Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and Applications

    We study new candidates for symmetric cryptographic primitives that leverage alternation between linear functions over $$\mathbb {Z}_2...

    Itai Dinur, Steven Goldfeder, Tzipora Halevi in Advances in Cryptology – CRYPTO 2021 (2021)

  2. Chapter and Conference Paper

    Order-Fairness for Byzantine Consensus

    Decades of research in both cryptography and distributed systems has extensively studied the problem of state machine replication, also known as Byzantine consensus. A consensus protocol must satisfy two prope...

    Mahimna Kelkar, Fan Zhang, Steven Goldfeder in Advances in Cryptology – CRYPTO 2020 (2020)

  3. No Access

    Chapter and Conference Paper

    Using Level-1 Homomorphic Encryption to Improve Threshold DSA Signatures for Bitcoin Wallet Security

    Recently Gennaro et al. (ACNS ’16) presented a threshold-optimal si...

    Dan Boneh, Rosario Gennaro, Steven Goldfeder in Progress in Cryptology – LATINCRYPT 2017 (2019)

  4. Chapter and Conference Paper

    Threshold Cryptosystems from Threshold Fully Homomorphic Encryption

    We develop a general approach to adding a threshold functionality to a large class of (non-threshold) cryptographic schemes. A threshold functionality enables a secret key to be split into a number of shares, ...

    Dan Boneh, Rosario Gennaro, Steven Goldfeder in Advances in Cryptology – CRYPTO 2018 (2018)

  5. No Access

    Chapter and Conference Paper

    Escrow Protocols for Cryptocurrencies: How to Buy Physical Goods Using Bitcoin

    We consider the problem of buying physical goods with cryptocurrencies. There is an inherent circular dependency: should be the buyer trust the seller and pay before receiving the goods or should the seller tr...

    Steven Goldfeder, Joseph Bonneau in Financial Cryptography and Data Security (2017)

  6. Chapter and Conference Paper

    Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security

    While threshold signature schemes have been presented before, there has never been an optimal threshold signature algorithm for DSA. The properties of DSA make it quite challenging to build a threshold version...

    Rosario Gennaro, Steven Goldfeder in Applied Cryptography and Network Security (2016)

  7. No Access

    Chapter and Conference Paper

    Elastic Ring Search for Ad Hoc Networks

    In highly dynamic mobile ad hoc networks, new paths between nodes can become available in a short amount of time. We show how to leverage this property in order to efficiently search for paths between nodes us...

    Simon Shamoun, David Sarne, Steven Goldfeder in Mobile and Ubiquitous Systems: Computing, … (2014)