August 20, 2020 Knowledge Base UC Non-Interactive, Proactive, Threshold ECDSA w/ Identifiable Aborts Paola Director, Digital Products 1 min. read Introduction Deeper technical overview Outline: Background Preliminaries Honest-but-curious protocol Range proofs and malicious security Our Protocols Accountability Security Analysis