Author pages are created from data sourced from our academic publisher partnerships and public sources.
Share This Author
SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies
- Joseph Bonneau, Andrew K. Miller, Jeremy Clark, A. Narayanan, Joshua A. Kroll, E. Felten
- Computer ScienceIEEE Symposium on Security and Privacy
- 17 May 2015
This work identifies three key components of Bit coin's design that can be decoupled, and maps the design space for numerous proposed modifications, providing comparative analyses for alternative consensus mechanisms, currency allocation mechanisms, computational puzzles, and key management tools.
The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries
It is argued that Bitcoin will require the emergence of governance structures, contrary to the commonly held view in the Bitcoin community that the currency is ungovernable.
Mixcoin: Anonymity for Bitcoin with Accountable Mixes
- Joseph Bonneau, A. Narayanan, Andrew K. Miller, Jeremy Clark, Joshua A. Kroll, E. Felten
- Computer ScienceFinancial Cryptography
- 3 March 2014
It is demonstrated that incentives of mixes and clients can be aligned to ensure that rational mixes will not steal, and the scheme offers similar anonymity to traditional communication mixes against active attackers.
Network Hygiene, Incentives, and Regulation: Deployment of Source Address Validation in the Internet
- M. Luckie, Robert Beverly, R. Koga, K. Keys, Joshua A. Kroll, K. Claffy
- Computer ScienceCCS
- 6 November 2019
Although there is no simple solution to address the remaining long-tail of unremediated networks, the most complete and confident picture of the Internet's susceptibility to date of this long-standing vulnerability is provided.
Why buy when you can rent ? Bribery attacks on Bitcoin consensus
- Joseph Bonneau, E. Felten, Steven Goldfeder, Joshua A. Kroll, A. Narayanan
- Economics, Mathematics
The Bitcoin cryptocurrency system relies on a novel distributed consensus mechanism relying on economic incentives. It is often argued that Bitcoin is “incentive-compatible” in simplified models;…
Securing Bitcoin wallets via threshold signatures
It is shown that a thresholdsignature scheme compatible with Bitcoin’s ECDSA signatures can be used to enforce complex yet useful security policies including: (1) shared control of a wallet, (2) secure bookkeeping, a Bitcoin-specific form of accountability, (3) secure delegation of authority, and (4) two-factor security for personal wallets.
The fallacy of inscrutability
- Joshua A. Kroll
- Computer SciencePhilosophical Transactions of the Royal Society A…
- 15 October 2018
It is argued that algorithms are fundamentally understandable pieces of technology, and that policy should not accede to the idea that some systems are of necessity inscrutable.
Trust But Verify: A Guide to Algorithms and the Law
By setting out the core concerns over the use of algorithms, offering a primer on the nature of algorithm, and a guide on the way in which computer scientists deal with the inherent limits of their field, this paper shows that there are coherent ways to manage algorithms and the law.
Accountability in Computer Systems
- Joshua A. Kroll
- Political Science
- 9 July 2020
Capturing human values such as fairness, privacy, and justice in software systems is challenging. Values are abstract and may be contested, or at least viewed differently by different stakeholders,…
Secure protocols for accountable warrant execution
- Joshua A. Kroll
- Computer Science, Mathematics
A series of protocols for secure execution of warrants or legal orders authorizing access to data held by private parties are described, based on different assumptions about trust and technical sophistication of the parties, and making use of wellstudied cryptographic tools.