{"id":"https://openalex.org/W4394595369","doi":"https://doi.org/10.62056/av7tudhdj","title":"A Survey of Two Verifiable Delay Functions Using Proof of Exponentiation","display_name":"A Survey of Two Verifiable Delay Functions Using Proof of Exponentiation","publication_year":2024,"publication_date":"2024-04-09","ids":{"openalex":"https://openalex.org/W4394595369","doi":"https://doi.org/10.62056/av7tudhdj"},"language":"en","primary_location":{"id":"doi:10.62056/av7tudhdj","is_oa":true,"landing_page_url":"https://doi.org/10.62056/av7tudhdj","pdf_url":"https://cic.iacr.org/p/1/1/7/pdf","source":{"id":"https://openalex.org/S4394708374","display_name":"IACR Communications in Cryptology","issn_l":"3006-5496","issn":["3006-5496"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320989","host_organization_name":"International Association for Cryptologic Research","host_organization_lineage":["https://openalex.org/P4310320989"],"host_organization_lineage_names":["International Association for Cryptologic Research"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Communications in Cryptology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://cic.iacr.org/p/1/1/7/pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027798962","display_name":"Dan Boneh","orcid":"https://orcid.org/0000-0003-0820-0421"},"institutions":[{"id":"https://openalex.org/I97018004","display_name":"Stanford University","ror":"https://ror.org/00f54p054","country_code":"US","type":"education","lineage":["https://openalex.org/I97018004"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Dan Boneh","raw_affiliation_strings":["Stanford University"],"affiliations":[{"raw_affiliation_string":"Stanford University","institution_ids":["https://openalex.org/I97018004"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050862609","display_name":"Benedikt B\u00fcnz","orcid":"https://orcid.org/0000-0003-2082-4480"},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Benedikt B\u00fcnz","raw_affiliation_strings":["New York University"],"affiliations":[{"raw_affiliation_string":"New York University","institution_ids":["https://openalex.org/I57206974"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037983878","display_name":"Ben Fisch","orcid":"https://orcid.org/0009-0007-1154-2277"},"institutions":[{"id":"https://openalex.org/I32971472","display_name":"Yale University","ror":"https://ror.org/03v76x132","country_code":"US","type":"education","lineage":["https://openalex.org/I32971472"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ben Fisch","raw_affiliation_strings":["Yale University"],"affiliations":[{"raw_affiliation_string":"Yale University","institution_ids":["https://openalex.org/I32971472"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5027798962"],"corresponding_institution_ids":["https://openalex.org/I97018004"],"apc_list":null,"apc_paid":null,"fwci":1.4786,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.80934973,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12029","display_name":"DNA and Biological Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},"topics":[{"id":"https://openalex.org/T12029","display_name":"DNA and Biological Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exponentiation","display_name":"Exponentiation","score":0.8719397783279419},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.851150631904602},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.5023341178894043},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.48222243785858154},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.42263656854629517},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.16802793741226196},{"id":"https://openalex.org/keywords/mathematical-analysis","display_name":"Mathematical analysis","score":0.11541646718978882}],"concepts":[{"id":"https://openalex.org/C81539297","wikidata":"https://www.wikidata.org/wiki/Q33456","display_name":"Exponentiation","level":2,"score":0.8719397783279419},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.851150631904602},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.5023341178894043},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.48222243785858154},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.42263656854629517},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.16802793741226196},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.11541646718978882},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.62056/av7tudhdj","is_oa":true,"landing_page_url":"https://doi.org/10.62056/av7tudhdj","pdf_url":"https://cic.iacr.org/p/1/1/7/pdf","source":{"id":"https://openalex.org/S4394708374","display_name":"IACR Communications in Cryptology","issn_l":"3006-5496","issn":["3006-5496"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320989","host_organization_name":"International Association for Cryptologic Research","host_organization_lineage":["https://openalex.org/P4310320989"],"host_organization_lineage_names":["International Association for Cryptologic Research"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Communications in Cryptology","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.62056/av7tudhdj","is_oa":true,"landing_page_url":"https://doi.org/10.62056/av7tudhdj","pdf_url":"https://cic.iacr.org/p/1/1/7/pdf","source":{"id":"https://openalex.org/S4394708374","display_name":"IACR Communications in Cryptology","issn_l":"3006-5496","issn":["3006-5496"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320989","host_organization_name":"International Association for Cryptologic Research","host_organization_lineage":["https://openalex.org/P4310320989"],"host_organization_lineage_names":["International Association for Cryptologic Research"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Communications in Cryptology","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4394595369.pdf","grobid_xml":"https://content.openalex.org/works/W4394595369.grobid-xml"},"referenced_works_count":34,"referenced_works":["https://openalex.org/W1526627394","https://openalex.org/W1589034595","https://openalex.org/W1632088469","https://openalex.org/W2101040389","https://openalex.org/W2159366854","https://openalex.org/W2164736940","https://openalex.org/W2294814269","https://openalex.org/W2329087999","https://openalex.org/W2795301572","https://openalex.org/W2884026699","https://openalex.org/W2885172320","https://openalex.org/W2899466157","https://openalex.org/W2913435035","https://openalex.org/W2953635274","https://openalex.org/W2967946631","https://openalex.org/W2969756126","https://openalex.org/W2990120385","https://openalex.org/W2990498574","https://openalex.org/W3037691981","https://openalex.org/W3037811407","https://openalex.org/W3046435833","https://openalex.org/W3095136214","https://openalex.org/W3147459559","https://openalex.org/W3157578321","https://openalex.org/W3196780870","https://openalex.org/W4205348036","https://openalex.org/W4211086354","https://openalex.org/W4236075731","https://openalex.org/W4312753175","https://openalex.org/W4367593152","https://openalex.org/W4385659358","https://openalex.org/W4386215236","https://openalex.org/W4387319408","https://openalex.org/W4409187098"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W4391375266","https://openalex.org/W2355730523","https://openalex.org/W152021879","https://openalex.org/W2072918937","https://openalex.org/W2365629437","https://openalex.org/W2057474768","https://openalex.org/W2008443281","https://openalex.org/W416434181","https://openalex.org/W4246276930"],"abstract_inverted_index":{"A":[0],"verifiable":[1,23],"delay":[2,12,24],"function":[3],"(VDF)":[4],"is":[5],"an":[6,51,54],"important":[7],"tool":[8],"used":[9],"for":[10,46,66],"adding":[11],"in":[13],"decentralized":[14],"applications.":[15],"This":[16],"paper":[17],"surveys":[18],"and":[19,30,60],"compares":[20],"two":[21],"beautiful":[22],"functions,":[25],"one":[26,47],"due":[27,33],"to":[28,34],"Pietrzak,":[29],"the":[31,58,62],"other":[32],"Wesolowski,":[35],"In":[36],"addition,":[37],"we":[38],"provide":[39],"a":[40],"new":[41],"computational":[42],"proof":[43],"of":[44,48,57],"security":[45],"them,":[49],"present":[50],"attack":[52],"on":[53],"incorrect":[55],"implementation":[56],"other,":[59],"compare":[61],"complexity":[63],"assumptions":[64],"needed":[65],"both":[67],"schemes.":[68]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":1}],"updated_date":"2026-03-07T13:37:22.277990","created_date":"2025-10-10T00:00:00"}
