2020
Papers (355)
# | Title | |
1. | A Survey on Blockchain Interoperability: Past, Present, and Future Trends Belchior, Rafael and Vasconcelos, Andr\'e and Guerreiro, S\'ergio and Correia, Miguel. 2020. | |
2. | BlockSci: Design and applications of a blockchain analysis platform Kalodner, Harry and M\"oser, Malte and Lee, Kevin and Goldfeder, Steven and Plattner, Martin and Chator, Alishah and Narayanan, Arvind. 2020. | |
3. | SoK: Layer-two blockchain protocols Gudgeon, Lewis and Moreno-Sanchez, Pedro and Roos, Stefanie and McCorry, Patrick and Gervais, Arthur. 2020. | |
4. | Scaling blockchains: A comprehensive survey Hafid, Abdelatif and Hafid, Abdelhakim Senhaji and Samih, Mustapha. 2020. | |
5. | Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit Qin, Kaihua and Zhou, Liyi and Livshits, Benjamin and Gervais, Arthur. 2020. | |
6. | Improved Price Oracles: Constant Function Market Makers Angeris, Guillermo and Chitra, Tarun. 2020. | |
7. | Uniswap v2 Core Adams, Hayden and Robinson, Dan. 2020. | |
8. | Solida: A Blockchain Protocol Based on Reconfigurable Byzantine Consensus Abraham, Ittai and Malkhi, Dahlia and Nayak, Kartik and Spiegelman, Alexander. 2020. | |
9. | High-Frequency Trading on Decentralized On-Chain Exchanges Zhou, Liyi and Qin, Kaihua and Torres, Christof Ferreira and Le, Duc V and Gervais, Arthur. 2020. | |
10. | Sync hotstuff: Simple and practical synchronous state machine replication Abraham, Ittai and Malkhi, Dahlia and Nayak, Kartik and Ren, Ling and Yin, Maofan. 2020. | |
11. | Order-Fairness for Byzantine Consensus Mahimna Kelkar and Fan Zhang and Steven Goldfeder and Ari Juels. 2020. | |
12. | The Decentralized Financial Crisis Gudgeon, Lewis and Perez, Daniel and Harz, Dominik and Gervais, Arthur and Livshits, Benjamin. 2020. | |
13. | A Survey of Smart Contract Formal Specification and Verification Tolmach, Palina and Li, Yi and Lin, Shang-Wei and Liu, Yang and Li, Zengxiang. 2020. | |
14. | Credible auctions: A trilemma Akbarpour, Mohammad and Li, Shengwu. 2020. | |
15. | On Subversion-Resistant SNARKs Behzad Abdolmaleki and Helger Lipmaa and Janno Siim and Michał Zając. 2020. | |
16. | eThor: Practical and Provably Sound Static Analysis of Ethereum Smart Contracts Schneidewind, Clara and Grishchenko, Ilya and Scherer, Markus and Maffei, Matteo. 2020. | |
17. | DeFi protocols for loanable funds: Interest rates, liquidity and market efficiency Gudgeon, Lewis and Werner, Sam and Perez, Daniel and Knottenbelt, William J. 2020. | |
18. | Ethainter: A smart contract security analyzer for composite vulnerabilities Brent, Lexi and Grech, Neville and Lagouvardos, Sifis and Scholz, Bernhard and Smaragdakis, Yannis. 2020. | |
19. | A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network Tran, Muoi and Choi, Inho and Moon, Gi Jun and Vu, Anh V and Kang, Min Suk. 2020. | |
20. | Streamlet: Textbook Streamlined Blockchains Benjamin Y Chan and Elaine Shi. 2020. | |
21. | Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits Chenkai Weng and Kang Yang and Jonathan Katz and Xiao Wang. 2020. | |
22. | Mac n Cheese: Zero-Knowledge Proofs for Arithmetic Circuits with Nested Disjunctions Baum, Carsten and Malozemoff, Alex J and Rosen, Marc and Scholl, Peter. 2020. | |
23. | 2-hop blockchain: Combining proof-of-work and proof-of-stake securely Duong, Tuyet and Fan, Lei and Katz, Jonathan and Thai, Phuc and Zhou, Hong-Sheng. 2020. | |
24. | UC Non-Interactive, Proactive, Threshold ECDSA with Identifiable Aborts Canetti, Ran and Gennaro, Rosario and Goldfeder, Steven and Makriyannis, Nikolaos and Peled, Udi. 2020. | |
25. | About Blockchain Interoperability Pascal Lafourcade and Marius Lombard-Platet. 2020. | |
26. | Asynchronous Distributed Key Generation for Computationally-Secure Randomness, Consensus, and Threshold Signatures. Kokoris Kogias, Eleftherios and Malkhi, Dahlia and Spiegelman, Alexander. 2020. | |
27. | Everything is a Race and Nakamoto Always Wins Amir Dembo and Sreeram Kannan and Ertem Nusret Tas and David Tse and Pramod Viswanath and Xuechao Wang and Ofer Zeitouni. 2020. | |
28. | A Comprehensive Survey on Smart Contract Construction and Execution: Paradigms, Tools and Systems Hu, Bin and Zhang, Zongyang and Liu, Jianwei and Liu, Yizhong and Yin, Jiayuan and Lu, Rongxing and Lin, Xiaodong. 2020. | |
29. | uPort open-source identity management system: An assessment of self-sovereign identity and user-centric data platform built on blockchain Naik, Nitin and Jenkins, Paul. 2020. | |
30. | SoK: A classification framework for stablecoin designs Moin, Amani and Sekniqi, Kevin and Sirer, Emin Gun. 2020. | |
31. | Can a Blockchain Keep a Secret? Benhamouda, Fabrice and Gentry, Craig and Gorbunov, Sergey and Halevi, Shai and Krawczyk, Hugo and Lin, Chengyu and Rabin, Tal and Reyzin, Leonid. 2020. | |
32. | MuSig2: Simple Two-Round Schnorr Multi-Signatures Jonas Nick and Tim Ruffing and Yannick Seurin. 2020. | |
33. | Zendoo: a zk-SNARK Verifiable Cross-Chain Transfer Protocol Enabling Decoupled and Decentralized Sidechains Alberto Garoffolo and Dmytro Kaidalov and Roman Oliynykov. 2020. | |
34. | Aggregatable Subvector Commitments for Stateless Cryptocurrencies Alin Tomescu and Ittai Abraham and Vitalik Buterin and Justin Drake and Dankrad Feist and Dmitry Khovratovich. 2020. | |
35. | LadderLeak: Breaking ECDSA With Less Than One Bit Of Nonce Leakage Diego F. Aranha and Felipe Rodrigues Novaes and Akira Takahashi and Mehdi Tibouchi and Yuval Yarom. 2020. | |
36. | CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability Deepak Maram and Harjasleen Malvai and Fan Zhang and Nerla Jean-Louis and Alexander Frolov and Tyler Kell and Tyrone Lobban and Christine Moy and Ari Juels and Andrew Miller. 2020. | |
37. | Pointproofs: Aggregating Proofs for Multiple Vector Commitments Sergey Gorbunov and Leonid Reyzin and Hoeteck Wee and Zhenfei Zhang. 2020. | |
38. | SmartBugs: A Framework to Analyze Solidity Smart Contracts Ferreira, Jo\~ao F and Cruz, Pedro and Durieux, Thomas and Abreu, Rui. 2020. | |
39. | EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts Rodler, Michael and Li, Wenting and Karame, Ghassan O and Davi, Lucas. 2020. | |
40. | Coda: Decentralized Cryptocurrency at Scale Joseph Bonneau and Izaak Meckler and Vanishree Rao and Evan Shapiro. 2020. | |
41. | Bandwidth-efficient threshold EC-DSA Guilhem Castagnos and Dario Catalano and Fabien Laguillaumie and Federico Savasta and Ida Tucker. 2020. | |
42. | One Round Threshold ECDSA with Identifiable Abort Rosario Gennaro and Steven Goldfeder. 2020. | |
43. | Blockchain is Watching You: Profiling and Deanonymizing Ethereum Users B\'eres, Ferenc and Seres, Istv\'an Andr\'as and Bencz\'ur, Andr\'as A and Quintyne-Collins, Mikerah. 2020. | |
44. | Coded merkle tree: Solving data availability attacks in blockchains Yu, Mingchao and Sahraei, Saeid and Li, Songze and Avestimehr, Salman and Kannan, Sreeram and Viswanath, Pramod. 2020. | |
45. | Dory: Efficient, Transparent arguments for Generalised Inner Products and Polynomial Commitments Jonathan Lee. 2020. | |
46. | Transaction Fee Mechanism Design for the Ethereum Blockchain: An Economic Analysis of EIP-1559 Roughgarden, Tim. 2020. | |
47. | Overview of Polkadot and its Design Considerations Jeff Burdges and Alfonso Cevallos and Peter Czaban and Rob Habermeier and Syed Hosseini and Fabio Lama and Handan Kilinc Alper and Ximin Luo and Fatemeh Shirazi and Alistair Stewart and Gavin Wood. 2020. | |
48. | Stablecoins 2.0: Economic Foundations and Risk-based Models Ariah Klages-Mundt and Dominik Harz and Lewis Gudgeon and Jun-You Liu and Andreea Minca. 2020. | |
49. | Tight Consistency Bounds for Bitcoin Peter Gaži and Aggelos Kiayias and Alexander Russell. 2020. | |
50. | Ligero++: A New Optimized Sublinear IOP Bhadauria, Rishabh and Fang, Zhiyong and Hazay, Carmit and Venkitasubramaniam, Muthuramakrishnan and Xie, Tiancheng and Zhang, Yupeng. 2020. | |
51. | Out of Oddity -- New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems Tim Beyne and Anne Canteaut and Itai Dinur and Maria Eichlseder and Gregor Leander and Gaëtan Leurent and María Naya-Plasencia and Léo Perrin and Yu Sasaki and Yosuke Todo and Friedrich Wiemer. 2020. | |
52. | An Empirical Analysis of Privacy in the Lightning Network Kappos, George and Yousaf, Haaroon and Piotrowska, Ania and Kanjalkar, Sanket and Delgado-Segura, Sergi and Miller, Andrew and Meiklejohn, Sarah. 2020. | |
53. | SoK: Lending Pools in Decentralized Finance Bartoletti, Massimo and Chiang, James Hsin-yu and Lluch-Lafuente, Alberto. 2020. | |
54. | Combining GHOST and Casper Buterin, Vitalik and Hernandez, Diego and Kamphefner, Thor and Pham, Khiem and Qiao, Zhi and Ryan, Danny and Sin, Juhyeok and Wang, Ying and Zhang, Yan X. 2020. | |
55. | plookup: A simplified polynomial protocol for lookup tables Ariel Gabizon and Zachary J. Williamson. 2020. | |
56. | Towards scalable threshold cryptosystems Tomescu, Alin and Chen, Robert and Zheng, Yiming and Abraham, Ittai and Pinkas, Benny and Gueta, Guy Golan and Devadas, Srinivas. 2020. | |
57. | One-shot Signatures and Applications to Hybrid Quantum/Classical Authentication Amos, Ryan and Georgiou, Marios and Kiayias, Aggelos and Zhandry, Mark. 2020. | |
58. | MAD-HTLC: Because HTLC is Crazy-Cheap to Attack Itay Tsabary and Matan Yechieli and Ittay Eyal. 2020. | |
59. | Non-Interactive Zero-Knowledge for Blockchain: A Survey Partala, Juha and Nguyen, Tri Hong and Pirttikangas, Susanna. 2020. | |
60. | On the Security of Time-Locked Puzzles and Timed Commitments Jonathan Katz and Julian Loss and Jiayu Xu. 2020. | |
61. | MuSig-DN: Schnorr Multi-Signatures with Verifiably Deterministic Nonces Jonas Nick and Tim Ruffing and Yannick Seurin and Pieter Wuille. 2020. | |
62. | Privacy-preserving auditable token payments in a permissioned blockchain system Androulaki, Elli and Camenisch, Jan and Caro, Angelo De and Dubovitskaya, Maria and Elkhiyaoui, Kaoutar and Tackmann, Bj\"orn. 2020. | |
63. | Albatross: publicly attestable batched randomness based on secret sharing Cascudo, Ignacio and David, Bernardo. 2020. | |
64. | Remote Side-Channel Attacks on Anonymous Transactions Florian Tramèr and Dan Boneh and Kenneth G. Paterson. 2020. | |
65. | A non-PCP Approach to Succinct Quantum-Safe Zero-Knowledge Jonathan Bootle and Vadim Lyubashevsky and Ngoc Khanh Nguyen and Gregor Seiler. 2020. | |
66. | A Quantitative Analysis of Security, Anonymity and Scalability for the Lightning Network Sergei Tikhomirov and Pedro Moreno-Sanchez and Matteo Maffei. 2020. | |
67. | Bitcoin-Compatible Virtual Channels Lukas Aumayr and Oguzhan Ersoy and Andreas Erwig and Sebastian Faust and Kristina Hostáková and Matteo Maffei and Pedro Moreno-Sanchez and Siavash Riahi. 2020. | |
68. | Lunar: a Toolbox for More Efficient Universal and Updatable zkSNARKs and Commit-and-Prove Extensions Matteo Campanelli and Antonio Faonio and Dario Fiore and Anaïs Querol and Hadrián Rodríguez. 2020. | |
69. | Delay Encryption Jeffrey Burdges and Luca De Feo. 2020. | |
70. | Flood \& Loot: A Systemic Attack On The Lightning Network Harris, Jona and Zohar, Aviv. 2020. | |
71. | Fast Threshold ECDSA with Honest Majority Ivan Damgård and Thomas Pelle Jakobsen and Jesper Buus Nielsen and Jakob Illeborg Pagter and Michael Bæksvang Østergård. 2020. | |
72. | The Provable Security of Ed25519: Theory and Practice Brendel, Jacqueline and Cremers, Cas and Jackson, Dennis and Zhao, Mang. 2020. | |
73. | An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC Maria Eichlseder and Lorenzo Grassi and Reinhard Lüftenegger and Morten Øygarden and Christian Rechberger and Markus Schofnegger and Qingju Wang. 2020. | |
74. | Efficient polynomial commitment schemes for multiple points and polynomials Dan Boneh and Justin Drake and Ben Fisch and Ariel Gabizon. 2020. | |
75. | Zero-Knowledge Proofs for Set Membership: Efficient, Succinct, Modular Benarroch, Daniel and Campanelli, Matteo and Fiore, Dario and Gurkan, Kobi and Kolonelos, Dimitris. 2020. | |
76. | Minerva: The curse of ECDSA nonces Jan Jancar and Vladimir Sedlacek and Petr Svenda and Marek Sys. 2020. | |
77. | RandPiper--Reconfiguration-Friendly Random Beacons with Quadratic Communication Bhat, Adithya and Shrestha, Nibesh and Kate, Aniket and Nayak, Kartik. 2020. | |
78. | Single secret leader election Boneh, Dan and Eskandarian, Saba and Hanzlik, Lucjan and Greco, Nicola. 2020. | |
79. | Storing and Retrieving Secrets on a Blockchain Vipul Goyal and Abhiram Kothapalli and Elisaweta Masserova and Bryan Parno and Yifan Song. 2020. | |
80. | Domain Specific Language for Smart Contract Development W\"ohrer, Maximilian and Zdun, Uwe. 2020. | |
81. | Liquidity Provider Returns in Geometric Mean Markets Evans, Alex. 2020. | |
82. | Incrementally Aggregatable Vector Commitments and Applications to Verifiable Decentralized Storage Campanelli, Matteo and Fiore, Dario and Greco, Nicola and Kolonelos, Dimitris and Nizzardo, Luca. 2020. | |
83. | Expected Linear Round Synchronization: The Missing Link for Linear Byzantine SMR Naor, Oded and Keidar, Idit. 2020. | |
84. | Fluid MPC: Secure Multiparty Computation with Dynamic Participants Arka Rai Choudhuri and Aarushi Goel and Matthew Green and Abhishek Jain and Gabriel Kaptchuk. 2020. | |
85. | Liquidity Provision by Automated Market Makers Jun Aoyagi. 2020. | |
86. | GRANDPA: a Byzantine finality gadget Stewart, Alistair and Kokoris-Kogia, Eleftherios. 2020. | |
87. | Economic implications of scaling blockchains: Why the consensus protocol matters John, Kose and Rivera, Thomas J and Saleh, Fahad. 2020. | |
88. | Proof-Carrying Data from Accumulation Schemes Benedikt Bünz and Alessandro Chiesa and Pratyush Mishra and Nicholas Spooner. 2020. | |
89. | Linear-Time Arguments with Sublinear Verification from Tensor Codes Bootle, Jonathan and Chiesa, Alessandro and Groth, Jens. 2020. | |
90. | Kachina--Foundations of Private Smart Contracts Kerber, Thomas and Kiayias, Aggelos and Kohlweiss, Markulf. 2020. | |
91. | Two-round trip Schnorr multi-signatures via delinearized witnesses Handan Kilinc Alper and Jeffrey Burdges. 2020. | |
92. | Another look at extraction and randomization of Groth’s zk-SNARK Baghery, Karim and Kohlweiss, Markulf and Siim, Janno and Volkhov, Mikhail. 2020. | |
93. | Fully Distributed Verifiable Random Functions and their Application to Decentralised Random Beacons David Galindo and Jia Liu and Mihai Ordean and Jin-Mann Wong. 2020. | |
94. | Hydra: Fast Isomorphic State Channels Chakravarty, Manuel MT and Coretti, Sandro and Fitzi, Matthias and Gazi, Peter and Kant, Philipp and Kiayias, Aggelos and Russell, Alexander. 2020. | |
95. | Quarks: Quadruple-efficient transparent zkSNARKs Srinath Setty and Jonathan Lee. 2020. | |
96. | On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential Work Kai-Min Chung and Serge Fehr and Yu-Hsuan Huang and Tai-Ning Liao. 2020. | |
97. | Halo Infinite: Recursive zk-SNARKs from any Additive Polynomial Commitment Scheme Dan Boneh and Justin Drake and Ben Fisch and Ariel Gabizon. 2020. | |
98. | GossipSub: Attack-Resilient Message Propagation in the Filecoin and ETH2.0 Networks Dimitris Vyzovitis and Yusef Napora and Dirk McCormick and David Dias and Yiannis Psaras. 2020. | |
99. | Scalable Open-Vote Network on Ethereum Mohamed Seifelnasr and Hisham S. Galal and Amr M. Youssef. 2020. | |
100. | Doubly Efficient Interactive Proofs for General Arithmetic Circuits with Linear Prover Time Jiaheng Zhang and Weijie Wang and Yinuo Zhang and Yupeng Zhang. 2020. | |
101. | Verifiable Timed Signatures Made Practical Thyagarajan, Sri Aravinda Krishnan and Bhat, Adithya and Malavolta, Giulio and D\"ottling, Nico and Kate, Aniket and Schr\"oder, Dominique. 2020. | |
102. | TARDIS: A Foundation of Time-Lock Puzzles in UC Baum, Carsten and David, Bernardo and Dowsley, Rafael and Nielsen12, Jesper Buus and Oechsner, Sabine. 2020. | |
103. | Reparo: Publicly Verifiable Layer to Repair Blockchains Thyagarajan, Sri Aravinda Krishnan and Bhat, Adithya and Magri, Bernardo and Tschudi, Daniel and Kate, Aniket. 2020. | |
104. | ConCert: A Smart Contract Certification Framework in Coq Annenkov, Danil and Nielsen, Jakob Botsch and Spitters, Bas. 2020. | |
105. | Vyper: A Security Comparison with Solidity Based on Common Vulnerabilities Kaleem, Mudabbir and Laszka, Aron. 2020. | |
106. | ConCert: a smart contract certification framework in Coq Annenkov, Danil and Nielsen, Jakob Botsch and Spitters, Bas. 2020. | |
107. | Lift-and-Shift: Obtaining Simulation Extractable Subversion and Updatable SNARKs Generically Bezhad Abdolmaleki and Sebastian Ramacher and Daniel Slamanig. 2020. | |
108. | zkRelay: Facilitating Sidechains using zkSNARK-based Chain-Relays Martin Westerkamp and Jacob Eberhardt. 2020. | |
109. | Bitcoin Transaction Networks: an overview of recent results Vallarano, Nicol\`o and Tessone, Claudio and Squartini, Tiziano. 2020. | |
110. | Full Analysis of Nakamoto Consensus in Bounded-Delay Networks Juan Garay and Aggelos Kiayias and Nikos Leonardos. 2020. | |
111. | FastPay: High-Performance Byzantine Fault Tolerant Settlement Baudet, Mathieu and Danezis, George and Sonnino, Alberto. 2020. | |
112. | UC Non-Interactive, Proactive, Threshold ECDSA Ran Canetti and Nikolaos Makriyannis and Udi Peled. 2020. | |
113. | Expected Constant Round Byzantine Broadcast under Dishonest Majority Jun Wan and Hanshen Xiao and Elaine Shi and Srinivas Devadas. 2020. | |
114. | Toward Active and Passive Confidentiality Attacks On Cryptocurrency Off-Chain Networks Nisslmueller, Utz and Foerster, Klaus-Tycho and Schmid, Stefan and Decker, Christian. 2020. | |
115. | Diogenes: Lightweight Scalable RSA Modulus Generation with a Dishonest Majority Megan Chen and Carmit Hazay and Yuval Ishai and Yuriy Kashnikov and Daniele Micciancio and Tarik Riviere and abhi shelat and Muthu Venkitasubramaniam and Ruihan Wang. 2020. | |
116. | Ride the lightning: The game theory of payment channels Avarikioti, Zeta and Heimbach, Lioba and Wang, Yuyi and Wattenhofer, Roger. 2020. | |
117. | Replicated state machines without replicated execution Lee, Jonathan and Nikitin, Kirill and Setty, Srinath. 2020. | |
118. | MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs Ahmed Kosba and Dimitrios Papadopoulos and Charalampos Papamanthou and Dawn Song. 2020. | |
119. | On the Profitability of Selfish Mining Against Multiple Difficulty Adjustment Algorithms Michael Davidson and Tyler Diamond. 2020. | |
120. | UTxO-vs account-based smart contract blockchain programming paradigms Brunjes, Lars and Gabbay, Murdoch J. 2020. | |
121. | Optimized and secure pairing-friendly elliptic curves suitable for one layer proof composition Youssef El Housni and Aurore Guillevic. 2020. | |
122. | KVaC: Key-Value Commitments for Blockchains and Beyond Shashank Agrawal and Srinivasan Raghuraman. 2020. | |
123. | Securing Proof-of-Work Ledgers via Checkpointing Dimitris Karakostas and Aggelos Kiayias. 2020. | |
124. | Compressing Proofs of $k$-Out-Of-$n$ Partial Knowledge Thomas Attema and Ronald Cramer and Serge Fehr. 2020. | |
125. | Privacy and cryptocurrencies—A systematic literature review Herskind, Lasse and Katsikouli, Panagiota and Dragoni, Nicola. 2020. | |
126. | From Tether to Libra: Stablecoins, Digital Currency and the Future of Money Lipton, Alexander and Sardon, Aetienne and Sch\"ar, Fabian and Sch\"upbach, Christian. 2020. | |
127. | On QA-NIZK in the BPK model Abdolmaleki, Behzad and Lipmaa, Helger and Siim, Janno and Zaj\kac, Micha\l. 2020. | |
128. | Anonymous Tokens with Private Metadata Bit Ben Kreuter and Tancrede Lepoint and Michele Orru and Mariana Raykova. 2020. | |
129. | Proof of Necessary Work: Succinct State Verification with Fairness Guarantees Assimakis Kattis and Joseph Bonneau. 2020. | |
130. | Trustless Groups of Unknown Order with Hyperelliptic Curves Samuel Dobson and Steven D. Galbraith. 2020. | |
131. | Empirical Measurements on Pricing Oracles and Decentralized Governance for Stablecoins Gu, Wanyun and Raghuvanshi, Anika and Boneh, Dan. 2020. | |
132. | An Analysis of the Market Risk to Participants in the Compound Protocol Kao, Hsien-Tang and Chitra, Tarun and Chiang, Rei and Morrow, John. 2020. | |
133. | Efficient Post-quantum SNARKs for RSIS and RLWE and Their Applications to Privacy Boschini, Cecilia and Camenisch, Jan and Ovsiankin, Max and Spooner, Nicholas. 2020. | |
134. | Why Do Smart Contracts Self-Destruct? Investigating the Selfdestruct Function on Ethereum Chen, Jiachi and Xia, Xin and Lo, David and Grundy, John. 2020. | |
135. | Reducing Participation Costs via Incremental Verification for Ledger Systems Weikeng Chen and Alessandro Chiesa and Emma Dauterman and Nicholas P. Ward. 2020. | |
136. | Threshold ECDSA for Decentralized Asset Custody Adam Gągol and Damian Straszak. 2020. | |
137. | Resource-Restricted Cryptography: Revisiting MPC Bounds in the Proof-of-Work Era Garay, Juan and Kiayias, Aggelos and Ostrovsky, Rafail M and Panagiotakos, Giorgos and Zikas, Vassilis. 2020. | |
138. | Bitcoin-Monero Cross-chain Atomic Swap Joël Gugger. 2020. | |
139. | Credible, Truthful, and Two-Round (Optimal) Auctions via Cryptographic Commitments Matheus V. X. Ferreira and S. Matthew Weinberg. 2020. | |
140. | Bulletproofs+: Shorter Proofs for Privacy-Enhanced Distributed Ledger Heewon Chung and Kyoohyung Han and Chanyang Ju and Myungsun Kim and Jae Hong Seo. 2020. | |
141. | Proof of Storage-Time: Efficiently Checking Continuous Data Availability Ateniese, Giuseppe and Chen, Long and Etemad, Mohammad and Tang, Qiang. 2020. | |
142. | Liquid: A Bitcoin Sidechain Nick, Jonas and Poelstra, Andrew and Sanders, Gregory. 2020. | |
143. | A Survey of ECDSA Threshold Signing Jean-Philippe Aumasson and Adrian Hamelink and Omer Shlomovits. 2020. | |
144. | Splitting Payments Locally While Routing Interdimensionally Lisa Eckey and Sebastian Faust and Kristina Hostáková and Stefanie Roos. 2020. | |
145. | Decentralized Cross-Blockchain Asset Transfers Sigwart, Marten and Frauenthaler, Philipp and Spanring, Christof and Schulte, Stefan. 2020. | |
146. | While stability lasts: A stochastic model of stablecoins Klages-Mundt, Ariah and Minca, Andreea. 2020. | |
147. | Mind the Middle Layer: The HADES Design Strategy Revisited Nathan Keller and Asaf Rosemarin. 2020. | |
148. | Updateable Inner Product Argument with Logarithmic Verifier and Applications Daza, Vanesa and R\`afols, Carla and Zacharakis, Alexandros. 2020. | |
149. | SPARKs: Succinct Parallelizable Arguments of Knowledge Naomi Ephraim and Cody Freitag and Ilan Komargodski and Rafael Pass. 2020. | |
150. | Cross-Layer Deanonymization Methods in the Lightning Protocol Romiti, Matteo and Victor, Friedhelm and Moreno-Sanchez, Pedro and Haslhofer, Bernhard and Maffei, Matteo. 2020. | |
151. | Anonymous Lottery in the Proof-of-Stake Setting Foteini Baldimtsi and Varun Madathil and Alessandra Scafuro and Linfeng Zhou. 2020. | |
152. | STARK Friendly Hash -- Survey and Recommendation Eli Ben-Sasson and Lior Goldberg and David Levit. 2020. | |
153. | Authenticated Dictionaries with Cross-Incremental Proof (Dis)aggregation Alin Tomescu and Yu Xia and Zachary Newman. 2020. | |
154. | Taming the many EdDSAs Konstantinos Chalkias and François Garillot and Valeria Nikolaenko. 2020. | |
155. | Practical Post-Quantum Few-Time Verifiable Random Function with Applications to Algorand Esgin, Muhammed F and Kuchta, Veronika and Sakzad, Amin and Steinfeld, Ron and Zhang, Zhenfei and Sun, Shifeng and Chu, Shumo. 2020. | |
156. | Lower Bounds for Off-Chain Protocols: Exploring the Limits of Plasma Stefan Dziembowski and Grzegorz Fabiański and Sebastian Faust and Siavash Riahi. 2020. | |
157. | Generic-Group Delay Functions Require Hidden-Order Groups Lior Rotem and Gil Segev and Ido Shahaf. 2020. | |
158. | Lightweight Virtual Payment Channels Maxim Jourenko and Mario Larangeira and Keisuke Tanaka. 2020. | |
159. | Simulation Extractable Versions of Groth’s zk-SNARK Revisited Karim Baghery and Zaira Pindado and Carla Ràfols. 2020. | |
160. | Round-Efficient Byzantine Broadcast under Strongly Adaptive and Majority Corruptions Wan, Jun and Xiao, Hanshen and Devadas, Srinivas and Shi, Elaine. 2020. | |
161. | AMR: Autonomous Coin Mixer with Privacy Preserving Reward Distribution Le, Duc V and Gervais, Arthur. 2020. | |
162. | SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies Aljosha Judmayer and Nicholas Stifter and Alexei Zamyatin and Itay Tsabary and Ittay Eyal and Peter Gaži and Sarah Meiklejohn and Edgar Weippl. 2020. | |
163. | Generically Speeding-Up Repeated Squaring is Equivalent to Factoring: Sharp Thresholds for All Generic-Ring Delay Functions Lior Rotem and Gil Segev. 2020. | |
164. | Triptych: logarithmic-sized linkable ring signatures with applications Sarang Noether and Brandon Goodell. 2020. | |
165. | The mathematics of Bitcoin Grunspan, Cyril and P\'erez-Marco, Ricardo. 2020. | |
166. | Plumo: Towards Scalable Interoperable Blockchains Using Ultra Light Validation Systems Gabizon, Ariel and Gurkan, Kobi and Jovanovic, Philipp and Konstantopoulos, Georgios and Oines, Asa and Olszewski, Marek and Straka, Michael and Tromer, Eran. 2020. | |
167. | Prism Removes Consensus Bottleneck for Smart Contracts Wang, Gerui and Wang, Shuo and Bagaria, Vivek and Tse, David and Viswanath, Pramod. 2020. | |
168. | Smart Contract modeling and verification techniques: A survey Imeri, Adnan and Agoulmine, Nazim and Khadraoui, Djamel. 2020. | |
169. | Short Selling Attack: A Self-Destructive But Profitable 51% Attack On PoS Blockchains Suhyeon Lee and Seungjoo Kim. 2020. | |
170. | Formalising and verifying smart contracts with Solidifier: a bounded model checker for Solidity Antonino, Pedro and Roscoe, AW. 2020. | |
171. | TxChain: Efficient Cryptocurrency Light Clients via Contingent Transaction Aggregation Alexei Zamyatin and Zeta Avarikioti and Daniel Perez and William J. Knottenbelt. 2020. | |
172. | Formal Specification and Model Checking of the Tendermint Blockchain Synchronization Protocol (Short Paper) Braithwaite, Sean and Buchman, Ethan and Konnov, Igor and Milosevic, Zarko and Stoilkovska, Ilina and Widder, Josef and Zamfir, Anca. 2020. | |
173. | Rescue-Prime: a Standard Specification (SoK) Alan Szepieniec and Tomer Ashur and Siemen Dhooghe. 2020. | |
174. | Proof-of-Stake Blockchain Protocols with Near-Optimal Throughput Matthias Fitzi and Peter Gaži and Aggelos Kiayias and Alexander Russell. 2020. | |
175. | Albert, an intermediate smart-contract language for the Tezos blockchain Bernardo, Bruno and Cauderlier, Rapha\"el and Pesin, Basile and Tesson, Julien. 2020. | |
176. | Streamlined Blockchains: A Simple and Elegant Approach (A Tutorial and Survey) Elaine Shi. 2020. | |
177. | An airdrop that preserves recipient privacy⋆ Wahby, Riad S and Boneh, Dan and Jeffrey, Christopher and Poon, Joseph. 2020. | |
178. | EthScope: A Transaction-centric Security Analytics Framework to Detect Malicious Smart Contracts on Ethereum Wu, Lei and Wu, Siwei and Zhou, Yajin and Li, Runhuai and Wang, Zhi and Luo, Xiapu and Wang, Cong and Ren, Kui. 2020. | |
179. | PayMo: Payment Channels For Monero Sri Aravinda Krishnan Thyagarajan and Giulio Malavolta and Fritz Schmidt and Dominique Schröder. 2020. | |
180. | What is an EUTxO blockchain? Gabbay, Murdoch J. 2020. | |
181. | Multi-Party Timed Commitments Yael Doweck and Ittay Eyal. 2020. | |
182. | Updatable Blockchains⋆ Ciampi, Michele and Karayannidis, Nikos and Kiayias, Aggelos and Zindros, Dionysis. 2020. | |
183. | Native Custom Tokens in the Extended UTXO Model Chakravarty, Manuel MT and Chapman, James and MacKenzie, Kenneth and Melkonian, Orestis and M\"uller, Jann and Jones, Michael Peyton and Vinogradova, Polina and Wadler, Philip. 2020. | |
184. | Consensus Redux: Distributed Ledgers in the Face of Adversarial Supremacy Badertscher, Christian and Gazi, Peter and Kiayias, Aggelos and Russell, Alexander and Zikas, Vassilis. 2020. | |
185. | Cerberus: Minimalistic multi-shard byzantine-resilient transaction processing Hellings, Jelle and Hughes, Daniel P and Primero, Joshua and Sadoghi, Mohammad. 2020. | |
186. | Distributed Auditing Proofs of Liabilities Konstantinos Chalkias and Kevin Lewi and Payman Mohassel and Valeria Nikolaenko. 2020. | |
187. | Game theoretical framework for analyzing Blockchains Robustness Paolo Zappalà and Marianna Belotti and Maria Potop-Butucaru and Stefano Secci. 2020. | |
188. | Ledger Combiners for Fast Settlement Matthias Fitzi and Peter Gazi and Aggelos Kiayias and Alexander Russell. 2020. | |
189. | A note on the low order assumption in class group of an imaginary quadratic number fields Karim Belabas and Thorsten Kleinjung and Antonio Sanso and Benjamin Wesolowski. 2020. | |
190. | Consistency in Proof-of-Stake Blockchains with Concurrent Honest Slot Leaders Aggelos Kiayias and Saad Quader and Alexander Russell. 2020. | |
191. | Network-Agnostic State Machine Replication Blum, Erica and Katz, Jonathan and Loss, Julian. 2020. | |
192. | Dynamic Universal Accumulator with Batch Update over Bilinear Groups Giuseppe Vitto and Alex Biryukov. 2020. | |
193. | A Gas-Efficient Superlight Bitcoin Client in Solidity Stelios Daveas and Kostis Karantias and Aggelos Kiayias and Dionysis Zindros. 2020. | |
194. | Formalizing Nakamoto-Style Proof of Stake Søren Eller Thomsen and Bas Spitters. 2020. | |
195. | A Direct Construction for Asymptotically Optimal zkSNARKs Abhiram Kothapalli and Elisaweta Masserova and Bryan Parno. 2020. | |
196. | SodsMPC: FSM based Anonymous and Private Quantum-safe Smart Contracts Shlomi Dolev and Ziyu Wang. 2020. | |
197. | PERIMETER: A network-layer attack on the anonymity of cryptocurrencies Maire, Maria Apostolaki Cedric and Vanbever, Laurent. 2020. | |
198. | SodsMPC: FSM based Anonymous and Private Quantum-safe Smart Contracts Shlomi Dolev and Ziyu Wang. 2020. | |
199. | Vector Commitment Techniques and Applications to Verifiable Decentralized Storage Matteo Campanelli and Dario Fiore and Nicola Greco and Dimitris Kolonelos and Luca Nizzardo. 2020. | |
200. | Blockchain with Varying Number of Players T-H. Hubert Chan and Naomi Ephraim and Antonio Marcedone and Andrew Morgan and Rafael Pass and Elaine Shi. 2020. | |
201. | Threshold ECDSA with an Offline Recovery Party Battagliola, Michele and Longo, Riccardo and Meneghetti, Alessio and Sala, Massimiliano. 2020. | |
202. | FileBounty: Fair Data Exchange Janin, Simon and Qin, Kaihua and Mamageishvili, Akaki and Gervais, Arthur. 2020. | |
203. | Extracting Smart Contracts Tested and Verified in Coq Annenkov, Danil and Milo, Mikkel and Nielsen, Jakob Botsch and Spitters, Bas. 2020. | |
204. | The Good, The Bad and The Ugly: Pitfalls and Best Practices in Automated Sound Static Analysis of Ethereum Smart Contracts Schneidewind, Clara and Scherer, Markus and Maffei, Matteo. 2020. | |
205. | CRAFT: Composable Randomness Beacons and Output-Independent Abort MPC From Time-Lock Puzzles Carsten Baum and Bernardo David and Rafael Dowsley and Jesper Buus Nielsen and Sabine Oechsner. 2020. | |
206. | Mining for Privacy: How to Bootstrap a Snarky Blockchain Thomas Kerber and Aggelos Kiayias and Markulf Kohlweiss. 2020. | |
207. | Analyzing Smart Contracts: From EVM to a sound Control-Flow Graph Albert, Elvira and Correas, Jes\'us and Gordillo, Pablo and Rom\'an-D\'\iez, Guillermo and Rubio, Albert. 2020. | |
208. | Account Management in Proof of Stake Ledgers Dimitris Karakostas and Aggelos Kiayias and Mario Larangeira. 2020. | |
209. | An empirical study of availability and reliability properties of the Bitcoin Lightning Network Waugh, Finnegan and Holz, Ralph. 2020. | |
210. | Design choices for Central Bank Digital Currency Allen, Sarah and Capkun, Srdjan and Eyal, Ittay and Fanti, Giulia and Ford, Bryan and Grimmelmann, James and Juels, Ari and Kostiainen, Kari and Meiklejohn, Sarah and Miller, Andrew and others. 2020. | |
211. | PoSAT: Proof-of-Work Availability andUnpredictability, without the Work Deb, Soubhik and Kannan, Sreeram and Tse, David. 2020. | |
212. | Payment Trees: Low Collateral Payments for Payment Channel Networks Maxim Jourenko and Mario Larangeira and Keisuke Tanaka. 2020. | |
213. | Succinct functional commitment for a large class of arithmetic circuits Lipmaa, Helger and Pavlyk, Kateryna. 2020. | |
214. | Smart Contract Derivatives Kostis Karantias and Aggelos Kiayias and Dionysis Zindros. 2020. | |
215. | Tiramisu: Black-Box Simulation Extractable NIZKs in the Updatable CRS Model Karim Baghery and Mahdi Sedaghat. 2020. | |
216. | MoneyMorph: Censorship Resistant Rendezvous using Permissionless Cryptocurrencies Minaei, Mohsen and Moreno-Sanchez, Pedro and Kate, Aniket. 2020. | |
217. | Tezla, an Intermediate Representation for Static Analysis of Michelson Smart Contracts Santos Reis, Jo\~ao and Crocker, Paul and Melo de Sousa, Sim\~ao. 2020. | |
218. | Rational Behavior in Committee-Based Blockchains Yackolley Amoussou-Guenou and Bruno Biais and Maria Potop-Butucaru and Sara Tucci-Piergiovanni. 2020. | |
219. | Dynamic proofs of retrievability with low server storage Anthoine, Gaspard and Dumas, Jean-Guillaume and Hanling, Michael and de Jonghe, M\'elanie and Maignan, Aude and Pernet, Cl\'ement and Roche, Daniel S. 2020. | |
220. | Time-release Cryptography from Minimal Circuit Assumptions Samuel Jaques and Hart Montgomery and Arnab Roy. 2020. | |
221. | Aardvark: A Concurrent Authenticated Dictionary with Short Proofs Derek Leung and Yossi Gilad and Sergey Gorbunov and Leonid Reyzin and Nickolai Zeldovich. 2020. | |
222. | The Velvet Path to Superlight Blockchain Clients Kiayias, Aggelos and Polydouri, Andrianna and Zindros, Dionysis. 2020. | |
223. | Why Stake When You Can Borrow? Chitra, Tarun and Evans, Alex. 2020. | |
224. | Lattice-Based Proof-of-Work for Post-Quantum Blockchains Rouzbeh Behnia and Eamonn W. Postlethwaite and Muslum Ozgur Ozmen and Attila Altay Yavuz. 2020. | |
225. | Why Stake When You Can Borrow? Tarun Chitra and Alex Evans. 2020. | |
226. | WIP: Finding Bugs Automatically in Smart Contracts with Parameterized Invariants Bernardi, Thomas and Dor, Nurit and Fedotov, Anastasia and Grossman, Shelly and Immerman, Neil and Jackson, Daniel and Nutz, Alex and Oppenheim, Lior and Pistiner, Or and Rinetzky, Noam and others. 2020. | |
227. | The security of Groups of Unknown Order based on Jacobians of Hyperelliptic Curves Jonathan Lee. 2020. | |
228. | Resources: A Safe Language Abstraction for Money Blackshear, Sam and Dill, David L and Qadeer, Shaz and Barrett, Clark W and Mitchell, John C and Padon, Oded and Zohar, Yoni. 2020. | |
229. | Performance Overhead of Atomic Crosschain Transactions Robinson, Peter. 2020. | |
230. | Bitcoin covenants unchained Bartoletti, Massimo and Lande, Stefano and Zunino, Roberto. 2020. | |
231. | Bitcoin Crypto–Bounties for Quantum Capable Adversaries Dragos Ioan Ilie and Kostis Karantias and William J. Knottenbelt. 2020. | |
232. | Attacking Threshold Wallets Jean-Philippe Aumasson and Omer Shlomovits. 2020. | |
233. | Polynomial IOPs for Linear Algebra Relations Alan Szepieniec. 2020. | |
234. | Tracking Mixed Bitcoins Tironsakkul, Tin and Maarek, Manuel and Eross, Andrea and Just, Mike. 2020. | |
235. | Information Theoretic HotStuff Abraham, Ittai and Stern, Gilad. 2020. | |
236. | A formal model of Algorand smart contracts Bartoletti, Massimo and Bracciali, Andrea and Lepore, Cristian and Scalas, Alceste and Zunino, Roberto. 2020. | |
237. | WI is Almost Enough: Contingent Payment All Over Again Nguyen, Ky and Ambrona, Miguel and Abe, Masayuki. 2020. | |
238. | Lower bounds for the depth of modular squaring Benjamin Wesolowski and Ryan Williams. 2020. | |
239. | CommiTEE: An Efficient and Secure Commit-Chain Protocol using TEEs Andreas Erwig and Sebastian Faust and Siavash Riahi and Tobias Stöckert. 2020. | |
240. | NC-Max: Breaking the Security-Performance Tradeoff in Nakamoto Consensus Ren Zhang and Dingwei Zhang and Quake Wang and Shichen Wu and Jan Xie and Bart Preneel. 2020. | |
241. | The Arwen Trading Protocols (Full Version) Ethan Heilman and Sebastien Lipmann and Sharon Goldberg. 2020. | |
242. | Bypassing Non-Outsourceable Proof-of-Work Schemes Using Collateralized Smart Contracts Alexander Chepurnoy and Amitabh Saxena. 2020. | |
243. | Termination of Ethereum's Smart Contracts Genet, Thomas and Jensen, Thomas and Sauvage, Justine. 2020. | |
244. | Formal Verification of Solidity contracts in Event-B Zhu, Jian and Hu, Kai and Filali, Mamoun and Bodeveix, Jean-Paul and Talpin, Jean-Pierre. 2020. | |
245. | Permissionless Consensus in the Resource Model Benjamin Terner. 2020. | |
246. | WhylSon: Proving your Michelson Smart Contracts in Why3 da Horta, Lu\'\is Pedro Arrojado and Reis, Jo\~ao Santos and Pereira, M\'ario and de Sousa, Sim\~ao Melo. 2020. | |
247. | Verifiable state machines: Proofs that untrusted services operate correctly Srinath Setty and Sebastian Angel and Jonathan Lee. 2020. | |
248. | Flexible Formality Practical Experience with Agile Formal Methods Szamotulski, Marcin and Vinogradova, Polina. 2020. | |
249. | Proofs of Useless Work--Positive and Negative Results for Wasteless Mining Systems Dotan, Maya and Tochner, Saar. 2020. | |
250. | Non-Atomic Payment Splitting in Channel Networks Dziembowski, Stefan and Kedzior, Pawe\l. 2020. | |
251. | Tendermint blockchain synchronization: formal specification and model checking Braithwaite, Sean and Buchman, Ethan and Konnov, Igor and Milosevic, Zarko and Stoilkovska, Ilina and Widder, Josef and Zamfir, Anca. 2020. | |
252. | BDoS: Blockchain Denial-of-Service Attacks Mirkin, Michael and Ji, Yan and Pang, Jonathan and Klages-Mundt, Ariah and Eyal, Ittay and Juels, Ari. 2020. | |
253. | Efficient Verification of Optimized Code: Correct High-speed Curve25519 Schoolderman, Marc and Moerman, Jonathan and Smetsers, Sjaak and van Eekelen, Marko. 2020. | |
254. | Manta: Privacy Preserving Decentralized Exchange Shumo Chu and Qiudong Xia and Zhenfei Zhang. 2020. | |
255. | Committing to Quantum Resistance, Better: A Speed–and–Risk–Configurable Defence for Bitcoin against a Fast Quantum Computing Attack Dragos Ioan Ilie and William J. Knottenbelt and Iain Stewart. 2020. | |
256. | Constructing hidden order groups using genus three Jacobians Steve Thakur. 2020. | |
257. | Promise: Leveraging Future Gains for Collateral Reduction Dominik Harz and Lewis Gudgeon and Rami Khalil and Alexei Zamyatin. 2020. | |
258. | SoK: Lifting Transformations for Simulation Extractable Subversion and Updatable SNARKs⋆ Abdolmaleki, Behzad and Ramacher, Sebastian and Slamanig, Daniel. 2020. | |
259. | Alt-Coin Traceability Claire Ye and Chinedu Ojukwu and Anthony Hsu and Ruiqi Hu. 2020. | |
260. | Proposal: The Turbo-PLONK program syntax for specifying SNARK programs Ariel Gabizon and Zachary J. Williamson. 2020. | |
261. | Formal Specification and Verification of Solidity Contracts with Events Hajdu, Akos and Jovanovic, Dejan and Ciocarlie, Gabriela. 2020. | |
262. | Virtual ASICs: Generalized Proof-of-Stake Mining in Cryptocurrencies Chaya Ganesh and Claudio Orlandi and Daniel Tschudi and Aviv Zohar. 2020. | |
263. | Model Checking Bitcoin and other Proof-of-Work Consensus Protocols DiGiacomo-Castillo, Max and Liang, Yiyun and Pal, Advay and Mitchell, John C. 2020. | |
264. | Impossibility on the Schnorr Signature from the One-more DL Assumption in the Non-programmable Random Oracle Model Masayuki Fukumitsu and Shingo Hasegawa. 2020. | |
265. | Smart Contract Languages: A Thorough Comparison Gramlich, Benjamin. 2020. | |
266. | Accumulators in (and Beyond) Generic Groups: Non-Trivial Batch Verification Requires Interaction Schul-Ganz, Gili and Segev, Gil. 2020. | |
267. | Barriers for Succinct Arguments in the Random Oracle Model Alessandro Chiesa and Eylon Yogev. 2020. | |
268. | Load Balancing for Sharded Blockchains Okanami, Naoya and Nakamura, Ryuya and Nishide, Takashi. 2020. | |
269. | Selfish Mining Attacks Exacerbated by Elastic Hash Supply Shibuya, Yoko and Yamamoto, Go and Kojima, Fuhito and Shi, Elaine and Matsuo, Shin’ichiro and Laszka, Aron. 2020. | |
270. | Achieving privacy and accountability in traceable digital currency Amira Barki and Aline Gouget. 2020. | |
271. | Renegotiation and recursion in Bitcoin contracts Bartoletti, Massimo and Murgia, Maurizio and Zunino, Roberto. 2020. | |
272. | Unbounded Simulation-Sound Subversion Resistant Quasi-Adaptive NIZK Proofs and Applications to Modular zk-SNARKs Behzad Abdolmaleki and Daniel Slamanig. 2020. | |
273. | Reputable List Curation from Decentralized Voting Elizabeth C. Crites and Mary Maller and Sarah Meiklejohn and Rebekah Mercer. 2020. | |
274. | PayPlace: A Scalable Sidechain Protocol for Flexible Payment Mechanisms in Blockchain-based Marketplaces Harishankar, Madhumitha and Iyer, Sriram V and Laszka, Aron and Joe-Wong, Carlee and Tague, Patrick. 2020. | |
275. | JugglingSwap: Scriptless Atomic Cross-Chain Swaps Shlomovits, Omer and Leiba, Oded. 2020. | |
276. | Zecale: Reconciling Privacy and Scalability on Ethereum Rondelet, Antoine. 2020. | |
277. | A Tendermint Light Client Braithwaite, Sean and Buchman, Ethan and Khoffi, Ismail and Konnov, Igor and Milosevic, Zarko and Ruetschi, Romain and Widder, Josef. 2020. | |
278. | Balancing Privacy and Accountability in Blockchain Transactions Damgard, Ivan and Ganesh, Chaya and Khoshakhlagh, Hamidreza and Orlandi, Claudio and Siniscalchi, Luisa. 2020. | |
279. | Making Tezos Smart Contracts More Reliable with Coq Bernardo, Bruno and Cauderlier, Rapha\"el and Claret, Guillaume and Jakobsson, Arvid and Pesin, Basile and Tesson, Julien. 2020. | |
280. | RandChain: A Scalable and Fair Decentralised Randomness Beacon Runchao Han and Haoyu Lin and Jiangshan Yu. 2020. | |
281. | Pricing ASICs for Cryptocurrency Mining Yaish, Aviv and Zohar, Aviv. 2020. | |
282. | A Note on Low Order Assumptions in RSA groups István András Seres and Péter Burcsi. 2020. | |
283. | Layer 2 Atomic Cross-Blockchain Function Calls Robinson, Peter and Ramesh, Raghavendra. 2020. | |
284. | Towards Smart Hybrid Fuzzing for Smart Contracts Torres, Christof Ferreira and Iannillo, Antonio Ken and Gervais, Arthur and State, Radu. 2020. | |
285. | Timelocked Bribes Majid Khabbazian and Tejaswi Nadahalli and Roger Wattenhofer. 2020. | |
286. | Economic Principles of PoPCoin, a Democratic Time-based Cryptocurrency Zhang, Haoqian and Basescu, Cristina and Ford, Bryan. 2020. | |
287. | Publicly Verifiable Zero Knowledge from (Collapsing) Blockchains Scafuro, Alessandra and Siniscalchi, Luisa and Visconti, Ivan. 2020. | |
288. | How to compute all Pointproofs Alin Tomescu. 2020. | |
289. | Smart Derivatives: On-Chain Forwards for Digital Assets Rius, Alfonso DDM and Gashier, Eamonn. 2020. | |
290. | Survey on Cryptocurrency Networking: Context, State-of-the-Art, Challenges Dotan, Maya and Pignolet, Yvonne-Anne and Schmid, Stefan and Tochner, Saar and Zohar, Aviv. 2020. | |
291. | Succinct Diophantine-Satisfiability Arguments Patrick Towa and Damien Vergnaud. 2020. | |
292. | On the Confidentiality of Amounts in Grin Suyash Bagad and Saravanan Vijayakumaran. 2020. | |
293. | Anonymous probabilistic payment in payment hub Tatsuo Mitani and Akira Otsuka. 2020. | |
294. | TaiJi: Longest Chain Availability with BFT Fast Confirmation Songze Li and David Tse. 2020. | |
295. | Formal specification of a security framework for smart contracts Mandrykin, Mikhail and O'Shannessy, Jake and Payne, Jacob and Shchepetkov, Ilya. 2020. | |
296. | Baby SNARK (do do dodo dodo) Andrew Miller and Ye Zhang and Sanket Kanjalkar. 2020. | |
297. | ZeroJoin: Combining ZeroCoin and CoinJoin Alexander Chepurnoy and Amitabh Saxena. 2020. | |
298. | Community Proposal: A Benchmarking Framework for (Zero-Knowledge) Proof Systems Benarroch, Daniel and Nicolas, Aur\'elien and Thaler, Justin and Tromer, Eran. 2020. | |
299. | Custody Protocols Using Bitcoin Vaults Swambo, Jacob and Hommel, Spencer and McElrath, Bob and Bishop, Bryan. 2020. | |
300. | zkInterface, a standard tool for zero-knowledge interoperability Daniel Benarroch and Kobi Gurkan and Ron Kahat and Aurélien Nicolas 1 and Eran Tromer. 2020. | |
301. | Performance Trade-offs in Design of MimbleWimble Proofs of Reserves Suyash Bagad and Saravanan Vijayakumaran. 2020. | |
302. | AAVE: Protocol Whitepaper V1.0 Usal, Ernesto. 2020. | |
303. | Compiling a Higher-Order Smart Contract Language to LLVM Nagaraj, Vaivaswatha and Johannsen, Jacob and Trunov, Anton and P\^\irlea, George and Kumar, Amrit and Sergey, Ilya. 2020. | |
304. | Multi-Shard Private Transactions for Permissioned Blockchains Androulaki, Elli and De Caro, Angelo and Elkhiyaoui, Kaoutar and Gorenflo, Christian and Sorniotti, Alessandro and Vukolic, Marko. 2020. | |
305. | SoK: Cyber-Attack Taxonomy of Distributed Ledger- and Legacy Systems-based Financial Infrastructures Ralph Ankele and Kai Nahrgang and Branka Stojanovic and Atta Badii. 2020. | |
306. | On the (Ir)Replaceability of Global Setups, or How (Not) to Use a Global Ledger Christian Badertscher and Julia Hesse and Vassilis Zikas. 2020. | |
307. | Adaptive layer-two dispute periods in blockchains Rami Khalil and Naranker Dulay. 2020. | |
308. | Analysing Mining Machine Shutdown Price Shange Fu and Jiangshan Yu and Rafael Dowsley and Joseph Liu. 2020. | |
309. | Game-Theoretically Fair Leader Election in O(log log n) Rounds under Majority Coalitions Kai-Min Chung and T-H. Hubert Chan and Ting Wen and Elaine Shi (random author ordering). 2020. | |
310. | Ethna: Channel Network with Dynamic Internal Payment Splitting Stefan Dziembowski and Paweł Kędzior. 2020. | |
311. | "Many-out-of-Many" Proofs with Applications to Anonymous Zether Benjamin E. Diamond. 2020. | |
312. | Optimized Collision Search for STARK-Friendly Hash Challenge Candidates Udovenko, Aleksei. 2020. | |
313. | Triptych-2: efficient proofs for confidential transactions Noether, Sarang. 2020. | |
314. | Multichain-MWPoW: A $p/2$ Adversary Power Resistant Blockchain Sharding Approach to a Decentralised Autonomous Organisation Architecture Yibin Xu and Yangyu Huang and Jianhua Shao and George Theodorakopoulos. 2020. | |
315. | A PoR/PoS-Hybrid Blockchain: Proof of Reputation with Nakamoto Fallback Leonard Kleinrock and Rafail Ostrovsky and Vassilis Zikas. 2020. | |
316. | Accountability in a Permissioned Blockchain: Formal Analysis of Hyperledger Fabric Ralf Kuesters and Daniel Rausch and Mike Simon. 2020. | |
317. | Optimal Good-case Latency for Byzantine Broadcast and State Machine Replication Abraham, Ittai and Nayak, Kartik and Ren, Ling and Xiang, Zhuolun. 2020. | |
318. | Generalized Bitcoin-Compatible Channels Lukas Aumayr and Oguzhan Ersoy and Andreas Erwig and Sebastian Faust and Kristina Hostakova and Matteo Maffei and Pedro Moreno-Sanchez and Siavash Riahi. 2020. | |
319. | Implementing a Smart Contract PKI Patsonakis, Christos and Samari, Katerina and Kiayias, Aggelos and Roussopoulos, Mema. 2020. | |
320. | Smart Contract With Secret Parameters Thiercelin, Marin and Cheng, Chen-Mou and Miyaji, Atsuko and Vaudenay, Serge. 2020. | |
321. | TinyRAM Architecture Specification v2. 000 Chiesa, Eli Ben-Sasson Alessandro and Genkin, Daniel and Tromer, Eran and Virza, Madars. 2020. | |
322. | Leveraging Weight Functions for Optimistic Responsiveness in Blockchains Simon Holmgaard Kamp and Bernardo Magri and Christian Matt and Jesper Buus Nielsen and Søren Eller Thomsen and Daniel Tschudi. 2020. | |
323. | How to Keep a Secret and Share a Public Key (Using Polynomial Commitments) Nicolescu, Ioan Alin Tomescu. 2020. | |
324. | A Simple Range Proof From Polynomial Commitments Dan Boneh and Ben Fisch and Ariel Gabizon and Zac Williamson. 2020. | |
325. | Decentralized reputation Tassos Dimitriou. 2020. | |
326. | An Empirical Study of Ownership, Typestate, and Assets in the Obsidian Smart Contract Language Coblenz, Michael and Aldrich, Jonathan and Sunshine, Joshua and Myers, Brad. 2020. | |
327. | Groth16 SNARKs are Randomizable and (Weakly) Simulation Extractable Mikhail Volkhov and Markulf Kohlweiss. 2020. | |
328. | zk-SNARKs Analysis and Implementation on Ethereum Ballesteros Rodr\'\iguez, Alberto. 2020. | |
329. | Undercutting Bitcoin Is Not Profitable Tiantian Gong and Mohsen Minaei and Wenhai Sun and Aniket Kate. 2020. | |
330. | UTXOma: UTXO with Multi-Asset Support Chakravarty, Manuel MT and Chapman, James and MacKenzie, Kenneth and Melkonian, Orestis and M\"uller, Jann and Jones, Michael Peyton and Vinogradova, Polina and Wadler, Philip and Zahnentferner, Joachim. 2020. | |
331. | Synthetix Synthetix. 2020. | |
332. | Foundations of Distributed Consensus and Blockchains Elaine Shi. 2020. | |
333. | GasMet: Profiling Gas Leaks in the Deployment of Solidity Smart Contracts Canfora, Gerardo and Di Sorbo, Andrea and Laudanna, Sonia and Vacca, Anna and Visaggio, Corrado A. 2020. | |
334. | Succinct Non-Interactive Arguments for Arithmetic Circuits Spooner, Nicholas. 2020. | |
335. | Formal Verification of Ethereum Smart Contracts Using Isabelle/HOL Ribeiro, Maria and Adao, Pedro and Mateus, Paulo. 2020. | |
336. | The Checkpointed Longest Chain: User-dependent Adaptivity and Finality Sankagiri, Suryanarayana and Wang, Xuechao and Kannan, Sreeram and Viswanath, Pramod. 2020. | |
337. | On Succinct Non-InteractiveZero-Knowledge Protocols UnderWeaker Trust Assumptions Behzad Abdolmaleki. 2020. | |
338. | Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments Erkan Tairi and Pedro Moreno-Sanchez and Matteo Maffei. 2020. | |
339. | Ethereum Smart Contracts Optimization Margherita Renieri. 2020. | |
340. | Verification of recursive Bitcoin contracts Bartoletti, Massimo and Lande, Stefano and Murgia, Maurizio and Zunino, Roberto. 2020. | |
341. | Zero-Knowledge Succinct Arguments with a Linear-Time Prover Jonathan Bootle and Alessandro Chiesa and Siqi Liu. 2020. | |
342. | The Bitcoin Hunter: Detecting Bitcoin Traffic over Encrypted Channels Rezaei, Fatemeh and Naseri, Shahrzad and Eyal, Ittay and Houmansadr, Amir. 2020. | |
343. | Functional Verification of Smart Contracts via Strong Data Integrity Ahrendt, Wolfgang and Bubel, Richard. 2020. | |
344. | Specifying Framing Conditions for Smart Contracts Beckert, Bernhard and Schiffl, Jonas. 2020. | |
345. | Zero-Knowledge Proofs applied to finance S\'anchez Ortiz, Elvira. 2020. | |
346. | Achieving State Machine Replication without Honesty Assumptions McMenamin, Conor and Daza, Vanesa and Pontecorvi, Matteo. 2020. | |
347. | Unifying Compilers for SNARKs, SMT, and More Alex Ozdemir and Fraser Brown and Riad S. Wahby. 2020. | |
348. | A tool for proving Michelson Smart Contracts in WHY3 da Horta, Lu\'\is Pedro Arrojado and Reis, Jo\~ao Santos and de Sousa, Sim\~ao Melo and Pereira, M\'ario. 2020. | |
349. | Optimal Communication Complexity of Byzantine Agreement, Revisited Atsuki Momose and Ling Ren. 2020. | |
350. | Halo 0.9: A Halo Protocol with Fully-Succinctness Lira Wang. 2020. | |
351. | Post-Quantum Security of the Bitcoin Backbone and Quantum Multi-Solution Bernoulli Search Cojocaru, Alexandru and Garay, Juan and Kiayias, Aggelos and Song, Fang and Wallden, Petros. 2020. | |
352. | Privacy-Enhancing Cryptography in Distributed Ledgers Angelo De Caro and Michele Ciampi and Berry Schoenmakers and Toon Segers and Mikhail Volkhov and Markulf Kohlweiss and Ahto Truu and Henri Lakk. 2020. | |
353. | Qredo Network McCusker, Kealan and Spector, Brian. 2020. | |
354. | Nexus Mutual: A peer-to-peer discretionary mutual on the Ethereum blockchain Karp, H and Melbardis, R. 2020. | |
355. | Selfish mining in ethereum Grunspan, Cyril and P\'erez-Marco, Ricardo. 2020. |
Videos
–
Links
–