Scalable bias-resistant distributed randomness

E Syta, P Jovanovic, EK Kogias, N Gailly… - … IEEE Symposium on …, 2017 - ieeexplore.ieee.org
Bias-resistant public randomness is a critical component in many (distributed) protocols.
Generating public randomness is hard, however, because active adversaries may behave …

Labeled PSI from homomorphic encryption with reduced computation and communication

K Cong, RC Moreno, MB da Gama, W Dai… - Proceedings of the …, 2021 - dl.acm.org
It is known that fully homomorphic encryption (FHE) can be used to build efficient (labeled)
Private Set Intersection protocols in the unbalanced setting, where one of the sets is much …

{CONIKS}: Bringing key transparency to end users

MS Melara, A Blankstein, J Bonneau… - 24th USENIX Security …, 2015 - usenix.org
We present CONIKS, an end-user key verification service capable of integration in end-to-
end encrypted communication systems. CONIKS builds on transparency log proposals for …

Dory: Efficient, transparent arguments for generalised inner products and polynomial commitments

J Lee - Theory of cryptography conference, 2021 - Springer
This paper presents Dory, a transparent setup, public-coin interactive argument for inner-
pairing products between committed vectors of elements of two source groups. For a product …

Bool network: An open, distributed, secure cross-chain notary platform

Z Yin, B Zhang, J Xu, K Lu, K Ren - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
With the advancement of blockchain technology, hundreds of cryptocurrencies have been
deployed. The bloom of heterogeneous blockchain platforms brings a new emerging …

Compact and malicious private set intersection for small sets

M Rosulek, N Trieu - Proceedings of the 2021 ACM SIGSAC Conference …, 2021 - dl.acm.org
We describe a protocol for two-party private set intersection (PSI) based on Diffie-Hellman
key agreement. The protocol is proven secure against malicious parties, in the ideal …

Efficient compression of SIDH public keys

C Costello, D Jao, P Longa, M Naehrig, J Renes… - Advances in Cryptology …, 2017 - Springer
Abstract Supersingular isogeny Diffie-Hellman (SIDH) is an attractive candidate for post-
quantum key exchange, in large part due to its relatively small public key sizes. A recent …

Atomic and fair data exchange via blockchain

EN Tas, IA Seres, Y Zhang, M Melczer… - Proceedings of the …, 2024 - dl.acm.org
We introduce a blockchain Fair Data Exchange (FDE) protocol, enabling a storage server to
transfer a data file to a client atomically: the client receives the file if and only if the server …

Ouroboros crypsinous: Privacy-preserving proof-of-stake

T Kerber, A Kiayias, M Kohlweiss… - 2019 IEEE Symposium …, 2019 - ieeexplore.ieee.org
We present Ouroboros Crypsinous, the first formally analyzed privacy-preserving proof-of-
stake blockchain protocol. To model its security we give a thorough treatment of private …

Ed448-Goldilocks, a new elliptic curve

M Hamburg - Cryptology ePrint Archive, 2015 - eprint.iacr.org
Many papers have proposed elliptic curves which are faster and easier to implement than
the NIST prime-order curves. Most of these curves have had fields of size around $2^ 256 …