Many threshold systems require some kind of secret sharing during their set-up phase. There has been several recent work in doing secret sharing in a distributed manner through the use of Blockchain so that one does not have to rely on trusted third parties nor strong assumptions about the communication medium. This paper continues this line of work and presents a new protocol for distributed key generation (DKG). We develop a new technique that leverages the mainchain of a popular blockchain platform like Bitcoin, together with a mixing service and a group signature scheme, to provide anonymity and traceability; we connect this to a sidechain, pegged to the mainchain, that brings a better scalability. We implemented the technique on the jo...
Strong anonymity and transaction privacy for cryptocurrencies that build on top of a permissionless ...
Abstract. Bitcoin is a peer-to-peer cryptocurrency that prevents double spending using a distributed...
Distributed protocols allow a cryptographic scheme to distribute its operation among a group of part...
The classical distributed key generation protocols (DKG) are resurging due to their widespread appli...
Distributed key generation (DKG) has been studied extensively in the cryptographic literature. Howev...
Numerous cryptographic applications require a trusted authority to hold a secret. With a plethora o...
We present a non-interactive publicly verifiable secret sharing scheme where a dealer can construct ...
With the rapid advancement and wide application of blockchain technology, blockchain consensus proto...
Distributed key generation (DKG) is widely used in multi-party computation and decentralized applica...
Many anonymous cryptocurrencies have been introduced to address the privacy issue in Bitcoin. Compar...
The network connectivity problem is one of the critical challenges of an anonymous server implementa...
Threshold cryptography increases security and resilience by sharing a private cryptographic key over...
In this paper, we present the first Asynchronous Distributed Key Generation (ADKG) algorithm which i...
Since the advent of Bitcoin, scientific interest in its underlying core technology Blockchain has be...
One of the core promises of blockchain technology is that of enabling trustworthy data dissemination...
Strong anonymity and transaction privacy for cryptocurrencies that build on top of a permissionless ...
Abstract. Bitcoin is a peer-to-peer cryptocurrency that prevents double spending using a distributed...
Distributed protocols allow a cryptographic scheme to distribute its operation among a group of part...
The classical distributed key generation protocols (DKG) are resurging due to their widespread appli...
Distributed key generation (DKG) has been studied extensively in the cryptographic literature. Howev...
Numerous cryptographic applications require a trusted authority to hold a secret. With a plethora o...
We present a non-interactive publicly verifiable secret sharing scheme where a dealer can construct ...
With the rapid advancement and wide application of blockchain technology, blockchain consensus proto...
Distributed key generation (DKG) is widely used in multi-party computation and decentralized applica...
Many anonymous cryptocurrencies have been introduced to address the privacy issue in Bitcoin. Compar...
The network connectivity problem is one of the critical challenges of an anonymous server implementa...
Threshold cryptography increases security and resilience by sharing a private cryptographic key over...
In this paper, we present the first Asynchronous Distributed Key Generation (ADKG) algorithm which i...
Since the advent of Bitcoin, scientific interest in its underlying core technology Blockchain has be...
One of the core promises of blockchain technology is that of enabling trustworthy data dissemination...
Strong anonymity and transaction privacy for cryptocurrencies that build on top of a permissionless ...
Abstract. Bitcoin is a peer-to-peer cryptocurrency that prevents double spending using a distributed...
Distributed protocols allow a cryptographic scheme to distribute its operation among a group of part...