Cuckoo commitments: Registration-based encryption and key-value map commitments for large spaces

D Fiore, D Kolonelos, P Perthuis - … on the Theory and Application of …, 2023 - Springer
Abstract Registration-Based Encryption (RBE)[Garg et al. TCC'18] is a public-key encryption
mechanism in which users generate their own public and secret keys, and register their …

Publicly verifiable secret sharing over class groups and applications to DKG and YOSO

I Cascudo, B David - Annual International Conference on the Theory and …, 2024 - Springer
Abstract Publicly Verifiable Secret Sharing (PVSS) allows a dealer to publish encrypted
shares of a secret so that parties holding the corresponding decryption keys may later …

YOLO YOSO: fast and simple encryption and secret sharing in the YOSO model

I Cascudo, B David, L Garms, A Konring - … on the Theory and Application of …, 2022 - Springer
Achieving adaptive (or proactive) security in cryptographic protocols is notoriously difficult
due to the adversary's power to dynamically corrupt parties as the execution progresses …

Riggs: Decentralized sealed-bid auctions

N Tyagi, A Arun, C Freitag, R Wahby… - Proceedings of the …, 2023 - dl.acm.org
We introduce the first practical protocols for fully decentralized sealed-bid auctions using
timed commitments. Timed commitments ensure that the auction is finalized fairly even if all …

McFly: verifiable encryption to the future made practical

N Döttling, L Hanzlik, B Magri, S Wohnig - International Conference on …, 2023 - Springer
Blockchain protocols have revolutionized how individuals and devices interact and transact
over the internet. More recently, a trend has emerged to harness blockchain technology as a …

Transparent batchable time-lock puzzles and applications to byzantine consensus

S Srinivasan, J Loss, G Malavolta, K Nayak… - … Conference on Public …, 2023 - Springer
Time-lock puzzles (TLP) are a fascinating type of cryptographic problem that is easy to
generate, but takes a certain time to solve, even when arbitrary parallel speedup is allowed …

A Security-Enhanced Certificateless Designated Verifier Aggregate Signature Scheme for HWMSNs in the YOSO Model

X Li, L Zhou, X Yin, J Ning - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
Due to the advent of healthcare wireless medical sensor networks (HWMSNs) technology,
the traditional model of medical treatment has been transformed. In HWMSNs environments …

Large-scale non-interactive threshold cryptosystems in the yoso model

A Erwig, S Faust, S Riahi - Cryptology ePrint Archive, 2021 - eprint.iacr.org
Abstract A $(t, n) $-public key threshold cryptosystem allows distributing the execution of a
cryptographic task among a set of $ n $ parties by splitting the secret key required for the …

Individual cryptography

S Dziembowski, S Faust, T Lizurej - Annual International Cryptology …, 2023 - Springer
We initiate a formal study of individual cryptography. Informally speaking, an algorithm Alg is
individual if, in every implementation of Alg, there always exists an individual user with full …

Encryption Techniques and Algorithms to Combat Cybersecurity Attacks: A Review

SA Wadho, AF Meghji, A Yichiet, R Kumar… - … on Computer Sciences, 2023 - vfast.org
The danger of cyber-attacks is constant in the current digital environment. The necessity for
effective security actions are more crucial than ever before due to the increasingly complex …