ABERand: Effective Distributed Randomness on Ciphertext-Policy Attribute-Based Encryption
暂无分享,去创建一个
Haibin Kan | Liang Zhang | Zening Chen | Ziqi Mao | Jinjie Gao | Ziqi Mao | Haibin Kan | Zening Chen | Liangao Zhang | Jinjie Gao
[1] Hugo Krawczyk,et al. Secure Distributed Key Generation for Discrete-Log Based Cryptosystems , 1999, Journal of Cryptology.
[2] Aggelos Kiayias,et al. Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol , 2017, CRYPTO.
[3] Arjen K. Lenstra,et al. A random zoo: sloth, unicorn, and trx , 2015, IACR Cryptol. ePrint Arch..
[4] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[5] Michael J. Fischer,et al. Scalable Bias-Resistant Distributed Randomness , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[6] Wei Li,et al. TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage , 2016, IEEE Transactions on Parallel and Distributed Systems.
[7] Sunny King,et al. PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake , 2012 .
[8] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.
[9] Warren He,et al. Proof of Luck: an Efficient Blockchain Consensus Protocol , 2016, SysTEX@Middleware.
[10] Manuel Blum,et al. Coin Flipping by Telephone. , 1981, CRYPTO 1981.
[11] Joseph Bonneau,et al. Proofs-of-delay and randomness beacons in Ethereum , 2017 .
[12] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[13] Serguei Popov,et al. On a decentralized trustless pseudo-random number generation algorithm , 2017, J. Math. Cryptol..
[14] Aggelos Kiayias,et al. The Bitcoin Backbone Protocol: Analysis and Applications , 2015, EUROCRYPT.
[15] Dominic Williams,et al. DFINITY Technology Overview Series, Consensus System , 2018, ArXiv.
[16] Cécile Pierrot,et al. Malleability of the blockchain’s entropy , 2016, Cryptography and Communications.
[17] Michael O. Rabin,et al. Transaction Protection by Beacons , 1983, J. Comput. Syst. Sci..
[18] Sushmita Ruj,et al. Bitcoin Block Withholding Attack: Analysis and Mitigation , 2017, IEEE Transactions on Information Forensics and Security.
[19] Brent Waters,et al. Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption , 2015, Financial Cryptography.
[20] Silvio Micali,et al. Algorand: Scaling Byzantine Agreements for Cryptocurrencies , 2017, IACR Cryptol. ePrint Arch..
[21] Rakesh Bobba,et al. Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption , 2009, ESORICS.
[22] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[23] David Wolinsky,et al. Keeping Authorities "Honest or Bust" with Decentralized Witness Cosigning , 2015, 2016 IEEE Symposium on Security and Privacy (SP).
[24] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[25] Berry Schoenmakers,et al. A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic , 1999, CRYPTO.
[26] Srinivas Devadas,et al. XRD: Scalable Messaging System with Cryptographic Privacy , 2020, NSDI.
[27] Jeremy Clark,et al. On the Use of Financial Data as a Random Beacon , 2010, EVT/WOTE.
[28] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[29] Amit Sahai,et al. Bounded Ciphertext Policy Attribute Based Encryption , 2008, ICALP.
[30] S. Micali. Byzantine Agreement , Made Trivial , 2017 .
[31] Zhenfu Cao,et al. Efficient Generation of Linear Secret Sharing Scheme Matrices from Threshold Access Trees , 2014 .
[32] Prateek Saxena,et al. A Secure Sharding Protocol For Open Blockchains , 2016, CCS.
[33] Allison Bishop,et al. Decentralizing Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..
[34] Xiaohui Liang,et al. Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority , 2008, INDOCRYPT.
[35] P. MuraliKrishna,et al. SECURE SCHEMES FOR SECRET SHARING AND KEY DISTRIBUTION USING PELL'S EQUATION , 2013 .
[36] Dan Boneh,et al. Verifiable Delay Functions , 2018, IACR Cryptol. ePrint Arch..
[37] Elaine Shi,et al. Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[38] Silvio Micali,et al. Verifiable random functions , 1999, 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039).
[39] Torben P. Pedersen. A Threshold Cryptosystem without a Trusted Party (Extended Abstract) , 1991, EUROCRYPT.
[40] Ian Miers,et al. Charm: a framework for rapidly prototyping cryptosystems , 2013, Journal of Cryptographic Engineering.
[41] Sarah Meiklejohn,et al. Winning the Caucus Race: Continuous Leader Election via Public Randomness , 2018, ArXiv.
[42] Jeremy Clark,et al. On Bitcoin as a public randomness source , 2015, IACR Cryptol. ePrint Arch..
[43] Ignacio Cascudo,et al. SCRAPE: Scalable Randomness Attested by Public Entities , 2017, IACR Cryptol. ePrint Arch..
[44] Nuttapong Attrapadung,et al. Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts , 2011, Public Key Cryptography.
[45] Vitalik Buterin. A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .