hints: Threshold signatures with silent setup

S Garg, A Jain, P Mukherjee, R Sinha… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
We propose hinTS—a new threshold signature scheme built on top of the widely used BLS
signatures. Our scheme enjoys the following attractive features: A silent setup process …

Deepfake Media Forensics: State of the Art and Challenges Ahead

I Amerini, M Barni, S Battiato, P Bestagini… - arXiv preprint arXiv …, 2024 - arxiv.org
AI-generated synthetic media, also called Deepfakes, have significantly influenced so many
domains, from entertainment to cybersecurity. Generative Adversarial Networks (GANs) and …

Threshold signatures in the multiverse

L Baird, S Garg, A Jain, P Mukherjee… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
We introduce a new notion of multiverse threshold signatures (MTS). In an MTS scheme,
multiple universes–each defined by a set of (possibly overlapping) signers, their weights …

Chop chop: Byzantine atomic broadcast to the network limit

M Camaioni, R Guerraoui, M Monti, PL Roman… - … USENIX Symposium on …, 2024 - usenix.org
At the heart of state machine replication, the celebrated technique enabling decentralized
and secure universal computation, lies Atomic Broadcast, a fundamental communication …

Rsa blind signatures with public metadata

G Amjad, K Yeo, M Yung - Proceedings on Privacy Enhancing …, 2025 - petsymposium.org
Anonymous tokens are, essentially, digital signature schemes that enable issuers to provide
users with signatures without learning the user inputs or the final signatures. These …

Indifferentiable hashing to ordinary elliptic -curves of with the cost of one exponentiation in

D Koshelev - Designs, Codes and Cryptography, 2022 - Springer
Let F q be a finite field and E b: y 2= x 3+ b be an ordinary (ie, non-supersingular) elliptic
curve (of j-invariant 0) such that b∈ F q and q≢ 1 (mod 27). For example, these conditions …

Security review of ethereum beacon clients

JP Aumasson, D Kolegov, E Stathopoulou - arXiv preprint arXiv …, 2021 - arxiv.org
The beacon chain is the backbone of the Ethereum's evolution towards a proof-of-stake-
based scalable network. Beacon clients are the applications implementing the services …

On the efficiency of pairing-based authentication for connected vehicles: Time is not on our side!

MAR Baee, L Simpson, X Boyen, E Foo… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In the near future, intelligent vehicles will be connected via wireless communication links,
forming Vehicular Ad-hoc Networks (VANETs). This has potential to improve road safety and …

[PDF][PDF] Groundhog: A Restart-based Systems Framework for Increasing Availability in Threshold Cryptosystems

A Kashinath, D Agarwala, G Kulp, S Das… - 2025 IEEE Symposium …, 2024 - sibin.github.io
Threshold cryptosystems (TCs), developed to eliminate single points of failure in
applications such as key management-as-a-service, signature schemes, encrypted data …

NDN-MPS: supporting multiparty authentication over named data networking

Z Zhang, S Liu, R King, L Zhang - … of the 8th ACM Conference on …, 2021 - dl.acm.org
Modern digitally controlled systems require multiparty authentication to meet the security
requirements. This paper describes the design and development of NDN-MPS, an …