This is a potential security issue, you are being redirected to https://csrc.nist.gov.
Abstract: This talk will examine the methods to thresholdize the various DSA-based signature. With special emphasis on EdDSA and HashEdDSA. These are schemes in which the hash function required to produce a deterministic signature causes a particular problem for standard threshold methods.
Security and Privacy: cryptography