{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T15:15:56Z","timestamp":1767971756564,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":63,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T00:00:00Z","timestamp":1604016000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,30]]},"DOI":"10.1145\/3372297.3417236","type":"proceedings-article","created":{"date-parts":[[2021,3,4]],"date-time":"2021-03-04T16:21:21Z","timestamp":1614874881000},"page":"1717-1731","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":69,"title":["MuSig-DN: Schnorr Multi-Signatures with Verifiably Deterministic Nonces"],"prefix":"10.1145","author":[{"given":"Jonas","family":"Nick","sequence":"first","affiliation":[{"name":"Blockstream, Victoria, Canada"}]},{"given":"Tim","family":"Ruffing","sequence":"additional","affiliation":[{"name":"Blockstream, Victoria, Canada"}]},{"given":"Yannick","family":"Seurin","sequence":"additional","affiliation":[{"name":"ANSSI, Paris, France"}]},{"given":"Pieter","family":"Wuille","sequence":"additional","affiliation":[{"name":"Blockstream, Victoria, Canada"}]}],"member":"320","published-online":{"date-parts":[[2020,11,2]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-34618-8_13"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29962-0_8"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53887-6_7"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_17"},{"key":"e_1_3_2_2_6_1","unstructured":"George Barwood. 1997. Digital signatures using elliptic curves. Message posted to the sci.crypt mailing list. http:\/\/groups.google.com\/group\/sci.crypt\/msg\/b28aba37180dd6c6.  George Barwood. 1997. Digital signatures using elliptic curves. Message posted to the sci.crypt mailing list. http:\/\/groups.google.com\/group\/sci.crypt\/msg\/b28aba37180dd6c6."},{"key":"e_1_3_2_2_7_1","volume-title":"Keying Hash Functions for Message Authentication. In CRYPTO'96 (LNCS","volume":"15","author":"Bellare Mihir","year":"1996","unstructured":"Mihir Bellare , Ran Canetti , and Hugo Krawczyk . 1996 . Keying Hash Functions for Message Authentication. In CRYPTO'96 (LNCS , Vol. 1109), Neal Koblitz (Ed.). Springer, Heidelberg, 1-- 15 . https:\/\/doi.org\/10.1007\/3--540--68697--5_1 10.1007\/3--540--68697--5_1 Mihir Bellare, Ran Canetti, and Hugo Krawczyk. 1996. Keying Hash Functions for Message Authentication. In CRYPTO'96 (LNCS, Vol. 1109), Neal Koblitz (Ed.). Springer, Heidelberg, 1--15. https:\/\/doi.org\/10.1007\/3--540--68697--5_1"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180453"},{"key":"e_1_3_2_2_9_1","volume-title":"Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme. In PKC 2003 (LNCS","volume":"46","author":"Boldyreva Alexandra","year":"2003","unstructured":"Alexandra Boldyreva . 2003 . Threshold Signatures , Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme. In PKC 2003 (LNCS , Vol. 2567), Yvo Desmedt (Ed.). Springer, Heidelberg, 31-- 46 . https:\/\/doi.org\/10.1007\/3--540--36288--6_3 10.1007\/3--540--36288--6_3 Alexandra Boldyreva. 2003. Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme. In PKC 2003 (LNCS, Vol. 2567), Yvo Desmedt (Ed.). Springer, Heidelberg, 31--46. https:\/\/doi.org\/10.1007\/3--540--36288--6_3"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03329-3_15"},{"key":"e_1_3_2_2_11_1","volume-title":"Elliptic Curve Cryptography in Practice. In FC 2014 (LNCS","volume":"175","author":"Bos Joppe W.","year":"2014","unstructured":"Joppe W. Bos , J. Alex Halderman , Nadia Heninger , Jonathan Moore , Michael Naehrig , and Eric Wustrow . 2014 . Elliptic Curve Cryptography in Practice. In FC 2014 (LNCS , Vol. 8437), Nicolas Christin and Reihaneh Safavi-Naini (Eds.). Springer, Heidelberg, 157-- 175 . https:\/\/doi.org\/10.1007\/978--3--662--45472--5_11 10.1007\/978--3--662--45472--5_11 Joppe W. Bos, J. Alex Halderman, Nadia Heninger, Jonathan Moore, Michael Naehrig, and Eric Wustrow. 2014. Elliptic Curve Cryptography in Practice. In FC 2014 (LNCS, Vol. 8437), Nicolas Christin and Reihaneh Safavi-Naini (Eds.). Springer, Heidelberg, 157--175. https:\/\/doi.org\/10.1007\/978--3--662--45472--5_11"},{"key":"e_1_3_2_2_12_1","volume-title":"Biased Nonce Sense: Lattice Attacks Against Weak ECDSA Signatures in Cryptocurrencies. In FC 2019 (LNCS","volume":"20","author":"Breitner Joachim","year":"2019","unstructured":"Joachim Breitner and Nadia Heninger . 2019 . Biased Nonce Sense: Lattice Attacks Against Weak ECDSA Signatures in Cryptocurrencies. In FC 2019 (LNCS , Vol. 11598), Ian Goldberg and Tyler Moore (Eds.). Springer, Heidelberg, 3-- 20 . https:\/\/doi.org\/10.1007\/978--3-030--32101--7_1 10.1007\/978--3-030--32101--7_1 Joachim Breitner and Nadia Heninger. 2019. Biased Nonce Sense: Lattice Attacks Against Weak ECDSA Signatures in Cryptocurrencies. In FC 2019 (LNCS, Vol. 11598), Ian Goldberg and Tyler Moore (Eds.). Springer, Heidelberg, 3--20. https:\/\/doi.org\/10.1007\/978--3-030--32101--7_1"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14623-7_13"},{"key":"e_1_3_2_2_14_1","volume-title":"Bulletproofs: Short Proofs for Confidential Transactions and More. In 2018 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, 315--334","author":"B\u00fcnz Benedikt","year":"2018","unstructured":"Benedikt B\u00fcnz , Jonathan Bootle , Dan Boneh , Andrew Poelstra , Pieter Wuille , and Greg Maxwell . 2018 . Bulletproofs: Short Proofs for Confidential Transactions and More. In 2018 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, 315--334 . https:\/\/doi.org\/10.1109\/SP.2018.00020 10.1109\/SP.2018.00020 Benedikt B\u00fcnz, Jonathan Bootle, Dan Boneh, Andrew Poelstra, Pieter Wuille, and Greg Maxwell. 2018. Bulletproofs: Short Proofs for Confidential Transactions and More. In 2018 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, 315--334. https:\/\/doi.org\/10.1109\/SP.2018.00020"},{"key":"e_1_3_2_2_15_1","volume-title":"Practical Verifiable Encryption and Decryption of Discrete Logarithms. In CRYPTO 2003 (LNCS","volume":"144","author":"Camenisch Jan","year":"2003","unstructured":"Jan Camenisch and Victor Shoup . 2003 . Practical Verifiable Encryption and Decryption of Discrete Logarithms. In CRYPTO 2003 (LNCS , Vol. 2729), Dan Boneh (Ed.). Springer, Heidelberg, 126-- 144 . https:\/\/doi.org\/10.1007\/978--3--540--45146--4_8 10.1007\/978--3--540--45146--4_8 Jan Camenisch and Victor Shoup. 2003. Practical Verifiable Encryption and Decryption of Discrete Logarithms. In CRYPTO 2003 (LNCS, Vol. 2729), Dan Boneh (Ed.). Springer, Heidelberg, 126--144. https:\/\/doi.org\/10.1007\/978--3--540--45146--4_8"},{"key":"e_1_3_2_2_17_1","volume-title":"Unclonable Group Identification. In EUROCRYPT 2006 (LNCS","volume":"572","author":"Damg\u00e5rd Ivan","year":"2006","unstructured":"Ivan Damg\u00e5rd , Kasper Dupont , and Michael \u00d8stergaard Pedersen . 2006 . Unclonable Group Identification. In EUROCRYPT 2006 (LNCS , Vol. 4004), Serge Vaudenay (Ed.). Springer, Heidelberg, 555-- 572 . https:\/\/doi.org\/10.1007\/11761679_33 10.1007\/11761679_33 Ivan Damg\u00e5rd, Kasper Dupont, and Michael \u00d8stergaard Pedersen. 2006. Unclonable Group Identification. In EUROCRYPT 2006 (LNCS, Vol. 4004), Serge Vaudenay (Ed.). Springer, Heidelberg, 555--572. https:\/\/doi.org\/10.1007\/11761679_33"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354236"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00027"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30580-4_28"},{"key":"e_1_3_2_2_21_1","volume-title":"On the Security of Two-Round Multi-Signatures. In 2019 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, 1084--1101","author":"Drijvers Manu","year":"2019","unstructured":"Manu Drijvers , Kasra Edalatnejad , Bryan Ford , Eike Kiltz , Julian Loss , Gregory Neven , and Igors Stepanovs . 2019 . On the Security of Two-Round Multi-Signatures. In 2019 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, 1084--1101 . https:\/\/doi.org\/10.1109\/SP.2019.00050 10.1109\/SP.2019.00050 Manu Drijvers, Kasra Edalatnejad, Bryan Ford, Eike Kiltz, Julian Loss, Gregory Neven, and Igors Stepanovs. 2019. On the Security of Two-Round Multi-Signatures. In 2019 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, 1084--1101. https:\/\/doi.org\/10.1109\/SP.2019.00050"},{"key":"e_1_3_2_2_22_1","volume-title":"First International Workshop, WAIFI 2007 (LNCS","volume":"236","author":"Farashahi Reza Rezaeian","year":"2007","unstructured":"Reza Rezaeian Farashahi and Ruud Pellikaan . 2007 . The Quadratic Extension Extractor for (Hyper)Elliptic Curves in Odd Characteristic. In Arithmetic of Finite Fields , First International Workshop, WAIFI 2007 (LNCS , Vol. 4547), Claude Carlet and Berk Sunar (Eds.). Springer, 219-- 236 . Reza Rezaeian Farashahi and Ruud Pellikaan. 2007. The Quadratic Extension Extractor for (Hyper)Elliptic Curves in Odd Characteristic. In Arithmetic of Finite Fields, First International Workshop, WAIFI 2007 (LNCS, Vol. 4547), Claude Carlet and Berk Sunar (Eds.). Springer, 219--236."},{"key":"e_1_3_2_2_23_1","volume-title":"Unique Ring Signatures: A Practical Construction. In FC 2013 (LNCS","volume":"170","author":"Matthew","unstructured":"Matthew K. Franklin and Haibin Zhang. 2013 . Unique Ring Signatures: A Practical Construction. In FC 2013 (LNCS , Vol. 7859), Ahmad-Reza Sadeghi (Ed.). Springer, Heidelberg, 162-- 170 . https:\/\/doi.org\/10.1007\/978--3--642--39884--1_13 10.1007\/978--3--642--39884--1_13 Matthew K. Franklin and Haibin Zhang. 2013. Unique Ring Signatures: A Practical Construction. In FC 2013 (LNCS, Vol. 7859), Ahmad-Reza Sadeghi (Ed.). Springer, Heidelberg, 162--170. https:\/\/doi.org\/10.1007\/978--3--642--39884--1_13"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_22"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1049\/ip-cdt:19941293"},{"key":"e_1_3_2_2_28_1","volume-title":"USENIX Security","author":"Heninger Nadia","year":"2012","unstructured":"Nadia Heninger , Zakir Durumeric , Eric Wustrow , and J. Alex Halderman . 2012. Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices . In USENIX Security 2012 , Tadayoshi Kohno (Ed.). USENIX Association , 205--220. Nadia Heninger, Zakir Durumeric, Eric Wustrow, and J. Alex Halderman. 2012. Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices. In USENIX Security 2012, Tadayoshi Kohno (Ed.). USENIX Association, 205--220."},{"issue":"0","key":"e_1_3_2_2_29_1","first-page":"8","article-title":"Zcash Protocol Specification","volume":"2019","author":"Hopwood Daira","year":"2019","unstructured":"Daira Hopwood , Sean Bowe , Taylor Hornby , and Nathan Wilcox . 2019 . Zcash Protocol Specification , Version 2019 . 0 . 8 . https:\/\/raw.githubusercontent.com\/zcash\/zips\/master\/protocol\/protocol.pdf. Daira Hopwood, Sean Bowe, Taylor Hornby, and Nathan Wilcox. 2019. Zcash Protocol Specification, Version 2019.0.8. https:\/\/raw.githubusercontent.com\/zcash\/zips\/master\/protocol\/protocol.pdf.","journal-title":"Version"},{"key":"e_1_3_2_2_30_1","volume-title":"IFIP\/Sec '95 (IFIP Advances in Information and Communication Technology)","author":"Horster Patrick","unstructured":"Patrick Horster , Markus Michels , and Holger Petersen . 1995. Meta-mul\u00adti\u00adsig\u00adna\u00adtu\u00adre schemes based on the discrete logarithm problem . In IFIP\/Sec '95 (IFIP Advances in Information and Communication Technology) . Springer , 128--142. Patrick Horster, Markus Michels, and Holger Petersen. 1995. Meta-mul\u00adti\u00adsig\u00adna\u00adtu\u00adre schemes based on the discrete logarithm problem. In IFIP\/Sec '95 (IFIP Advances in Information and Communication Technology). Springer, 128--142."},{"key":"e_1_3_2_2_31_1","first-page":"1","article-title":"A public-key cryptosystem suitable for digital multisignatures","volume":"71","author":"Itakura K.","year":"1983","unstructured":"K. Itakura and K. Nakamura . 1983 . A public-key cryptosystem suitable for digital multisignatures . NEC Research and Development , Vol. 71 (1983), 1 -- 8 . K. Itakura and K. Nakamura. 1983. A public-key cryptosystem suitable for digital multisignatures. NEC Research and Development, Vol. 71 (1983), 1--8.","journal-title":"NEC Research and Development"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47721-7_7"},{"key":"e_1_3_2_2_33_1","unstructured":"Ahmed Kosba. 2015. jsnark: A Java library for writing circuits\/constraint systems for zk-SNARKs. https:\/\/github.com\/akosba\/jsnark.  Ahmed Kosba. 2015. jsnark: A Java library for writing circuits\/constraint systems for zk-SNARKs. https:\/\/github.com\/akosba\/jsnark."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354262"},{"key":"e_1_3_2_2_35_1","volume-title":"Weakness in Some Threshold Cryptosystems. In CRYPTO'96 (LNCS","volume":"82","author":"Langford Susan K.","year":"1996","unstructured":"Susan K. Langford . 1996 . Weakness in Some Threshold Cryptosystems. In CRYPTO'96 (LNCS , Vol. 1109), Neal Koblitz (Ed.). Springer, Heidelberg, 74-- 82 . https:\/\/doi.org\/10.1007\/3--540--68697--5_6 10.1007\/3--540--68697--5_6 Susan K. Langford. 1996. Weakness in Some Threshold Cryptosystems. In CRYPTO'96 (LNCS, Vol. 1109), Neal Koblitz (Ed.). Springer, Heidelberg, 74--82. https:\/\/doi.org\/10.1007\/3--540--68697--5_6"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0053435"},{"key":"e_1_3_2_2_37_1","volume-title":"Sequential Aggregate Signatures and Multisignatures Without Random Oracles. In EUROCRYPT 2006 (LNCS","volume":"485","author":"Lu Steve","year":"2006","unstructured":"Steve Lu , Rafail Ostrovsky , Amit Sahai , Hovav Shacham , and Brent Waters . 2006 . Sequential Aggregate Signatures and Multisignatures Without Random Oracles. In EUROCRYPT 2006 (LNCS , Vol. 4004), Serge Vaudenay (Ed.). Springer, Heidelberg, 465-- 485 . https:\/\/doi.org\/10.1007\/11761679_28 10.1007\/11761679_28 Steve Lu, Rafail Ostrovsky, Amit Sahai, Hovav Shacham, and Brent Waters. 2006. Sequential Aggregate Signatures and Multisignatures Without Random Oracles. In EUROCRYPT 2006 (LNCS, Vol. 4004), Serge Vaudenay (Ed.). Springer, Heidelberg, 465--485. https:\/\/doi.org\/10.1007\/11761679_28"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24638-1_2"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-019-00608-x"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/501983.502017"},{"key":"e_1_3_2_2_41_1","volume-title":"Vadhan","author":"Micali Silvio","year":"1999","unstructured":"Silvio Micali , Michael O. Rabin , and Salil P . Vadhan . 1999 . Verifiable Random Functions. In 40th FOCS. IEEE Computer Society Press , 120--130. https:\/\/doi.org\/10.1109\/SFFCS.1999.814584 10.1109\/SFFCS.1999.814584 Silvio Micali, Michael O. Rabin, and Salil P. Vadhan. 1999. Verifiable Random Functions. In 40th FOCS. IEEE Computer Society Press, 120--130. https:\/\/doi.org\/10.1109\/SFFCS.1999.814584"},{"key":"e_1_3_2_2_42_1","volume-title":"On the Risk of Disruption in Several Multiparty Signature Schemes. In ASIACRYPT'96 (LNCS","volume":"345","author":"Michels Markus","year":"1996","unstructured":"Markus Michels and Patrick Horster . 1996 . On the Risk of Disruption in Several Multiparty Signature Schemes. In ASIACRYPT'96 (LNCS , Vol. 1163), Kwangjo Kim and Tsutomu Matsumoto (Eds.). Springer, Heidelberg, 334-- 345 . https:\/\/doi.org\/10.1007\/BFb0034859 10.1007\/BFb0034859 Markus Michels and Patrick Horster. 1996. On the Risk of Disruption in Several Multiparty Signature Schemes. In ASIACRYPT'96 (LNCS, Vol. 1163), Kwangjo Kim and Tsutomu Matsumoto (Eds.). Springer, Heidelberg, 334--345. https:\/\/doi.org\/10.1007\/BFb0034859"},{"key":"e_1_3_2_2_43_1","volume-title":"SAC 1998 (LNCS","volume":"80","author":"M'Ra\u00efhi David","year":"1999","unstructured":"David M'Ra\u00efhi , David Naccache , David Pointcheval , and Serge Vaudenay . 1999 . Computational Alternatives to Random Number Generators . In SAC 1998 (LNCS , Vol. 1556), Stafford E. Tavares and Henk Meijer (Eds.). Springer, Heidelberg, 72-- 80 . https:\/\/doi.org\/10.1007\/3--540--48892--8_6 10.1007\/3--540--48892--8_6 David M'Ra\u00efhi, David Naccache, David Pointcheval, and Serge Vaudenay. 1999. Computational Alternatives to Random Number Generators. In SAC 1998 (LNCS, Vol. 1556), Stafford E. Tavares and Henk Meijer (Eds.). Springer, Heidelberg, 72--80. https:\/\/doi.org\/10.1007\/3--540--48892--8_6"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-002-0021-3"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025436905711"},{"key":"e_1_3_2_2_46_1","unstructured":"Jonas Nick. 2020. Purify Benchmarks in the Bulletproofs Reference Code. https:\/\/github.com\/jonasnick\/secp256k1-zkp\/tree\/bulletproof-musig-dn-benches.  Jonas Nick. 2020. Purify Benchmarks in the Bulletproofs Reference Code. https:\/\/github.com\/jonasnick\/secp256k1-zkp\/tree\/bulletproof-musig-dn-benches."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"crossref","unstructured":"Jonas Nick Tim Ruffing Yannick Seurin and Pieter Wuille. 2020. MuSig-DN: Schnorr Multi-Signatures with Verifiably Deterministic Nonces. Full version of this paper. Will be available on Cryptology ePrint Archive.  Jonas Nick Tim Ruffing Yannick Seurin and Pieter Wuille. 2020. MuSig-DN: Schnorr Multi-Signatures with Verifiably Deterministic Nonces. Full version of this paper. Will be available on Cryptology ePrint Archive.","DOI":"10.1145\/3372297.3417236"},{"key":"e_1_3_2_2_48_1","volume-title":"ASIACRYPT'91 (LNCS","author":"Ohta Kazuo","unstructured":"Kazuo Ohta and Tatsuaki Okamoto . 1993. A Digital Multisignature Scheme Based on the Fiat-Shamir Scheme . In ASIACRYPT'91 (LNCS , Vol. 739), Hideki Imai, Ronald L . Rivest, and Tsutomu Matsumoto (Eds.). Springer , Heidelberg, 139--148. https:\/\/doi.org\/10.1007\/3--540--57332--1_11 10.1007\/3--540--57332--1_11 Kazuo Ohta and Tatsuaki Okamoto. 1993. A Digital Multisignature Scheme Based on the Fiat-Shamir Scheme. In ASIACRYPT'91 (LNCS, Vol. 739), Hideki Imai, Ronald L. Rivest, and Tsutomu Matsumoto (Eds.). Springer, Heidelberg, 139--148. https:\/\/doi.org\/10.1007\/3--540--57332--1_11"},{"key":"e_1_3_2_2_49_1","volume-title":"Multi-Signature Schemes Secure against Active Insider Attacks. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science","author":"Ohta Kazuo","year":"1999","unstructured":"Kazuo Ohta and Tatsuaki Okamoto . 1999. Multi-Signature Schemes Secure against Active Insider Attacks. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science , Vol. E82-A, 1 ( 1999 ), 21--31. Kazuo Ohta and Tatsuaki Okamoto. 1999. Multi-Signature Schemes Secure against Active Insider Attacks. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science, Vol. E82-A, 1 (1999), 21--31."},{"key":"e_1_3_2_2_50_1","volume-title":"Leonid Reyzin, and Sharon Goldberg.","author":"Papadopoulos Dimitrios","year":"2017","unstructured":"Dimitrios Papadopoulos , Duane Wessels , Shumon Huque , Moni Naor , Jan Vv cel\u00e1k , Leonid Reyzin, and Sharon Goldberg. 2017 . Making NSEC5 Practical for DNSSEC. Cryptology ePrint Archive, Report 2017\/099. http:\/\/eprint.iacr.org\/2017\/099. Dimitrios Papadopoulos, Duane Wessels, Shumon Huque, Moni Naor, Jan Vv cel\u00e1k, Leonid Reyzin, and Sharon Goldberg. 2017. Making NSEC5 Practical for DNSSEC. Cryptology ePrint Archive, Report 2017\/099. http:\/\/eprint.iacr.org\/2017\/099."},{"key":"e_1_3_2_2_51_1","volume-title":"AFRICACRYPT 18 (LNCS","author":"Poettering Bertram","unstructured":"Bertram Poettering . 2018. Shorter Double-Authentication Preventing Signatures for Small Address Spaces . In AFRICACRYPT 18 (LNCS , Vol. 10831), Antoine Joux, Abderrahmane Nitaj, and Tajjeeddine Rachidi (Eds.). Springer, Heidelberg, 344-- 361 . https:\/\/doi.org\/10.1007\/978--3--319--89339--6_19 10.1007\/978--3--319--89339--6_19 Bertram Poettering. 2018. Shorter Double-Authentication Preventing Signatures for Small Address Spaces. In AFRICACRYPT 18 (LNCS, Vol. 10831), Antoine Joux, Abderrahmane Nitaj, and Tajjeeddine Rachidi (Eds.). Springer, Heidelberg, 344--361. https:\/\/doi.org\/10.1007\/978--3--319--89339--6_19"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11203-9_25"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-015-0307-8"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"crossref","unstructured":"Thomas Pornin. 2013. Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA). RFC 6979. Available at https:\/\/rfc-editor.org\/rfc\/rfc6979.txt.  Thomas Pornin. 2013. Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA). RFC 6979. Available at https:\/\/rfc-editor.org\/rfc\/rfc6979.txt.","DOI":"10.17487\/rfc6979"},{"key":"e_1_3_2_2_55_1","volume-title":"Careful with Composition: Limitations of the Indifferentiability Framework. In EUROCRYPT 2011 (LNCS","volume":"506","author":"Ristenpart Thomas","year":"2011","unstructured":"Thomas Ristenpart , Hovav Shacham , and Thomas Shrimpton . 2011 . Careful with Composition: Limitations of the Indifferentiability Framework. In EUROCRYPT 2011 (LNCS , Vol. 6632), Kenneth G. Paterson (Ed.). Springer, Heidelberg, 487-- 506 . https:\/\/doi.org\/10.1007\/978--3--642--20465--4_27 10.1007\/978--3--642--20465--4_27 Thomas Ristenpart, Hovav Shacham, and Thomas Shrimpton. 2011. Careful with Composition: Limitations of the Indifferentiability Framework. In EUROCRYPT 2011 (LNCS, Vol. 6632), Kenneth G. Paterson (Ed.). Springer, Heidelberg, 487--506. https:\/\/doi.org\/10.1007\/978--3--642--20465--4_27"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72540-4_13"},{"key":"e_1_3_2_2_57_1","volume-title":"ACM CCS","author":"Ruffing Tim","year":"2015","unstructured":"Tim Ruffing , Aniket Kate , and Dominique Schr\u00f6der . 2015. Liar, Liar , Coins on Fire!: Penalizing Equivocation By Loss of Bitcoins . In ACM CCS 2015 , Indrajit Ray, Ninghui Li , and Christopher Kruegel (Eds.). ACM Press , 219--230. https:\/\/doi.org\/10.1145\/2810103.2813686 10.1145\/2810103.2813686 Tim Ruffing, Aniket Kate, and Dominique Schr\u00f6der. 2015. Liar, Liar, Coins on Fire!: Penalizing Equivocation By Loss of Bitcoins. In ACM CCS 2015, Indrajit Ray, Ninghui Li, and Christopher Kruegel (Eds.). ACM Press, 219--230. https:\/\/doi.org\/10.1145\/2810103.2813686"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196725"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-001-0020-9"},{"key":"e_1_3_2_2_60_1","unstructured":"Filippo Valsorda. 2014. Exploiting ECDSA Failures in the Bitcoin Blockchain. HITB Security Conference. See https:\/\/conference.hitb.org\/hitbsecconf2014kul\/materials\/D1T1%20-%20Filippo%20Valsorda%20-%20Exploiting%20ECDSA%20Failures%20in%20the%20Bitcoin%20Blockchain.pdf.  Filippo Valsorda. 2014. Exploiting ECDSA Failures in the Bitcoin Blockchain. HITB Security Conference. See https:\/\/conference.hitb.org\/hitbsecconf2014kul\/materials\/D1T1%20-%20Filippo%20Valsorda%20-%20Exploiting%20ECDSA%20Failures%20in%20the%20Bitcoin%20Blockchain.pdf."},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45708-9_19"},{"key":"e_1_3_2_2_62_1","unstructured":"John Wigley. 1997. Removing need for rng in signatures. Message posted to the sci.crypt mailing list. http:\/\/groups.google.com\/group\/sci.crypt\/msg\/a6da45bcc8939a89.  John Wigley. 1997. Removing need for rng in signatures. Message posted to the sci.crypt mailing list. http:\/\/groups.google.com\/group\/sci.crypt\/msg\/a6da45bcc8939a89."},{"key":"e_1_3_2_2_63_1","unstructured":"Pieter Wuille. 2013. Hierarchical Deterministic Wallets. Bitcoin Improvement Proposal 32. See https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0032.mediawiki.  Pieter Wuille. 2013. Hierarchical Deterministic Wallets. Bitcoin Improvement Proposal 32. See https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0032.mediawiki."},{"key":"e_1_3_2_2_64_1","unstructured":"Pieter Wuille. 2019. Reference Implementation of Arithmetic Circuit and Curve Selection Code. https:\/\/github.com\/sipa\/purify.  Pieter Wuille. 2019. Reference Implementation of Arithmetic Circuit and Curve Selection Code. https:\/\/github.com\/sipa\/purify."},{"key":"e_1_3_2_2_65_1","unstructured":"Pieter Wuille Jonas Nick and Tim Ruffing. 2020 a. Schnorr Signatures for secp256k1. Bitcoin Improvement Proposal 340. See https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0340.mediawiki.  Pieter Wuille Jonas Nick and Tim Ruffing. 2020 a. Schnorr Signatures for secp256k1. Bitcoin Improvement Proposal 340. See https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0340.mediawiki."},{"key":"e_1_3_2_2_66_1","unstructured":"Pieter Wuille Jonas Nick and Anthony Towns. 2020 b. Taproot: SegWit version 1 output spending rules. Bitcoin Improvement Proposal 341. See https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0341.mediawiki.  Pieter Wuille Jonas Nick and Anthony Towns. 2020 b. Taproot: SegWit version 1 output spending rules. Bitcoin Improvement Proposal 341. See https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0341.mediawiki."},{"key":"e_1_3_2_2_67_1","unstructured":"ZmnSCPxj. 2019. Escrow Over Lightning? https:\/\/lists.linuxfoundation.org\/pipermail\/lightning-dev\/2019-June\/002028.html.  ZmnSCPxj. 2019. Escrow Over Lightning? https:\/\/lists.linuxfoundation.org\/pipermail\/lightning-dev\/2019-June\/002028.html."}],"event":{"name":"CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event USA","acronym":"CCS '20","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372297.3417236","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3372297.3417236","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:25Z","timestamp":1750199605000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372297.3417236"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,30]]},"references-count":63,"alternative-id":["10.1145\/3372297.3417236","10.1145\/3372297"],"URL":"https:\/\/doi.org\/10.1145\/3372297.3417236","relation":{},"subject":[],"published":{"date-parts":[[2020,10,30]]},"assertion":[{"value":"2020-11-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}