How to use bitcoin to design fair protocols

I Bentov, R Kumaresan - Annual Cryptology Conference, 2014 - Springer
We study a model of fairness in secure computation in which an adversarial party that aborts
on receiving output is forced to pay a mutually predefined monetary penalty. We then show …

Aggregate and verifiably encrypted signatures from bilinear maps

D Boneh, C Gentry, B Lynn, H Shacham - … Warsaw, Poland, May 4–8, 2003 …, 2003 - Springer
An aggregate signature scheme is a digital signature that supports aggregation: Given n
signatures on n distinct messages from n distinct users, it is possible to aggregate all these …

Timed commitments

D Boneh, M Naor - Annual international cryptology conference, 2000 - Springer
We introduce and construct timed commitment schemes, an extension to the standard notion
of commitments in which a potential forced opening phase permits the receiver to recover …

Fairness in an unfair world: Fair multiparty computation from public bulletin boards

AR Choudhuri, M Green, A Jain, G Kaptchuk… - Proceedings of the 2017 …, 2017 - dl.acm.org
Secure multiparty computation allows mutually distrusting parties to compute a function on
their private inputs such that nothing but the function output is revealed. Achieving fairness …

Accountability: definition and relationship to verifiability

R Küsters, T Truderung, A Vogt - … of the 17th ACM conference on …, 2010 - dl.acm.org
Many cryptographic tasks and protocols, such as non-repudiation, contract-signing, voting,
auction, identity-based encryption, and certain forms of secure multi-party computation …

Concurrent signatures

L Chen, C Kudla, KG Paterson - … on the Theory and Applications of …, 2004 - Springer
We introduce the concept of concurrent signatures. These allow two entities to produce two
signatures in such a way that, from the point of view of any third party, both signatures are …

Escrow protocols for cryptocurrencies: How to buy physical goods using bitcoin

S Goldfeder, J Bonneau, R Gennaro… - … Cryptography and Data …, 2017 - Springer
We consider the problem of buying physical goods with cryptocurrencies. There is an
inherent circular dependency: should be the buyer trust the seller and pay before receiving …

Efficient fair conditional payments for outsourcing computations

X Chen, J Li, W Susilo - IEEE Transactions on Information …, 2012 - ieeexplore.ieee.org
The outsourcing computations in distributed environments suffer from the trust problems
between the outsourcer and the workers. All existing solutions only assume the rational lazy …

Automated analysis of security protocols with global state

S Kremer, R Künnemann - Journal of Computer Security, 2016 - content.iospress.com
Security APIs, key servers and protocols that need to keep the status of transactions, require
to maintain a global, non-monotonic state, eg, in the form of a database or register. However …

Fair exchange

H Pagnia, H Vogt, FC Gärtner - The Computer Journal, 2003 - academic.oup.com
The growing importance of electronic commerce and the increasing number of applications
in this area has led research into studying methods of how to perform safe and secure online …