Skip to main content
European Commission logo print header

Privacy-Enhancing Cryptography in Distributed Ledgers

Leistungen

Exploitation Strategy and Roadmap

This deliverable describes the exploitation strategies of the (industrial) partners as well as of the project as a whole. (T5.4)

Updated Consolidated Communication and Dissemination Plan

This deliverable consolidates all the dissemination activities uptaken so far and presents a plan for further dissemination. (T5.1)

Revision of Privacy-Enhancing Cryptographic Primitives for Ledgers

This deliverable presents the revised constructions of the developed privacy-enhancing cryptographic primitives that are useful for distributed ledgers according to the coordination with WP1 and WP3. (T2.3)

Stakeholder Engagement Report

This deliverable includes reports on all workshops and other relevant stakeholder engagement activities such as presentations at conferences. (T5.3)

Initial Communication and Dissemination Plan

This deliverable outlines the initial strategy for communication and dissemination and all the required information on the elements on the website.

Requirements and Interface Design

This document will contain the requirements for all the use cases. The main idea is to have separate requirements for each use case. Note that, there can be privacy issues that could be similar in the use cases. Such cases will lead to similar requirements too. These requirements will be grouped together. (T1.1)

Communication and Dissemination Toolkit

This deliverable includes all the necessary descriptions on project design, template design for presentations, logo, online visual identity, design of posters etc. (T5.2)

Definitions and Notions of Privacy-Enhancing Cryptographic Primitives for Ledgers

This deliverable will present standard and new definitions and notions of privacyenhancing cryptographic primitives that are useful for distributed ledgers. (T2.2)

Second Scientific & Research Impact Measurement

This deliverable describes the impact of the research results as well as the solutions developed within the project. (T6.2)

Quality Assurance Plan

The quality assurance describes the standards, processes and procedures for the expected results of the project. (T6.2)

Project Reference Manual and Tools

The project reference manual and tools outlines all the internal project delivery processes such as mailing lists, deliverable templates, presentation templates etc. (T6.1)

State of the Art of Cryptographic Ledgers

The state of the art in distributed ledgers is summarised focusing on the cryptographic aspects of the existing constructions. (T3.1)

Report on Architecture for Privacy-Preserving Applications on Ledgers

The deliverable describes the architecture of privacy-sensitive applications of cryptographic ledgers. This encompasses the solutions required by the use cases for, e.g., privacy sensitive verifiable storage of information or privacy-preserving smart contracts. (T4.1)

Report on Exploitation

This deliverable describes the exploitation efforts of the (industrial) partners throughout the project. (T5.4)

Report on Tools for Privacy-Preserving Applications on Ledgers

This deliverable describes the implementations of the toolkits and prototype solutions for privacy-sensitive applications of cryptographic ledgers. (T4.2, T4.3)

Use Case Validation

This document will describe in detail the validation of each use case with respect to the criteria set in D1.2. (T1.3)

Design of Extended Core Protocols

The results for the extended core protocols for distributed ledgers are presented. (T3.2)

Report on Architecture of Secure Ledger Systems

The deliverable covers the architecture of protocols for secure ledger systems, such as authentication within the infrastructure, solutions for updating the ledger protocols, or results on consensus protocols. (T4.1)

Revision of Extended Core Protocols

This deliverable presents the revisions made to the core protocols based on the feedback and experience with the WP1 use cases. (T3.3)

First Scientific & Research Impact Measurement

This deliverable describes the impact of the research results as well as the preliminary implementations. (T6.2)

State of the art on Privacy-Enhancing Cryptography for Ledgers

This deliverable presents the state of the art on privacy-enhancing cryptographic primitives that are useful for distributed ledgers. (T2.1)

Validation Criteria

This deliverable will include all the validation criteria that will be formed for each use case. (T1.3)

Report on Tools for Secure Ledger Systems

This deliverable describes the implementations of the toolkits and prototype solutions for secure ledger infrastructure. (T4.2, T4.3)

Final Report on Architecture

This deliverable covers the results on architecture of ledgers and privacy-sensitive applications that are not covered in, or are significantly modified since, D4.1 and D4.2. (T4.1, T4.2, T4.3)

Improved Constructions of Privacy-Enhancing Cryptographic Primitives for Ledgers

This deliverable presents the improved privacy-enhancing cryptographic primitives that are useful for distributed ledgers and that have been developed in this work package. (T2.2)

Data Management Plan

As PRiVILEDGE is taking part in the Pilot on Open Research Data a first version of the DMP as an early deliverable will be provided within the first six months of the project. The purpose of the DMP is to provide an analysis of the main elements of the data management policy that will be used by the applications with regard to all the datasets that will be generated by the project. The DMP is not a fixed document, but evolves during the lifespan of the project. More developed versions of the plan can therefore be included as additional deliverables at later stages. According to the Guidelines on Data Management in Horizon 2020, the DMP should address data set reference and name, data set description, standards and metadata, data sharing and archiving and preservation (including storage and backup) on a dataset by dataset basis and should reflect the current status of reflection within the consortium about the data that will be produced.

Veröffentlichungen

Black-Box Constructions of Bounded-Concurrent Secure Computation

Autoren: Sanjam Garg, Xiao Liang, Omkant Pandey, Ivan Visconti
Veröffentlicht in: Security and Cryptography for Networks - 12th International Conference, SCN 2020, Amalfi, Italy, September 14–16, 2020, Proceedings, Ausgabe 12238, 2020, Seite(n) 87-107, ISBN 978-3-030-57989-0
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-57990-6_5

How to Extract Useful Randomness from Unreliable Sources

Autoren: Divesh Aggarwal, Maciej Obremski, João Ribeiro, Luisa Siniscalchi, Ivan Visconti
Veröffentlicht in: Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part I, Ausgabe 12105, 2020, Seite(n) 343-372, ISBN 978-3-030-45720-4
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-45721-1_13

Updatable and Universal Common Reference Strings with Applications to zk-SNARKs

Autoren: Jens Groth, Markulf Kohlweiss, Mary Maller, Sarah Meiklejohn, Ian Miers
Veröffentlicht in: Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part III, Ausgabe 10993, 2018, Seite(n) 698-728, ISBN 978-3-319-96877-3
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-319-96878-0_24

Simulation Extractability in Groth’s zk-SNARK

Autoren: Shahla Atapoor, Karim Baghery
Veröffentlicht in: Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2019 International Workshops, DPM 2019 and CBT 2019, Luxembourg, September 26–27, 2019, Proceedings, Ausgabe 11737, 2019, Seite(n) 336-354, ISBN 978-3-030-31499-6
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-31500-9_22

Round Optimal Secure Multiparty Computation from Minimal Assumptions

Autoren: Arka Rai Choudhuri, Michele Ciampi, Vipul Goyal, Abhishek Jain, Rafail Ostrovsky
Veröffentlicht in: Theory of Cryptography - 18th International Conference, TCC 2020, Durham, NC, USA, November 16–19, 2020, Proceedings, Part II, Ausgabe 12551, 2020, Seite(n) 291-319, ISBN 978-3-030-64377-5
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-64378-2_11

A Practical Approach to the Secure Computation of the Moore–Penrose Pseudoinverse over the Rationals

Autoren: Niek J. Bouman, Niels de Vreede
Veröffentlicht in: Applied Cryptography and Network Security - 18th International Conference, ACNS 2020, Rome, Italy, October 19–22, 2020, Proceedings, Part I, Ausgabe 12146, 2020, Seite(n) 398-417, ISBN 978-3-030-57807-7
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-57808-4_20

On Adaptive Security of Delayed-Input Sigma Protocols and Fiat-Shamir NIZKs

Autoren: Michele Ciampi, Roberto Parisella, Daniele Venturi
Veröffentlicht in: Security and Cryptography for Networks - 12th International Conference, SCN 2020, Amalfi, Italy, September 14–16, 2020, Proceedings, Ausgabe 12238, 2020, Seite(n) 670-690, ISBN 978-3-030-57989-0
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-57990-6_33

Non-interactive Zero Knowledge Proofs in the Random Oracle Model

Autoren: Vincenzo Iovino, Ivan Visconti
Veröffentlicht in: Codes, Cryptology and Information Security - Third International Conference, C2SI 2019, Rabat, Morocco, April 22–24, 2019, Proceedings - In Honor of Said El Hajji, Ausgabe 11445, 2019, Seite(n) 118-141, ISBN 978-3-030-16457-7
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-16458-4_9

A Formal Treatment of Hardware Wallets

Autoren: Myrto Arapinis, Andriana Gkaniatsou, Dimitris Karakostas, Aggelos Kiayias
Veröffentlicht in: Financial Cryptography and Data Security - 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18–22, 2019, Revised Selected Papers, Ausgabe 11598, 2019, Seite(n) 426-445, ISBN 978-3-030-32100-0
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-32101-7_26

Dynamic Ad Hoc Clock Synchronization

Autoren: Christian Badertscher, Peter Gaži, Aggelos Kiayias, Alexander Russell, Vassilis Zikas
Veröffentlicht in: Advances in Cryptology – EUROCRYPT 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17–21, 2021, Proceedings, Part III, Ausgabe 12698, 2021, Seite(n) 399-428, ISBN 978-3-030-77882-8
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-77883-5_14

Publicly Verifiable Zero Knowledge from (Collapsing) Blockchains

Autoren: Alessandra Scafuro, Luisa Siniscalchi, Ivan Visconti
Veröffentlicht in: Public-Key Cryptography – PKC 2021 - 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part II, Ausgabe 12711, 2021, Seite(n) 469-498, ISBN 978-3-030-75247-7
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-75248-4_17

Verifiable Multi-Party Business Process Automation

Autoren: Joosep Simm, Jamie Steiner, Ahto Truu
Veröffentlicht in: Business Process Management Workshops - BPM 2020 International Workshops, Seville, Spain, September 13–18, 2020, Revised Selected Papers, Ausgabe 397, 2020, Seite(n) 30-41, ISBN 978-3-030-66497-8
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-66498-5_3

Crowd Verifiable Zero-Knowledge and End-to-End Verifiable Multiparty Computation

Autoren: Foteini Baldimtsi, Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang
Veröffentlicht in: Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part III, Ausgabe 12493, 2020, Seite(n) 717-748, ISBN 978-3-030-64839-8
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-64840-4_24

Proof-of-Burn

Autoren: Kostis Karantias, Aggelos Kiayias, Dionysis Zindros
Veröffentlicht in: Financial Cryptography and Data Security - 24th International Conference, FC 2020 , Kota Kinabalu, Malaysia, February 10–14, 2020 Revised Selected Papers, Ausgabe 12059, 2020, Seite(n) 523-540, ISBN 978-3-030-51279-8
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-51280-4_28

Resource-Restricted Cryptography: Revisiting MPC Bounds in the Proof-of-Work Era

Autoren: Juan Garay, Aggelos Kiayias, Rafail M. Ostrovsky, Giorgos Panagiotakos, Vassilis Zikas
Veröffentlicht in: Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part II, Ausgabe 12106, 2020, Seite(n) 129-158, ISBN 978-3-030-45723-5
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-45724-2_5

Combining Private Set-Intersection with Secure Two-Party Computation

Autoren: Michele Ciampi, Claudio Orlandi
Veröffentlicht in: Security and Cryptography for Networks - 11th International Conference, SCN 2018, Amalfi, Italy, September 5–7, 2018, Proceedings, Ausgabe 11035, 2018, Seite(n) 464-482, ISBN 978-3-319-98112-3
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-319-98113-0_25

On the Security Properties of e-Voting Bulletin Boards

Autoren: Aggelos Kiayias, Annabell Kuldmaa, Helger Lipmaa, Janno Siim, Thomas Zacharias
Veröffentlicht in: Security and Cryptography for Networks - 11th International Conference, SCN 2018, Amalfi, Italy, September 5–7, 2018, Proceedings, Ausgabe 11035, 2018, Seite(n) 505-523, ISBN 978-3-319-98112-3
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-319-98113-0_27

Non-interactive Secure Computation from One-Way Functions

Autoren: Saikrishna Badrinarayanan, Abhishek Jain, Rafail Ostrovsky, Ivan Visconti
Veröffentlicht in: Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part III, Ausgabe 11274, 2018, Seite(n) 118-138, ISBN 978-3-030-03331-6
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-03332-3_5

Publicly Verifiable Proofs from Blockchains

Autoren: Alessandra Scafuro, Luisa Siniscalchi, Ivan Visconti
Veröffentlicht in: Public-Key Cryptography – PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I, Ausgabe 11442, 2019, Seite(n) 374-401, ISBN 978-3-030-17252-7
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-17253-4_13

DL-Extractable UC-Commitment Schemes

Autoren: Behzad Abdolmaleki, Karim Baghery, Helger Lipmaa, Janno Siim, Michał Zając
Veröffentlicht in: Applied Cryptography and Network Security - 17th International Conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019, Proceedings, Ausgabe 11464, 2019, Seite(n) 385-405, ISBN 978-3-030-21567-5
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-21568-2_19

UC-Secure CRS Generation for SNARKs

Autoren: Behzad Abdolmaleki, Karim Baghery, Helger Lipmaa, Janno Siim, Michał Zając
Veröffentlicht in: Progress in Cryptology – AFRICACRYPT 2019 - 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9–11, 2019, Proceedings, Ausgabe 11627, 2019, Seite(n) 99-117, ISBN 978-3-030-23695-3
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-23696-0_6

On the Efficiency of Privacy-Preserving Smart Contract Systems

Autoren: Karim Baghery
Veröffentlicht in: Progress in Cryptology – AFRICACRYPT 2019 - 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9–11, 2019, Proceedings, Ausgabe 11627, 2019, Seite(n) 118-136, ISBN 978-3-030-23695-3
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-23696-0_7

Channels: Horizontal Scaling and Confidentiality on Permissioned Blockchains

Autoren: Elli Androulaki, Christian Cachin, Angelo De Caro, Eleftherios Kokoris-Kogias
Veröffentlicht in: Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I, Ausgabe 11098, 2018, Seite(n) 111-131, ISBN 978-3-319-99072-9
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-319-99073-6_6

Terrorist Attacks for Fake Exposure Notifications in Contact Tracing Systems

Autoren: Gennaro Avitabile, Daniele Friolo, Ivan Visconti
Veröffentlicht in: Applied Cryptography and Network Security - 19th International Conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021, Proceedings, Part I, Ausgabe 12726, 2021, Seite(n) 220-247, ISBN 978-3-030-78371-6
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-78372-3_9

SoK: A Consensus Taxonomy in the Blockchain Era

Autoren: Juan Garay, Aggelos Kiayias
Veröffentlicht in: Topics in Cryptology – CT-RSA 2020 - The Cryptographers’ Track at the RSA Conference 2020, San Francisco, CA, USA, February 24–28, 2020, Proceedings, Ausgabe 12006, 2020, Seite(n) 284-318, ISBN 978-3-030-40185-6
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-40186-3_13

Fast Secure Comparison for Medium-Sized Integers and Its Application in Binarized Neural Networks

Autoren: Mark Abspoel, Niek J. Bouman, Berry Schoenmakers, Niels de Vreede
Veröffentlicht in: Topics in Cryptology – CT-RSA 2019 - The Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March 4–8, 2019, Proceedings, Ausgabe 11405, 2019, Seite(n) 453-472, ISBN 978-3-030-12611-7
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-12612-4_23

Multi-Client Functional Encryption for Separable Functions

Autoren: Michele Ciampi, Luisa Siniscalchi, Hendrik Waldner
Veröffentlicht in: Public-Key Cryptography – PKC 2021 - 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part I, Ausgabe 12710, 2021, Seite(n) 724-753, ISBN 978-3-030-75244-6
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-75245-3_26

Blockchains from Non-idealized Hash Functions

Autoren: Juan A. Garay, Aggelos Kiayias, Giorgos Panagiotakos
Veröffentlicht in: Theory of Cryptography - 18th International Conference, TCC 2020, Durham, NC, USA, November 16–19, 2020, Proceedings, Part I, Ausgabe 12550, 2020, Seite(n) 291-321, ISBN 978-3-030-64374-4
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-64375-1_11

Updatable Blockchains

Autoren: Michele Ciampi, Nikos Karayannidis, Aggelos Kiayias, Dionysis Zindros
Veröffentlicht in: Computer Security – ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14–18, 2020, Proceedings, Part II, Ausgabe 12309, 2020, Seite(n) 590-609, ISBN 978-3-030-59012-3
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-59013-0_29

UC-Secure Multiparty Computation from One-Way Functions Using Stateless Tokens

Autoren: Saikrishna Badrinarayanan, Abhishek Jain, Rafail Ostrovsky, Ivan Visconti
Veröffentlicht in: Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part II, Ausgabe 11922, 2019, Seite(n) 577-605, ISBN 978-3-030-34620-1
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-34621-8_21

Mining for Privacy: How to Bootstrap a Snarky Blockchain

Autoren: Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss
Veröffentlicht in: 2021
Herausgeber: FC 2021

Threshold Garbled Circuits and Ad Hoc Secure Computation

Autoren: Michele Ciampi, Vipul Goyal, Rafail Ostrovsky
Veröffentlicht in: 2021
Herausgeber: IACR

Chronos: Secure and Accurate Time-Stamping Scheme for Digital Files via Blockchain

Autoren: Yuan Zhang, Chunxiang Xu, Hongwei Li, Haomiao Yang, Xuemin Shen
Veröffentlicht in: ICC 2019 - 2019 IEEE International Conference on Communications (ICC), 2019, Seite(n) 1-6, ISBN 978-1-5386-8088-9
Herausgeber: IEEE
DOI: 10.1109/icc.2019.8762071

Sonic - Zero-Knowledge SNARKs from Linear-Size Universal and Updatable Structured Reference Strings

Autoren: Mary Maller, Sean Bowe, Markulf Kohlweiss, Sarah Meiklejohn
Veröffentlicht in: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019, Seite(n) 2111-2128, ISBN 9781450367479
Herausgeber: ACM
DOI: 10.1145/3319535.3339817

Efficient State Management in Distributed Ledgers

Autoren: Dimitris Karakostas and Nikos Karayannidis and Aggelos Kiayias
Veröffentlicht in: 2021
Herausgeber: FC 2021

Shielded Computations in Smart Contracts Overcoming Forks

Autoren: Vincenzo Botta, Daniele Friolo, Daniele Venturi, Ivan Visconti
Veröffentlicht in: 2021
Herausgeber: FC 2021

Composition with Knowledge Assumptions

Autoren: Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss
Veröffentlicht in: 2021
Herausgeber: IACR

Efficient Secure Ridge Regression from Randomized Gaussian Elimination

Autoren: Frank Blom, Niek J. Bouman, Berry Schoenmakers and Niels de Vreede
Veröffentlicht in: 2021
Herausgeber: CSCML 2021

Privacy-preserving auditable token payments in a permissioned blockchain system

Autoren: Elli Androulaki, Jan Camenisch, Angelo De Caro, Maria Dubovitskaya, Kaoutar Elkhiyaoui, Björn Tackmann
Veröffentlicht in: Proceedings of the 2nd ACM Conference on Advances in Financial Technologies, 2020, Seite(n) 255-267, ISBN 9781450381390
Herausgeber: ACM
DOI: 10.1145/3419614.3423259

Ouroboros Genesis - Composable Proof-of-Stake Blockchains with Dynamic Availability

Autoren: Christian Badertscher, Peter Gaži, Aggelos Kiayias, Alexander Russell, Vassilis Zikas
Veröffentlicht in: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security - CCS '18, 2018, Seite(n) 913-930, ISBN 9781450356930
Herausgeber: ACM Press
DOI: 10.1145/3243734.3243848

On Trade-offs of Applying Block Chains for Electronic Voting Bulletin Boards

Autoren: Sven Heiberg, Ivo Kubjas, Janno Siim, Jan Willemson
Veröffentlicht in: 2018, Seite(n) 259-276, ISBN 978-9949-83-335-1
Herausgeber: TTÜ Press

Another Look at Extraction and Randomization of Groth's zk-SNARK

Autoren: Karim Baghery and Markulf Kohlweiss and Janno Siim and Mikhail Volkhov
Veröffentlicht in: 2021
Herausgeber: FC 2021

Kachina - Foundations of Private Smart Contracts

Autoren: Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss
Veröffentlicht in: 2021
Herausgeber: IEE

Proof-of-Stake Sidechains

Autoren: Peter Gazi, Aggelos Kiayias, Dionysis Zindros
Veröffentlicht in: 2019 IEEE Symposium on Security and Privacy (SP), 2019, Seite(n) 139-156, ISBN 978-1-5386-6660-9
Herausgeber: IEEE
DOI: 10.1109/sp.2019.00040

Ouroboros Crypsinous: Privacy-Preserving Proof-of-Stake

Autoren: Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss, Vassilis Zikas
Veröffentlicht in: 2019 IEEE Symposium on Security and Privacy (SP), 2019, Seite(n) 157-174, ISBN 978-1-5386-6660-9
Herausgeber: IEEE
DOI: 10.1109/sp.2019.00063

Verified security of BLT signature scheme

Autoren: Denis Firsov, Ahto Buldas, Ahto Truu, Risto Laanoja
Veröffentlicht in: Proceedings of the 9th ACM SIGPLAN International Conference on Certified Programs and Proofs, 2020, Seite(n) 244-257, ISBN 9781450370974
Herausgeber: ACM
DOI: 10.1145/3372885.3373828

Towards Defeating Mass Surveillance and SARS-CoV-2: The Pronto-C2 Fully Decentralized Automatic Contact Tracing System

Autoren: Gennaro Avitabile, Vincenzo Botta, Vincenzo Iovino, Ivan Visconti
Veröffentlicht in: 2021
Herausgeber: NDSS

Suche nach OpenAIRE-Daten ...

Bei der Suche nach OpenAIRE-Daten ist ein Fehler aufgetreten

Es liegen keine Ergebnisse vor