Security in quantum cryptography

C Portmann, R Renner - Reviews of Modern Physics, 2022 - APS
Quantum cryptography exploits principles of quantum physics for the secure processing of
information. A prominent example is secure communication, ie, the task of transmitting …

Survey on cyberspace security

H Zhang, W Han, X Lai, D Lin, J Ma, JH Li - Science China Information …, 2015 - Springer
Along with the rapid development and wide application of information technology, human
society has entered the information era. In this era, people live and work in cyberspace …

Cerebro: A platform for {Multi-Party} cryptographic collaborative learning

W Zheng, R Deng, W Chen, RA Popa… - 30th USENIX Security …, 2021 - usenix.org
Many organizations need large amounts of high quality data for their applications, and one
way to acquire such data is to combine datasets from multiple parties. Since these …

Fair and robust multi-party computation using a global transaction ledger

A Kiayias, HS Zhou, V Zikas - … 35th Annual International Conference on the …, 2016 - Springer
Classical results on secure multi-party computation (MPC) imply that fully secure
computation, including fairness (either all parties get output or none) and robustness (output …

One round threshold ECDSA with identifiable abort

R Gennaro, S Goldfeder - Cryptology ePrint Archive, 2020 - eprint.iacr.org
Threshold ECDSA signatures have received much attention in recent years due to the
widespread use of ECDSA in cryptocurrencies. While various protocols now exist that admit …

ROAST: robust asynchronous schnorr threshold signatures

T Ruffing, V Ronge, E Jin, J Schneider-Bensch… - Proceedings of the …, 2022 - dl.acm.org
Bitcoin and other cryptocurrencies have recently introduced support for Schnorr signatures
whose cleaner algebraic structure, as compared to ECDSA, allows for simpler and more …

Utt: Decentralized ecash with accountable privacy

A Tomescu, A Bhat, B Applebaum, I Abraham… - Cryptology ePrint …, 2022 - eprint.iacr.org
Abstract We present UnTraceable Transactions (UTT), a system for decentralized ecash with
accountable privacy. UTT is the first ecash system that obtains three critical properties:(1) it …

Network-agnostic security comes (almost) for free in DKG and MPC

R Bacho, D Collins, CD Liu-Zhang, J Loss - Annual International …, 2023 - Springer
Distributed key generation (DKG) protocols are an essential building block for threshold
cryptosystems. Many DKG protocols tolerate up to ts< n/2 corruptions assuming a well …

Cheater identification on a budget: MPC with identifiable abort from pairwise macs

C Baum, N Melissaris, R Rachuri, P Scholl - Annual International …, 2024 - Springer
Cheater identification in secure multi-party computation (MPC) allows the honest parties to
agree upon the identity of a cheating party, in case the protocol aborts. In the context of a …

TARDIS: a foundation of time-lock puzzles in UC

C Baum, B David, R Dowsley, JB Nielsen… - … Conference on the …, 2021 - Springer
Time-based primitives like time-lock puzzles (TLP) are finding widespread use in practical
protocols, partially due to the surge of interest in the blockchain space where TLPs and …