This Week in Blockchain Research Issue #3

Issue #3

Welcome to zk Capital’s Newsletter!

“Significant advancements and innovations in the blockchain space are constantly being achieved by academic researchers. We are committed to helping share and spread this research. In our newsletter, we aim to provide a list of publications that will help guide the community with the latest research in the blockchain space.

Unfortunately, a lot of this research is overlooked due to the massive numbers of papers being generated and the way they are being promoted and published. To tackle this issue, we’ve put together a categorized list of academic papers that can guide our subscribers and keep them up to date.”

Issue #3

This Week in Security:

1. Paper Title: Distributed Ledger Technology for IoT: Parasite Chain Attacks.

Summary: This work analyses the parasite chain attack for the IOTA Foundation’s DAG based ledger.

Authors: Andrew Cullen*, Pietro Ferraro*, Christopher King†, and Robert Shorten*,

Affiliations: * University College Dublin and † Northeastern University.

2. Paper Title: Towards a First Step to Understand the Cryptocurrency Stealing Attack on Ethereum.

Summary: The first systematic study of a new attack on Ethereum to steal cryptocurrency.

Authors: Zhen Cheng*, Xinrui Hou†, Runhuai Li*, Yajin Zhou*, Xiapu Luo‡, Jinku Li†, and Kui Ren,

Affiliations: * Zhejiang University and † Xidian University, ‡ The Hong Kong Polytechnic University.

3. Paper Title: On the Difficulty of Hiding the Balance of Lightning Network Channels.

Summary: An attack to disclose the balance of a channel in the Lightning Network exploiting the detailed information provided by the Lightning Network clients on the occurred errors.

Authors: Jordi Herrera-Joancomartí*, Guillermo Navarro-Arribas*, Alejandro Ranchal-Pedrosa†, Cristina Pérez-Solà‡, and Joaquin Garcia-Alfaro†,

Affiliations: * Universitat Autònoma de Barcelona, † Telecom SudParis, and ‡ Universitat Rovira i Virgili.

4. Paper Title: Cryptanalysis of Curl-P and Other Attacks on the IOTA Cryptocurrency.

Summary: Practical attacks on IOTA’s cryptographic hash function Curl-P-27.

Authors: Ethan Heilman*, Neha Narula†, Garrett Tanzer‡, James Lovejoy†, Michael Colavita‡, Madars Virza†, and Tadge Dryja†,

Affiliations: * Boston University, † MIT Media Lab, and ‡ Harvard University.

This Week in Privacy:

1. Paper Title: MixEth: efficient, trustless coin mixing service for Ethereum.

Summary: A trustless coin mixing service for Turing-complete blockchains.

Authors: István András Seres*, Dániel A. Nagy*, Chris Buckland†, and Péter Burcsi*,

Affiliations: * Eotvos Lorand University and † King’s College London.

2. Paper Title: PGC: Pretty Good Confidential Transaction System with Accountability.

Summary: A simple and efficient confidential transaction system that trades anonymity for accountability while still still concentrates on confidentiality.

Authors: Yu Chen* and Xuecheng Ma*,

Affiliations: * Institute of Information Engineering, Chinese Academy of Sciences.

This Week in Scalability:

1. Paper Title: Blockchains Meet Distributed Hash Tables: Decoupling Validation from State Storage.

Summary: This paper presents a method to significantly decrease the time taken by a node of a blockchain network to download the data needed to properly work.

AuthorsMatteo Bernardini*, Diego Pennino*, and Maurizio Pizzonia*,

Affiliations: * Roma Tre University.

2. Paper Title: LightChain: A DHT-based Blockchain for Resource Constrained Environments.

Summary: The first permissionless blockchain architecture that operates over a Distributed Hash Table (DHT) of participating peers that does not require to retrieve or keep the entire blockchain.

AuthorsYahya Hassanzadeh-Nazarabadi*, Alptekin Ku ̈p ̧cu ̈*, and Öznur Özkasap*,

Affiliations: * Koc ̧ University.

3. Paper Title: SoK: A Taxonomy for Layer-2 Scalability Related Protocols for Cryptocurrencies.

Summary: This work relates several existing off-chain channel methods, also known as payment and state channels, channel network constructions methods, and other components as channel and network management protocols then proposes a taxonomy for all the components of the Layer-2.

AuthorsMaxim Jourenko*, Kanta Kurazumi*, Mario Larangeira, and Keisuke Tanaka,

Affiliations: * Tokyo Institute of Technology.

This Week in Proofs:

No Papers

This Week in Consensus Protocols:

No Papers

This Week in Tokenomics:

1. Paper Title: Crypto Assets and Insider Trading Law’s Domain.

Summary: An extensive literature evaluates whether and how best to regulate insider trading.

AuthorsAndrew Verstein*,

Affiliations: * Wake Forest University School of Law.

2. Paper Title: Initial Crypto-Asset Offerings (ICOs), Tokenization and Corporate Governance

Summary: The potential impacts of initial coin offerings (ICO), and of several developments based on distributed ledger technology (DLT), on corporate governance.

AuthorsStéphane Blemus* and Dominique Guegan*,

Affiliations: * Universite Paris 1 Pantheon-Sorbonne.

3. Paper Title: The Next Bitcoin Halving.

Summary: This discussion paper examines the possible impacts of the next Bitcoin halving.

AuthorsUsman W. Chohan*,

Affiliations: * UNSW Business School.

4. Paper Title: (Un)Corporate Crypto-Governance.

Summary: This article argues that blockchain architects should consider adopting contracts that rely upon corporate governance models for inspiration.

AuthorsCarla Reyes*,

Affiliations: * Michigan State University College of Law.

Thanks for reading! If we missed anything, shoot us an email so that we can feature it in our next newsletter!

This newsletter is for informational purposes only. This content does not in any way constitute an offer or solicitation of an offer to buy or sell any investment solution or recommendation to buy or sell a security; nor it is to be taken as legal, business, investment, or tax advice. In fact, none of the information in this or other content on zk Capital should be relied on in any manner as advice. None of the authors, contributors, or anyone else connected with zk Capital, in any way whatsoever, can be responsible for your use of the information contained in this newsletter.