• Publications
  • Influence
Hyperledger fabric: a distributed operating system for permissioned blockchains
TLDR
This paper describes Fabric, its architecture, the rationale behind various design decisions, its most prominent implementation aspects, as well as its distributed application programming model, and shows that Fabric achieves end-to-end throughput of more than 3500 transactions per second in certain popular deployment configurations.
Evaluating User Privacy in Bitcoin
TLDR
This research examines the use of pseudonymity in the Bitcoin network, and the role that it plays in the development of trust and confidence in the system.
Double-spending fast payments in bitcoin
TLDR
It is shown that, unless appropriate detection techniques are integrated in the current Bitcoin implementation, double-spending attacks on fast payments succeed with overwhelming probability and can be mounted at low cost.
Reputation Systems for Anonymous Networks
TLDR
This work presents a reputation scheme for a pseudonymous peer-to-peer (P2P) system in an anonymous network, using ecash for reputation points, which allows an honest user to switch to a new pseudonym keeping his good reputation, while hindering a malicious user from erasing his trail of evil deeds with anew pseudonym.
A Secure Data Deduplication Scheme for Cloud Storage
TLDR
This work designs an encryption scheme that guarantees semantic security for unpopular data and provides weaker security and better storage and bandwidth benefits for popular data, and shows that the scheme is secure under the Symmetric External Decisional Diffie-Hellman Assumption in the random oracle model.
Misbehavior in Bitcoin: A Study of Double-Spending and Accountability
TLDR
This work proposes a new and lightweight countermeasure that enables the detection of double-spending attacks in fast transactions in Bitcoin and provides accountability and privacy definition for Bitcoin, and investigates analytically and empirically the privacy and accountability provisions in Bitcoin.
Channels: Horizontal Scaling and Confidentiality on Permissioned Blockchains
TLDR
This paper deploys channels for permissioned blockchains to adapt sharding on asset-management applications for the permissioned setting, while preserving liveness and safety even on transactions spanning across-channels.
Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin
TLDR
This paper analyzes the security of using Bitcoin for fast payments, where the time between the exchange of currency and goods is short, and proposes a lightweight countermeasure that enables the detection of doublespending attacks in fast transactions.
Erasure-Coded Byzantine Storage with Separate Metadata
TLDR
A solution that combines the strongest properties in terms of availability, consistency, fault-tolerance, storage complexity, and concurrency has been elusive so far.
APOD: Anonymous Physical Object Delivery
TLDR
This paper presents a fair delivery service system with guaranteed customer anonymity and merchant-customer unlinkability, with reasonable assumptions about the threat model.
...
1
2
3
4
...