- A Graduate Course in Applied Cryptography
- Understanding Cryptography
- Non-interfactive and Information-theoretic secure verifiable secret sharing
- Timed Commitments
- Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains
- A Computational Introduction to Number Theory and Algebra
- Applications of secure multiparty computation
- From Keys to Databases – Real-World Applications of Secure Multi-Party Computation
- Publicly Auditable Secure Multi-Party Computation
- Multiparty Computation from Somewhat Homomorphic Encryption
- Quadratic Span Programs and Succinct NIZKs without PCPs
- Cryptology and Its Applications: Zero knowledge and some applications
- Bulletproofs: Short Proofs for confidential transactions and more
- Efficient Protocols for Set Membership and Range Proofs
- zk-SNARK explained: basic principles
- Efficient proofs that a committed number lies in an interval
- SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies
- Bitcoin’s Academic Pedigree
- Escrow protocols for cryptocurrencies: How to buy physical goods using Bitcoin
- Atomic Cross-Chain Swaps
- Channels: Horizontal Scaling and Confidentiality on Permissioned Blockchains
- Simple and fast optimistic protocols for fair electronic exchange
- Provisions: privacy preserving proofs of solvency
- BatchVote: Voting rules designed for auditability
- A Smart Contract for Boardroom Voting with Maximum Voter Privacy
Oblivous-RAM
- Path ORAM: An Extremely Simple Oblivious RAM Protocol
- Group ORAM: Privacy and Access Control for Outsourced Personal Records
- Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound
Identity Mix
- Design and Implementation of the idemix Anonymous Credential System
- An efficient system for non-transferable anonymous credentials with optional anonymity revocation
Coin
- Confidential Assets
- Blindly Signed Contracts: Anonymous On-Blockchain and Off-Blockchain Bitcoin Transactions
- CoinParty: Secure Multi-Party Mixing of Bitcoins
- Monero: CryptoNote v 2.0
- COmposite Signatures: Increasing Anonimity in Bitcoin
- Zerocoin: Anonymous Distributed E-Cash from Bitcoin
- Zerocash: Decentralized Anonymous Payments from Bitcoin
- Mixing Confidential Transactions: Comprehensive Transaction Privacy for Bitcoin
- Privacy on the Blockchain: Unique Ring Signatures
- Auditable, Anonymous Electronic Cash Extended Abstract.
- zkLedger: Privacy-Preserving Auditing for Distributed Ledgers
- Solidus: Confidential Distributed Ledger Transactions via PVORM
- Quisquis: A New Design for Anonymous Cryptocurrencies
Smart Contracts
Differential Privacy for Machine Learning
- Semi-supervised knowledge transfer for deep learning from private training data
- Decentralizing Privacy: Using Blockchain to Protect Personal Data
- Deep Learning with Differential Privacy
Multi-party computation
- Supporting Private Data on Hyperledger Fabric with Secure Multiparty Computation
- Initial Public Offering (IPO) on Permissioned Blockchain using Secure Multiparty Computation
- The Byzantine Generals Problem
- Practical Byzantine Fault Tolerance
- A Byzantine Fault-Tolerant Ordering Service for the Hyperledger Fabric Blockchain Platform
- Algorand: Scaling Byzantine Agreements for Cryptocurrencies
- The Honey Badger of BFT Protocols
- Analysis of the Blockchain Protocol in Asynchronous Networks
- PieceWork: Generalized Outsourcing Control for Proofs of Work
- Proofs of Useful Work