Financial Cryptography and Data Security

Financial Cryptography and Data Security

26th International Conference, FC 2022, Grenada, May 2-6, 2022, Revised Selected Papers

Eyal, Ittay; Garay, Juan

Springer International Publishing AG

10/2022

726

Mole

Inglês

9783031182822

15 a 20 dias

1116

Descrição não disponível.
Tokenomics.- Maximizing Extractable Value from Automated Market Makers.- Kicking-the-Bucket: Fast Privacy-Preserving Trading Using Buckets.- Speculative Multipliers on DeFi: Quantifying On-Chain Leverage Risks.- MPC (mostly).- Explainable Arguments.- MPCCache: Privacy-Preserving Multi-Party Cooperative Cache Sharing at the Edge.- Multi-party Updatable Delegated Private Set Intersection.- Privacy.- The Effect of False Positives: Why Fuzzy Message Detection Leads to Fuzzy Privacy Guarantees?.- Differential Privacy in Constant Function Market Makers.- Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing.- ZKP.- SnarkPack: Practical SNARK Aggregation.- On Interactive Oracle Proofs for Boolean R1CS Statements.- Zero Knowledge Proofs towards Verifiable Decentralized AI.- Old-School Consensus.- Be Aware of Your Leaders.- Jolteon and Ditto: Network-Adaptive Efficient Consensus with Asynchronous Fallback.- Quick Order Fairness.- Mostly Payment Networks.- Analysis and Probing of Parallel Channels in the Lightning Network.- Hide & Seek: Privacy-Preserving Rebalancing on Payment Channel Networks.- Short Paper: A Centrality Analysis of the Lightning Network.- Resurrecting Address Clustering in Bitcoin.- Incentives.- ABSNFT: Securitization and Repurchase Scheme for Non-Fungible Tokens Based on Game Theoretical Analysis.- Decentralization Conscious Players And System Reliability.- Towards Overcoming the Undercutting Problem.- Arbitrage attack: Miners of the world, unite!.- Suborn Channels: Incentives Against Timelock Bribes.- Sliding Window Challenge Process for Congestion Detection.- Short Paper: On Game-Theoretically-Fair Leader Election.- Not Proof of Work.- The Availability-Accountability Dilemma and its Resolution via Accountability Gadgets.- Three Attacks on Proof-of-Stake Ethereum.- Permissionless Consensus in the Resource Model.- Performance.- Plumo: An Ultralight Blockchain Client.- SoK: Blockchain Light Clients.- Achieving Almost All Blockchain Functionalities with Polylogarithmic Storage.- Measurements.- Short Paper: On the Claims of Weak Block Synchronization in Bitcoin.- India's "Aadhaar" Biometric ID: Structure, Security, and Vulnerabilities.- Short Paper: What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network.- An empirical study of two Bitcoin artifacts through deep learning.
anonymity and untraceability;Biometrics;blockchain;computer networks;computer security;cryptography;data communication systems;databases;Distributed algorithms;distributed computer systems;distributed ledger;network protocols;parallel processing systems;Privacy-preserving protocols;query languages;Security protocols;signal processing