Zobrazeno 1 - 10
of 102
pro vyhledávání: '"Szalachowski, Pawel"'
Autor:
Malkhi, Dahlia, Szalachowski, Pawel
Many cryptocurrency platforms are vulnerable to Maximal Extractable Value (MEV) attacks, where a malicious consensus leader can inject transactions or change the order of user transactions to maximize its profit. A promising line of research in MEV m
Externí odkaz:
http://arxiv.org/abs/2208.00940
Decentralized control, low-complexity, flexible and efficient communications are the requirements of an architecture that aims to scale blockchains beyond the current state. Such properties are attainable by reducing ledger size and providing paralle
Externí odkaz:
http://arxiv.org/abs/2109.07316
A verifiable random function (VRF in short) is a powerful pseudo-random function that provides a non-interactively public verifiable proof for the correctness of its output. Recently, VRFs have found essential applications in blockchain design, such
Externí odkaz:
http://arxiv.org/abs/2109.02012
Blockchain rewriting with fine-grained access control allows a user to create a transaction associated with a set of attributes, while another user (or modifier) who possesses enough rewriting privileges from a trusted authority satisfying the attrib
Externí odkaz:
http://arxiv.org/abs/2104.13543
The use of passwords and the need to protect passwords are not going away. The majority of websites that require authentication continue to support password authentication. Even high-security applications such as Internet Banking portals, which deplo
Externí odkaz:
http://arxiv.org/abs/2011.06257
Publikováno v:
Computers & Security, vol. 97, no. 101975, 2020
If two or more identical HTTPS clients, located at different geographic locations (regions), make an HTTPS request to the same domain (e.g. example.com), on the same day, will they receive the same HTTPS security guarantees in response? Our results g
Externí odkaz:
http://arxiv.org/abs/2010.10170
Voting is a means to agree on a collective decision based on available choices (e.g., candidates), where participants agree to abide by their outcome. To improve some features of e-voting, decentralized blockchain-based solutions can be employed, whe
Externí odkaz:
http://arxiv.org/abs/2010.09112
Autor:
Szalachowski, Pawel
Password-authenticated identities, where users establish username-password pairs with individual servers and use them later on for authentication, is the most widespread user authentication method over the Internet. Although they are simple, user-fri
Externí odkaz:
http://arxiv.org/abs/2007.15881
Clients of permissionless blockchain systems, like Bitcoin, rely on an underlying peer-to-peer network to send and receive transactions. It is critical that a client is connected to at least one honest peer, as otherwise the client can be convinced t
Externí odkaz:
http://arxiv.org/abs/2007.02287
We present Large-scale Known-committee Stake-based Agreement (LaKSA), a chain-based Proof-of-Stake protocol that is dedicated, but not limited, to cryptocurrencies. LaKSA minimizes interactions between nodes through lightweight committee voting, resu
Externí odkaz:
http://arxiv.org/abs/2006.01427