I recently gave my first in-person lecture in almost two years since the pandemic began, and it was such a great experience. I talked about attacks and fixes for distributed key generation (DKG)
Chelsea H. Komlo
I was invited to present FROST and to give recommendations for the standardization of Schnorr threshold signatures at the recent NIST workshop on standardization of threshold schemes [https://csrc.nist.gov/Events/2020/
I am excited to say that the camera ready version of our publication "Mind the Gap: Ceremonies for Applied Secret Sharing" in the Privacy Enhancing Symposium 2020 is out! You can
Important Terms and Notation For the purposes of this post, it is important to understand a few basic notation and terms. We define further linear algebra terms inPart 1 [https://writing.chelseakomlo.com/
This post gives a (hopefully!) simple introduction to lattices and hard problems based on lattices. In Part 2, we’ll look at one simple lattice-based key exchange, to understand how to use these underlying hard problems in cryptosystems.