{"id":"https://openalex.org/W4288057794","doi":"https://doi.org/10.1109/sp46214.2022.9833584","title":"Practical Asynchronous Distributed Key Generation","display_name":"Practical Asynchronous Distributed Key Generation","publication_year":2022,"publication_date":"2022-05-01","ids":{"openalex":"https://openalex.org/W4288057794","doi":"https://doi.org/10.1109/sp46214.2022.9833584"},"language":"en","primary_location":{"id":"doi:10.1109/sp46214.2022.9833584","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sp46214.2022.9833584","pdf_url":null,"source":{"id":"https://openalex.org/S4363606603","display_name":"2022 IEEE Symposium on Security and Privacy (SP)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Symposium on Security and Privacy (SP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100657676","display_name":"Sourav Das","orcid":"https://orcid.org/0000-0002-0767-2067"},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sourav Das","raw_affiliation_strings":["University of Illinois at Urbana-Champaign"],"affiliations":[{"raw_affiliation_string":"University of Illinois at Urbana-Champaign","institution_ids":["https://openalex.org/I157725225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045569583","display_name":"Thomas Yurek","orcid":null},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Thomas Yurek","raw_affiliation_strings":["University of Illinois at Urbana-Champaign"],"affiliations":[{"raw_affiliation_string":"University of Illinois at Urbana-Champaign","institution_ids":["https://openalex.org/I157725225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026708918","display_name":"Zhuolun Xiang","orcid":"https://orcid.org/0000-0002-4398-3428"},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zhuolun Xiang","raw_affiliation_strings":["University of Illinois at Urbana-Champaign"],"affiliations":[{"raw_affiliation_string":"University of Illinois at Urbana-Champaign","institution_ids":["https://openalex.org/I157725225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102943792","display_name":"Andrew Miller","orcid":"https://orcid.org/0000-0003-3712-5977"},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Andrew Miller","raw_affiliation_strings":["University of Illinois at Urbana-Champaign"],"affiliations":[{"raw_affiliation_string":"University of Illinois at Urbana-Champaign","institution_ids":["https://openalex.org/I157725225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070324418","display_name":"Lefteris Kokoris-Kogias","orcid":"https://orcid.org/0000-0002-8827-3382"},"institutions":[{"id":"https://openalex.org/I157556583","display_name":"Institute of Science and Technology Austria","ror":"https://ror.org/03gnh5541","country_code":"AT","type":"education","lineage":["https://openalex.org/I157556583"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Lefteris Kokoris-Kogias","raw_affiliation_strings":["IST Austria"],"affiliations":[{"raw_affiliation_string":"IST Austria","institution_ids":["https://openalex.org/I157556583"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002519367","display_name":"Ling Ren","orcid":"https://orcid.org/0000-0003-3437-7570"},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ling Ren","raw_affiliation_strings":["University of Illinois at Urbana-Champaign"],"affiliations":[{"raw_affiliation_string":"University of Illinois at Urbana-Champaign","institution_ids":["https://openalex.org/I157725225"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100657676"],"corresponding_institution_ids":["https://openalex.org/I157725225"],"apc_list":null,"apc_paid":null,"fwci":8.9737,"has_fulltext":false,"cited_by_count":89,"citation_normalized_percentile":{"value":0.98521463,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"2518","last_page":"2534"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9889000058174133,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8040322065353394},{"id":"https://openalex.org/keywords/asynchronous-communication","display_name":"Asynchronous communication","score":0.6951879262924194},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6169290542602539},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.544727623462677},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5188073515892029},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.46156683564186096},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.11054688692092896}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8040322065353394},{"id":"https://openalex.org/C151319957","wikidata":"https://www.wikidata.org/wiki/Q752739","display_name":"Asynchronous communication","level":2,"score":0.6951879262924194},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6169290542602539},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.544727623462677},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5188073515892029},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.46156683564186096},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.11054688692092896},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/sp46214.2022.9833584","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sp46214.2022.9833584","pdf_url":null,"source":{"id":"https://openalex.org/S4363606603","display_name":"2022 IEEE Symposium on Security and Privacy (SP)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Symposium on Security and Privacy (SP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"No poverty","id":"https://metadata.un.org/sdg/1","score":0.4300000071525574}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":58,"referenced_works":["https://openalex.org/W1501004655","https://openalex.org/W1529903442","https://openalex.org/W1546996295","https://openalex.org/W1589034595","https://openalex.org/W1610688607","https://openalex.org/W1988655303","https://openalex.org/W2023051771","https://openalex.org/W2025142762","https://openalex.org/W2035362408","https://openalex.org/W2102764738","https://openalex.org/W2106004025","https://openalex.org/W2108834246","https://openalex.org/W2132172731","https://openalex.org/W2140036537","https://openalex.org/W2141420453","https://openalex.org/W2153193245","https://openalex.org/W2166462813","https://openalex.org/W2167882086","https://openalex.org/W2170561193","https://openalex.org/W2401492698","https://openalex.org/W2534313446","https://openalex.org/W2545021276","https://openalex.org/W2605103916","https://openalex.org/W2801811971","https://openalex.org/W2890933237","https://openalex.org/W2911825405","https://openalex.org/W2963873436","https://openalex.org/W2964159515","https://openalex.org/W2978912325","https://openalex.org/W2981692198","https://openalex.org/W3007185394","https://openalex.org/W3015641482","https://openalex.org/W3046841722","https://openalex.org/W3096691500","https://openalex.org/W3106855293","https://openalex.org/W3132290809","https://openalex.org/W3151272651","https://openalex.org/W3152310355","https://openalex.org/W3159727262","https://openalex.org/W3170795935","https://openalex.org/W3184555427","https://openalex.org/W3185672164","https://openalex.org/W3186495631","https://openalex.org/W3189321855","https://openalex.org/W3214624280","https://openalex.org/W4220853208","https://openalex.org/W4223543073","https://openalex.org/W4245079094","https://openalex.org/W4312724280","https://openalex.org/W6635298198","https://openalex.org/W6682389930","https://openalex.org/W6684825898","https://openalex.org/W6712970727","https://openalex.org/W6751596620","https://openalex.org/W6769077935","https://openalex.org/W6773899331","https://openalex.org/W6794768981","https://openalex.org/W6796990851"],"related_works":["https://openalex.org/W2116677773","https://openalex.org/W2155261584","https://openalex.org/W2584231425","https://openalex.org/W2150611273","https://openalex.org/W2347867225","https://openalex.org/W4207086172","https://openalex.org/W2042919702","https://openalex.org/W2611999869","https://openalex.org/W4225981436","https://openalex.org/W2156185805"],"abstract_inverted_index":{"Distributed":[0],"Key":[1],"Generation":[2],"(DKG)":[3],"is":[4,17,121,136],"a":[5,12,18,75,85,95,129,152],"technique":[6],"to":[7,21,106,156,178],"bootstrap":[8],"threshold":[9,28,141],"cryptosystems":[10],"without":[11],"trusted":[13],"third":[14],"party":[15],"and":[16,30,43,87,111,135,148,175,182,193],"building":[19],"block":[20],"decentralized":[22],"protocols":[23,37,61],"such":[24],"as":[25,64,132,171,173],"randomness":[26],"beacons,":[27],"signatures,":[29],"general":[31],"multiparty":[32],"computation.":[33],"Until":[34],"recently,":[35],"DKG":[36,60,91],"have":[38,67,112],"assumed":[39],"the":[40,122,133,199],"synchronous":[41],"model":[42],"thus":[44,137],"are":[45,62],"vulnerable":[46],"when":[47],"their":[48],"underlying":[49],"network":[50,96,153],"assumptions":[51],"do":[52],"not":[53],"hold.":[54],"The":[55],"recent":[56],"advancements":[57],"in":[58,74,159],"asynchronous":[59,90],"insufficient":[63],"they":[65],"either":[66],"poor":[68],"efficiency":[69],"or":[70],"limited":[71],"functionality,":[72],"resulting":[73],"lack":[76],"of":[77,97,154,196],"concrete":[78],"implementations.":[79],"In":[80,94],"this":[81],"paper,":[82],"we":[83],"present":[84],"simple":[86],"concretely":[88],"efficient":[89],"(ADKG)":[92],"protocol.":[93],"n":[98],"nodes,":[99,184],"our":[100,145,168],"ADKG":[101,126,146],"protocol":[102,127,147,169],"can":[103],"tolerate":[104],"up":[105,155],"$t\\lt":[107],"n/3$":[108],"malicious":[109],"nodes":[110,158],"an":[113],"expected":[114],"$O(\\kappa":[115],"n^{3})$":[116],"communication":[117],"cost,":[118],"where":[119],"$\\kappa$":[120],"security":[123],"parameter.":[124],"Our":[125,164],"produces":[128],"field":[130],"element":[131],"secret":[134],"compatible":[138],"with":[139],"off-the-shelf":[140],"cryptosystems.":[142],"We":[143],"implement":[144],"evaluate":[149],"it":[150],"using":[151],"128":[157],"geographically":[160],"distributed":[161],"AWS":[162],"instances.":[163],"evaluation":[165],"shows":[166],"that":[167],"takes":[170],"low":[172],"3":[174],"9.5":[176],"seconds":[177],"terminate":[179],"for":[180],"32":[181],"64":[183],"respectively.":[185,202],"Also,":[186],"each":[187],"node":[188],"sends":[189],"only":[190],"0.7":[191],"Megabytes":[192,195],"2.9":[194],"data":[197],"during":[198],"two":[200],"experiments,":[201]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":30},{"year":2024,"cited_by_count":36},{"year":2023,"cited_by_count":16},{"year":2022,"cited_by_count":4}],"updated_date":"2026-04-15T08:11:43.952461","created_date":"2025-10-10T00:00:00"}
