• Publications
  • Influence
Verifiable secret sharing and multiparty protocols with honest majority
TLDR
We present a verifiable secret sharing protocol, and show that any multiparty protocol, or game with incomplete information, can be achieved if a majority of the players are honest. Expand
  • 955
  • 67
  • PDF
On the Security of Joint Signature and Encryption
TLDR
We formally study the notion of a joint signature and encryption in the public-key setting. Contrary to what recent results in the symmetric setting [5, 22] might lead one to expect, we show that classical "encryptthen-sign" (?tS) and "sign-then-encrypt" (St?) methods are both secure composition methods. Expand
  • 559
  • 63
  • PDF
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems
TLDR
A Distributed Key Generation (DKG) protocol is an essential component of threshold Cryptosystems required to initialize the cryptosystem securely and generate its private and public keys. Expand
  • 494
  • 51
Fast Batch Verification for Modular Exponentiation and Digital Signatures
TLDR
Many tasks in cryptography (e.g., digital signature verification) call for verification of a basic operation like modular exponentiation in some group: given g, x, y) check that gx = y. Expand
  • 438
  • 43
  • PDF
Secure Hash-and-Sign Signatures Without the Random Oracle
TLDR
We present a new signature scheme which is existentially unforgeable under chosen message attacks, assuming some variant of the RSA conjecture. Expand
  • 358
  • 35
  • PDF
Simplified VSS and fast-track multiparty computations with applications to threshold cryptography
TLDR
The goal of this paper is to introduce a simple verifiable secret sharing scheme which is based on fast cryptographic primitives and avoids altogether the need for expensive zero-knowledge proofs. Expand
  • 444
  • 33
Fast asynchronous Byzantine agreement with optimal resilience
Fast Asynchronous Byzantine Agreement with Optimal Resilience
  • 240
  • 32
Chameleon Signatures
  • 248
  • 31
  • PDF
Robust Threshold DSS Signatures
TLDR
We present threshold DSS (digital signature standard) signatures where the power to sign is shared by n players such that for a given parameter t Using a threshold signature scheme, digital signatures can be produced by a group of players rather than by one party. Expand
  • 383
  • 26
  • PDF
Chameleon Hashing and Signatures
TLDR
We introduce chameleon signatures that provide with an undeniable commitment of the signer to the contents of the signed document (as regular digital signatures do) but, at the same time, do not allow the recipient of the signature to disclose the contents to any third party without the signers consent. Expand
  • 119
  • 26
  • PDF