{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T13:55:15Z","timestamp":1774965315152,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3670387","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"1567-1580","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Fast Two-party Threshold ECDSA with Proactive Security"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8874-2217","authenticated-orcid":false,"given":"Brian","family":"Koziel","sequence":"first","affiliation":[{"name":"TripleBlind, Kansas City, Missouri, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-6490-1786","authenticated-orcid":false,"given":"S. Dov","family":"Gordon","sequence":"additional","affiliation":[{"name":"TripleBlind &amp; George Mason University, Kansas City, Missouri, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-6651-7262","authenticated-orcid":false,"given":"Craig","family":"Gentry","sequence":"additional","affiliation":[{"name":"TripleBlind, Kansas City, Missouri, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_35"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319713"},{"key":"e_1_3_2_1_3_1","volume-title":"Threshold ECDSA with an offline recovery party","author":"Battagliola Michele","year":"2021","unstructured":"Michele Battagliola, Riccardo Longo, Alessio Meneghetti, and Massimiliano Sala. Threshold ECDSA with an offline recovery party, 2021."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0055716"},{"key":"e_1_3_2_1_5_1","first-page":"241","volume-title":"Cryptography and Coding","author":"Boyd C.","year":"1986","unstructured":"C. Boyd. Digital multisignature. In Cryptography and Coding, pages 241--246, 1986."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586124"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423367"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26954-8_7"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45388-6_10"},{"key":"e_1_3_2_1_10_1","volume-title":"Bandwidth-efficient threshold EC-DSA revisited: Online\/offline extensions, identifiable aborts proactive and adaptive security. Theor. Comput. Sci., 939(C):78--104, jan","author":"Castagnos Guilhem","year":"2023","unstructured":"Guilhem Castagnos, Dario Catalano, Fabien Laguillaumie, Federico Savasta, and Ida Tucker. Bandwidth-efficient threshold EC-DSA revisited: Online\/offline extensions, identifiable aborts proactive and adaptive security. Theor. Comput. Sci., 939(C):78--104, jan 2023."},{"key":"e_1_3_2_1_11_1","first-page":"189","volume-title":"Cryptography and Coding","author":"Croft R.A.","year":"1989","unstructured":"R.A. Croft and Harris S.P. Public-key cryptography and reusable shared secret. In Cryptography and Coding, pages 189--201, 1989."},{"key":"e_1_3_2_1_12_1","first-page":"382","volume-title":"Jesper Buus Nielsen, Jakob Illeborg Pagter, and Michael B\u00e6ksvang \u00d8stergaard. Fast threshold ECDSA with honest majority","author":"Damg\u00e5rd Ivan","year":"2020","unstructured":"Ivan Damg\u00e5rd, Thomas Pelle Jakobsen, Jesper Buus Nielsen, Jakob Illeborg Pagter, and Michael B\u00e6ksvang \u00d8stergaard. Fast threshold ECDSA with honest majority. In Clemente Galdi and Vladimir Kolesnikov, editors, Security and Cryptography for Networks, pages 382--400, Cham, 2020. Springer International Publishing."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48184-2_8"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34805-0_28"},{"key":"e_1_3_2_1_15_1","volume-title":"Threshold ECDSA in three rounds. eprint\/2023\/765","author":"Doerner Jack","year":"2023","unstructured":"Jack Doerner, Yash Kondi, Eysa Lee, and abhi shelat. Threshold ECDSA in three rounds. eprint\/2023\/765, 2023."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00036"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1997.646127"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0052254"},{"key":"e_1_3_2_1_19_1","first-page":"180","volume-title":"Adaptively-secure optimalresilience proactive RSA","author":"Frankel Yair","year":"1999","unstructured":"Yair Frankel, Philip Mackenzie, and Moti Yung. Adaptively-secure optimalresilience proactive RSA. pages 180--194, 12 1999."},{"key":"e_1_3_2_1_20_1","volume-title":"Threshold ECDSA for decentralized asset custody. IACR Cryptol. ePrint Arch., page 498","author":"Gagol Adam","year":"2020","unstructured":"Adam Gagol, Jedrzej Kula, Damian Straszak, and Michal Swietek. Threshold ECDSA for decentralized asset custody. IACR Cryptol. ePrint Arch., page 498, 2020."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243859"},{"key":"e_1_3_2_1_22_1","first-page":"156","volume-title":"Mark Manulis, Ahmad-Reza Sadeghi","author":"Gennaro Rosario","year":"2016","unstructured":"Rosario Gennaro, Steven Goldfeder, and Arvind Narayanan. Threshold-optimal DSA\/ECDSA signatures and an application to bitcoin wallet security. In Mark Manulis, Ahmad-Reza Sadeghi, and Steve Schneider, editors, Applied Cryptography and Network Security, pages 156--174, Cham, 2016. Springer International Publishing."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68339-9_31"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/288090.288108"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-34618-8_24"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/266420.266442"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44750-4_27"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85230-8_20"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1201\/9781420010756"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00067"},{"key":"e_1_3_2_1_31_1","first-page":"613","volume-title":"Proceedings, Part II 37","author":"Lindell Yehuda","year":"2017","unstructured":"Yehuda Lindell. Fast secure two-party ECDSA signing. In Advances in Cryptology--CRYPTO 2017: 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20--24, 2017, Proceedings, Part II 37, pages 613--644. Springer, 2017."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243788"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-004-0041-0"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/112600.112605"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","volume-title":"Advances in Cryptology EUROCRYPT 99","author":"Paillier Pascal","year":"1999","unstructured":"Pascal Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Jacques Stern, editor, Advances in Cryptology EUROCRYPT 99, pages 223--238, Berlin, Heidelberg, 1999. Springer Berlin Heidelberg."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0055722"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45539-6_15"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054113"}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","location":"Salt Lake City UT USA","acronym":"CCS '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3670387","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3670387","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T06:12:12Z","timestamp":1755843132000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3670387"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":38,"alternative-id":["10.1145\/3658644.3670387","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3670387","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}