“…In the past few years, we've seen an explosion of academic and industrial cryptographic systems built on distributed trust; some applications are based on secure multi-party computation [9,34,86] (e.g. private search [23,24,64,82], private analytics [7,11,19,27,42] private media delivery [38], private blocklist lookups [46], private DNS [72], anonymous messaging [17,20,28,48,49,84], and cryptocurrency wallets [30,31,45,63,67,70,75]), while others are based on Byzantine fault-tolerant consensus and blockchains [6,8,15,25,36,37,47,50,56,88].…”