{"id":"https://openalex.org/W4405181178","doi":"https://doi.org/10.1145/3658644.3670326","title":"Random Beacons in Monte Carlo: Efficient Asynchronous Random Beacon <i>without</i> Threshold Cryptography","display_name":"Random Beacons in Monte Carlo: Efficient Asynchronous Random Beacon <i>without</i> Threshold Cryptography","publication_year":2024,"publication_date":"2024-12-02","ids":{"openalex":"https://openalex.org/W4405181178","doi":"https://doi.org/10.1145/3658644.3670326"},"language":"en","primary_location":{"id":"doi:10.1145/3658644.3670326","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3670326","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3670326","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3670326","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012403778","display_name":"Akhil Bandarupalli","orcid":"https://orcid.org/0000-0002-9669-5788"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Akhil Bandarupalli","raw_affiliation_strings":["Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005802318","display_name":"Adithya Bhat","orcid":"https://orcid.org/0000-0003-4099-4014"},"institutions":[{"id":"https://openalex.org/I4210148469","display_name":"Visa (United States)","ror":"https://ror.org/05t1y0b59","country_code":"US","type":"company","lineage":["https://openalex.org/I4210148469"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Adithya Bhat","raw_affiliation_strings":["Visa Research, Foster City, CA, USA"],"affiliations":[{"raw_affiliation_string":"Visa Research, Foster City, CA, USA","institution_ids":["https://openalex.org/I4210148469"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047310442","display_name":"Saurabh Bagchi","orcid":"https://orcid.org/0000-0002-4239-5632"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Saurabh Bagchi","raw_affiliation_strings":["Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033338045","display_name":"Aniket Kate","orcid":"https://orcid.org/0000-0003-2246-8416"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Aniket Kate","raw_affiliation_strings":["Purdue University / Supra Research, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University / Supra Research, West Lafayette, IN, USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074117167","display_name":"Michael K. Reiter","orcid":"https://orcid.org/0000-0001-7007-8274"},"institutions":[{"id":"https://openalex.org/I170897317","display_name":"Duke University","ror":"https://ror.org/00py81415","country_code":"US","type":"education","lineage":["https://openalex.org/I170897317"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Michael K. Reiter","raw_affiliation_strings":["Duke University / Chainlink Labs, Durham, NC, USA"],"affiliations":[{"raw_affiliation_string":"Duke University / Chainlink Labs, Durham, NC, USA","institution_ids":["https://openalex.org/I170897317"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5012403778"],"corresponding_institution_ids":["https://openalex.org/I219193219"],"apc_list":null,"apc_paid":null,"fwci":2.049,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.89201381,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"2621","last_page":"2635"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.729400098323822},{"id":"https://openalex.org/keywords/beacon","display_name":"Beacon","score":0.579596996307373},{"id":"https://openalex.org/keywords/asynchronous-communication","display_name":"Asynchronous communication","score":0.5542308688163757},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.5497586727142334},{"id":"https://openalex.org/keywords/random-number-generation","display_name":"Random number generation","score":0.49060025811195374},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4570049047470093},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.45642396807670593},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4034399390220642},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.381307989358902},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2766130566596985},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1067061722278595}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.729400098323822},{"id":"https://openalex.org/C102168758","wikidata":"https://www.wikidata.org/wiki/Q7321258","display_name":"Beacon","level":2,"score":0.579596996307373},{"id":"https://openalex.org/C151319957","wikidata":"https://www.wikidata.org/wiki/Q752739","display_name":"Asynchronous communication","level":2,"score":0.5542308688163757},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.5497586727142334},{"id":"https://openalex.org/C201866948","wikidata":"https://www.wikidata.org/wiki/Q228206","display_name":"Random number generation","level":2,"score":0.49060025811195374},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4570049047470093},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.45642396807670593},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4034399390220642},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.381307989358902},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2766130566596985},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1067061722278595}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3658644.3670326","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3670326","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3670326","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3658644.3670326","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3670326","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3670326","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3569587542","display_name":null,"funder_award_id":"CNS-2038986,CNS-2038566","funder_id":"https://openalex.org/F4320323817","funder_display_name":"Universitas Brawijaya"},{"id":"https://openalex.org/G6730642028","display_name":null,"funder_award_id":"W911NF-2020-221","funder_id":"https://openalex.org/F4320323817","funder_display_name":"Universitas Brawijaya"}],"funders":[{"id":"https://openalex.org/F4320323817","display_name":"Universitas Brawijaya","ror":"https://ror.org/01wk3d929"}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4405181178.pdf"},"referenced_works_count":35,"referenced_works":["https://openalex.org/W1528693676","https://openalex.org/W1581083284","https://openalex.org/W1963710334","https://openalex.org/W2006699751","https://openalex.org/W2034791526","https://openalex.org/W2035362408","https://openalex.org/W2084652510","https://openalex.org/W2099221302","https://openalex.org/W2102764738","https://openalex.org/W2126906505","https://openalex.org/W2167882086","https://openalex.org/W2172273481","https://openalex.org/W2277839617","https://openalex.org/W2401492698","https://openalex.org/W2528438932","https://openalex.org/W2605103916","https://openalex.org/W2614074621","https://openalex.org/W2763398287","https://openalex.org/W2911825405","https://openalex.org/W2963873436","https://openalex.org/W2964159515","https://openalex.org/W2968553806","https://openalex.org/W3046841722","https://openalex.org/W3096691500","https://openalex.org/W3170795935","https://openalex.org/W3184555427","https://openalex.org/W3185672164","https://openalex.org/W4226245226","https://openalex.org/W4286500915","https://openalex.org/W4288057794","https://openalex.org/W4298402215","https://openalex.org/W4308391550","https://openalex.org/W4316652254","https://openalex.org/W6712970727","https://openalex.org/W6809371427"],"related_works":["https://openalex.org/W2567632598","https://openalex.org/W2106845956","https://openalex.org/W3158435160","https://openalex.org/W2112938119","https://openalex.org/W2101178385","https://openalex.org/W2790129070","https://openalex.org/W2132294172","https://openalex.org/W2277502495","https://openalex.org/W2167867025","https://openalex.org/W4392640339"],"abstract_inverted_index":{"Regular":[0],"access":[1],"to":[2,38,49,83,113,137,151],"unpredictable":[3],"and":[4,15,98,109],"bias-resistant":[5],"randomness":[6],"is":[7,135,201],"important":[8],"for":[9,246],"applications":[10,42],"such":[11],"as":[12],"blockchains,":[13],"voting,":[14],"secure":[16,107,111,166,222],"distributed":[17,54],"computing.":[18],"Distributed":[19],"random":[20,55,65,101,177],"beacon":[21,56,66,102,178],"protocols":[22,179],"address":[23],"this":[24],"need":[25],"by":[26,163,218],"distributing":[27],"trust":[28],"across":[29,43],"multiple":[30],"nodes,":[31,193],"with":[32,58],"the":[33,44,50,81,138,165,213],"majority":[34],"of":[35,52,123,133,141,145,189,216,231,240],"them":[36],"assumed":[37],"be":[39,84],"honest.":[40],"Numerous":[41],"blockchain":[45],"space":[46],"have":[47],"led":[48],"proposal":[51],"several":[53],"protocols,":[57],"some":[59],"already":[60],"implemented.":[61],"However,":[62],"many":[63],"current":[64],"systems":[67],"rely":[68],"on":[69],"threshold":[70],"cryptographic":[71],"setups":[72],"or":[73,86],"exhibit":[74],"high":[75],"computational":[76,131],"costs,":[77],"while":[78],"others":[79],"expect":[80],"network":[82],"partial":[85],"bounded":[87],"synchronous.":[88],"To":[89],"overcome":[90],"these":[91],"limitations,":[92],"we":[93],"propose":[94],"HashRand,":[95],"a":[96,118,146,186,220,228,238,244],"computation":[97,149],"communication-efficient":[99],"asynchronous":[100],"protocol":[103],"that":[104,180],"only":[105],"demands":[106],"hash":[108],"pairwise":[110],"channels":[112],"generate":[114],"beacons.":[115],"HashRand":[116,134,159,194,217],"has":[117,227],"per-node":[119],"amortized":[120],"communication":[121],"complexity":[122],"O":[124],"(\u03bbn":[125],"log(n))":[126],"bits":[127],"per":[128,198,235],"beacon.":[129],"The":[130],"efficiency":[132],"attributed":[136],"two":[139],"orders":[140],"magnitude":[142],"lower":[143],"time":[144],"one-way":[147],"Hash":[148,167],"compared":[150],"discrete":[152,182],"log":[153,183],"exponentiation.":[154],"Interestingly,":[155],"besides":[156],"reduced":[157],"overhead,":[158],"achieves":[160],"Post-Quantum":[161,221],"security":[162],"leveraging":[164],"function":[168],"against":[169],"quantum":[170],"adversaries,":[171],"setting":[172],"it":[173],"apart":[174],"from":[175],"other":[176],"use":[181],"cryptography.":[184],"In":[185],"geo-distributed":[187],"testbed":[188],"n":[190,247],"=":[191,248],"136":[192],"produces":[195],"78":[196],"beacons":[197],"minute,":[199],"which":[200,226],"at":[202,237],"least":[203],"5\u00d7":[204],"higher":[205],"than":[206],"Spurt":[207],"[IEEE":[208],"S&P'22].":[209],"We":[210],"also":[211],"demonstrate":[212],"practical":[214],"utility":[215],"implementing":[219],"Asynchronous":[223],"SMR":[224],"protocol,":[225],"response":[229],"rate":[230],"over":[232,243],"135k":[233],"transactions":[234],"second":[236],"latency":[239],"2.3":[241],"seconds":[242],"WAN":[245],"16":[249],"nodes.":[250]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
