The following publications are possibly variants of this publication:
- Threshold ECDSA from ECDSA Assumptions: The Multiparty CaseJack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat. iacr, 2019:523, 2019. [doi]
- Secure Two-party Threshold ECDSA from ECDSA AssumptionsJack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat. sp 2018: 980-997 [doi]
- Secure Two-party Threshold ECDSA from ECDSA AssumptionsJack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat. iacr, 2018:499, 2018. [doi]
- A Key Recovery Protocol for Multiparty Threshold ECDSA SchemesMyungsun Kim, Sangrae Cho, Seongbong Choi, Young-Seob Cho, Soohyung Kim, Hyung Tae Lee. access, 10:133206-133218, 2022. [doi]
- Threshold ECDSA in Three RoundsJack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat. sp 2024: 3053-3071 [doi]
- Anonymous credentials from ECDSAMatteo Frigo, Abhi Shelat. iacr, 2024:2010, 2024. [doi]