Author:
AlHaddad Nicolas,Varia Mayank,Zhang Haibin
Publisher
Springer Berlin Heidelberg
Reference37 articles.
1. Abraham, I., Nayak, K., Ren, L., Shrestha, N.: On the optimality of optimistic responsiveness. IACR Cryptol. ePrint Arch. 2020, 458 (2020)
2. Lecture Notes in Computer Science;M Backes,2013
3. Basu, S., Malkhi, D., Reiter, M., Tomescu, A.: Asynchronous verifiable secret-sharing protocols on a good day. CoRR. abs/1807.03720 (2018)
4. Basu, S., Tomescu, A., Abraham, I., Malkhi, D., Reiter, M.K., Sirer, E.G.: Efficient verifiable secret sharing with share recovery in BFT protocols. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019, pp. 2387–2402. Association for Computing Machinery, New York (2019)
5. Ben-Or, M., Canetti, R., Goldreich, O.: Asynchronous secure computation. In: Proceedings of the Twenty-Fifth Annual ACM Symposium on Theory of Computing, STOC 1993, pp. 52–61. Association for Computing Machinery, New York (1993)
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. BG: A Modular Treatment of BFT Consensus Toward a Unified Theory of BFT Replication;IEEE Transactions on Information Forensics and Security;2024
2. On the Security of KZG Commitment for VSS;Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security;2023-11-15
3. Scalable Multi-domain Trust Infrastructures for Segmented Networks;2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD);2023-11-06
4. Practical Asynchronous Distributed Key Generation: Improved Efficiency, Weaker Assumption, and Standard Model;2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN);2023-06
5. Bingo: Adaptivity and Asynchrony in Verifiable Secret Sharing and Distributed Key Generation;Advances in Cryptology – CRYPTO 2023;2023