Efficient registration-based encryption

N Glaeser, D Kolonelos, G Malavolta… - Proceedings of the 2023 …, 2023 - dl.acm.org
Registration-based encryption (RBE) was recently introduced as an alternative to identity-
based encryption (IBE), to resolve the key-escrow problem: In RBE, the trusted authority is …

Threshold signatures from inner product argument: Succinct, weighted, and multi-threshold

S Das, P Camacho, Z Xiang, J Nieto, B Bünz… - Proceedings of the 2023 …, 2023 - dl.acm.org
Threshold signatures protect the signing key by sharing it among a group of signers so that
an adversary must corrupt a threshold number of signers to be able to forge signatures …

[HTML][HTML] Tethering Layer 2 solutions to the blockchain: A survey on proving schemes

D Tortola, A Lisi, P Mori, L Ricci - Computer Communications, 2024 - Elsevier
A blockchain is a data structure consisting of a list of blocks containing transactions and
maintained by a network of nodes in a decentralized manner. In permissionless blockchains …

hints: Threshold signatures with silent setup

S Garg, A Jain, P Mukherjee, R Sinha… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
We propose hinTS—a new threshold signature scheme built on top of the widely used BLS
signatures. Our scheme enjoys the following attractive features: A silent setup process …

zk-bench: A toolset for comparative evaluation and performance benchmarking of snarks

J Ernstberger, S Chaliasos, G Kadianakis… - … Conference on Security …, 2024 - Springer
Abstract Zero-Knowledge Proofs (ZKPs), especially Succinct Non-interactive ARguments of
Knowledge (SNARKs), have garnered significant attention in modern cryptographic …

Janus: Fast Privacy-Preserving Data Provenance For TLS

J Lauinger, J Ernstberger, A Finkenzeller… - … on Privacy Enhancing …, 2025 - petsymposium.org
Web users can gather data from secure endpoints and demonstrate the provenance of
sensitive data to any third party by using privacy-preserving TLS oracles. In practice, privacy …

Sok: A stratified approach to blockchain decentralization

C Ovezik, D Karakostas, A Kiayias - arXiv preprint arXiv:2211.01291, 2022 - arxiv.org
Decentralization has been touted as the principal security advantage which propelled
blockchain systems at the forefront of developments in the financial technology space. Its …

[HTML][HTML] On-chain zero-knowledge machine learning: An overview and comparison

V Keršič, S Karakatič, M Turkanović - Journal of King Saud University …, 2024 - Elsevier
Zero-knowledge proofs introduce a mechanism to prove that certain computations were
performed without revealing any underlying information and are used commonly in …

HARTS: High-threshold, adaptively secure, and robust threshold schnorr signatures

R Bacho, J Loss, G Stern, B Wagner - … on the Theory and Application of …, 2024 - Springer
Threshold variants of the Schnorr signature scheme have recently been at the center of
attention due to their applications to cryptocurrencies. However, existing constructions for …

GRandLine: Adaptively Secure DKG and Randomness Beacon with (Almost) Quadratic Communication Complexity.

R Bacho, C Lenzen, J Loss, S Ochsenreither… - 2023 - publications.cispa.de
A randomness beacon is a source of continuous and publicly verifiable randomness which
is of crucial importance for many applications. Existing works on distributed randomness …