2025-11-02 –, Duck R212 Language: English
Secret key management remains demanding regardless of classical or post-quantum cryptographic algorithms. To help with this, threshold cryptography splits the secret key into multiple shares that can be stored and secured separately. Thus, even a complete device compromise does not allow the attacker to decrypt the user's private data or issue digital signatures on its behalf. Threshold variants of classical signature schemes, such as Schnorr or ECDSA, are actively researched and finding their way into practice, for example, in Bitcoin. To help users and developers discover threshold cryptography, the researchers and students from the Centre for Research on Cryptography and Security (CRoCS) from Masaryk University have developed MeeSign - an open-source platform for demonstrating threshold cryptography protocols. Check it out:
- MeeSign project homepage https://meesign.crocs.fi.muni.cz/
- MeeSign server https://github.com/crocs-muni/meesign-client
- MeeSign client https://github.com/crocs-muni/meesign-server
After a bachelor's in Mathematics at Masaryk University, I gained hands-on experience as an intern developer building custom software in the Netherlands. Fueled by the desire to learn how things (don't always) work, I got caught up in security and cryptography. I returned to pursue a master's degree in Information Technology Security. During COVID, I worked on security-related projects and as a bug bounty hunter. This again sparked interest in learning more about cryptography, ultimately ending with me enrolling in doctoral studies. I am a PhD student at CRoCS, focusing on threshold cryptography applications and dabbling in cryptography libraries and security devices testing. I like to run in my free time.