You are viewing this page in an unauthorized frame window.
This is a potential security issue, you are being redirected to https://csrc.nist.gov.
An official website of the United States government
Here’s how you know
Official websites use .gov A
.gov website belongs to an official government
organization in the United States.
Secure .gov websites use HTTPS A
lock (
) or https:// means you’ve safely connected to
the .gov website. Share sensitive information only on official,
secure websites.
Regular talk:Submit by September 10 (general contribution talk)
"Preview talk":Submit by 2026-Jan-12(previously 2025-Nov-03) (in scope of the Threshold Call).
Note: "Preview Talks" relate to "Preview Writeups" (.ZIP, .PDF) submitted to MPTC-submissions (at) list (dot) nist (dot) gov.
The workshop was previously planned as MPTS 2025 (Nov 17–20). It was later rescheduled as MPTS 2026 (Jan 26–29).
Tentative list of workshop sessions:
Day
Morning sessions
Afternoon sessions
Jan-26 (Mon)
Threshold Schnorr/EdDSA
Threshold BLS and Security
Jan-27 (Tue)
Threshold ECDSA (and others)
Threshold Homomorphic Encryption
Jan-28 (Wed)
Threshold Ciphers and Hashing
Threshold Lattice-based Sign/KEM
Jan-29 (Thu)
Threshold Isogeny/Code/MV-based Sign/KEM
Zero-Knowledge Proofs
Others
Others
Note: The detailed schedule will appear mid-January 2026.
Quick links (MPTS 2026): Call for talks (PDF file); Talk proposal form (PDF file); Registration page (ZoomGov);
The NIST Workshop on Multi-Party Threshold Schemes (MPTS) 2026 will bring together multiple perspectives on Threshold Cryptography, in a learning and collaborative environment. The 4-day virtual workshop is organized within the scope of the NIST Multi-Party Threshold Cryptography (MPTC) project, to gather insights about the state of the art. In scope are topics related to the specification, implementation, analysis, and deployment of threshold schemes (and threshold-friendly primitives). The event will include invited and externally-proposed talks, including “previews” of upcoming submissions in reply to the NIST Threshold Call.
MPTS 2026 welcomes proposals of talks related to Threshold Cryptography, including about any of the following topics:
Threshold security. Security formulation (e.g., simulatable, game-based), analysis, and provability. Security against adaptive corruptions. Proactive security. Suitability of cryptographic and/or idealized assumptions (e.g., ROM, AGM, GGM) and conjectures. Consequences of (non-ideal) real instantiation of idealized components. Relevant security properties.
Systematization of knowledge. Techniques, applications, and related context, about any topic of relevance within the scope of the NIST Threshold Call, including multi-party computation (MPC), zero-knowledge proofs (ZKP), fully-homomorphic encryption (FHE), threshold-friendly cryptographic primitives (e.g., key-generation, signatures, encryption/decryption, hashing) and their corresponding threshold schemes.
Need and adoptability. Application use cases (fulfilled, urgent, emerging, envisioned). Pertinent setup assumptions, threshold profiles (§C.3), and threshold interfaces (§C.4).
Concrete threshold schemes. Novel schemes (e.g., with new assumptions, lower number of rounds, better results in a metric of interest) and older pertinent schemes.
Special properties. Relation between threshold capabilities and other properties, such as succinctness, FHE/ZKP-friendliness, blinding, aggregation, batching.
Building blocks and networking. Garbled circuits, oblivious transfer, useful commitment schemes, vector oblivious linear evaluation, broadcast, consensus, etc. See §10.7 and §C.1.2 of NISTIR 8214C 2pd.
Implementation, testing, validation, certification. Criteria and techniques for validation/verification of implementations of threshold schemes. Test vectors and reproducibility challenges when testing distributed systems, and/or floating-point operations. Formal methods. Certification profiles.
Quantum resistance/vulnerability. Threshold schemes for PQC primitives. Pairing-based threshold schemes. Examples, challenges, advantages and other differences between quantum-resistant and quantum-vulnerable solutions. Levels of security strength.
Development, education, standardization and other community efforts. Perspectives on efforts related to techniques in scope of the NIST Threshold Call, including FHE, MPC, threshold schemes, ZKP, and useful building blocks.
The NIST Threshold Call (NISTIR 8214C 2pd) establishes a phase of "Previews", designed for prospective teams to present their plans for an upcoming package submission. A preview requires publication of a "Preview Writeup" and giving a "Preview Talk":
"Preview Writeup": To be prepared using a latex template [.ZIP], [.PDF]
Attendance Type:Open to public Audience Type:Industry, Government, Academia, Other Sponsors:Hosted by the Multi-party Threshold Cryptography (MPTC) project at NIST