Adaptively secure bls threshold signatures from ddh and co-cdh

S Das, L Ren - Annual International Cryptology Conference, 2024‏ - Springer
Threshold signatures are one of the most important cryptographic primitives in distributed
systems. A popular choice of threshold signature scheme is the BLS threshold signature …

Twinkle: Threshold signatures from ddh with full adaptive security

R Bacho, J Loss, S Tessaro, B Wagner… - … Conference on the Theory …, 2024‏ - Springer
Sparkle is the first threshold signature scheme in the pairing-free discrete logarithm setting
(Crites, Komlo, Maller, Crypto 2023) to be proven secure under adaptive corruptions …

Monotone-policy aggregate signatures

MF Brodsky, AR Choudhuri, A Jain… - … Conference on the Theory …, 2024‏ - Springer
The notion of aggregate signatures allows for combining signatures from different parties
into a short certificate that attests that all parties signed a message. In this work, we lift this …

Distributed Randomness using Weighted VUFs

S Das, B Pinkas, A Tomescu, Z **ang - Cryptology ePrint Archive, 2024‏ - eprint.iacr.org
Shared randomness in blockchain can expand its support for randomized applications and
can also help strengthen its security. Many existing blockchains rely on external …

How to prove statements obliviously?

S Garg, A Goel, M Wang - Annual International Cryptology Conference, 2024‏ - Springer
Cryptographic applications often require proving statements about hidden secrets satisfying
certain circuit relations. Moreover, these proofs must often be generated obliviously, ie …

BFT-DSN: a byzantine fault tolerant decentralized storage network

H Guo, M Xu, J Zhang, C Liu, R Ranjan… - IEEE Transactions …, 2024‏ - ieeexplore.ieee.org
With the rapid development of blockchain and its applications, the amount of data stored on
decentralized storage networks (DSNs) has grown exponentially. DSNs bring together …

Vector commitments with proofs of smallness: Short range proofs and more

B Libert - IACR International Conference on Public-Key …, 2024‏ - Springer
Vector commitment schemes are compressing commitments to vectors that make it possible
to succinctly open a commitment for individual vector positions without revealing anything …

GRandLine: Adaptively Secure DKG and Randomness Beacon with (Almost) Quadratic Communication Complexity.

R Bacho, C Lenzen, J Loss, S Ochsenreither… - 2023‏ - publications.cispa.de
A randomness beacon is a source of continuous and publicly verifiable randomness which
is of crucial importance for many applications. Existing works on distributed randomness …

Accountable and secure threshold EdDSA signature and its applications

Y **e, Q Fan, C Zhang, T Wu, Y Zhou… - IEEE Transactions on …, 2024‏ - ieeexplore.ieee.org
Threshold signatures as a method to realize multi-party cooperation and trust distribution in
blockchain have been widely studied in recent years. However, among these researches …

Swiper: a new paradigm for efficient weighted distributed protocols

A Tonkikh, L Freitas - Proceedings of the 43rd ACM Symposium on …, 2024‏ - dl.acm.org
The majority of fault-tolerant distributed algorithms are designed assuming a nominal
corruption model, in which at most a fraction fn of parties can be corrupted by the adversary …