Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security 2019
DOI: 10.1145/3319535.3363203
|View full text |Cite
|
Sign up to set email alerts
|

Churp

Abstract: We introduce CHURP (CHUrn-Robust Proactive secret sharing). CHURP enables secure secret-sharing in dynamic settings, where the committee of nodes storing a secret changes over time. Designed for blockchains, CHURP has lower communication complexity than previous schemes: O(n) on-chain and O(n 2 ) off-chain in the optimistic case of no node failures.CHURP includes several technical innovations: An efficient new proactivization scheme of independent interest, a technique (using asymmetric bivariate polynomials) … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 43 publications
(4 citation statements)
references
References 50 publications
0
4
0
Order By: Relevance
“…Any mobile and active PPT adversary A that controls ≤ t parties from C and ≤ t parties from C learns no information about the secret vector s or the N evaluation results {F k (s)} N k=1 . Remark 1: Similar to [18], the integrity and secrecy and of our DPFSS are informally defined. Proofs of these properties are quite formal and depend on the design idea that every message in our scheme will be verified and the sender of a maliciously designed message will be removed from the protocol execution immediately.…”
Section: Definition 2 (Integrity and Secrecy)mentioning
confidence: 99%
See 2 more Smart Citations
“…Any mobile and active PPT adversary A that controls ≤ t parties from C and ≤ t parties from C learns no information about the secret vector s or the N evaluation results {F k (s)} N k=1 . Remark 1: Similar to [18], the integrity and secrecy and of our DPFSS are informally defined. Proofs of these properties are quite formal and depend on the design idea that every message in our scheme will be verified and the sender of a maliciously designed message will be removed from the protocol execution immediately.…”
Section: Definition 2 (Integrity and Secrecy)mentioning
confidence: 99%
“…Therefore, the secrecy of our DPFSS scheme holds throughout the execution. V. PERFORMANCE EVALUATION Like [17], [18], the efficiency of our DPFSS scheme DPFSS can be measured with its communication complexity and time complexity.…”
Section: Reconstructionmentioning
confidence: 99%
See 1 more Smart Citation
“…Also, in recent years, many blockchain‐based SSSs were introduced to outcome the limitation of dishonest participants. To protect the secret from attackers, many authors used the threshold t/m$t/m$ less than 1/2$1/2$ [14–18].…”
Section: Introductionmentioning
confidence: 99%