Dumbo-mvba: Optimal multi-valued validated asynchronous byzantine agreement, revisited

Y Lu, Z Lu, Q Tang, G Wang - Proceedings of the 39th symposium on …, 2020 - dl.acm.org
Multi-valued validated asynchronous Byzantine agreement (MVBA), proposed in the elegant
work of Cachin et al.(CRYPTO'01), is fundamental for critical fault-tolerant services such as …

Asynchronous data dissemination and its applications

S Das, Z **ang, L Ren - Proceedings of the 2021 ACM SIGSAC …, 2021 - dl.acm.org
In this paper, we introduce the problem of Asynchronous Data Dissemination (ADD).
Intuitively, an ADD protocol disseminates a message to all honest nodes in an …

Randpiper–reconfiguration-friendly random beacons with quadratic communication

A Bhat, N Shrestha, Z Luo, A Kate… - Proceedings of the 2021 …, 2021 - dl.acm.org
A random beacon provides a continuous public source of randomness and its applications
range from public lotteries to zero-knowledge proofs. Existing random beacon protocols …

Balanced byzantine reliable broadcast with near-optimal communication and improved computation

N Alhaddad, S Das, S Duan, L Ren, M Varia… - Proceedings of the …, 2022 - dl.acm.org
This paper studies Byzantine reliable broadcast (BRB) under asynchronous networks, and
improves the state-of-the-art protocols from the following aspects. Near-optimal …

Batching, aggregation, and zero-knowledge proofs in bilinear accumulators

S Srinivasan, I Karantaidou, F Baldimtsi… - Proceedings of the …, 2022 - dl.acm.org
An accumulator is a cryptographic primitive that allows a prover to succinctly commit to a set
of values while being able to provide proofs of (non-) membership. A batch proof is an …

Sprint: High-throughput robust distributed schnorr signatures

F Benhamouda, S Halevi, H Krawczyk, Y Ma… - … Conference on the …, 2024 - Springer
We describe robust high-throughput threshold protocols for generating Schnorr signatures in
an asynchronous setting with potentially hundreds of parties. The protocols run a single …

Efficient asynchronous byzantine agreement without private setups

Y Gao, Y Lu, Z Lu, Q Tang, J Xu… - 2022 IEEE 42nd …, 2022 - ieeexplore.ieee.org
Efficient asynchronous Byzantine agreement (BA) protocols were mostly studied with private
setups, eg, pre-setup threshold cryptosystem. Challenges remain to reduce the large …

Communication and round efficient parallel broadcast protocols

I Abraham, K Nayak, N Shrestha - Cryptology ePrint Archive, 2023 - eprint.iacr.org
This work focuses on the parallel broadcast primitive, where each of the $ n $ parties wish to
broadcast their $\ell $-bit input in parallel. We consider the authenticated model with PKI and …

Optimal communication complexity of authenticated byzantine agreement

A Momose, L Ren - arxiv preprint arxiv:2007.13175, 2020 - arxiv.org
Byzantine Agreement (BA) is one of the most fundamental problems in distributed
computing, and its communication complexity is an important efficiency metric. It is well …

Network-agnostic security comes (almost) for free in DKG and MPC

R Bacho, D Collins, CD Liu-Zhang, J Loss - Annual International …, 2023 - Springer
Distributed key generation (DKG) protocols are an essential building block for threshold
cryptosystems. Many DKG protocols tolerate up to ts< n/2 corruptions assuming a well …