Zero Knowledge cover image

Threshold Signature Schemes & FROST with Chelsea Komlo

Zero Knowledge

CHAPTER

Threshold Signatures, Multi-Party Computation, and Cryptographic Techniques

The chapter explores the relationship between threshold signatures and multi-party computation, highlighting the specialized nature of threshold signatures within the broader framework of multi-party secure computation. It discusses the development and standardization process of Frost, a cryptographic technique crucial for schemes like threshold signatures, emphasizing the need for precise engineering and security considerations. The conversation introduces the Arctic threshold signature scheme as a solution to challenges in secure and efficient threshold signature design, focusing on security assumptions and speed trade-offs for different group sizes.

00:00
Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner