In Bitcoin and other cryptocurrencies, the use of hierarchical deterministic wallets (HD wallets) is a widely accepted practice. Loosely speaking, such wallets work by having a single master key (or master secret) and then deriving all keys from the mast...
In April 2020, over 4 billion people are under a form of shelter-in-place or stay-home orders worldwide due to the coronavirus pandemic. With work-from-home as the new normal, videoconferencing application Zoom has become the preferred platform – experi...
Secure multiparty computation, otherwise known as MPC, has been studied in academia for decades, taking it from theory to a practical technology. As a result, it is now being used commercially to solve different privacy and security problems. In ...
This is the eighth and last blog in a series aimed at explaining the growing use of MPC and threshold signing to protect cryptocurrencies.
In the previous blog posts in this series, I described the use of MPC and threshold signing for protecting cryptocu...
This is the seventh blog in a series aimed at explaining the growing use of MPC and threshold signing to protect cryptocurrencies. The rest of the blog posts in this series can be found at the end of this article.
In the previous blog posts in this serie...
In the first five blog posts in this series, I described the use of MPC and threshold signing for protecting cryptocurrencies, along with its main features and properties. In this post, I talk about the importance of proofs of security in this domain.
Ho...
This is the fifth blog in a series aimed at explaining the growing use of MPC and threshold signing to protect cryptocurrencies.
In the first three blog posts in this series (Shamir Secret Sharing and Quorums, Threshold Signature Schemes, Additional Pro...
This is the fourth blog in a series aimed at explaining the growing use of MPC and threshold signing to protect cryptocurrencies.
In the first three blog posts in this series (read Shamir Secret Sharing and Quorums, Threshold Signature Schemes, and Add...
This is the third Cryptocurrency Protection blog in a series aimed at explaining the growing use of MPC and threshold signing to protect cryptocurrencies.
In the first two blog posts in this series (Shamir Secret Shaing and Quorums and Threshold Signatu...