Financial Cryptography and Data Security -

Financial Cryptography and Data Security

26th International Conference, FC 2022, Grenada, May 2–6, 2022, Revised Selected Papers

Ittay Eyal, Juan Garay (Herausgeber)

Buch | Softcover
XIV, 726 Seiten
2022 | 1st ed. 2022
Springer International Publishing (Verlag)
978-3-031-18282-2 (ISBN)
117,69 inkl. MwSt
This book constitutes revised selected papers from the proceedings of the 26th International Conference on Financial Cryptography and Data Security, FC 2022, which was held in Grenada during May 2022.
The 32 full papers and 4 short papers included in this book were carefully reviewed andselected from 159 submissions. They were organized in topical sections as follows: tokenomics; MPC (mostly); privacy; ZKP; old-school consensus; mostly payment networks; incentives; not proof of work; performance; measurements.

Tokenomics.- Maximizing Extractable Value from Automated Market Makers.- Kicking-the-Bucket: Fast Privacy-Preserving Trading Using Buckets.- Speculative Multipliers on DeFi: Quantifying On-Chain Leverage Risks.- MPC (mostly).- Explainable Arguments.- MPCCache: Privacy-Preserving Multi-Party Cooperative Cache Sharing at the Edge.- Multi-party Updatable Delegated Private Set Intersection.- Privacy.- The Effect of False Positives: Why Fuzzy Message Detection Leads to Fuzzy Privacy Guarantees?.- Differential Privacy in Constant Function Market Makers.- Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing.- ZKP.- SnarkPack: Practical SNARK Aggregation.- On Interactive Oracle Proofs for Boolean R1CS Statements.- Zero Knowledge Proofs towards Verifiable Decentralized AI.- Old-School Consensus.- Be Aware of Your Leaders.- Jolteon and Ditto: Network-Adaptive Efficient Consensus with Asynchronous Fallback.- Quick Order Fairness.- Mostly Payment Networks.- Analysis and Probing of Parallel Channels in the Lightning Network.- Hide & Seek: Privacy-Preserving Rebalancing on Payment Channel Networks.- Short Paper: A Centrality Analysis of the Lightning Network.- Resurrecting Address Clustering in Bitcoin.- Incentives.- ABSNFT: Securitization and Repurchase Scheme for Non-Fungible Tokens Based on Game Theoretical Analysis.- Decentralization Conscious Players And System Reliability.- Towards Overcoming the Undercutting Problem.- Arbitrage attack: Miners of the world, unite!.- Suborn Channels: Incentives Against Timelock Bribes.- Sliding Window Challenge Process for Congestion Detection.- Short Paper: On Game-Theoretically-Fair Leader Election.- Not Proof of Work.- The Availability-Accountability Dilemma and its Resolution via Accountability Gadgets.- Three Attacks on Proof-of-Stake Ethereum.- Permissionless Consensus in the Resource Model.- Performance.- Plumo: An Ultralight Blockchain Client.- SoK: Blockchain Light Clients.- Achieving Almost All Blockchain Functionalities with Polylogarithmic Storage.- Measurements.- Short Paper: On the Claims of Weak Block Synchronization in Bitcoin.- India's "Aadhaar" Biometric ID: Structure, Security, and Vulnerabilities.- Short Paper: What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network.- An empirical study of two Bitcoin artifacts through deep learning.

Erscheinungsdatum
Reihe/Serie Lecture Notes in Computer Science
Zusatzinfo XIV, 726 p. 154 illus., 106 illus. in color.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Gewicht 1100 g
Themenwelt Informatik Theorie / Studium Kryptologie
Schlagworte anonymity and untraceability • biometrics • Blockchain • Computer Networks • Computer Security • cryptography • Databases • Data communication systems • Data Security • distributed algorithms • distributed computer systems • Distributed Ledger • Network Protocols • parallel processing systems • privacy-preserving protocols • Query Languages • security protocols • Signal Processing
ISBN-10 3-031-18282-0 / 3031182820
ISBN-13 978-3-031-18282-2 / 9783031182822
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich