Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Multi-Party Threshold Cryptography MPTC

Reference Material Submitted to the NIST Threshold Call

This page organizes documentation related to the NIST First Call for Multi-Party Threshold Schemes [NIST IR 8214C] (2026).

The technical scope is organized across two classes — Class N (NIST-specified primitives) and Class S (Special primitives not specified by NIST) — each with various categories of crypto-systems, as follows:

  Sign PKE Symm KeyGen FHE ZKPoK Gadgets
Class N N1 N2 N3 N4      
Class S S1 S2 S3 S4 S5 S6 S7

The NIST Threshold Call considers a Previews phase (including three opportunities/rounds) and a Packages phase. More details can be found further below, in the container "Phases of the Process". Participation in the Previews phase is a requirement for a subsequent participation in the Packages phase.

The submission of Preview Writeups needs to follow the provided LaTeX Template, and take in consideration the set of preview writeups posted in the previous round(s). Submitted Preview Writeups may be subject to revision recommendations and their full consideration also depends on a corresponding Preview Talk.

The first phase of previews gathered 26 Preview Writeups (PW) from 23 distinct teams, as listed in the table below. The union of the teams includes 185 authors. The corresponding Preview Talks (PT) were hosted at MPTS 2026 (NIST Workshop on Multi-Party Threshold Schemes). The Preview Writeups can be updated across time (see date in column "Preview Writeup").

Legend: [PW] = [Preview Writeup (link to file)]; [PT] = [Preview Talk (link to webpage)]. |⁠Team⁠| = Number of team members.

# Team

Categories

|⁠Team⁠|   Crypto-systems (hint)

Preview
Writeup

Preview
Talk

Patents *
1 Amber S2 4 Amber (Threshold Lattice-based KEM) [PW] [3b5] Yes
2 BBDL S1 4 tBLS (Threshold BLS Sign) [PW] [1b1]  
3 BDLR N1 4 Gargos (Threshold Schnorr Sign) [PW] [1a4]  
4 BICYCCLIST N1 7

TECLA (2-party Threshold ECDSA)

[PW] [2a3]  
5 N1 7 THE-CLASH (n-party Threshold ECDSA) [PW]
6 Fireblocks-3MI N1, N4 7 Classic Schnorr (Threshold Schnorr Sign) [PW] [1a3]  
7 N1, N4 7 BAM (2-party ECDSA) [PW] [2a2]  
8 N1, N4, S2, S7 7 CCGMP (n-party ECDSA) and gadgets [PW]
9 FROST N1 12 FROST (Threshold Schnorr Sign) [PW] [1a1]  
10 Haystack N1 3 Haystack (Threshold HBS) [PW] [3a6]  
11 Hermine S1, S4 8 Hermine (Threshold Sign) [Lattice-based] [PW] [3b3]  
12 LEAST S1, S4 9 LEAST (Threshold Sign) [from code-based group-actions] [PW] [4a3]  
13 Mithril N1, N4 6 Mithril (Threshold ML-DSA) [PW] [3b7] Yes
14 MPC MINIons N3, S3, S7 14 MiniMPC (Threshold AES+SHA+MAC) and gadgets (inc. OT and garbling) [PW] [3a2] [3a3]  
15 PANTHERIA S5 26 FHE (RLWE-based) and Threshold FHE [PW] [2b5] Yes
16 PiVer S7 10 PiVer (Verifiable Secret Sharing) [PW] [4b2]  
17 PQarrots S1, S2, S4 31 Macaw (Threshold Signature), Kea (Threhold PKE), Kakapo (SKG) (from Isogeny-based Group Actions) [PW] (Jan-30) [4a1]  
18 Quorus N1, N4 5 Quorus (Threshold ML-DSA) [PW] [3b6]  
19 RedETA N1, N4 6 RedETA signatures (Threshold ECDLP-based Signatures) [PW] [2a4] Yes
20 Schmivitz S6, S7 8 VOLEith-based ZKPoK [PW] [4c1]  
21 SmallWood S6 2 SmallWood (hash-based ZKPoK) [PW] [4c2]  
22 SplitForge N1, S2, N4 10 SplitKey (Server-assisted threshold signatures and PKE) [PW] [2a5]  
23 Symphony N3, S7 4 Maestro (T-AES), SHArp (T-SHA), MACnifico (T-MAC) and gadgets (inc one-hot vectors) [PW] [3a5]  
24 Tanuki S1 12 Tanuki (Threshold Lattice-based Signature) [PW] [3b2] Yes
25 Vinaigrette S1, S4 9 Threshold UOV+MAYO Signatures (Multivariate-based) [PW] [4a4]  
26 Zama S4, S5, S6 13 TFHE (Torus), ZHEnith (ZKP), Nexus (Threshold FHE) [PW] [2b3] Yes

* The column "Patents" shows "Yes" for the "Preview Writeups" that indicated there are patents whose claims may apply to the proposed crypto-systems. The upcoming package submission requires a "Notes on Patent Claims" document with more detail.

Prospective teams (interested in an upcoming future submission, and not having submitted a Preview Writeup within the 1st round) are encouraged to submit to NIST-MPTC a Preview Writeup by 2026-apr-20, for consideration within the 2nd round of previews.

Before an actual package submission, each prospective team needs to submit a "Preview Writeup" (plan of upcoming package submission) and (if accepted) present a "Preview Talk". For consideration within the 3rd round of previews, teams should submit their preview writeup by 2026-jun-22.

[To appear: Each package will include Technical Specification, Open-Source Reference Implementation, Report on Experimental Evaluation, Notes in Patent Claims]

The submission of packages will be handled after the phase of previews.

The latex template for Technical Specification, Report on Experimental Evaluation, and Notes in Patent Claims is expected to be made available in February 2026, following the structure outlined in the NIST Threshold Call.

 Additional Context

The NIST-MPTC project collects reference materials on advanced cryptography (including threshold schemes, FHE and ZKP). In particular, the NIST Threshold Call (NIST IR 8214C) motivates the community of cryptography experts to submit threshold schemes and other primitives in scope, to form a public body of reference material. The analysis of submitted crypto-systems will support future recommendations for subsequent processes, which may include development of technical recommendations.

IR 8214C publication (Final, Drafts, Public Feedback)

  • 2026-Jan-20: NISTIR 8214C — NIST First Call for Multi-Party Threshold Schemes (final version). See the publication page.
  • 2025-Mar-27: NISTIR 8214C 2pd — NIST First Call for Multi-Party Threshold Schemes (Second Public Draft). See the publication page.
  • 2023-Sep-26–28: NIST workshop on Multi-Party Threshold Schemes (MPTS 2023), focused on the topics of the Threshold Call. All presentations are available online.
  • 2023-Jan-25: NISTIR 8214C ipd — NIST First Call for multi-party threshold schemes (initial public draft). The publication page shows the period of public comments (open until 2023-April-10). There is a compilation of public comments (see PDF file)
  • 2021-Jul-02: Call 2021a for Feedback on Criteria for Threshold Schemes (see PDF file). There is a compilation of public comments (see PDF file).
  • Other related publications: NIST IR 8214, NIST IR 8214A, NIST IR 8214B ipd

Selected notes of updates in the final version (as compared to the second public draft):

  • Indexed list of requirements
  • Refinement of the preview phases (increasing from 2 to 3) and timelines
  • Refined description of the structure of expected components (Technical Specification, Reference Implementation, Report on Experimental Evaluation, Notes of Patent Claims)
  • Expansion of the allowed set of open-source licenses
  • Overall editorial improvement across the document

Selected notes of updates in the Second Public Draft (as compared to the initial public draft):

  • New indexation of categories: N1...N4 (instead of old C1.1...C1.5); S1...S7 (instead of old C2.1...C2.8).
  • Categories N1 (old C1.1) and N2 (old C.1.2) include primitives from the recent NIST-PQC standards.
  • Category N3 (old C1.4) includes primitives from the upcoming NIST Lightweight Cryptography (Ascon-based) standard.
  • Category S5 (old C2.6) narrowed the scope, becoming focused on FHE.
  • The KeyGen categories (N4, S4) now also include the scope of the old subcategories about key-establishment (C1.3, C2.3).

The Threshold Call organizes its technical scope into categories.

The primitives in scope are organized into multiple categories, across two classes:

  • Class N: NIST-specified primitives
  • Class S: Special primitives not specified by NIST
  Sign PKE Symm KeyGen FHE ZKPoK Gadgets
Class N N1 N2 N3 N4      
Class S S1 S2 S3 S4 S5 S6 S7

Class N (related to NIST Standardized schemes/primitives)

Table 1. Categories of interest in Class N

Category: Type Families of specifications

Sections (in the call)

N1: Signing

[PreQ] EdDSA sign; ECDSA sign; RSADSA sign

[QR stateless] ML-DSA sign; SLH-DSA sign

[QR stateful]: XMSS sign; LMS sign

10.1, A.1
N2: PKE

[PreQ] RSA encryp & decrypt

[QR] K-PKE (from ML-KEM) encrypt & decrypt

10.2, A.2
N3: Symmetric

Ciphers: AES encipher/decipher, ASCON-AEAD encrypt/decrypt

Hash and XOF: functions from SHA2, SHA3, SHAKE, ASCON

MAC: C/H/K-MAC

10.3, A.3
N4: Keygen (aka DKG)

ECC keygen; ECC-CDH & ECC-MQV primitives

RSA keygen; bitstring keygen

QR keygen for ML, SLH, and stateful-HBS

10.4, A.4

Legend: 2KA = pair-wise key-agreement; AES = Advanced Encryption Standard; CDH = Cofactor Diffie-Hellman; DKG = Distributed key-generation. ECC = Elliptic-curve cryptography; ECDSA = Elliptic-curve Digital Signature Algorithm; EdDSA = Edwards-Curve Digital Signature Algorithm; KC = Key confirmation; KDM = Key derivation mechanism; Keygen = Key-generation; ML = Module Lattice (based). MQV = Menezes-Qu-Vanstone; PKE = Public-key encryption; PQC = Post-Quantum Cryptography. PreQ = pre-quantum; QR = quantum resistant; RSA = Rivest-Shamir-Adleman; RSADSA = RSA digital signature algorithm; stfl-HBS = stateful hash-based signatures.

Note: This table reflects the categories in NISTIR 8214C 2pd (mar-2025). The initial public draft (jan-2023) had a different organization.

Class S (related to other "Special" primitives/schemes)

Table 2. Subcategories and examples of primitives in Class S

Category: Type Example related schemes Example primitive
S1: Signing TF succinct & verifiable-deterministic signatures; TF-PQ signatures Sign
S2: PKE TF-PQ public-key encryption (PKE) Sign
S4: Symmetric

TF cipher/PRP, TF PRF/MAC, hash/XOF

Decrypt, Encrypt (a secret value), TagGen, hash

S5: Keygen Any of the above or below (inc. non-PKE primitives for key-establishment) KeyGen
S5: FHE Fully-homomorphic encryption (FHE) Decryption; keyGen
S6: ZKPoK ZKPoK of private key ZKPoK.Generate
S7: Gadgets Garbled circuit (GC) GC.generate; GC.evaluate

TF-PQ is a desired combination for any type of scheme; some examples show just TF to emphasize that it is welcome even if not PQ.

Legend:  Keygen = key-generation; PKE = Public-key encryption; PRF = pseudorandom function (family); PRP = pseudorandom permutation (family); PQ = post-quantum (i.e., quantum resistant); TagGen = Tag generation. TF = threshold friendly; XOF = eXtendable output function. ZKPoK = Zero-knowledge proof of knowledge.

Note: This table reflects the categories in NISTIR 8214C 2pd (mar-2025). The initial public draft (jan-2023) had a different organization: class S was category 2; categories N1...N7 were subcategories C2.1...C2.8. Category S5 is now focused on FHE (whereas the previous C2.6 was more open-ended to special types of encryption).

The NIST Threshold Call establishes a phase of "Previews" (for presentation of plans of upcoming submissions) before the actual deadline for submitting "Packages". Each future package will include a Technical Specification, an open-source Reference Implementation, a Report on Experimental Evaluation. Additionally, each package submission requires disclosure of known applicable patent claims associated with the team members.

Previews (Plans of Upcoming Package Submissions)

As a condition for an upcoming package submission, teams have to participate in at least one of three (3) expected "Preview" subphases (a.k.a. rounds or opportunities). In each preview opportunity, teams can submit "Preview Writeups". After a brief process of review by NIST-MPTC, which may include request for editorial revision, accepted preview writeups will be posted online, and then be followed by corresponding "Preview Talks" in a public session. After each session of Preview Talks, NIST-MPTC will also set a period for teams to revise their Preview Writeups, taking into account possible received feedback. In any case, teams can also participate in subsequent preview opportunities for further update of their plans.

Packages with Crypto-Systems

The submission of packages will be handled after the phase of previews. Each package will include Technical Specification, Reference Implementation, Report on Experimental Evaluation, and Notes in Patent Claims.

 

Contacts

Multi-Party Threshold Cryptography (MPTC) Project
[email protected]

Luís T. A. N. Brandão - NIST/Strativia
[email protected]

Michael Davidson - NIST

René Peralta - NIST

Dustin Moody - NIST

Created July 26, 2018, Updated March 02, 2026