AI, Data Science & Business Certificates — Save ₹6,000 This Month
AI Product Expert Certification - Master Generative AI Skills
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore a critical analysis of two-round multi-signature schemes in this IEEE Symposium on Security & Privacy conference talk. Delve into the security vulnerabilities of popular schemes like BCJ, MWLD, CoSi, and MuSig, designed for large-scale decentralized trust applications. Discover why current techniques fail to prove these schemes secure, and learn about the subtle flaws in their published security proofs. Examine practical sub-exponential attacks that further demonstrate their insecurity. Finally, investigate mBCJ, a new variant of the BCJ scheme that offers provable security under the discrete-logarithm assumption in the random-oracle model, while maintaining scalability for large-scale deployments of up to 16,384 signers.
Syllabus
On the Security of Two-Round Multi-Signatures
Taught by
IEEE Symposium on Security and Privacy