Description |
1 online resource |
Series |
Lecture notes in computer science ; 9604 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 9604.
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Intro; BITCOIN 2016: Third Workshop on Bitcoin and Blockchain Research; VOTING 2016: First Workshop on Advances in Secure Electronic Voting Schemes; WAHC 2016: 4th Workshop on Encrypted Computing and Applied Homomorphic Cryptography; Contents; Third Workshop on Bitcoin and Blockchain Research, BITCOIN 2016; Stressing Out: Bitcoin ̀̀Stress Testing''; 1 Introduction; 2 Background; 2.1 DoS Targets Inherent in Bitcoin; 3 Data Collection; 4 Spam Clustering; 4.1 Methodology; 4.2 Results and Motifs; 4.3 Validation; 5 Impact on Bitcoin; 6 Discussion; 7 Related Work; 8 Conclusion; References |
|
Why Buy When You Can Rent?1 Introduction; 2 Renting Mining Capacity; 2.1 Out-of-Band Payment; 2.2 Negative-Fee Mining Pool; 2.3 In-Band Payment via Forking; 3 Bribery Attacks; 3.1 Counter-Bribing by Miners; 4 Analysis of Mitigating Factors; 4.1 Miners May Be Too Simplistic to Recognize or Accept Bribes; 4.2 The Attack Requires Significant Capital and Risk-Tolerance; 4.3 Profit from Double-Spends May Not Be Frictionless or Boundless; 4.4 Extra Confirmations for Large Transactions; 4.5 Counter-Bribing by the Intended Victim; 4.6 Miners May Refuse to Help an Attack Against Bitcoin |
|
5 Concluding RemarksReferences; Automated Verification of Electrum Wallet; 1 Context; 2 Electrum Wallet; 3 Modeling BIP32; 4 ASLan++ Wallet Model; 4.1 Attacker Model and Assumptions; 4.2 Security Properties; 4.3 User Role; 4.4 Client Role; 4.5 Server Registration Role; 4.6 Server Confirmation Role; 4.7 Server Signature Role; 5 Results; 5.1 Executability Checking; 5.2 Attack by Confirmation Replay; 5.3 Security Analysis; 6 Conclusion; References; Blindly Signed Contracts: Anonymous On-Blockchain and Off-Blockchain Bitcoin Transactions; 1 Introduction; 1.1 Related Work |
|
2 Overview and Security Properties2.1 Anonymity Properties; 2.2 Security Properties; 3 Implementing Fair Exchange via Scripts and Blind Signatures; 4 On-Blockchain Anonymous Protocols; 4.1 Anonymous Fee Vouchers; 4.2 Anonymity Analysis; 5 Off-Blockchain Anonymous Payments over Micropayment Channel Networks; 5.1 Micropayment Channel Networks; 5.2 Anonymizing Micropayment Channel Networks; 5.3 Anonymity Analysis; 6 Security Analysis; 7 Conclusion; References; Proofs of Proofs of Work with Sublinear Complexity; 1 Introduction; 2 Preliminaries; 3 Interconnected Blockchains |
|
3.1 Description of the Interlink-Update Algorithm4 Proving Proof of Work with Sublinear Complexity; 4.1 Description of the Prover; 4.2 Description of the Lite Verifier; 5 Efficiency Analysis; 5.1 Space Complexity; 5.2 Communication and Time Complexity; 6 Security Analysis; References; Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab; 1 Introduction; 2 Background; 2.1 Background on Decentralized Cryptocurrencies; 2.2 Background on Smart Contracts; 2.3 A Taste of Smart Contract Design; 3 A Recount of Our Smart Contract Programming Lab |
Summary |
This book constitutes the refereed proceedings of three workshops held at the 20th International Conference on Financial Cryptography and Data Security, FC 2016, in Christ Church, Barbados, in February 2016. The 22 full papers presented were carefully reviewed and selected from 49 submissions. They feature the outcome of the Second Workshop on Bitcoin and Blockchain Research, BITCOIN 2016, the First Workshop on Secure Voting Systems, VOTING 2016, and the 4th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, WAHC 2016 |
Notes |
Online resource; title from PDF title page (SpringerLink, viewed September 13, 2016) |
Subject |
Data encryption (Computer science) -- Congresses
|
|
Computer security -- Congresses
|
|
User-centered system design -- Congresses
|
|
Data encryption.
|
|
Business applications.
|
|
Public administration.
|
|
Ethical & social aspects of IT.
|
|
Information architecture.
|
|
Computer security.
|
|
Computers -- Security -- General.
|
|
Computers -- Electronic Commerce.
|
|
Computers -- Data Processing.
|
|
Computers -- Social Aspects -- General.
|
|
Business & Economics -- Information Management.
|
|
Computer security
|
|
Data encryption (Computer science)
|
|
User-centered system design
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Clark, Jeremy, editor
|
|
Meiklejohn, Sarah, editor
|
|
Ryan, Peter, 1957- editor
|
|
Wallach, Dan, editor
|
|
Brenner, Michael, editor
|
|
Rohloff, Kurt, editor
|
|
BITCOIN (Workshop) (3rd : 2016 : Christ Church, Barbados)
|
|
VOTING (Workshop) (1st : 2016 : Christ Church, Barbados)
|
|
WAHC (Workshop) (4th : 2016 : Christ Church, Barbados)
|
ISBN |
9783662533574 |
|
366253357X |
|