With the accelerated adoption of end-to-end encryption, there is an
oppo...
One of the defining features of Bitcoin and the thousands of cryptocurre...
The Web public key infrastructure is essential to providing secure
commu...
Pyramid schemes are investment scams in which top-level participants in ...
We give a protocol for Asynchronous Distributed Key Generation (A-DKG) t...
In recent years, there has been increasing recognition of the benefits o...
Payment channel networks, and the Lightning Network in particular, seem ...
One of the defining features of a cryptocurrency is that its ledger,
con...
Interest in cryptocurrencies has skyrocketed since their introduction a
...
Blockchain-based consensus protocols present the opportunity to develop ...
The sharing of personal data has the potential to bring substantial bene...
Among the now numerous alternative cryptocurrencies derived from Bitcoin...
Consensus protocols inherently rely on the notion of leader election, in...
Transparency is crucial in security-critical applications that rely on
a...
The blockchain initially gained traction in 2008 as the technology under...