A survey of distributed consensus protocols for blockchain networks

Y **ao, N Zhang, W Lou, YT Hou - … Communications Surveys & …, 2020‏ - ieeexplore.ieee.org
Since the inception of Bitcoin, cryptocurrencies and the underlying blockchain technology
have attracted an increasing interest from both academia and industry. Among various core …

An all-inclusive taxonomy and critical review of blockchain-assisted authentication and session key generation protocols for IoT

A Shahidinejad, J Abawajy - ACM Computing Surveys, 2024‏ - dl.acm.org
Authentication and Session Key Generation Protocols (SKGPs) play an essential role in
securing the communication channels of connected Internet of Things (IoT) devices …

Internet of drones security and privacy issues: Taxonomy and open challenges

M Yahuza, MYI Idris, IB Ahmedy, AWA Wahab… - IEEE …, 2021‏ - ieeexplore.ieee.org
Internet of Drones (IoD) is a decentralized network and management framework that links
drones' access to the controlled airspace and provides inter-location navigation services …

A pragmatic introduction to secure multi-party computation

D Evans, V Kolesnikov, M Rosulek - Foundations and Trends® …, 2018‏ - nowpublishers.com
Secure multi-party computation (MPC) has evolved from a theoretical curiosity in the 1980s
to a tool for building real systems today. Over the past decade, MPC has been one of the …

[PDF][PDF] Status report on the third round of the NIST post-quantum cryptography standardization process

G Alagic, G Alagic, D Apon, D Cooper, Q Dang, T Dang… - 2022‏ - tsapps.nist.gov
Abstract The National Institute of Standards and Technology is in the process of selecting
publickey cryptographic algorithms through a public, competition-like process. The new …

On security analysis of proof-of-elapsed-time (poet)

L Chen, L Xu, N Shah, Z Gao, Y Lu, W Shi - … MA, USA, November 5–8, 2017 …, 2017‏ - Springer
As more applications are built on top of blockchain and public ledger, different approaches
are developed to improve the performance of blockchain construction. Recently Intel …

Instahide: Instance-hiding schemes for private distributed learning

Y Huang, Z Song, K Li, S Arora - International conference on …, 2020‏ - proceedings.mlr.press
How can multiple distributed entities train a shared deep net on their private data while
protecting data privacy? This paper introduces InstaHide, a simple encryption of training …

A decade of lattice cryptography

C Peikert - Foundations and trends® in theoretical computer …, 2016‏ - nowpublishers.com
Lattice-based cryptography is the use of conjectured hard problems on point lattices in Rn
as the foundation for secure cryptographic systems. Attractive features of lattice cryptography …

A formal security analysis of the signal messaging protocol

K Cohn-Gordon, C Cremers, B Dowling, L Garratt… - Journal of …, 2020‏ - Springer
The Signal protocol is a cryptographic messaging protocol that provides end-to-end
encryption for instant messaging in WhatsApp, Wire, and Facebook Messenger among …

Fractal: Post-quantum and Transparent Recursive Proofs from Holography

A Chiesa, D Ojha, N Spooner - … on the Theory and Applications of …, 2020‏ - Springer
We present a new methodology to efficiently realize recursive composition of succinct non-
interactive arguments of knowledge (SNARKs). Prior to this work, the only known …