共 36 条
[1]
Bellare M., 2005, Introduction to Modern Cryptogra- phy
[2]
Boneh D., 1998, Algorithmic Number Theory. Third International Symposium, ANTS-III. Proceedings, P48, DOI 10.1007/BFb0054851
[3]
Boneh D., 2017, USING LEVEL
[4]
Brandao L.T.A.N., NIST roadmap toward criteria for threshold schemes for cryptographic primitives
[5]
Canetti R., 2020, IACR CRYPTOL EPRINT, P492
[6]
Chohan U. W., 2018, The problems of cryptocurrency thefts and exchange shutdowns
[7]
Di Nicola V., 2020, CUSTODY CONIO 3
[8]
Secure Two-party Threshold ECDSA from ECDSA Assumptions
[J].
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2018,
:980-997
[9]
Threshold ECDSA from ECDSA Assumptions: The Multiparty Case
[J].
2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019),
2019,
:1051-1066