Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3558535acmotherconferencesBook PagePublication PagesaftConference Proceedingsconference-collections
AFT '22: Proceedings of the 4th ACM Conference on Advances in Financial Technologies
ACM2022 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
AFT '22: 4th ACM Conference on Advances in Financial Technologies Cambridge MA USA September 19 - 21, 2022
ISBN:
978-1-4503-9861-9
Published:
05 July 2023

Reflects downloads up to 03 Oct 2024Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
research-article
Open Access
Parallel Proof-of-Work with Concrete Bounds

Authorization is challenging in distributed systems that cannot rely on the identification of nodes. Proof-of-work offers an alternative gate-keeping mechanism, but its probabilistic nature is incompatible with conventional security definitions. ...

research-article
Open Access
SyncPCN/PSyncPCN: Payment Channel Networks without Blockchain Synchrony

Payment channel networks (PCNs) enhance the scalability of block-chains by allowing parties to conduct transactions off-chain, i.e, without broadcasting every transaction to all blockchain participants. To conduct transactions, a sender and a receiver ...

research-article
Open Access
SoK: Decentralized Finance (DeFi)

Decentralized Finance (DeFi), a blockchain powered peer-to-peer financial system, is mushrooming. Two years ago the total value locked in DeFi systems was approximately 700m USD, now, as of April 2022, it stands at around 150bn USD. The frenetic ...

research-article
SoK: Preventing Transaction Reordering Manipulations in Decentralized Finance

User transactions on Ethereum's peer-to-peer network are at risk of being attacked. The smart contracts building decentralized finance (DeFi) have introduced a new transaction ordering dependency to the Ethereum blockchain. As a result, attackers can ...

research-article
Open Access
SoK: Blockchain Governance

Blockchain systems come with a promise of decentralization that, more often than not, stumbles on a roadblock when key decisions about modifying the software codebase need to be made. In a setting where "code-is-law," modifying the code can be a ...

research-article
Understanding Flash-Loan-based Wash Trading

Flash Loan, a popular lending service in the decentralized finance (DeFi) ecosystem, allows users to borrow a large number of virtual assets without any collateral. It can be leveraged to support many financial activities (such as arbitrage, ...

research-article
Risks and Returns of Uniswap V3 Liquidity Providers

Trade execution on Decentralized Exchanges (DEXes) is automatic and does not require individual buy and sell orders to be matched. Instead, liquidity aggregated in pools from individual liquidity providers enables trading between cryptocurrencies. The ...

research-article
The Economics of Automated Market Makers

This paper studies the question whether automated market maker protocols such as Uniswap can sustainably retain a portion of their trading fees for the protocol. We approach the problem by modelling how to optimally choose a pool's take rate, i.e the ...

research-article
Probabilistic Indistinguishability and the Quality of Validity in Byzantine Agreement

This paper provides a formal framework for reasoning about randomized distributed algorithms. We generalize the notion of indistinguishability, the most useful tool in deterministic lower bounds, to apply to a probabilistic setting. We use the new ...

research-article
Longest Chain Consensus Under Bandwidth Constraint

Spamming attacks are a serious concern for consensus protocols, as witnessed by recent outages of a major blockchain, Solana. They cause congestion and excessive message delays in a real network due to its bandwidth constraints. In contrast, longest ...

research-article
Atomic cross-chain exchanges of shared assets

A core enabler for blockchain or DLT interoperability is the ability to atomically exchange assets held by mutually untrusting owners on different ledgers. This atomic swap problem has been well-studied, with the Hash Time Locked Contract (HTLC) ...

research-article
Transferable Cross-Chain Options

An option is a financial agreement between two parties to trade two assets. One party is given the right, but not the obligation, to complete the swap before a specified termination time. In today's financial markets, an option is considered an asset ...

research-article
Information Dispersal with Provable Retrievability for Rollups

The ability to verifiably retrieve transaction or state data stored off-chain is crucial to blockchain scaling techniques such as rollups or sharding. We formalize the problem and design a storage- and communication-efficient protocol using linear ...

research-article
Analysing and Improving Shard Allocation Protocols for Sharded Blockchains

Sharding is a promising approach to scale permissionless blockchains. In a sharded blockchain, participants are split into groups, called shards, and each shard only executes part of the workloads. Despite its wide adoption in permissioned systems, ...

research-article
Open Access
Wiser: Increasing Throughput in Payment Channel Networks with Transaction Aggregation

Payment channel networks (PCNs) are one of the most prominent solutions to the limited transaction throughput of blockchains. Nevertheless, PCNs suffer themselves from a throughput limitation due to the capital constraints of their channels. A similar ...

research-article
Block Double-Submission Attack: Block Withholding Can Be Self-Destructive

Proof-of-Work (PoW) is a Sybil control mechanism adopted in blockchain-based cryptocurrencies. It prevents the attempt of malicious actors to manipulate distributed ledgers. Bitcoin has successfully suppressed double-spending by accepting the longest ...

research-article
Public Access
Bitcoin's Latency–Security Analysis Made Simple

Simple closed-form upper and lower bounds are developed for the security of the Nakamoto consensus as a function of the confirmation depth, the honest and adversarial block mining rates, and an upper bound on the block propagation delay. The bounds ...

research-article
Adoption and Actual Privacy of Decentralized CoinJoin Implementations in Bitcoin

We present a first measurement study on the adoption and actual privacy of two popular decentralized CoinJoin implementations, Wasabi and Samourai, in the broader Bitcoin ecosystem. By applying highly accurate (¿ 99%) algorithms we can effectively ...

research-article
Open Access
Parallel Contests for Crowdsourcing Reviews: Existence and Quality of Equilibria

Part of the design of many blockchains and cryptocurrencies includes a treasury, which periodically allocates collected funds to various projects that could be beneficial to their ecosystem. These projects are then voted on and selected by the users ...

research-article
Open Access
Blockchain Nash Dynamics and the Pursuit of Compliance

We study "Nash dynamics" in the context of adversarial deviations in blockchain protocols. We introduce a formal model, within which one can assess whether the Nash dynamics can lead utility-maximizing participants to defect from the "honest" protocol ...

research-article
Public Access
Blockchain Mining: Optimal Resource Allocation

Having enabled numerous applications, blockchains have attracted not only much attention, in the past decade, but also huge amount of resources: talent, capital, energy, etc. Focusing on the mining side of the market, in this paper, we aim at ...

research-article
Public Access
D-KODE: Distributed Mechanism to Manage a Billion Discrete-log Keys

We focus on two emerging key-management issues in the blockchain space: (i) allowing a blockchain system to airdrop/send tokens to a potential client Bob, who is yet to set up the required cryptographic key, and (ii) creating a cross-chain bridge that ...

Contributors
  • Brown University
  • Massachusetts Institute of Technology

Recommendations