Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–12 of 12 results for author: Al-Bassam, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2210.15017  [pdf, other

    cs.CR

    Accountable Safety for Rollups

    Authors: Ertem Nusret Tas, John Adler, Mustafa Al-Bassam, Ismail Khoffi, David Tse, Nima Vaziri

    Abstract: Accountability, the ability to provably identify protocol violators, gained prominence as the main economic argument for the security of proof-of-stake (PoS) protocols. Rollups, the most popular scaling solution for blockchains, typically use PoS protocols as their parent chain. We define accountability for rollups, and present an attack that shows the absence of accountability on existing designs… ▽ More

    Submitted 4 November, 2022; v1 submitted 26 October, 2022; originally announced October 2022.

    Comments: 28 pages, 4 figures

  2. arXiv:2107.07297  [pdf, other

    cs.CR

    Shard Scheduler: object placement and migration in sharded account-based blockchains

    Authors: Michał Król, Onur Ascigil, Sergi Rene, Alberto Sonnino, Mustafa Al-Bassam, Etienne Rivière

    Abstract: We propose Shard Scheduler, a system for object placement and migration in account-based sharded blockchains. Our system calculates optimal placement and decides of object migrations across shards and supports complex multi-account transactions caused by smart contracts. Placement and migration decisions made by Shard Scheduler are fully deterministic, verifiable, and can be made part of the conse… ▽ More

    Submitted 15 July, 2021; originally announced July 2021.

  3. arXiv:1905.09274  [pdf, other

    cs.CR

    LazyLedger: A Distributed Data Availability Ledger With Client-Side Smart Contracts

    Authors: Mustafa Al-Bassam

    Abstract: We propose LazyLedger, a design for distributed ledgers where the blockchain is optimised for solely ordering and guaranteeing the availability of transaction data. Responsibility for executing and validating transactions is shifted to only the clients that have an interest in specific transactions relating to blockchain applications that they use. As the core function of the consensus system of a… ▽ More

    Submitted 7 June, 2019; v1 submitted 22 May, 2019; originally announced May 2019.

  4. arXiv:1905.03016  [pdf, other

    cs.CR

    Proof-of-Prestige: A Useful Work Reward System for Unverifiable Tasks

    Authors: Michał Król, Alberto Sonnino, Mustafa Al-Bassam, Argyrios Tasiopoulos, Ioannis Psaras

    Abstract: As cryptographic tokens and altcoins are increasingly being built to serve as utility tokens, the notion of useful work consensus protocols, as opposed to number-crunching PoW consensus, is becoming ever more important. In such contexts, users get rewards from the network after they have carried out some specific task useful for the network. While in some cases the proof of some utility or service… ▽ More

    Submitted 8 May, 2019; originally announced May 2019.

    Comments: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2019)

  5. arXiv:1901.11218  [pdf, other

    cs.CR

    Replay Attacks and Defenses Against Cross-shard Consensus in Sharded Distributed Ledgers

    Authors: Alberto Sonnino, Shehar Bano, Mustafa Al-Bassam, George Danezis

    Abstract: We present a family of replay attacks against sharded distributed ledgers, that target cross-shard consensus protocols, such as the recently proposed Chainspace and Omniledger. They allow an attacker, with network access only, to double-spend or lock resources with minimal efforts. The attacker can act independently without colluding with any nodes, and succeed even if all nodes are honest; most o… ▽ More

    Submitted 1 September, 2020; v1 submitted 31 January, 2019; originally announced January 2019.

  6. arXiv:1809.09044  [pdf, other

    cs.CR

    Fraud and Data Availability Proofs: Maximising Light Client Security and Scaling Blockchains with Dishonest Majorities

    Authors: Mustafa Al-Bassam, Alberto Sonnino, Vitalik Buterin

    Abstract: Light clients, also known as Simple Payment Verification (SPV) clients, are nodes which only download a small portion of the data in a blockchain, and use indirect means to verify that a given chain is valid. Typically, instead of validating block data, they assume that the chain favoured by the blockchain's consensus algorithm only contains valid blocks, and that the majority of block producers a… ▽ More

    Submitted 25 May, 2019; v1 submitted 24 September, 2018; originally announced September 2018.

  7. arXiv:1805.06411  [pdf, other

    cs.CR

    Airtnt: Fair Exchange Payment for Outsourced Secure Enclave Computations

    Authors: Mustafa Al-Bassam, Alberto Sonnino, Michał Król, Ioannis Psaras

    Abstract: We present Airtnt, a novel scheme that enables users with CPUs that support Trusted Execution Environments (TEEs) and remote attestation to rent out computing time on secure enclaves to untrusted users. Airtnt makes use of the attestation capabilities of TEEs and smart contracts on distributed ledgers to guarantee the fair exchange of the payment and the result of an execution. Airtnt makes use of… ▽ More

    Submitted 16 May, 2018; originally announced May 2018.

  8. arXiv:1805.04772  [pdf, other

    cs.CR

    VAMS: Verifiable Auditing of Access to Confidential Data

    Authors: Alexander Hicks, Vasilios Mavroudis, Mustafa Al-Bassam, Sarah Meiklejohn, Steven J. Murdoch

    Abstract: We propose VAMS, a system that enables transparency for audits of access to data requests without compromising the privacy of parties in the system. VAMS supports audits on an aggregate level and an individual level, by relying on three mechanisms. A tamper-evident log provides integrity for the log entries that are audited. A tagging scheme allows users to query log entries that relate to them, w… ▽ More

    Submitted 3 May, 2023; v1 submitted 12 May, 2018; originally announced May 2018.

    Comments: Slight update on the original work paper from 2018

  9. arXiv:1802.07344  [pdf, other

    cs.CR

    Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers

    Authors: Alberto Sonnino, Mustafa Al-Bassam, Shehar Bano, Sarah Meiklejohn, George Danezis

    Abstract: Coconut is a novel selective disclosure credential scheme supporting distributed threshold issuance, public and private attributes, re-randomization, and multiple unlinkable selective attribute revelations. Coconut integrates with blockchains to ensure confidentiality, authenticity and availability even when a subset of credential issuing authorities are malicious or offline. We implement and eval… ▽ More

    Submitted 16 March, 2020; v1 submitted 20 February, 2018; originally announced February 2018.

  10. arXiv:1712.08427  [pdf, other

    cs.CR

    Contour: A Practical System for Binary Transparency

    Authors: Mustafa Al-Bassam, Sarah Meiklejohn

    Abstract: Transparency is crucial in security-critical applications that rely on authoritative information, as it provides a robust mechanism for holding these authorities accountable for their actions. A number of solutions have emerged in recent years that provide transparency in the setting of certificate issuance, and Bitcoin provides an example of how to enforce transparency in a financial setting. In… ▽ More

    Submitted 7 August, 2018; v1 submitted 22 December, 2017; originally announced December 2017.

    Comments: International Workshop on Cryptocurrencies and Blockchain Technology (CBT), 2018

  11. arXiv:1711.03936  [pdf, ps, other

    cs.CR

    Consensus in the Age of Blockchains

    Authors: Shehar Bano, Alberto Sonnino, Mustafa Al-Bassam, Sarah Azouvi, Patrick McCorry, Sarah Meiklejohn, George Danezis

    Abstract: The blockchain initially gained traction in 2008 as the technology underlying bitcoin, but now has been employed in a diverse range of applications and created a global market worth over $150B as of 2017. What distinguishes blockchains from traditional distributed databases is the ability to operate in a decentralized setting without relying on a trusted third party. As such their core technical c… ▽ More

    Submitted 13 November, 2017; v1 submitted 10 November, 2017; originally announced November 2017.

  12. arXiv:1708.03778  [pdf, other

    cs.CR

    Chainspace: A Sharded Smart Contracts Platform

    Authors: Mustafa Al-Bassam, Alberto Sonnino, Shehar Bano, Dave Hrycyszyn, George Danezis

    Abstract: Chainspace is a decentralized infrastructure, known as a distributed ledger, that supports user defined smart contracts and executes user-supplied transactions on their objects. The correct execution of smart contract transactions is verifiable by all. The system is scalable, by sharding state and the execution of transactions, and using S-BAC, a distributed commit protocol, to guarantee consisten… ▽ More

    Submitted 12 August, 2017; originally announced August 2017.