Limit search to available items
Book Cover
E-book
Author FC (Conference) (2016 : Christ Church, Barbados)

Title Financial cryptography and data security : FC 2016, International Workshops BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, revised selected papers / Jeremy Clark, Sarah Meiklejohn, Peter Y.A. Ryan, Dan Wallach, Michael Brenner, Kurt Rohloff (eds.)
Published Berlin : Springer, 2016

Copies

Description 1 online resource
Series Lecture notes in computer science ; 9604
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 9604.
LNCS sublibrary. SL 4, Security and cryptology.
Contents Intro; BITCOIN 2016: Third Workshop on Bitcoin and Blockchain Research; VOTING 2016: First Workshop on Advances in Secure Electronic Voting Schemes; WAHC 2016: 4th Workshop on Encrypted Computing and Applied Homomorphic Cryptography; Contents; Third Workshop on Bitcoin and Blockchain Research, BITCOIN 2016; Stressing Out: Bitcoin ̀̀Stress Testing''; 1 Introduction; 2 Background; 2.1 DoS Targets Inherent in Bitcoin; 3 Data Collection; 4 Spam Clustering; 4.1 Methodology; 4.2 Results and Motifs; 4.3 Validation; 5 Impact on Bitcoin; 6 Discussion; 7 Related Work; 8 Conclusion; References
Why Buy When You Can Rent?1 Introduction; 2 Renting Mining Capacity; 2.1 Out-of-Band Payment; 2.2 Negative-Fee Mining Pool; 2.3 In-Band Payment via Forking; 3 Bribery Attacks; 3.1 Counter-Bribing by Miners; 4 Analysis of Mitigating Factors; 4.1 Miners May Be Too Simplistic to Recognize or Accept Bribes; 4.2 The Attack Requires Significant Capital and Risk-Tolerance; 4.3 Profit from Double-Spends May Not Be Frictionless or Boundless; 4.4 Extra Confirmations for Large Transactions; 4.5 Counter-Bribing by the Intended Victim; 4.6 Miners May Refuse to Help an Attack Against Bitcoin
5 Concluding RemarksReferences; Automated Verification of Electrum Wallet; 1 Context; 2 Electrum Wallet; 3 Modeling BIP32; 4 ASLan++ Wallet Model; 4.1 Attacker Model and Assumptions; 4.2 Security Properties; 4.3 User Role; 4.4 Client Role; 4.5 Server Registration Role; 4.6 Server Confirmation Role; 4.7 Server Signature Role; 5 Results; 5.1 Executability Checking; 5.2 Attack by Confirmation Replay; 5.3 Security Analysis; 6 Conclusion; References; Blindly Signed Contracts: Anonymous On-Blockchain and Off-Blockchain Bitcoin Transactions; 1 Introduction; 1.1 Related Work
2 Overview and Security Properties2.1 Anonymity Properties; 2.2 Security Properties; 3 Implementing Fair Exchange via Scripts and Blind Signatures; 4 On-Blockchain Anonymous Protocols; 4.1 Anonymous Fee Vouchers; 4.2 Anonymity Analysis; 5 Off-Blockchain Anonymous Payments over Micropayment Channel Networks; 5.1 Micropayment Channel Networks; 5.2 Anonymizing Micropayment Channel Networks; 5.3 Anonymity Analysis; 6 Security Analysis; 7 Conclusion; References; Proofs of Proofs of Work with Sublinear Complexity; 1 Introduction; 2 Preliminaries; 3 Interconnected Blockchains
3.1 Description of the Interlink-Update Algorithm4 Proving Proof of Work with Sublinear Complexity; 4.1 Description of the Prover; 4.2 Description of the Lite Verifier; 5 Efficiency Analysis; 5.1 Space Complexity; 5.2 Communication and Time Complexity; 6 Security Analysis; References; Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab; 1 Introduction; 2 Background; 2.1 Background on Decentralized Cryptocurrencies; 2.2 Background on Smart Contracts; 2.3 A Taste of Smart Contract Design; 3 A Recount of Our Smart Contract Programming Lab
Summary This book constitutes the refereed proceedings of three workshops held at the 20th International Conference on Financial Cryptography and Data Security, FC 2016, in Christ Church, Barbados, in February 2016. The 22 full papers presented were carefully reviewed and selected from 49 submissions. They feature the outcome of the Second Workshop on Bitcoin and Blockchain Research, BITCOIN 2016, the First Workshop on Secure Voting Systems, VOTING 2016, and the 4th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, WAHC 2016
Notes Online resource; title from PDF title page (SpringerLink, viewed September 13, 2016)
Subject Data encryption (Computer science) -- Congresses
Computer security -- Congresses
User-centered system design -- Congresses
Data encryption.
Business applications.
Public administration.
Ethical & social aspects of IT.
Information architecture.
Computer security.
Computers -- Security -- General.
Computers -- Electronic Commerce.
Computers -- Data Processing.
Computers -- Social Aspects -- General.
Business & Economics -- Information Management.
Computer security
Data encryption (Computer science)
User-centered system design
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Clark, Jeremy, editor
Meiklejohn, Sarah, editor
Ryan, Peter, 1957- editor
Wallach, Dan, editor
Brenner, Michael, editor
Rohloff, Kurt, editor
BITCOIN (Workshop) (3rd : 2016 : Christ Church, Barbados)
VOTING (Workshop) (1st : 2016 : Christ Church, Barbados)
WAHC (Workshop) (4th : 2016 : Christ Church, Barbados)
ISBN 9783662533574
366253357X
Other Titles BITCOIN 2016
VOTING 2016
WAHC 2016