{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,7]],"date-time":"2025-12-07T21:15:43Z","timestamp":1765142143645,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":39,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819608904"},{"type":"electronic","value":"9789819608911"}],"license":[{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0891-1_6","type":"book-chapter","created":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T22:37:08Z","timestamp":1733956628000},"page":"174-206","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Password-Protected Threshold Signatures"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6914-6425","authenticated-orcid":false,"given":"Stefan","family":"Dziembowski","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5055-2407","authenticated-orcid":false,"given":"Stanislaw","family":"Jarecki","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2270-8694","authenticated-orcid":false,"given":"Pawel","family":"Kedzior","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3130-1888","authenticated-orcid":false,"given":"Hugo","family":"Krawczyk","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9783-3911","authenticated-orcid":false,"given":"Chan Nam","family":"Ngo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0881-9980","authenticated-orcid":false,"given":"Jiayu","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,12]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, S., Miao, P., Mohassel, P., Mukherjee, P.: PASTA: PASsword-based threshold authentication. In: Lie, D., Mannan, M., Backes, M., Wang, X. (eds.) ACM CCS 2018. pp. 2042\u20132059. ACM Press (Oct 2018)","DOI":"10.1145\/3243734.3243839"},{"key":"6_CR2","doi-asserted-by":"publisher","unstructured":"Arapinis, M., Gkaniatsou, A., Karakostas, D., Kiayias, A.: A formal treatment of hardware wallets. In: Goldberg, I., Moore, T. (eds.) Financial Cryptography and Data Security - 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers. Lecture Notes in Computer Science, vol. 11598, pp. 426\u2013445. Springer (2019). https:\/\/doi.org\/10.1007\/978-3-030-32101-7_26, https:\/\/doi.org\/10.1007\/978-3-030-32101-7_26","DOI":"10.1007\/978-3-030-32101-7_26"},{"key":"6_CR3","unstructured":"Aumasson, J., Hamelink, A., Shlomovits, O.: A survey of ECDSA threshold signing. IACR Cryptol. ePrint Arch. p.\u00a01390 (2020), https:\/\/eprint.iacr.org\/2020\/1390"},{"key":"6_CR4","doi-asserted-by":"publisher","unstructured":"Bacho, R., Loss, J.: On the adaptive security of the threshold BLS signature scheme. In: Yin, H., Stavrou, A., Cremers, C., Shi, E. (eds.) ACM CCS 2022. pp. 193\u2013207. ACM Press (Nov 2022). https:\/\/doi.org\/10.1145\/3548606.3560656","DOI":"10.1145\/3548606.3560656"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Bagherzandi, A., Jarecki, S., Saxena, N., Lu, Y.: Password-protected secret sharing. In: Chen, Y., Danezis, G., Shmatikov, V. (eds.) ACM CCS 2011. pp. 433\u2013444. ACM Press (Oct 2011)","DOI":"10.1145\/2046707.2046758"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Baum, C., Frederiksen, T., Hesse, J., Lehmann, A., Yanai, A.: Pesto: Proactively secure distributed single sign-on, or how to trust a hacked server. In: 2020 IEEE European Symposium on Security and Privacy (EuroSP). pp. 587\u2013606 (2020)","DOI":"10.1109\/EuroSP48549.2020.00044"},{"key":"6_CR7","doi-asserted-by":"publisher","unstructured":"Boldyreva, A.: Threshold signatures, multisignatures and blind signatures based on the gap-diffie-hellman-group signature scheme. In: Desmedt, Y. (ed.) Public Key Cryptography - PKC 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings. Lecture Notes in Computer Science, vol.\u00a02567, pp. 31\u201346. Springer (2003). https:\/\/doi.org\/10.1007\/3-540-36288-6_3, https:\/\/doi.org\/10.1007\/3-540-36288-6_3","DOI":"10.1007\/3-540-36288-6_3"},{"key":"6_CR8","doi-asserted-by":"publisher","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. J. Cryptol. 17(4), 297\u2013319 (2004). https:\/\/doi.org\/10.1007\/s00145-004-0314-9, https:\/\/doi.org\/10.1007\/s00145-004-0314-9","DOI":"10.1007\/s00145-004-0314-9 10.1007\/s00145-004-0314-9"},{"key":"6_CR9","unstructured":"Boyd, C.: Digital multisignatures. Cryptography and Coding (1986)"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Lehmann, A., Neven, G., Samelin, K.: Virtual smart cards: How to sign with a password and a server. In: Zikas, V., De Prisco, R. (eds.) SCN 16. LNCS, vol.\u00a09841, pp. 353\u2013371 (Aug\u00a0\/\u00a0Sep 2016)","DOI":"10.1007\/978-3-319-44618-9_19"},{"key":"6_CR11","doi-asserted-by":"publisher","unstructured":"Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: 42nd Annual Symposium on Foundations of Computer Science, FOCS 2001, 14-17 October 2001, Las Vegas, Nevada, USA. pp. 136\u2013145. IEEE Computer Society (2001). https:\/\/doi.org\/10.1109\/SFCS.2001.959888, https:\/\/doi.org\/10.1109\/SFCS.2001.959888","DOI":"10.1109\/SFCS.2001.959888 10.1109\/SFCS.2001.959888"},{"key":"6_CR12","unstructured":"Canetti, R.: Universally composable signatures, certification and authentication. Cryptology ePrint Archive, Report 2003\/239 (2003), https:\/\/eprint.iacr.org\/2003\/239"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Canetti, R., Gennaro, R., Goldfeder, S., Makriyannis, N., Peled, U.: UC non-interactive, proactive, threshold ECDSA with identifiable aborts. In: Ligatti, J., Ou, X., Katz, J., Vigna, G. (eds.) ACM CCS 2020. pp. 1769\u20131787. ACM Press (Nov 2020)","DOI":"10.1145\/3372297.3423367"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Castagnos, G., Catalano, D., Laguillaumie, F., Savasta, F., Tucker, I.: Bandwidth-efficient threshold EC-DSA. In: Kiayias, A., Kohlweiss, M., Wallden, P., Zikas, V. (eds.) PKC\u00a02020, Part\u00a0II. LNCS, vol. 12111 (May 2020)","DOI":"10.1007\/978-3-030-45388-6_10"},{"key":"6_CR15","unstructured":"Das, P., Erwig, A., Faust, S., Loss, J., Riahi, S.: Bip32-compatible threshold wallets. IACR Cryptol. ePrint Arch. p.\u00a0312 (2023), https:\/\/eprint.iacr.org\/2023\/312"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Das, S., Ren, L.: Adaptively secure BLS threshold signatures from DDH and co-CDH. In: Reyzin, L., Stebila, D. (eds.) CRYPTO\u00a02024, Part\u00a0VII. LNCS, vol. 14926, pp. 251\u2013284. Springer, Cham (Aug 2024)","DOI":"10.1007\/978-3-031-68394-7_9"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Desmedt, Y.: Society and group oriented cryptography: A new concept. In: Pomerance, C. (ed.) CRYPTO\u201987. LNCS, vol.\u00a0293 (Aug 1988)","DOI":"10.1007\/3-540-48184-2_8"},{"key":"6_CR18","unstructured":"Desmedt, Y., Frankel, Y.: Threshold cryptosystems. In: Brassard, G. (ed.) CRYPTO\u201989. LNCS, vol.\u00a0435 (Aug 1990)"},{"key":"6_CR19","unstructured":"Desmedt, Y., Frankel, Y.: Shared generation of authenticators and signatures (extended abstract). In: Feigenbaum, J. (ed.) CRYPTO\u201991. LNCS, vol.\u00a0576 (Aug 1992)"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Doerner, J., Kondi, Y., Lee, E., shelat, a.: Threshold ECDSA from ECDSA assumptions: The multiparty case. In: 2019 IEEE Symposium on Security and Privacy. IEEE Computer Society Press (May 2019)","DOI":"10.1109\/SP.2019.00024"},{"key":"6_CR21","unstructured":"Dziembowski, S., Jarecki, S., Kedzior, P., Krawczyk, H., Ngo, C.N., Xu, J.: Password-protected threshold signatures. Cryptology ePrint Archive, Paper number TBD (2024), TBD"},{"key":"6_CR22","doi-asserted-by":"publisher","unstructured":"Fuchsbauer, G., Kiltz, E., Loss, J.: The algebraic group model and its applications. In: Shacham, H., Boldyreva, A. (eds.) CRYPTO\u00a02018, Part\u00a0II. LNCS, vol. 10992, pp. 33\u201362 (Aug 2018). https:\/\/doi.org\/10.1007\/978-3-319-96881-0_2","DOI":"10.1007\/978-3-319-96881-0_2"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Ganesan, R.: Yaksha: augmenting kerberos with public key cryptography. In: Proceedings of the Symposium on Network and Distributed System Security. pp. 132\u2013143 (1995)","DOI":"10.1109\/NDSS.1995.390639"},{"key":"6_CR24","doi-asserted-by":"crossref","unstructured":"Gennaro, R., Goldfeder, S.: Fast multiparty threshold ECDSA with fast trustless setup. In: Lie, D., Mannan, M., Backes, M., Wang, X. (eds.) ACM CCS 2018. ACM Press (Oct 2018)","DOI":"10.1145\/3243734.3243859"},{"key":"6_CR25","doi-asserted-by":"publisher","unstructured":"Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Secure distributed key generation for discrete-log based cryptosystems. J. Cryptol. 20(1), 51\u201383 (2007). https:\/\/doi.org\/10.1007\/s00145-006-0347-3, https:\/\/doi.org\/10.1007\/s00145-006-0347-3","DOI":"10.1007\/s00145-006-0347-3 10.1007\/s00145-006-0347-3"},{"key":"6_CR26","doi-asserted-by":"publisher","unstructured":"Gentry, C., MacKenzie, P.D., Ramzan, Z.: A method for making password-based key exchange resilient to server compromise. In: Dwork, C. (ed.) Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings. Lecture Notes in Computer Science, vol.\u00a04117, pp. 142\u2013159. Springer (2006). https:\/\/doi.org\/10.1007\/11818175_9, https:\/\/doi.org\/10.1007\/11818175_9","DOI":"10.1007\/11818175_9 10.1007\/11818175_9"},{"key":"6_CR27","doi-asserted-by":"crossref","unstructured":"Gj\u00f8steen, K., Thuen, \u00d8.: Password-based signatures. In: Petkova-Nikova, S., Pashalidis, A., Pernul, G. (eds.) Public Key Infrastructures, Services and Applications. Springer Berlin Heidelberg, Berlin, Heidelberg (2012)","DOI":"10.1007\/978-3-642-29804-2_2"},{"key":"6_CR28","doi-asserted-by":"crossref","unstructured":"Gu, Y., Jarecki, S., Kedzior, P., Nazarian, P., Xu, J.: Threshold PAKE with security against compromise of all servers. In: Advances in Cryptology \u2013 ASIACRYPT 2024 (2024)","DOI":"10.1007\/978-981-96-0935-2_3"},{"key":"6_CR29","doi-asserted-by":"publisher","unstructured":"Jarecki, S., Kiayias, A., Krawczyk, H.: Round-optimal password-protected secret sharing and T-PAKE in the password-only model. In: Sarkar, P., Iwata, T. (eds.) Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part II. Lecture Notes in Computer Science, vol.\u00a08874, pp. 233\u2013253. Springer (2014). https:\/\/doi.org\/10.1007\/978-3-662-45608-8_13, https:\/\/doi.org\/10.1007\/978-3-662-45608-8_13","DOI":"10.1007\/978-3-662-45608-8_13 10.1007\/978-3-662-45608-8_13"},{"key":"6_CR30","doi-asserted-by":"publisher","unstructured":"Jarecki, S., Kiayias, A., Krawczyk, H., Xu, J.: Highly-efficient and composable password-protected secret sharing (or: How to protect your bitcoin wallet online). In: 2016 IEEE European Symposium on Security and Privacy (EuroSP). pp. 276\u2013291 (2016). https:\/\/doi.org\/10.1109\/EuroSP.2016.30","DOI":"10.1109\/EuroSP.2016.30"},{"key":"6_CR31","doi-asserted-by":"publisher","unstructured":"Jarecki, S., Kiayias, A., Krawczyk, H., Xu, J.: TOPPSS: cost-minimal password-protected secret sharing based on threshold OPRF. In: Gollmann, D., Miyaji, A., Kikuchi, H. (eds.) Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings. Lecture Notes in Computer Science, vol. 10355, pp. 39\u201358. Springer (2017). https:\/\/doi.org\/10.1007\/978-3-319-61204-1_3, https:\/\/doi.org\/10.1007\/978-3-319-61204-1_3","DOI":"10.1007\/978-3-319-61204-1_3 10.1007\/978-3-319-61204-1_3"},{"key":"6_CR32","doi-asserted-by":"publisher","unstructured":"Jarecki, S., Krawczyk, H., Xu, J.: OPAQUE: an asymmetric PAKE protocol secure against pre-computation attacks. In: Nielsen, J.B., Rijmen, V. (eds.) Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III. Lecture Notes in Computer Science, vol. 10822, pp. 456\u2013486. Springer (2018). https:\/\/doi.org\/10.1007\/978-3-319-78372-7_15, https:\/\/doi.org\/10.1007\/978-3-319-78372-7_15","DOI":"10.1007\/978-3-319-78372-7_15 10.1007\/978-3-319-78372-7_15"},{"key":"6_CR33","doi-asserted-by":"crossref","unstructured":"Lindell, Y., Nof, A.: Fast secure multiparty ECDSA with practical distributed key generation and applications to cryptocurrency custody. In: Lie, D., Mannan, M., Backes, M., Wang, X. (eds.) ACM CCS 2018. ACM Press (Oct 2018)","DOI":"10.1145\/3243734.3243788"},{"key":"6_CR34","doi-asserted-by":"crossref","unstructured":"MacKenzie, P.D., Reiter, M.K.: Networked cryptographic devices resilient to capture. In: 2001 IEEE Symposium on Security and Privacy. pp. 12\u201325. IEEE Computer Society Press (May 2001)","DOI":"10.1109\/SECPRI.2001.924284"},{"key":"6_CR35","doi-asserted-by":"publisher","unstructured":"MacKenzie, P.D., Shrimpton, T., Jakobsson, M.: Threshold password-authenticated key exchange. J. Cryptol. 19(1), 27\u201366 (2006). https:\/\/doi.org\/10.1007\/s00145-005-0232-5, https:\/\/doi.org\/10.1007\/s00145-005-0232-5","DOI":"10.1007\/s00145-005-0232-5 10.1007\/s00145-005-0232-5"},{"key":"6_CR36","doi-asserted-by":"crossref","unstructured":"McQuoid, I., Rosulek, M., Xu, J.: How to obfuscate MPC inputs. In: Kiltz, E., Vaikuntanathan, V. (eds.) TCC\u00a02022, Part\u00a0II. LNCS, vol. 13748, pp. 151\u2013180. Springer, Cham (Nov 2022)","DOI":"10.1007\/978-3-031-22365-5_6"},{"key":"6_CR37","doi-asserted-by":"crossref","unstructured":"Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum, J. (ed.) CRYPTO\u201991. LNCS, vol.\u00a0576, pp. 129\u2013140 (Aug 1992)","DOI":"10.1007\/3-540-46766-1_9"},{"key":"6_CR38","doi-asserted-by":"publisher","unstructured":"Wikstr\u00f6m, D.: Universally composable DKG with linear number of exponentiations. In: Blundo, C., Cimato, S. (eds.) Security in Communication Networks, 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers. Lecture Notes in Computer Science, vol.\u00a03352, pp. 263\u2013277. Springer (2004). https:\/\/doi.org\/10.1007\/978-3-540-30598-9_19, https:\/\/doi.org\/10.1007\/978-3-540-30598-9_19","DOI":"10.1007\/978-3-540-30598-9_19 10.1007\/978-3-540-30598-9_19"},{"key":"6_CR39","doi-asserted-by":"crossref","unstructured":"Xu, S., Sandhu, R.S.: Two efficient and provably secure schemes for server-assisted threshold signatures. In: Joye, M. (ed.) CT-RSA\u00a02003. LNCS, vol.\u00a02612, pp. 355\u2013372 (Apr 2003)","DOI":"10.1007\/3-540-36563-X_25"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 ASIACRYPT 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0891-1_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T22:42:00Z","timestamp":1733956920000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0891-1_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,12]]},"ISBN":["9789819608904","9789819608911"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0891-1_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,12,12]]},"assertion":[{"value":"12 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ASIACRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Theory and Application of Cryptology and Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kolkata","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"asiacrypt2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/asiacrypt.iacr.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}