":"4","key":"5_CR8","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/s00145-004-0314-9","volume":"17","author":"D Boneh","year":"2004","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. J. Cryptol. 17(4), 297\u2013319 (2004)","journal-title":"J. Cryptol."},{"key":"5_CR9","unstructured":"Boschini, C., Kaviani, D., Lai, R.W., Malavolta, G., Takahashi, A., Tibouchi, M.: Ringtail: practical two-round threshold signatures from learning with errors. Cryptology ePrint Archive, Paper 2024\/1113 (2024)"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Brendel, J., Cremers, C., Jackson, D., Zhao, M.: The provable security of ed25519: theory and practice. In: 42nd IEEE Symposium on Security and Privacy, SP 2021, San Francisco, CA, USA, 24-27 May 2021, pp. 1659\u20131676. IEEE (2021)","DOI":"10.1109\/SP40001.2021.00042"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Cremers, C., D\u00fczl\u00fc, S., Fiedler, R., Fischlin, M., Janson, C.: BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures. In: 42nd IEEE Symposium on Security and Privacy, SP 2021, San Francisco, CA, USA, 24-27 May 2021, pp. 1696\u20131714. IEEE (2021)","DOI":"10.1109\/SP40001.2021.00093"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Das, S., Camacho, P., Xiang, Z., Nieto, J., B\u00fcnz, B., Ren, L.: Threshold signatures from inner product argument: succinct, weighted, and multi-threshold. In: Meng, W., Damsgaard Jensen, C., Cremers, C., Kirda, E., (eds.) Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, pp. 356\u2013370. ACM (2023)","DOI":"10.1145\/3576915.3623096"},{"key":"5_CR13","doi-asserted-by":"publisher","unstructured":"Das, S., Ren, L.: Adaptively secure BLS threshold signatures from DDH and co-CDH. In: Reyzin, L., Stebila, D. (eds.) Advances in Cryptology \u2013 CRYPTO 2024. CRYPTO 2024. LNCS, vol. 14926. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-68394-7_9","DOI":"10.1007\/978-3-031-68394-7_9"},{"key":"5_CR14","unstructured":"del Pino, R., et al.: Raccoon, Technical report, National Institute of Standards and Technology (2023). https:\/\/csrc.nist.gov\/Projects\/pqc-dig-sig\/round-1-additional-signatures"},{"key":"5_CR15","doi-asserted-by":"publisher","unstructured":"Del Pino, R., Katsumata, S., Maller, M., Mouhartem, F., Prest, T. and Saarinen, M.J.: Threshold raccoon: practical threshold signatures from standard lattice assumptions. In: Joye, M., Leander, G. (eds.) Advances in Cryptology \u2013 EUROCRYPT 2024. EUROCRYPT 2024. LNCS, vol. 14652. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-031-58723-8_8","DOI":"10.1007\/978-3-031-58723-8_8"},{"key":"5_CR16","doi-asserted-by":"publisher","unstructured":"del Pino, R., Katsumata, S., Prest, T., Rossi, M.: Raccoon: a masking-friendly signature proven in the probing model. In: Reyzin, L., Stebila, D. (eds.) Advances in Cryptology \u2013 CRYPTO 2024. CRYPTO 2024. LNCS, vol. 14920. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-68376-3_13","DOI":"10.1007\/978-3-031-68376-3_13"},{"key":"5_CR17","unstructured":"Desmedt, Y.: Society and group oriented cryptography: a new concept. In: Pomerance, C. (ed.) Advances in Cryptology \u2014 CRYPTO \u201987. CRYPTO 1987. LNCS, vol. 293. Springer, Berlin, Heidelberg (1987)"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Desmedt, Y., Frankel, Y.: Threshold cryptosystems. In: Brassard, G. (ed.) Advances in Cryptology \u2014 CRYPTO\u2019 89 Proceedings. CRYPTO 1989. Lecture Notes in Computer Science, vol. 435, pp. 307\u2013315. Springer, New York, NY (1989)","DOI":"10.1007\/0-387-34805-0_28"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Doerner, J., Kondi, Y., Lee, E., Shelat, A.: Threshold ECDSA in three rounds. In: IEEE Symposium on Security and Privacy, SP 2024, San Francisco, CA, USA, May 19-23, 2024, pp. 3053\u20133071. IEEE (2024)","DOI":"10.1109\/SP54263.2024.00178"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Don, J., Fehr, S., Huang, Y.-H., Liao, J.-J., Struck, P.: Hide-and-seek and the non-resignability of the BUFF transform. Cryptology ePrint Archive, Paper 2024\/793 (2024)","DOI":"10.1007\/978-3-031-78020-2_12"},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Don, J., Fehr, S., Huang, YH., Struck, P.: On the (in)security of the BUFF transform. In: Reyzin, L., Stebila, D. (eds.) Advances in Cryptology \u2013 CRYPTO 2024. CRYPTO 2024. LNCS, vol. 14920, pp. 246\u2013275. Springer, Cham (2024)","DOI":"10.1007\/978-3-031-68376-3_8"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"D\u00fczl\u00fc, S., Fiedler, R., Fischlin, M.: Buffing FALCON without increasing the signature size. IACR Cryptology ePrint Archive, p. 710 (2024)","DOI":"10.1007\/978-3-031-82852-2_6"},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"Espitau, T., Niot, G., Prest, T.: Flood and submerse: distributed key generation and robust threshold signature from lattices. In: Reyzin, L., Stebila, D. (eds.) Advances in Cryptology \u2013 CRYPTO 2024. CRYPTO 2024. LNCS, vol. 14926, pp. 425\u2013458. Springer, Cham (2024)","DOI":"10.1007\/978-3-031-68394-7_14"},{"issue":"2","key":"5_CR24","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S Goldwasser","year":"1988","unstructured":"Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17(2), 281\u2013308 (1988)","journal-title":"SIAM J. Comput."},{"key":"5_CR25","doi-asserted-by":"crossref","unstructured":"Jackson, D., Cremers, C., Cohn-Gordon, K., Sasse, R.: Seems legit: automated analysis of subtle attacks on protocols that use signatures. In: Cavallaro, L., Kinder, J., Wang, X.F., Katz, J. (eds.) Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019, London, UK, November 11-15, 2019, pp. 2165\u20132180. ACM (2019)","DOI":"10.1145\/3319535.3339813"},{"key":"5_CR26","doi-asserted-by":"crossref","unstructured":"Katsumata, S., Reichle, M., Takemure, K.: Adaptively secure 5 round threshold signatures from MLWE\/MSIS and DL with rewinding. In: Reyzin, L., Stebila, D. (eds.) Advances in Cryptology \u2013 CRYPTO 2024. CRYPTO 2024. LNCS, vol. 14926, pp. 459\u2013491. Springer, Cham (2024)","DOI":"10.1007\/978-3-031-68394-7_15"},{"key":"5_CR27","doi-asserted-by":"crossref","unstructured":"Komlo, C., Goldberg, I.: FROST: flexible round-optimized Schnorr threshold signatures. In: Selected Areas in Cryptography: 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, pp. 34\u201365. Springer, Berlin, Heidelberg (2020)","DOI":"10.1007\/978-3-030-81652-0_2"},{"issue":"1","key":"5_CR28","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/s12095-017-0253-6","volume":"10","author":"M-S Lacharit\u00e9","year":"2018","unstructured":"Lacharit\u00e9, M.-S.: Security of BLS and BGLS signatures in a multi-user setting. Cryptogr. Commun. 10(1), 41\u201358 (2018)","journal-title":"Cryptogr. Commun."},{"issue":"3","key":"5_CR29","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1023\/B:DESI.0000036250.18062.3f","volume":"33","author":"A Menezes","year":"2004","unstructured":"Menezes, A., Smart, N.P.: Security of signature schemes in a multi-user setting. Des. Codes Cryptogr. 33(3), 261\u2013274 (2004)","journal-title":"Des. Codes Cryptogr."},{"key":"5_CR30","unstructured":"National Institute of Standards and Technology: Call for additional digital signature schemes for the post-quantum cryptography standardization process, Technical report, National Institute of Standards and Technology (2022). https:\/\/csrc.nist.gov\/Projects\/pqc-dig-sig\/standardization\/call-for-proposals"},{"key":"5_CR31","doi-asserted-by":"crossref","unstructured":"Pornin, T., Stern, J.P.: Digital signatures do not guarantee exclusive ownership. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005. LNCS, vol. 3531, pp. 138\u2013150. Springer, New York (2005)","DOI":"10.1007\/11496137_10"},{"key":"5_CR32","doi-asserted-by":"crossref","unstructured":"Rogaway, P.: Formalizing human ignorance. In: Nguyen, P.Q. (ed.) Progress in Cryptology - VIETCRYPT 2006, pp. 211\u2013228. Springer, Berlin, Heidelberg (2006)","DOI":"10.1007\/11958239_14"},{"key":"5_CR33","doi-asserted-by":"crossref","unstructured":"Schnorr, C.-P.: Efficient identification and signatures for smart cards. In: Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO \u201989, pp. 239\u2013252. Springer, Berlin, Heidelberg (1989)","DOI":"10.1007\/0-387-34805-0_22"},{"key":"5_CR34","doi-asserted-by":"crossref","unstructured":"Xue, H., et al.: Efficient multiplicative-to-additive function from Joye-Libert cryptosystem and its application to threshold ECDSA. In: Meng, W., Jensen, C.D., Cremers, C., Kirda, E. (eds.) Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, pp. 2974\u20132988. ACM (2023)","DOI":"10.1145\/3576915.3616595"}],"container-title":["Lecture Notes in Computer Science","Public-Key Cryptography \u2013 PKC 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-91826-1_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,7]],"date-time":"2025-05-07T04:29:11Z","timestamp":1746592151000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-91826-1_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031918254","9783031918261"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-91826-1_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"5 May 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PKC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IACR International Conference on Public-Key Cryptography","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"R\u00f8ros","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Norway","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 May 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 May 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pkc2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/pkc.iacr.org\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}