Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                



Dates are inconsistent

Dates are inconsistent

3 results sorted by ID

Possible spell-corrected query: direct neighbor network
2018/243 (PDF) Last updated: 2018-03-05
A New Approach to Deanonymization of Unreachable Bitcoin Nodes
Indra Deep Mastan, Souradyuti Paul
Applications

Mounting deanonymization attacks on the unreachable Bitcoin nodes -- these nodes do not accept incoming connections -- residing behind the NAT is a challenging task. Such an attack was first given by Biryukov, Khovratovich and Pustogarov based on their observation that a node can be uniquely identified in a single session by their directly-connected neighbouring nodes (ACM CCS'15). However, the BKP15 attack is less effective across multiple sessions. To address this issue, Biryukov and...

2011/014 (PDF) Last updated: 2011-01-08
Unconditionally Reliable Message Transmission in Directed Neighbour Networks
Shashank Agrawal, Abhinav Mehta, Kannan Srinathan
Foundations

The problem of unconditionally reliable message transmission (URMT) is to design a protocol which when run by players in a network enables a sender S to deliver a message to a receiver R with high probability, even when some players in the network are under the control of an unbounded adversary. Renault and Tomala [JoC2008] gave a characterization of undirected neighbour networks over which URMT tolerating Byzantine adversary is possible. In this paper, we generalize their result to the case...

2008/393 (PDF) Last updated: 2009-11-30
How Far Must You See To Hear Reliably
Pranav K Vasishta, Anuj Gupta, Prasant Gopal, Piyush Bansal, Rishabh Mukherjee, Poornima M, Kannan Srinathan, Kishore Kothapalli

We consider the problem of probabilistic reliable communication (PRC) over synchronous networks modeled as directed graphs in the presence of a Byzantine adversary when players' knowledge of the network topology is not complete. We show that possibility of PRC is extremely sensitive to the changes in players' knowledge of the topology. This is in complete contrast with earlier known results on the possibility of perfectly reliable communication over undirected graphs where the case of each...

Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.