Financial Cryptography and Data Security -

Financial Cryptography and Data Security

FC 2019 International Workshops, VOTING and WTSC, St. Kitts, St. Kitts and Nevis, February 18–22, 2019, Revised Selected Papers
Buch | Softcover
XIV, 347 Seiten
2020 | 1st ed. 2020
Springer International Publishing (Verlag)
978-3-030-43724-4 (ISBN)
53,49 inkl. MwSt
This book constitutes the refereed proceedings of two workshops held at the 23rd International Conference on Financial Cryptography and Data Security, FC 2019, in St. Kitts, St. Kitts and Nevis, in February 2019.The 20 full papers and 4 short papers presented in this book were carefully reviewed and selected from 34 submissions.The papers feature the outcome of the 4th Workshop on Advances in Secure Electronic Voting, VOTING 2019 and the Third Workshop on Trusted Smart Contracts, WTSC 2019. VOTING covered topics like election auditing, voting system efficiency, voting system usability, and new technical designs for cryptographic protocols for voting systems.WTSC focuses on smart contracts, i.e., self-enforcing agreements in the form of executable programs, and other decentralized applications that are deployed to and run on top of (specialized) blockchains. 

Two-Party State Channels with State Assertions.- Secure Offline Payments in Bitcoin.- Proof-of-Work Sidechains.- You Sank my Battleship! A Case Study to Evaluate State Channels as a Scaling Solution for Cryptocurrencies.- Game-theoretic Analysis of an Incentivized Verifiable Computation System.- Sluggish Mining: Profiting from the Verier's Dilemma.- Deploying PayWord on Ethereum.- SoK: Development of Secure Smart Contracts - Lessons from a Graduate Course.- Verification-Led Smart Contracts.- A Java Framework for Smart Contracts.- Is Solidity solid enough.- Building Executable Secure Design Models for Smart Contracts with Formal Methods.- SoK: Transparent Dishonesty: Front-running Attacks on Blockchain.- Trustee: Full Privacy Preserving Vickrey Auction on top of Ethereum.- Election Manipulation 100.- A Manifest Improvement for Risk-Limiting Audits.- k-Cut: A Simple Approximately-Uniform Method for Sampling Ballots in Post-Election Audits.- How to Assess the Usability Metrics inE-Voting Schemes.- Improving the Performance of Cryptographic Voting Protocols (SoK).- Short Paper: Coercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption.- Priv-Apollo - Secret Ballot E2E-V Internet Voting.- End-to-End Verifiable Quadratic Voting with Everlasting Privacy.- Lattice-Based Proof of a Shuffle.

Erscheinungsdatum
Reihe/Serie Lecture Notes in Computer Science
Security and Cryptology
Zusatzinfo XIV, 347 p. 216 illus., 29 illus. in color.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Gewicht 557 g
Themenwelt Informatik Theorie / Studium Kryptologie
Schlagworte Applications • Blockchain • Computer Networks • Computer Science • Computer Security • Computer systems • conference proceedings • cryptography • Databases • Data communication systems • distributed computer systems • Distributed Database Systems • Distributed Ledger • Distributed Systems • Informatics • Internet • Network Protocols • parallel processing systems • Query Languages • Research
ISBN-10 3-030-43724-8 / 3030437248
ISBN-13 978-3-030-43724-4 / 9783030437244
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich