I Cascudo, B David - Annual International Conference on the Theory and …, 2024 - Springer
Abstract Publicly Verifiable Secret Sharing (PVSS) allows a dealer to publish encrypted shares of a secret so that parties holding the corresponding decryption keys may later …
Achieving adaptive (or proactive) security in cryptographic protocols is notoriously difficult due to the adversary's power to dynamically corrupt parties as the execution progresses …
We introduce the first practical protocols for fully decentralized sealed-bid auctions using timed commitments. Timed commitments ensure that the auction is finalized fairly even if all …
Blockchain protocols have revolutionized how individuals and devices interact and transact over the internet. More recently, a trend has emerged to harness blockchain technology as a …
Time-lock puzzles (TLP) are a fascinating type of cryptographic problem that is easy to generate, but takes a certain time to solve, even when arbitrary parallel speedup is allowed …
X Li, L Zhou, X Yin, J Ning - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
Due to the advent of healthcare wireless medical sensor networks (HWMSNs) technology, the traditional model of medical treatment has been transformed. In HWMSNs environments …
Abstract A $(t, n) $-public key threshold cryptosystem allows distributing the execution of a cryptographic task among a set of $ n $ parties by splitting the secret key required for the …
S Dziembowski, S Faust, T Lizurej - Annual International Cryptology …, 2023 - Springer
We initiate a formal study of individual cryptography. Informally speaking, an algorithm Alg is individual if, in every implementation of Alg, there always exists an individual user with full …
The danger of cyber-attacks is constant in the current digital environment. The necessity for effective security actions are more crucial than ever before due to the increasingly complex …