[PDF][PDF] Zcash protocol specification

D Hopwood, S Bowe, T Hornby, N Wilcox - GitHub: San Francisco, CA …, 2016 - zeccoin.net
Zcash is an implementation of the Decentralized Anonymous Payment scheme Zerocash,
with security fixes and improvements to performance and functionality. It bridges the existing …

Flamingo: Multi-round single-server secure aggregation with applications to private federated learning

Y Ma, J Woods, S Angel… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
This paper introduces Flamingo, a system for secure aggregation of data across a large set
of clients. In secure aggregation, a server sums up the private inputs of clients and obtains …

An AI-enabled hybrid lightweight authentication scheme for intelligent IoMT based cyber-physical systems

M Adil, MK Khan, MM Jadoon, M Attique… - … on Network Science …, 2022 - ieeexplore.ieee.org
In the era of smart healthcare, Internet of Medical Things-based Cyber-Physical Systems
(IoMT-based-CPS) play an important role in acquiring, evaluating, monitoring, tracking, and …

[PDF][PDF] RFC 9380 Hashing to Elliptic Curves

A Faz-Hernandez, S Scott, N Sullivan, RS Wahby… - Terminology, 2023 - rfc.nop.hu
RFC 9380: Hashing to Elliptic Curves Page 1 RFC 9380 Hashing to Elliptic Curves Abstract
This document specifies a number of algorithms for encoding or hashing an arbitrary string to a …

Traitor tracing without trusted authority from registered functional encryption

P Branco, RWF Lai, M Maitra, G Malavolta… - … Conference on the …, 2024 - Springer
Traitor-tracing systems allow identifying the users who contributed to building a rogue
decoder in a broadcast environment. In a traditional traitor-tracing system, a key authority is …

Pixel: Multi-signatures for consensus

M Drijvers, S Gorbunov, G Neven, H Wee - 29th USENIX Security …, 2020 - usenix.org
In Proof-of-Stake (PoS) and permissioned blockchains, a committee of verifiers agrees and
sign every new block of transactions. These blocks are validated, propagated, and stored by …

Algebraic group model with oblivious sampling

H Lipmaa, R Parisella, J Siim - Theory of Cryptography Conference, 2023 - Springer
In the algebraic group model (AGM), an adversary has to return with each group element a
linear representation with respect to input group elements. In many groups, it is easy to …

Families of SNARK-friendly 2-chains of elliptic curves

Y El Housni, A Guillevic - Annual International Conference on the Theory …, 2022 - Springer
Abstract At CANS'20, El Housni and Guillevic introduced a new 2-chain of pairing-friendly
elliptic curves for recursive zero-knowledge Succinct Non-interactive ARguments of …

A short-list of pairing-friendly curves resistant to special TNFS at the 128-bit security level

A Guillevic - IACR international conference on public-key …, 2020 - Springer
There have been notable improvements in discrete logarithm computations in finite fields
since 2015 and the introduction of the Tower Number Field Sieve algorithm (TNFS) for …

KHAPE: asymmetric PAKE from key-hiding key exchange

Y Gu, S Jarecki, H Krawczyk - … in Cryptology–CRYPTO 2021: 41st Annual …, 2021 - Springer
OPAQUE [Jarecki et al., Eurocrypt 2018] is an asymmetric password authenticated key
exchange (aPAKE) protocol that is being developed as an Internet standard and for use …