Asynchronous data dissemination and its applications

S Das, Z Xiang, L Ren - Proceedings of the 2021 ACM SIGSAC …, 2021 - dl.acm.org
In this paper, we introduce the problem of Asynchronous Data Dissemination (ADD).
Intuitively, an ADD protocol disseminates a message to all honest nodes in an …

Asynchronous Distributed Key Generation for Computationally-Secure Randomness, Consensus, and Threshold Signatures.

E Kokoris Kogias, D Malkhi, A Spiegelman - Proceedings of the 2020 …, 2020 - dl.acm.org
In this paper, we present the first Asynchronous Distributed Key Generation (ADKG)
algorithm which is also the first distributed key generation algorithm that can generate …

Towards achieving asynchronous MPC with linear communication and optimal resilience

V Goyal, CD Liu-Zhang, Y Song - Annual International Cryptology …, 2024 - Springer
Secure multi-party computation (MPC) allows a set of n parties to jointly compute a function
over their private inputs. The seminal works of Ben-Or, Canetti and Goldreich [STOC'93] and …

hbacss: How to robustly share many secrets

T Yurek, L Luo, J Fairoze, A Kate, A Miller - Cryptology ePrint Archive, 2021 - eprint.iacr.org
Despite significant recent progress toward making multi-party computation (MPC) practical,
no existing MPC library offers complete robustness---meaning guaranteed output delivery …

Random Beacons in Monte Carlo: Efficient Asynchronous Random Beacon without Threshold Cryptography

A Bandarupalli, A Bhat, S Bagchi, A Kate… - Proceedings of the 2024 …, 2024 - dl.acm.org
Regular access to unpredictable and bias-resistant randomness is important for applications
such as blockchains, voting, and secure distributed computing. Distributed random beacon …

[PDF][PDF] HashRand: Efficient Asynchronous Random Beacon without Threshold Cryptographic Setup.

A Bandarupalli, A Bhat, S Bagchi, A Kate… - IACR Cryptol. ePrint …, 2023 - iacr.steepath.eu
Regular access to unpredictable and bias-resistant randomness is important for applications
such as blockchains, voting, and secure distributed computing. Distributed random beacon …

Sprint: High-throughput robust distributed schnorr signatures

F Benhamouda, S Halevi, H Krawczyk, Y Ma… - … Conference on the …, 2024 - Springer
We describe robust high-throughput threshold protocols for generating Schnorr signatures in
an asynchronous setting with potentially hundreds of parties. The protocols run a single …

Network-agnostic security comes (almost) for free in DKG and MPC

R Bacho, D Collins, CD Liu-Zhang, J Loss - Annual International …, 2023 - Springer
Distributed key generation (DKG) protocols are an essential building block for threshold
cryptosystems. Many DKG protocols tolerate up to ts< n/2 corruptions assuming a well …

Design and analysis of a distributed ECDSA signing service

J Groth, V Shoup - Cryptology ePrint Archive, 2022 - eprint.iacr.org
We present and analyze a new protocol that provides a distributed ECDSA signing service,
with the following properties:* it works in an asynchronous communication model;* it works …

Linear-communication asynchronous complete secret sharing with optimal resilience

X Ji, J Li, Y Song - Annual International Cryptology Conference, 2024 - Springer
Secure multiparty computation (MPC) allows a set of n parties to jointly compute a function
on their private inputs. In this work, we focus on the information-theoretic MPC in the …