Chelsea Holland Komlo
  • Home
  • Tag
  • Author

A note on proving security of Schnorr

20 days ago 1 min read
Schnorr signatures and identification protocols have undergone significant security analysis over the years. However, strategies for proving their security differ depending on slight variations in the schemes and security models. I wrote a
Read Now Read Later
Chelsea H. Komlo
By: Chelsea H. Komlo

Attacks and Fixes on DKGs

6 months ago 1 min read
I recently gave my first in-person lecture in almost two years since the pandemic began, and it was such a great experience. I talked about attacks and fixes for distributed key generation (DKG)
Read Now Read Later
Chelsea H. Komlo
By: Chelsea H. Komlo

FROST at the NIST Workshop on Threshold Schemes

a year ago 1 min read
I was invited to present FROST and to give recommendations for the standardization of Schnorr threshold signatures at the recent NIST workshop on standardization of threshold schemes! Overall, we got great feedback from
Read Now Read Later
Chelsea H. Komlo
By: Chelsea H. Komlo

New publication on security of applied secret sharing schemes

2 years ago 1 min read
I am excited to say that the camera ready version of our publication "Mind the Gap: Ceremonies for Applied Secret Sharing" in the Privacy Enhancing Symposium 2020 is out! You can see a
Read Now Read Later
Chelsea H. Komlo
By: Chelsea H. Komlo

A Gentle Introduction to Lattices and Lattice-based Key Exchanges: Part 2

3 years ago 11 min read cryptographylattices
Important Terms and Notation For the purposes of this post, it is important to understand a few basic notation and terms. We define further linear algebra terms in Part 1 . We will denote
Read Now Read Later
Chelsea H. Komlo
By: Chelsea H. Komlo
Page 1 of 2
Older Posts
Chelsea Holland Komlo