


default search action
26th Financial Cryptography and Data Security 2022: Grenada
- Ittay Eyal

, Juan A. Garay
:
Financial Cryptography and Data Security - 26th International Conference, FC 2022, Grenada, May 2-6, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13411, Springer 2022, ISBN 978-3-031-18282-2
Tokenomics
- Massimo Bartoletti, James Hsin-yu Chiang

, Alberto Lluch-Lafuente
:
Maximizing Extractable Value from Automated Market Makers. 3-19 - Mariana Botelho da Gama

, John Cartlidge
, Antigoni Polychroniadou, Nigel P. Smart
, Younes Talibi Alaoui
:
Kicking-the-Bucket: Fast Privacy-Preserving Trading Using Buckets. 20-37 - Zhipeng Wang

, Kaihua Qin
, Duc Vu Minh, Arthur Gervais:
Speculative Multipliers on DeFi: Quantifying On-Chain Leverage Risks. 38-56
MPC (Mostly)
- Lucjan Hanzlik, Kamil Kluczniak:

Explainable Arguments. 59-79 - Duong Tung Nguyen, Ni Trieu:

MPCCache: Privacy-Preserving Multi-Party Cooperative Cache Sharing at the Edge. 80-99 - Aydin Abadi

, Changyu Dong, Steven J. Murdoch
, Sotirios Terzis
:
Multi-party Updatable Delegated Private Set Intersection. 100-119
Privacy
- István András Seres, Balázs Pejó, Péter Burcsi:

The Effect of False Positives: Why Fuzzy Message Detection Leads to Fuzzy Privacy Guarantees? 123-148 - Tarun Chitra, Guillermo Angeris, Alex Evans:

Differential Privacy in Constant Function Market Makers. 149-178 - Tjerand Silde

, Martin Strand
:
Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing. 179-199
ZKP
- Nicolas Gailly, Mary Maller, Anca Nitulescu:

SnarkPack: Practical SNARK Aggregation. 203-229 - Ignacio Cascudo

, Emanuele Giunta
:
On Interactive Oracle Proofs for Boolean R1CS Statements. 230-247 - Nitin Singh, Pankaj Dayama, Vinayaka Pandit:

Zero Knowledge Proofs Towards Verifiable Decentralized AI Pipelines. 248-275
Old-School Consensus
- Shir Cohen, Rati Gelashvili, Eleftherios Kokoris-Kogias, Zekun Li, Dahlia Malkhi, Alberto Sonnino, Alexander Spiegelman:

Be Aware of Your Leaders. 279-295 - Rati Gelashvili, Lefteris Kokoris-Kogias, Alberto Sonnino, Alexander Spiegelman, Zhuolun Xiang:

Jolteon and Ditto: Network-Adaptive Efficient Consensus with Asynchronous Fallback. 296-315 - Christian Cachin

, Jovana Micic
, Nathalie Steinhauer
, Luca Zanolini
:
Quick Order Fairness. 316-333
Mostly Payment Networks
- Alex Biryukov

, Gleb Naumenko, Sergei Tikhomirov:
Analysis and Probing of Parallel Channels in the Lightning Network. 337-357 - Zeta Avarikioti, Krzysztof Pietrzak, Iosif Salem

, Stefan Schmid
, Samarth Tiwari, Michelle Yeo
:
Hide & Seek: Privacy-Preserving Rebalancing on Payment Channel Networks. 358-373 - Philipp Zabka, Klaus-Tycho Förster, Christian Decker, Stefan Schmid

:
Short Paper: A Centrality Analysis of the Lightning Network. 374-385 - Malte Möser, Arvind Narayanan:

Resurrecting Address Clustering in Bitcoin. 386-403
Incentives
- Hongyin Chen, Yukun Cheng, Xiaotie Deng, Wenhan Huang, Linxuan Rong

:
ABSNFT: Securitization and Repurchase Scheme for Non-Fungible Tokens Based on Game Theoretical Analysis. 407-425 - Sarah Azouvi, Alexander Hicks:

Decentralisation Conscious Players and System Reliability. 426-443 - Tiantian Gong

, Mohsen Minaei, Wenhai Sun
, Aniket Kate:
Towards Overcoming the Undercutting Problem. 444-463 - Yuheng Wang, Jiliang Li

, Zhou Su, Yuyi Wang:
Arbitrage Attack: Miners of the World, Unite! 464-487 - Zeta Avarikioti, Orfeas Stefanos Thyfronitis Litos:

Suborn Channels: Incentives Against Timelock Bribes. 488-511 - Ayelet Lotem

, Sarah Azouvi
, Patrick McCorry, Aviv Zohar
:
Sliding Window Challenge Process for Congestion Detection. 512-530 - Rati Gelashvili, Guy Goren, Alexander Spiegelman:

Short Paper: On Game-Theoretically-Fair Leader Election. 531-538
Not Proof of Work
- Joachim Neu

, Ertem Nusret Tas
, David Tse
:
The Availability-Accountability Dilemma and Its Resolution via Accountability Gadgets. 541-559 - Caspar Schwarz-Schilling

, Joachim Neu
, Barnabé Monnot
, Aditya Asgaonkar, Ertem Nusret Tas
, David Tse
:
Three Attacks on Proof-of-Stake Ethereum. 560-576 - Benjamin Terner:

Permissionless Consensus in the Resource Model. 577-593
Performance
- Psi Vesely, Kobi Gurkan, Michael Straka, Ariel Gabizon, Philipp Jovanovic, Georgios Konstantopoulos, Asa Oines, Marek Olszewski, Eran Tromer

:
Plumo: An Ultralight Blockchain Client. 597-614 - Panagiotis Chatzigiannis, Foteini Baldimtsi, Konstantinos Chalkias:

SoK: Blockchain Light Clients. 615-641 - Parikshit Hegde, Robert Streit, Yanni Georghiades, Chaya Ganesh, Sriram Vishwanath:

Achieving Almost All Blockchain Functionalities with Polylogarithmic Storage. 642-660
Measurements
- Seungjin Baek, Hocheol Nam

, Yongwoo Oh, Muoi Tran, Min Suk Kang:
Short Paper: On the Claims of Weak Block Synchronization in Bitcoin. 663-671 - Pratyush Ranjan Tiwari, Dhruv Agarwal, Prakhar Jain, Swagam Dasgupta, Preetha Datta, Vineet Reddy, Debayan Gupta:

India's "Aadhaar" Biometric ID: Structure, Security, and Vulnerabilities. 672-693 - Matthias Grundmann

, Hedwig Amberg, Max Baumstark, Hannes Hartenstein
:
Short Paper: What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network. 694-704 - Richard Tindell, Alex Mitchell, Nathan Sprague, Xunhua Wang:

An Empirical Study of Two Bitcoin Artifacts Through Deep Learning. 705-724

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














