Filters








66,216 Hits in 4.2 sec

Speedster: A TEE-assisted State Channel System [article]

Jinghui Liao, Fengwei Zhang, Wenhai Sun, Weisong Shi
2021 arXiv   pre-print
channels, frozen deposits, and inability to execute multi-party smart contracts.  ...  It supports fast native multi-party contract execution, which is missing in prior TEE-enabled channel networks.  ...  Multi-Party State Channel: A multi-party state channel is built upon the existing certified channels.  ... 
arXiv:2104.01289v1 fatcat:ojnkkjdthnekzntmdurzekm3my

Interhead Hydra Two Heads are Better than One [article]

Maxim Jourenko, Mario Larangeira, Keisuke Tanaka
2021 IACR Cryptology ePrint Archive  
Prominent Layer-2 protocols are payment channels for Bitcoin that allow two parties to exchange coins, State Channels for Ethereum that allow two parties to execute a state machine, and Hydra heads [FC  ...  Channels can be concatenated into networks using techniques such as Hashed Timelocked Contracts to execute payments or virtual state channels as introduced by Dziembowski et al.  ...  Hydra [4] proposes a CEM and protocol that allows for the creation of multi-party state channels.  ... 
dblp:journals/iacr/JourenkoLT21 fatcat:ya54gno6ljbnnnj2yo4v56rad4

W-state Analyzer and Multi-party Measurement-device-independent Quantum Key Distribution

Changhua Zhu, Feihu Xu, Changxing Pei
2015 Scientific Reports  
In this paper, we for the first time propose a multi-party measurement-device-independent quantum key distribution (MDI-QKD) protocol based on W-state.  ...  Cabello proposed a multi-party QKD protocol that uses Greenberger-Horne-Zeilinger (GHZ) states 34 and that is an extension of a two-party entanglement-based QKD protocol 2 .  ...  Here, we, for the first time, propose a multi-party QKD protocol based on W-state.  ... 
doi:10.1038/srep17449 pmid:26644289 pmcid:PMC4672340 fatcat:xttbyd5l4napvl3zl7qzpfbkjy

Blockchain state channels: A state of the art

Lydia D. Negka, Georgios P. Spathoulas
2021 IEEE Access  
Finally, future research directions are analysed while the role of state channels in the general public blockchain ecosystem is also discussed.  ...  The present survey focuses on one of the most popular ones, that of state channels, and to the extent of our knowledge constitutes the first collective survey of research in this field.  ...  They expanded the 2-party virtual state channels design to support multi-party virtual state channels, while they also redesigned the dispute process, so that the time complexity of the channel, in the  ... 
doi:10.1109/access.2021.3131419 fatcat:76qv22osxjb2dhaf7qfti2hdjy

Tahakum: A Multi-Purpose Audio Control Framework

Zachary Seldess, Toshiro Yamada
2011 Zenodo  
We present "Tahakum", an open source, extensible collection of software tools designed to enhance workflow on multichannel audio systems within complex multi-functional research and development environments  ...  critical functionality required across a broad spectrum of audio systems usage scenarios, while at the same time remaining sufficiently open as to easily support modifications and extensions via 3rd party  ...  In the Virtual Groups window, a user can manually set each group's label, trim, level, mute, and solo states, which in turn effect the corresponding states of all input/bus/output channels linked to that  ... 
doi:10.5281/zenodo.1178159 fatcat:umtrb2mqmbechicfb6nmsfxe6a

Garou: An Efficient and Secure Off-Blockchain Multi-Party Payment Hub [article]

Yongjie Ye, Weigang Wu
2020 arXiv   pre-print
Recent proposals focus on extending the two-party payment channel to the N-party payment hub. Unfortunately, none of them can achieve efficiency, flexibility in the absence of a trusted third-party.  ...  The payment channel increases the transaction throughput of two parties to a level that is only limited by their network bandwidth.  ...  [12] propose a novel approach to recursively construct multi-party virtual state channel (which can be viewed as hub as well) on top of two-party state channels.  ... 
arXiv:2010.07555v1 fatcat:xqfnl4v4knczzezk743b6f7ykq

SyncPCN/PSyncPCN: Payment Channel Networks without Blockchain Synchrony [article]

Oğuzhan Ersoy and Jérémie Decouchant and Satwik Prabhu Kimble and Stefanie Roos
2022 arXiv   pre-print
Payment channel networks (PCNs) enhance the scalability of blockchains by allowing parties to conduct transactions off-chain, i.e, without broadcasting every transaction to all blockchain participants.  ...  To conduct transactions, a sender and a receiver can either establish a direct payment channel with a funding blockchain transaction or leverage existing channels in a multi-hop payment.  ...  PSyncPCN could leverage virtual channels [19] to use only one consensus operation per multi-hop channel creation/deletion and otherwise leverage reliable broadcast for subsequent payments over the multi-hop  ... 
arXiv:2207.11615v2 fatcat:ikfebxs7wzcunfgaaps4xxuba4

SoK: Off The Chain Transactions [article]

Lewis Gudgeon, Pedro Moreno-Sanchez, Stefanie Roos, Patrick McCorry, Arthur Gervais
2019 IACR Cryptology ePrint Archive  
Categorizing the research into payment and state channels, commit-chains and protocols for refereed delegation, we provide a comparison of the protocols and their properties.  ...  [82] extended virtual channels to support more than two parties such that any number of parties can set up a virtual channel without blockchain interaction.  ...  Arbitrum [44] takes this approach further by introducing a new virtual machine and a state channel.  ... 
dblp:journals/iacr/GudgeonMRMG19 fatcat:r6luga6h2bgrfluy5apycn5qti

A Formal Analysis of Fraud in Banking Sector

Partha Saha, N. Parameswaran, B.B. Chakraborty, Ambuj Mahanti
2013 2013 46th Hawaii International Conference on System Sciences  
The agents have different trust quotients for co-agents and information coming from various trust-deficit channels connecting them.  ...  A procedural framework based on third party independent authentication on agents' activities is proposed. We also present a case study on customer reimbursement patterns in automobile loan segment.  ...  In a multi party ecosystem involving customers, bankers and fraudsters, the first two parties need to exchange additional protocol/information based on independent agent's testimonials, about each other's  ... 
doi:10.1109/hicss.2013.36 dblp:conf/hicss/SahaPCM13 fatcat:y6gqj2tr2rasznjhu7xpcv7hf4

Cross-VM cache-based side channel attacks and proposed prevention mechanisms: A survey

Shahid Anwar, Zakira Inayat, Mohamad Fadli Zolkipli, Jasni Mohamad Zain, Abdullah Gani, Nor Badrul Anuar, Muhammad Khurram Khan, Victor Chang
2017 Journal of Network and Computer Applications  
A B S T R A C T The state-of-the-art Cloud Computing (CC) has been commercially popular for shared resources of third party applications.  ...  However, features namely resource sharing and Virtual Machine (VM) physical co-residency raising the potential for sensitive information leakages such as Side Channel (SC) attacks.  ...  A B S T R A C T The state-of-the-art Cloud Computing (CC) has been commercially popular for shared resources of third party applications.  ... 
doi:10.1016/j.jnca.2017.06.001 fatcat:rx2czyvlffeoxi6uhruasnipue

Foundations of State Channel Networks [article]

Stefan Dziembowski, Sebastian Faust, Kristina Hostakova
2018 IACR Cryptology ePrint Archive  
An additional benefit of our construction is the use of channel virtualization, which further reduces latency and costs in complex channel networks.  ...  A further extension of payment networks envisioned for cryptocurrencies are so-called state channel networks.  ...  This is possible because our ledger state channels can store and execute several contracts "independently" (i.e., these are multi-contract state channels).  ... 
dblp:journals/iacr/DziembowskiFH18 fatcat:xpquam2karfdfpnv3timro44dy

A comprehensive survey on smart contract construction and execution: paradigms, tools, and systems [article]

Bin Hu, Zongyang Zhang, Jianwei Liu, Yizhong Liu, Jiayuan Yin, Rongxing Lu, Xiaodong Lin
2021 Patterns   accepted
We then review the execution mechanisms in the last category and further divide the state-of-the-art solutions into three classes: private contracts with extra tools, off-chain channels, and extensions  ...  Their self-enforcing and event-driven features make some online activities possible without a trusted third party.  ...  P 1 , P 3 , P 4 and P 5 jointly build the multi-party virtual state channel γ that excludes P 2 . The mpVSCC between them refers to the instance of the multi-party virtual state channel contract.  ... 
doi:10.1016/j.patter.2020.100179 pmid:33659907 pmcid:PMC7892363 arXiv:2008.13413v2 fatcat:2k4v2olwobe2vnajvpw5qd2p3e

Realizing Multi-Access Edge Computing Feasibility: Security Perspective

Pasika Ranaweera, Anca Delia Jurcut, Madhusanka Liyanage
2019 2019 IEEE Conference on Standards for Communications and Networking (CSCN)  
To achieve these limitations, ETSI has introduced the paradigm of Multi-Access Edge Computing (MEC) for creating efficient data processing architecture extending the cloud computing capabilities in the  ...  Despite the gained enhancements to the mobile network, MEC is subjected to security challenges raised from the heterogeneity of IoT services, intricacies in integrating virtualization technologies, and  ...  ACKNOWLEDGEMENT This work is party supported by European Union in RE-SPONSE 5G (Grant No: 789658) and Academy of Finland in 6Genesis Flagship (grant no. 318927) projects.  ... 
doi:10.1109/cscn.2019.8931357 dblp:conf/cscn/RanaweeraJL19 fatcat:oyyvsxo7yrh4xktxrufvp44gnq

Open-Destination Measurement-Device-Independent Quantum Key Distribution Network

Wen-Fei Cao, Yi-Zheng Zhen, Yu-Lin Zheng, Shuai Zhao, Feihu Xu, Li Li, Zeng-Bing Chen, Nai-Le Liu, Kai Chen
2020 Entropy  
Quantum key distribution (QKD) networks hold promise for sharing secure randomness over multi-partities.  ...  The scheme enjoys security against untrusted relays and all detector side-channel attacks. Particularly, any users can accomplish key distribution under assistance of others in the network.  ...  Furthermore, following the multi-entanglement swapping scheme, the network can be extended into a large scale by adding shared multi-partite GHZ states.  ... 
doi:10.3390/e22101083 pmid:33286852 fatcat:mj7kt43fhjbxje3klmeudhhjoq

Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components [chapter]

Yuji Watanabe, Sachiko Yoshihama, Takuya Mishina, Michiharu Kudo, Hiroshi Maruyama
2006 Lecture Notes in Computer Science  
A modern computer system consists of a multi-layer stack of software, such as a hypervisor, a virtual machine, an operating system, middleware, etc.  ...  The key technology to enable TVD is the integrity assurance mechanism, which allows a remote challenger to verify the configuration and state of a node.  ...  Without loss of generality, we focus on a protocol between two nodes hereafter though we believe there is no significant difficulty to extend the mechanism to multi-party scenarios.  ... 
doi:10.1007/11863908_5 fatcat:3psullcxtzcltfgd4mloqv2zem
« Previous Showing results 1 — 15 out of 66,216 results