4 Hits in 2.9 sec

Decentralizing Information Technology: The Advent of Resource Based Systems [article]

Aggelos Kiayias
2021 arXiv   pre-print
The growth of the Bitcoin network during the first decade of its operation to a global scale system is a singular event in the deployment of Information Technology systems.  ...  We investigate this question by introducing the concept of resource based systems and their four fundamental characteristics: (i) resource-based operation, (ii) tokenomics, (iii) decentralized service  ...  In Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part I, pages 291–323, 2017. [19] Yossi Gilad, Rotem  ... 
arXiv:2112.09941v2 fatcat:daiiimnipfe2lhjhbwcvc2rocm

Scalable and Probabilistic Leaderless BFT Consensus through Metastability [article]

Team Rocket, Maofan Yin, Kevin Sekniqi, Robbert van Renesse, Emin Gün Sirer
2020 arXiv   pre-print
For our implementation and setup, the bottleneck of the system is in transaction verification.  ...  It does not require accurate knowledge of all participants and exposes new possible tradeoffs and improvements in safety and liveness for building consensus protocols.  ...  We quantify the bounds on the discrepancy in Appendix A.7.  ... 
arXiv:1906.08936v2 fatcat:bj4nqc27qvh3nlk6nifhel5x5q

Formal Verification of Side-Channel Countermeasures via Elementary Circuit Transformations [chapter]

Jean-Sébastien Coron
2018 Lecture Notes in Computer Science  
In Cryptographic Hardware and Embedded Systems -CHES 2016 -18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings, pages 498-514, 2016.  ...  [Gou01] Santa Barbara, California, USA, August 17-21, 2003, Proceedings, pages 463-481, 2003. [RP10] Matthieu Rivain and Emmanuel Prouff. Provably secure higher-order masking of AES.  ...  For simplicity we use a different notation to represent the aibj and rij variables, namely we write (M i j) for aibj and (M i j R) for rij = (ajbi + rji) + aibj where R corresponds to rji, for j < i.  ... 
doi:10.1007/978-3-319-93387-0_4 fatcat:7y44k6m6tvfondulmih7c2kvmq

Constrained Pseudorandom Functions for Unconstrained Inputs [chapter]

Apoorvaa Deshpande, Venkata Koppula, Brent Waters
2016 Lecture Notes in Computer Science  
The security notion ensures that even when given multiple constrained keys K{f 1 }, . . ., K{f Q }, PRF evaluation at a point not accepted by any of the functions f i 'looks' uniformly random to a computationally  ...  In particular, even the most basic class of constrained PRFs called puncturable PRFs has found immense application in the area of program obfuscation through the 'punctured programming' technique introduced  ...  In Advances in Cryptology -CRYPTO 2014 -34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I, pages 518-535, 2014.  ... 
doi:10.1007/978-3-662-49896-5_5 fatcat:jbyxvzmxsbecjibfyhildkrnqu