Share This Author
SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies
- Joseph Bonneau, Andrew K. Miller, Jeremy Clark, A. Narayanan, Joshua A. Kroll, E. Felten
- Computer ScienceIEEE Symposium on Security and Privacy
- 17 May 2015
This work identifies three key components of Bit coin's design that can be decoupled, and maps the design space for numerous proposed modifications, providing comparative analyses for alternative consensus mechanisms, currency allocation mechanisms, computational puzzles, and key management tools.
Lest we remember: cold-boot attacks on encryption keys
It is shown that dynamic RAM, the main memory in most modern computers, retains its contents for several seconds after power is lost, even at room temperature and even if removed from a motherboard, and this phenomenon limits the ability of an operating system to protect cryptographic key material from an attacker with physical access to a machine.
Bitcoin and Cryptocurrency Technologies - A Comprehensive Introduction
- A. Narayanan, Joseph Bonneau, E. Felten, Andrew K. Miller, Steven Goldfeder
- Computer Science
- 19 July 2016
The history and development of Bitcoin and cryptocurrencies are traced, and the conceptual and practical foundations you need to engineer secure software that interacts with the Bitcoin network are given as well as to integrate ideas from Bitcoin into your own projects.
A general and powerful distributed authentication framework based on higher-order logic that can implement Taos, SPKI, SDSI, and X.509 frameworks by starting with the logic, all in the same concise and efficient system.
CONIKS: Bringing Key Transparency to End Users
- Marcela S. Melara, Aaron Blankstein, Joseph Bonneau, E. Felten, M. Freedman
- Computer ScienceUSENIX Security Symposium
- 12 August 2015
CONIKS builds on transparency log proposals for web server certificates but solves several new challenges specific to key verification for end users, and obviates the need for global third-party monitors and enables users to efficiently monitor their own key bindings for consistency.
The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries
It is argued that Bitcoin will require the emergence of governance structures, contrary to the commonly held view in the Bitcoin community that the currency is ungovernable.
Password management strategies for online accounts
This study quantifies how many passwords undergraduates had and how often they reused them, and discusses how current systems support poor password practices and potential changes in website authentication systems and password managers.
Large-Step Markov Chains for the Traveling Salesman Problem
A new class of Markov chain Monte Carlo search procedures are introduced, leading to more powerful optimizat~on methods than simulated annealing, and a new best heuristic is introduced.
Mixcoin: Anonymity for Bitcoin with Accountable Mixes
- Joseph Bonneau, A. Narayanan, Andrew K. Miller, Jeremy Clark, Joshua A. Kroll, E. Felten
- Computer ScienceFinancial Cryptography
- 3 March 2014
It is demonstrated that incentives of mixes and clients can be aligned to ensure that rational mixes will not steal, and the scheme offers similar anonymity to traditional communication mixes against active attackers.
SPORC: Group Collaboration using Untrusted Cloud Resources
SPORC is a generic framework for building a wide variety of collaborative applications with untrusted servers that illustrates the complementary benefits of operational transformation (OT) and fork* consistency and can automatically recover from malicious forks.