• Publications
  • Influence
ObliVM: A Programming Framework for Secure Computation
TLDR
We design and develop ObliVM, a programming framework for secure computation, and demonstrate the scalability of the framework to bigger data sizes. Expand
  • 232
  • 35
  • PDF
Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack
TLDR
We expand the mining strategy space to include novel "stubborn" strategies that, for a large range of parameters, earn the miner more revenue. Expand
  • 311
  • 24
  • PDF
Oblivious Data Structures
TLDR
We design novel, asymptotically more efficient data structures and algorithms for programs whose data access patterns exhibit some degree of predictability. Expand
  • 129
  • 22
  • PDF
GraphSC: Parallel Secure Computation Made Easy
TLDR
We propose introducing modern parallel programming paradigms to secure computation, enabling their secure execution on large datasets. Expand
  • 108
  • 16
  • PDF
Solidus: An Incentive-compatible Cryptocurrency Based on Permissionless Byzantine Consensus
TLDR
The decentralized cryptocurrency Bitcoin has experienced great success but also encountered many challenges. Expand
  • 77
  • 14
  • PDF
Solida: A Blockchain Protocol Based on Reconfigurable Byzantine Consensus
TLDR
We propose Solida, a decentralized blockchain protocol based on reconfigurable Byzantine consensus augmented by proof-of-work. Expand
  • 67
  • 14
  • PDF
Asymptotically Tight Bounds for Composing ORAM with PIR
TLDR
Oblivious RAM is a cryptographic primitive that allows a trusted client to outsource storage to an untrusted server while hiding the client’s memory access patterns to the server. Expand
  • 29
  • 7
  • PDF
Some Vulnerabilities Are Different Than Others - Studying Vulnerabilities and Attack Surfaces in the Wild
TLDR
The security of deployed and actively used systems is a moving target, influenced by factors not captured in the existing security metrics. Expand
  • 62
  • 5
  • PDF
Efficient Synchronous Byzantine Consensus
TLDR
We present new protocols for Byzantine state machine replication and Byzantine agreement in the synchronous and authenticated setting. Expand
  • 29
  • 5
  • PDF
Practical Synchronous Byzantine Consensus
TLDR
We present new protocols for Byzantine state machine replication and Byzantine agreement in the synchronous and authenticated setting. Expand
  • 22
  • 4
  • PDF