FIN: practical signature-free asynchronous common subset in constant time
Asynchronous common subset (ACS) is a powerful paradigm enabling applications such as
Byzantine fault-tolerance (BFT) and multi-party computation (MPC). The most efficient ACS …
Byzantine fault-tolerance (BFT) and multi-party computation (MPC). The most efficient ACS …
Liar, liar, coins on fire! Penalizing equivocation by loss of bitcoins
We show that equivocation, ie, making conflicting statements to others in a distributed
protocol, can be monetarily disincentivized by the use of crypto-currencies such as Bitcoin …
protocol, can be monetarily disincentivized by the use of crypto-currencies such as Bitcoin …
[PDF][PDF] Privacy preserving payments in credit networks
A credit network models trust between agents in a distributed environment and enables
payments between arbitrary pairs of agents. With their flexible design and robustness …
payments between arbitrary pairs of agents. With their flexible design and robustness …
BFR-MPC: a blockchain-based fair and robust multi-party computation scheme
H Gao, Z Ma, S Luo, Z Wang - IEEE access, 2019 - ieeexplore.ieee.org
In a general secure multi-party computation (MPC) protocol, two or more participants who do
not trust each other, use their respective secret inputs to calculate a joint function in a …
not trust each other, use their respective secret inputs to calculate a joint function in a …
Revisiting the power of non-equivocation in distributed protocols
Trusted hardware and new computing platforms such as RDMA naturally provide a non-
equivocation abstraction. Previous works have shown that non-equivocation allows us to …
equivocation abstraction. Previous works have shown that non-equivocation allows us to …
Asynchronous secure multiparty computation in constant time
R Cohen - Public-Key Cryptography--PKC 2016, 2016 - Springer
In the setting of secure multiparty computation, a set of mutually distrusting parties wish to
securely compute a joint function. It is well known that if the communication model is …
securely compute a joint function. It is well known that if the communication model is …
Communication-efficient bft protocols using small trusted hardware to tolerate minority corruption
Agreement protocols for partially synchronous or asynchronous networks tolerate fewer than
one-third Byzantine faults. If parties are equipped with trusted hardware that prevents …
one-third Byzantine faults. If parties are equipped with trusted hardware that prevents …
IGOR: Accelerating byzantine fault tolerance for real-time systems with eager execution
Critical real-time systems like spacecraft and aircraft commonly use Byzantine fault-tolerant
(BFT) state machine replication (SMR) to mask faulty processors and sensors. Unfortunately …
(BFT) state machine replication (SMR) to mask faulty processors and sensors. Unfortunately …
Optimally resilient asynchronous MPC with linear communication complexity
We present a secure asynchronous multiparty computation (AMPC) protocol with optimal
resilience, involving n= 3t+ 1 parties and tolerating a computationally bounded static …
resilience, involving n= 3t+ 1 parties and tolerating a computationally bounded static …
Communication-efficient bft using small trusted hardware to tolerate minority corruption
Agreement protocols for partially synchronous networks tolerate fewer than one-third
Byzantine faults. If parties are equipped with trusted hardware that prevents equivocation …
Byzantine faults. If parties are equipped with trusted hardware that prevents equivocation …