REFERENCES
1. Yue K, Zhang Y, Chen Y, et al. A survey of decentralizing applications via blockchain: the 5G and beyond perspective. IEEE Commun Surv Tutorials. 2021;23:2191-217.
2. Zheng P, Jiang Z, Wu J, Zheng Z. Blockchain-based decentralized application: A survey. IEEE Open J Comput Soc. 2023;4:121-33.
3. Nakamoto S. Bitcoin: a peer-to-peer electronic cash system. Satoshi Nakamoto 2008. Available from: https://bitcoin.org/bitcoin.pdf. [Last accessed on 12 Dec 2024].
4. Houy S, Schmid P, Bartel A. Security aspects of cryptocurrency wallets—a systematic literature review. ACM Comput Surv. 2023;56:1-31.
5. Gennaro R, Goldfeder S, Narayanan A. Threshold-optimal DSA/ECDSA signatures and an application to bitcoin wallet security. In: Applied Cryptography and Network Security: 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings 14. Springer; 2016. pp. 156–74.
6. Gennaro R, Jarecki S, Krawczyk H, Rabin T. Robust threshold DSS signatures. In: Advances in Cryptology—EUROCRYPT'96: International Conference on the Theory and Application of Cryptographic Techniques Saragossa, Spain, May 12–16, 1996 Proceedings 15. Springer; 1996. pp. 354–71.
7. Lindell Y, Nof A. Fast secure multiparty ECDSA with practical distributed key generation and applications to cryptocurrency custody. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security; 2018. pp. 1837–54.
8. Gennaro R, Goldfeder S. Fast multiparty threshold ECDSA with fast trustless setup. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security; 2018. pp. 1179–94.
9. Zhang H, Xie G, Zou X, et al. Asynchronous threshold ECDSA with batch processing. IEEE Trans Comput Soc Syst. 2023;11:566-75.
10. Xue H, Au MH, Liu M, et al. Efficient multiplicative-to-additive function from Joye-Libert cryptosystem and its application to threshold ECDSA. In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security; 2023. pp. 2974–88.
12. Castagnos G, Catalano D, Laguillaumie F, Savasta F, Tucker I. Bandwidth-efficient threshold EC-DSA. In: IACR International Conference on Public-Key Cryptography. Springer; 2020. pp. 266–96.
13. Lindell Y. Fast secure two-party ECDSA signing. In: Advances in Cryptology–CRYPTO 2017: 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20–24, 2017, Proceedings, Part Ⅱ 37. Springer; 2017. pp. 613–44.
14. Doerner J, Kondi Y, Lee E, Shelat A. Secure two-party threshold ECDSA from ECDSA assumptions. In: 2018 IEEE Symposium on Security and Privacy (SP). IEEE; 2018. pp. 980–97.
15. Tu B, Chen Y, Cui H, Wang X. Fast two-party signature for upgrading ECDSA to two-party scenario easily. Theor Comput Sci. 2024;986:114325.
17. Paillier P. Public-key cryptosystems based on composite degree residuosity classes. In: International conference on the theory and applications of cryptographic techniques. Springer; 1999. pp. 223–38.
18. Castagnos G, Laguillaumie F, Tucker I. Practical fully secure unrestricted inner product functional encryption modulo p. In: International Conference on the Theory and Application of Cryptology and Information Security. Springer; 2018. pp. 733–64.
20. Herzberg A, Jarecki S, Krawczyk H, Yung M. Proactive secret sharing or: How to cope with perpetual leakage. In: Advances in Cryptology—CRYPT0'95: 15th Annual International Cryptology Conference Santa Barbara, California, USA, August 27–31, 1995 Proceedings 15. Springer; 1995. pp. 339–52.
21. Aumasson JP, Hamelink A, Shlomovits O. A survey of ECDSA threshold signing. Cryptology ePrint Arch 2020. Available from: https://eprint.iacr.org/2020/1390. [Last accessed on 12 Dec 2024].
22. Gągol A, Kula J, Straszak D, Świętek M. Threshold ECDSA for decentralized asset custody. Cryptology ePrint Arch 2020. Available from: https://ia.cr/2020/498. [Last accessed on 12 Dec 2024].
23. Gennaro R, Goldfeder S. One round threshold ECDSA with identifiable abort. Cryptology ePrint Arch 2020. Available from: https://ia.cr/2020/540. [Last accessed on 12 Dec 2024].
24. Ratings M. How DePINs could build the future of physical infrastructure one token at a time. 2024. Available from: https://www.moodys.com. [Last accessed on 12 Dec 2024].