[PDF][PDF] Chainlink 2.0: Next steps in the evolution of decentralized oracle networks

L Breidenbach, C Cachin, B Chan… - Chainlink …, 2021 - resources.cryptocompare.com
In this whitepaper, we articulate a vision for the evolution of Chainlink beyond its initial
conception in the original Chainlink whitepaper. We foresee an increasingly expansive role …

Universally composable security: A new paradigm for cryptographic protocols

R Canetti - Proceedings 42nd IEEE Symposium on Foundations …, 2001 - ieeexplore.ieee.org
We propose a novel paradigm for defining security of cryptographic protocols, called
universally composable security. The salient property of universally composable definitions …

Two-Round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices

I Damgård, C Orlandi, A Takahashi, M Tibouchi - Journal of Cryptology, 2022 - Springer
Although they have been studied for a long time, distributed signature protocols have
garnered renewed interest in recent years in view of novel applications to topics like …

Universally composable signature, certification, and authentication

R Canetti - Proceedings. 17th IEEE Computer Security …, 2004 - ieeexplore.ieee.org
Recently some efforts were made towards capturing the security requirements from digital
signature schemes as an ideal functionality within a composable security framework. This …

Adaptively secure BLS threshold signatures from DDH and co-CDH

S Das, L Ren - Annual International Cryptology Conference, 2024 - Springer
Threshold signatures are one of the most important cryptographic primitives in distributed
systems. A popular choice of threshold signature scheme is the BLS threshold signature …

Secure multiparty computation from threshold encryption based on class groups

L Braun, I Damgård, C Orlandi - Annual International Cryptology …, 2023 - Springer
We construct the first actively-secure threshold version of the cryptosystem based on class
groups from the so-called CL framework (Castagnos and Laguillaumie, 2015). We show …

Towards scalable threshold cryptosystems

A Tomescu, R Chen, Y Zheng… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
The resurging interest in Byzantine fault tolerant systems will demand more scalable
threshold cryptosystems. Unfortunately, current systems scale poorly, requiring time …

Efficient lattice-based threshold signatures with functional interchangeability

G Tang, B Pang, L Chen… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
A threshold signature scheme distributes the ability to generate signatures through
distributed key generation and signing protocols. A threshold signature scheme should be …

Tag-KEM/DEM: A new framework for hybrid encryption and a new analysis of Kurosawa-Desmedt KEM

M Abe, R Gennaro, K Kurosawa, V Shoup - … international conference on …, 2005 - Springer
This paper presents a novel framework for generic construction of hybrid encryption
schemes secure against chosen ciphertext attack. Our new framework yields new and more …

Born and raised distributively: Fully distributed non-interactive adaptively-secure threshold signatures with short shares

B Libert, M Joye, M Yung - Proceedings of the 2014 ACM symposium on …, 2014 - dl.acm.org
Threshold cryptography is a fundamental distributed computational paradigm for enhancing
the availability and the security of cryptographic public-key schemes. It does it by dividing …