default search action
26th Financial Cryptography and Data Security 2022: Grenada
- Ittay Eyal, Juan A. Garay:
Financial Cryptography and Data Security - 26th International Conference, FC 2022, Grenada, May 2-6, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13411, Springer 2022, ISBN 978-3-031-18282-2
Tokenomics
- Massimo Bartoletti, James Hsin-yu Chiang, Alberto Lluch-Lafuente:
Maximizing Extractable Value from Automated Market Makers. 3-19 - Mariana Botelho da Gama, John Cartlidge, Antigoni Polychroniadou, Nigel P. Smart, Younes Talibi Alaoui:
Kicking-the-Bucket: Fast Privacy-Preserving Trading Using Buckets. 20-37 - Zhipeng Wang, Kaihua Qin, Duc Vu Minh, Arthur Gervais:
Speculative Multipliers on DeFi: Quantifying On-Chain Leverage Risks. 38-56
MPC (Mostly)
- Lucjan Hanzlik, Kamil Kluczniak:
Explainable Arguments. 59-79 - Duong Tung Nguyen, Ni Trieu:
MPCCache: Privacy-Preserving Multi-Party Cooperative Cache Sharing at the Edge. 80-99 - Aydin Abadi, Changyu Dong, Steven J. Murdoch, Sotirios Terzis:
Multi-party Updatable Delegated Private Set Intersection. 100-119
Privacy
- István András Seres, Balázs Pejó, Péter Burcsi:
The Effect of False Positives: Why Fuzzy Message Detection Leads to Fuzzy Privacy Guarantees? 123-148 - Tarun Chitra, Guillermo Angeris, Alex Evans:
Differential Privacy in Constant Function Market Makers. 149-178 - Tjerand Silde, Martin Strand:
Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing. 179-199
ZKP
- Nicolas Gailly, Mary Maller, Anca Nitulescu:
SnarkPack: Practical SNARK Aggregation. 203-229 - Ignacio Cascudo, Emanuele Giunta:
On Interactive Oracle Proofs for Boolean R1CS Statements. 230-247 - Nitin Singh, Pankaj Dayama, Vinayaka Pandit:
Zero Knowledge Proofs Towards Verifiable Decentralized AI Pipelines. 248-275
Old-School Consensus
- Shir Cohen, Rati Gelashvili, Eleftherios Kokoris-Kogias, Zekun Li, Dahlia Malkhi, Alberto Sonnino, Alexander Spiegelman:
Be Aware of Your Leaders. 279-295 - Rati Gelashvili, Lefteris Kokoris-Kogias, Alberto Sonnino, Alexander Spiegelman, Zhuolun Xiang:
Jolteon and Ditto: Network-Adaptive Efficient Consensus with Asynchronous Fallback. 296-315 - Christian Cachin, Jovana Micic, Nathalie Steinhauer, Luca Zanolini:
Quick Order Fairness. 316-333
Mostly Payment Networks
- Alex Biryukov, Gleb Naumenko, Sergei Tikhomirov:
Analysis and Probing of Parallel Channels in the Lightning Network. 337-357 - Zeta Avarikioti, Krzysztof Pietrzak, Iosif Salem, Stefan Schmid, Samarth Tiwari, Michelle Yeo:
Hide & Seek: Privacy-Preserving Rebalancing on Payment Channel Networks. 358-373 - Philipp Zabka, Klaus-Tycho Förster, Christian Decker, Stefan Schmid:
Short Paper: A Centrality Analysis of the Lightning Network. 374-385 - Malte Möser, Arvind Narayanan:
Resurrecting Address Clustering in Bitcoin. 386-403
Incentives
- Hongyin Chen, Yukun Cheng, Xiaotie Deng, Wenhan Huang, Linxuan Rong:
ABSNFT: Securitization and Repurchase Scheme for Non-Fungible Tokens Based on Game Theoretical Analysis. 407-425 - Sarah Azouvi, Alexander Hicks:
Decentralisation Conscious Players and System Reliability. 426-443 - Tiantian Gong, Mohsen Minaei, Wenhai Sun, Aniket Kate:
Towards Overcoming the Undercutting Problem. 444-463 - Yuheng Wang, Jiliang Li, Zhou Su, Yuyi Wang:
Arbitrage Attack: Miners of the World, Unite! 464-487 - Zeta Avarikioti, Orfeas Stefanos Thyfronitis Litos:
Suborn Channels: Incentives Against Timelock Bribes. 488-511 - Ayelet Lotem, Sarah Azouvi, Patrick McCorry, Aviv Zohar:
Sliding Window Challenge Process for Congestion Detection. 512-530 - Rati Gelashvili, Guy Goren, Alexander Spiegelman:
Short Paper: On Game-Theoretically-Fair Leader Election. 531-538
Not Proof of Work
- Joachim Neu, Ertem Nusret Tas, David Tse:
The Availability-Accountability Dilemma and Its Resolution via Accountability Gadgets. 541-559 - Caspar Schwarz-Schilling, Joachim Neu, Barnabé Monnot, Aditya Asgaonkar, Ertem Nusret Tas, David Tse:
Three Attacks on Proof-of-Stake Ethereum. 560-576 - Benjamin Terner:
Permissionless Consensus in the Resource Model. 577-593
Performance
- Psi Vesely, Kobi Gurkan, Michael Straka, Ariel Gabizon, Philipp Jovanovic, Georgios Konstantopoulos, Asa Oines, Marek Olszewski, Eran Tromer:
Plumo: An Ultralight Blockchain Client. 597-614 - Panagiotis Chatzigiannis, Foteini Baldimtsi, Konstantinos Chalkias:
SoK: Blockchain Light Clients. 615-641 - Parikshit Hegde, Robert Streit, Yanni Georghiades, Chaya Ganesh, Sriram Vishwanath:
Achieving Almost All Blockchain Functionalities with Polylogarithmic Storage. 642-660
Measurements
- Seungjin Baek, Hocheol Nam, Yongwoo Oh, Muoi Tran, Min Suk Kang:
Short Paper: On the Claims of Weak Block Synchronization in Bitcoin. 663-671 - Pratyush Ranjan Tiwari, Dhruv Agarwal, Prakhar Jain, Swagam Dasgupta, Preetha Datta, Vineet Reddy, Debayan Gupta:
India's "Aadhaar" Biometric ID: Structure, Security, and Vulnerabilities. 672-693 - Matthias Grundmann, Hedwig Amberg, Max Baumstark, Hannes Hartenstein:
Short Paper: What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network. 694-704 - Richard Tindell, Alex Mitchell, Nathan Sprague, Xunhua Wang:
An Empirical Study of Two Bitcoin Artifacts Through Deep Learning. 705-724
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.