default search action
27th Financial Cryptography and Data Security 2023: Bol, Brač, Croatia - Part I
- Foteini Baldimtsi, Christian Cachin:
Financial Cryptography and Data Security - 27th International Conference, FC 2023, Bol, Brač, Croatia, May 1-5, 2023, Revised Selected Papers, Part I. Lecture Notes in Computer Science 13950, Springer 2024, ISBN 978-3-031-47753-9
Consensus
- Christos Stefo, Zhuolun Xiang, Lefteris Kokoris-Kogias:
Executing and Proving Over Dirty Ledgers. 3-20 - Andrew Lewis-Pye, Tim Roughgarden:
Byzantine Generals in the Permissionless Setting. 21-37 - Adithya Bhat, Akhil Bandarupalli, Saurabh Bagchi, Aniket Kate, Michael K. Reiter:
The Unique Chain Rule and Its Applications. 38-55 - Peiyao Sheng, Gerui Wang, Kartik Nayak, Sreeram Kannan, Pramod Viswanath:
Player-Replaceability and Forensic Support Are Two Sides of the Same (Crypto) Coin. 56-74
Cryptographic Protocols
- Giovanni Deligios, Chen-Da Liu-Zhang:
Synchronous Perfectly Secure Message Transmission with Optimal Asynchronous Fallback Guarantees. 77-93 - Ivo Maffei, Andrew William Roscoe:
Optimally-Fair Exchange of Secrets via Delay Encryption and Commutative Blinding. 94-111 - Matteo Campanelli, Rosario Gennaro, Kelsey Melissaris, Luca Nizzardo:
Witness-Authenticated Key Exchange, Revisited: Extensions to Groups, Improved Models, Simpler Constructions. 112-128 - Nicholas Brandt, Sven Maier, Tobias Müller, Jörn Müller-Quade:
On the Correlation Complexity of MPC with Cheater Identification. 129-146 - Dhiman Chakraborty, Michael Schwarz, Sven Bugiel:
TALUS: Reinforcing TEE Confidentiality with Cryptographic Coprocessors. 147-165 - Rohann Bella, Xavier Bultel, Céline Chevalier, Pascal Lafourcade, Charles Olivier-Anclin:
Practical Construction for Secure Trick-Taking Games Even with Cards Set Aside. 166-181 - Ryuya Hayashi, Taiki Asano, Junichiro Hayata, Takahiro Matsuda, Shota Yamada, Shuichi Katsumata, Yusuke Sakai, Tadanori Teruya, Jacob C. N. Schuldt, Nuttapong Attrapadung, Goichiro Hanaoka, Kanta Matsuura, Tsutomu Matsumoto:
Signature for Objects: Formalizing How to Authenticate Physical Data and More. 182-199 - Sunoo Park, Nicholas Spooner:
The Superlinearity Problem in Post-quantum Blockchains. 200-217 - Runchao Han, Jiangshan Yu:
Fair Delivery of Decentralised Randomness Beacon. 218-234 - Kevin Choi, Arasu Arun, Nirvan Tyagi, Joseph Bonneau:
Bicorn: An Optimistically Efficient Distributed Randomness Beacon. 235-251 - Nico Döttling, Lucjan Hanzlik, Bernardo Magri, Stella Wohnig:
McFly: Verifiable Encryption to the Future Made Practical. 252-269 - Carsten Baum, James Hsin-yu Chiang, Bernardo David, Tore Kasper Frederiksen:
Eagle: Efficient Privacy Preserving Smart Contracts. 270-288 - Arushi Arora, Raj Karra, Dave Levin, Christina Garman:
Provably Avoiding Geographic Regions for Tor's Onion Services. 289-305
Decentralized Finance
- Mahsa Bastankhah, Krishnendu Chatterjee, Mohammad Ali Maddah-Ali, Stefan Schmid, Jakub Svoboda, Michelle Yeo:
R2: Boosting Liquidity in Payment Channel Networks with Online Admission Control. 309-325 - Jason Milionis, Ciamac C. Moallemi, Tim Roughgarden:
Complexity-Approximation Trade-Offs in Exchange Mechanisms: AMMs vs. LOBs. 326-343 - Kaihua Qin, Jens Ernstberger, Liyi Zhou, Philipp Jovanovic, Arthur Gervais:
Mitigating Decentralized Finance Liquidations with Reversible Call Options. 344-362 - Sharad Agarwal, Gilberto Atondo Siu, Marilyne Ordekian, Alice Hutchings, Enrico Mariconti, Marie Vasek:
Short Paper: DeFi Deception - Uncovering the Prevalence of Rugpulls in Cryptocurrency Projects. 363-372
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.