“…Publicly Verifiable Secret Sharing schemes (PVSS) [47,69,66,17,18,8,25], Threshold Crypto-Systems [16,45,31,20,55], Verifiable Random Functions (VRF) [27,39,36,71,22,24], Verifiable Delay Functions (VDF) [49,30,34,65,44]. Randomness can also be extracted from external data sources such as [7,21,13] or from the blockchain schemes having their own random beacon [47,36,45]. These DRB protocols are not equally-suited in all applications or use-cases due to the diversity in their designs, characteristics, and underlying assumptions.…”