Title |
Speakers |
Summary |
Topic Types |
Keynote: Fraudsters Taught Us that Identity is Broken. |
Allison Nixon
|
Cybercrime has grown into a trillion dollar problem. The online commercial ecosystem is built on ... |
|
Leveraging Bitcoin Testnet for Bidirectional Botnet Command and Control Systems. |
Federico Franzoni
,
Vanesa Daza
,
Iván Abellán
|
Over the past twenty years, the number of devices connectedto the Internet grew exponentially. Botnets ... |
|
Security Analysis on dBFT protocol of NEO. |
Yang Xiang
,
Shiping Chen
,
Qin Wang
,
Jiangshan Yu
,
Zhiniang Peng
,
Vancuong Bui
,
Yong Ding
|
NEO is ranked as one of the top blockchains by market capitalization. We provide a ... |
|
Breaking the encryption scheme of the Moscow internet voting system. |
Pierrick Golovnev
|
In September 2019, voters for the election at the Parliamentof the city of Moscow were ... |
|
Short Paper: XOR Arbiter PUFs have Systematic Response Bias. |
Nils Pirnay
|
We demonstrate that XOR Arbiter PUFs with an even number of arbiter chains have inherently ... |
|
Selfish Mining Re-Examined. |
Emin Gun Sirer
,
Kevin Alarcón Negy
,
Peter R. Rizun
|
Six years after the introduction of selfish mining, its counterintuitive findings continue to create confusion. ... |
|
Fairness and Efficiency in DAG-based Cryptocurrencies. |
Georgios Birmpas
,
Elias Koutsoupias
,
Philip Lazos
,
Francisco Cossío
|
Bitcoin is a decentralised digital currency that serves as analternative to existing transaction systems based ... |
|
Stake Shift in Major Cryptocurrencies: An Empirical Study. |
Peter Gazi
,
Rainer Stütz
,
Bernhard Haslhofer
,
Jacob Illium
|
In the proof-of-stake (PoS) paradigm for maintaining decentralized, permissionless cryptocurrencies, Sybil attacks are prevented bybasing ... |
|
Coded Merkle Tree: Solving Data Availability Attacks in Blockchains. |
Mingchao Yu
,
Saeid Sahraei
,
Songze Li
,
Salman Avestimehr
,
Sreeram Kannan
,
Pramod Viswanath
|
In this paper, we propose coded Merkle tree (CMT), a novelhash accumulator that offers a ... |
|
Decentralized Privacy-Preserving Netting Protocol on Blockchain for Payment Systems. |
Kaoutar Elkhiyaoui
,
Shengjiao Cao
,
Yuan Yuan
,
Angelo De Caro
,
Karthik Nandakumar
,
Yanyan Hu
|
This paper proposes a decentralized netting protocol thatguarantees the privacy of the participants. Namely, it ... |
|
The Arwen Trading Protocols. |
Sharon Goldberg
,
Ethan Heilman
,
Sebastien Lipmann
|
The Arwen Trading Protocols are layer-two blockchain protocols for traders to securely trade cryptocurrencies at ... |
|
SoK: A Classification Framework for Stablecoin Designs. |
Emin Gun Sirer
,
Amani Moin
,
Kevin Sekniqi
|
Stablecoins promise to bridge fiat currencies with the worldof cryptocurrencies. They provide a way for ... |
|
Echidna: A Practical Smart Contract Fuzzer. |
Josselin Feist
,
Gustavo Grieco
,
John-paul Smith
,
Alex Groce
|
N/A |
|
Taproot Analysis. |
Lloyd Fournier
|
N/A |
|
Assessing or incentivising correct mixing without authorities. |
Jeff Burdges
|
N/A |
|
A New Protocol for Fair Addition of a Transaction Fee When Closing a Payment Channel Uncooperatively. |
Takahiro Matsuura
|
N/A |
|
On the Applicability of Behavioral Biometric Authentication on Smartphones. |
Ahmed Mahfouz
,
Mohamed Alaa
,
Ahmed Hamdy
,
Tarek Mostafa
|
N/A |
|
Rethinking Blockchain Layers: Do Payment Channel Networks Need a Blockchain?. |
Matthias Hartenstein
|
N/A |
|
Prevention of Bouncing Attack on Casper FFG. |
Ryuya Nakamura
|
N/A |
|
SoK: Layer-Two Blockchain Protocols. |
Pedro Moreno-sanchez
,
Stefanie Roos
,
Arthur Gervais
,
Lewis Gudgeon
,
Patrick Mccorry
|
Blockchains have the potential to revolutionize markets andservices. However, they currently exhibit high latencies and ... |
|
MicroCash: Practical Concurrent Processing of Micropayments. |
Justin Cappos
,
Allison Bishop
,
Ghada Almashaqbeh
|
Micropayments have a large number of potential applications. However, processing these small payments individually can ... |
|
LockDown: Balance Availability Attack against Lightning Network Channels. |
Joaquin Garcia-alfaro
,
Cristina Pérez-solà
,
Alejandro Ranchal-pedrosa
,
Jordi Herrera-joancomarti
,
Guillermo Navarro-arribas
|
The Lightning Network (LN) is a payment network runningas a second layer on top of ... |
|
Ride the Lightning: The Game Theory of Payment Channels. |
Roger Wattenhofer
,
Zeta Avarikioti
,
Lioba Heimbach
,
Yuyi Wang
|
Payment channels were introduced to solve various eminentcryptocurrency scalability issues. Multiple payment channels build a ... |
|
How to profit from payments channels. |
Zekeriya Erkin
,
Stefanie Roos
,
Oguzhan Ersoy
|
Payment channel networks like Bitcoin’s Lightning networkare an auspicious approach for realizing high transaction throughputand ... |
|
Boomerang: Redundancy Improves Latency and Throughput in Payment Networks. |
Joachim Neu
,
Vivek Bagaria
,
David Tse
|
In multi-path routing schemes for payment-channel networks,Alice transfers funds to Bob by splitting them into ... |
|
DLSAG: Non-Interactive Refund Transactions For Interoperable Payment Channels in Monero. |
Aniket Kate
,
Pedro Moreno-sanchez
,
Arthur Blue
,
Duc Le
,
Sarang Noether
,
Brandon Goodell
|
Monero has emerged as one of the leading cryptocurrencieswith privacy by design. However, this comes ... |
|
Cerberus Channels: Incentivizing Watchtowers for Bitcoin. |
Roger Wattenhofer
,
Zeta Avarikioti
,
Orfeas Litos
|
Bitcoin and similar blockchain systems have a limited transaction throughput because each transaction must be ... |
|
Communication-Efficient (Client-Aided) Secure Two-Party Protocols and Its Application. |
Satsuya Nuida
|
Secure multi-party computation (MPC) allows a set of parties to compute a function jointly while ... |
|
Secure Computation of the kth-Ranked Element in a Star Network. |
Stefan Katzenbeisser
,
Florian Kerschbaum
,
Anselme Tueno
,
Yordan Boev
,
Mubashir Qureshi
|
We consider the problem of securely computing the kth-ranked element in a sequence of n ... |
|
Insured MPC: Efficient Secure Computation with Financial Penalties. |
Bernardo David
,
Rafael Dowsley
,
Carsten Baum
|
Fairness in Secure Multiparty Computation (MPC) is knownto be impossible to achieve in the presence ... |
|
Zether: Towards Privacy in a Smart Contract World. |
Dan Boneh
,
Shashank Agrawal
,
Mahdi Zamani
,
Benedikt Bünz
|
Smart contract platforms such as Ethereum and Libraprovide ways to seamlessly remove trust and add ... |
|
An airdrop that preserves recipient privacy. |
Dan Boneh
,
Riad S. Wahby
,
Christopher Jeffrey
,
Joseph Poon
|
A common approach to bootstrapping a new cryptocurrencyis an airdrop, an arrangement in which existing ... |
|
RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security. |
Dawu Gu
,
Man ho Au
,
Tsz hon Yuen
,
Joseph K. Liu
,
Muhammed F. Esgin
,
Shi-feng Sun
,
Qingzhao Zhang
|
In this paper, we propose the most efficient blockchain ringconfidential transaction protocol (RingCT3.0) for protecting ... |
|
BLAZE: Practical Lattice-Based Blind Signatures for Privacy-Preserving Applications. |
Rachid El Bansarkhani
,
Johannes Buchmann
,
Nabil Alkeilani Alkadri
|
Blind signatures constitute basic cryptographic ingredientsfor privacy-preserving applications such as anonymous credentials, evoting, and Bitcoin. ... |
|
Non-Interactive Proofs of Proof-of-Work. |
Aggelos Kiayias
,
Andrew Miller
,
Dionysis Zindros
|
Decentralized consensus protocols based on proof-of-work(PoW) mining require nodes to download data linear in the ... |
|
Proof-of-Burn. |
Aggelos Kiayias
,
Dionysis Zindros
,
Kostis Karantias
|
Proof-of-burn has been used as a mechanism to destroy cryptocurrency in a verifiable manner. Despite ... |
|
Non-interactive Cryptographic Timestamping based on Verifiable Delay Functions. |
Marc Stevens
,
Christian Schaffner
,
Esteban Landerreche
|
We present the first treatment of non-interactive publiclyverifiable timestamping schemes in the Universal Composability framework. ... |
|
Panel Crypto engineering for the real world |
Jean Camp
,
Allison Nixon
,
Peter Landrock
,
Alex Van Someren
|
Whether we work on traditional financial crypto or on blockchains, defending valuable assets against capable ... |
|
Open Market or Ghost Town? The Curious Case of OpenBazaar. |
Nicolas Christin
,
James E. Arps
|
OpenBazaar, a decentralized electronic commerce marketplace, has received significant attention since its development was firstannounced ... |
|
Exploring the Monero Peer-to-Peer Network. |
Xiapu Luo
,
Jeremie Decouchant
,
Jiangshan Yu
,
Tong Cao
,
Paulo Esteves-veríssimo
|
As of September 2019, Monero is the most capitalized privacypreserving cryptocurrency, and is ranked tenth ... |
|
Surviving the Cryptojungle: Perception and Management of Risk Among North American Cryptocurrency (Non)Users. |
Konstantin Beznosov
,
Artemij Voskobojnikov
,
Borke Obada-obieh
,
Yue Huang
|
With the massive growth of cryptocurrency markets in recent years has come an influx of ... |
|
Address clustering heuristics for Ethereum. |
Friedhelm Victor
|
N/A |
|
What are the Actual Flaws in Important Smart Contracts (and How Can We Find Them)?. |
Josselin Feist
,
Gustavo Grieco
,
Alex Groce
,
Michael Colburn
|
An important problem in smart contract security is understanding the likelihood and criticality of discovered, ... |
|
Characterizing Code Clones in the Ethereum Smart Contract Ecosystem. |
Xuxian Jiang
,
Yao Guo
,
Haoyu Wang
,
Ningyu He
,
Lei Wu
|
ct. In this paper, we present the first large-scale and systematic study to characterize the ... |
|
Short Paper: Smart Contracts for Government Processes Case Study and Prototype Implementation. |
Magnus Krogsbøll
,
Liv Hartoft
,
Tijs Slaats
,
Søren Debois
|
We study blockchain-based integrity-protected smart contracts as an implementation mechanism for municipal government processes. To ... |
|