Secure multiparty computation with identifiable abort via vindicating release
In the dishonest-majority setting, secure multiparty computation (MPC) with identifiable abort
(IA) guarantees that honest parties can identify and agree upon at least one cheating party if …
(IA) guarantees that honest parties can identify and agree upon at least one cheating party if …
Secure Multiparty Computation with Identifiable Abort via Vindicating
In the dishonest-majority setting, secure multiparty compu-tation (MPC) with identifiable
abort (IA) guarantees that honest parties can identify and agree upon at least one cheating …
abort (IA) guarantees that honest parties can identify and agree upon at least one cheating …
Time-Based Cryptography From Weaker Assumptions: Randomness Beacons, Delay Functions and More
The assumption that certain computations inherently require some sequential time has
established itself as a powerful tool for cryptography. It allows for security and liveness …
established itself as a powerful tool for cryptography. It allows for security and liveness …
Practical Asynchronous Distributed Key Reconfiguration and Its Applications
In this paper, we study practical constructions of asynchronous distributed key
reconfiguration ($\mathsf {ADKR} $), which enables an asynchronous fault-tolerant system …
reconfiguration ($\mathsf {ADKR} $), which enables an asynchronous fault-tolerant system …