How to use bitcoin to design fair protocols
I Bentov, R Kumaresan - Annual Cryptology Conference, 2014 - Springer
We study a model of fairness in secure computation in which an adversarial party that aborts
on receiving output is forced to pay a mutually predefined monetary penalty. We then show …
on receiving output is forced to pay a mutually predefined monetary penalty. We then show …
Aggregate and verifiably encrypted signatures from bilinear maps
An aggregate signature scheme is a digital signature that supports aggregation: Given n
signatures on n distinct messages from n distinct users, it is possible to aggregate all these …
signatures on n distinct messages from n distinct users, it is possible to aggregate all these …
Timed commitments
We introduce and construct timed commitment schemes, an extension to the standard notion
of commitments in which a potential forced opening phase permits the receiver to recover …
of commitments in which a potential forced opening phase permits the receiver to recover …
Fairness in an unfair world: Fair multiparty computation from public bulletin boards
Secure multiparty computation allows mutually distrusting parties to compute a function on
their private inputs such that nothing but the function output is revealed. Achieving fairness …
their private inputs such that nothing but the function output is revealed. Achieving fairness …
Accountability: definition and relationship to verifiability
R Küsters, T Truderung, A Vogt - … of the 17th ACM conference on …, 2010 - dl.acm.org
Many cryptographic tasks and protocols, such as non-repudiation, contract-signing, voting,
auction, identity-based encryption, and certain forms of secure multi-party computation …
auction, identity-based encryption, and certain forms of secure multi-party computation …
Concurrent signatures
L Chen, C Kudla, KG Paterson - … on the Theory and Applications of …, 2004 - Springer
We introduce the concept of concurrent signatures. These allow two entities to produce two
signatures in such a way that, from the point of view of any third party, both signatures are …
signatures in such a way that, from the point of view of any third party, both signatures are …
Escrow protocols for cryptocurrencies: How to buy physical goods using bitcoin
We consider the problem of buying physical goods with cryptocurrencies. There is an
inherent circular dependency: should be the buyer trust the seller and pay before receiving …
inherent circular dependency: should be the buyer trust the seller and pay before receiving …
Efficient fair conditional payments for outsourcing computations
The outsourcing computations in distributed environments suffer from the trust problems
between the outsourcer and the workers. All existing solutions only assume the rational lazy …
between the outsourcer and the workers. All existing solutions only assume the rational lazy …
Automated analysis of security protocols with global state
S Kremer, R Künnemann - Journal of Computer Security, 2016 - content.iospress.com
Security APIs, key servers and protocols that need to keep the status of transactions, require
to maintain a global, non-monotonic state, eg, in the form of a database or register. However …
to maintain a global, non-monotonic state, eg, in the form of a database or register. However …
Fair exchange
H Pagnia, H Vogt, FC Gärtner - The Computer Journal, 2003 - academic.oup.com
The growing importance of electronic commerce and the increasing number of applications
in this area has led research into studying methods of how to perform safe and secure online …
in this area has led research into studying methods of how to perform safe and secure online …