[1] |
JOHNSON D , MENEZES A , VANSTONE S . The elliptic curve digital signature algorithm (ECDSA)[J]. International Journal of Information Security, 2001,1(1): 36-63.
|
[2] |
AL-ZUBAIDIE M , ZHANG Z , ZHANG J . Efficient and secure ECDSA algorithm and its applications:a survey[J]. arXiv Preprint,arXiv:1902.10313, 2019.
|
[3] |
BLAKE-W S , BOLYARD N , GUPTA V ,et al. Elliptic curve cryptography (ECC) cipher suites for transport layer security (TLS)[R]. RFC 4492, 2006.
|
[4] |
DALSKOV A , ORLANDI C , KELLER M ,et al. Securing DNSSEC keys via threshold ECDSA from generic MPC[C]// European Symposium on Research in Computer Security. Berlin:Springer, 2020: 654-673.
|
[5] |
HENNING P J . A taxonomy of cryptocurrency enforcement actions[J]. Brooklyn Journal of Corporate,Financial and Commercial Law, 2020,14(2): 227-257.
|
[6] |
LU H , JIN C , HELU X ,et al. AutoD:intelligent blockchain application unpacking based on JNI layer deception call[J]. IEEE Network, 2020,PP(99): 1-7.
|
[7] |
JANPITAK N , LILAKIATSAKUN W , SATHITWIRIYAWONG C . The novel secure testament methodology for cryptocurrency wallet using mnemonic seed[J]. Information Security Journal:A Global Perspective, 2020,29(4): 169-182.
|
[8] |
TOMESCU A , CHEN R , ZHENG Y ,et al. Towards scalable threshold cryptosystems[C]// 2020 IEEE Symposium on Security and Privacy. Piscataway:IEEE Press, 2020,doi.org/ 10.1109/SP40000.2020.00059.
|
[9] |
侯红霞, 杨波, 张丽娜 ,等. 安全的两方协作 SM2 签名算法[J]. 电子学报, 2019,48(1): 1-8.
|
|
HOU H X , YANG B , ZHANG L N ,et al. Secure two-party SM2 signature algorithm[J]. Acta Electronica Sinica, 2019,48(1): 1-8.
|
[10] |
MACKENZIE P , REITER M K . Two-party generation of DSA signatures[J]. International Journal of Information Security, 2004,2(3-4): 218-239.
|
[11] |
GENNARO R , GOLDFEDER S , NARAYANAN A . Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security[C]// International Conference on Applied Cryptography and Network Security. Berlin:Springer, 2016: 156-174.
|
[12] |
BONEH D , GENNARO R , GOLDFEDER S . Using level-1 homomorphic encryption to improve threshold DSA signatures for bitcoin wallet security[C]// International Conference on Cryptology and Information Security in Latin America. Berlin:Springer, 2017: 352-377.
|
[13] |
LINDELL Y , . Fast secure two-party ECDSA signing[C]// Annual International Cryptology Conference. Berlin:Springer, 2017: 613-644.
|
[14] |
DOERNER J , KONDI Y , LEE E ,et al. Secure two-party threshold ECDSA from ECDSA assumptions[C]// 2018 IEEE Symposium on Security and Privacy. Piscataway:IEEE Press, 2018: 980-997.
|
[15] |
CHOU T , ORLANDI C . The simplest protocol for oblivious transfer[C]// International Conference on Cryptology and Information Security in Latin America. Berlin:Springer, 2015: 40-58.
|
[16] |
KELLER M , ORSINI E , SCHOLL P . Actively secure OT extension with optimal overhead[C]// Annual Cryptology Conference. Berlin:Springer, 2015: 724-741.
|
[17] |
CASTAGNOS G , CATALANO D , LAGUILLAUMIE F ,et al. Two-party ECDSA from hash proof systems and efficient instantiations[C]// Annual International Cryptology Conference. Berlin:Springer, 2019: 191-221.
|
[18] |
LINDELL Y , NOF A . Fast secure multiparty ECDSA with practical distributed key generation and applications to cryptocurrency custody[C]// Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM Press, 2018: 1837-1854.
|
[19] |
DOERNER J , KONDI Y , LEE E ,et al. Threshold ECDSA from ECDSA assumptions:the multiparty case[C]// 2019 IEEE Symposium on Security and Privacy. Piscataway:IEEE Press, 2019: 1051-1066.
|
[20] |
GENNARO R , GOLDFEDER S . Fast multiparty threshold ECDSA with fast trustless setup[C]// Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM Press, 2018: 1179-1194.
|
[21] |
HE D , ZHANG Y , WANG D ,et al. Secure and efficient two-party signing protocol for the identity-based signature scheme in the IEEE P1363 standard for public key cryptography[J]. IEEE Transactions on Dependable and Secure Computing, 2018,17(5): 1124-1132.
|
[22] |
FENG Q , HE D , LIU Z ,et al. Distributed signing protocol for IEEE P1363-compliant identity-based signature scheme[J]. IET Information Security, 2020,14(4): 443-451.
|
[23] |
ZHANG Y , HE D , ZHANG M ,et al. A provable-secure and practical two-party distributed signing protocol for SM2 signature algorithm[J]. Frontiers of Computer Science, 2020,14(3): 1-14.
|
[24] |
MU Y H , XU H X , LI P L ,et al. Secure two-party SM9 signing[J]. SCIENCE CHINA Information Sciences, 2020,63(8): 189101.
|
[25] |
BEAVER D , . Efficient multiparty protocols using circuit randomization[C]// Annual International Cryptology Conference. Berlin:Springer, 1991: 420-432.
|
[26] |
FENG Q , HE D , LIU Z ,et al. SecureNLP:a system for multi-party Privacy-preserving natural language processing[J]. IEEE Transactions on Information Forensics and Security, 2020,PP(99): 1.
|
[27] |
HUANG K , LIU X , FU S ,et al. A lightweight privacy-preserving CNN feature extraction framework for mobile sensing[J]. IEEE Transactions on Dependable and Secure Computing, 2019,doi.org/10.1109/TDSC.2019.2913362.
|
[28] |
CANETTI R , . Universally composable security:a new paradigm for cryptographic protocols[C]// Proceedings 42nd IEEE Symposium on Foundations of Computer Science. Piscataway:IEEE Press, 2001: 136-145.
|
[29] |
SCHNORR C P , . Efficient identification and signatures for smart cards[C]// Conference on the Theory and Application of Cryptology. Berlin:Springer, 1989: 239-252.
|
[30] |
WU Y , WANG X , SUSILO W ,et al. Efficient server-aided secure two-party computation in heterogeneous mobile cloud computing[J]. IEEE Transactions on Dependable and Secure Computing, 2020:doi.org/10.1109/TDSC.2020.2966632.
|
[31] |
LINDELL Y . How to simulate it-a tutorial on the simulation proof technique[M]. Berlin: Springer, 2017: 277-346.
|
[32] |
BARKE E . Recommendation for key management-part 1 (revised)[J]. Special Publication 800-57, 2020:doi.org/10.6028/NIST.SP.800-57ptlr5.
|
[33] |
KANENARI T , TAKAHASHI Y , HASHIMOTO Y ,et al. A comparison of relic-toolkit and ELiPS libraries for a pairing-based homomorphic encryption[C]// 2019 34th International Technical Conference on Circuits/Systems,Computers and Communications. Piscataway:IEEE Press, 2019: 1-4.
|