Proceedings of the 3rd ACM Conference on Advances in Financial Technologies最新文献

筛选
英文 中文
Spear: fast multi-path payment with redundancy Spear:具有冗余的快速多路径支付
Proceedings of the 3rd ACM Conference on Advances in Financial Technologies Pub Date : 2021-09-26 DOI: 10.1145/3479722.3480997
Sonbol Rahimpour, M. Khabbazian
{"title":"Spear: fast multi-path payment with redundancy","authors":"Sonbol Rahimpour, M. Khabbazian","doi":"10.1145/3479722.3480997","DOIUrl":"https://doi.org/10.1145/3479722.3480997","url":null,"abstract":"In a payment network, like the Lightning Network, Alice can transfer a payment to Bob by splitting the payment into partial payments and transferring these partial payments through multiple paths. The transfer, however, delays if any of the partial payments fails or delays. To handle this, one can add redundant payment paths. The challenge in doing so is that Bob may now overdraw funds from the redundant paths. To address this, Bagaria, Neu, and Tse introduced Boomerang, a mechanism based on secret sharing and homomorphic one-way functions, which allows Alice to revert the transfer if Bob overdraws. In this work, we introduce Spear, a simple method with lower latency than Boomerang. In addition, Spear needs significantly less computation, and half the maximum locktime of Boomerang. Unlike Boomerang, Spear can be implemented using only a minor change to the Lightning Network. This minor change enables both Alice and Bob to have control over the release of partial payments. This prevents Bob from ever overdrawing. Another interesting feature of Spear is that it is more robust than Boomerang against malicious intermediate nodes who do not forward payments in an attempt to lock up funds. Finally, Spear trivially supports division of a payment into uneven partial payments. This gives Alice maximum flexibility in dividing her payment into partial payments.","PeriodicalId":112726,"journal":{"name":"Proceedings of the 3rd ACM Conference on Advances in Financial Technologies","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122540246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Spear
Proceedings of the 3rd ACM Conference on Advances in Financial Technologies Pub Date : 2021-09-26 DOI: 10.1007/978-3-642-41714-6_195904
Sonbol Rahimpour, M. Khabbazian
{"title":"Spear","authors":"Sonbol Rahimpour, M. Khabbazian","doi":"10.1007/978-3-642-41714-6_195904","DOIUrl":"https://doi.org/10.1007/978-3-642-41714-6_195904","url":null,"abstract":"","PeriodicalId":112726,"journal":{"name":"Proceedings of the 3rd ACM Conference on Advances in Financial Technologies","volume":" 43","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113951717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PHANTOM GHOSTDAG: a scalable generalization of Nakamoto consensus: September 2, 2021 PHANTOM GHOSTDAG:中本共识的可扩展概括:2021年9月2日
Proceedings of the 3rd ACM Conference on Advances in Financial Technologies Pub Date : 2021-09-26 DOI: 10.1145/3479722.3480990
Yonatan Sompolinsky, Shai Wyborski, Aviv Zohar
{"title":"PHANTOM GHOSTDAG: a scalable generalization of Nakamoto consensus: September 2, 2021","authors":"Yonatan Sompolinsky, Shai Wyborski, Aviv Zohar","doi":"10.1145/3479722.3480990","DOIUrl":"https://doi.org/10.1145/3479722.3480990","url":null,"abstract":"In 2008 Satoshi Nakamoto invented the basis for blockchain-based distributed ledgers. The core concept of this system is an open and anonymous network of nodes, or miners, which together maintain a public ledger of transactions. The ledger takes the form of a chain of blocks, the blockchain, where each block is a batch of new transactions collected from users. One primary problem with Satoshi's blockchain is its highly limited scalability. The security of Satoshi's longest chain rule, more generally known as the Bitcoin protocol, requires that all honest nodes be aware of each other's blocks very soon after the block's creation. To this end, the throughput of the system is artificially suppressed so that each block fully propagates before the next one is created, and that very few \"orphan blocks\" that fork the chain be created spontaneously. In this paper we present PHANTOM, a proof-of-work based protocol for a permissionless ledger that generalizes Nakamoto's blockchain to a direct acyclic graph of blocks (blockDAG). PHANTOM includes a parameter k that controls the level of tolerance of the protocol to blocks that were created concurrently, which can be set to accommodate higher throughput. It thus avoids the security-scalability tradeoff which Satoshi's protocol suffers from. PHANTOM solves an optimization problem over the blockDAG to distinguish between blocks mined properly by honest nodes and those created by non-cooperating nodes who chose to deviate from the mining protocol. Using this distinction, PHANTOM provides a robust total order on the blockDAG in a way that is eventually agreed upon by all honest nodes. Implementing PHANTOM requires solving an NP-hard problem, and to avoid this prohibitive computation, we devised an efficient greedy algorithm GHOSTDAG that captures the essence of PHANTOM. The GHOSTDAG protocol has been implemented as the underlying technology of the Kaspa cryptocurrency. The Kaspa network allows us to produce statistics about the performance of GHOSTDAG in real world scenarios. We provide an analysis of confirmation times obtained by observing the Kaspa network. We provide a formal proof of the security of GHOSTDAG, namely, that its ordering of blocks is irreversible up to an exponentially negligible factor. We discuss the properties of GHOSTDAG and how it compares to other DAG based protocols.","PeriodicalId":112726,"journal":{"name":"Proceedings of the 3rd ACM Conference on Advances in Financial Technologies","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133578109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
On Bitcoin cash's target recalculation functions 论比特币现金的目标重算功能
Proceedings of the 3rd ACM Conference on Advances in Financial Technologies Pub Date : 2021-09-26 DOI: 10.1145/3479722.3480998
J. Garay, Yu-Ching Shen
{"title":"On Bitcoin cash's target recalculation functions","authors":"J. Garay, Yu-Ching Shen","doi":"10.1145/3479722.3480998","DOIUrl":"https://doi.org/10.1145/3479722.3480998","url":null,"abstract":"Bitcoin Cash, created in 2017, is a \"hard fork\" from Bitcoin responding to the need for allowing a higher transaction volume. This is achieved by a larger block size, as well as a new difficulty adjustment (target recalculation) function that acts more frequently (as opposed to Bitcoin's difficulty adjustment happening about every two weeks), resulting in a potentially different target for each block. While seemingly achieving its goal in practice, to our knowledge there is no formal analysis to back this proposal up. In this paper we provide the first formal cryptographic analysis of Bitcoin Cash's target recalculation functions---both ASERT and SMA (current and former recalculation functions, respectively)---against all possible adversaries. The main distinction with respect to Bitcoin's is that they are no longer epoch-based, and as such previous analyses fail to hold. We overcome this technical obstacle by introducing a new set of analytical tools focusing on the \"calibration\" of blocks' timestamps in sliding windows, which yield a measure of closeness to the initial block generation rate. With that measure, we then follow the analytical approach developed in the Bitcoin backbone protocol [Eurocrypt 2015 and follow-ups] to first establish the basic properties of the blockchain data structure, from which the properties of a robust transaction ledger (namely, Consistency and Liveness) can be derived. We compare our analytical results with data from the Bitcoin Cash network, and conclude that in order to satisfy security (namely, properties satisfied except with negligible probability in the security parameter) considerably larger parameter values should be used with respect to the ones used in practice.","PeriodicalId":112726,"journal":{"name":"Proceedings of the 3rd ACM Conference on Advances in Financial Technologies","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130262373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The velvet path to superlight blockchain clients 通往超轻区块链客户端的天鹅绒之路
Proceedings of the 3rd ACM Conference on Advances in Financial Technologies Pub Date : 2021-09-26 DOI: 10.1145/3479722.3480999
A. Kiayias, Andrianna Polydouri, Dionysis Zindros
{"title":"The velvet path to superlight blockchain clients","authors":"A. Kiayias, Andrianna Polydouri, Dionysis Zindros","doi":"10.1145/3479722.3480999","DOIUrl":"https://doi.org/10.1145/3479722.3480999","url":null,"abstract":"Superlight blockchain clients learn facts about the blockchain state while requiring merely polylogarithmic communication in the total number of blocks. For proof-of-work blockchains, two known constructions exist: Superblock and FlyClient. Unfortunately, none of them can be easily deployed to existing blockchains, as they require consensus changes and at least a soft fork to implement. In this paper, we investigate how a blockchain can be upgraded to support superblock clients without a soft fork. We show that it is possible to implement the needed changes without modifying the consensus protocol and by requiring only a minority of miners to upgrade, a process termed a \"velvet fork\" in the literature. While previous work conjectured that superblock clients can be safely deployed using velvet forks as-is, we show that previous constructions are insecure, and that using velvet techniques to interlink a blockchain can pose insidious security risks. We describe a novel class of attacks, called \"chain-sewing\", which arise in the velvet fork setting: an adversary can cut-and-paste portions of various chains from independent temporary forks, sewing them together to fool a superlight client into accepting a false claim. We show how previous velvet fork constructions can be attacked via chain-sewing. Next, we put forth the first provably secure velvet superblock client construction which we show secure against adversaries that are bounded by 1/3 of the upgraded honest miner population. Like non-velvet superlight clients, our approach allows proving generic predicates about chains using infix proofs and as such can be adopted in practice for fast synchronization of transactions and accounts.","PeriodicalId":112726,"journal":{"name":"Proceedings of the 3rd ACM Conference on Advances in Financial Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130978310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Private attacks in longest chain proof-of-stake protocols with single secret leader elections 最长链权益证明协议中单个秘密领导者选举的私人攻击
Proceedings of the 3rd ACM Conference on Advances in Financial Technologies Pub Date : 2021-09-15 DOI: 10.1145/3479722.3480996
Sarah Azouvi, Daniele Cappelletti
{"title":"Private attacks in longest chain proof-of-stake protocols with single secret leader elections","authors":"Sarah Azouvi, Daniele Cappelletti","doi":"10.1145/3479722.3480996","DOIUrl":"https://doi.org/10.1145/3479722.3480996","url":null,"abstract":"Single Secret Leader Elections have recently been proposed as an improved leader election mechanism for proof-of-stake (PoS) blockchains. However, the security gain they provide has not been quantified. In this work, we present a comparison of PoS longest-chain protocols that are based on Single Secret Leader Elections (SSLE) - that elect exactly one leader per round - versus those based on Probabilistic Leader Elections (PLE) - where one leader is elected on expectation. Our analysis shows that when considering the private attack - the worst attack on longest-chain protocols [14] - the security gained from using SSLE is substantial: the settlement time is decreased by ~ 25% for a 33% or 25% adversary. Furthermore, when considering grinding attacks, we find that the security threshold is increased by 10% (from 0.26 in the PLE case to 0.36 in the SSLE case) and the settlement time is decreased by roughly 70% for a 20% adversary in the SSLE case.","PeriodicalId":112726,"journal":{"name":"Proceedings of the 3rd ACM Conference on Advances in Financial Technologies","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132152548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Generalizing weighted trees: a bridge from Bitcoin to GHOST 泛化加权树:从比特币到GHOST的桥梁
Proceedings of the 3rd ACM Conference on Advances in Financial Technologies Pub Date : 2021-08-30 DOI: 10.1145/3479722.3480995
Ignacio Amores-Sesar, C. Cachin, Anna Parker
{"title":"Generalizing weighted trees: a bridge from Bitcoin to GHOST","authors":"Ignacio Amores-Sesar, C. Cachin, Anna Parker","doi":"10.1145/3479722.3480995","DOIUrl":"https://doi.org/10.1145/3479722.3480995","url":null,"abstract":"Despite the tremendous interest in cryptocurrencies like Bitcoin and Ethereum today, many aspects of the underlying consensus protocols are poorly understood. Therefore, the search for protocols that improve either throughput or security (or both) continues. Bitcoin always selects the longest chain (i.e., the one with most work). Forks may occur when two miners extend the same block simultaneously, and the frequency of forks depends on how fast blocks are propagated in the network. In the GHOST protocol, used by Ethereum, all blocks involved in the fork contribute to the security. However, the greedy chain selection rule of GHOST does not consider the full information available in the block tree, which has led to some concerns about its security. This paper introduces a new family of protocols, called Medium, which takes the structure of the whole block tree into account, by weighting blocks differently according to their depths. Bitcoin and GHOST result as special cases. This protocol leads to new insights about the security of Bitcoin and GHOST and paves the way for developing network- and application-specific protocols, in which the influence of forks on the chain-selection process can be controlled. It is shown that almost all protocols in this family achieve strictly greater throughput than Bitcoin (at the same security level) and resist attacks that can be mounted against GHOST.","PeriodicalId":112726,"journal":{"name":"Proceedings of the 3rd ACM Conference on Advances in Financial Technologies","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126732289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Shard scheduler: object placement and migration in sharded account-based blockchains 分片调度器:基于分片账户的区块链中的对象放置和迁移
Proceedings of the 3rd ACM Conference on Advances in Financial Technologies Pub Date : 2021-07-15 DOI: 10.1145/3479722.3480989
M. Kr'ol, Onur Ascigil, Sergi Rene, A. Sonnino, Mustafa Al-Bassam, E. Rivière
{"title":"Shard scheduler: object placement and migration in sharded account-based blockchains","authors":"M. Kr'ol, Onur Ascigil, Sergi Rene, A. Sonnino, Mustafa Al-Bassam, E. Rivière","doi":"10.1145/3479722.3480989","DOIUrl":"https://doi.org/10.1145/3479722.3480989","url":null,"abstract":"We propose Shard Scheduler, a system for object placement and migration in account-based sharded blockchains. Our system calculates optimal placement and decides on object migrations across shards. It supports complex multi-account transactions caused by smart contracts. Placement and migration decisions made by Shard Scheduler are fully deterministic, verifiable, and can be made part of the consensus protocol. Shard Scheduler reduces the number of costly cross-shard transactions, ensures balanced load distribution and maximizes the number of processed transactions for the blockchain as a whole. To this end, it leverages a novel incentive model motivating miners to maximize the global throughput of the entire blockchain rather than the throughput of a specific shard. In our simulations, Shard Scheduler can reduce the number of costly cross-shard transactions by half while ensuring equal load and increasing throughput more than 2 fold when using 60 shards. We also implement and evaluate Shard Scheduler on Chainspace, more than doubling its throughput and reducing user-perceived latency by 70% when using 10 shards.","PeriodicalId":112726,"journal":{"name":"Proceedings of the 3rd ACM Conference on Advances in Financial Technologies","volume":"115 1-2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132879646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
SoK: oracles from the ground truth to market manipulation SoK:神谕从地面真相到市场操纵
Proceedings of the 3rd ACM Conference on Advances in Financial Technologies Pub Date : 2021-06-01 DOI: 10.1145/3479722.3480994
Shayan Eskandari, M. Salehi, Wanyun Catherine Gu, Jeremy Clark
{"title":"SoK: oracles from the ground truth to market manipulation","authors":"Shayan Eskandari, M. Salehi, Wanyun Catherine Gu, Jeremy Clark","doi":"10.1145/3479722.3480994","DOIUrl":"https://doi.org/10.1145/3479722.3480994","url":null,"abstract":"One fundamental limitation of blockchain-based smart contracts is that they execute in a closed environment. Thus, they only have access to data and functionality that is already on the blockchain, or is fed into the blockchain. Any interactions with the real world need to be mediated by a bridge service, which is called an oracle. As decentralized applications mature, oracles are playing an increasingly prominent role. With their evolution comes more attacks, necessitating greater attention to their trust model. In this systemization of knowledge paper (SoK), we dissect the design alternatives for oracles, showcase attacks, and discuss attack mitigation strategies.","PeriodicalId":112726,"journal":{"name":"Proceedings of the 3rd ACM Conference on Advances in Financial Technologies","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116427598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Composing networks of automated market makers 组成自动化做市商网络
Proceedings of the 3rd ACM Conference on Advances in Financial Technologies Pub Date : 2021-05-31 DOI: 10.1145/3479722.3480987
D. Engel, M. Herlihy
{"title":"Composing networks of automated market makers","authors":"D. Engel, M. Herlihy","doi":"10.1145/3479722.3480987","DOIUrl":"https://doi.org/10.1145/3479722.3480987","url":null,"abstract":"Automated market makers (AMMs) are automata that trade electronic assets at rates set by mathematical formulas. AMMs are usually implemented by smart contracts on blockchains. In practice, AMMs are often composed: trades can be split across AMMs, and outputs from one AMM can be directed to another. This paper proposes a mathematical model for AMM composition. We define sequential and parallel composition operators for AMMs in a way that ensures that AMMs are closed under composition, in a way that works for \"higher-dimensional\" AMMs that manage more than two asset classes, and so the composition of AMMs in \"stable\" states remains stable.","PeriodicalId":112726,"journal":{"name":"Proceedings of the 3rd ACM Conference on Advances in Financial Technologies","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122042793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信