default search action
21st Financial Cryptography 2017: Sliema, Malta - Workshops
- Michael Brenner, Kurt Rohloff, Joseph Bonneau, Andrew Miller, Peter Y. A. Ryan, Vanessa Teague, Andrea Bracciali, Massimiliano Sala, Federico Pintore, Markus Jakobsson:
Financial Cryptography and Data Security - FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10323, Springer 2017, ISBN 978-3-319-70277-3
Encrypted Computing and Applied Homomorphic Cryptography
- Hao Chen, Kim Laine, Rachel Player:
Simple Encrypted Arithmetic Library - SEAL v2.1. 3-18 - Stefan Wüller, Ulrike Meyer, Susanne Wetzel:
Towards Privacy-Preserving Multi-party Bartering. 19-34 - James Alderman, Keith M. Martin, Sarah Louise Renwick:
Multi-level Access in Searchable Symmetric Encryption. 35-52 - Jung Hee Cheon, Jinhyuck Jeong, Joohee Lee, Keewoo Lee:
Privacy-Preserving Computations of Predictive Medical Models with Minimax Approximation and Non-Adjacent Form. 53-74 - James Alderman, Benjamin R. Curtis, Oriol Farràs, Keith M. Martin, Jordi Ribes-González:
Private Outsourced Kriging Interpolation. 75-90 - Joël Cathébras, Alexandre Carbon, Renaud Sirdey, Nicolas Ventroux:
An Analysis of FV Parameters Impact Towards Its Hardware Acceleration. 91-106 - Yvo Desmedt, Vincenzo Iovino, Giuseppe Persiano, Ivan Visconti:
Controlled Homomorphic Encryption: Definition and Construction. 107-129
Bitcoin and Blockchain Research
- Tim Ruffing, Pedro Moreno-Sanchez:
ValueShuffle: Mixing Confidential Transactions for Comprehensive Transaction Privacy in Bitcoin. 133-154 - Till Neudecker, Hannes Hartenstein:
Could Network Information Facilitate Address Clustering in Bitcoin? 155-169 - Tim Ruffing, Giulio Malavolta:
Switch Commitments: A Safety Switch for Confidential Transactions. 170-181 - Philip Daian, Ittay Eyal, Ari Juels, Emin Gün Sirer:
(Short Paper) PieceWork: Generalized Outsourcing Control for Proofs of Work. 182-190 - Russell O'Connor, Marta Piekarska:
Enhancing Bitcoin Transactions with Covenants. 191-198 - Iddo Bentov, Alex Mizrahi, Meni Rosenfeld:
Decentralized Prediction Market Without Arbiters. 199-217 - Massimo Bartoletti, Livio Pompianu:
An Analysis of Bitcoin OP_RETURN Metadata. 218-230 - Massimo Bartoletti, Roberto Zunino:
Constant-Deposit Multiparty Lotteries on Bitcoin. 231-247 - Stephen Ranshous, Cliff A. Joslyn, Sean Kreyling, Kathleen Nowak, Nagiza F. Samatova, Curtis L. West, Samuel Winters:
Exchange Pattern Mining in the Bitcoin Transaction Directed Hypergraph. 248-263 - Kevin Liao, Jonathan Katz:
Incentivizing Blockchain Forks via Whale Transactions. 264-279 - Svetlana Abramova, Pascal Schöttle, Rainer Böhme:
Mixing Coins of Different Quality: A Game-Theoretic Approach. 280-297 - Yaron Velner, Jason Teutsch, Loi Luu:
Smart Contracts Make Bitcoin Mining Pools Vulnerable. 298-316 - Ronald L. Rivest, Philip B. Stark, Zara Perumal:
BatchVote: Voting Rules Designed for Auditability. 317-333
Advances in Secure Electronic Voting Schemes
- R. Ramanujam, Vaishnavi Sundararajan, S. P. Suresh:
Existential Assertions for Voting Protocols. 337-352 - Olivier Pereira, Ronald L. Rivest:
Marked Mix-Nets. 353-369 - Rolf Haenni, Philipp Locher, Reto E. Koenig, Eric Dubuis:
Pseudo-Code Algorithms for Verifiable Re-encryption Mix-Nets. 370-384 - Vincenzo Iovino, Alfredo Rial, Peter B. Rønne, Peter Y. A. Ryan:
Using Selene to Verify Your Vote in JCJ. 385-403 - Kristian Gjøsteen, Martin Strand:
A Roadmap to Fully Homomorphic Elections: Stronger Security, Better Verifiability. 404-418 - Oksana Kulyk, Stephan Neumann, Karola Marky, Melanie Volkamer:
Enabling Vote Delegation for Boardroom Voting. 419-433 - Nan Yang, Jeremy Clark:
Practical Governmental Voting with Unconditional Integrity and Privacy. 434-449
Trusted Smart Contracts
- Alex Biryukov, Dmitry Khovratovich, Sergei Tikhomirov:
Findel: Secure Derivative Contracts for Ethereum. 453-467 - Lin Chen, Lei Xu, Nolan Shah, Zhimin Gao, Yang Lu, Weidong Shi:
Decentralized Execution of Smart Contracts: Agent Model Perspective and Its Implications. 468-477 - Ilya Sergey, Aquinas Hobor:
A Concurrent Perspective on Smart Contracts. 478-493 - Massimo Bartoletti, Livio Pompianu:
An Empirical Analysis of Smart Contracts: Platforms, Applications, and Design Patterns. 494-509 - Firas Al Khalil, Tom Butler, Leona O'Brien, Marcello Ceci:
Trust in Smart Contracts is a Process, As Well. 510-519 - Yoichi Hirai:
Defining the Ethereum Virtual Machine for Interactive Theorem Provers. 520-535 - Abhiram Kothapalli, Andrew Miller, Nikita Borisov:
SmartCast: An Incentive Compatible Consensus Protocol Using Smart Contracts. 536-552 - Shayan Eskandari, Jeremy Clark, Vignesh Sundaresan, Moe Adham:
On the Feasibility of Decentralized Derivatives Markets. 553-567 - Massimo Bartoletti, Stefano Lande, Alessandro Sebastian Podda:
A Proof-of-Stake Protocol for Consensus on Bitcoin Subchains. 568-584
Targeted Attacks
- Hossein Siadati, Toan Nguyen, Nasir D. Memon:
X-Platform Phishing: Abusing Trust for Targeted Attacks Short Paper. 587-596 - Ana Ferreira, Rui Chilro:
What to Phish in a Subject? 597-609 - Zinaida Benenson, Freya Gassmann, Robert Landwirth:
Unpacking Spear Phishing Susceptibility. 610-627
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.