Advertisement · 728 × 90

Posts by Chelsea Komlo

Post image

Spring is here in nyc!

16 hours ago 2 0 0 0
Post image

True academic, editing slides up to the last minute 😅 Happy to be presenting Golden at today’s NY Crypto Day!

eprint.iacr.org/2025/1924

2 months ago 8 0 1 0
Post image Post image

Spending the week in beautiful Okinawa at the OIST workshop on isogeny-based cryptography

2 months ago 1 0 0 0

One step closer- mapping execution flow from the interactive distinguisher Z and finally understanding the dummy adversary

2 months ago 4 0 1 0

My mom told me a quote today that my grandmother used to say after she would sign up for every free giveaway under the sun - “you can’t win if you don’t play.” And I kind of love that mentality for trying something in the face of overwhelming possibility of failure - generally the case in research

2 months ago 2 0 0 0

Happy new year! One of my New Year’s resolutions this year is to finally finish my gentle introduction to writing proofs in UC, for myself as well.. if anyone is interested in reviewing/contributing, please let me know! 🙌

3 months ago 7 1 1 1
On the Adaptive Security of Key-Unique Threshold Signatures Abstract not available.

I’m at SBC and Simon’s for the next week, looking forward to seeing everyone!

Will be giving a talk on Thursday at Simon’s on our recent impossibility results on the adaptive security of threshold signatures- simons.berkeley.edu/talks/chelse...

8 months ago 3 0 0 0

Thank you!! Wow you are lucky

1 year ago 0 0 0 0

2025: started out with Covid, got better, then relapsed into Covid 🤦‍♀️

1 year ago 1 0 2 0

Back to blue sky and happy new year!!!

1 year ago 12 0 0 0
Advertisement
RFC 9591: The Flexible Round-Optimized Schnorr Threshold (FROST) Protocol for Two‑Round Schnorr Signatures This document specifies the Flexible Round-Optimized Schnorr Threshold (FROST) signing protocol. FROST signatures can be issued after a threshold number of entities cooperate to compute a signature, ...

After 3 years & 12 drafts, the RFC for FROST is complete! We hope this makes implementing FROST easier with fewer bugs 🐛

Thank you to everyone who helped by reviewing FROST security, submitting comments, and implementing the draft, this was a team effort 🙌💪

www.rfc-editor.org/rfc/rfc9591....

1 year ago 12 5 0 0

Awesome! Added to the list for next year :)

1 year ago 0 0 0 0

In Croatia? Have fun!! Hopefully I’ll make it one day 🤞

1 year ago 0 0 1 0

There's a mergesort step on page 12 that is costed at N log N. So I don't think this improves on Sam Jaques' eprint 2024/080 from a theoretical perspective. Nice implementation work though!

1 year ago 4 3 0 0
Preview
Donate Used Eclipse Glasses | Eclipse Glasses USA Not sure what to do with your used eclipse glasses now that the October 2023 eclipse has passed? Donate them to Eclipse Glasses USA. We will send them to school children in other countries for those c...

Consider donating your eclipse glasses to Eclipse Glasses USA so schoolchildren in South America can use them in October. eclipse23.com/pages/donate...

2 years ago 928 735 7 15
Preview
Episode 318: Threshold Signature Schemes & FROST with Chelsea Komlo - ZK Podcast In this week’s episode, Anna and Nico chat with Chelsea Komlo, Chief Scientist for the Zcash Foundation and member of the Cryptography, Security, and Privacy lab at the University of Waterloo. They d...

First podcast, check it out! :) zeroknowledge.fm/318-2/

2 years ago 12 5 0 0
Preview
Facebook snooped on users' Snapchat traffic in secret project, documents reveal | TechCrunch A secret program called

This is jaw-dropping, wild news and should be criminal

techcrunch.com/2024/03/26/f...

2 years ago 6 2 0 0

It's not a choice of one or the other.

Use the appendix, as an author, to make reviewers see the value of sticky reviews and make them more likely to ask chairs to turn them on!

2 years ago 2 1 1 0

Good point!

2 years ago 0 0 0 0

If you are on a PC for an IACR conference, consider reaching out to the PC chairs to request “sticky reviews”, to allow reviews from prior submissions to IACR conferences to be visible! Let’s make science better! 💪

2 years ago 6 3 0 0
Advertisement

It is good to know you feel this way, as a potential future book-writer :)

2 years ago 1 0 0 0

Will do! Thanks Nigel 🙏

2 years ago 1 0 1 0

Well, I would like this feature as a reviewer :)

2 years ago 0 0 1 0

Great to hear this is possible!! So it is just a matter of promoting it to be more of the norm 🤔

2 years ago 2 0 1 0

I wish conferences asked papers to submit feedback received from prior submission attempts and a discussion of how the authors improved the paper since then… so much context is lost between submission attempts across different venues

2 years ago 7 1 1 0
Post image

Thanks for the amazing time #RealWorldCrypto, fantastic talks and conversations as always! See you next year in Europe :)

2 years ago 8 0 0 0
Post image

Changing my job title to “fancy cryptographer” thanks #RealWorldCrypto

2 years ago 18 2 1 0
Abstract. Threshold Schnorr signatures are seeing increased adoption in practice, and offer practical defenses against single points of failure. However, one challenge with existing randomized threshold Schnorr signature schemes is that signers must carefully maintain secret state across signing rounds, while also ensuring that state is deleted after a signing session is completed. Failure to do so will result in a fatal key-recovery attack by re-use of nonces.

While deterministic threshold Schnorr signatures that mitigate this issue exist in the literature, all prior schemes incur high complexity and performance overhead in comparison to their randomized equivalents. In this work, we seek the best of both worlds; a deterministic and stateless threshold Schnorr signature scheme that is also simple and efficient.

Towards this goal, we present Arctic, a lightweight two-round threshold Schnorr signature that is deterministic, and therefore does not require participants to maintain state between signing rounds. As a building block, we formalize the notion of a Verifiable Pseudorandom Secret Sharing (VPSS) scheme, and define Shine, an efficient VPSS construction. Shine is secure when the total number of participants is at least 2t − 1 and the adversary is assumed to corrupt at most t − 1; i.e., in the honest majority model.

We prove that Arctic is secure under the discrete logarithm assumption in the random oracle model, similarly assuming at minimum 2t − 1 number of signers and a corruption threshold of at most t − 1. For moderately sized groups (i.e., when n ≤ 20), Arctic is more than an order of magnitude more efficient than prior deterministic threshold Schnorr signatures in the literature. For small groups where n ≤ 10, Arctic is three orders of magnitude more efficient.

Abstract. Threshold Schnorr signatures are seeing increased adoption in practice, and offer practical defenses against single points of failure. However, one challenge with existing randomized threshold Schnorr signature schemes is that signers must carefully maintain secret state across signing rounds, while also ensuring that state is deleted after a signing session is completed. Failure to do so will result in a fatal key-recovery attack by re-use of nonces. While deterministic threshold Schnorr signatures that mitigate this issue exist in the literature, all prior schemes incur high complexity and performance overhead in comparison to their randomized equivalents. In this work, we seek the best of both worlds; a deterministic and stateless threshold Schnorr signature scheme that is also simple and efficient. Towards this goal, we present Arctic, a lightweight two-round threshold Schnorr signature that is deterministic, and therefore does not require participants to maintain state between signing rounds. As a building block, we formalize the notion of a Verifiable Pseudorandom Secret Sharing (VPSS) scheme, and define Shine, an efficient VPSS construction. Shine is secure when the total number of participants is at least 2t − 1 and the adversary is assumed to corrupt at most t − 1; i.e., in the honest majority model. We prove that Arctic is secure under the discrete logarithm assumption in the random oracle model, similarly assuming at minimum 2t − 1 number of signers and a corruption threshold of at most t − 1. For moderately sized groups (i.e., when n ≤ 20), Arctic is more than an order of magnitude more efficient than prior deterministic threshold Schnorr signatures in the literature. For small groups where n ≤ 10, Arctic is three orders of magnitude more efficient.

Image showing part 2 of abstract.

Image showing part 2 of abstract.

Arctic: Lightweight and Stateless Threshold Schnorr Signatures (Chelsea Komlo, Ian Goldberg) ia.cr/2024/466

2 years ago 5 3 0 0

Hi Toronto! Looking forward to seeing everyone at #RealWorldCrypto 🇨🇦

2 years ago 4 0 0 0
Advertisement

I was asked today what the upper bound is on number of signers in threshold signature schemes used in practice today and I didn’t have a good answer…

I’m assuming consensus schemes are larger, but does anyone know of signing groups of > 20? That seems on the larger side

2 years ago 4 1 0 0