Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

MPTS 2026: NIST Workshop on Multi-Party Threshold Schemes 2026

  • Workshop dates and place: January 26–29, fully virtual.
  • Attendance: Attendance is free, but requires online registration
  • Daily schedule: To be announced in early January
  • Call for talks (explaining two types of talks):
    •  Regular talk: Submit by September 10 (general contribution talk) 
    • "Preview talk": Submit by 2026-Jan-12 (previously 2025-Nov-03) (in scope of the Threshold Call).

Note: "Preview Talks" relate to "Preview Writeups" (.ZIP, .PDF) submitted to MPTC-submissions (at) list (dot) nist (dot) gov.

The workshop was previously planned as MPTS 2025 (Nov 1720). It was later rescheduled as MPTS 2026 (Jan 26–29).

Tentative list of workshop sessions:

  Day     Morning sessions     Afternoon sessions  
 Jan-26 (Mon)   Threshold Schnorr/EdDSA   Threshold BLS and Security 
 Jan-27 (Tue)   Threshold ECDSA (and others)   Threshold Homomorphic Encryption 
 Jan-28 (Wed)   Threshold Ciphers and Hashing   Threshold Lattice-based Sign/KEM 
 Jan-29 (Thu)   Threshold Isogeny/Code/MV-based Sign/KEM   Zero-Knowledge Proofs 
 Others   Others 

Note: The detailed schedule will appear mid-January 2026.

Quick links (MPTS 2026): Call for talks (PDF file); Talk proposal form (PDF file); Registration page (ZoomGov); 

The NIST Workshop on Multi-Party Threshold Schemes (MPTS) 2026 will bring together multiple perspectives on Threshold Cryptography, in a learning and collaborative environment. The 4-day virtual workshop is organized within the scope of the NIST Multi-Party Threshold Cryptography (MPTC) project, to gather insights about the state of the art. In scope are topics related to the specification, implementation, analysis, and deployment of threshold schemes (and threshold-friendly primitives). The event will include invited and externally-proposed talks, including “previews” of upcoming submissions in reply to the NIST Threshold Call.

MPTS 2026 welcomes proposals of talks related to Threshold Cryptography, including about any of the following topics:

  1. Threshold security. Security formulation (e.g., simulatable, game-based), analysis, and provability. Security against adaptive corruptions. Proactive security. Suitability of cryptographic and/or idealized assumptions (e.g., ROM, AGM, GGM) and conjectures. Consequences of (non-ideal) real instantiation of idealized components. Relevant security properties.
  2. Systematization of knowledge. Techniques, applications, and related context, about any topic of relevance within the scope of the NIST Threshold Call, including multi-party computation (MPC), zero-knowledge proofs (ZKP), fully-homomorphic encryption (FHE), threshold-friendly cryptographic primitives (e.g., key-generation, signatures, encryption/decryption, hashing) and their corresponding threshold schemes.
  3. Need and adoptability. Application use cases (fulfilled, urgent, emerging, envisioned). Pertinent setup assumptions, threshold profiles (§C.3), and threshold interfaces (§C.4).
  4. Concrete threshold schemes. Novel schemes (e.g., with new assumptions, lower number of rounds, better results in a metric of interest) and older pertinent schemes.
  5. Special properties. Relation between threshold capabilities and other properties, such as succinctness, FHE/ZKP-friendliness, blinding, aggregation, batching.
  6. Building blocks and networking. Garbled circuits, oblivious transfer, useful commitment schemes, vector oblivious linear evaluation, broadcast, consensus, etc. See §10.7 and §C.1.2 of NISTIR 8214C 2pd.
  7. Implementation, testing, validation, certification. Criteria and techniques for validation/verification of implementations of threshold schemes. Test vectors and reproducibility challenges when testing distributed systems, and/or floating-point operations. Formal methods. Certification profiles.
  8. Quantum resistance/vulnerability. Threshold schemes for PQC primitives. Pairing-based threshold schemes. Examples, challenges, advantages and other differences between quantum-resistant and quantum-vulnerable solutions. Levels of security strength.
  9. Development, education, standardization and other community efforts. Perspectives on efforts related to techniques in scope of the NIST Threshold Call, including FHE, MPC, threshold schemes, ZKP, and useful building blocks.

The NIST Threshold Call (NISTIR 8214C 2pd) establishes a phase of "Previews", designed for prospective teams to present their plans for an upcoming package submission. A preview requires publication of a "Preview Writeup" and giving a "Preview Talk":

The MPTS 2026 workshop will include a track for "Preview Talks", related to the NIST Threshold Call (see NISTIR 8214C).

Participation in the workshop requires abiding by the Code of Conduct for NIST conferences

Contacts:
  • Questions or comments about MPTS 2026: mpts2026 (at) nist (dot) gov
  • Submission of Talk Proposals (regular and previews): mpts2025-submit (at) list (dot) nist (dot) gov (Using the official form)
  • Submission of Preview Writeups: mptc-submissions (at) list (dot) nist (dot) gov (There is a LaTeX template.)
  • Announcements: To receive announcements about the MPTC and PEC projects, subscribe to the MPTC-Forum and PEC-Forum

Event Details

Starts: January 26, 2026 - 09:00 AM EST
Ends: January 29, 2026 - 05:00 PM EST

Format: Virtual Type: Webinar

Register

Attendance Type: Open to public
Audience Type: Industry, Government, Academia, Other
Sponsors: Hosted by the Multi-party Threshold Cryptography (MPTC) project at NIST

Related Topics

Security and Privacy: cryptography

Created April 29, 2025, Updated January 13, 2026