Practical asynchronous distributed key generation

S Das, T Yurek, Z **ang, A Miller… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Distributed Key Generation (DKG) is a technique to bootstrap threshold cryptosystems
without a trusted third party and is a building block to decentralized protocols such as …

Asynchronous consensus without trusted setup or public-key cryptography

S Das, S Duan, S Liu, A Momose, L Ren… - Proceedings of the 2024 …, 2024 - dl.acm.org
Byzantine consensus is a fundamental building block in distributed cryptographic problems.
Despite decades of research, most existing asynchronous consensus protocols require a …

Practical asynchronous high-threshold distributed key generation and distributed polynomial sampling

S Das, Z **ang, L Kokoris-Kogias, L Ren - 32nd USENIX Security …, 2023 - usenix.org
Distributed Key Generation (DKG) is a technique to bootstrap threshold cryptosystems
without a trusted party. DKG is an essential building block to many decentralized protocols …

Lightweight asynchronous verifiable secret sharing with optimal resilience

V Shoup, NP Smart - Journal of Cryptology, 2024 - Springer
We present new protocols for Asynchronous Verifiable Secret Sharing for Shamir (ie,
threshold t< n) sharing of secrets. Our protocols: Use only “lightweight” cryptographic …

Long live the honey badger: Robust asynchronous {DPSS} and its applications

T Yurek, Z **ang, Y **a, A Miller - 32nd USENIX Security Symposium …, 2023 - usenix.org
Secret sharing is an essential tool for many distributed applications, including distributed key
generation and multiparty computation. For many practical applications, we would like to …

Balanced byzantine reliable broadcast with near-optimal communication and improved computation

N Alhaddad, S Das, S Duan, L Ren, M Varia… - Proceedings of the …, 2022 - dl.acm.org
This paper studies Byzantine reliable broadcast (BRB) under asynchronous networks, and
improves the state-of-the-art protocols from the following aspects. Near-optimal …

Non-interactive VSS using Class Groups and Application to DKG

A Kate, EV Mangipudi, P Mukherjee, H Saleem… - Proceedings of the …, 2024 - dl.acm.org
We put forward a non-interactive verifiable secret sharing (NI-VSS) scheme using class
groups-we call it cgVSS. Our construction follows the standard framework of encrypting the …

[PDF][PDF] Bingo: Adaptively Secure Packed Asynchronous Verifiable Secret Sharing and Asynchronous Distributed Key Generation.

I Abraham, P Jovanovic, M Maller… - IACR Cryptol. ePrint …, 2022 - iacr.steepath.eu
In this work we present Bingo, an adaptively secure and optimally resilient packed
asynchronous verifiable secret sharing (PAVSS) protocol that allows a dealer to share f+ 1 …

Sok: Decentralized randomness beacon protocols

M Raikwar, D Gligoroski - … Conference on Information Security and Privacy, 2022 - Springer
The scientific interest in the area of Decentralized Randomness Beacon (DRB) protocols
has been thriving recently. Partially that interest is due to the success of the disruptive …

Bingo: Adaptivity and asynchrony in verifiable secret sharing and distributed key generation

I Abraham, P Jovanovic, M Maller, S Meiklejohn… - Annual International …, 2023 - Springer
We present Bingo, an adaptively secure and optimally resilient packed asynchronous
verifiable secret sharing (PAVSS) protocol that allows a dealer to share f+ 1 secrets with a …