The Bitcoin Backbone Protocol: Analysis and Applications
- J. Garay, A. Kiayias, Nikos Leonardos
- Computer Science, MathematicsInternational Conference on the Theory and…
- 26 April 2015
This work extracts and analyzes the core of the Bitcoin protocol, which is term the Bitcoin backbone, and proves two of its fundamental properties which are called common prefix and chain quality in the static setting where the number of players remains fixed.
Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol
- A. Kiayias, A. Russell, B. David, R. Oliynykov
- Computer Science, MathematicsAnnual International Cryptology Conference
- 20 August 2017
“Ouroboros” is presented, the first blockchain protocol based on proof of stake with rigorous security guarantees and it is proved that, given this mechanism, honest behavior is an approximate Nash equilibrium, thus neutralizing attacks such as selfish mining.
Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain
- B. David, Peter Gazi, A. Kiayias, A. Russell
- Computer Science, MathematicsInternational Conference on the Theory and…
- 29 April 2018
Ouroboros Praos is a proof-of-stake blockchain protocol that provides security against fully-adaptive corruption in the semi-synchronous setting and tolerates an adversarially-controlled message delivery delay unknown to protocol participants.
Delegatable pseudorandom functions and applications
- A. Kiayias, Stavros Papadopoulos, Nikos Triandopoulos, T. Zacharias
- Computer Science, MathematicsIACR Cryptology ePrint Archive
- 4 November 2013
Two DPRF constructions are built upon the well-known tree-based GGM PRF family and feature only logarithmic delegation size in the number of values conforming to the policy predicate, and it is shown that the second construction is also policy private.
Robust key generation from signal envelopes in wireless networks
- Babak Azimi-Sadjadi, A. Kiayias, A. Mercado, B. Yener
- Computer ScienceConference on Computer and Communications…
- 28 October 2007
This paper presents a novel approach that couples the physical layer characteristics of wireless networks with key generation algorithms based on the wireless communication phenomenon known as the principle of reciprocity which states that in the absence of interference both transmitter and receiver experience the same signal envelope.
Self-tallying Elections and Perfect Ballot Secrecy
- A. Kiayias, M. Yung
- Computer ScienceInternational Conference on Theory and Practice…
- 12 February 2002
This work introduces a new election paradigm with strong voter privacy as its primary objective, and presents a novel voting scheme which is the first system that is dispute-free, self-tallying and supports perfect ballot secrecy.
Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability
- Christian Badertscher, Peter Gazi, A. Kiayias, A. Russell, Vassilis Zikas
- Computer Science, MathematicsIACR Cryptology ePrint Archive
- 8 October 2018
A novel Proof-of-Stake protocol, Ouroboros Genesis, that enables parties to safely join (or rejoin) the protocol execution using only the genesis block information, and proves the security of the construction against an adaptive adversary.
Traceable Signatures
- A. Kiayias, Yiannis Tsiounis, M. Yung
- Computer ScienceInternational Conference on the Theory and…
- 2004
This work presents a new privacy primitive called “Traceable Signatures”, together with an efficient provably secure implementation, and develops the underlying mathematical and protocol tools, and realizes the scheme and its security proof.
Scalability, fidelity and stealth in the DRAKVUF dynamic malware analysis system
- Tamas K. Lengyel, S. Maresca, B. Payne, George D. Webster, S. Vogl, A. Kiayias
- Computer ScienceAsia-Pacific Computer Systems Architecture…
- 8 December 2014
DRAKVUF is presented, a novel dynamic malware analysis system designed to address these challenges by building on the latest hardware virtualization extensions and the Xen hypervisor and providing a stealthy, in-depth view into the behavior of modern malware.
Anonymous Identification in Ad Hoc Groups
- Y. Dodis, A. Kiayias, Antonio Nicolosi, V. Shoup
- Computer Science, MathematicsInternational Conference on the Theory and…
- 2 May 2004
This work provides a formal model for Ad hoc Anonymous Identification schemes and design secure such schemes both generically (based on any accumulator with one-way domain) and for a specific efficient implementation of such an accumulator based on the Strong RSA Assumption.
...
...