Chelsea Komlo (@chelseakomlo) 's Twitter Profile
Chelsea Komlo

@chelseakomlo

(Real world) cryptographer. Also at chelseakomlo.bsky.social

ID: 42920448

linkhttps://chelseakomlo.com calendar_today27-05-2009 16:42:11

4,4K Tweet

6,6K Followers

568 Following

Chelsea Komlo (@chelseakomlo) 's Twitter Profile Photo

Happy to share a new paper by myself and co-authors Elizabeth Crites and Mary Maller. We investigate the feasibility of proving adaptive security for a large class of (well-known) threshold signatures that we refer to as “key-unique”. eprint.iacr.org/2025/943

ncklr (@n1ckler) 's Twitter Profile Photo

Using FROST for t-of-n wallets is powerful, but the Distributed Key Generation (DKG) part has been notoriously difficult to implement securely. My talk at Real World Crypto 2025 presents Blockstream Research's draft ChillDKG BIP as a ready-to-implement solution.

Using FROST for t-of-n  wallets is powerful, but the Distributed Key Generation (DKG) part has been notoriously difficult to implement securely.

My talk at Real World Crypto 2025 presents <a href="/blksresearch/">Blockstream Research</a>'s draft ChillDKG BIP as a ready-to-implement solution.
Chaincode Labs (@chaincodelabs) 's Twitter Profile Photo

Nominations are open for the 2025 Bitcoin Research Prize! Submit papers that made an impact on Bitcoin or Lightning published after 2021: forms.gle/9fo6wUtQ5iaWtQ… Here is the talk by last year’s winners ncklr & Chelsea Komlo --> youtu.be/9j1smRr_Ebc

Chelsea Komlo (@chelseakomlo) 's Twitter Profile Photo

I had so much fun and it was an honor to give this acceptance talk for the Bitcoin research prize last year, alongside ncklr! It’s amazing to see how Bitcoin’s development is progressing including with MuSig2/FROST.

Ariel Gabizon (@rel_zeta_tech) 's Twitter Profile Photo

An irritated rant: There's a million snark papers out there with some variant of - split your witness into a matrix, commit separately to each row, and then you can get various proof size verifier time tradeoffs for inner product, maybe by also doing it recursively. The original

Sean Bowe (@ebfull) 's Twitter Profile Photo

Anonymity isn't about taking elaborate means to obfuscate your actions, it's just people doing the least to distinguish themselves from each other. Security by obscurity not only doesn't help but it can even cause you to stand out more.

Chelsea Komlo (@chelseakomlo) 's Twitter Profile Photo

And generally start caring after something bad has happened that would have been prevented by decentralization and/or better security (I.e, the emergence of threshold signatures after Mt. Gox).