-
Chapter and Conference Paper
MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and Applications
We study new candidates for symmetric cryptographic primitives that leverage alternation between linear functions over $$\mathbb {Z}_2...
-
Chapter and Conference Paper
Order-Fairness for Byzantine Consensus
Decades of research in both cryptography and distributed systems has extensively studied the problem of state machine replication, also known as Byzantine consensus. A consensus protocol must satisfy two prope...
-
Chapter and Conference Paper
Using Level-1 Homomorphic Encryption to Improve Threshold DSA Signatures for Bitcoin Wallet Security
Recently Gennaro et al. (ACNS ’16) presented a threshold-optimal si...
-
Chapter and Conference Paper
Threshold Cryptosystems from Threshold Fully Homomorphic Encryption
We develop a general approach to adding a threshold functionality to a large class of (non-threshold) cryptographic schemes. A threshold functionality enables a secret key to be split into a number of shares, ...
-
Chapter and Conference Paper
Escrow Protocols for Cryptocurrencies: How to Buy Physical Goods Using Bitcoin
We consider the problem of buying physical goods with cryptocurrencies. There is an inherent circular dependency: should be the buyer trust the seller and pay before receiving the goods or should the seller tr...
-
Chapter and Conference Paper
Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security
While threshold signature schemes have been presented before, there has never been an optimal threshold signature algorithm for DSA. The properties of DSA make it quite challenging to build a threshold version...
-
Chapter and Conference Paper
Elastic Ring Search for Ad Hoc Networks
In highly dynamic mobile ad hoc networks, new paths between nodes can become available in a short amount of time. We show how to leverage this property in order to efficiently search for paths between nodes us...