Secure multiparty computation with identifiable abort via vindicating release

R Cohen, J Doerner, Y Kondi, A Shelat - Annual International Cryptology …, 2024 - Springer
In the dishonest-majority setting, secure multiparty computation (MPC) with identifiable abort
(IA) guarantees that honest parties can identify and agree upon at least one cheating party if …

Secure Multiparty Computation with Identifiable Abort via Vindicating

R Cohen, J Doerner, Y Kondi¹… - Advances in Cryptology …, 2024 - books.google.com
In the dishonest-majority setting, secure multiparty compu-tation (MPC) with identifiable
abort (IA) guarantees that honest parties can identify and agree upon at least one cheating …

Time-Based Cryptography From Weaker Assumptions: Randomness Beacons, Delay Functions and More

D Abram, L Roy, M Simkin - Cryptology ePrint Archive, 2024 - eprint.iacr.org
The assumption that certain computations inherently require some sequential time has
established itself as a powerful tool for cryptography. It allows for security and liveness …

Practical Asynchronous Distributed Key Reconfiguration and Its Applications

H Feng, Y Gao, Y Lu, Q Tang, J Xu - Cryptology ePrint Archive, 2025 - eprint.iacr.org
In this paper, we study practical constructions of asynchronous distributed key
reconfiguration ($\mathsf {ADKR} $), which enables an asynchronous fault-tolerant system …