{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T19:48:09Z","timestamp":1767988089598,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":84,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819608904","type":"print"},{"value":"9789819608911","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0891-1_4","type":"book-chapter","created":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T22:36:44Z","timestamp":1733956604000},"page":"104-140","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["HARTS: High-Threshold, Adaptively Secure, and\u00a0Robust Threshold Schnorr Signatures"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-7037-2458","authenticated-orcid":false,"given":"Renas","family":"Bacho","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7979-3810","authenticated-orcid":false,"given":"Julian","family":"Loss","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0358-2689","authenticated-orcid":false,"given":"Gilad","family":"Stern","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4620-7264","authenticated-orcid":false,"given":"Benedikt","family":"Wagner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,12]]},"reference":[{"key":"4_CR1","doi-asserted-by":"publisher","unstructured":"Abe, M., Fehr, S.: Adaptively secure feldman VSS and applications to universally-composable threshold cryptography. In: Franklin, M. (ed.) CRYPTO\u00a02004. LNCS, vol.\u00a03152, pp. 317\u2013334. Springer, Heidelberg (Aug 2004). https:\/\/doi.org\/10.1007\/978-3-540-28628-8_20","DOI":"10.1007\/978-3-540-28628-8_20"},{"key":"4_CR2","doi-asserted-by":"publisher","unstructured":"Abraham, I., Jovanovic, P., Maller, M., Meiklejohn, S., Stern, G.: Bingo: Adaptivity and asynchrony in verifiable secret sharing and distributed key generation. In: Advances in Cryptology - CRYPTO 2023: 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part I. p. 39-70. Springer-Verlag, Berlin, Heidelberg (2023). https:\/\/doi.org\/10.1007\/978-3-031-38557-5_2, https:\/\/doi.org\/10.1007\/978-3-031-38557-5_2","DOI":"10.1007\/978-3-031-38557-5_2 10.1007\/978-3-031-38557-5_2"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Abraham, I., Jovanovic, P., Maller, M., Meiklejohn, S., Stern, G., Tomescu, A.: Reaching consensus for asynchronous distributed key generation. In: 40th ACM Symposium Annual on Principles of Distributed Computing. pp. 363\u2013373. Association for Computing Machinery, Portland, OR, USA (2021)","DOI":"10.1145\/3465084.3467914"},{"key":"4_CR4","unstructured":"Alhaddad, N., Varia, M., Yang, Z.: Haven++: Batched and packed dual-threshold asynchronous complete secret sharing with applications. Cryptology ePrint Archive, Paper 2024\/326 (2024), https:\/\/eprint.iacr.org\/2024\/326, https:\/\/eprint.iacr.org\/2024\/326"},{"key":"4_CR5","doi-asserted-by":"publisher","unstructured":"Alhaddad, N., Varia, M., Zhang, H.: High-threshold AVSS with optimal communication complexity. In: Borisov, N., D\u00edaz, C. (eds.) FC 2021, Part\u00a0II. LNCS, vol. 12675, pp. 479\u2013498. Springer, Heidelberg (Mar 2021). https:\/\/doi.org\/10.1007\/978-3-662-64331-0_25","DOI":"10.1007\/978-3-662-64331-0_25"},{"key":"4_CR6","doi-asserted-by":"publisher","unstructured":"Almansa, J.F., Damg\u00e5rd, I., Nielsen, J.B.: Simplified threshold RSA with adaptive and proactive security. In: Vaudenay, S. (ed.) EUROCRYPT\u00a02006. LNCS, vol.\u00a04004, pp. 593\u2013611. Springer, Heidelberg (May\u00a0\/\u00a0Jun 2006). https:\/\/doi.org\/10.1007\/11761679_35","DOI":"10.1007\/11761679_35"},{"key":"4_CR7","unstructured":"Bacho, R., Lenzen, C., Loss, J., Ochsenreither, S., Papachristoudis, D.: Grandline: Adaptively secure dkg and randomness beacon with (almost) quadratic communication complexity. Cryptology ePrint Archive, Paper 2023\/1887 (2023), https:\/\/eprint.iacr.org\/2023\/1887, https:\/\/eprint.iacr.org\/2023\/1887"},{"key":"4_CR8","doi-asserted-by":"publisher","unstructured":"Bacho, R., Loss, J.: On the adaptive security of the threshold BLS signature scheme. In: Yin, H., Stavrou, A., Cremers, C., Shi, E. (eds.) ACM CCS 2022. pp. 193\u2013207. ACM Press (Nov 2022). https:\/\/doi.org\/10.1145\/3548606.3560656","DOI":"10.1145\/3548606.3560656"},{"key":"4_CR9","unstructured":"Bacho, R., Loss, J., Stern, G., Wagner, B.: HARTS: High-threshold, adaptively secure, and robust threshold schnorr signatures. Cryptology ePrint Archive, Paper 2024\/280 (2024), https:\/\/eprint.iacr.org\/2024\/280"},{"key":"4_CR10","unstructured":"Bacho, R., Loss, J., Tessaro, S., Wagner, B., Zhu, C.: Twinkle: Threshold signatures from ddh with full adaptive security. Cryptology ePrint Archive, Paper 2023\/1482 (2023), https:\/\/eprint.iacr.org\/2023\/1482, https:\/\/eprint.iacr.org\/2023\/1482"},{"key":"4_CR11","doi-asserted-by":"publisher","unstructured":"Backes, M., Datta, A., Kate, A.: Asynchronous computational VSS with reduced communication complexity. In: Dawson, E. (ed.) CT-RSA\u00a02013. LNCS, vol.\u00a07779, pp. 259\u2013276. Springer, Heidelberg (Feb\u00a0\/\u00a0Mar 2013). https:\/\/doi.org\/10.1007\/978-3-642-36095-4_17","DOI":"10.1007\/978-3-642-36095-4_17"},{"key":"4_CR12","unstructured":"Baldimtsi, F., Chalkias, K.K., Garillot, F., Lindstrom, J., Riva, B., Roy, A., Sedaghat, M., Sonnino, A., Waiwitlikhit, P., Wang, J.: Subset-optimized bls multi-signature with key aggregation. Cryptology ePrint Archive, Paper 2023\/498 (2023), https:\/\/eprint.iacr.org\/2023\/498, https:\/\/eprint.iacr.org\/2023\/498"},{"key":"4_CR13","doi-asserted-by":"publisher","unstructured":"Beaver, D., Haber, S.: Cryptographic protocols provably secure against dynamic adversaries. In: Rueppel, R.A. (ed.) EUROCRYPT\u201992. LNCS, vol.\u00a0658, pp. 307\u2013323. Springer, Heidelberg (May 1993). https:\/\/doi.org\/10.1007\/3-540-47555-9_26","DOI":"10.1007\/3-540-47555-9_26"},{"key":"4_CR14","doi-asserted-by":"publisher","unstructured":"Bellare, M., Crites, E.C., Komlo, C., Maller, M., Tessaro, S., Zhu, C.: Better than advertised security for non-interactive threshold signatures. In: Dodis, Y., Shrimpton, T. (eds.) CRYPTO\u00a02022, Part\u00a0IV. LNCS, vol. 13510, pp. 517\u2013550. Springer, Heidelberg (Aug 2022). https:\/\/doi.org\/10.1007\/978-3-031-15985-5_18","DOI":"10.1007\/978-3-031-15985-5_18"},{"key":"4_CR15","doi-asserted-by":"publisher","unstructured":"Bellare, M., Namprempre, C., Pointcheval, D., Semanko, M.: The one-more-RSA-inversion problems and the security of Chaum\u2019s blind signature scheme. Journal of Cryptology 16(3), 185\u2013215 (Jun 2003). https:\/\/doi.org\/10.1007\/s00145-002-0120-1","DOI":"10.1007\/s00145-002-0120-1"},{"key":"4_CR16","unstructured":"Bellare, M., Tessaro, S., Zhu, C.: Stronger security for non-interactive threshold signatures: BLS and FROST. Cryptology ePrint Archive, Report 2022\/833 (2022), https:\/\/eprint.iacr.org\/2022\/833"},{"key":"4_CR17","doi-asserted-by":"publisher","unstructured":"Ben-Or, M., Canetti, R., Goldreich, O.: Asynchronous secure computation. In: 25th ACM STOC. pp. 52\u201361. ACM Press (May 1993). https:\/\/doi.org\/10.1145\/167088.167109","DOI":"10.1145\/167088.167109"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Benhamouda, F., Halevi, S., Krawczyk, H., Ma, Y., Rabin, T.: Sprint: High-throughput robust distributed schnorr signatures. In: Joye, M., Leander, G. (eds.) Advances in Cryptology \u2013 EUROCRYPT 2024. pp. 62\u201391. Springer Nature Switzerland, Cham (2024)","DOI":"10.1007\/978-3-031-58740-5_3"},{"key":"4_CR19","doi-asserted-by":"publisher","unstructured":"Benhamouda, F., Lepoint, T., Loss, J., Orr\u00f9, M., Raykova, M.: On the (in)security of ROS. In: Canteaut, A., Standaert, F.X. (eds.) EUROCRYPT\u00a02021, Part\u00a0I. LNCS, vol. 12696, pp. 33\u201353. Springer, Heidelberg (Oct 2021). https:\/\/doi.org\/10.1007\/978-3-030-77870-5_2","DOI":"10.1007\/978-3-030-77870-5_2"},{"key":"4_CR20","doi-asserted-by":"publisher","unstructured":"Blum, M., Feldman, P., Micali, S.: Non-interactive zero-knowledge and its applications (extended abstract). In: 20th ACM STOC. pp. 103\u2013112. ACM Press (May 1988). https:\/\/doi.org\/10.1145\/62212.62222","DOI":"10.1145\/62212.62222"},{"key":"4_CR21","doi-asserted-by":"publisher","unstructured":"Boldyreva, A.: Threshold signatures, multisignatures and blind signatures based on the gap-Diffie-Hellman-group signature scheme. In: Desmedt, Y. (ed.) PKC\u00a02003. LNCS, vol.\u00a02567, pp. 31\u201346. Springer, Heidelberg (Jan 2003). https:\/\/doi.org\/10.1007\/3-540-36288-6_3","DOI":"10.1007\/3-540-36288-6_3"},{"key":"4_CR22","doi-asserted-by":"publisher","unstructured":"Bracha, G.: An asynchronous [(n - 1)\/3]-resilient consensus protocol. In: Proceedings of the Third Annual ACM Symposium on Principles of Distributed Computing. p. 154-162. PODC \u201984, Association for Computing Machinery, New York, NY, USA (1984). https:\/\/doi.org\/10.1145\/800222.806743, https:\/\/doi.org\/10.1145\/800222.806743","DOI":"10.1145\/800222.806743 10.1145\/800222.806743"},{"key":"4_CR23","unstructured":"Brand\u00e3o, L.T.A.N., Peralta, R.: Nist first call for multi-partythreshold schemes (2023), https:\/\/csrc.nist.gov\/pubs\/ir\/8214\/c\/ipd, nIST IR 8214C (Initial Public Draft)"},{"key":"4_CR24","doi-asserted-by":"publisher","unstructured":"B\u00fcnz, B., Bootle, J., Boneh, D., Poelstra, A., Wuille, P., Maxwell, G.: Bulletproofs: Short proofs for confidential transactions and more. In: 2018 IEEE Symposium on Security and Privacy. pp. 315\u2013334. IEEE Computer Society Press (May 2018). https:\/\/doi.org\/10.1109\/SP.2018.00020","DOI":"10.1109\/SP.2018.00020"},{"key":"4_CR25","doi-asserted-by":"publisher","unstructured":"Cachin, C., Kursawe, K., Lysyanskaya, A., Strobl, R.: Asynchronous verifiable secret sharing and proactive cryptosystems. In: Atluri, V. (ed.) ACM CCS 2002. pp. 88\u201397. ACM Press (Nov 2002). https:\/\/doi.org\/10.1145\/586110.586124","DOI":"10.1145\/586110.586124"},{"key":"4_CR26","doi-asserted-by":"publisher","unstructured":"Cachin, C., Kursawe, K., Petzold, F., Shoup, V.: Secure and efficient asynchronous broadcast protocols. In: Kilian, J. (ed.) CRYPTO\u00a02001. LNCS, vol.\u00a02139, pp. 524\u2013541. Springer, Heidelberg (Aug 2001). https:\/\/doi.org\/10.1007\/3-540-44647-8_31","DOI":"10.1007\/3-540-44647-8_31"},{"key":"4_CR27","doi-asserted-by":"publisher","unstructured":"Canetti, R.: Security and composition of multiparty cryptographic protocols. Journal of Cryptology 13(1), 143\u2013202 (Jan 2000). https:\/\/doi.org\/10.1007\/s001459910006","DOI":"10.1007\/s001459910006"},{"key":"4_CR28","doi-asserted-by":"publisher","unstructured":"Canetti, R., Gennaro, R., Goldfeder, S., Makriyannis, N., Peled, U.: UC non-interactive, proactive, threshold ECDSA with identifiable aborts. In: Ligatti, J., Ou, X., Katz, J., Vigna, G. (eds.) ACM CCS 2020. pp. 1769\u20131787. ACM Press (Nov 2020). https:\/\/doi.org\/10.1145\/3372297.3423367","DOI":"10.1145\/3372297.3423367"},{"key":"4_CR29","doi-asserted-by":"publisher","unstructured":"Canetti, R., Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Adaptive security for threshold cryptosystems. In: Wiener, M.J. (ed.) CRYPTO\u201999. LNCS, vol.\u00a01666, pp. 98\u2013115. Springer, Heidelberg (Aug 1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_7","DOI":"10.1007\/3-540-48405-1_7"},{"key":"4_CR30","doi-asserted-by":"publisher","unstructured":"Canetti, R., Rabin, T.: Fast asynchronous byzantine agreement with optimal resilience. In: 25th ACM STOC. pp. 42\u201351. ACM Press (May 1993). https:\/\/doi.org\/10.1145\/167088.167105","DOI":"10.1145\/167088.167105"},{"key":"4_CR31","doi-asserted-by":"publisher","unstructured":"Choudhury, A., Patra, A.: An efficient framework for unconditionally secure multiparty computation. IEEE Trans. Inf. Theor. 63(1), 428-468 (jan 2017). https:\/\/doi.org\/10.1109\/TIT.2016.2614685, https:\/\/doi.org\/10.1109\/TIT.2016.2614685","DOI":"10.1109\/TIT.2016.2614685 10.1109\/TIT.2016.2614685"},{"key":"4_CR32","doi-asserted-by":"publisher","unstructured":"Chu, H., Gerhart, P., Ruffing, T., Schr\u00f6der, D.: Practical schnorr threshold signatures without the algebraic group model. In: Advances in Cryptology - CRYPTO 2023: 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part I. p. 743-773. Springer-Verlag, Berlin, Heidelberg (2023). https:\/\/doi.org\/10.1007\/978-3-031-38557-5_24, https:\/\/doi.org\/10.1007\/978-3-031-38557-5_24","DOI":"10.1007\/978-3-031-38557-5_24 10.1007\/978-3-031-38557-5_24"},{"key":"4_CR33","doi-asserted-by":"crossref","unstructured":"Chung, H., Han, K., Ju, C., Kim, M., Seo, J.H.: Bulletproofs+: Shorter proofs for a privacy-enhanced distributed ledger. IEEE Access 10, 42067\u201342082 (2022), https:\/\/api.semanticscholar.org\/CorpusID:220118175","DOI":"10.1109\/ACCESS.2022.3167806"},{"key":"4_CR34","doi-asserted-by":"publisher","unstructured":"Cohen, R., shelat, a., Wichs, D.: Adaptively secure MPC with sublinear communication complexity. In: Boldyreva, A., Micciancio, D. (eds.) CRYPTO\u00a02019, Part\u00a0II. LNCS, vol. 11693, pp. 30\u201360. Springer, Heidelberg (Aug 2019). https:\/\/doi.org\/10.1007\/978-3-030-26951-7_2","DOI":"10.1007\/978-3-030-26951-7_2"},{"key":"4_CR35","doi-asserted-by":"publisher","unstructured":"Cramer, R., Damg\u00e5rd, I., Dziembowski, S., Hirt, M., Rabin, T.: Efficient multiparty computations secure against an adaptive adversary. In: Stern, J. (ed.) EUROCRYPT\u201999. LNCS, vol.\u00a01592, pp. 311\u2013326. Springer, Heidelberg (May 1999). https:\/\/doi.org\/10.1007\/3-540-48910-X_22","DOI":"10.1007\/3-540-48910-X_22"},{"key":"4_CR36","doi-asserted-by":"publisher","unstructured":"Crites, E., Kohlweiss, M., Preneel, B., Sedaghat, M., Slamanig, D.: Threshold structure-preserving signatures. In: Advances in Cryptology - ASIACRYPT 2023: 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part II. p. 348-382. Springer-Verlag, Berlin, Heidelberg (2023). https:\/\/doi.org\/10.1007\/978-981-99-8724-5_11, https:\/\/doi.org\/10.1007\/978-981-99-8724-5_11","DOI":"10.1007\/978-981-99-8724-5_11"},{"key":"4_CR37","unstructured":"Crites, E., Komlo, C., Maller, M.: How to prove schnorr assuming schnorr: Security of multi- and threshold signatures. Cryptology ePrint Archive, Report 2021\/1375 (2021), https:\/\/eprint.iacr.org\/2021\/1375"},{"key":"4_CR38","doi-asserted-by":"publisher","unstructured":"Crites, E., Komlo, C., Maller, M.: Fully adaptive schnorr threshold signatures. In: Advances in Cryptology - CRYPTO 2023: 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part I. p. 678-709. Springer-Verlag, Berlin, Heidelberg (2023). https:\/\/doi.org\/10.1007\/978-3-031-38557-5_22, https:\/\/doi.org\/10.1007\/978-3-031-38557-5_22","DOI":"10.1007\/978-3-031-38557-5_22 10.1007\/978-3-031-38557-5_22"},{"key":"4_CR39","doi-asserted-by":"publisher","unstructured":"Crites, E., Komlo, C., Maller, M., Tessaro, S., Zhu, C.: Snowblind: A threshold blind signature in pairing-free groups. In: Advances in Cryptology - CRYPTO 2023: 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part I. p. 710-742. Springer-Verlag, Berlin, Heidelberg (2023). https:\/\/doi.org\/10.1007\/978-3-031-38557-5_23, https:\/\/doi.org\/10.1007\/978-3-031-38557-5_23","DOI":"10.1007\/978-3-031-38557-5_23 10.1007\/978-3-031-38557-5_23"},{"key":"4_CR40","doi-asserted-by":"publisher","unstructured":"Dalskov, A.P.K., Orlandi, C., Keller, M., Shrishak, K., Shulman, H.: Securing DNSSEC keys via threshold ECDSA from generic MPC. In: Chen, L., Li, N., Liang, K., Schneider, S.A. (eds.) ESORICS\u00a02020, Part\u00a0II. LNCS, vol. 12309, pp. 654\u2013673. Springer, Heidelberg (Sep 2020). https:\/\/doi.org\/10.1007\/978-3-030-59013-0_32","DOI":"10.1007\/978-3-030-59013-0_32"},{"key":"4_CR41","unstructured":"Das, S., Ren, L.: Adaptively secure bls threshold signatures from ddh and co-cdh. Cryptology ePrint Archive, Paper 2023\/1553 (2023), https:\/\/eprint.iacr.org\/2023\/1553, https:\/\/eprint.iacr.org\/2023\/1553"},{"key":"4_CR42","unstructured":"Das, S., Xiang, Z., Kokoris-Kogias, L., Ren, L.: Practical asynchronous high-threshold distributed key generation and distributed polynomial sampling. In: 32nd USENIX Security Symposium (USENIX Security 23). pp. 5359\u20135376. USENIX Association, Anaheim, CA (Aug 2023), https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/das"},{"key":"4_CR43","unstructured":"Das, S., Xiang, Z., Ren, L.: Balanced quadratic reliable broadcast and improved asynchronous verifiable information dispersal. Cryptology ePrint Archive, Report 2022\/052 (2022), https:\/\/eprint.iacr.org\/2022\/052"},{"key":"4_CR44","doi-asserted-by":"publisher","unstructured":"Das, S., Yurek, T., Xiang, Z., Miller, A.K., Kokoris-Kogias, L., Ren, L.: Practical asynchronous distributed key generation. In: 2022 IEEE Symposium on Security and Privacy. pp. 2518\u20132534. IEEE Computer Society Press (May 2022). https:\/\/doi.org\/10.1109\/SP46214.2022.9833584","DOI":"10.1109\/SP46214.2022.9833584"},{"key":"4_CR45","doi-asserted-by":"publisher","unstructured":"Desmedt, Y.: Society and group oriented cryptography: A new concept. In: Pomerance, C. (ed.) CRYPTO\u201987. LNCS, vol.\u00a0293, pp. 120\u2013127. Springer, Heidelberg (Aug 1988). https:\/\/doi.org\/10.1007\/3-540-48184-2_8","DOI":"10.1007\/3-540-48184-2_8"},{"key":"4_CR46","doi-asserted-by":"publisher","unstructured":"Desmedt, Y., Frankel, Y.: Threshold cryptosystems. In: Brassard, G. (ed.) CRYPTO\u201989. LNCS, vol.\u00a0435, pp. 307\u2013315. Springer, Heidelberg (Aug 1990). https:\/\/doi.org\/10.1007\/0-387-34805-0_28","DOI":"10.1007\/0-387-34805-0_28"},{"key":"4_CR47","doi-asserted-by":"publisher","unstructured":"Drijvers, M., Edalatnejad, K., Ford, B., Kiltz, E., Loss, J., Neven, G., Stepanovs, I.: On the security of two-round multi-signatures. In: 2019 IEEE Symposium on Security and Privacy. pp. 1084\u20131101. IEEE Computer Society Press (May 2019). https:\/\/doi.org\/10.1109\/SP.2019.00050","DOI":"10.1109\/SP.2019.00050"},{"key":"4_CR48","doi-asserted-by":"crossref","unstructured":"Eagen, L., Kanjalkar, S., Ruffing, T., Nick, J.: Bulletproofs++: Next generation confidential transactions via reciprocal set membership arguments. In: Joye, M., Leander, G. (eds.) Advances in Cryptology \u2013 EUROCRYPT 2024. pp. 249\u2013279. Springer Nature Switzerland, Cham (2024)","DOI":"10.1007\/978-3-031-58740-5_9"},{"key":"4_CR49","doi-asserted-by":"publisher","unstructured":"Frankel, Y., MacKenzie, P.D., Yung, M.: Adaptively-secure optimal-resilience proactive RSA. In: Lam, K.Y., Okamoto, E., Xing, C. (eds.) ASIACRYPT\u201999. LNCS, vol.\u00a01716, pp. 180\u2013194. Springer, Heidelberg (Nov 1999). https:\/\/doi.org\/10.1007\/978-3-540-48000-6_15","DOI":"10.1007\/978-3-540-48000-6_15"},{"key":"4_CR50","doi-asserted-by":"publisher","unstructured":"Fuchsbauer, G., Kiltz, E., Loss, J.: The algebraic group model and its applications. In: Shacham, H., Boldyreva, A. (eds.) CRYPTO\u00a02018, Part\u00a0II. LNCS, vol. 10992, pp. 33\u201362. Springer, Heidelberg (Aug 2018). https:\/\/doi.org\/10.1007\/978-3-319-96881-0_2","DOI":"10.1007\/978-3-319-96881-0_2"},{"key":"4_CR51","doi-asserted-by":"publisher","unstructured":"Ganesh, C., Orlandi, C., Pancholi, M., Takahashi, A., Tschudi, D.: Fiat-shamir bulletproofs are non-malleable (in the algebraic group model). In: Dunkelman, O., Dziembowski, S. (eds.) EUROCRYPT\u00a02022, Part\u00a0II. LNCS, vol. 13276, pp. 397\u2013426. Springer, Heidelberg (May\u00a0\/\u00a0Jun 2022). https:\/\/doi.org\/10.1007\/978-3-031-07085-3_14","DOI":"10.1007\/978-3-031-07085-3_14"},{"key":"4_CR52","doi-asserted-by":"publisher","unstructured":"Gelashvili, R., Kokoris-Kogias, L., Sonnino, A., Spiegelman, A., Xiang, Z.: Jolteon and ditto: Network-adaptive efficient consensus with asynchronous fallback. In: Eyal, I., Garay, J.A. (eds.) FC 2022. LNCS, vol. 13411, pp. 296\u2013315. Springer, Heidelberg (May 2022). https:\/\/doi.org\/10.1007\/978-3-031-18283-9_14","DOI":"10.1007\/978-3-031-18283-9_14"},{"key":"4_CR53","doi-asserted-by":"publisher","unstructured":"Gennaro, R., Goldfeder, S.: Fast multiparty threshold ECDSA with fast trustless setup. In: Lie, D., Mannan, M., Backes, M., Wang, X. (eds.) ACM CCS 2018. pp. 1179\u20131194. ACM Press (Oct 2018). https:\/\/doi.org\/10.1145\/3243734.3243859","DOI":"10.1145\/3243734.3243859"},{"key":"4_CR54","doi-asserted-by":"publisher","unstructured":"Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Secure distributed key generation for discrete-log based cryptosystems. In: Stern, J. (ed.) EUROCRYPT\u201999. LNCS, vol.\u00a01592, pp. 295\u2013310. Springer, Heidelberg (May 1999). https:\/\/doi.org\/10.1007\/3-540-48910-X_21","DOI":"10.1007\/3-540-48910-X_21"},{"key":"4_CR55","doi-asserted-by":"publisher","unstructured":"Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Secure distributed key generation for discrete-log based cryptosystems. Journal of Cryptology 20(1), 51\u201383 (Jan 2007). https:\/\/doi.org\/10.1007\/s00145-006-0347-3","DOI":"10.1007\/s00145-006-0347-3"},{"key":"4_CR56","doi-asserted-by":"publisher","unstructured":"Ghoshal, A., Tessaro, S.: Tight state-restoration soundness in the algebraic group model. In: Malkin, T., Peikert, C. (eds.) CRYPTO\u00a02021, Part\u00a0III. LNCS, vol. 12827, pp. 64\u201393. Springer, Heidelberg, Virtual Event (Aug 2021). https:\/\/doi.org\/10.1007\/978-3-030-84252-9_3","DOI":"10.1007\/978-3-030-84252-9_3"},{"key":"4_CR57","doi-asserted-by":"publisher","unstructured":"Groth, J., Shoup, V.: Fast batched asynchronous distributed key generation. In: Advances in Cryptology - EUROCRYPT 2024: 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part V. p. 370-400. Springer-Verlag, Berlin, Heidelberg (2024). https:\/\/doi.org\/10.1007\/978-3-031-58740-5_13, https:\/\/doi.org\/10.1007\/978-3-031-58740-5_13","DOI":"10.1007\/978-3-031-58740-5_13 10.1007\/978-3-031-58740-5_13"},{"key":"4_CR58","doi-asserted-by":"publisher","unstructured":"Gurkan, K., Jovanovic, P., Maller, M., Meiklejohn, S., Stern, G., Tomescu, A.: Aggregatable distributed key generation. In: Canteaut, A., Standaert, F.X. (eds.) EUROCRYPT\u00a02021, Part\u00a0I. LNCS, vol. 12696, pp. 147\u2013176. Springer, Heidelberg (Oct 2021). https:\/\/doi.org\/10.1007\/978-3-030-77870-5_6","DOI":"10.1007\/978-3-030-77870-5_6"},{"key":"4_CR59","doi-asserted-by":"publisher","unstructured":"Hanzlik, L., Kluczniak, K.: Explainable arguments. In: Eyal, I., Garay, J.A. (eds.) FC 2022. LNCS, vol. 13411, pp. 59\u201379. Springer, Heidelberg (May 2022). https:\/\/doi.org\/10.1007\/978-3-031-18283-9_4","DOI":"10.1007\/978-3-031-18283-9_4"},{"key":"4_CR60","doi-asserted-by":"publisher","unstructured":"Hirt, M., Nielsen, J.B.: Robust multiparty computation with linear communication complexity. In: Dwork, C. (ed.) CRYPTO\u00a02006. LNCS, vol.\u00a04117, pp. 463\u2013482. Springer, Heidelberg (Aug 2006). https:\/\/doi.org\/10.1007\/11818175_28","DOI":"10.1007\/11818175_28"},{"key":"4_CR61","doi-asserted-by":"publisher","unstructured":"Jarecki, S., Lysyanskaya, A.: Adaptively secure threshold cryptography: Introducing concurrency, removing erasures. In: Preneel, B. (ed.) EUROCRYPT\u00a02000. LNCS, vol.\u00a01807, pp. 221\u2013242. Springer, Heidelberg (May 2000). https:\/\/doi.org\/10.1007\/3-540-45539-6_16","DOI":"10.1007\/3-540-45539-6_16"},{"key":"4_CR62","doi-asserted-by":"publisher","unstructured":"Kate, A., Zaverucha, G.M., Goldberg, I.: Constant-size commitments to polynomials and their applications. In: Abe, M. (ed.) ASIACRYPT\u00a02010. LNCS, vol.\u00a06477, pp. 177\u2013194. Springer, Heidelberg (Dec 2010). https:\/\/doi.org\/10.1007\/978-3-642-17373-8_11","DOI":"10.1007\/978-3-642-17373-8_11"},{"key":"4_CR63","doi-asserted-by":"publisher","unstructured":"Katz, J., Yung, M.: Threshold cryptosystems based on factoring. In: Zheng, Y. (ed.) ASIACRYPT\u00a02002. LNCS, vol.\u00a02501, pp. 192\u2013205. Springer, Heidelberg (Dec 2002). https:\/\/doi.org\/10.1007\/3-540-36178-2_12","DOI":"10.1007\/3-540-36178-2_12"},{"key":"4_CR64","doi-asserted-by":"publisher","unstructured":"Kokoris-Kogias, E., Malkhi, D., Spiegelman, A.: Asynchronous distributed key generation for computationally-secure randomness, consensus, and threshold signatures. In: Ligatti, J., Ou, X., Katz, J., Vigna, G. (eds.) ACM CCS 2020. pp. 1751\u20131767. ACM Press (Nov 2020). https:\/\/doi.org\/10.1145\/3372297.3423364","DOI":"10.1145\/3372297.3423364"},{"key":"4_CR65","doi-asserted-by":"publisher","unstructured":"Komlo, C., Goldberg, I.: FROST: Flexible round-optimized Schnorr threshold signatures. In: Dunkelman, O., Jr., M.J.J., O\u2019Flynn, C. (eds.) SAC 2020. LNCS, vol. 12804, pp. 34\u201365. Springer, Heidelberg (Oct 2020). https:\/\/doi.org\/10.1007\/978-3-030-81652-0_2","DOI":"10.1007\/978-3-030-81652-0_2"},{"key":"4_CR66","doi-asserted-by":"publisher","unstructured":"Lamport, L., Shostak, R., Pease, M.: The byzantine generals problem. ACM Trans. Program. Lang. Syst. 4(3), 382-401 (jul 1982). https:\/\/doi.org\/10.1145\/357172.357176, https:\/\/doi.org\/10.1145\/357172.357176","DOI":"10.1145\/357172.357176 10.1145\/357172.357176"},{"key":"4_CR67","doi-asserted-by":"publisher","unstructured":"Libert, B., Joye, M., Yung, M.: Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares. In: Halld\u00f3rsson, M.M., Dolev, S. (eds.) 33rd ACM PODC. pp. 303\u2013312. ACM (Jul 2014). https:\/\/doi.org\/10.1145\/2611462.2611498","DOI":"10.1145\/2611462.2611498"},{"key":"4_CR68","unstructured":"Lindell, Y.: Simple three-round multiparty schnorr signing with full simulatability. Cryptology ePrint Archive, Paper 2022\/374 (2022), https:\/\/eprint.iacr.org\/2022\/374, https:\/\/eprint.iacr.org\/2022\/374"},{"key":"4_CR69","doi-asserted-by":"publisher","unstructured":"Lysyanskaya, A., Peikert, C.: Adaptive security in the threshold setting: From cryptosystems to signature schemes. In: Boyd, C. (ed.) ASIACRYPT\u00a02001. LNCS, vol.\u00a02248, pp. 331\u2013350. Springer, Heidelberg (Dec 2001). https:\/\/doi.org\/10.1007\/3-540-45682-1_20","DOI":"10.1007\/3-540-45682-1_20"},{"key":"4_CR70","doi-asserted-by":"publisher","unstructured":"Nick, J., Ruffing, T., Seurin, Y.: MuSig2: Simple two-round Schnorr multi-signatures. In: Malkin, T., Peikert, C. (eds.) CRYPTO\u00a02021, Part\u00a0I. LNCS, vol. 12825, pp. 189\u2013221. Springer, Heidelberg, Virtual Event (Aug 2021). https:\/\/doi.org\/10.1007\/978-3-030-84242-0_8","DOI":"10.1007\/978-3-030-84242-0_8"},{"key":"4_CR71","doi-asserted-by":"crossref","unstructured":"Nielsen, J.B.: Separating random oracle proofs from complexity theoretic proofs: The non-committing encryption case. In: Yung, M. (ed.) Advances in Cryptology \u2014 CRYPTO 2002. pp. 111\u2013126. Springer Berlin Heidelberg, Berlin, Heidelberg (2002)","DOI":"10.1007\/3-540-45708-9_8"},{"key":"4_CR72","doi-asserted-by":"crossref","unstructured":"Nikolaenko, V., Ragsdale, S., Bonneau, J., Boneh, D.: Powers-of-tau to the people: Decentralizing setup ceremonies. In: P\u00f6pper, C., Batina, L. (eds.) Applied Cryptography and Network Security. pp. 105\u2013134. Springer Nature Switzerland, Cham (2024)","DOI":"10.1007\/978-3-031-54776-8_5"},{"key":"4_CR73","doi-asserted-by":"publisher","unstructured":"Ruffing, T., Ronge, V., Jin, E., Schneider-Bensch, J., Schr\u00f6der, D.: ROAST: Robust asynchronous schnorr threshold signatures. In: Yin, H., Stavrou, A., Cremers, C., Shi, E. (eds.) ACM CCS 2022. pp. 2551\u20132564. ACM Press (Nov 2022). https:\/\/doi.org\/10.1145\/3548606.3560583","DOI":"10.1145\/3548606.3560583"},{"key":"4_CR74","doi-asserted-by":"publisher","unstructured":"Schnorr, C.P.: Efficient signature generation by smart cards. Journal of Cryptology 4(3), 161\u2013174 (Jan 1991). https:\/\/doi.org\/10.1007\/BF00196725","DOI":"10.1007\/BF00196725"},{"key":"4_CR75","unstructured":"Sedghighadikolaei, K., Yavuz, A.A.: A comprehensive survey of threshold digital signatures: Nist standards, post-quantum cryptography, exotic techniques, and real-world applications (2023)"},{"key":"4_CR76","doi-asserted-by":"publisher","unstructured":"Shoup, V.: Practical threshold signatures. In: Preneel, B. (ed.) EUROCRYPT\u00a02000. LNCS, vol.\u00a01807, pp. 207\u2013220. Springer, Heidelberg (May 2000). https:\/\/doi.org\/10.1007\/3-540-45539-6_15","DOI":"10.1007\/3-540-45539-6_15"},{"key":"4_CR77","unstructured":"Shoup, V.: The many faces of schnorr. Cryptology ePrint Archive, Paper 2023\/1019 (2023), https:\/\/eprint.iacr.org\/2023\/1019, https:\/\/eprint.iacr.org\/2023\/1019"},{"key":"4_CR78","unstructured":"Shoup, V., Smart, N.P.: Lightweight asynchronous verifiable secret sharing with optimal resilience. Cryptology ePrint Archive, Paper 2023\/536 (2023), https:\/\/eprint.iacr.org\/2023\/536, https:\/\/eprint.iacr.org\/2023\/536"},{"key":"4_CR79","unstructured":"Shrestha, N., Bhat, A., Kate, A., Nayak, K.: Synchronous distributed key generation without broadcasts. Cryptology ePrint Archive, Report 2021\/1635 (2021), https:\/\/eprint.iacr.org\/2021\/1635"},{"key":"4_CR80","doi-asserted-by":"publisher","unstructured":"Stinson, D.R., Strobl, R.: Provably secure distributed Schnorr signatures and a $$(t, n)$$ threshold scheme for implicit certificates. In: Varadharajan, V., Mu, Y. (eds.) ACISP 01. LNCS, vol.\u00a02119, pp. 417\u2013434. Springer, Heidelberg (Jul 2001). https:\/\/doi.org\/10.1007\/3-540-47719-5_33","DOI":"10.1007\/3-540-47719-5_33"},{"key":"4_CR81","doi-asserted-by":"publisher","unstructured":"Tessaro, S., Zhu, C.: Threshold and multi-signature schemes from linear hash functions. In: Advances in Cryptology - EUROCRYPT 2023: 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part V. p. 628-658. Springer-Verlag, Berlin, Heidelberg (2023). https:\/\/doi.org\/10.1007\/978-3-031-30589-4_22, https:\/\/doi.org\/10.1007\/978-3-031-30589-4_22","DOI":"10.1007\/978-3-031-30589-4_22 10.1007\/978-3-031-30589-4_22"},{"key":"4_CR82","unstructured":"Wuille, P., Nick, J., Ruffing, T.: Schnorr signatures for secp256k1. bitcoin improvement proposal 340. Github (Jan 2020), https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0340.mediawiki"},{"key":"4_CR83","doi-asserted-by":"publisher","unstructured":"Yin, M., Malkhi, D., Reiter, M.K., Golan-Gueta, G., Abraham, I.: HotStuff: BFT consensus with linearity and responsiveness. In: Robinson, P., Ellen, F. (eds.) 38th ACM PODC. pp. 347\u2013356. ACM (Jul\u00a0\/\u00a0Aug 2019). https:\/\/doi.org\/10.1145\/3293611.3331591","DOI":"10.1145\/3293611.3331591"},{"key":"4_CR84","doi-asserted-by":"publisher","unstructured":"Yurek, T., Luo, L., Fairoze, J., Kate, A., Miller, A.: hbacss: How to robustly share many secrets. Proceedings of the Network and Distributed System Security Symposium (NDSS) 2022 (01 2022). https:\/\/doi.org\/10.14722\/ndss.2022.23120","DOI":"10.14722\/ndss.2022.23120"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 ASIACRYPT 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0891-1_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T22:41:39Z","timestamp":1733956899000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0891-1_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,12]]},"ISBN":["9789819608904","9789819608911"],"references-count":84,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0891-1_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,12]]},"assertion":[{"value":"12 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ASIACRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Theory and Application of Cryptology and Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kolkata","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"asiacrypt2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/asiacrypt.iacr.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}