Cuckoo commitments: Registration-based encryption and key-value map commitments for large spaces
Abstract Registration-Based Encryption (RBE)[Garg et al. TCC'18] is a public-key encryption
mechanism in which users generate their own public and secret keys, and register their …
mechanism in which users generate their own public and secret keys, and register their …
Publicly verifiable secret sharing over class groups and applications to DKG and YOSO
Abstract Publicly Verifiable Secret Sharing (PVSS) allows a dealer to publish encrypted
shares of a secret so that parties holding the corresponding decryption keys may later …
shares of a secret so that parties holding the corresponding decryption keys may later …
YOLO YOSO: fast and simple encryption and secret sharing in the YOSO model
Achieving adaptive (or proactive) security in cryptographic protocols is notoriously difficult
due to the adversary's power to dynamically corrupt parties as the execution progresses …
due to the adversary's power to dynamically corrupt parties as the execution progresses …
Riggs: Decentralized sealed-bid auctions
We introduce the first practical protocols for fully decentralized sealed-bid auctions using
timed commitments. Timed commitments ensure that the auction is finalized fairly even if all …
timed commitments. Timed commitments ensure that the auction is finalized fairly even if all …
McFly: verifiable encryption to the future made practical
Blockchain protocols have revolutionized how individuals and devices interact and transact
over the internet. More recently, a trend has emerged to harness blockchain technology as a …
over the internet. More recently, a trend has emerged to harness blockchain technology as a …
Transparent batchable time-lock puzzles and applications to byzantine consensus
Time-lock puzzles (TLP) are a fascinating type of cryptographic problem that is easy to
generate, but takes a certain time to solve, even when arbitrary parallel speedup is allowed …
generate, but takes a certain time to solve, even when arbitrary parallel speedup is allowed …
A Security-Enhanced Certificateless Designated Verifier Aggregate Signature Scheme for HWMSNs in the YOSO Model
X Li, L Zhou, X Yin, J Ning - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
Due to the advent of healthcare wireless medical sensor networks (HWMSNs) technology,
the traditional model of medical treatment has been transformed. In HWMSNs environments …
the traditional model of medical treatment has been transformed. In HWMSNs environments …
Large-scale non-interactive threshold cryptosystems in the yoso model
Abstract A $(t, n) $-public key threshold cryptosystem allows distributing the execution of a
cryptographic task among a set of $ n $ parties by splitting the secret key required for the …
cryptographic task among a set of $ n $ parties by splitting the secret key required for the …
Individual cryptography
S Dziembowski, S Faust, T Lizurej - Annual International Cryptology …, 2023 - Springer
We initiate a formal study of individual cryptography. Informally speaking, an algorithm Alg is
individual if, in every implementation of Alg, there always exists an individual user with full …
individual if, in every implementation of Alg, there always exists an individual user with full …
Encryption Techniques and Algorithms to Combat Cybersecurity Attacks: A Review
The danger of cyber-attacks is constant in the current digital environment. The necessity for
effective security actions are more crucial than ever before due to the increasingly complex …
effective security actions are more crucial than ever before due to the increasingly complex …