![](https://dblp.dagstuhl.de/img/logo.320x120.png)
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
30th CCS 2023: Copenhagen, Denmark
- Weizhi Meng, Christian Damsgaard Jensen, Cas Cremers, Engin Kirda:
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023. ACM 2023
Session 1: Cryptography for Anonymity
- Alexander Bienstock
, Paul Rösler
, Yi Tang
:
ASMesh: Anonymous and Secure Messaging in Mesh Networks Using Stronger, Anonymous Double Ratchet. 1-15 - Ward Beullens
, Vadim Lyubashevsky
, Ngoc Khanh Nguyen
, Gregor Seiler
:
Lattice-Based Blind Signatures: Short, Efficient, and Round-Optimal. 16-29 - Omid Mir
, Balthazar Bauer
, Scott Griffy
, Anna Lysyanskaya
, Daniel Slamanig
:
Aggregate Signatures with Versatile Randomization and Issuer-Hiding Multi-Authority Anonymous Credentials. 30-44 - Julia Kastner
, Julian Loss
, Omar Renawi
:
Concurrent Security of Anonymous Credentials Light, Revisited. 45-59
Session 2: Machine Learning Applications I
- Savino Dambra
, Yufei Han
, Simone Aonzo
, Platon Kotzias
, Antonino Vitale
, Juan Caballero
, Davide Balzarotti
, Leyla Bilge
:
Decoding the Secrets of Machine Learning in Malware Classification: A Deep Dive into Datasets, Feature Extraction, and Model Performance. 60-74 - Cong Shi
, Tianfang Zhang
, Zhaoyi Xu
, Shuping Li
, Donglin Gao
, Changming Li
, Athina P. Petropulu
, Chung-Tse Michael Wu
, Yingying Chen
:
Privacy Leakage via Speech-induced Vibrations on Room Objects through Remote Sensing based on Phased-MIMO. 75-89 - Ping He
, Yifan Xia
, Xuhong Zhang
, Shouling Ji
:
Efficient Query-Based Attack against ML-Based Android Malware Detection under Zero Knowledge Setting. 90-104 - Francesco Marchiori
, Mauro Conti
:
Your Battery Is a Blast! Safeguarding Against Counterfeit Batteries with Authentication. 105-119
Session 3: Attacks & Threats
- Bowen He
, Yuan Chen
, Zhuo Chen
, Xiaohui Hu
, Yufeng Hu
, Lei Wu
, Rui Chang
, Haoyu Wang
, Yajin Zhou
:
TxPhishScope: Towards Detecting and Understanding Transaction-based Phishing on Ethereum. 120-134 - Aviv Yaish
, Gilad Stern
, Aviv Zohar
:
Uncle Maker: (Time)Stamping Out The Competition in Ethereum. 135-149 - Chao Li
, Balaji Palanisamy
, Runhua Xu
, Li Duan
, Jiqiang Liu
, Wei Wang
:
How Hard is Takeover in DPoS Blockchains? Understanding the Security of Coin-based Voting Governance. 150-164 - Zihao Li
, Jianfeng Li
, Zheyuan He
, Xiapu Luo
, Ting Wang
, Xiaoze Ni
, Wenwu Yang
, Xi Chen
, Ting Chen
:
Demystifying DeFi MEV Activities in Flashbots Bundle. 165-179
Session 4: Usable Privacy
- Tinhinane Medjkoune
, Oana Goga
, Juliette Senechal
:
Marketing to Children Through Online Targeted Advertising: Targeting Mechanisms and Legal Aspects. 180-194 - Maryam Mustafa
, Abdul Moeed Asad
, Shehrbano Hassan
, Urooj Haider
, Zainab Durrani
, Katharina Krombholz
:
Pakistani Teens and Privacy - How Gender Disparities, Religion and Family Values Impact the Privacy Design Space. 195-209 - Bailey Kacsmar
, Vasisht Duddu
, Kyle Tilbury
, Blase Ur
, Florian Kerschbaum
:
Comprehension from Chaos: Towards Informed Consent for Private Computation. 210-224 - Emiram Kablo
, Patricia Arias Cabarcos
:
Privacy in the Age of Neurotechnology: Investigating Public Attitudes towards Brain Data Collection and Use. 225-238
Session 5: Side-Channels
- Jingyang Hu
, Hongbo Wang
, Tianyue Zheng
, Jingzhi Hu
, Zhe Chen, Hongbo Jiang, Jun Luo:
Password-Stealing without Hacking: Wi-Fi Enabled Practical Keystroke Eavesdropping. 239-252 - Tao Ni
, Xiaokuan Zhang
, Qingchuan Zhao
:
Recovering Fingerprints from In-Display Fingerprint Sensors via Electromagnetic Side Channel. 253-267 - Ben Nassi
, Ofek Vayner
, Etay Iluz
, Dudi Nassi
, Jan Jancar
, Daniel Genkin
, Eran Tromer
, Boris Zadov
, Yuval Elovici
:
Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations. 268-280 - Zihao Wang
, Jiale Guan
, XiaoFeng Wang
, Wenhao Wang
, Luyi Xing
, Fares Fahad S. Alharbi
:
The Danger of Minimum Exposures: Understanding Cross-App Information Leaks on iOS through Multi-Side-Channel Learning. 281-295
Session 6: Cryptography & DNS
- Fenglu Zhang
, Baojun Liu
, Eihal Alowaisheq
, Jianjun Chen
, Chaoyi Lu
, Linjian Song
, Yong Ma
, Ying Liu
, Haixin Duan
, Min Yang
:
Silence is not Golden: Disrupting the Load Balancing of Authoritative DNS Servers. 296-310 - Wei Xu
, Xiang Li
, Chaoyi Lu
, Baojun Liu
, Haixin Duan
, Jia Zhang
, Jianjun Chen
, Tao Wan
:
TsuKing: Coordinating DNS Resolvers and Queries into Potent DoS Amplifiers. 311-325 - Zhenrui Zhang, Geng Hong, Xiang Li
, Zhuoqun Fu
, Jia Zhang
, Mingxuan Liu
, Chuhan Wang
, Jianjun Chen
, Baojun Liu
, Haixin Duan
, Chao Zhang
, Min Yang
:
Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab)use in the Wild. 326-340 - Boyang Ma
, Yilin Yang
, Jinku Li
, Fengwei Zhang
, Wenbo Shen
, Yajin Zhou
, Jianfeng Ma
:
Travelling the Hypervisor and SSD: A Tag-Based Approach Against Crypto Ransomware with Fine-Grained Data Recovery. 341-355
Session 7: Digital Signatures
- Sourav Das
, Philippe Camacho
, Zhuolun Xiang
, Javier Nieto
, Benedikt Bünz
, Ling Ren
:
Threshold Signatures from Inner Product Argument: Succinct, Weighted, and Multi-threshold. 356-370 - Sihang Pu
, Sri Aravinda Krishnan Thyagarajan
, Nico Döttling
, Lucjan Hanzlik
:
Post Quantum Fuzzy Stealth Signatures and Applications. 371-385 - Nils Fleischhacker
, Gottfried Herold
, Mark Simkin
, Zhenfei Zhang
:
Chipmunk: Better Synchronized Multi-Signatures from Lattices. 386-400 - Seongkwang Kim
, Jincheol Ha, Mincheol Son, ByeongHak Lee, Dukjae Moon, Joohee Lee
, Sangyub Lee
, Jihoon Kwon, Jihoon Cho, Hyojin Yoon, Jooyoung Lee:
AIM: Symmetric Primitive for Shorter Signatures with Stronger Security. 401-415
Session 8: Machine Learning Applications II
- Yiling He
, Jian Lou
, Zhan Qin
, Kui Ren
:
FINER: Enhancing State-of-the-art Classifiers with Feature Attribution to Facilitate Security Analysis. 416-430 - Jinwen He
, Kai Chen
, Guozhu Meng
, Jiangshan Zhang
, Congyi Li
:
Good-looking but Lacking Faithfulness: Understanding Local Explanation Methods through Trend-based Testing. 431-445 - Tianfang Zhang
, Zhengkun Ye
, Ahmed Tanvir Mahdad
, Md Mojibur Rahman Redoy Akanda
, Cong Shi
, Yan Wang
, Nitesh Saxena
, Yingying Chen
:
FaceReader: Unobtrusively Mining Vital Signs and Vital Sign Embedded Sensitive Info via AR/VR Motion Sensors. 446-459 - Zhiyuan Yu
, Shixuan Zhai
, Ning Zhang
:
AntiFake: Using Adversarial Audio to Prevent Unauthorized Speech Synthesis. 460-474
Session 9: Consensus Protocols
- Mahimna Kelkar
, Soubhik Deb
, Sishan Long
, Ari Juels
, Sreeram Kannan
:
Themis: Fast, Strong Order-Fairness in Byzantine Consensus. 475-489 - Dahlia Malkhi
, Atsuki Momose
, Ling Ren
:
Towards Practical Sleepy BFT. 490-503 - Xiaohai Dai
, Bolin Zhang
, Hai Jin
, Ling Ren
:
ParBFT: Faster Asynchronous BFT Consensus with a Parallel Optimistic Path. 504-518 - Erica Blum
, Jonathan Katz
, Julian Loss
, Kartik Nayak
, Simon Ochsenreither
:
Abraxas: Throughput-Efficient Hybrid Asynchronous Consensus. 519-533
Session 10: Language-Based Security
- Yuyang Sang
, Ning Luo
, Samuel Judson
, Ben Chaimberg
, Timos Antonopoulos
, Xiao Wang
, Ruzica Piskac
, Zhong Shao
:
Ou: Automating the Parallelization of Zero-Knowledge Protocols. 534-548 - Benjamin Eriksson
, Amanda Stjerna
, Riccardo De Masellis
, Philipp Rümmer
, Andrei Sabelfeld
:
Black Ostrich: Web Application Scanning with String Solvers. 549-563 - Théophile Wallez
, Jonathan Protzenko
, Karthikeyan Bhargavan
:
Comparse: Provably Secure Formats for Cryptographic Protocols. 564-578
Session 11: Quantum & Space
- Chuanqi Xu
, Ferhat Erata
, Jakub Szefer
:
Exploration of Power Side-Channel Vulnerabilities in Quantum Computer Controllers. 579-593 - Chuanqi Xu
, Jessie Chen
, Allen Mi
, Jakub Szefer
:
Securing NISQ Quantum Computer Reset Operations Against Higher Energy State Attacks. 594-607 - Joshua Smailes
, Sebastian Köhler
, Simon Birnbach
, Martin Strohmeier
, Ivan Martinovic
:
Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting. 608-621 - Kyungho Joo
, Dong Hoon Lee
, Yeonseon Jeong
, Wonsuk Choi
:
Protecting HRP UWB Ranging System Against Distance Reduction Attacks. 622-635
Session 12: IoT: Attacks, Vulnerabilities, & Everything
- Daniele Antonioli
:
BLUFFS: Bluetooth Forward and Future Secrecy Attacks and Defenses. 636-650 - Yan He
, Qiuye He
, Song Fang
, Yao Liu
:
When Free Tier Becomes Free to Enter: A Non-Intrusive Way to Identify Security Cameras with no Cloud Subscription. 651-665 - Mujtahid Akon
, Tianchang Yang
, Yilu Dong
, Syed Rafiul Hussain
:
Formal Analysis of Access Control Mechanism of 5G Core Network. 666-680 - David Schmidt
, Carlotta Tagliaro
, Kevin Borgolte
, Martina Lindorfer
:
IoTFlow: Inferring IoT Device Behavior at Scale through Static Mobile Companion App Analysis. 681-695
Session 13: Homomorphic Encryption I
- Jung Hee Cheon
, Wonhee Cho
, Jaehyung Kim
, Damien Stehlé
:
Homomorphic Multiple Precision Multiplication for CKKS and Reduced Modulus Consumption. 696-710 - Sylvain Chatel
, Christian Mouchet
, Ali Utkan Sahin
, Apostolos Pyrgelis
, Carmela Troncoso
, Jean-Pierre Hubaux
:
PELTA - Shielding Multiparty-FHE against Malicious Adversaries. 711-725 - Taechan Kim
, Hyesun Kwak
, Dongwon Lee
, Jinyeong Seo
, Yongsoo Song
:
Asymptotically Faster Multi-Key Homomorphic Encryption from Homomorphic Gadget Decomposition. 726-740 - Michiel Van Beirendonck
, Jan-Pieter D'Anvers
, Furkan Turan
, Ingrid Verbauwhede
:
FPT: A Fixed-Point Accelerator for Torus Fully Homomorphic Encryption. 741-755
Session 14: Machine Learning Attacks I
- Yue Qin
, Zhuoqun Fu
, Chuyun Deng
, Xiaojing Liao
, Jia Zhang
, Haixin Duan
:
Stolen Risks of Models with Security Properties. 756-770 - Yi Zeng
, Minzhou Pan
, Hoang Anh Just
, Lingjuan Lyu
, Meikang Qiu
, Ruoxi Jia
:
Narcissus: A Practical Clean-Label Backdoor Attack with Limited Information. 771-785 - Ryan Feng
, Ashish Hooda
, Neal Mangaokar
, Kassem Fawaz
, Somesh Jha
, Atul Prakash
:
Stateful Defenses for Machine Learning Models Are Not Yet Secure Against Black-box Attacks. 786-800 - Vibha Belavadi
, Yan Zhou
, Murat Kantarcioglu
, Bhavani Thuraisingham
:
Attack Some while Protecting Others: Selective Attack Strategies for Attacking and Protecting Multiple Concepts. 801-814
Session 15: Cryptographic Constructs & Models
- Sisi Duan
, Xin Wang
, Haibin Zhang
:
FIN: Practical Signature-Free Asynchronous Common Subset in Constant Time. 815-829 - Erica Blum
, Derek Leung
, Julian Loss
, Jonathan Katz
, Tal Rabin
:
Analyzing the Real-World Security of the Algorand Blockchain. 830-844 - Peter Gazi
, Aggelos Kiayias
, Alexander Russell
:
Fait Accompli Committee Selection: Improving the Size-Security Tradeoff of Stake-Based Committees. 845-858 - Erkan Tairi
, Pedro Moreno-Sanchez
, Clara Schneidewind
:
LedgerLocks: A Security Framework for Blockchain Protocols Based on Adaptor Signatures. 859-873
Session 16: Defenses
- Kha Dinh Duy
, Kyuwon Cho
, Taehyun Noh
, Hojoon Lee
:
Capacity: Cryptographically-Enforced In-Process Capabilities for Modern ARM Architectures. 874-888 - Martin Unterguggenberger
, David Schrammel
, Lukas Lamster
, Pascal Nasahl
, Stefan Mangard
:
Cryptographically Enforced Memory Safety. 889-903 - Hanwen Lei
, Ziqi Zhang
, Shaokun Zhang
, Peng Jiang
, Zhineng Zhong
, Ningyu He
, Ding Li
, Yao Guo
, Xiangqun Chen
:
Put Your Memory in Order: Efficient Domain-based Memory Isolation for WASM Applications. 904-918 - Jiali Xu
, Mengyao Xie
, Chenggang Wu
, Yinqian Zhang
, Qijing Li
, Xuan Huang
, Yuanming Lai
, Yan Kang
, Wei Wang
, Qiang Wei
, Zhe Wang
:
PANIC: PAN-assisted Intra-process Memory Isolation on ARM. 919-933
Session 17: Secure Hardware
- Qinhan Tan
, Yonathan Fisseha
, Shibo Chen
, Lauren Biernacki
, Jean-Baptiste Jeannin
, Sharad Malik
, Todd M. Austin
:
Security Verification of Low-Trust Architectures. 945-959 - Zhenkai Zhang
, Tyler N. Allen
, Fan Yao
, Xing Gao
, Rong Ge
:
TunneLs for Bootlegging: Fully Reverse-Engineering GPU TLBs for Challenging Isolation Guarantees of NVIDIA MIG. 960-974 - Till Schlüter
, Amit Choudhari
, Lorenz Hetterich
, Leon Trampert
, Hamed Nemati
, Ahmad Ibrahim
, Michael Schwarz
, Christian Rossow
, Nils Ole Tippenhauer
:
FetchBench: Systematic Identification and Characterization of Proprietary Prefetchers. 975-989 - Jakob Feldtkeller
, Tim Güneysu
, Thorben Moos
, Jan Richter-Brockmann
, Sayandeep Saha
, Pascal Sasdrich
, François-Xavier Standaert
:
Combined Private Circuits - Combined Security Refurbished. 990-1004
Session 18: Traffic Analysis
- Chuanpu Fu
, Qi Li
, Ke Xu
, Jianping Wu
:
Point Cloud Analysis for ML-Based Malicious Traffic Detection: Reducing Majorities of False Positive Alarms. 1005-1019 - Peiyang Li
, Ye Wang
, Qi Li
, Zhuotao Liu
, Ke Xu
, Ju Ren
, Zhiying Liu
, Ruilin Lin
:
Learning from Limited Heterogeneous Training Data: Meta-Learning for Unsupervised Zero-Day Web Attack Detection across Web Domains. 1020-1034 - Alireza Bahramali
, Ardavan Bozorgi
, Amir Houmansadr
:
Realistic Website Fingerprinting By Augmenting Network Traces. 1035-1049 - Zhaoxin Jin
, Tianbo Lu
, Shuang Luo
, Jiaze Shang
:
Transformer-based Model for Multi-tab Website Fingerprinting Attack. 1050-1064
Session 19: Advanced Public Key Encryption
- Noemi Glaeser
, Dimitris Kolonelos
, Giulio Malavolta
, Ahmadreza Rahimi
:
Efficient Registration-Based Encryption. 1065-1079 - Matthew Green
, Abhishek Jain
, Gijs Van Laer
:
Efficient Set Membership Encryption and Applications. 1080-1092 - Rachit Garg
, George Lu
, Brent Waters
, David J. Wu
:
Realizing Flexible Broadcast Encryption: How to Broadcast to a Public-Key Directory. 1093-1107 - Joël Alwen
, Dominik Hartmann
, Eike Kiltz
, Marta Mularczyk
, Peter Schwabe
:
Post-Quantum Multi-Recipient Public Key Encryption. 1108-1122
Session 20: Machine Learning Attacks II
- Tejas Kannan
, Nick Feamster
, Henry Hoffmann
:
Prediction Privacy in Distributed Multi-Exit Neural Networks: Vulnerabilities and Solutions. 1123-1137 - Teodora Baluta
, Ivica Nikolic
, Racchit Jain
, Divesh Aggarwal
, Prateek Saxena
:
Unforgeability in Stochastic Gradient Descent. 1138-1152 - Lingshuo Meng
, Yijie Bai
, Yanjiao Chen
, Yutong Hu
, Wenyuan Xu
, Haiqin Weng
:
Devil in Disguise: Breaching Graph Neural Networks Privacy through Infiltration. 1153-1167 - Zhengyuan Jiang
, Jinghuai Zhang
, Neil Zhenqiang Gong
:
Evading Watermark based Detection of AI-Generated Content. 1168-1181
Session 21: Defenses & Smart Contract Security
- Fuchen Ma
, Yuanliang Chen
, Yuanhang Zhou
, Jingxuan Sun
, Zhuo Su, Yu Jiang
, Jiaguang Sun
, Huizhong Li
:
Phoenix: Detect and Locate Resilience Issues in Blockchain via Context-Sensitive Chaos. 1182-1196 - Sven Smolka
, Jens-Rene Giesen
, Pascal Winkler
, Oussama Draissi
, Lucas Davi
, Ghassan Karame
, Klaus Pohl
:
Fuzz on the Beach: Fuzzing Solana Smart Contracts. 1197-1211 - Kushal Babel
, Mojan Javaheripi
, Yan Ji
, Mahimna Kelkar
, Farinaz Koushanfar
, Ari Juels
:
Lanturn: Measuring Economic Security of Smart Contracts Through Adaptive Learning. 1212-1226 - Nirvan Tyagi
, Arasu Arun
, Cody Freitag
, Riad Wahby
, Joseph Bonneau
, David Mazières
:
Riggs: Decentralized Sealed-Bid Auctions. 1227-1241
Session 22: Fuzzing I
- Yinxi Liu
, Wei Meng
:
DSFuzz: Detecting Deep State Bugs with Dependent State Exploration. 1242-1256 - Yunhang Zhang
, Chengbin Pang
, Stefan Nagy
, Xun Chen
, Jun Xu
:
Profile-guided System Optimizations for Accelerated Greybox Fuzzing. 1257-1271 - Peng Deng
, Zhemin Yang
, Lei Zhang
, Guangliang Yang, Wenzheng Hong
, Yuan Zhang
, Min Yang:
NestFuzz: Enhancing Fuzzing with Comprehensive Understanding of Input Processing Logic. 1272-1286 - Qingkai Shi
, Junyang Shao
, Yapeng Ye
, Mingwei Zheng
, Xiangyu Zhang
:
Lifting Network Protocol Implementation to Precise Format Specification with Security Applications. 1287-1301
Session 23: IoT & Embedded Security
- Shilin Xiao
, Xiaoyu Ji
, Chen Yan
, Zhicong Zheng
, Wenyuan Xu
:
MicPro: Microphone-based Voice Privacy Protection. 1302-1316 - Yi Zhu
, Chenglin Miao
, Hongfei Xue
, Zhengxiong Li
, Yunnan Yu
, Wenyao Xu
, Lu Su
, Chunming Qiao
:
TileMask: A Passive-Reflection-based Attack against mmWave Radar Object Detection in Autonomous Driving. 1317-1331 - Xi Tan
, Ziming Zhao
:
SHERLOC: Secure and Holistic Control-Flow Violation Detection on Embedded Systems. 1332-1346 - Sashidhar Jakkamsetti
, Youngil Kim
, Gene Tsudik
:
Caveat (IoT) Emptor: Towards Transparency of IoT Device Presence. 1347-1361
Session 24: Formal Analysis of Cryptographic Protocols
- Faezeh Nasrabadi
, Robert Künnemann
, Hamed Nemati
:
CryptoBap: A Binary Analysis Platform for Cryptographic Protocols. 1362-1376 - Linard Arquint
, Malte Schwerhoff
, Vaibhav Mehta
, Peter Müller
:
A Generic Methodology for the Modular Verification of Security Protocol Implementations. 1377-1391 - Sergiu Bursuc
, Ross Horne
, Sjouke Mauw
, Semen Yurkov
:
Provably Unlinkable Smart Card-based Payments. 1392-1406 - Lea Salome Brugger
, Laura Kovács
, Anja Petkovic Komel
, Sophie Rain
, Michael Rawson
:
CheckMate: Automated Game-Theoretic Security Reasoning. 1407-1421
Session 25: Zero Knowledge Proofs
- Alexandre Belling
, Azam Soleimanian
, Olivier Bégassat
:
Recursion over Public-Coin Interactive Proof Systems; Faster Hash Verification. 1422-1436 - David Balbás
, Dario Fiore
, María Isabel González Vasco
, Damien Robissout
, Claudio Soriente
:
Modular Sumcheck Proofs with Applications to Machine Learning and Image Processing. 1437-1451 - Yibin Yang
, David Heath
, Carmit Hazay
, Vladimir Kolesnikov
, Muthuramakrishnan Venkitasubramaniam
:
Batchman and Robin: Batched and Non-batched Branching for Interactive ZK. 1452-1466 - Diego F. Aranha
, Carsten Baum
, Kristian Gjøsteen
, Tjerand Silde
:
Verifiable Mix-Nets and Distributed Decryption for Voting from Lattice-Based Assumptions. 1467-1481
Session 26: Federated Learning
- Marco Arazzi
, Mauro Conti
, Antonino Nocera
, Stjepan Picek
:
Turning Privacy-preserving Mechanisms against Federated Learning. 1482-1495 - Qi Li, Zhuotao Liu, Qi Li, Ke Xu:
martFL: Enabling Utility-Driven Data Marketplace with a Robust and Verifiable Federated Learning Architecture. 1496-1510 - Chulin Xie
, Yunhui Long
, Pin-Yu Chen
, Qinbin Li
, Sanmi Koyejo
, Bo Li
:
Unraveling the Connections between Privacy and Certified Robustness in Federated Learning Against Poisoning Attacks. 1511-1525 - Torsten Krauß
, Alexandra Dmitrienko
:
MESAS: Poisoning Defense for Federated Learning Resilient against Adaptive Attackers. 1526-1540
Session 27: Interoperability & 2nd Layer Solutions
- Zhonghui Ge
, Jiayuan Gu
, Chenke Wang
, Yu Long
, Xian Xu
, Dawu Gu
:
Accio: Variable-Amount, Optimized-Unlinkable and NIZK-Free Off-Chain Payments via Hubs. 1541-1555 - Andrei Tonkikh
, Pavel Ponomarev
, Petr Kuznetsov
, Yvonne-Anne Pignolet
:
CryptoConcurrency: (Almost) Consensusless Asset Transfer with Shared Accounts. 1556-1570 - Peiyao Sheng, Xuechao Wang, Sreeram Kannan, Kartik Nayak, Pramod Viswanath:
TrustBoost: Boosting Trust among Interoperable Blockchains. 1571-1584 - Ertem Nusret Tas
, Runchao Han
, David Tse
, Mingchao Yu
:
Interchain Timestamping for Mesh Security. 1585-1599