Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3419614acmconferencesBook PagePublication PagesaftConference Proceedingsconference-collections
AFT '20: Proceedings of the 2nd ACM Conference on Advances in Financial Technologies
ACM2020 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
AFT '20: 2nd ACM Conference on Advances in Financial Technologies New York NY USA October 21 - 23, 2020
ISBN:
978-1-4503-8139-0
Published:
26 October 2020
Sponsors:

Reflects downloads up to 30 Aug 2024Bibliometrics
Skip Abstract Section
Abstract

This volume contains 19 papers selected for the 2nd ACM Conference on Advances in Financial Technologies (AFT'20) held on October 21-23 2020. The conference was originally to be held in New York City, but due to COVID-19 safety precautions, it was held online. Each accepted paper prepared a 15 minute pre-recorded presentation that was played online, followed by a 5-minute live question period.

Skip Table Of Content Section
research-article
Streamlet: Textbook Streamlined Blockchains

In the past five years or so, numerous blockchain projects have made tremendous progress towards improving permissioned consensus protocols (partly due to their promised applications in Proof-of-Stake cryptocurrencies). Although a significant leap has ...

research-article
Single Secret Leader Election

In a Single Secret Leader Election (SSLE), a group of participants aim to randomly choose exactly one leader from the group with the restriction that the identity of the leader will be known to the chosen leader and nobody else. At a later time, the ...

research-article
Wendy, the Good Little Fairness Widget: Achieving Order Fairness for Blockchains

The advent of decentralized trading markets introduces a number of new challenges for consensus protocols. In addition to the 'usual' attacks -- a subset of the validators trying to prevent agreement -- there is now the possibility of financial fraud, ...

research-article
How to Pick Your Friends A Game Theoretic Approach to P2P Overlay Construction

A major limitation of many blockchain systems is the lack of strong identities in the underlying P2P network. This allows any nodes to attack the system by creating multiple false personas, thereby disrupting the network's connectivity and sabotaging ...

research-article
Defending Against Malicious Reorgs in Tezos Proof-of-Stake

Blockchains are intended to be immutable, so an attacker who is able to delete transactions through a chain reorganization (a malicious reorg) can perform a profitable double-spend attack. We study the rate at which an attacker can execute reorgs in the ...

research-article
Stablecoins 2.0: Economic Foundations and Risk-based Models

Stablecoins are one of the most widely capitalized type of cryptocurrency. However, their risks vary significantly according to their design and are often poorly understood. We seek to provide a sound foundation for stablecoin theory, with a risk-based ...

research-article
Improved Price Oracles: Constant Function Market Makers

Automated market makers, first popularized by Hanson's logarithmic market scoring rule (or LMSR) for prediction markets, have become important building blocks, called 'primitives,' for decentralized finance. A particularly useful primitive is the ...

research-article
DeFi Protocols for Loanable Funds: Interest Rates, Liquidity and Market Efficiency

We coin the term Protocols for Loanable Funds (PLFs) to refer to protocols which establish distributed ledger-based markets for loanable funds. PLFs are emerging as one of the main applications within Decentralized Finance (DeFi), and use smart contract ...

research-article
Efficient MDP Analysis for Selfish-Mining in Blockchains

A proof of work (PoW) blockchain protocol distributes rewards to its participants, called miners, according to their share of the total computational power. Sufficiently large miners can perform selfish mining -- deviate from the protocol to gain more ...

research-article
A Gas-Efficient Superlight Bitcoin Client in Solidity

Superlight clients enable the verification of proof-of-work-based blockchains by checking only a small representative number of block headers instead of all the block headers as done in simplified payment verification (SPV). Such clients can be embedded ...

research-article
Open Access
SmartOTPs: An Air-Gapped 2-Factor Authentication for Smart-Contract Wallets

With the recent rise of cryptocurrencies' popularity, the security and management of crypto-tokens have become critical. We have witnessed many attacks on users and providers, which have resulted in significant financial losses. To remedy these issues, ...

research-article
FastPay: High-Performance Byzantine Fault Tolerant Settlement

FastPay allows a set of distributed authorities, some of which are Byzantine, to maintain a high-integrity and availability settlement system for pre-funded payments. It can be used to settle payments in a native unit of value (crypto-currency), or as a ...

research-article
Asynchronous Byzantine Agreement in Incomplete Networks

The Byzantine agreement problem is considered to be a core problem in distributed systems. For example, Byzantine agreement is often used to build a blockchain, a totally ordered log of records. Blockchains are asynchronous distributed systems, fault-...

research-article
Winkle: Foiling Long-Range Attacks in Proof-of-Stake Systems

Winkle protects any validator-based byzantine fault tolerant consensus mechanisms, such as those used in modern Proof-of-Stake blockchains, against long-range attacks where old validators' signature keys get compromised. Winkle is a decentralized ...

research-article
Flood & Loot: A Systemic Attack on The Lightning Network

The Lightning Network promises to alleviate Bitcoin's known scalability problems. The operation of such second layer approaches relies on the ability of participants to turn to the blockchain to claim funds at any time, which is assumed to happen ...

research-article
Counting Down Thunder: Timing Attacks on Privacy in Payment Channel Networks

The Lightning Network is a scaling solution for Bitcoin that promises to enable rapid and private payment processing. In Lightning, multi-hop payments are secured by utilizing Hashed Time-Locked Contracts (HTLCs) and encrypted on the network layer by an ...

research-article
Route Hijacking and DoS in Off-Chain Networks

Off-chain transaction networks can mitigate the scalability issues of today's trustless blockchain systems such as Bitcoin. However, these peer-to-peer networks also introduce a new attack surface which is not yet fully understood. This paper identifies ...

research-article
Encrypted Blockchain Databases

Blockchain databases are storage systems that combine properties of blockchains and databases like decentralization, tamperproofness, low query latency and support for complex queries. Blockchain databases are an emerging and important class of ...

research-article
Privacy-preserving auditable token payments in a permissioned blockchain system

Token payment systems were the first application of blockchain technology and are still the most widely used one. Early implementations of such systems, like Bitcoin or Ethereum, provide virtually no privacy beyond basic pseudonymity: all transactions ...

Recommendations