Financial Cryptography and Data Security
Springer International Publishing (Verlag)
978-3-031-18282-2 (ISBN)
The 32 full papers and 4 short papers included in this book were carefully reviewed andselected from 159 submissions. They were organized in topical sections as follows: tokenomics; MPC (mostly); privacy; ZKP; old-school consensus; mostly payment networks; incentives; not proof of work; performance; measurements.
Tokenomics.- Maximizing Extractable Value from Automated Market Makers.- Kicking-the-Bucket: Fast Privacy-Preserving Trading Using Buckets.- Speculative Multipliers on DeFi: Quantifying On-Chain Leverage Risks.- MPC (mostly).- Explainable Arguments.- MPCCache: Privacy-Preserving Multi-Party Cooperative Cache Sharing at the Edge.- Multi-party Updatable Delegated Private Set Intersection.- Privacy.- The Effect of False Positives: Why Fuzzy Message Detection Leads to Fuzzy Privacy Guarantees?.- Differential Privacy in Constant Function Market Makers.- Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing.- ZKP.- SnarkPack: Practical SNARK Aggregation.- On Interactive Oracle Proofs for Boolean R1CS Statements.- Zero Knowledge Proofs towards Verifiable Decentralized AI.- Old-School Consensus.- Be Aware of Your Leaders.- Jolteon and Ditto: Network-Adaptive Efficient Consensus with Asynchronous Fallback.- Quick Order Fairness.- Mostly Payment Networks.- Analysis and Probing of Parallel Channels in the Lightning Network.- Hide & Seek: Privacy-Preserving Rebalancing on Payment Channel Networks.- Short Paper: A Centrality Analysis of the Lightning Network.- Resurrecting Address Clustering in Bitcoin.- Incentives.- ABSNFT: Securitization and Repurchase Scheme for Non-Fungible Tokens Based on Game Theoretical Analysis.- Decentralization Conscious Players And System Reliability.- Towards Overcoming the Undercutting Problem.- Arbitrage attack: Miners of the world, unite!.- Suborn Channels: Incentives Against Timelock Bribes.- Sliding Window Challenge Process for Congestion Detection.- Short Paper: On Game-Theoretically-Fair Leader Election.- Not Proof of Work.- The Availability-Accountability Dilemma and its Resolution via Accountability Gadgets.- Three Attacks on Proof-of-Stake Ethereum.- Permissionless Consensus in the Resource Model.- Performance.- Plumo: An Ultralight Blockchain Client.- SoK: Blockchain Light Clients.- Achieving Almost All Blockchain Functionalities with Polylogarithmic Storage.- Measurements.- Short Paper: On the Claims of Weak Block Synchronization in Bitcoin.- India's "Aadhaar" Biometric ID: Structure, Security, and Vulnerabilities.- Short Paper: What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network.- An empirical study of two Bitcoin artifacts through deep learning.
Erscheinungsdatum | 25.10.2022 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | XIV, 726 p. 154 illus., 106 illus. in color. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 1100 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | anonymity and untraceability • biometrics • Blockchain • Computer Networks • Computer Security • cryptography • Databases • Data communication systems • Data Security • distributed algorithms • distributed computer systems • Distributed Ledger • Network Protocols • parallel processing systems • privacy-preserving protocols • Query Languages • security protocols • Signal Processing |
ISBN-10 | 3-031-18282-0 / 3031182820 |
ISBN-13 | 978-3-031-18282-2 / 9783031182822 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich