Ekiden: A platform for confidentiality-preserving, trustworthy, and performant smart contracts
Smart contracts are applications that execute on blockchains. Today they manage billions of
dollars in value and motivate visionary plans for pervasive blockchain deployment. While …
dollars in value and motivate visionary plans for pervasive blockchain deployment. While …
[PDF][PDF] Chainlink 2.0: Next steps in the evolution of decentralized oracle networks
L Breidenbach, C Cachin, B Chan, A Coventry, S Ellis… - Chainlink Labs, 2021 - naorib.ir
In this whitepaper, we articulate a vision for the evolution of Chainlink beyond its initial
conception in the original Chainlink whitepaper. We foresee an increasingly expansive role …
conception in the original Chainlink whitepaper. We foresee an increasingly expansive role …
Secure multiparty computation and trusted hardware: Examining adoption challenges and opportunities
JI Choi, KRB Butler - Security and Communication Networks, 2019 - Wiley Online Library
When two or more parties need to compute a common result while safeguarding their
sensitive inputs, they use secure multiparty computation (SMC) techniques such as garbled …
sensitive inputs, they use secure multiparty computation (SMC) techniques such as garbled …
{ROTE}: Rollback protection for trusted execution
Security architectures such as Intel SGX need protection against rollback attacks, where the
adversary violates the integrity of a protected application state by replaying old persistently …
adversary violates the integrity of a protected application state by replaying old persistently …
Sok: Preventing transaction reordering manipulations in decentralized finance
L Heimbach, R Wattenhofer - Proceedings of the 4th ACM Conference …, 2022 - dl.acm.org
User transactions on Ethereum's peer-to-peer network are at risk of being attacked. The
smart contracts building decentralized finance (DeFi) have introduced a new transaction …
smart contracts building decentralized finance (DeFi) have introduced a new transaction …
Tesseract: Real-time cryptocurrency exchange using trusted hardware
We propose Tesseract, a secure real-time cryptocurrency exchange service. Existing
centralized exchange designs are vulnerable to theft of funds, while decentralized …
centralized exchange designs are vulnerable to theft of funds, while decentralized …
Teechain: a secure payment network with asynchronous blockchain access
Blockchains such as Bitcoin and Ethereum execute payment transactions securely, but their
performance is limited by the need for global consensus. Payment networks overcome this …
performance is limited by the need for global consensus. Payment networks overcome this …
Iron: functional encryption using Intel SGX
B Fisch, D Vinayagamurthy, D Boneh… - Proceedings of the 2017 …, 2017 - dl.acm.org
Functional encryption (FE) is an extremely powerful cryptographic mechanism that lets an
authorized entity compute on encrypted data, and learn the results in the clear. However, all …
authorized entity compute on encrypted data, and learn the results in the clear. However, all …
{DIZK}: A distributed zero knowledge proof system
Recently there has been much academic and industrial interest in practical implementations
of zero knowledge proofs. These techniques allow a party to prove to another party that a …
of zero knowledge proofs. These techniques allow a party to prove to another party that a …
Fairness in an unfair world: Fair multiparty computation from public bulletin boards
Secure multiparty computation allows mutually distrusting parties to compute a function on
their private inputs such that nothing but the function output is revealed. Achieving fairness …
their private inputs such that nothing but the function output is revealed. Achieving fairness …