Schnorr signatures and identification protocols have undergone significant
security analysis over the years. However, strategies for proving their security
differ depending on slight variations in the schemes and security models.
I wrote a
I recently gave my first in-person lecture in almost two years since the
pandemic began, and it was such a great experience.
I talked about attacks and fixes for distributed key generation (DKG)
I was invited to present FROST and to give recommendations for the
standardization of Schnorr threshold signatures at the recent NIST workshop on
standardization of threshold schemes
[https://csrc.nist.gov/Events/2020/
I am excited to say that the camera ready version of our publication "Mind the
Gap: Ceremonies for Applied Secret Sharing" in the Privacy Enhancing Symposium
2020 is out!
You can
Important Terms and Notation
For the purposes of this post, it is important to understand a few basic
notation and terms. We define further linear algebra terms inPart 1
[https://writing.chelseakomlo.com/