This page organizes documentation related to the NIST First Call for Multi-Party Threshold Schemes [NIST IR 8214C] (2026).
The technical scope is organized across two classes — Class N (NIST-specified primitives) and Class S (Special primitives not specified by NIST) — each with various categories of crypto-systems, as follows:
| Sign | PKE | Symm | KeyGen | FHE | ZKPoK | Gadgets | |
|---|---|---|---|---|---|---|---|
| Class N | N1 | N2 | N3 | N4 | |||
| Class S | S1 | S2 | S3 | S4 | S5 | S6 | S7 |
The NIST Threshold Call considers a Previews phase (including three opportunities/rounds) and a Packages phase. More details can be found further below, in the container "Phases of the Process". Participation in the Previews phase is a requirement for a subsequent participation in the Packages phase.
The submission of Preview Writeups needs to follow the provided LaTeX Template, and take in consideration the set of preview writeups posted in the previous round(s). Submitted Preview Writeups may be subject to revision recommendations and their full consideration also depends on a corresponding Preview Talk.
The first phase of previews gathered 26 Preview Writeups (PW) from 23 distinct teams, as listed in the table below. The union of the teams includes 185 authors. The corresponding Preview Talks (PT) were hosted at MPTS 2026 (NIST Workshop on Multi-Party Threshold Schemes). The Preview Writeups can be updated across time (see date in column "Preview Writeup").
Legend: [PW] = [Preview Writeup (link to file)]; [PT] = [Preview Talk (link to webpage)]. |Team| = Number of team members.
| # | Team |
Categories |
|Team| | Crypto-systems (hint) |
Preview |
Preview |
Patents * |
| 1 | Amber | S2 | 4 | Amber (Threshold Lattice-based KEM) | [PW] | [3b5] | Yes |
| 2 | BBDL | S1 | 4 | tBLS (Threshold BLS Sign) | [PW] | [1b1] | |
| 3 | BDLR | N1 | 4 | Gargos (Threshold Schnorr Sign) | [PW] | [1a4] | |
| 4 | BICYCCLIST | N1 | 7 |
TECLA (2-party Threshold ECDSA) |
[PW] | [2a3] | |
| 5 | N1 | 7 | THE-CLASH (n-party Threshold ECDSA) | [PW] | |||
| 6 | Fireblocks-3MI | N1, N4 | 7 | Classic Schnorr (Threshold Schnorr Sign) | [PW] | [1a3] | |
| 7 | N1, N4 | 7 | BAM (2-party ECDSA) | [PW] | [2a2] | ||
| 8 | N1, N4, S2, S7 | 7 | CCGMP (n-party ECDSA) and gadgets | [PW] | |||
| 9 | FROST | N1 | 12 | FROST (Threshold Schnorr Sign) | [PW] | [1a1] | |
| 10 | Haystack | N1 | 3 | Haystack (Threshold HBS) | [PW] | [3a6] | |
| 11 | Hermine | S1, S4 | 8 | Hermine (Threshold Sign) [Lattice-based] | [PW] | [3b3] | |
| 12 | LEAST | S1, S4 | 9 | LEAST (Threshold Sign) [from code-based group-actions] | [PW] | [4a3] | |
| 13 | Mithril | N1, N4 | 6 | Mithril (Threshold ML-DSA) | [PW] | [3b7] | Yes |
| 14 | MPC MINIons | N3, S3, S7 | 14 | MiniMPC (Threshold AES+SHA+MAC) and gadgets (inc. OT and garbling) | [PW] | [3a2] [3a3] | |
| 15 | PANTHERIA | S5 | 26 | FHE (RLWE-based) and Threshold FHE | [PW] | [2b5] | Yes |
| 16 | PiVer | S7 | 10 | PiVer (Verifiable Secret Sharing) | [PW] | [4b2] | |
| 17 | PQarrots | S1, S2, S4 | 31 | Macaw (Threshold Signature), Kea (Threhold PKE), Kakapo (SKG) (from Isogeny-based Group Actions) | [PW] (Jan-30) | [4a1] | |
| 18 | Quorus | N1, N4 | 5 | Quorus (Threshold ML-DSA) | [PW] | [3b6] | |
| 19 | RedETA | N1, N4 | 6 | RedETA signatures (Threshold ECDLP-based Signatures) | [PW] | [2a4] | Yes |
| 20 | Schmivitz | S6, S7 | 8 | VOLEith-based ZKPoK | [PW] | [4c1] | |
| 21 | SmallWood | S6 | 2 | SmallWood (hash-based ZKPoK) | [PW] | [4c2] | |
| 22 | SplitForge | N1, S2, N4 | 10 | SplitKey (Server-assisted threshold signatures and PKE) | [PW] | [2a5] | |
| 23 | Symphony | N3, S7 | 4 | Maestro (T-AES), SHArp (T-SHA), MACnifico (T-MAC) and gadgets (inc one-hot vectors) | [PW] | [3a5] | |
| 24 | Tanuki | S1 | 12 | Tanuki (Threshold Lattice-based Signature) | [PW] | [3b2] | Yes |
| 25 | Vinaigrette | S1, S4 | 9 | Threshold UOV+MAYO Signatures (Multivariate-based) | [PW] | [4a4] | |
| 26 | Zama | S4, S5, S6 | 13 | TFHE (Torus), ZHEnith (ZKP), Nexus (Threshold FHE) | [PW] | [2b3] | Yes |
* The column "Patents" shows "Yes" for the "Preview Writeups" that indicated there are patents whose claims may apply to the proposed crypto-systems. The upcoming package submission requires a "Notes on Patent Claims" document with more detail.
Before an actual package submission, each prospective team needs to submit a "Preview Writeup" (plan of upcoming package submission) and (if accepted) present a "Preview Talk". For consideration within the 3rd round of previews, teams should submit their preview writeup by 2026-jun-22.
[To appear: Each package will include Technical Specification, Open-Source Reference Implementation, Report on Experimental Evaluation, Notes in Patent Claims]
The submission of packages will be handled after the phase of previews.
The latex template for Technical Specification, Report on Experimental Evaluation, and Notes in Patent Claims is expected to be made available in February 2026, following the structure outlined in the NIST Threshold Call.
The NIST-MPTC project collects reference materials on advanced cryptography (including threshold schemes, FHE and ZKP). In particular, the NIST Threshold Call (NIST IR 8214C) motivates the community of cryptography experts to submit threshold schemes and other primitives in scope, to form a public body of reference material. The analysis of submitted crypto-systems will support future recommendations for subsequent processes, which may include development of technical recommendations.
Selected notes of updates in the final version (as compared to the second public draft):
Selected notes of updates in the Second Public Draft (as compared to the initial public draft):
The Threshold Call organizes its technical scope into categories.
The primitives in scope are organized into multiple categories, across two classes:
| Sign | PKE | Symm | KeyGen | FHE | ZKPoK | Gadgets | |
|---|---|---|---|---|---|---|---|
| Class N | N1 | N2 | N3 | N4 | |||
| Class S | S1 | S2 | S3 | S4 | S5 | S6 | S7 |
Table 1. Categories of interest in Class N
| Category: Type | Families of specifications |
Sections (in the call) |
|---|---|---|
| N1: Signing |
[PreQ] EdDSA sign; ECDSA sign; RSADSA sign |
10.1, A.1 |
| N2: PKE |
[PreQ] RSA encryp & decrypt [QR] K-PKE (from ML-KEM) encrypt & decrypt |
10.2, A.2 |
| N3: Symmetric |
Ciphers: AES encipher/decipher, ASCON-AEAD encrypt/decrypt |
10.3, A.3 |
| N4: Keygen (aka DKG) |
ECC keygen; ECC-CDH & ECC-MQV primitives RSA keygen; bitstring keygen QR keygen for ML, SLH, and stateful-HBS |
10.4, A.4 |
Legend: 2KA = pair-wise key-agreement; AES = Advanced Encryption Standard; CDH = Cofactor Diffie-Hellman; DKG = Distributed key-generation. ECC = Elliptic-curve cryptography; ECDSA = Elliptic-curve Digital Signature Algorithm; EdDSA = Edwards-Curve Digital Signature Algorithm; KC = Key confirmation; KDM = Key derivation mechanism; Keygen = Key-generation; ML = Module Lattice (based). MQV = Menezes-Qu-Vanstone; PKE = Public-key encryption; PQC = Post-Quantum Cryptography. PreQ = pre-quantum; QR = quantum resistant; RSA = Rivest-Shamir-Adleman; RSADSA = RSA digital signature algorithm; stfl-HBS = stateful hash-based signatures.
Note: This table reflects the categories in NISTIR 8214C 2pd (mar-2025). The initial public draft (jan-2023) had a different organization.
Table 2. Subcategories and examples of primitives in Class S
| Category: Type | Example related schemes | Example primitive |
|---|---|---|
| S1: Signing | TF succinct & verifiable-deterministic signatures; TF-PQ signatures | Sign |
| S2: PKE | TF-PQ public-key encryption (PKE) | Sign |
| S4: Symmetric |
TF cipher/PRP, TF PRF/MAC, hash/XOF |
Decrypt, Encrypt (a secret value), TagGen, hash |
| S5: Keygen | Any of the above or below (inc. non-PKE primitives for key-establishment) | KeyGen |
| S5: FHE | Fully-homomorphic encryption (FHE) | Decryption; keyGen |
| S6: ZKPoK | ZKPoK of private key | ZKPoK.Generate |
| S7: Gadgets | Garbled circuit (GC) | GC.generate; GC.evaluate |
TF-PQ is a desired combination for any type of scheme; some examples show just TF to emphasize that it is welcome even if not PQ.
Legend: Keygen = key-generation; PKE = Public-key encryption; PRF = pseudorandom function (family); PRP = pseudorandom permutation (family); PQ = post-quantum (i.e., quantum resistant); TagGen = Tag generation. TF = threshold friendly; XOF = eXtendable output function. ZKPoK = Zero-knowledge proof of knowledge.
Note: This table reflects the categories in NISTIR 8214C 2pd (mar-2025). The initial public draft (jan-2023) had a different organization: class S was category 2; categories N1...N7 were subcategories C2.1...C2.8. Category S5 is now focused on FHE (whereas the previous C2.6 was more open-ended to special types of encryption).
The NIST Threshold Call establishes a phase of "Previews" (for presentation of plans of upcoming submissions) before the actual deadline for submitting "Packages". Each future package will include a Technical Specification, an open-source Reference Implementation, a Report on Experimental Evaluation. Additionally, each package submission requires disclosure of known applicable patent claims associated with the team members.
As a condition for an upcoming package submission, teams have to participate in at least one of three (3) expected "Preview" subphases (a.k.a. rounds or opportunities). In each preview opportunity, teams can submit "Preview Writeups". After a brief process of review by NIST-MPTC, which may include request for editorial revision, accepted preview writeups will be posted online, and then be followed by corresponding "Preview Talks" in a public session. After each session of Preview Talks, NIST-MPTC will also set a period for teams to revise their Preview Writeups, taking into account possible received feedback. In any case, teams can also participate in subsequent preview opportunities for further update of their plans.
The submission of packages will be handled after the phase of previews. Each package will include Technical Specification, Reference Implementation, Report on Experimental Evaluation, and Notes in Patent Claims.
Security and Privacy: digital signatures, encryption, key management, message authentication, post-quantum cryptography, secure hashing
Activities and Products: standards development