No abstract available.
Proceeding Downloads
Parallel Proof-of-Work with Concrete Bounds
Authorization is challenging in distributed systems that cannot rely on the identification of nodes. Proof-of-work offers an alternative gate-keeping mechanism, but its probabilistic nature is incompatible with conventional security definitions. ...
SyncPCN/PSyncPCN: Payment Channel Networks without Blockchain Synchrony
Payment channel networks (PCNs) enhance the scalability of block-chains by allowing parties to conduct transactions off-chain, i.e, without broadcasting every transaction to all blockchain participants. To conduct transactions, a sender and a receiver ...
SoK: Decentralized Finance (DeFi)
Decentralized Finance (DeFi), a blockchain powered peer-to-peer financial system, is mushrooming. Two years ago the total value locked in DeFi systems was approximately 700m USD, now, as of April 2022, it stands at around 150bn USD. The frenetic ...
SoK: Preventing Transaction Reordering Manipulations in Decentralized Finance
User transactions on Ethereum's peer-to-peer network are at risk of being attacked. The smart contracts building decentralized finance (DeFi) have introduced a new transaction ordering dependency to the Ethereum blockchain. As a result, attackers can ...
SoK: Blockchain Governance
Blockchain systems come with a promise of decentralization that, more often than not, stumbles on a roadblock when key decisions about modifying the software codebase need to be made. In a setting where "code-is-law," modifying the code can be a ...
Understanding Flash-Loan-based Wash Trading
Flash Loan, a popular lending service in the decentralized finance (DeFi) ecosystem, allows users to borrow a large number of virtual assets without any collateral. It can be leveraged to support many financial activities (such as arbitrage, ...
Risks and Returns of Uniswap V3 Liquidity Providers
Trade execution on Decentralized Exchanges (DEXes) is automatic and does not require individual buy and sell orders to be matched. Instead, liquidity aggregated in pools from individual liquidity providers enables trading between cryptocurrencies. The ...
The Economics of Automated Market Makers
This paper studies the question whether automated market maker protocols such as Uniswap can sustainably retain a portion of their trading fees for the protocol. We approach the problem by modelling how to optimally choose a pool's take rate, i.e the ...
Probabilistic Indistinguishability and the Quality of Validity in Byzantine Agreement
This paper provides a formal framework for reasoning about randomized distributed algorithms. We generalize the notion of indistinguishability, the most useful tool in deterministic lower bounds, to apply to a probabilistic setting. We use the new ...
Longest Chain Consensus Under Bandwidth Constraint
Spamming attacks are a serious concern for consensus protocols, as witnessed by recent outages of a major blockchain, Solana. They cause congestion and excessive message delays in a real network due to its bandwidth constraints. In contrast, longest ...
Atomic cross-chain exchanges of shared assets
A core enabler for blockchain or DLT interoperability is the ability to atomically exchange assets held by mutually untrusting owners on different ledgers. This atomic swap problem has been well-studied, with the Hash Time Locked Contract (HTLC) ...
Transferable Cross-Chain Options
An option is a financial agreement between two parties to trade two assets. One party is given the right, but not the obligation, to complete the swap before a specified termination time. In today's financial markets, an option is considered an asset ...
Information Dispersal with Provable Retrievability for Rollups
The ability to verifiably retrieve transaction or state data stored off-chain is crucial to blockchain scaling techniques such as rollups or sharding. We formalize the problem and design a storage- and communication-efficient protocol using linear ...
Analysing and Improving Shard Allocation Protocols for Sharded Blockchains
Sharding is a promising approach to scale permissionless blockchains. In a sharded blockchain, participants are split into groups, called shards, and each shard only executes part of the workloads. Despite its wide adoption in permissioned systems, ...
Wiser: Increasing Throughput in Payment Channel Networks with Transaction Aggregation
Payment channel networks (PCNs) are one of the most prominent solutions to the limited transaction throughput of blockchains. Nevertheless, PCNs suffer themselves from a throughput limitation due to the capital constraints of their channels. A similar ...
Block Double-Submission Attack: Block Withholding Can Be Self-Destructive
Proof-of-Work (PoW) is a Sybil control mechanism adopted in blockchain-based cryptocurrencies. It prevents the attempt of malicious actors to manipulate distributed ledgers. Bitcoin has successfully suppressed double-spending by accepting the longest ...
Bitcoin's Latency–Security Analysis Made Simple
Simple closed-form upper and lower bounds are developed for the security of the Nakamoto consensus as a function of the confirmation depth, the honest and adversarial block mining rates, and an upper bound on the block propagation delay. The bounds ...
Adoption and Actual Privacy of Decentralized CoinJoin Implementations in Bitcoin
We present a first measurement study on the adoption and actual privacy of two popular decentralized CoinJoin implementations, Wasabi and Samourai, in the broader Bitcoin ecosystem. By applying highly accurate (¿ 99%) algorithms we can effectively ...
Parallel Contests for Crowdsourcing Reviews: Existence and Quality of Equilibria
Part of the design of many blockchains and cryptocurrencies includes a treasury, which periodically allocates collected funds to various projects that could be beneficial to their ecosystem. These projects are then voted on and selected by the users ...
Blockchain Nash Dynamics and the Pursuit of Compliance
We study "Nash dynamics" in the context of adversarial deviations in blockchain protocols. We introduce a formal model, within which one can assess whether the Nash dynamics can lead utility-maximizing participants to defect from the "honest" protocol ...
Blockchain Mining: Optimal Resource Allocation
Having enabled numerous applications, blockchains have attracted not only much attention, in the past decade, but also huge amount of resources: talent, capital, energy, etc. Focusing on the mining side of the market, in this paper, we aim at ...
D-KODE: Distributed Mechanism to Manage a Billion Discrete-log Keys
We focus on two emerging key-management issues in the blockchain space: (i) allowing a blockchain system to airdrop/send tokens to a potential client Bob, who is yet to set up the required cryptographic key, and (ii) creating a cross-chain bridge that ...