Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1007/978-3-031-32415-4guideproceedingsBook PagePublication PagesConference Proceedingsacm-pubtype
Financial Cryptography and Data Security. FC 2022 International Workshops: CoDecFin, DeFi, Voting, WTSC, Grenada, May 6, 2022, Revised Selected Papers
2022 Proceeding
Publisher:
  • Springer-Verlag
  • Berlin, Heidelberg
Conference:
International Conference on Financial Cryptography and Data SecurityGrenada, Grenada6 May 2022
ISBN:
978-3-031-32414-7
Published:
06 May 2022

Reflects downloads up to 01 Mar 2025Bibliometrics
Abstract

No abstract available.

front-matter
Front Matter
Pages i–xxiv
back-matter
Back Matter
Article
Front Matter
Page 1
Article
Stakechain: A Bitcoin-Backed Proof-of-Stake
Abstract

We propose an energy-efficient solution to the double-spending problem using a bitcoin-backed proof-of-stake. Stakers vote on sidechain blocks forming a record that cannot be changed without destroying their collateral. Every user can become a ...

Article
Drivers of Bitcoin Energy Use and Emissions
Abstract

The global Bitcoin mining industry has grown to a size where its overall energy consumption is frequently compared to that of entire countries. Indeed, as of 30 April 2022, following the successful migration of the entire Chinese mining industry ...

Article
Integrated Power Plant and Bitcoin Mining Economics
Abstract

Bitcoin mining can be a difficult process to understand much less model. It is confounded by currency exchange rates and jurisdictional taxes along with rapid historical technological development. We present a framework for simplifying the ...

Article
Carbon-Neutral Bitcoin for Nation States
Abstract

Sovereign adoption of bitcoin, whether as legal tender or in treasury reserves, increases the profitability of energy-intensive bitcoin mining, creating significant carbon emissions. This paper explores methods for adopting bitcoin while ...

Article
Soundness of Stablecoins
Abstract

Stablecoin regulation is an important topic in crypto assets. As some assumed there were no regulations for crypto assets before, it can be painful for the crypto industry to be compliant with financial regulations. Traditional finance (tradfi) ...

Article
Estimating (Miner) Extractable Value is Hard, Let’s Go Shopping!
Abstract

The term miner extractable value (MEV) has been coined to describe the value which can be extracted by a miner, e.g., from manipulating the order of transactions within a given timeframe. MEV has been deemed an important factor to assess the ...

Article
Teaching PoW Algorithm to a Classroom Environment
Abstract

In this note we explain our method to teach various consensus algorithms in the classroom. We accomplish that by creating slightly modifying PoS algorithm to create a version which is equivalent to PoW consensus algorithms.

Article
The Compatibility of CBDCs with “DeFi” Protocols: A Governance Rather Than a Technological Issue to Comply with Financial Crime Regulations
Abstract

Decentralized finance (“DeFi”) has become a cornerstone of crypto-asset markets since 2020. While most academic studies focus primarily on technological impacts, this paper is rather based on the factual observation that corporations are ...

Article
Broken Proofs of Solvency in Blockchain Custodial Wallets and Exchanges
Abstract

Since the Mt. Gox Bitcoin exchange collapse in 2014, a number of custodial cryptocurrency wallets offer a form of financial solvency proofs to bolster their users’ confidence. We identified that despite recent academic works that highlight ...

Article
Privacy-Preserving Post-quantum Credentials for Digital Payments
Abstract

Digital payments and decentralized systems enable new financial products and services for users. A core challenge stems from the need to protect users from fraud and abuse while retaining privacy in individual transactions. Proposed herein is a ...

Article
ZKFlow: Private Transactions in Corda with ZKP
Abstract

Corda is a permissioned distributed ledger platform that enables enterprises to manage their business deals and obligations in a decentralized manner. Its unique ledger structure, which requires sharing the content of a transaction only to ...

Article
User-Perceived Privacy in Blockchain
Abstract

This paper studies users’ privacy perceptions of UTXO-based blockchains such as Bitcoin. It elaborates – based on interviews and questionnaires – on a mental model of employing privacy-preserving techniques for blockchain transactions. Furthermore,...

Article
Front Matter
Page 195
Article
A Short Survey on Business Models of Decentralized Finance (DeFi) Protocols
Abstract

Decentralized Finance (DeFi) services are moving traditional financial operations to the Internet of Value (IOV) by exploiting smart contracts, distributed ledgers, and transactions among different protocols. The exponential increase of the Total ...

Article
On-Chain Auctions with Deposits
Abstract

Sealed-bid auctions with deposits are frequently used in blockchain environments. An auction takes place on-chain: bidders deposit an amount that fully covers their bid (but possibly exceeds it) in a smart contract. The deposit is used as ...

Article
The Case for Variable Fees in Constant Product Markets: An Agent Based Simulation
Abstract

We are interested in how the relationship between the fee in a constant product market (CPM) and the volatility of the swapped pair on other liquid exchanges influences the losses/gains of the liquidity providers. We review three classical market ...

Article
An Empirical Study of Market Inefficiencies in Uniswap and SushiSwap
Abstract

Decentralized exchanges are revolutionizing finance. With their ever-growing increase in popularity, a natural question that begs to be asked is: how efficient are these new markets?

We find that nearly 30% of analyzed trades are executed at an ...

Article
SoK: Mitigation of Front-Running in Decentralized Finance
Abstract

Front-running is the malicious, and often illegal, act of both manipulating the order of pending trades and injecting additional trades to make a profit at the cost of other users. In decentralized finance (DeFi), front-running strategies exploit ...

Article
A Systematic Investigation of DeFi Compositions in Ethereum
Abstract

The rapid growth of the Ethereum ecosystem since 2020 has been driven by the proliferation of several DeFi protocols [10], which are application-layer programs that provide Decentralized Finance (DeFi) services [14, 16] such as the exchange of ...

Article
Short Paper: Privacy Preserving Decentralized Netting
Abstract

This paper proposes a secure decentralized protocol that a consortium of local banks can use to complete a netting process in a privacy-preserving fashion without relying on a single central bank. To do so, it makes use of two key ingredients - ...

Article
NFT Wash Trading: Quantifying Suspicious Behaviour in NFT Markets
Abstract

The smart contract-based markets for non-fungible tokens (NFTs) on the Ethereum blockchain have seen tremendous growth in 2021, with trading volumes peaking at $3.5b in September 2021. This dramatic surge has led to industry observers questioning ...

Article
Front Matter
Page 313
Article
Individual Verifiability and Revoting in the Estonian Internet Voting System
Abstract

Individual verifiability remains one of the main practical challenges in e-voting systems and, despite the central importance of this property, countries that sought to offer it to their voters faced repeated security problems.

In this note, we ...

Article
Breaking and Fixing Vote Privacy of the Estonian E-Voting Protocol IVXV
Abstract

We revisit the e-voting protocol IVXV that is used for legally-binding political elections in Estonia from a privacy perspective. We demonstrate that IVXV is vulnerable to attacks against vote privacy in those threat scenarios that were considered ...

Article
German Voters’ Attitudes Towards Voting Online with a Verifiable System
Abstract

A representative study came to the conclusion that more than 63% of German voters would have like to cast their vote for the federal election in 2021 online. In this paper, we aimed to investigate why Germans might be in favour or against online ...

Article
Simulations of Ballot Polling Risk-Limiting Audits
Abstract

In this paper we present simulation results comparing the risk, stopping probability, and number of ballots required over multiple rounds of ballot polling risk-limiting audits (RLAs) Minerva, Selection-Ordered (SO) Bravo, and End-of-Round (EoR) ...

Article
A First Approach to Risk-Limiting Audits for Single Transferable Vote Elections
Abstract

Risk-limiting audits (RLAs) are an increasingly important method for checking that the reported outcome of an election is, in fact, correct. Indeed, their use is increasingly being legislated. While effective methods for RLAs have been developed ...

Contributors
  • Georgetown University
  • Imperial College London
  • Cornell University
  • Imperial College London
  • The Australian National University
  • Western University
  • University of Stirling
  • University of Trento
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations