• Publications
  • Influence
Analysis of the Blockchain Protocol in Asynchronous Networks
Nakamoto’s famous blockchain protocol enables achieving consensus in a so-called permissionless setting—anyone can join (or leave) the protocol execution, and the protocol instructions do not depend
Universally Composable Security with Global Setup
TLDR
The notion of universally composable (UC) security is extended in a way that re-establishes its original intuitive guarantee even for protocols that use globally available set-up, and guarantees deniability.
Snow White: Provably Secure Proofs of Stake
TLDR
It is argued that any consensus protocol satisfying functionalities and robustness requirements can be used for proofs-of-stake, as long as money does not switch hands too quickly, and this work is the first to formally articulate a set of requirements for consensus candidates for proofs ofstake.
FruitChains: A Fair Blockchain
  • R. Pass, E. Shi
  • Computer Science
    IACR Cryptol. ePrint Arch.
  • 25 July 2017
TLDR
The FruitChain protocol is presented, which satisfies the same consistency and liveness properties as Nakamoto's protocol, and additionally is δ-approximately fair: with overwhelming probability, any honest set of players controlling a φ fraction of computational power is guaranteed to get at least a fraction of the blocks in any Ω(κ/δ) length segment of the chain.
Hybrid Consensus: Efficient Consensus in the Permissionless Model
TLDR
Hybrid Consensus shows that responsiveness is nonetheless possible to achieve in permissionless consensus (assuming proof-of-work) when 1) the protocol knows an upper bound on the network delay; 2) the authors allow a non-responsive warmup period after which transaction confirmation can become responsive; and 3) honesty has some stickiness, i.e., it takes a short while for an adversary to corrupt a node or put it to sleep.
The Sleepy Model of Consensus
  • R. Pass, E. Shi
  • Computer Science, Psychology
    ASIACRYPT
  • 3 December 2017
TLDR
This work begins a study of distributed protocols in a “sleepy” model of computation where players can be either online (awake) or offline (asleep), and their online status may change at any point during the protocol.
Thunderella: Blockchains with Optimistic Instant Confirmation
  • R. Pass, E. Shi
  • Computer Science
    IACR Cryptol. ePrint Arch.
  • 29 April 2018
TLDR
This paper proposes a practical new paradigm called Thunderella for achieving state machine replication by combining a fast, asynchronous path with a (slow) synchronous “fall-back” path (which only gets executed if something goes wrong), and gets simple state machine replications that essentially are as robust as the best synchronous protocols.
On Deniability in the Common Reference String and Random Oracle Model
  • R. Pass
  • Computer Science
    CRYPTO
  • 17 August 2003
TLDR
It is shown that there exist a specific natural security property that is not captured by these definitions of zero-knowledge, and the notion of deniable zero- knowledge is formally defined in these models.
Snow White: Robustly Reconfigurable Consensus and Applications to Provably Secure Proof of Stake
TLDR
It is shown that any consensus protocol satisfying the desired robustness properties can be used to construct proofs-of-stake consensus, as long as money does not switch hands too quickly.
Bounded-concurrent secure multi-party computation with a dishonest majority
  • R. Pass
  • Mathematics, Computer Science
    STOC '04
  • 13 June 2004
TLDR
This protocol yields the first construction of constant-round phstand-alone secure multi-party computation with a dishonest majority, proven secure under standard (polynomial-time) hardness assumptions; previous solutions to this task either require logarithmic round-complexity, or subexponential hardness assumptions.
...
1
2
3
4
5
...