2022
DOI: 10.1007/978-3-030-97121-2_10
|View full text |Cite
|
Sign up to set email alerts
|

Storing and Retrieving Secrets on a Blockchain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(11 citation statements)
references
References 42 publications
0
11
0
Order By: Relevance
“…Liu et al [20] proposed a construction based on multi-linear maps, which can be instantiated from indistinguishability obfuscation (iO) [1], which in turn can be obtained from well-founded assumptions [19], leading to a theoretical instantiation. A different approach was taken by Goyal et al [15] who show how the functionality of extractable witness encryption can be implemented efficiently on a blockchain. This approach is especially appealing in relation to our work due to the obtained efficiency and that our construction already makes use of a blockchain.…”
Section: Instantiating Witness Encryptionmentioning
confidence: 99%
See 3 more Smart Citations
“…Liu et al [20] proposed a construction based on multi-linear maps, which can be instantiated from indistinguishability obfuscation (iO) [1], which in turn can be obtained from well-founded assumptions [19], leading to a theoretical instantiation. A different approach was taken by Goyal et al [15] who show how the functionality of extractable witness encryption can be implemented efficiently on a blockchain. This approach is especially appealing in relation to our work due to the obtained efficiency and that our construction already makes use of a blockchain.…”
Section: Instantiating Witness Encryptionmentioning
confidence: 99%
“…This approach is especially appealing in relation to our work due to the obtained efficiency and that our construction already makes use of a blockchain. Note that [15] requires the miners maintaining the blockchain to implement additional functionality i.e. smaller changes would have to be made to existing blockchain protocols to achieve the desired functionality, and to maintain forward security, the communication between miners and the decryptor must be forward secure (e.g.…”
Section: Instantiating Witness Encryptionmentioning
confidence: 99%
See 2 more Smart Citations
“…In particular, the idea of distributing sensitive information to anonymous committees (e.g. privacy revocation trapdoors) or having anonymous committees execute cryptographic protocols has been explored in the context of proactive secret sharing [11,41,26], multiparty computation (MPC) [38] and threshold encryption [35]. These protocols work in the so called You Only Speak Once (YOSO) model, where a fresh randomly chosen anonymous committee executes each round of the protocol, limiting the adversary to probabilistic corruptions (i.e.…”
Section: Related Workmentioning
confidence: 99%