Uncovering impact of mental models towards adoption of multi-device crypto-wallets

EV Mangipudi, U Desai, M Minaei, M Mondal… - Proceedings of the 2023 …, 2023 - dl.acm.org
Cryptocurrency users saw a sharp increase in different types of crypto wallets in the past
decade. However, the emerging multi-device wallets, even with improved security …

Accountability for misbehavior in threshold decryption via threshold traitor tracing

D Boneh, A Partap, L Rotem - Annual International Cryptology Conference, 2024 - Springer
A t-out-of-n threshold decryption system assigns key shares to n parties so that any t of them
can decrypt a well-formed ciphertext. Existing threshold decryption systems are not secure …

[PDF][PDF] Traitor Tracing for Threshold Decryption.

D Boneh, A Partap, L Rotem - IACR Cryptol. ePrint Arch., 2023 - iacr.steepath.eu
In a traitor tracing system there are n parties and each party holds a secret key. A
broadcaster uses an encryption key to encrypt a message m to a ciphertext c so that every …