Adithya Bhat
YOU?
Author Swipe
View article: Synchronous Distributed Key Generation without Broadcasts
Synchronous Distributed Key Generation without Broadcasts Open
Distributed key generation (DKG) is a key building block in developing many efficient threshold cryptosystems. This work initiates the study of communication complexity and round complexity of DKG protocols over a point-to-point (bounded) …
View article: Attacking and Improving the Tor Directory Protocol
Attacking and Improving the Tor Directory Protocol Open
The Tor network enhances clients' privacy by routing traffic through an overlay network of volunteered intermediate relays. Tor employs a distributed protocol among nine hard-coded Directory Authority (DA) servers to securely disseminate i…
View article: Delphi: Efficient Asynchronous Approximate Agreement for Distributed Oracles
Delphi: Efficient Asynchronous Approximate Agreement for Distributed Oracles Open
Agreement protocols are crucial in various emerging applications, spanning from distributed (blockchains) oracles to fault-tolerant cyber-physical systems. In scenarios where sensor/oracle nodes measure a common source, maintaining output …
View article: EESMR
EESMR Open
Modern Byzantine Fault-Tolerant State Machine Replication (BFT-SMR) solutions focus on reducing communication complexity, improving throughput, or lowering latency. This work explores the energy efficiency of BFT-SMR protocols. First, we p…
View article: EESMR: Energy Efficient BFT-SMR for the masses
EESMR: Energy Efficient BFT-SMR for the masses Open
Modern Byzantine Fault-Tolerant State Machine Replication (BFT-SMR) solutions focus on reducing communication complexity, improving throughput, or lowering latency. This work explores the energy efficiency of BFT-SMR protocols. First, we p…
View article: Verifiable Timed Signatures Made Practical
Verifiable Timed Signatures Made Practical Open
A verifiable timed signature (VTS) scheme allows one to time-lock a signature on a known message for a given amount of time T such that after performing a sequential computation for time T anyone can extract s from the time-lock. Verifiabi…
View article: Automatic Inspection of Utility Scale Solar Power Plants using Deep Learning
Automatic Inspection of Utility Scale Solar Power Plants using Deep Learning Open
Solar energy has the potential to become the backbone energy source for the world. Utility scale solar power plants (more than 50 MW) could have more than 100K individual solar modules and be spread over more than 200 acres of land. Tradit…
View article: High-sensitivity Cardiac Troponin Elevation after Electroconvulsive Therapy
High-sensitivity Cardiac Troponin Elevation after Electroconvulsive Therapy Open
Background While electroconvulsive therapy is widely regarded as a lifesaving and safe procedure, evidence regarding its effects on myocardial cell injury is sparse. The objective of this investigation was to determine the incidence and ma…