PRIViLEDGE: Privacy in Distributed Ledgers

Filter
Conference contribution

Search results

  • 2022

    Efficient NIZK Arguments with Straight-Line Simulation and Extraction

    Ciampi, M. & Visconti, I., 10 Nov 2022, Cryptology and Network Security - 21st International Conference, CANS 2022, Proceedings. Beresford, A. R., Patra, A. & Bellini, E. (eds.). Springer, p. 3-22 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13641).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Collusion-Preserving Computation without a Mediator

    Ciampi, M., Lu, Y. & Zikas, V., 31 Oct 2022, 2022 IEEE 35th Computer Security Foundations Symposium, CSF 2022 - Proceedings. Institute of Electrical and Electronics Engineers, p. 211-226 16 p. (Proceedings - IEEE Computer Security Foundations Symposium; vol. 2022-August).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Round-Optimal and Communication-Efficient Multiparty Computation

    Ciampi, M., Ostrovsky, R., Waldner, H. & Zikas, V., 25 May 2022, Advances in Cryptology – EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2022, Proceedings. Dunkelman, O. & Dziembowski, S. (eds.). Springer, p. 65-95 31 p. (Lecture Notes in Computer Science; vol. 13275).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2021

    Snarky Ceremonies

    Kohlweiss, M., Maller, M., Siim, J. & Volkhov, M., 1 Dec 2021, Advances in Cryptology -- ASIACRYPT 2021: 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6–10, 2021, Proceedings, Part III. Tibouchi, M. & Wang, H. (eds.). Cham: Springer, p. 98-127 30 p. (Lecture Notes in Computer Science; vol. 13092).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Another Look at Extraction and Randomization of Groth's zk-SNARK

    Baghery, K., Kohlweiss, M., Siim, J. & Volkhov, M., 23 Oct 2021, Financial Cryptography and Data Security. Borisov, N. & Diaz, C. (eds.). Berlin, Heidelberg: Springer, p. 457-475 19 p. (Lecture Notes in Computer Science; vol. 12674).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Efficient State Management in Distributed Ledgers

    Karakostas, D., Karayannidis, N. & Kiayias, A., 23 Oct 2021, Financial Cryptography and Data Security: 25th International Conference, FC 2021, Virtual Event, March 1–5, 2021, Revised Selected Papers, Part II. Borisov, N. & Diaz, C. (eds.). Berlin, Heidelberg: Springer, p. 319-338 20 p. (Lecture Notes in Computer Science; vol. 12675).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Fast isomorphic state channels

    Chakravarty, M. M. T., Coretti, S., Fitzi, M., Gaži, P., Kant, P., Kiayias, A. & Russell, A., 23 Oct 2021, Financial Cryptography and Data Security. Borisov, N. & Diaz, C. (eds.). Springer, Vol. 12675. p. 339-358 20 p. (Lecture Notes in Computer Science; vol. 12675).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    File
  • Mining for Privacy: How to Bootstrap a Snarky Blockchain

    Kerber, T., Kiayias, A. & Kohlweiss, M., 23 Oct 2021, Financial Cryptography and Data Security: 25th International Conference, FC 2021, Virtual Event, March 1–5, 2021, Revised Selected Papers, Part I. Borisov, N. & Diaz, C. (eds.). Berlin, Heidelberg: Springer, p. 497-514 18 p. (Lecture Notes in Computer Science; vol. 12674).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Incentives against power grabs or how to engineer the revolution in a pooled proof of stake system

    Kiayias, A., Koutsoupias, E. & Stouka, A-P., 20 Oct 2021, 2021 IEEE International Conference on Decentralized Applications and Infrastructures. Institute of Electrical and Electronics Engineers, p. 1-10 10 p. (IEEE International Conference on Decentralized Applications and Infrastructures).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Coalition-Safe Equilibria with Virtual Payoffs

    Kiayias, A. & Stouka, A-P., 26 Sept 2021, Proceedings of the 3rd ACM Conference on Advances in Financial Technologies (AFT 2021). ACM, p. 71-85 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • On the Anonymity Guarantees of Anonymous Proof-of-Stake Protocols

    Kohlweiss, M., Madathil, V., Nayak, K. & Scafuro, A., 26 Aug 2021, 2021 IEEE Symposium on Security and Privacy (SP): SP 2021. Institute of Electrical and Electronics Engineers, p. 1818-1833 16 p. (IEEE Symposium on Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Composition with Knowledge Assumptions

    Kerber, T., Kiayias, A. & Kohlweiss, M., 11 Aug 2021, Advances in Cryptology – CRYPTO 2021. Malkin, T. & Peikert, C. (eds.). Springer, p. 364-393 30 p. (Lecture Notes in Computer Science; vol. 12828).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Kachina - Foundations of Private Smart Contracts

    Kerber, T., Kiayias, A. & Kohlweiss, M., 10 Aug 2021, 2021 IEEE 34th Computer Security Foundations Symposium (CSF). Institute of Electrical and Electronics Engineers, p. 1-16 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Dynamic Ad Hoc Clock Synchronization

    Badertscher, C., Gaži, P., Kiayias, A., Russell, A. & Zikas, V., 16 Jun 2021, Advances in Cryptology – EUROCRYPT 2021. Springer, p. 399-428 29 p. (Lecture Notes in Computer Science; vol. 12698).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Threshold Garbled Circuits and Ad Hoc Secure Computation

    Ciampi, M., Goyal, V. & Ostrovsky, R., 16 Jun 2021, Advances in Cryptology -- EUROCRYPT 2021. Canteaut, A. & Standaert, F-X. (eds.). Cham: Springer, p. 64-93 30 p. (Lecture Notes in Computer Science; vol. 12698).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Multi-Client Functional Encryption for Separable Functions

    Ciampi, M., Siniscalchi, L. & Waldner, H., 1 May 2021, Public-Key Cryptography -- PKC 2021. Garay, J. A. (ed.). Cham: Springer, p. 724-753 30 p. (Lecture Notes in Computer Science; vol. 12710).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2020

    Blockchains from non-idealized hash functions

    Garay, J. A., Kiayias, A. & Panagiotakos, G., 9 Dec 2020, Theory of Cryptography: 18th International Conference. Pass, R. & Pietrzak, K. (eds.). Springer, Vol. 12550. p. 291-321 31 p. (Lecture Notes in Computer Science; vol. 12550).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    File
  • Round Optimal Secure Multiparty Computation from Minimal Assumptions

    Choudhuri, A. R., Ciampi, M., Goyal, V., Jain, A. & Ostrovsky, R., 9 Dec 2020, Theory of Cryptography - 18th International Conference, TCC 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part II. Pass, R. & Pietrzak, K. (eds.). Springer, p. 291-319 29 p. (Lecture Notes in Computer Science; vol. 12551).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Reward sharing schemes for stake pools

    Brünjes, L., Kiayias, A., Koutsoupias, E. & Stouka, A-P., 2 Nov 2020, 2020 IEEE European Symposium on Security and Privacy (EuroS&P). Institute of Electrical and Electronics Engineers, p. 256-275 20 p. 9230398

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Updatable Blockchains

    Ciampi, M., Karayannidis, N., Kiayias, A. & Zindros, D., 13 Sept 2020, Computer Security - ESORICS 2020. Chen, L., Li, N., Liang, K. & Schneider, S. A. (eds.). Springer, p. 590-609 20 p. (Lecture Notes in Computer Science; vol. 12309).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • On Adaptive Security of Delayed-Input Sigma Protocols and Fiat-Shamir NIZKs

    Ciampi, M., Parisella, R. & Venturi, D., 7 Sept 2020, Security and Cryptography for Networks. SCN 2020. Galdi, C. & Kolesnikov, V. (eds.). Springer, p. 670-690 21 p. (Lecture Notes in Computer Science; vol. 12238).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Timed Signatures and Zero-Knowledge Proofs: Timestamping in the Blockchain Era

    Abadi, A., Ciampi, M., Kiayias, A. & Zikas, V., 27 Aug 2020, Applied Cryptography and Network Security (ACNS 2020): 18th International Conference, ACNS 2020, Rome, Italy, October 19–22, 2020, Proceedings, Part I. Springer, p. 335 - 354 20 p. (Lecture Notes in Computer Science; vol. 12146).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • One-shot signatures and applications to hybrid quantum/classical authentication

    Amos, R., Georgiou, M., Kiayias, A. & Zhandry, M., 8 Jun 2020, Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing (STOC 2020). Makarychev, K., Makarychev, Y., Tulsiani, M., Kamath, G. & Chuzhoy, J. (eds.). ACM, p. 255-268 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Resource-Restricted Cryptography: Revisiting MPC Bounds in the Proof-of-Work Era

    Garay, J., Kiayias, A., Ostrovsky, R. M., Panagiotakos, G. & Zikas, V., 1 May 2020, Advances in Cryptology — EUROCRYPT 2020. Cham: Springer, (Lecture Notes in Computer Science; vol. 12106).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • The Combinatorics of the Longest-Chain Rule: Linear Consistency for Proof-of-Stake Blockchains

    Blum, E., Kiayias, A., Moore, C., Quader, S. & Russell, A., 8 Jan 2020, Proceedings of the 2020 ACM-SIAM Symposium on Discrete Algorithms. p. 1135-1154 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2019

    Ouroboros Crypsinous: Privacy-Preserving Proof-of-Stake

    Kerber, T., Kiayias, A., Kohlweiss, M. & Zikas, V., 16 Sept 2019, 2019 IEEE Symposium on Security and Privacy (SP). Institute of Electrical and Electronics Engineers, p. 157-174 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Proof-of-Stake Sidechains

    Gazi, P., Kiayias, A. & Zindros, D., 16 Sept 2019, 2019 IEEE Symposium on Security and Privacy (SP). Institute of Electrical and Electronics Engineers, p. 139-156 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • UC-Secure CRS Generation for SNARKs

    Abdolmaleki, B., Baghery, K., Lipmaa, H., Siim, J. & Zajac, M., 29 Jun 2019, Progress in Cryptology -- AFRICACRYPT 2019. Buchmann, J., Nitaj, A. & Rachidi, T. (eds.). Cham: Springer, p. 99-117 19 p. (Lecture Notes in Computer Science ; vol. 11627).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • DL-Extractable UC-Commitment Schemes

    Abdolmaleki, B., Baghery, K., Lipmaa, H., Siim, J. & Zajac, M., 29 May 2019, Applied Cryptography and Network Security. Deng, R. H., Gauthier-Umaña, V., Ochoa, M. & Yung, M. (eds.). Cham: Springer, p. 385-405 21 p. (Lecture Notes in Computer Science; vol. 11464).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2018

    Stake-Bleeding Attacks on Proof-of-Stake Blockchains

    Gaži, P., Kiayias, A. & Russell, A., 8 Nov 2018, (E-pub ahead of print) 2018 Crypto Valley Conference on Blockchain Technology (CVCBT). Institute of Electrical and Electronics Engineers, p. 85-92 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability

    Badertscher, C., Gazi, P., Kiayias, A., Russell, A. & Zikas, V., 15 Oct 2018, Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, p. 913-930 18 p. (CCS '18).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File