This Week in Blockchain Research Issue #64
|zk Capital||Jul 8, 2020|
Paper of the Week:
Paper Title: Encrypted Blockchain Databases.
Blockchain databases are a crucial technology for the development of non-trivial smart contracts, distributed applications and marketplaces. However, concerns over the confidentiality of the data they manage will increase.
This work considers the problem of end-to-end encrypted blockchain databases. With such a system, a client can encrypt its database before storing it on the blockchain. To query it, the client uses its secret key and executes a query protocol with the blockchain.
An encrypted NoSQL blockchain database can be trivially constructed from a decentralized/blockchain encrypted multi-map (EMM) since both key-value stores and document databases can be represented as dictionaries.
The proposed blockchain EMM constructions can work on any blockchain. To achieve this level of generality, a simple abstraction called an append-only data store (ADS) is used that captures the properties and functionality of blockchains that needed.
Three different constructions are presented: (i) A list-based construction, (ii) A tree-based construction, and (iii) A patched construction.
This work also shows how to use the Ethereum and Algorand blockchains to instantiate an ADS.
Lastly, the schemes are implemented on the Algorand testnet and evaluated under a variety of different settings.
1. Paper Title: The Provable Security of Ed25519: Theory and Practice.
Summary: This work provides the first detailed analysis and security proofs of Ed25519 signature schemes.
Authors: Jacqueline Brendel*, Cas Cremers*, Dennis Jackson†, and Mang Zhao*,
2. Paper Title: Modified Secure Hashing algorithm(MSHA-512).
Summary: MSHA-512 with high performance having 40 rounds instead of 80 rounds when compared with SHA-512 algorithm.
Authors: Ashoka SB* and Lakshmikanth D*,
Affiliations: * Maharani Cluster University.
Summary: A static analysis tool, a combination of symbolic execution and equivalence checking by a satisfiability modulo theories solver to analyze smart contract vulnerabilities to re-entrancy attacks.
Authors: Yuichiro Chinen*, Naoto Yanai*, Jason Paul Cruz*, and Shingo Okamura†,
Summary: This work proposes two approaches for Bitcoin clients to detect whether an eclipse attack against them is ongoing.
Authors: Bithin Alangot*, Daniel Reijsbergen*, Sarad Venugopalan*, and Pawel Szalachowski*,
Affiliations: * Singapore University of Technology and Design.
1. Paper Title: Cross-Layer Deanonymization Methods in the Lightning Protocol.
Summary: Two novel linking algorithms to reveal the ownership of Bitcoin addresses that are controlled by LN nodes using publicly-available data.
Summary: The implementation of a complex interconnected network of oracles, supporting communication of blockchain networks with the outside world, cross-chain communication and transfers, as well as integrating sidechains, within one holistic and self-governing system.
Authors: Aleksei Pupyshev*, Dmitry Gubanov*, Elshan Dzhafarov*, llya Sapranidi*, Inal Kardanov*, Vladimir Zhuravlev*, Shamil Khalilov*, Marc Jansen*, Sten Laureyssens*, Igor Pavlov*, and Sasha Ivanov*,
Affiliations: * Waves Association.
Summary: This work formally defines three properties that are necessary for wasteless PoW systems: (1) solve “meaningful” problems (2) solve them efficiently and (3) be secure against double-spend attacks.
Affiliations: * The Hebrew University of Jerusalem.
1. Paper Title: Backtesting of Algorithmic Cryptocurrency Trading Strategies.
Summary: A tool for backtesting algorithmic trading strategies for cryptocurrencies that provides a convenient way to automatically run comparisons of multi-dimensional parameter spaces for algorithmic trading strategies.
Authors: Jan Spörer*
Affiliations: * Frankfurt School of Finance & Management.
Summary: An overview of smart contracts under Canadian contract law.
Affiliations: * University of Ottawa.
Summary: It is important to understand firms’ incentives to join the blockchain consortium when the supply chain network becomes visible as a result.
Conferences, Journals, & CFPs:
September 14-18 - Cryptocurrencies and Blockchain Technology (CBT’2020) (United Kingdom)
October 21-23 - The second ACM conference on Advances in Financial Technologies (AFT’20) (New York City)
This newsletter is for informational purposes only. This content does not in any way constitute an offer or solicitation of an offer to buy or sell any investment solution or recommendation to buy or sell a security; nor it is to be taken as legal, business, investment, or tax advice. In fact, none of the information in this or other content on zk Capital should be relied on in any manner as advice. None of the authors, contributors, or anyone else connected with zk Capital, in any way whatsoever, can be responsible for your use of the information contained in this newsletter.