- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources3
- Resource Type
-
0002000001000000
- More
- Availability
-
30
- Author / Contributor
- Filter by Author / Creator
-
-
Malkin, Tal (3)
-
Ball, Marshall (1)
-
Beimel, Amos (1)
-
Bonneau, Joseph (1)
-
Boyle, Elette (1)
-
Choi, Kevin (1)
-
Christ, Miranda (1)
-
Cohen, Ran (1)
-
Kohl, Lisa (1)
-
Mazor, Noam (1)
-
McKelvie, Walter (1)
-
Meyer, Pierre (1)
-
Moran, Tal (1)
-
#Tyler Phillips, Kenneth E. (0)
-
#Willis, Ciara (0)
-
& Abreu-Ramos, E. D. (0)
-
& Abramson, C. I. (0)
-
& Abreu-Ramos, E. D. (0)
-
& Adams, S.G. (0)
-
& Ahmed, K. (0)
-
- Filter by Editor
-
-
Böhme, Rainer (1)
-
Kiffer, Lucianna (1)
-
Reyzin, Leonid (1)
-
Stebila, Douglas (1)
-
& Spizer, S. M. (0)
-
& . Spizer, S. (0)
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Bosch, N. (0)
-
& Brennan K. (0)
-
& Brennan, K. (0)
-
& Chen, B. (0)
-
& Chen, Bodong (0)
-
& Drown, S. (0)
-
& Ferretti, F. (0)
-
& Higgins, A. (0)
-
& J. Peters (0)
-
& Kali, Y. (0)
-
& Ruiz-Arias, P.M. (0)
-
& S. Spitzer (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
Reyzin, Leonid; Stebila, Douglas (Ed.)
-
Christ, Miranda; Choi, Kevin; McKelvie, Walter; Bonneau, Joseph; Malkin, Tal (, Schloss Dagstuhl – Leibniz-Zentrum für Informatik)Böhme, Rainer; Kiffer, Lucianna (Ed.)We consider the problem of secret leader election with accountability. Secret leader election protocols counter adaptive adversaries by keeping the identities of elected leaders secret until they choose to reveal themselves, but in existing protocols this means it is impossible to determine who was elected leader if they fail to act. This opens the door to undetectable withholding attacks, where leaders fail to act in order to slow the protocol or bias future elections in their favor. We formally define accountability (in weak and strong variants) for secret leader election protocols. We present three paradigms for adding accountability, using delay-based cryptography, enforced key revelation, or threshold committees, all of which ensure that after some time delay the result of the election becomes public. The paradigm can be chosen to balance trust assumptions, protocol efficiency, and the length of the delay before leaders are revealed. Along the way, we introduce several new cryptographic tools including re-randomizable timed commitments and timed VRFs.more » « less
-
Ball, Marshall; Boyle, Elette; Cohen, Ran; Kohl, Lisa; Malkin, Tal; Meyer, Pierre; Moran, Tal (, Journal of Cryptology)
An official website of the United States government

Full Text Available