FIN: practical signature-free asynchronous common subset in constant time

S Duan, X Wang, H Zhang - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
Asynchronous common subset (ACS) is a powerful paradigm enabling applications such as
Byzantine fault-tolerance (BFT) and multi-party computation (MPC). The most efficient ACS …

Liar, liar, coins on fire! Penalizing equivocation by loss of bitcoins

T Ruffing, A Kate, D Schröder - Proceedings of the 22nd ACM SIGSAC …, 2015 - dl.acm.org
We show that equivocation, ie, making conflicting statements to others in a distributed
protocol, can be monetarily disincentivized by the use of crypto-currencies such as Bitcoin …

[PDF][PDF] Privacy preserving payments in credit networks

P Moreno-Sanchez, A Kate, M Maffei… - Network and distributed …, 2015 - researchgate.net
A credit network models trust between agents in a distributed environment and enables
payments between arbitrary pairs of agents. With their flexible design and robustness …

BFR-MPC: a blockchain-based fair and robust multi-party computation scheme

H Gao, Z Ma, S Luo, Z Wang - IEEE access, 2019 - ieeexplore.ieee.org
In a general secure multi-party computation (MPC) protocol, two or more participants who do
not trust each other, use their respective secret inputs to calculate a joint function in a …

Revisiting the power of non-equivocation in distributed protocols

N Ben-David, BY Chan, E Shi - … of the 2022 ACM Symposium on …, 2022 - dl.acm.org
Trusted hardware and new computing platforms such as RDMA naturally provide a non-
equivocation abstraction. Previous works have shown that non-equivocation allows us to …

Asynchronous secure multiparty computation in constant time

R Cohen - Public-Key Cryptography--PKC 2016, 2016 - Springer
In the setting of secure multiparty computation, a set of mutually distrusting parties wish to
securely compute a joint function. It is well known that if the communication model is …

Communication-efficient bft protocols using small trusted hardware to tolerate minority corruption

S Yandamuri, I Abraham, K Nayak… - Cryptology ePrint …, 2021 - eprint.iacr.org
Agreement protocols for partially synchronous or asynchronous networks tolerate fewer than
one-third Byzantine faults. If parties are equipped with trusted hardware that prevents …

IGOR: Accelerating byzantine fault tolerance for real-time systems with eager execution

A Loveless, R Dreslinski, B Kasikci… - 2021 IEEE 27th Real …, 2021 - ieeexplore.ieee.org
Critical real-time systems like spacecraft and aircraft commonly use Byzantine fault-tolerant
(BFT) state machine replication (SMR) to mask faulty processors and sensors. Unfortunately …

Optimally resilient asynchronous MPC with linear communication complexity

A Choudhury, A Patra - … of the 16th International Conference on …, 2015 - dl.acm.org
We present a secure asynchronous multiparty computation (AMPC) protocol with optimal
resilience, involving n= 3t+ 1 parties and tolerating a computationally bounded static …

Communication-efficient bft using small trusted hardware to tolerate minority corruption

S Yandamuri, I Abraham, K Nayak… - … on Principles of …, 2023 - drops.dagstuhl.de
Agreement protocols for partially synchronous networks tolerate fewer than one-third
Byzantine faults. If parties are equipped with trusted hardware that prevents equivocation …