This Week in Blockchain Research Issue #67

Issue #67


Issue #67

Paper of the Week:

Paper Title: A Gas-Efficient Superlight Bitcoin Client in Solidity.

TLDR:

  1. Blockchain interoperability is the ability of distinct blockchains to communicate. This crosschain communication enables useful features across blockchains such as the transfer of assets from one chain to another (one-way peg) and back (two-way peg), as well as the generic passing of information from chain to chain.

  2. To date, there is no commonly accepted decentralized pro- tocol that enables cross-chain transactions.

  3. In order to perform crosschain operations, mechanism that allows users of blockchain A to discover events that have occurred in chain B, such as settled transactions, must be introduced.

  4. One tricky aspect is to ensure the atomicity of such operations, which require that either the transactions take place in both chains, or in neither. This is achievable through atomic swaps.

  5. However, atomic swaps provide limited functionality in that they do not allow the generic transfer of information from one blockchain to a smart contract in another.

  6. By utilizing superlight client protocols, a compressed proof for an event in chain A is constructed and dispatched to chain B. This communication is realized without the intervention of trusted third-parties.

  7. This work leverages superblocks Non-Interactive Proofs of Proof-of-Work (NIPoPoWs) as the fundamental building block and refines it to provide a practical solution. The result is the first on-chain decentralized client that securely verifies crosschain events and is practical.

AuthorsStelios Daveas†, Kostis Karantias‡, Aggelos Kiayias*‡, and Dionysis Zindros†‡,

Affiliations: * University of Edinburgh, † University of Athens, and ‡ IOHK.


Security:

No papers.


Privacy:

1. Paper Title: Data Confidentiality In P2P Communication And Smart Contracts Of Blockchain In Industry 4.0.

Summary: An audit trail can be managed by the blockchain without having send the data through the blockchain.

Authors: Jan Stodt* and Christoph Reich*,

Affiliations* University of Applied Sciences Furtwangen.


Scalability:

No papers.


Proofs:

No papers.


Consensus:

1. Paper Title: Formalizing Nakamoto-Style Proof of Stake.

Summary: The first machine checked proof that guarantees both safety and liveness for a consensus algorithm.

Authors: Søren Eller Thomsen* and Bas Spitters*,

Affiliations* Aarhus University.

2. Paper Title: Optimal Communication Complexity of Byzantine Consensus under Honest Majority.

Summary: A Byzantine consistent broadcast (BCB) protocol with linear communication complexity when f ≤ (1/2 − ε)n where ε is any positive constant.

Authors: Atsuki Momose* and Ling Ren†,

Affiliations* Nagoya University and † University of Illinois at Urbana-Champaign.

3. Paper Title: Blockchain Is Dead, Long Live Blockchain! Accountable State Machine Replication for Longlasting Blockchain.

Summary: The first Longlasting Blockchain system, that relies on the deceitful failure model where most replicas are either incentivized to foment a coalition and steal assets or rewarded to participate correctly.

Authors: Alejandro Ranchal-Pedrosa* and Vincent Gramoli*†,

Affiliations* University of Sydney and † EPFL.


Tokenomics:

1. Paper Title: Blockchain and Cryptocurrencies: a Classification and Comparison of Architecture Drivers.

Summary: A conceptual framework to aid software architects, developers, and decision makers to adopt the right blockchain technology. 

AuthorsMartin Garriga*†$, Stefano Dalla Palma*†, Maxmiliano Arias‡, Alan De Renzis‡, Remo Pareschi§, Damian Andrew Tamburri†✜,

Affiliations: * Tilburg School of Economics and Management, † Jheronimus Academy of Data Science, ‡ Fidtech, § University of Molise, ✜ Technical Univ. of Eindhoven, $ National University of Comahue.


Conferences, Journals, & CFPs:


Conferences’ Videos:


Jobs:


RFPs:


This newsletter is for informational purposes only. This content does not in any way constitute an offer or solicitation of an offer to buy or sell any investment solution or recommendation to buy or sell a security; nor it is to be taken as legal, business, investment, or tax advice. In fact, none of the information in this or other content on zk Capital should be relied on in any manner as advice. None of the authors, contributors, or anyone else connected with zk Capital, in any way whatsoever, can be responsible for your use of the information contained in this newsletter.

This Week in Blockchain Research Issue #66

Issue #66


Issue #66

Paper of the Week:

Paper Title: Updatable Blockchains.

TLDR:

  1. For blockchain systems, a typical source of software updates is the enhancements at the consensus protocol level. There might be changes to the values of specific parameters (e.g., the maximum block size, or the maximum transaction size etc.), changes to the validation rules at any level (transaction, block, or blockchain), or even changes at the consensus protocol itself.

  2. Usually, the reason for such changes is the reinforcement of the protocol against a broader scope of adversary attacks, or the optimization of some aspect of the system like the transaction throughput, or the storage cost etc.

  3. A software update’s lifecycle comprises of three important decision points: a) What update proposal should be implemented, b) is a specific implementation appropriate to be deployed and c) when and how the changes should be activated on the blockchain.

  4. This paper does not focus on how to achieve decentralized governance for software updates. Indeed, it assumes that appropriate decentralized governance processes (e.g., voting, delegation of voting, upgrade-readiness signaling etc.) are in place and the community has already reached a consensus on what specific update should be activated and this information is written on the blockchain.

  5. Moreover, it assumes that a sufficient percent of honest parties have expressed (e.g. through a signaling mechanism) their readiness to upgrade to the new ledger.

  6. It deals with the secure activation of software update changes on the blockchain in a fully decentralized setting and essentially provide a way to safely transition from the old ledger to the upgraded ledger without the need of a trusted third party.

  7. Moreover, it defines what is a secure activation of changes by introducing the notion of updatable blockchains. The approach is the first that treats the problem of decentralized activation of updates for blockchains in such a formal way providing a security definition for updatable blockchain and generic constructions. 

AuthorsMichele Ciampi†, Nikos Karayannidis*, Aggelos Kiayias*†, and Dionysis Zindros‡,

Affiliations: * IOHK, † The University of Edinburgh, and ‡ National and Kapodistrian University of Athens.


Security:

1. Paper Title: Multi-Currency Ledgers.

Summary: This paper extends an abstract formal model of UTxO-based and account-based transactions to allow the creation and use of multiple cryptocurrencies on a single ledger.

Authors: Joachim Zahnentferner*,

Affiliations* IOHK.

2. Paper Title: A Blockchain-based Iterative Double Auction Protocol using Multiparty State Channels.

Summary: A novel decentralized and trustless framework for iterative double auction based on blockchain.

Authors: Truc D. T. Nguyen* and My T. Thai*,

Affiliations* University of Florida.

3. Paper Title: Denial-of-Service Vulnerability of Hash-based Transaction Sharding: Attacks and Countermeasures.

Summary: A single-shard flooding attack to exploit the DoS vulnerability of blockchain sharding.

Authors: Truc D. T. Nguyen*, and My T. Thai*,

Affiliations* University of Florida.

4. Paper Title: Model Checking Bitcoin and other Proof-of-Work Consensus Protocols.

Summary: A formal model based on the Bitcoin Backbone Protocol abstraction and use a statistical model checking tool (UPPAAL-SMC) to study its security.

Authors: Max DiGiacomo-Castillo*, Yiyun Liang*, Advay Pal*, John C. Mitchell*,

Affiliations* Stanford University.

5. Paper Title: STAN: Towards Describing Bytecodes of Smart Contract.

Summary: The first system to generate descriptions for the bytecodes of smart contracts to help users comprehend them.

Authors: Xiaoqi Li*, Ting Chen†, Xiapu Luo*, Tao Zhang‡, Le Yu*, Zhou Xu*§,

Affiliations* The Hong Kong Polytechnic University, † University of Electronic Science and Technology of China, ‡ Macau University of Science and Technology, and § Chongqing University.


Privacy:

No papers.


Scalability:

1. Paper Title: OptChain: Optimal Transactions Placement for Scalable Blockchain Sharding.

Summary: A new sharding paradigm in which cross-shard transactions are minimized, resulting in almost twice faster confirmation time and throughput.

Authors: Lan N. Nguyen*, Truc D. T. Nguyen*, Thang N. Dinh†, My T. Thai*,

Affiliations* University of Florida and † Virginia Commonwealth University.


Proofs:

No papers.


Consensus:

1. Paper Title: Blockchain Is Dead, Long Live Blockchain! Accountable State Machine Replication for Longlasting Blockchain.

Summary: A blockchain that builds upon a new deceitful failure model specific to distributed payment systems where most replicas are incentivized to act correctly or foment a coalition.

Authors: Alejandro Ranchal-Pedrosa* and Vincent Gramoli*†,

Affiliations* University of Sydney and † EPFL.

2. Paper Title: Green-PoW: An Energy-Efficient Blockchain Proof-of-Work Consensus Algorithm.

Summary: This paper opts to mitigate the energy-inefficiency of the Blockchain Proof-of-Work (PoW) consensus algorithm by rationally repurposing the power spent during the mining process.

AuthorsNoureddine Lasla*, Lina Salim Alsahan*, Mohamed Abdallah*, and Mohamed Younis†,

Affiliations: Hamad Bin Khalifa University and † University of Maryland.


Tokenomics:

1. Paper Title: Dynamic Trade Finance in the Presence of Information Frictions and FinTech.

Summary: This work studies the value of a type of innovative bank-intermediated trade finance contract, called dynamic trade finance (DTF, under which banks dynamically adjust loan interest rates as an order passes through different steps in the trade process) in the presence of information frictions related to process uncertainties, and its strategic interaction with FinTech.

AuthorsHau L. Lee*, Christopher S. Tang†, S. Alex Yang‡, and Yuxuan Zhang§,

Affiliations: * Stanford University, † UCLA, ‡ London Business School, and § Tsinghua University.

2. Paper Title: The Puzzle of Squaring Blockchainwith the General Data Protection Regulation.

Summary: This Article is the first to provide an overview of blockchain technology that distinguishes between the variety of centralized and decentralized data governance models.

AuthorsRaffi Teperdjian*,

Affiliations: * George Washington University.


Conferences, Journals, & CFPs:


Conferences’ Videos:


Jobs:


RFPs:


This newsletter is for informational purposes only. This content does not in any way constitute an offer or solicitation of an offer to buy or sell any investment solution or recommendation to buy or sell a security; nor it is to be taken as legal, business, investment, or tax advice. In fact, none of the information in this or other content on zk Capital should be relied on in any manner as advice. None of the authors, contributors, or anyone else connected with zk Capital, in any way whatsoever, can be responsible for your use of the information contained in this newsletter.

This Week in Blockchain Research Issue #65

Issue #65


Issue #65

Paper of the Week:

Paper Title: Asynchronous Byzantine Agreement with Subquadratic Communication.

TLDR:

  1. Is it possible to design an asynchronous Byzantine Agreement (BA) protocol with subquadratic communication complexity that tolerates Θ(n) adaptive corruptions?

  2. This work gives both positive and negative answers to this question.

  3. First, it shows asynchronous BA protocols with (expected) subquadratic communication complexity that can tolerate adaptive corruption of any f ≤ (1 − ε)n/3 of the parties, for arbitrary ε > 0.

  4. Using a trusted dealer, it can achieve an unbounded number of BA executions with o(n2) communication per execution.

  5. Alternately, it can avoid a trusted dealer by having the parties run an arbitrary adaptively secure MPC protocol to generate the initial setup.

  6. This work justifies its reliance on a trusted dealer by showing that some form of setup is necessary for (non-amortized) subquadratic BA tolerating Θ(n) corrupted parties.

AuthorsErica Blum*, Jonathan Katz†, Chen-Da Liu-Zhang‡, and Julian Loss*,

Affiliations: * University of Maryland, † George Mason University, and ‡ ETH Zurich.


Security:

1. Paper Title: Proof of Storage-Time: Efficiently Checking Continuous Data Availability⋆.

Summary: PoSt is a challenge-response protocol that allows the prover to convince the verifier that data is continuously available and retrievable for a range of time.

Authors: Giuseppe Ateniese*, Long Chen†‡, Mohammad Etemad*, and Qiang Tang†‡,

Affiliations* Stevens Institute of Technology, † New Jersey Institute of Technology, and ‡ JDD-NJIT-ISCAS Joint Blockchain Lab.

2. Paper Title: Post-Quantum Adaptor Signatures and Payment Channel Networks.

Summary: The first post-quantum adaptor signature.

Authors: Muhammed F. Esgin*†, Oğuzhan Ersoy‡, and Zekeriya Erkin‡,

Affiliations* Monash University, † Data61 CSIRO, and ‡ Delft University of Technology.

3. Paper Title: SoK: A Taxonomy of Cryptocurrency Wallets.

Summary: The first definition of a cryptocurrency wallet, which is modeled as a client to a server, or a set of servers.

Authors: Kostis Karantias*

Affiliations* IOHK.

4. Paper Title: Efficient Final Exponentiation via Cyclotomic Structure for Pairings over Families of Elliptic Curves.

Summary: A new framework of efficient final exponentiation for pairings over families of elliptic curves.

Authors: Daiki Hayashida*, Kenichiro Hayasaka*, and Tadanori Teruya†,

Affiliations* Mitsubishi Electric Corporation and † National Institute of Advanced Industrial Science and Technology.

4. Paper Title: SmartBugs: A Framework to Analyze Solidity Smart Contracts.

Summary: An extensible and easy-to-use execution framework that simplifies the execution of analysis tools on smart contracts written in Solidity.

Authors: João F. Ferreira*, Pedro Cruz*, Thomas Durieux†, and Rui Abreu*,

Affiliations* University of Lisbon and † KTH Royal Institute of Technology.

5. Paper Title: BDTF: A Blockchain-Based Data Trading Framework with Trusted Execution Environment.

Summary: A novel blockchain-based data trading framework with Trusted Execution Environment (TEE) to provide a trusted decentralized platform for fair data trading.

Authors: Guoxiong Su*, Wenyuan Yang*, Zhengding Luo*, Yinghong Zhang*, Zhiqiang Bai*, Yuesheng Zhu*,

Affiliations* Peking University.


Privacy:

1. Paper Title: Dragoon: Private Decentralized HITs Made Practical.

Summary: A practical decentralized protocol for human intelligence tasks (HITs), which also achieves the fairness between requesters and workers.

Authors: Yuan Lu*, Qiang Tang*†, and Guiling Wang*,

Affiliations* New Jersey Institute of Technology and † JDD-NJIT-ISCAS Joint Blockchain Lab.

2. Paper Title: Agora: A Privacy-Aware Data Marketplace.

Summary: The first blockchain-based data marketplace that enables multiple privacy-concerned parties to get compensated for contributing and exchanging data, without relying on a trusted third party during the exchange.

Authors: Vlasis Koutsos*, Dimitrios Papadopoulos*, Dimitris Chatzopoulos*, Sasu Tarkoma*, and Pan Hui†, 

AffiliationsThe Hong Kong University of Science and Technology and † University of Helsinki.


Scalability:

No papers.


Proofs:

No papers.


Consensus:

1. Paper Title: Dumbo: Faster Asynchronous BFT Protocols.

Summary: Two new atomic broadcast protocols both of which have asymptotically and practically better efficiency.

Authors: Bingyong Guo*‡, Zhenliang Lu†‡, Qiang Tang†‡, Jing Xu*‡, Zhenfeng Zhang*‡,

Affiliations* Chinese Academy of Sciences, † New Jersey Institute of Technology, ‡ JDD-NJIT-ISCAS Joint Blockchain Lab.

2. Paper Title: Dumbo-MVBA: Optimal Multi-Valued Validated Asynchronous Byzantine Agreement, Revisited.

Summary: Two MVBA protocols that reduce the communication cost of prior art by an O(𝑛) factor, where 𝑛 is the number of parties.

AuthorsYuan Lu*, Zhenliang Lu*†, Qiang Tang*†, and Guiling Wang*,

Affiliations: * New Jersey Institute of Technology and † JDD-NJIT-ISCAS Joint Blockchain Lab.


Tokenomics:

1. Paper Title: Blockchain Use Cases for Inclusive FinTech: Scalability, Privacy, and Trust Distribution.

Summary: Mass adoption of blockchain technology will accelerate in financial industry and supply chain with private permissioned blockchains, but these e-inclusion projects using “Inclusive” Blockchain will take a longer time with OnChain/OffChain complexities.

AuthorsDavid LEE Kuo Chuen* and Caroline LIM Seow Ling,

Affiliations: * Singapore University of Social Sciences.


Conferences, Journals, & CFPs:


Conferences’ Videos:


Jobs:


RFPs:


This newsletter is for informational purposes only. This content does not in any way constitute an offer or solicitation of an offer to buy or sell any investment solution or recommendation to buy or sell a security; nor it is to be taken as legal, business, investment, or tax advice. In fact, none of the information in this or other content on zk Capital should be relied on in any manner as advice. None of the authors, contributors, or anyone else connected with zk Capital, in any way whatsoever, can be responsible for your use of the information contained in this newsletter.

This Week in Blockchain Research Issue #64

Issue #64


Issue #64

Paper of the Week:

Paper Title: Encrypted Blockchain Databases.

TLDR:

  1. Blockchain databases are a crucial technology for the development of non-trivial smart contracts, distributed applications and marketplaces. However, concerns over the confidentiality of the data they manage will increase.

  2. This work considers the problem of end-to-end encrypted blockchain databases. With such a system, a client can encrypt its database before storing it on the blockchain. To query it, the client uses its secret key and executes a query protocol with the blockchain.

  3. An encrypted NoSQL blockchain database can be trivially constructed from a decentralized/blockchain encrypted multi-map (EMM) since both key-value stores and document databases can be represented as dictionaries.

  4. The proposed blockchain EMM constructions can work on any blockchain. To achieve this level of generality, a simple abstraction called an append-only data store (ADS) is used that captures the properties and functionality of blockchains that needed.

  5. Three different constructions are presented: (i) A list-based construction, (ii) A tree-based construction, and (iii) A patched construction.

  6. This work also shows how to use the Ethereum and Algorand blockchains to instantiate an ADS.

  7. Lastly, the schemes are implemented on the Algorand testnet and evaluated under a variety of different settings.

AuthorsDaniel Adkins*, Archita Agarwal*, Seny Kamara*, Tarik Moataz†,

Affiliations: * Brown University and † Aroki Systems.


Security:

1. Paper Title: The Provable Security of Ed25519: Theory and Practice.

Summary: This work provides the first detailed analysis and security proofs of Ed25519 signature schemes.

Authors: Jacqueline Brendel*, Cas Cremers*, Dennis Jackson†, and Mang Zhao*,

Affiliations* CISPA Helmholtz Center for Information Security and † ETH Zurich.

2. Paper Title: Modified Secure Hashing algorithm(MSHA-512).

Summary: MSHA-512 with high performance having 40 rounds instead of 80 rounds when compared with SHA-512 algorithm.

Authors: Ashoka SB* and Lakshmikanth D*,

Affiliations* Maharani Cluster University.

3. Paper Title: Hunting for Re-Entrancy Attacks in Ethereum Smart Contracts via Static Analysis.

Summary: A static analysis tool, a combination of symbolic execution and equivalence checking by a satisfiability modulo theories solver to analyze smart contract vulnerabilities to re-entrancy attacks.

Authors: Yuichiro Chinen*, Naoto Yanai*, Jason Paul Cruz*, and Shingo Okamura†,

Affiliations* Osaka University and † National Institute of Technology.

4. Paper Title: Decentralized Lightweight Detection of Eclipse Attacks on Bitcoin Clients.

Summary: This work proposes two approaches for Bitcoin clients to detect whether an eclipse attack against them is ongoing.

AuthorsBithin Alangot*, Daniel Reijsbergen*, Sarad Venugopalan*, and Pawel Szalachowski*,

Affiliations: * Singapore University of Technology and Design.


Privacy:

1. Paper Title: Cross-Layer Deanonymization Methods in the Lightning Protocol.

Summary: Two novel linking algorithms to reveal the ownership of Bitcoin addresses that are controlled by LN nodes using publicly-available data.

Authors: Matteo Romiti*, Friedhelm Victor†, Pedro Moreno-Sanchez‡, Bernhard Haslhofer*, and Matteo Maffei‡,

Affiliations* Austrian Institute of Technology, † Technische Universität Berlin, and ‡ Technische Universität Wien,


Scalability:

1. Paper Title: Gravity: a blockchain-agnostic cross-chain communication and data oracles protocol.

Summary: The implementation of a complex interconnected network of oracles, supporting communication of blockchain networks with the outside world, cross-chain communication and transfers, as well as integrating sidechains, within one holistic and self-governing system.

Authors: Aleksei Pupyshev*, Dmitry Gubanov*, Elshan Dzhafarov*, llya Sapranidi*, Inal Kardanov*, Vladimir Zhuravlev*, Shamil Khalilov*, Marc Jansen*, Sten Laureyssens*, Igor Pavlov*, and Sasha Ivanov*,

Affiliations* Waves Association.


Proofs:

No papers.


Consensus:

1. Paper Title: Proofs of Useless Work Positive and Negative Results for Wasteless Mining Systems.

Summary: This work formally defines three properties that are necessary for wasteless PoW systems: (1) solve “meaningful” problems (2) solve them efficiently and (3) be secure against double-spend attacks.

Authors: Maya Dotan* and Saar Tochner*,

Affiliations* The Hebrew University of Jerusalem.


Tokenomics:

1. Paper Title: Backtesting of Algorithmic Cryptocurrency Trading Strategies.

Summary: A tool for backtesting algorithmic trading strategies for cryptocurrencies that provides a convenient way to automatically run comparisons of multi-dimensional parameter spaces for algorithmic trading strategies. 

AuthorsJan Spörer*

Affiliations: * Frankfurt School of Finance & Management.

2. Paper Title: Hashing Out Agreements: An Overview of 'Smart' Contracts under Canadian Law.

Summary: An overview of smart contracts under Canadian contract law.

AuthorsFlorian Martin-Bariteau* and Marco Pontello*,

Affiliations: * University of Ottawa.

3. Paper Title: Blockchain Collaboration with Competing Firms in a Shared Supply Chain: Benefits and Challenges.

Summary: It is important to understand firms’ incentives to join the blockchain consortium when the supply chain network becomes visible as a result.

AuthorsYao Cui*, Vishal Gaur*, and Jingchen Liu†,

Affiliations: * Cornell University and † Nanjing University.


Conferences, Journals, & CFPs:


Conferences’ Videos:


Jobs:


RFPs:


This newsletter is for informational purposes only. This content does not in any way constitute an offer or solicitation of an offer to buy or sell any investment solution or recommendation to buy or sell a security; nor it is to be taken as legal, business, investment, or tax advice. In fact, none of the information in this or other content on zk Capital should be relied on in any manner as advice. None of the authors, contributors, or anyone else connected with zk Capital, in any way whatsoever, can be responsible for your use of the information contained in this newsletter.

This Week in Blockchain Research Issue #63

Issue #63


Issue #63

Paper of the Week:

Paper Title: Virtual ASICs: Generalized Proof-of-Stake Mining in Cryptocurrencies.

TLDR:

  1. Proof-of- stake consensus protocols (PoS) provides guarantees similar to PoW assuming that a majority of the wealth in the system is controlled by honest participants.

  2. This paper argues that the design space of PoS-like protocols can be expanded and that further improvements are possible.

  3. Some advantages and disadvantages of PoW and PoS can be combined with a system based on virtual ASICs.

  4. Virtual ASICs are tokenized representations of mining power that mimic many of the properties of their physical counterparts but do not waste any physical resources.

  5. Their properties can be fine-tuned to further adjust the incentives of miners in ways that improve the stability, well-being, and decentralization of the system.

  6. A consensus protocol is constructed that is based on a leader election lottery, where the probability that a party is elected as a leader in a given slot is proportional to the party’s mining rate of the virtual ASICs in the system.

  7. Next, this work shows how to bootstrap our ASIC blockchain system by constructing a mechanism for acquiring ASICs on the blockchain.

  8. An all-or-nothing broadcast channel is used to construct an ASIC auction, and also to allow miners to commit in advance to powering their ASICs.

AuthorsChaya Ganesh*, Claudio Orlandi†, Daniel Tschudi‡, and Aviv Zohar§,

Affiliations: * Indian Institute of Science, † Aarhus University, ‡ Concordium, Zurich, and § The Hebrew University of Jerusalem.


Security:

1. Paper Title: Lattice-based Fault Attacks against Deterministic Signatures ECDSA and EdDSA.

Summary: Eight efficient lattice-based fault attacks (and one differential fault attack) against deterministic ECDSA and two ones against EdDSA are proposed.

Authors: Weiqiong Cao*, Hongsong Shi*, Hua Chen†, Wei Xi‡, Haoyuan Li†, Limin Fan†, and Wenling Wu†,

Affiliations* China Information Technology Security Evaluation Center, † Chinese Academy of Sciences, and ‡ China Southern Power Grid.

2. Paper Title: Generically Speeding-Up Repeated Squaring is Equivalent to Factoring: Sharp Thresholds for All Generic-Ring Delay Functions.

Summary: This work proves sharp thresholds on the sequentiality of all generic-ring delay functions relative to an RSA modulus based on the hardness of factoring in the standard model.

Authors: Lior Rotem* and Gil Segev*,

Affiliations* Hebrew University of Jerusalem.

3. Paper Title: Bitcoin Covenants: Three Ways to Control the Future.

Summary: This work introduces a mechanism to construct a general class of covenants without requiring a change to the consensus rules of bitcoin, in contrast to previous covenant mechanism proposals.

Authors: Jacob Swambo*, Spencer Hommel†, Bob McElrath , and Bryan Bishop,

Affiliations* King’s College London and † Fidelity Center for Applied Technology.


Privacy:

No papers.


Scalability:

No papers.


Proofs:

1. Paper Title: Groth16 SNARKs are Randomizable and (Weakly) Simulation Extractable.

Summary: This work shows that Groth16 is both weakly-simulation extractable and perfectly and efficiently randomizable.

Authors: Mikhail Volkhov* and Markulf Kohlweiss*†,

Affiliations* The University of Edinburgh and † IOHK.


Consensus:

1. Paper Title: A Few Explanations for <Fast-to-Finalize Nakamoto-Like Consensus>

Summary: This article asymptotically analyses the convergence of Nakamoto-like consensus of Tang et al. by proposing a general framework for formalizing consensus schemes comprising both the classical Nakamoto consensus (bitcoin consensus) and the consensus of Tang et al.

Authors: Shuyang Tang*,

Affiliations* Shanghai Jiao Tong University.


Tokenomics:

1. Paper Title: Backtesting of Algorithmic Cryptocurrency Trading Strategies.

Summary: A tool for backtesting algorithmic trading strategies for cryptocurrencies that provides a convenient way to automatically run comparisons of multi-dimensional parameter spaces for algorithmic trading strategies.

AuthorsJan Spörer*,

Affiliations: * Frankfurt School of Finance & Management.

2. Paper Title: An Economic Model of Blockchain: The Interplay between Transaction Fees and Security.

Summary: A model to analyze how miners’ participation decisions interact with users’ participation and fee decisions in equilibrium, and identify the optimal protocol design when the goal is to maximize total throughput or users’ utility.

AuthorsJiahao He*, Guangyuan Zhang*, Jiheng Zhang*, and Rachel Q. Zhang*,

Affiliations: * The Hong Kong University of Science and Technology.


Conferences, Journals, & CFPs:


Conferences’ Videos:


Jobs:


RFPs:


This newsletter is for informational purposes only. This content does not in any way constitute an offer or solicitation of an offer to buy or sell any investment solution or recommendation to buy or sell a security; nor it is to be taken as legal, business, investment, or tax advice. In fact, none of the information in this or other content on zk Capital should be relied on in any manner as advice. None of the authors, contributors, or anyone else connected with zk Capital, in any way whatsoever, can be responsible for your use of the information contained in this newsletter.

Loading more posts…