
Threshold Signature Schemes & FROST with Chelsea Komlo
Zero Knowledge
Threshold Signatures, Multi-Party Computation, and Cryptographic Techniques
The chapter explores the relationship between threshold signatures and multi-party computation, highlighting the specialized nature of threshold signatures within the broader framework of multi-party secure computation. It discusses the development and standardization process of Frost, a cryptographic technique crucial for schemes like threshold signatures, emphasizing the need for precise engineering and security considerations. The conversation introduces the Arctic threshold signature scheme as a solution to challenges in secure and efficient threshold signature design, focusing on security assumptions and speed trade-offs for different group sizes.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.