000 05358nam a22006375i 4500
001 978-3-031-18283-9
003 DE-He213
005 20240730170334.0
007 cr nn 008mamaa
008 221021s2022 sz | s |||| 0|eng d
020 _a9783031182839
_9978-3-031-18283-9
024 7 _a10.1007/978-3-031-18283-9
_2doi
050 4 _aQA268
072 7 _aGPJ
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM083000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.824
_223
245 1 0 _aFinancial Cryptography and Data Security
_h[electronic resource] :
_b26th International Conference, FC 2022, Grenada, May 2-6, 2022, Revised Selected Papers /
_cedited by Ittay Eyal, Juan Garay.
250 _a1st ed. 2022.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2022.
300 _aXIV, 726 p. 154 illus., 106 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v13411
505 0 _aTokenomics -- Maximizing Extractable Value from Automated Market Makers -- Kicking-the-Bucket: Fast Privacy-Preserving Trading Using Buckets -- Speculative Multipliers on DeFi: Quantifying On-Chain Leverage Risks -- MPC (mostly) -- Explainable Arguments -- MPCCache: Privacy-Preserving Multi-Party Cooperative Cache Sharing at the Edge -- Multi-party Updatable Delegated Private Set Intersection -- Privacy -- The Effect of False Positives: Why Fuzzy Message Detection Leads to Fuzzy Privacy Guarantees? -- Differential Privacy in Constant Function Market Makers -- Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing -- ZKP -- SnarkPack: Practical SNARK Aggregation -- On Interactive Oracle Proofs for Boolean R1CS Statements -- Zero Knowledge Proofs towards Verifiable Decentralized AI -- Old-School Consensus -- Be Aware of Your Leaders -- Jolteon and Ditto: Network-Adaptive Efficient Consensus with Asynchronous Fallback -- Quick Order Fairness -- Mostly Payment Networks -- Analysis and Probing of Parallel Channels in the Lightning Network -- Hide & Seek: Privacy-Preserving Rebalancing on Payment Channel Networks -- Short Paper: A Centrality Analysis of the Lightning Network -- Resurrecting Address Clustering in Bitcoin -- Incentives -- ABSNFT: Securitization and Repurchase Scheme for Non-Fungible Tokens Based on Game Theoretical Analysis -- Decentralization Conscious Players And System Reliability -- Towards Overcoming the Undercutting Problem -- Arbitrage attack: Miners of the world, unite! -- Suborn Channels: Incentives Against Timelock Bribes -- Sliding Window Challenge Process for Congestion Detection -- Short Paper: On Game-Theoretically-Fair Leader Election -- Not Proof of Work -- The Availability-Accountability Dilemma and its Resolution via Accountability Gadgets -- Three Attacks on Proof-of-Stake Ethereum -- Permissionless Consensus in the Resource Model -- Performance -- Plumo: An Ultralight Blockchain Client -- SoK: Blockchain Light Clients -- Achieving Almost All Blockchain Functionalities with Polylogarithmic Storage -- Measurements -- Short Paper: On the Claims of Weak Block Synchronization in Bitcoin -- India's "Aadhaar" Biometric ID: Structure, Security, and Vulnerabilities -- Short Paper: What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network -- An empirical study of two Bitcoin artifacts through deep learning.
520 _aThis book constitutes revised selected papers from the proceedings of the 26th International Conference on Financial Cryptography and Data Security, FC 2022, which was held in Grenada during May 2022. The 32 full papers and 4 short papers included in this book were carefully reviewed and selected from 159 submissions. They were organized in topical sections as follows: tokenomics; MPC (mostly); privacy; ZKP; old-school consensus; mostly payment networks; incentives; not proof of work; performance; measurements.
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aComputer networks .
_931572
650 0 _aOperating systems (Computers).
_95329
650 0 _aApplication software.
_992907
650 0 _aData protection.
_97245
650 1 4 _aCryptology.
_931769
650 2 4 _aComputer Communication Networks.
_992908
650 2 4 _aOperating Systems.
_937074
650 2 4 _aComputer and Information Systems Applications.
_992909
650 2 4 _aData and Information Security.
_931990
700 1 _aEyal, Ittay.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_992910
700 1 _aGaray, Juan.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_992911
710 2 _aSpringerLink (Online service)
_992912
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031182822
776 0 8 _iPrinted edition:
_z9783031182846
830 0 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v13411
_923263
856 4 0 _uhttps://doi.org/10.1007/978-3-031-18283-9
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c86857
_d86857