Security in quantum cryptography
Quantum cryptography exploits principles of quantum physics for the secure processing of
information. A prominent example is secure communication, ie, the task of transmitting …
information. A prominent example is secure communication, ie, the task of transmitting …
Hawk: The blockchain model of cryptography and privacy-preserving smart contracts
Emerging smart contract systems over decentralized cryptocurrencies allow mutually
distrustful parties to transact safely without trusted third parties. In the event of contractual …
distrustful parties to transact safely without trusted third parties. In the event of contractual …
Ouroboros: A provably secure proof-of-stake blockchain protocol
We present “Ouroboros”, the first blockchain protocol based on proof of stake with rigorous
security guarantees. We establish security properties for the protocol comparable to those …
security guarantees. We establish security properties for the protocol comparable to those …
Universally composable security: A new paradigm for cryptographic protocols
R Canetti - Proceedings 42nd IEEE Symposium on Foundations …, 2001 - ieeexplore.ieee.org
We propose a novel paradigm for defining security of cryptographic protocols, called
universally composable security. The salient property of universally composable definitions …
universally composable security. The salient property of universally composable definitions …
Town crier: An authenticated data feed for smart contracts
Smart contracts are programs that execute autonomously on blockchains. Their key
envisioned uses (eg financial instruments) require them to consume data from outside the …
envisioned uses (eg financial instruments) require them to consume data from outside the …
Step by step towards creating a safe smart contract: Lessons and insights from a cryptocurrency lab
We document our experiences in teaching smart contract programming to undergraduate
students at the University of Maryland, the first pedagogical attempt of its kind. Since smart …
students at the University of Maryland, the first pedagogical attempt of its kind. Since smart …
Hybrid consensus: Efficient consensus in the permissionless model
Consensus, or state machine replication is a foundational building block of distributed
systems and modern cryptography. Consensus in the classical, permissioned setting has …
systems and modern cryptography. Consensus in the classical, permissioned setting has …
[BOOK][B] Secure multiparty computation
R Cramer, IB Damgård - 2015 - books.google.com
In a data-driven society, individuals and companies encounter numerous situations where
private information is an important resource. How can parties handle confidential data if they …
private information is an important resource. How can parties handle confidential data if they …
Ouroboros genesis: Composable proof-of-stake blockchains with dynamic availability
We present a novel Proof-of-Stake (PoS) protocol, Ouroboros Genesis, that enables parties
to safely join (or rejoin) the protocol execution using only the genesis block information. Prior …
to safely join (or rejoin) the protocol execution using only the genesis block information. Prior …
Order-fairness for byzantine consensus
Decades of research in both cryptography and distributed systems has extensively studied
the problem of state machine replication, also known as Byzantine consensus. A consensus …
the problem of state machine replication, also known as Byzantine consensus. A consensus …