Sok: A consensus taxonomy in the blockchain era

J Garay, A Kiayias - Topics in Cryptology–CT-RSA 2020: The …, 2020 - Springer
Consensus is arguably one of the most fundamental problems in distributed computing,
playing also an important role in the area of cryptographic protocols as the enabler of a …

Communication complexity of byzantine agreement, revisited

I Abraham, THH Chan, D Dolev, K Nayak… - Proceedings of the …, 2019 - dl.acm.org
As Byzantine Agreement (BA) protocols find application in large-scale decentralized
cryptocurrencies, an increasingly important problem is to design BA protocols with improved …

CryptHOL: Game-based proofs in higher-order logic

DA Basin, A Lochbihler, SR Sefidgar - Journal of Cryptology, 2020 - Springer
Game-based proofs are a well-established paradigm for structuring security arguments and
simplifying their understanding. We present a novel framework, CryptHOL, for rigorous game …

Communication and round efficient parallel broadcast protocols

I Abraham, K Nayak, N Shrestha - Cryptology ePrint Archive, 2023 - eprint.iacr.org
This work focuses on the parallel broadcast primitive, where each of the $ n $ parties wish to
broadcast their $\ell $-bit input in parallel. We consider the authenticated model with PKI and …

Asymptotically free broadcast in constant expected time via packed vss

I Abraham, G Asharov, S Patil, A Patra - Theory of Cryptography …, 2022 - Springer
Broadcast is an essential primitive for secure computation. We focus in this paper on optimal
resilience (ie, when the number of corrupted parties t is less than a third of the computing …

Round optimal secure multiparty computation from minimal assumptions

A Rai Choudhuri, M Ciampi, V Goyal, A Jain… - Theory of Cryptography …, 2020 - Springer
We construct a four round secure multip arty computation (MPC) protocol in the plain model
that achieves security against any dishonest majority. The security of our protocol relies only …

Round-efficient byzantine agreement and multi-party computation with asynchronous fallback

G Deligios, M Hirt, CD Liu-Zhang - Theory of Cryptography Conference, 2021 - Springer
Protocols for Byzantine agreement (BA) and secure multi-party computation (MPC) can be
classified according to the underlying communication model. The two most commonly …

Optimal synchronous approximate agreement with asynchronous fallback

D Ghinea, CD Liu-Zhang, R Wattenhofer - Proceedings of the 2022 ACM …, 2022 - dl.acm.org
Approximate Agreement (AA) allows a set of n parties that start with real-valued inputs to
obtain values that are at most within a parameter ε> 0 from each other and within the range …

General adversary structures in byzantine agreement and multi-party computation with active and omission corruption

K Brazitikos, V Zikas - Theory of Cryptography Conference, 2025 - Springer
Typical results in multi-party computation (in short, MPC) capture faulty parties by assuming
a threshold adversary corrupting parties actively and/or fail-corrupting. These corruption …

Sublinear-round byzantine agreement under corrupt majority

THH Chan, R Pass, E Shi - IACR International Conference on Public-Key …, 2020 - Springer
Abstract Although Byzantine Agreement (BA) has been studied for three decades, perhaps
somewhat surprisingly, there still exist significant gaps in our understanding regarding its …