YoVDO

Practical Asynchronous High-threshold Distributed Key Generation and Distributed Polynomial Sampling

Offered By: USENIX via YouTube

Tags

USENIX Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a cutting-edge presentation from USENIX Security '23 on practical asynchronous high-threshold distributed key generation and distributed polynomial sampling. Delve into the innovative work by researchers from the University of Illinois at Urbana-Champaign, Aptos, IST Austria, and Mysten Labs as they introduce a simple and efficient asynchronous Distributed Key Generation (DKG) protocol. Learn how this protocol supports high reconstruction thresholds, tolerates malicious nodes, and significantly improves upon existing solutions. Discover the protocol's applications in randomness beacons, threshold signatures, Byzantine consensus, and multiparty computation. Examine the technical details, including the expected communication cost and security assumptions. Gain insights into the implementation and evaluation of the protocol using a network of up to 128 geographically distributed nodes, and understand how it achieves substantial improvements in running time and bandwidth usage compared to state-of-the-art alternatives.

Syllabus

USENIX Security '23 - Practical Asynchronous High-threshold Distributed Key Generation and...


Taught by

USENIX

Related Courses

Never Been KIST - Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport
USENIX via YouTube
Eclipse Attacks on Bitcoin’s Peer-to-Peer Network
USENIX via YouTube
Control-Flow Bending - On the Effectiveness of Control-Flow Integrity
USENIX via YouTube
Protecting Privacy of BLE Device Users
USENIX via YouTube
K-Fingerprinting - A Robust Scalable Website Fingerprinting Technique
USENIX via YouTube