Traditional bounds on synchronous Byzantine agreement (BA) and secure multi-party computation (MPC) establish that in absence of a private correlated-randomness setup, such as a PKI, protocols can tolerate up to t
CITATION STYLE
Garay, J., Kiayias, A., Ostrovsky, R. M., Panagiotakos, G., & Zikas, V. (2020). Resource-Restricted Cryptography: Revisiting MPC Bounds in the Proof-of-Work Era. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 12106 LNCS, pp. 129–158). Springer. https://doi.org/10.1007/978-3-030-45724-2_5
Mendeley helps you to discover research relevant for your work.