[PDF][PDF] Chainlink 2.0: Next steps in the evolution of decentralized oracle networks

L Breidenbach, C Cachin, B Chan, A Coventry, S Ellis… - Chainlink Labs, 2021 - naorib.ir
In this whitepaper, we articulate a vision for the evolution of Chainlink beyond its initial
conception in the original Chainlink whitepaper. We foresee an increasingly expansive role …

Candid: Can-do decentralized identity with legacy compatibility, sybil-resistance, and accountability

D Maram, H Malvai, F Zhang… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
We present CanDID, a platform for practical, user-friendly realization of decentralized
identity, the idea of empowering end users with management of their own credentials. While …

FIN: practical signature-free asynchronous common subset in constant time

S Duan, X Wang, H Zhang - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
Asynchronous common subset (ACS) is a powerful paradigm enabling applications such as
Byzantine fault-tolerance (BFT) and multi-party computation (MPC). The most efficient ACS …

Asynchronous data dissemination and its applications

S Das, Z Xiang, L Ren - Proceedings of the 2021 ACM SIGSAC …, 2021 - dl.acm.org
In this paper, we introduce the problem of Asynchronous Data Dissemination (ADD).
Intuitively, an ADD protocol disseminates a message to all honest nodes in an …

Pace: Fully parallelizable bft from reproposable byzantine agreement

H Zhang, S Duan - Proceedings of the 2022 ACM SIGSAC Conference …, 2022 - dl.acm.org
The classic asynchronous Byzantine fault tolerance (BFT) framework of Ben-Or, Kemler, and
Rabin (BKR) and its descendants rely on reliable broadcast (RBC) and asynchronous binary …

Practical asynchronous high-threshold distributed key generation and distributed polynomial sampling

S Das, Z Xiang, L Kokoris-Kogias, L Ren - 32nd USENIX Security …, 2023 - usenix.org
Distributed Key Generation (DKG) is a technique to bootstrap threshold cryptosystems
without a trusted party. DKG is an essential building block to many decentralized protocols …

Long live the honey badger: Robust asynchronous {DPSS} and its applications

T Yurek, Z Xiang, Y Xia, A Miller - 32nd USENIX Security Symposium …, 2023 - usenix.org
Secret sharing is an essential tool for many distributed applications, including distributed key
generation and multiparty computation. For many practical applications, we would like to …

Sok: data sovereignty

J Ernstberger, J Lauinger, F Elsheimy… - 2023 IEEE 8th …, 2023 - ieeexplore.ieee.org
Society appears to be on the verge of recognizing the need for control over sensitive data in
modern web applications. Recently, many systems claim to give control to individuals …

Clarion: Anonymous communication from multiparty shuffling protocols

S Eskandarian, D Boneh - Cryptology ePrint Archive, 2021 - eprint.iacr.org
This paper studies the role of multiparty shuffling protocols in enabling more efficient
metadata-hiding communication. We show that the process of shuffling messages can be …

Sok: Mitigation of front-running in decentralized finance

C Baum, J Hsin-yu Chiang, B David… - … Conference on Financial …, 2022 - Springer
Front-running is the malicious, and often illegal, act of both manipulating the order of
pending trades and injecting additional trades to make a profit at the cost of other users. In …