Key management for beyond 5G mobile small cells: A survey

M De Ree, G Mantas, A Radwan, S Mumtaz… - IEEE …, 2019 - ieeexplore.ieee.org
The highly anticipated 5G network is projected to be introduced in 2020. 5G stakeholders
are unanimous that densification of mobile networks is the way forward. The densification …

A survey on peer-to-peer key management for mobile ad hoc networks

JVD Merwe, D Dawoud, S McDonald - ACM computing surveys (CSUR), 2007 - dl.acm.org
The article reviews the most popular peer-to-peer key management protocols for mobile ad
hoc networks (MANETs). The protocols are subdivided into groups based on their design …

Dumbo-ng: Fast asynchronous bft consensus with throughput-oblivious latency

Y Gao, Y Lu, Z Lu, Q Tang, J Xu, Z Zhang - Proceedings of the 2022 …, 2022 - dl.acm.org
Despite recent progresses of practical asynchronous Byzantine-fault tolerant (BFT)
consensus, the state-of-the-art designs still suffer from suboptimal performance. Particularly …

Ekiden: A platform for confidentiality-preserving, trustworthy, and performant smart contracts

R Cheng, F Zhang, J Kos, W He… - 2019 IEEE European …, 2019 - ieeexplore.ieee.org
Smart contracts are applications that execute on blockchains. Today they manage billions of
dollars in value and motivate visionary plans for pervasive blockchain deployment. While …

Universal atomic swaps: Secure exchange of coins across all blockchains

SAK Thyagarajan, G Malavolta… - … IEEE symposium on …, 2022 - ieeexplore.ieee.org
Trading goods lies at the backbone of the modern economy and the recent advent of
cryptocurrencies has opened the door for trading decentralized (digital) assets: A large …

Sok: Distributed randomness beacons

K Choi, A Manoj, J Bonneau - 2023 IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Motivated and inspired by the emergence of blockchains, many new protocols have recently
been proposed for generating publicly verifiable randomness in a distributed yet secure …

[PDF][PDF] A graduate course in applied cryptography

D Boneh, V Shoup - Draft 0.5, 2020 - dlib.hust.edu.vn
Cryptography is an indispensable tool used to protect information in computing systems. It is
used everywhere and by billions of people worldwide on a daily basis. It is used to protect …

Threshold-optimal DSA/ECDSA signatures and an application to bitcoin wallet security

R Gennaro, S Goldfeder, A Narayanan - … 2016, Guildford, UK, June 19-22 …, 2016 - Springer
While threshold signature schemes have been presented before, there has never been an
optimal threshold signature algorithm for DSA. The properties of DSA make it quite …

An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings

NW Lo, JL Tsai - IEEE Transactions on Intelligent …, 2015 - ieeexplore.ieee.org
Constructing intelligent and efficient transportation systems for modern metropolitan areas
has become a very important quest for nations possessing metropolitan cities with ever …

Identity-based encryption from the Weil pairing

D Boneh, M Franklin - Annual international cryptology conference, 2001 - Springer
We propose a fully functional identity-based encryption scheme (IBE). The scheme has
chosen ciphertext security in the random oracle model assuming an elliptic curve variant of …