FIN: practical signature-free asynchronous common subset in constant time

S Duan, X Wang, H Zhang - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
Asynchronous common subset (ACS) is a powerful paradigm enabling applications such as
Byzantine fault-tolerance (BFT) and multi-party computation (MPC). The most efficient ACS …

Long live the honey badger: Robust asynchronous {DPSS} and its applications

T Yurek, Z Xiang, Y Xia, A Miller - 32nd USENIX Security Symposium …, 2023 - usenix.org
Secret sharing is an essential tool for many distributed applications, including distributed key
generation and multiparty computation. For many practical applications, we would like to …

Parbft: Faster asynchronous bft consensus with a parallel optimistic path

X Dai, B Zhang, H Jin, L Ren - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
To reduce latency and communication overhead of asynchronous Byzantine Fault Tolerance
(BFT) consensus, an optimistic path is often added, with Ditto and BDT as state-of-the-art …

Network-agnostic security comes (almost) for free in DKG and MPC

R Bacho, D Collins, CD Liu-Zhang, J Loss - Annual International …, 2023 - Springer
Distributed key generation (DKG) protocols are an essential building block for threshold
cryptosystems. Many DKG protocols tolerate up to ts< n/2 corruptions assuming a well …

Partial Synchrony for Free: New Upper Bounds for Byzantine Agreement

P Civit, MA Dzulfikar, S Gilbert, R Guerraoui… - Proceedings of the 2025 …, 2025 - SIAM
Byzantine agreement allows n processes to decide on a common value, in spite of arbitrary
failures. The seminal Dolev-Reischuk bound states that any deterministic solution to …

Practical asynchronous proactive secret sharing and key refresh

CU Günther, S Das, L Kokoris-Kogias - Cryptology ePrint Archive, 2022 - eprint.iacr.org
With the emergence of decentralized systems, spearheaded by blockchains, threshold
cryptography has seen unprecedented adoption. Just recently, the trustless distribution of …

Network-Agnostic Multi-party Computation Revisited

N Bhimrajka, A Choudhury, S Varadarajan - … International Conference on …, 2024 - Springer
We study network-agnostic secure multi-party computation (MPC) in the presence of
computationally-bounded adversaries. A network-agnostic protocol provides the best …

Convex Consensus with Asynchronous Fallback

A Constantinescu, D Ghinea… - 38th International …, 2024 - drops.dagstuhl.de
Convex Consensus (CC) allows a set of parties to agree on a value v inside the convex hull
of their inputs with respect to a predefined abstract convexity notion, even in the presence of …

Sweeper: Breaking the Validity-Latency Tradeoff in Asynchronous Common Subset

G Yang, C Chen, Q Chen, J Jiang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Asynchronous common subset (ACS) is an essential building block for Byzantine fault-
tolerance and multi-party computation. The classic ACS framework is due to Ben-Or, Kemler …

Network Agnostic Perfectly Secure Multiparty Computation Against General Adversaries

A Appan, A Chandramouli… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
In this work, we initiate the study of network-agnostic perfectly-secure multi-party
computation (MPC) against general (non-threshold) adversaries, where the corruption …