Asynchronous Distributed Key Generation for Computationally-Secure Randomness, Consensus, and Threshold Signatures.

E Kokoris Kogias, D Malkhi, A Spiegelman - Proceedings of the 2020 …, 2020 - dl.acm.org
In this paper, we present the first Asynchronous Distributed Key Generation (ADKG)
algorithm which is also the first distributed key generation algorithm that can generate …

Round efficient byzantine agreement from VDFs

P Das, L Eckey, S Faust, J Loss, M Maitra - International Conference on …, 2024 - Springer
Byzantine agreement (BA) is a fundamental primitive in distributed systems and has
received huge interest as an important building block for blockchain systems. Classical …

Resource burning for permissionless systems

D Gupta, J Saia, M Young - International Colloquium on Structural …, 2020 - Springer
Proof-of-work puzzles and CAPTCHAS consume enormous amounts of energy and time.
These techniques are examples of resource burning: verifiable consumption of resources …

Bankrupting Sybil despite churn

D Gupta, J Saia, M Young - Journal of Computer and System Sciences, 2023 - Elsevier
A Sybil attack occurs when an adversary controls multiple system identifiers (IDs). Limiting
the number of Sybil (bad) IDs to a minority is critical for tolerating malicious behavior. A …

Randomized view reconciliation in permissionless distributed systems

R Hou, I Jahja, L Luu, P Saxena… - IEEE/ACM Transactions …, 2020 - ieeexplore.ieee.org
In a sybil attack, an adversary creates many fake identities/nodes and have them join the
system. Computational puzzles have long been investigated as a possible sybil defense …

Sybil defense using efficient resource burning

D Gupta - 2020 - search.proquest.com
Abstract In 1993, Dwork and Naor proposed using computational puzzles, a resource
burning mechanism, to combat spam email. In the ensuing three decades, resource burning …