Threshold encryption with silent setup

S Garg, D Kolonelos, GV Policharla… - Annual International …, 2024 - Springer
We build a concretely efficient threshold encryption scheme where the joint public key of a
set of parties is computed as a deterministic function of their locally computed public keys …

Reducing the CRS size in registered ABE systems

R Garg, G Lu, B Waters, DJ Wu - Annual International Cryptology …, 2024 - Springer
Attribute-based encryption (ABE) is a generalization of public-key encryption that enables
fine-grained access control to encrypted data. In (ciphertext-policy) ABE, a central trusted …

Distributed Broadcast Encryption from Lattices

J Champion, DJ Wu - Theory of Cryptography Conference, 2024 - Springer
A broadcast encryption scheme allows a user to encrypt a message to N recipients with a
ciphertext whose size scales sublinearly with N. While broadcast encryption enables …

BEAT-MEV: Epochless Approach to Batched Threshold Encryption for MEV Prevention

J Bormet, S Faust, H Othman, Z Qu - Cryptology ePrint Archive, 2024 - eprint.iacr.org
In decentralized finance (DeFi), the public availability of pending transactions presents
significant privacy concerns, enabling market manipulation through miner extractable value …

Distributed Broadcast Encryption

J Champion - Theory of Cryptography: 22nd International Conference … - books.google.com
A broadcast encryption scheme allows a user to encrypt a message to N recipients with a
ciphertext whose size scales sublinearly with N. While broadcast encryption enables …