Introduces Attribute-Based Credentials and Mercurial Signatures, discussing privacy concerns with authentication and the importance of preserving user privacy.
Provides an overview of time-lock encryption and its practical applications, focusing on threshold time-lock encryption algorithms and their security properties.
Analyzes Yubico's proposal for asynchronous remote key generation in WebAuthn, focusing on security, performance, and compatibility with public key protocols.