August 20, 2020 Research & Security UC Non-Interactive, Proactive, Threshold ECDSA w/ Identifiable Aborts Paola 1 min. read Introduction Deeper technical overview Outline: Background Preliminaries Honest-but-curious protocol Range proofs and malicious security Our Protocols Accountability Security Analysis