FinancialCryptographyandDataSecurity 2020 Feb. 10, 2020 to Feb. 14, 2020, Sabah, Malaysia

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote: Fraudsters Taught Us that Identity is Broken. Allison Nixon Cybercrime has grown into a trillion dollar problem. The online commercial ecosystem is built on ...
Leveraging Bitcoin Testnet for Bidirectional Botnet Command and Control Systems. Federico Franzoni , Vanesa Daza , Iván Abellán Over the past twenty years, the number of devices connectedto the Internet grew exponentially. Botnets ...
Security Analysis on dBFT protocol of NEO. Yang Xiang , Shiping Chen , Qin Wang , Jiangshan Yu , Zhiniang Peng , Vancuong Bui , Yong Ding NEO is ranked as one of the top blockchains by market capitalization. We provide a ...
Breaking the encryption scheme of the Moscow internet voting system. Pierrick Golovnev In September 2019, voters for the election at the Parliamentof the city of Moscow were ...
Short Paper: XOR Arbiter PUFs have Systematic Response Bias. Nils Pirnay We demonstrate that XOR Arbiter PUFs with an even number of arbiter chains have inherently ...
Selfish Mining Re-Examined. Emin Gun Sirer , Kevin Alarcón Negy , Peter R. Rizun Six years after the introduction of selfish mining, its counterintuitive findings continue to create confusion. ...
Fairness and Efficiency in DAG-based Cryptocurrencies. Georgios Birmpas , Elias Koutsoupias , Philip Lazos , Francisco Cossío Bitcoin is a decentralised digital currency that serves as analternative to existing transaction systems based ...
Stake Shift in Major Cryptocurrencies: An Empirical Study. Peter Gazi , Rainer Stütz , Bernhard Haslhofer , Jacob Illium In the proof-of-stake (PoS) paradigm for maintaining decentralized, permissionless cryptocurrencies, Sybil attacks are prevented bybasing ...
Coded Merkle Tree: Solving Data Availability Attacks in Blockchains. Mingchao Yu , Saeid Sahraei , Songze Li , Salman Avestimehr , Sreeram Kannan , Pramod Viswanath In this paper, we propose coded Merkle tree (CMT), a novelhash accumulator that offers a ...
Decentralized Privacy-Preserving Netting Protocol on Blockchain for Payment Systems. Kaoutar Elkhiyaoui , Shengjiao Cao , Yuan Yuan , Angelo De Caro , Karthik Nandakumar , Yanyan Hu This paper proposes a decentralized netting protocol thatguarantees the privacy of the participants. Namely, it ...
The Arwen Trading Protocols. Sharon Goldberg , Ethan Heilman , Sebastien Lipmann The Arwen Trading Protocols are layer-two blockchain protocols for traders to securely trade cryptocurrencies at ...
SoK: A Classification Framework for Stablecoin Designs. Emin Gun Sirer , Amani Moin , Kevin Sekniqi Stablecoins promise to bridge fiat currencies with the worldof cryptocurrencies. They provide a way for ...
Echidna: A Practical Smart Contract Fuzzer. Josselin Feist , Gustavo Grieco , John-paul Smith , Alex Groce N/A
Taproot Analysis. Lloyd Fournier N/A
Assessing or incentivising correct mixing without authorities. Jeff Burdges N/A
A New Protocol for Fair Addition of a Transaction Fee When Closing a Payment Channel Uncooperatively. Takahiro Matsuura N/A
On the Applicability of Behavioral Biometric Authentication on Smartphones. Ahmed Mahfouz , Mohamed Alaa , Ahmed Hamdy , Tarek Mostafa N/A
Rethinking Blockchain Layers: Do Payment Channel Networks Need a Blockchain?. Matthias Hartenstein N/A
Prevention of Bouncing Attack on Casper FFG. Ryuya Nakamura N/A
SoK: Layer-Two Blockchain Protocols. Pedro Moreno-sanchez , Stefanie Roos , Arthur Gervais , Lewis Gudgeon , Patrick Mccorry Blockchains have the potential to revolutionize markets andservices. However, they currently exhibit high latencies and ...
MicroCash: Practical Concurrent Processing of Micropayments. Justin Cappos , Allison Bishop , Ghada Almashaqbeh Micropayments have a large number of potential applications. However, processing these small payments individually can ...
LockDown: Balance Availability Attack against Lightning Network Channels. Joaquin Garcia-alfaro , Cristina Pérez-solà , Alejandro Ranchal-pedrosa , Jordi Herrera-joancomarti , Guillermo Navarro-arribas The Lightning Network (LN) is a payment network runningas a second layer on top of ...
Ride the Lightning: The Game Theory of Payment Channels. Roger Wattenhofer , Zeta Avarikioti , Lioba Heimbach , Yuyi Wang Payment channels were introduced to solve various eminentcryptocurrency scalability issues. Multiple payment channels build a ...
How to profit from payments channels. Zekeriya Erkin , Stefanie Roos , Oguzhan Ersoy Payment channel networks like Bitcoin’s Lightning networkare an auspicious approach for realizing high transaction throughputand ...
Boomerang: Redundancy Improves Latency and Throughput in Payment Networks. Joachim Neu , Vivek Bagaria , David Tse In multi-path routing schemes for payment-channel networks,Alice transfers funds to Bob by splitting them into ...
DLSAG: Non-Interactive Refund Transactions For Interoperable Payment Channels in Monero. Aniket Kate , Pedro Moreno-sanchez , Arthur Blue , Duc Le , Sarang Noether , Brandon Goodell Monero has emerged as one of the leading cryptocurrencieswith privacy by design. However, this comes ...
Cerberus Channels: Incentivizing Watchtowers for Bitcoin. Roger Wattenhofer , Zeta Avarikioti , Orfeas Litos Bitcoin and similar blockchain systems have a limited transaction throughput because each transaction must be ...
Communication-Efficient (Client-Aided) Secure Two-Party Protocols and Its Application. Satsuya Nuida Secure multi-party computation (MPC) allows a set of parties to compute a function jointly while ...
Secure Computation of the kth-Ranked Element in a Star Network. Stefan Katzenbeisser , Florian Kerschbaum , Anselme Tueno , Yordan Boev , Mubashir Qureshi We consider the problem of securely computing the kth-ranked element in a sequence of n ...
Insured MPC: Efficient Secure Computation with Financial Penalties. Bernardo David , Rafael Dowsley , Carsten Baum Fairness in Secure Multiparty Computation (MPC) is knownto be impossible to achieve in the presence ...
Zether: Towards Privacy in a Smart Contract World. Dan Boneh , Shashank Agrawal , Mahdi Zamani , Benedikt Bünz Smart contract platforms such as Ethereum and Libraprovide ways to seamlessly remove trust and add ...
An airdrop that preserves recipient privacy. Dan Boneh , Riad S. Wahby , Christopher Jeffrey , Joseph Poon A common approach to bootstrapping a new cryptocurrencyis an airdrop, an arrangement in which existing ...
RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security. Dawu Gu , Man ho Au , Tsz hon Yuen , Joseph K. Liu , Muhammed F. Esgin , Shi-feng Sun , Qingzhao Zhang In this paper, we propose the most efficient blockchain ringconfidential transaction protocol (RingCT3.0) for protecting ...
BLAZE: Practical Lattice-Based Blind Signatures for Privacy-Preserving Applications. Rachid El Bansarkhani , Johannes Buchmann , Nabil Alkeilani Alkadri Blind signatures constitute basic cryptographic ingredientsfor privacy-preserving applications such as anonymous credentials, evoting, and Bitcoin. ...
Non-Interactive Proofs of Proof-of-Work. Aggelos Kiayias , Andrew Miller , Dionysis Zindros Decentralized consensus protocols based on proof-of-work(PoW) mining require nodes to download data linear in the ...
Proof-of-Burn. Aggelos Kiayias , Dionysis Zindros , Kostis Karantias Proof-of-burn has been used as a mechanism to destroy cryptocurrency in a verifiable manner. Despite ...
Non-interactive Cryptographic Timestamping based on Verifiable Delay Functions. Marc Stevens , Christian Schaffner , Esteban Landerreche We present the first treatment of non-interactive publiclyverifiable timestamping schemes in the Universal Composability framework. ...
Panel Crypto engineering for the real world Jean Camp , Allison Nixon , Peter Landrock , Alex Van Someren Whether we work on traditional financial crypto or on blockchains, defending valuable assets against capable ...
Open Market or Ghost Town? The Curious Case of OpenBazaar. Nicolas Christin , James E. Arps OpenBazaar, a decentralized electronic commerce marketplace, has received significant attention since its development was firstannounced ...
Exploring the Monero Peer-to-Peer Network. Xiapu Luo , Jeremie Decouchant , Jiangshan Yu , Tong Cao , Paulo Esteves-veríssimo As of September 2019, Monero is the most capitalized privacypreserving cryptocurrency, and is ranked tenth ...
Surviving the Cryptojungle: Perception and Management of Risk Among North American Cryptocurrency (Non)Users. Konstantin Beznosov , Artemij Voskobojnikov , Borke Obada-obieh , Yue Huang With the massive growth of cryptocurrency markets in recent years has come an influx of ...
Address clustering heuristics for Ethereum. Friedhelm Victor N/A
What are the Actual Flaws in Important Smart Contracts (and How Can We Find Them)?. Josselin Feist , Gustavo Grieco , Alex Groce , Michael Colburn An important problem in smart contract security is understanding the likelihood and criticality of discovered, ...
Characterizing Code Clones in the Ethereum Smart Contract Ecosystem. Xuxian Jiang , Yao Guo , Haoyu Wang , Ningyu He , Lei Wu ct. In this paper, we present the first large-scale and systematic study to characterize the ...
Short Paper: Smart Contracts for Government Processes Case Study and Prototype Implementation. Magnus Krogsbøll , Liv Hartoft , Tijs Slaats , Søren Debois We study blockchain-based integrity-protected smart contracts as an implementation mechanism for municipal government processes. To ...