U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.


Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

NIST Workshop on Multi-party Threshold Schemes (MPTS) 2023

Timing: Throughout September 26–28, 2023, presentations will be take place 10:00–12:00 and 13:00–15:00 EDT (Eastern Daylight Time: UTC-04:00), by video conference.

The following is a preliminary list, including the titles of only the externally-submitted accepted presentations. The list will soon be updated with exact times, links to the abstracts, and further details.

1st day: Tuesday, September 26th, 2023

  • Workshop welcome and introduction
Session 1a (10:20–12:00): Generic considerations on threshold cryptography / MPC
  1. Diversity and tradeoffs in MPC standardization. Yehuda Lindell (Coinbase)

  2. Threshold Cryptography in MP-SPDZ. Marcel Keller (CSIRO's Data61)

  3. Secure Multiparty Computation and Applications. Steve Lu (Stealth Software Technologies)

  4. Thresholding symmetric-key primitives based on malicious general-purpose MPC. Xiao Wang (Northwestern University, USA)

Session 1b (13:00–15:00 EDT): EC-based threshold signatures
  1. Distributed Key Generation in the Discrete-Logarithm Setting. Jonathan Katz (Dfns)

  2. Threshold EdDSA Submissions of FROST and Sparkle. Chelsea Komlo (University of Waterloo, Zcash Foundation, Dfns)

  3. A Threshold ECDSA Scheme Submission. abhi shelat (Northeastern)

  4. Standardizing Protocols for Threshold ECDSA. Jonathan Katz (Dfns)

  5. Exploring the power of threshold BLS. Pratyay Mukherjee (Supra Research)

2nd day: Wednesday, September 27th, 2023

  • 2nd day welcome and introduction

Session 2a (10:10–12:00): "Advanced" schemes (ZKP, FHE, ABE)
  1. FHE-Related Comments on NIST First Call for Multi-Party Threshold Schemes. Yuriy Polyakov (Duality Technologies)

  2. A note about Authenticated Transciphering: decrypting AES under Homomorphic Encryption using CKKS. Nir Drucker (IBM Research, Israel)

  3. Standards for Zero-Knowledge Proofs and their Relevance to the NIST Threshold Call. Mary Maller (Ethereum Foundation, and PQShield)

  4. Ligetron: WASM as an Intermediate Representation and easy tooling for zkSNARKs. Muthu Venkitasubramanian (Georgetown University)

  5. A Bird's Eye View on Multi-Authority Attribute-Based Encryption. Marloes Venema (University of Wuppertal)

Session 2b (13:00–14:00 EDT): More on threshold signing (applications, feasible approaches, implementation attacks)
  1. Requirements for Threshold TLS. Armando Faz Hernandez (Cloudflare)

  2. Sometimes You Can’t Distribute Random-Oracle-Based Proofs. Jack Doerner (Technion, Israel)

  3. Practical key-extraction attacks in leading MPC wallets. Nikolaos Makriyannis (Fireblocks)

Session 2c (14:00–15:00 EDT): emerging NIST standards
  • TBA

3rd day: Thursday, September 28th, 2023

  • 3rd day welcome and introduction

Session 3a (10:10–12:00 EDT): Some gadgets
  1. Gadgets for Threshold AES: Correlation Robust Hash and Authenticated Garbling. Hongrui Cui (Shanghai Jiao Tong University) and Chenkai Weng (Northwestern University)

  2. Stacked Garbling. Vlad Kolesnikov (Georgia Tech)

  3. Garbled Circuit Lookup Tables. David Heath (University of Illinois Urbana-Champaign)

  4. Vector Oblivious Linear Evaluation and PCGs: Gadgets for ZK and Threshold Protocols. Peter Scholl (Aarhus University)

  5. Building blocks for Threshold FHE. Andreea Alexandru (Duality Technologies)

Session 3b (13:00–14:30 EDT): More gadgets
  1. AONT: an essential gadget for Multi-Party Threshold Cryptography. Gilles Seghaier (Astran)

  2. Verifiable Oblivious PRF. Armando Faz Hernandez (Cloudflare)

  3. Limitations of Threshold Secret Sharing and Derived MPC Applications. Wyatt Howe (UCLA, USA)

  4. Building Threshold Cryptosystems over a SMR/Blockchain channel. Aniket Kate (Purdue University; Supra Research)

Session 3c (14:30–15:00 EDT): Focused feedback and conclusions
  • TBA

The NIST workshop on Multi-Party Threshold Schemes 2023 (MPTS 2023) is intended to gather diverse public feedback about the process envisioned in the NIST First Call for Multi-Party Threshold Schemes [NISTIR 8214C ipd (2023)] (the “Threshold Call”). The success of the envisioned process (collecting reference material, performing public analysis, devising recommendations) hinges on active involvement of the international cryptography community. To that effect, expert stakeholders are encouraged to submit abstracts of short talks (5–15 min) to present at MPTS 2023. The talks should aim to provide (i) feedback to improve the final version of the Threshold Call, or (ii) comments to motivate/facilitate a concerted community participation in submitting high-quality threshold schemes for cryptographic primitives, and their building blocks.

  • Date and time: September 26–28, 2023, 10:00–15:00 EDT
  • Main theme: NIST First Call for Multi-Party Threshold Schemes (NISTIR 8214C)
  • Featured topics: Threshold cryptography; threshold schemes; multi-party computation (MPC); fully-homomorphic encryption (FHE); zero-knowledge proofs (ZKP); attribute-based encryption (ABE); MPC/FHE/ZKP-friendly primitives; useful gadgets.
  • Location: Virtual event (video conference)
  • Attendance: Requires registration (free)
  • Format: virtual talks in webinar format (presenters can share video and audio; attendees can comment/ask questions via chat)

Suggested topics for presentations:

  1. Scope of the Threshold Call: refinements to the description of subcategories.
  2. Submission requirements in the Threshold Call: needed clarifications.
  3. Expressions of interest: intended concrete submissions (and possible submitter team).
  4. Need and adoptability: special features and primitives useful for specific applications.
  5. Inspiration: suggestions to the community, for submission of concrete threshold schemes.
  6. Frameworks: pertinent system models, security formulations, and threshold parameters.
  7. Pre/post quantum: concrete pre-quantum versus post-quantum cases worth focusing on.
  8. Technicalities: challenges about concrete primitives / threshold schemes / assumptions.
  9. External efforts: other processes developing related reference material or specifications.

Technical areas of interest (non-exhaustive list):

Threshold cryptography, secure multi-party computation (MPC), distributed systems, fully-homomorphic encryption (FHE), zero-knowledge proofs (ZKP), threshold/ZKP/MPC/FHE-friendly symmetric primitives (e.g., hash functions and block-ciphers), identity/attribute-based encryption, gadgets, composability and modularity, crypto-graphic assumptions enabling techniques with advanced features, open-source implementations.

Selected references with further context:

Registration Info

Attendance in the workshop webinar is free, but subject to registration via Webex.

Registration link (Webex): https://nist-secure.webex.com/webappng/sites/nist-secure/webinar/webinarSeries/register/ceb61702e61047a7ad27c00f11fbaa94

Call for presentation abstracts: https://csrc.nist.gov/csrc/media/Events/2023/mpts2023/documents/MPTS2023-Workshop-Call-for-Abstracts.pdf

Email address for submissions or questions about MPTS 2023: workshop-mpts2023@nist.gov

To receive general announcements about the MPTC and PEC projects, subscribe to the mailing lists MPTC-Forum and PEC-Forum.

Event Details

Starts: September 26, 2023 - 10:00 AM EDT
Ends: September 28, 2023 - 03:00 PM EDT
September 26–28, 2023 @ Virtual

Format: Virtual Type: Workshop


Attendance Type: Open to public
Audience Type: Industry,Government,Academia,Other



Related Topics

Security and Privacy: cryptography

Created June 23, 2023, Updated September 20, 2023