Practical threshold elliptic curve cryptography from native assumptions