[{"publication":"5th Conference on Advances in Financial Technologies","file":[{"file_id":"14521","access_level":"open_access","date_updated":"2023-11-13T08:44:34Z","creator":"dernst","file_name":"2023_LIPIcs_Beaver.pdf","date_created":"2023-11-13T08:44:34Z","file_size":793495,"checksum":"c1f98831cb5149d6c030c41999e6e960","content_type":"application/pdf","relation":"main_file","success":1}],"month":"10","publisher":"Schloss Dagstuhl - Leibniz-Zentrum für Informatik","has_accepted_license":"1","file_date_updated":"2023-11-13T08:44:34Z","publication_status":"published","date_updated":"2023-11-13T08:52:01Z","_id":"14516","oa":1,"author":[{"first_name":"Donald","full_name":"Beaver, Donald","last_name":"Beaver"},{"last_name":"Kelkar","first_name":"Mahimna","full_name":"Kelkar, Mahimna"},{"last_name":"Lewi","first_name":"Kevin","full_name":"Lewi, Kevin"},{"last_name":"Nikolaenko","full_name":"Nikolaenko, Valeria","first_name":"Valeria"},{"first_name":"Alberto","full_name":"Sonnino, Alberto","last_name":"Sonnino"},{"full_name":"Chalkias, Konstantinos","first_name":"Konstantinos","last_name":"Chalkias"},{"first_name":"Eleftherios","full_name":"Kokoris Kogias, Eleftherios","id":"f5983044-d7ef-11ea-ac6d-fd1430a26d30","last_name":"Kokoris Kogias"},{"last_name":"Naurois","first_name":"Ladi De","full_name":"Naurois, Ladi De"},{"first_name":"Arnab","full_name":"Roy, Arnab","last_name":"Roy"}],"acknowledgement":"Work done when all the authors were at Novi Research, Meta.","year":"2023","publication_identifier":{"issn":["1868-8969"],"isbn":["9783959773034"]},"status":"public","ddc":["000"],"date_published":"2023-10-01T00:00:00Z","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","article_processing_charge":"Yes","doi":"10.4230/LIPIcs.AFT.2023.7","quality_controlled":"1","oa_version":"Published Version","main_file_link":[{"open_access":"1","url":"https://eprint.iacr.org/2021/1643"}],"type":"conference","day":"01","citation":{"mla":"Beaver, Donald, et al. “STROBE: Streaming Threshold Random Beacons.” <i>5th Conference on Advances in Financial Technologies</i>, vol. 282, 7, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2023, doi:<a href=\"https://doi.org/10.4230/LIPIcs.AFT.2023.7\">10.4230/LIPIcs.AFT.2023.7</a>.","short":"D. Beaver, M. Kelkar, K. Lewi, V. Nikolaenko, A. Sonnino, K. Chalkias, E. Kokoris Kogias, L.D. Naurois, A. Roy, in:, 5th Conference on Advances in Financial Technologies, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2023.","ama":"Beaver D, Kelkar M, Lewi K, et al. STROBE: Streaming Threshold Random Beacons. In: <i>5th Conference on Advances in Financial Technologies</i>. Vol 282. Schloss Dagstuhl - Leibniz-Zentrum für Informatik; 2023. doi:<a href=\"https://doi.org/10.4230/LIPIcs.AFT.2023.7\">10.4230/LIPIcs.AFT.2023.7</a>","ieee":"D. Beaver <i>et al.</i>, “STROBE: Streaming Threshold Random Beacons,” in <i>5th Conference on Advances in Financial Technologies</i>, Princeton, NJ, United States, 2023, vol. 282.","chicago":"Beaver, Donald, Mahimna Kelkar, Kevin Lewi, Valeria Nikolaenko, Alberto Sonnino, Konstantinos Chalkias, Eleftherios Kokoris Kogias, Ladi De Naurois, and Arnab Roy. “STROBE: Streaming Threshold Random Beacons.” In <i>5th Conference on Advances in Financial Technologies</i>, Vol. 282. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2023. <a href=\"https://doi.org/10.4230/LIPIcs.AFT.2023.7\">https://doi.org/10.4230/LIPIcs.AFT.2023.7</a>.","apa":"Beaver, D., Kelkar, M., Lewi, K., Nikolaenko, V., Sonnino, A., Chalkias, K., … Roy, A. (2023). STROBE: Streaming Threshold Random Beacons. In <i>5th Conference on Advances in Financial Technologies</i> (Vol. 282). Princeton, NJ, United States: Schloss Dagstuhl - Leibniz-Zentrum für Informatik. <a href=\"https://doi.org/10.4230/LIPIcs.AFT.2023.7\">https://doi.org/10.4230/LIPIcs.AFT.2023.7</a>","ista":"Beaver D, Kelkar M, Lewi K, Nikolaenko V, Sonnino A, Chalkias K, Kokoris Kogias E, Naurois LD, Roy A. 2023. STROBE: Streaming Threshold Random Beacons. 5th Conference on Advances in Financial Technologies. AFT: Conference on Advances in Financial Technologies, LIPIcs, vol. 282, 7."},"scopus_import":"1","title":"STROBE: Streaming Threshold Random Beacons","alternative_title":["LIPIcs"],"conference":{"start_date":"2023-10-23","location":"Princeton, NJ, United States","end_date":"2023-10-25","name":"AFT: Conference on Advances in Financial Technologies"},"date_created":"2023-11-12T23:00:55Z","language":[{"iso":"eng"}],"department":[{"_id":"ElKo"}],"article_number":"7","intvolume":"       282","tmp":{"short":"CC BY (4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","image":"/images/cc_by.png","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)"},"volume":282,"abstract":[{"text":"We revisit decentralized random beacons with a focus on practical distributed applications. Decentralized random beacons (Beaver and So, Eurocrypt'93) provide the functionality for n parties to generate an unpredictable sequence of bits in a way that cannot be biased, which is useful for any decentralized protocol requiring trusted randomness. Existing beacon constructions are highly inefficient in practical settings where protocol parties need to rejoin after crashes or disconnections, and more significantly where smart contracts may rely on arbitrary index points in high-volume streams. For this, we introduce a new notion of history-generating decentralized random beacons (HGDRBs). Roughly, the history-generation property of HGDRBs allows for previous beacon outputs to be efficiently generated knowing only the current value and the public key. At application layers, history-generation supports registering a sparser set of on-chain values if desired, so that apps like lotteries can utilize on-chain values without incurring high-frequency costs, enjoying all the benefits of DRBs implemented off-chain or with decoupled, special-purpose chains. Unlike rollups, HG is tailored specifically to recovering and verifying pseudorandom bit sequences and thus enjoys unique optimizations investigated in this work. We introduce STROBE: an efficient HGDRB construction which generalizes the original squaring-based RSA approach of Beaver and So. STROBE enjoys several useful properties that make it suited for practical applications that use beacons: 1) history-generating: it can regenerate and verify high-throughput beacon streams, supporting sparse (thus cost-effective) ledger entries; 2) concisely self-verifying: NIZK-free, with state and validation employing a single ring element; 3) eco-friendly: stake-based rather than work based; 4) unbounded: refresh-free, addressing limitations of Beaver and So; 5) delay-free: results are immediately available. 6) storage-efficient: the last beacon suffices to derive all past outputs, thus O(1) storage requirements for nodes serving the whole history.","lang":"eng"}]},{"publisher":"Usenix","has_accepted_license":"1","file_date_updated":"2023-11-28T09:14:34Z","publication":"32nd USENIX Security Symposium","file":[{"creator":"dernst","date_updated":"2023-11-28T09:14:34Z","access_level":"open_access","file_id":"14621","date_created":"2023-11-28T09:14:34Z","file_name":"2023_USENIX_Das.pdf","checksum":"1a730765930138e23c6efd2575872641","file_size":704331,"success":1,"content_type":"application/pdf","relation":"main_file"}],"month":"08","oa":1,"author":[{"last_name":"Das","first_name":"Sourav","full_name":"Das, Sourav"},{"first_name":"Zhuolun","full_name":"Xiang, Zhuolun","last_name":"Xiang"},{"last_name":"Kokoris Kogias","id":"f5983044-d7ef-11ea-ac6d-fd1430a26d30","full_name":"Kokoris Kogias, Eleftherios","first_name":"Eleftherios"},{"full_name":"Ren, Ling","first_name":"Ling","last_name":"Ren"}],"acknowledgement":"The authors would like to thank Amit Agarwal, Andrew Miller, and Tom Yurek for the helpful discussions related to the paper. This work is funded in part by a VMware early career faculty grant, a Chainlink Labs Ph.D. fellowship, the National Science Foundation, and the Austrian Science Fund (FWF) F8512-N.","year":"2023","publication_identifier":{"isbn":["9781713879497"]},"ddc":["000"],"status":"public","date_published":"2023-08-15T00:00:00Z","page":"5359-5376","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","article_processing_charge":"No","publication_status":"published","project":[{"grant_number":"F8512","_id":"34a4ce89-11ca-11ed-8bc3-8cc37fb6e11f","name":"Secure Network and Hardware for Efficient Blockchains"}],"date_updated":"2023-11-28T09:17:38Z","_id":"14609","main_file_link":[{"open_access":"1","url":"https://eprint.iacr.org/2022/1389"}],"day":"15","type":"conference","citation":{"apa":"Das, S., Xiang, Z., Kokoris Kogias, E., &#38; Ren, L. (2023). Practical asynchronous high-threshold distributed key generation and distributed polynomial sampling. In <i>32nd USENIX Security Symposium</i> (Vol. 8, pp. 5359–5376). Anaheim, CA, United States: Usenix.","ista":"Das S, Xiang Z, Kokoris Kogias E, Ren L. 2023. Practical asynchronous high-threshold distributed key generation and distributed polynomial sampling. 32nd USENIX Security Symposium. USENIX Security Symposium vol. 8, 5359–5376.","chicago":"Das, Sourav, Zhuolun Xiang, Eleftherios Kokoris Kogias, and Ling Ren. “Practical Asynchronous High-Threshold Distributed Key Generation and Distributed Polynomial Sampling.” In <i>32nd USENIX Security Symposium</i>, 8:5359–76. Usenix, 2023.","ieee":"S. Das, Z. Xiang, E. Kokoris Kogias, and L. Ren, “Practical asynchronous high-threshold distributed key generation and distributed polynomial sampling,” in <i>32nd USENIX Security Symposium</i>, Anaheim, CA, United States, 2023, vol. 8, pp. 5359–5376.","short":"S. Das, Z. Xiang, E. Kokoris Kogias, L. Ren, in:, 32nd USENIX Security Symposium, Usenix, 2023, pp. 5359–5376.","ama":"Das S, Xiang Z, Kokoris Kogias E, Ren L. Practical asynchronous high-threshold distributed key generation and distributed polynomial sampling. In: <i>32nd USENIX Security Symposium</i>. Vol 8. Usenix; 2023:5359-5376.","mla":"Das, Sourav, et al. “Practical Asynchronous High-Threshold Distributed Key Generation and Distributed Polynomial Sampling.” <i>32nd USENIX Security Symposium</i>, vol. 8, Usenix, 2023, pp. 5359–76."},"quality_controlled":"1","oa_version":"Published Version","intvolume":"         8","abstract":[{"lang":"eng","text":"Distributed Key Generation (DKG) is a technique to bootstrap threshold cryptosystems without a trusted party. DKG is an essential building block to many decentralized protocols such as randomness beacons, threshold signatures, Byzantine consensus, and multiparty computation. While significant progress has been made recently, existing asynchronous DKG constructions are inefficient when the reconstruction threshold is larger than one-third of the total nodes. In this paper, we present a simple and concretely efficient asynchronous DKG (ADKG) protocol among n = 3t + 1 nodes that can tolerate up to t malicious nodes and support any reconstruction threshold ℓ ≥ t. Our protocol has an expected O(κn3) communication cost, where κ is the security parameter, and only assumes the hardness of the Discrete Logarithm. The\r\ncore ingredient of our ADKG protocol is an asynchronous protocol to secret share a random polynomial of degree ℓ ≥ t, which has other applications, such as asynchronous proactive secret sharing and asynchronous multiparty computation. We implement our high-threshold ADKG protocol and evaluate it using a network of up to 128 geographically distributed nodes. Our evaluation shows that our high-threshold ADKG protocol reduces the running time by 90% and bandwidth usage by 80% over the state-of-the-art."}],"volume":8,"scopus_import":"1","title":"Practical asynchronous high-threshold distributed key generation and distributed polynomial sampling","date_created":"2023-11-26T23:00:55Z","conference":{"name":"USENIX Security Symposium","end_date":"2023-08-11","location":"Anaheim, CA, United States","start_date":"2023-08-09"},"language":[{"iso":"eng"}],"department":[{"_id":"ElKo"}]},{"publication":"27th International Conference on Financial Cryptography and Data Security","month":"12","publisher":"Springer Nature","publication_status":"published","date_updated":"2024-01-08T09:28:14Z","project":[{"name":"Secure Network and Hardware for Efficient Blockchains","grant_number":"F8512","_id":"34a4ce89-11ca-11ed-8bc3-8cc37fb6e11f"}],"_id":"14735","author":[{"first_name":"Christos","full_name":"Stefo, Christos","last_name":"Stefo","id":"a20e8902-32b0-11ee-9fa8-b23fa638b793"},{"full_name":"Xiang, Zhuolun","first_name":"Zhuolun","last_name":"Xiang"},{"id":"f5983044-d7ef-11ea-ac6d-fd1430a26d30","last_name":"Kokoris Kogias","full_name":"Kokoris Kogias, Eleftherios","first_name":"Eleftherios"}],"oa":1,"acknowledgement":"Eleftherios Kokoris-Kogias is partially supported by Austrian Science Fund (FWF) grant No: F8512-N.","status":"public","date_published":"2023-12-01T00:00:00Z","year":"2023","publication_identifier":{"eisbn":["9783031477546"],"issn":["1611-3349"],"isbn":["9783031477539"],"eissn":["0302-9743"]},"article_processing_charge":"No","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","page":"3-20","doi":"10.1007/978-3-031-47754-6_1","quality_controlled":"1","oa_version":"Preprint","main_file_link":[{"url":"https://eprint.iacr.org/2022/1554","open_access":"1"}],"day":"01","type":"conference","citation":{"mla":"Stefo, Christos, et al. “Executing and Proving over Dirty Ledgers.” <i>27th International Conference on Financial Cryptography and Data Security</i>, vol. 13950, Springer Nature, 2023, pp. 3–20, doi:<a href=\"https://doi.org/10.1007/978-3-031-47754-6_1\">10.1007/978-3-031-47754-6_1</a>.","short":"C. Stefo, Z. Xiang, E. Kokoris Kogias, in:, 27th International Conference on Financial Cryptography and Data Security, Springer Nature, 2023, pp. 3–20.","ieee":"C. Stefo, Z. Xiang, and E. Kokoris Kogias, “Executing and proving over dirty ledgers,” in <i>27th International Conference on Financial Cryptography and Data Security</i>, Bol, Brac, Croatia, 2023, vol. 13950, pp. 3–20.","ama":"Stefo C, Xiang Z, Kokoris Kogias E. Executing and proving over dirty ledgers. In: <i>27th International Conference on Financial Cryptography and Data Security</i>. Vol 13950. Springer Nature; 2023:3-20. doi:<a href=\"https://doi.org/10.1007/978-3-031-47754-6_1\">10.1007/978-3-031-47754-6_1</a>","ista":"Stefo C, Xiang Z, Kokoris Kogias E. 2023. Executing and proving over dirty ledgers. 27th International Conference on Financial Cryptography and Data Security. FC: Financial Cryptography and Data Security, LNCS, vol. 13950, 3–20.","apa":"Stefo, C., Xiang, Z., &#38; Kokoris Kogias, E. (2023). Executing and proving over dirty ledgers. In <i>27th International Conference on Financial Cryptography and Data Security</i> (Vol. 13950, pp. 3–20). Bol, Brac, Croatia: Springer Nature. <a href=\"https://doi.org/10.1007/978-3-031-47754-6_1\">https://doi.org/10.1007/978-3-031-47754-6_1</a>","chicago":"Stefo, Christos, Zhuolun Xiang, and Eleftherios Kokoris Kogias. “Executing and Proving over Dirty Ledgers.” In <i>27th International Conference on Financial Cryptography and Data Security</i>, 13950:3–20. Springer Nature, 2023. <a href=\"https://doi.org/10.1007/978-3-031-47754-6_1\">https://doi.org/10.1007/978-3-031-47754-6_1</a>."},"title":"Executing and proving over dirty ledgers","scopus_import":"1","alternative_title":["LNCS"],"language":[{"iso":"eng"}],"conference":{"start_date":"2023-05-01","name":"FC: Financial Cryptography and Data Security","end_date":"2023-05-05","location":"Bol, Brac, Croatia"},"date_created":"2024-01-08T09:17:38Z","department":[{"_id":"ElKo"},{"_id":"GradSch"}],"intvolume":"     13950","abstract":[{"text":"Scaling blockchain protocols to perform on par with the expected needs of Web3.0 has been proven to be a challenging task with almost a decade of research. In the forefront of the current solution is the idea of separating the execution of the updates encoded in a block from the ordering of blocks. In order to achieve this, a new class of protocols called rollups has emerged. Rollups have as input a total ordering of valid and invalid transactions and as output a new valid state-transition.\r\nIf we study rollups from a distributed computing perspective, we uncover that rollups take as input the output of a Byzantine Atomic Broadcast (BAB) protocol and convert it to a State Machine Replication (SMR) protocol. BAB and SMR, however, are considered equivalent as far as distributed computing is concerned and a solution to one can easily be retrofitted to solve the other simply by adding/removing an execution step before the validation of the input.\r\nThis “easy” step of retrofitting an atomic broadcast solution to implement an SMR has, however, been overlooked in practice. In this paper, we formalize the problem and show that after BAB is solved, traditional impossibility results for consensus no longer apply towards an SMR. Leveraging this we propose a distributed execution protocol that allows reduced execution and storage cost per executor (O(log2n/n)) without relaxing the network assumptions of the underlying BAB protocol and providing censorship-resistance. Finally, we propose efficient non-interactive light client constructions that leverage our efficient execution protocols and do not require any synchrony assumptions or expensive ZK-proofs.","lang":"eng"}],"volume":13950},{"article_processing_charge":"No","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","page":"281-297","status":"public","date_published":"2023-10-01T00:00:00Z","year":"2023","publication_identifier":{"isbn":["9798400702297"]},"abstract":[{"text":"Leader-based consensus algorithms are fast and efficient under normal conditions, but lack robustness to adverse conditions due to their reliance on timeouts for liveness. We present QuePaxa, the first protocol offering state-of-the-art normal-case efficiency without depending on timeouts. QuePaxa uses a novel randomized asynchronous consensus core to tolerate adverse conditions such as denial-of-service (DoS) attacks, while a one-round-trip fast path preserves the normal-case efficiency of Multi-Paxos or Raft. By allowing simultaneous proposers without destructive interference, and using short hedging delays instead of conservative timeouts to limit redundant effort, QuePaxa permits rapid recovery after leader failure without risking costly view changes due to false timeouts. By treating leader choice and hedging delay as a multi-armed-bandit optimization, QuePaxa achieves responsiveness to prevalent conditions, and can choose the best leader even if the current one has not failed. Experiments with a prototype confirm that QuePaxa achieves normal-case LAN and WAN performance of 584k and 250k cmd/sec in throughput, respectively, comparable to Multi-Paxos. Under conditions such as DoS attacks, misconfigurations, or slow leaders that severely impact existing protocols, we find that QuePaxa remains live with median latency under 380ms in WAN experiments.","lang":"eng"}],"acknowledgement":"The authors would like to thank Marcos K. Aguilera, Pierluca Borsò, Aleksey Charapko, Rachid Guerraoui, Jovan Komatovic, Derek Leung, Louis-Henri Merino, Shailesh Mishra, Haochen Pan, Rodrigo Rodrigues, Lewis Tseng, and Haoqian Zhang for their helpful feedback on early drafts of this paper.","author":[{"last_name":"Tennage","full_name":"Tennage, Pasindu","first_name":"Pasindu"},{"last_name":"Basescu","first_name":"Cristina","full_name":"Basescu, Cristina"},{"last_name":"Kokoris Kogias","id":"f5983044-d7ef-11ea-ac6d-fd1430a26d30","full_name":"Kokoris Kogias, Eleftherios","first_name":"Eleftherios"},{"last_name":"Syta","first_name":"Ewa","full_name":"Syta, Ewa"},{"first_name":"Philipp","full_name":"Jovanovic, Philipp","last_name":"Jovanovic"},{"last_name":"Estrada-Galinanes","full_name":"Estrada-Galinanes, Vero","first_name":"Vero"},{"last_name":"Ford","full_name":"Ford, Bryan","first_name":"Bryan"}],"oa":1,"department":[{"_id":"ElKo"}],"_id":"14743","language":[{"iso":"eng"}],"date_created":"2024-01-08T12:54:35Z","conference":{"start_date":"2023-10-23","name":"SOSP: Symposium on Operating Systems Principles","end_date":"2023-10-26","location":"Koblenz, Germany"},"date_updated":"2024-02-28T12:51:24Z","title":"QuePaxa: Escaping the tyranny of timeouts in consensus","publication_status":"published","scopus_import":"1","citation":{"apa":"Tennage, P., Basescu, C., Kokoris Kogias, E., Syta, E., Jovanovic, P., Estrada-Galinanes, V., &#38; Ford, B. (2023). QuePaxa: Escaping the tyranny of timeouts in consensus. In <i>Proceedings of the 29th Symposium on Operating Systems Principles</i> (pp. 281–297). Koblenz, Germany: Association for Computing Machinery. <a href=\"https://doi.org/10.1145/3600006.3613150\">https://doi.org/10.1145/3600006.3613150</a>","chicago":"Tennage, Pasindu, Cristina Basescu, Eleftherios Kokoris Kogias, Ewa Syta, Philipp Jovanovic, Vero Estrada-Galinanes, and Bryan Ford. “QuePaxa: Escaping the Tyranny of Timeouts in Consensus.” In <i>Proceedings of the 29th Symposium on Operating Systems Principles</i>, 281–97. Association for Computing Machinery, 2023. <a href=\"https://doi.org/10.1145/3600006.3613150\">https://doi.org/10.1145/3600006.3613150</a>.","ista":"Tennage P, Basescu C, Kokoris Kogias E, Syta E, Jovanovic P, Estrada-Galinanes V, Ford B. 2023. QuePaxa: Escaping the tyranny of timeouts in consensus. Proceedings of the 29th Symposium on Operating Systems Principles. SOSP: Symposium on Operating Systems Principles, 281–297.","ama":"Tennage P, Basescu C, Kokoris Kogias E, et al. QuePaxa: Escaping the tyranny of timeouts in consensus. In: <i>Proceedings of the 29th Symposium on Operating Systems Principles</i>. Association for Computing Machinery; 2023:281-297. doi:<a href=\"https://doi.org/10.1145/3600006.3613150\">10.1145/3600006.3613150</a>","short":"P. Tennage, C. Basescu, E. Kokoris Kogias, E. Syta, P. Jovanovic, V. Estrada-Galinanes, B. Ford, in:, Proceedings of the 29th Symposium on Operating Systems Principles, Association for Computing Machinery, 2023, pp. 281–297.","ieee":"P. Tennage <i>et al.</i>, “QuePaxa: Escaping the tyranny of timeouts in consensus,” in <i>Proceedings of the 29th Symposium on Operating Systems Principles</i>, Koblenz, Germany, 2023, pp. 281–297.","mla":"Tennage, Pasindu, et al. “QuePaxa: Escaping the Tyranny of Timeouts in Consensus.” <i>Proceedings of the 29th Symposium on Operating Systems Principles</i>, Association for Computing Machinery, 2023, pp. 281–97, doi:<a href=\"https://doi.org/10.1145/3600006.3613150\">10.1145/3600006.3613150</a>."},"type":"conference","day":"01","main_file_link":[{"open_access":"1","url":"https://doi.org/10.1145/3600006.3613150"}],"publisher":"Association for Computing Machinery","month":"10","oa_version":"Published Version","publication":"Proceedings of the 29th Symposium on Operating Systems Principles","doi":"10.1145/3600006.3613150","quality_controlled":"1"},{"date_updated":"2024-01-09T07:40:57Z","publication_status":"published","_id":"14744","acknowledgement":"The work was partially supported by the Austrian Science Fund (FWF) through the project CoRaF (grant agreement 2020388).","author":[{"first_name":"Zeta","full_name":"Avarikioti, Zeta","last_name":"Avarikioti"},{"last_name":"Desjardins","id":"06d0c166-aec1-11ee-a7c0-b96e840a602b","first_name":"Antoine","full_name":"Desjardins, Antoine"},{"id":"f5983044-d7ef-11ea-ac6d-fd1430a26d30","last_name":"Kokoris Kogias","full_name":"Kokoris Kogias, Eleftherios","first_name":"Eleftherios"},{"last_name":"Wattenhofer","full_name":"Wattenhofer, Roger","first_name":"Roger"}],"article_processing_charge":"No","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","page":"199-245","status":"public","date_published":"2023-06-01T00:00:00Z","publication_identifier":{"isbn":["9783031327322"],"eissn":["1611-3349"],"eisbn":["9783031327339"],"issn":["0302-9743"]},"year":"2023","publication":"30th International Colloquium on Structural Information and Communication Complexity","month":"06","publisher":"Springer Nature","alternative_title":["LNCS"],"title":"Divide & Scale: Formalization and roadmap to robust sharding","scopus_import":"1","department":[{"_id":"ElKo"}],"language":[{"iso":"eng"}],"date_created":"2024-01-08T12:56:46Z","conference":{"start_date":"2023-06-06","end_date":"2023-06-09","location":"Alcalá de Henares, Spain","name":"SIROCCO: Structural Information and Communication Complexity"},"intvolume":"     13892","volume":13892,"abstract":[{"lang":"eng","text":"Sharding distributed ledgers is a promising on-chain solution for scaling blockchains but lacks formal grounds, nurturing skepticism on whether such complex systems can scale blockchains securely. We fill this gap by introducing the first formal framework as well as a roadmap to robust sharding. In particular, we first define the properties sharded distributed ledgers should fulfill. We build upon and extend the Bitcoin backbone protocol by defining consistency and scalability. Consistency encompasses the need for atomic execution of cross-shard transactions to preserve safety, whereas scalability encapsulates the speedup a sharded system can gain in comparison to a non-sharded system.\r\nUsing our model, we explore the limitations of sharding. We show that a sharded ledger with n participants cannot scale under a fully adaptive adversary, but it can scale up to m shards where n=c'm log m, under an epoch-adaptive adversary; the constant c' encompasses the trade-off between security and scalability. This is possible only if the sharded ledgers create succinct proofs of the valid state updates at every epoch. We leverage our results to identify the sufficient components for robust sharding, which we incorporate in a protocol abstraction termed Divide & Scale. To demonstrate the power of our framework, we analyze the most prominent sharded blockchains (Elastico, Monoxide, OmniLedger, RapidChain) and pinpoint where they fail to meet the desired properties."}],"doi":"10.1007/978-3-031-32733-9_10","quality_controlled":"1","oa_version":"None","citation":{"ieee":"Z. Avarikioti, A. Desjardins, E. Kokoris Kogias, and R. Wattenhofer, “Divide &#38; Scale: Formalization and roadmap to robust sharding,” in <i>30th International Colloquium on Structural Information and Communication Complexity</i>, Alcalá de Henares, Spain, 2023, vol. 13892, pp. 199–245.","short":"Z. Avarikioti, A. Desjardins, E. Kokoris Kogias, R. Wattenhofer, in:, 30th International Colloquium on Structural Information and Communication Complexity, Springer Nature, 2023, pp. 199–245.","ama":"Avarikioti Z, Desjardins A, Kokoris Kogias E, Wattenhofer R. Divide &#38; Scale: Formalization and roadmap to robust sharding. In: <i>30th International Colloquium on Structural Information and Communication Complexity</i>. Vol 13892. Springer Nature; 2023:199-245. doi:<a href=\"https://doi.org/10.1007/978-3-031-32733-9_10\">10.1007/978-3-031-32733-9_10</a>","ista":"Avarikioti Z, Desjardins A, Kokoris Kogias E, Wattenhofer R. 2023. Divide &#38; Scale: Formalization and roadmap to robust sharding. 30th International Colloquium on Structural Information and Communication Complexity. SIROCCO: Structural Information and Communication Complexity, LNCS, vol. 13892, 199–245.","chicago":"Avarikioti, Zeta, Antoine Desjardins, Eleftherios Kokoris Kogias, and Roger Wattenhofer. “Divide &#38; Scale: Formalization and Roadmap to Robust Sharding.” In <i>30th International Colloquium on Structural Information and Communication Complexity</i>, 13892:199–245. Springer Nature, 2023. <a href=\"https://doi.org/10.1007/978-3-031-32733-9_10\">https://doi.org/10.1007/978-3-031-32733-9_10</a>.","apa":"Avarikioti, Z., Desjardins, A., Kokoris Kogias, E., &#38; Wattenhofer, R. (2023). Divide &#38; Scale: Formalization and roadmap to robust sharding. In <i>30th International Colloquium on Structural Information and Communication Complexity</i> (Vol. 13892, pp. 199–245). Alcalá de Henares, Spain: Springer Nature. <a href=\"https://doi.org/10.1007/978-3-031-32733-9_10\">https://doi.org/10.1007/978-3-031-32733-9_10</a>","mla":"Avarikioti, Zeta, et al. “Divide &#38; Scale: Formalization and Roadmap to Robust Sharding.” <i>30th International Colloquium on Structural Information and Communication Complexity</i>, vol. 13892, Springer Nature, 2023, pp. 199–245, doi:<a href=\"https://doi.org/10.1007/978-3-031-32733-9_10\">10.1007/978-3-031-32733-9_10</a>."},"day":"01","type":"conference"},{"alternative_title":["LNCS"],"scopus_import":"1","title":"Proof of availability and retrieval in a modular blockchain architecture","department":[{"_id":"ElKo"}],"conference":{"start_date":"2023-05-01","name":"FC: Financial Cryptography and Data Security","end_date":"2023-05-05","location":"Bol, Brac, Croatia"},"date_created":"2024-01-18T07:41:12Z","language":[{"iso":"eng"}],"intvolume":"     13951","abstract":[{"lang":"eng","text":"This paper explores a modular design architecture aimed at helping blockchains (and other SMR implementation) to scale to a very large number of processes. This comes in contrast to existing monolithic architectures that interleave transaction dissemination, ordering, and execution in a single functionality. To achieve this we first split the monolith to multiple layers which can use existing distributed computing primitives. The exact specifications of the data dissemination part are formally defined by the Proof of Availability & Retrieval (PoA &R) abstraction. Solutions to the PoA &R problem contain two related sub-protocols: one that “pushes” information into the network and another that “pulls” this information. Regarding the latter, there is a dearth of research literature which is rectified in this paper. We present a family of pulling sub-protocols and rigorously analyze them. Extensive simulations support the theoretical claims of efficiency and robustness in case of a very large number of players. Finally, actual implementation and deployment on a small number of machines (roughly the size of several industrial systems) demonstrates the viability of the architecture’s paradigm."}],"volume":13951,"doi":"10.1007/978-3-031-47751-5_3","quality_controlled":"1","oa_version":"Submitted Version","main_file_link":[{"url":"https://fc23.ifca.ai/preproceedings/150.pdf","open_access":"1"}],"citation":{"mla":"Cohen, Shir, et al. “Proof of Availability and Retrieval in a Modular Blockchain Architecture.” <i>27th International Conference on Financial Cryptography and Data Security</i>, vol. 13951, Springer Nature, 2023, pp. 36–53, doi:<a href=\"https://doi.org/10.1007/978-3-031-47751-5_3\">10.1007/978-3-031-47751-5_3</a>.","apa":"Cohen, S., Goren, G., Kokoris Kogias, E., Sonnino, A., &#38; Spiegelman, A. (2023). Proof of availability and retrieval in a modular blockchain architecture. In <i>27th International Conference on Financial Cryptography and Data Security</i> (Vol. 13951, pp. 36–53). Bol, Brac, Croatia: Springer Nature. <a href=\"https://doi.org/10.1007/978-3-031-47751-5_3\">https://doi.org/10.1007/978-3-031-47751-5_3</a>","ista":"Cohen S, Goren G, Kokoris Kogias E, Sonnino A, Spiegelman A. 2023. Proof of availability and retrieval in a modular blockchain architecture. 27th International Conference on Financial Cryptography and Data Security. FC: Financial Cryptography and Data Security, LNCS, vol. 13951, 36–53.","chicago":"Cohen, Shir, Guy Goren, Eleftherios Kokoris Kogias, Alberto Sonnino, and Alexander Spiegelman. “Proof of Availability and Retrieval in a Modular Blockchain Architecture.” In <i>27th International Conference on Financial Cryptography and Data Security</i>, 13951:36–53. Springer Nature, 2023. <a href=\"https://doi.org/10.1007/978-3-031-47751-5_3\">https://doi.org/10.1007/978-3-031-47751-5_3</a>.","ieee":"S. Cohen, G. Goren, E. Kokoris Kogias, A. Sonnino, and A. Spiegelman, “Proof of availability and retrieval in a modular blockchain architecture,” in <i>27th International Conference on Financial Cryptography and Data Security</i>, Bol, Brac, Croatia, 2023, vol. 13951, pp. 36–53.","ama":"Cohen S, Goren G, Kokoris Kogias E, Sonnino A, Spiegelman A. Proof of availability and retrieval in a modular blockchain architecture. In: <i>27th International Conference on Financial Cryptography and Data Security</i>. Vol 13951. Springer Nature; 2023:36-53. doi:<a href=\"https://doi.org/10.1007/978-3-031-47751-5_3\">10.1007/978-3-031-47751-5_3</a>","short":"S. Cohen, G. Goren, E. Kokoris Kogias, A. Sonnino, A. Spiegelman, in:, 27th International Conference on Financial Cryptography and Data Security, Springer Nature, 2023, pp. 36–53."},"type":"conference","day":"01","project":[{"grant_number":"F8512","_id":"34a4ce89-11ca-11ed-8bc3-8cc37fb6e11f","name":"Secure Network and Hardware for Efficient Blockchains"}],"date_updated":"2024-01-22T13:58:07Z","publication_status":"published","_id":"14829","acknowledgement":"This work is partially supported by Meta. Eleftherios Kokoris-Kogias is partially supported by Austrian Science Fund (FWF) grant No: F8512-N. Shir Cohen is supported by the Adams Fellowship Program of the Israel Academy of Sciences and Humanities.","oa":1,"author":[{"last_name":"Cohen","full_name":"Cohen, Shir","first_name":"Shir"},{"full_name":"Goren, Guy","first_name":"Guy","last_name":"Goren"},{"full_name":"Kokoris Kogias, Eleftherios","first_name":"Eleftherios","id":"f5983044-d7ef-11ea-ac6d-fd1430a26d30","last_name":"Kokoris Kogias"},{"last_name":"Sonnino","full_name":"Sonnino, Alberto","first_name":"Alberto"},{"last_name":"Spiegelman","first_name":"Alexander","full_name":"Spiegelman, Alexander"}],"page":"36-53","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","article_processing_charge":"No","year":"2023","publication_identifier":{"issn":["0302-9743"],"eisbn":["9783031477515"],"eissn":["1611-3349"],"isbn":["9783031477508"]},"status":"public","date_published":"2023-12-01T00:00:00Z","publication":"27th International Conference on Financial Cryptography and Data Security","month":"12","publisher":"Springer Nature"},{"oa":1,"author":[{"last_name":"Malvai","first_name":"Harjasleen","full_name":"Malvai, Harjasleen"},{"first_name":"Eleftherios","full_name":"Kokoris Kogias, Eleftherios","last_name":"Kokoris Kogias","id":"f5983044-d7ef-11ea-ac6d-fd1430a26d30"},{"last_name":"Sonnino","first_name":"Alberto","full_name":"Sonnino, Alberto"},{"first_name":"Esha","full_name":"Ghosh, Esha","last_name":"Ghosh"},{"last_name":"Oztürk","first_name":"Ercan","full_name":"Oztürk, Ercan"},{"first_name":"Kevin","full_name":"Lewi, Kevin","last_name":"Lewi"},{"last_name":"Lawlor","first_name":"Sean","full_name":"Lawlor, Sean"}],"acknowledgement":"This work is supported by the Novi team at Meta and funded in part by IC3 industry partners and NSF grant 1943499.","year":"2023","publication_identifier":{"isbn":["1891562835"]},"abstract":[{"text":"Encryption alone is not enough for secure end-to end encrypted messaging: a server must also honestly serve public keys to users. Key transparency has been presented as an efficient\r\nsolution for detecting (and hence deterring) a server that attempts to dishonestly serve keys. Key transparency involves two major components: (1) a username to public key mapping, stored and cryptographically committed to by the server, and, (2) an outof-band consistency protocol for serving short commitments to users. In the setting of real-world deployments and supporting production scale, new challenges must be considered for both of these components. We enumerate these challenges and provide solutions to address them. In particular, we design and implement a memory-optimized and privacy-preserving verifiable data structure for committing to the username to public key store.\r\nTo make this implementation viable for production, we also integrate support for persistent and distributed storage. We also propose a future-facing solution, termed “compaction”, as\r\na mechanism for mitigating practical issues that arise from dealing with infinitely growing server data structures. Finally, we implement a consensusless solution that achieves the minimum requirements for a service that consistently distributes commitments for a transparency application, providing a much more efficient protocol for distributing small and consistent\r\ncommitments to users. This culminates in our production-grade implementation of a key transparency system (Parakeet) which we have open-sourced, along with a demonstration of feasibility through our benchmarks.","lang":"eng"}],"date_published":"2023-03-01T00:00:00Z","status":"public","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","article_processing_charge":"No","title":"Parakeet: Practical key transparency for end-to-end eEncrypted messaging","publication_status":"published","date_updated":"2024-02-19T12:11:15Z","date_created":"2024-02-14T14:20:40Z","conference":{"start_date":"2023-02-27","name":"NDSS: Network and Distributed Systems Security","end_date":"2023-03-03","location":"San Diego, CA, United States"},"language":[{"iso":"eng"}],"_id":"14989","department":[{"_id":"ElKo"}],"publisher":"Internet Society","main_file_link":[{"url":"https://eprint.iacr.org/2023/081","open_access":"1"}],"day":"01","type":"conference","citation":{"ieee":"H. Malvai <i>et al.</i>, “Parakeet: Practical key transparency for end-to-end eEncrypted messaging,” in <i>Proceedings of the 2023 Network and Distributed System Security Symposium</i>, San Diego, CA, United States, 2023.","ama":"Malvai H, Kokoris Kogias E, Sonnino A, et al. Parakeet: Practical key transparency for end-to-end eEncrypted messaging. In: <i>Proceedings of the 2023 Network and Distributed System Security Symposium</i>. Internet Society; 2023. doi:<a href=\"https://doi.org/10.14722/ndss.2023.24545\">10.14722/ndss.2023.24545</a>","short":"H. Malvai, E. Kokoris Kogias, A. Sonnino, E. Ghosh, E. Oztürk, K. Lewi, S. Lawlor, in:, Proceedings of the 2023 Network and Distributed System Security Symposium, Internet Society, 2023.","apa":"Malvai, H., Kokoris Kogias, E., Sonnino, A., Ghosh, E., Oztürk, E., Lewi, K., &#38; Lawlor, S. (2023). Parakeet: Practical key transparency for end-to-end eEncrypted messaging. In <i>Proceedings of the 2023 Network and Distributed System Security Symposium</i>. San Diego, CA, United States: Internet Society. <a href=\"https://doi.org/10.14722/ndss.2023.24545\">https://doi.org/10.14722/ndss.2023.24545</a>","chicago":"Malvai, Harjasleen, Eleftherios Kokoris Kogias, Alberto Sonnino, Esha Ghosh, Ercan Oztürk, Kevin Lewi, and Sean Lawlor. “Parakeet: Practical Key Transparency for End-to-End EEncrypted Messaging.” In <i>Proceedings of the 2023 Network and Distributed System Security Symposium</i>. Internet Society, 2023. <a href=\"https://doi.org/10.14722/ndss.2023.24545\">https://doi.org/10.14722/ndss.2023.24545</a>.","ista":"Malvai H, Kokoris Kogias E, Sonnino A, Ghosh E, Oztürk E, Lewi K, Lawlor S. 2023. Parakeet: Practical key transparency for end-to-end eEncrypted messaging. Proceedings of the 2023 Network and Distributed System Security Symposium. NDSS: Network and Distributed Systems Security.","mla":"Malvai, Harjasleen, et al. “Parakeet: Practical Key Transparency for End-to-End EEncrypted Messaging.” <i>Proceedings of the 2023 Network and Distributed System Security Symposium</i>, Internet Society, 2023, doi:<a href=\"https://doi.org/10.14722/ndss.2023.24545\">10.14722/ndss.2023.24545</a>."},"quality_controlled":"1","doi":"10.14722/ndss.2023.24545","publication":"Proceedings of the 2023 Network and Distributed System Security Symposium","oa_version":"Published Version","month":"03"},{"department":[{"_id":"ElKo"}],"language":[{"iso":"eng"}],"date_created":"2023-08-09T12:09:57Z","title":"Practical limitations of Ethereum’s layer-2","scopus_import":"1","tmp":{"short":"CC BY (4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","image":"/images/cc_by.png","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)"},"abstract":[{"text":"Most permissionless blockchains inherently suffer from throughput limitations. Layer-2 systems, such as side-chains or Rollups, have been proposed as a possible strategy to overcome this limitation. Layer-2 systems interact with the main-chain in two ways. First, users can move funds from/to the main-chain to/from the layer-2. Second, layer-2 systems periodically synchronize with the main-chain to keep some form of log of their activity on the main-chain - this log is key for security. Due to this interaction with the main-chain, which is necessary and recurrent, layer-2 systems impose some load on the main-chain. The impact of such load on the main-chain has been, so far, poorly understood. In addition to that, layer-2 approaches typically sacrifice decentralization and security in favor of higher throughput. This paper presents an experimental study that analyzes the current state of Ethereum layer-2 projects. Our goal is to assess the load they impose on Ethereum and to understand their scalability potential in the long-run. Our analysis shows that the impact of any given layer-2 on the main-chain is the result of both technical aspects (how state is logged on the main-chain) and user behavior (how often users decide to transfer funds between the layer-2 and the main-chain). Based on our observations, we infer that without efficient mechanisms that allow users to transfer funds in a secure and fast manner directly from one layer-2 project to another, current layer-2 systems will not be able to scale Ethereum effectively, regardless of their technical solutions. Furthermore, from our results, we conclude that the layer-2 systems that offer similar security guarantees as Ethereum have limited scalability potential, while approaches that offer better performance, sacrifice security and lead to an increase in centralization which runs against the end-goals of permissionless blockchains.","lang":"eng"}],"volume":11,"intvolume":"        11","article_type":"original","oa_version":"Published Version","doi":"10.1109/access.2023.3237897","quality_controlled":"1","citation":{"ista":"Neiheiser R, Inacio G, Rech L, Montez C, Matos M, Rodrigues L. 2023. Practical limitations of Ethereum’s layer-2. IEEE Access. 11, 8651–8662.","apa":"Neiheiser, R., Inacio, G., Rech, L., Montez, C., Matos, M., &#38; Rodrigues, L. (2023). Practical limitations of Ethereum’s layer-2. <i>IEEE Access</i>. Institute of Electrical and Electronics Engineers. <a href=\"https://doi.org/10.1109/access.2023.3237897\">https://doi.org/10.1109/access.2023.3237897</a>","chicago":"Neiheiser, Ray, Gustavo Inacio, Luciana Rech, Carlos Montez, Miguel Matos, and Luis Rodrigues. “Practical Limitations of Ethereum’s Layer-2.” <i>IEEE Access</i>. Institute of Electrical and Electronics Engineers, 2023. <a href=\"https://doi.org/10.1109/access.2023.3237897\">https://doi.org/10.1109/access.2023.3237897</a>.","ama":"Neiheiser R, Inacio G, Rech L, Montez C, Matos M, Rodrigues L. Practical limitations of Ethereum’s layer-2. <i>IEEE Access</i>. 2023;11:8651-8662. doi:<a href=\"https://doi.org/10.1109/access.2023.3237897\">10.1109/access.2023.3237897</a>","short":"R. Neiheiser, G. Inacio, L. Rech, C. Montez, M. Matos, L. Rodrigues, IEEE Access 11 (2023) 8651–8662.","ieee":"R. Neiheiser, G. Inacio, L. Rech, C. Montez, M. Matos, and L. Rodrigues, “Practical limitations of Ethereum’s layer-2,” <i>IEEE Access</i>, vol. 11. Institute of Electrical and Electronics Engineers, pp. 8651–8662, 2023.","mla":"Neiheiser, Ray, et al. “Practical Limitations of Ethereum’s Layer-2.” <i>IEEE Access</i>, vol. 11, Institute of Electrical and Electronics Engineers, 2023, pp. 8651–62, doi:<a href=\"https://doi.org/10.1109/access.2023.3237897\">10.1109/access.2023.3237897</a>."},"type":"journal_article","day":"01","_id":"13988","date_updated":"2023-12-13T12:14:52Z","publication_status":"published","article_processing_charge":"Yes","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","page":"8651-8662","ddc":["000"],"status":"public","date_published":"2023-08-01T00:00:00Z","year":"2023","publication_identifier":{"issn":["2169-3536"]},"acknowledgement":"This work was supported in part by the Coordenação de Aperfeiçoamento de Pessoal de Nivel Superior (CAPES)—Brazil (CAPES), in part by the Fundação para a Ciência e Tecnologia (FCT) under Project UIDB/50021/2020 and Grant 2020.05270.BD, in part by the Project COSMOS (via the Orçamento de Estado (OE) with ref. PTDC/EEI-COM/29271/2017 and via the ‘‘Programa Operacional Regional de Lisboa na sua componente Fundo Europeu de Desenvolvimento Regional (FEDER)’’ with ref. Lisboa-01-0145-FEDER-029271), and in part by the project Angainor with reference LISBOA-01-0145-FEDER-031456 as well as supported by Meta Platforms for the project key Transparency at Scale.","keyword":["General Engineering","General Materials Science","General Computer Science","Electrical and Electronic Engineering"],"oa":1,"author":[{"orcid":"0000-0001-7227-8309","first_name":"Ray","full_name":"Neiheiser, Ray","last_name":"Neiheiser","id":"f09651b9-fec0-11ec-b5d8-934aff0e52a4"},{"last_name":"Inacio","first_name":"Gustavo","full_name":"Inacio, Gustavo"},{"last_name":"Rech","first_name":"Luciana","full_name":"Rech, Luciana"},{"last_name":"Montez","first_name":"Carlos","full_name":"Montez, Carlos"},{"last_name":"Matos","first_name":"Miguel","full_name":"Matos, Miguel"},{"last_name":"Rodrigues","full_name":"Rodrigues, Luis","first_name":"Luis"}],"external_id":{"isi":["000927831000001"]},"isi":1,"month":"08","file":[{"file_name":"2023_IEEEAccess_Neiheiser.pdf","date_created":"2023-08-22T06:37:48Z","access_level":"open_access","date_updated":"2023-08-22T06:37:48Z","creator":"dernst","file_id":"14166","content_type":"application/pdf","relation":"main_file","success":1,"file_size":1289285,"checksum":"4b80b0ff212edf7e5842fbdd53784432"}],"publication":"IEEE Access","file_date_updated":"2023-08-22T06:37:48Z","has_accepted_license":"1","publisher":"Institute of Electrical and Electronics Engineers"},{"month":"03","publication":"Proceedings of the 17th European Conference on Computer Systems","publisher":"Association for Computing Machinery","_id":"11331","arxiv":1,"date_updated":"2023-08-03T06:38:40Z","publication_status":"published","page":"34-50","user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","article_processing_charge":"No","publication_identifier":{"isbn":["9781450391627"]},"year":"2022","status":"public","date_published":"2022-03-28T00:00:00Z","external_id":{"arxiv":["2105.11827"],"isi":["000926506800003"]},"oa":1,"isi":1,"author":[{"last_name":"Danezis","first_name":"George","full_name":"Danezis, George"},{"last_name":"Kokoris Kogias","id":"f5983044-d7ef-11ea-ac6d-fd1430a26d30","full_name":"Kokoris Kogias, Eleftherios","first_name":"Eleftherios"},{"last_name":"Sonnino","first_name":"Alberto","full_name":"Sonnino, Alberto"},{"first_name":"Alexander","full_name":"Spiegelman, Alexander","last_name":"Spiegelman"}],"oa_version":"Preprint","doi":"10.1145/3492321.3519594","quality_controlled":"1","citation":{"mla":"Danezis, George, et al. “Narwhal and Tusk: A DAG-Based Mempool and Efficient BFT Consensus.” <i>Proceedings of the 17th European Conference on Computer Systems</i>, Association for Computing Machinery, 2022, pp. 34–50, doi:<a href=\"https://doi.org/10.1145/3492321.3519594\">10.1145/3492321.3519594</a>.","ieee":"G. Danezis, E. Kokoris Kogias, A. Sonnino, and A. Spiegelman, “Narwhal and Tusk: A DAG-based mempool and efficient BFT consensus,” in <i>Proceedings of the 17th European Conference on Computer Systems</i>, Rennes, France, 2022, pp. 34–50.","ama":"Danezis G, Kokoris Kogias E, Sonnino A, Spiegelman A. Narwhal and Tusk: A DAG-based mempool and efficient BFT consensus. In: <i>Proceedings of the 17th European Conference on Computer Systems</i>. Association for Computing Machinery; 2022:34-50. doi:<a href=\"https://doi.org/10.1145/3492321.3519594\">10.1145/3492321.3519594</a>","short":"G. Danezis, E. Kokoris Kogias, A. Sonnino, A. Spiegelman, in:, Proceedings of the 17th European Conference on Computer Systems, Association for Computing Machinery, 2022, pp. 34–50.","chicago":"Danezis, George, Eleftherios Kokoris Kogias, Alberto Sonnino, and Alexander Spiegelman. “Narwhal and Tusk: A DAG-Based Mempool and Efficient BFT Consensus.” In <i>Proceedings of the 17th European Conference on Computer Systems</i>, 34–50. Association for Computing Machinery, 2022. <a href=\"https://doi.org/10.1145/3492321.3519594\">https://doi.org/10.1145/3492321.3519594</a>.","ista":"Danezis G, Kokoris Kogias E, Sonnino A, Spiegelman A. 2022. Narwhal and Tusk: A DAG-based mempool and efficient BFT consensus. Proceedings of the 17th European Conference on Computer Systems. EuroSys: European Conference on Computer Systems, 34–50.","apa":"Danezis, G., Kokoris Kogias, E., Sonnino, A., &#38; Spiegelman, A. (2022). Narwhal and Tusk: A DAG-based mempool and efficient BFT consensus. In <i>Proceedings of the 17th European Conference on Computer Systems</i> (pp. 34–50). Rennes, France: Association for Computing Machinery. <a href=\"https://doi.org/10.1145/3492321.3519594\">https://doi.org/10.1145/3492321.3519594</a>"},"type":"conference","day":"28","main_file_link":[{"open_access":"1","url":" https://doi.org/10.48550/arXiv.2105.11827"}],"department":[{"_id":"ElKo"}],"conference":{"start_date":"2022-04-05","name":"EuroSys: European Conference on Computer Systems","end_date":"2022-04-08","location":"Rennes, France"},"date_created":"2022-04-24T22:01:43Z","language":[{"iso":"eng"}],"scopus_import":"1","title":"Narwhal and Tusk: A DAG-based mempool and efficient BFT consensus","abstract":[{"text":"We propose separating the task of reliable transaction dissemination from transaction ordering, to enable high-performance Byzantine fault-tolerant quorum-based consensus. We design and evaluate a mempool protocol, Narwhal, specializing in high-throughput reliable dissemination and storage of causal histories of transactions. Narwhal tolerates an asynchronous network and maintains high performance despite failures. Narwhal is designed to easily scale-out using multiple workers at each validator, and we demonstrate that there is no foreseeable limit to the throughput we can achieve.\r\nComposing Narwhal with a partially synchronous consensus protocol (Narwhal-HotStuff) yields significantly better throughput even in the presence of faults or intermittent loss of liveness due to asynchrony. However, loss of liveness can result in higher latency. To achieve overall good performance when faults occur we design Tusk, a zero-message overhead asynchronous consensus protocol, to work with Narwhal. We demonstrate its high performance under a variety of configurations and faults.\r\nAs a summary of results, on a WAN, Narwhal-Hotstuff achieves over 130,000 tx/sec at less than 2-sec latency compared with 1,800 tx/sec at 1-sec latency for Hotstuff. Additional workers increase throughput linearly to 600,000 tx/sec without any latency increase. Tusk achieves 160,000 tx/sec with about 3 seconds latency. Under faults, both protocols maintain high throughput, but Narwhal-HotStuff suffers from increased latency.","lang":"eng"}]},{"publisher":"Institute of Electrical and Electronics Engineers","month":"11","publication":"42nd International Conference on Distributed Computing Systems Workshops","page":"45-52","user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","article_processing_charge":"No","publication_identifier":{"eisbn":["9781665488792"],"eissn":["2332-5666"]},"year":"2022","status":"public","date_published":"2022-11-29T00:00:00Z","author":[{"last_name":"De la Rocha","first_name":"Alfonso","full_name":"De la Rocha, Alfonso"},{"last_name":"Kokoris Kogias","id":"f5983044-d7ef-11ea-ac6d-fd1430a26d30","first_name":"Eleftherios","full_name":"Kokoris Kogias, Eleftherios"},{"last_name":"Soares","first_name":"Jorge M.","full_name":"Soares, Jorge M."},{"full_name":"Vukolic, Marko","first_name":"Marko","last_name":"Vukolic"}],"isi":1,"external_id":{"isi":["000895984800009"]},"_id":"12160","date_updated":"2023-08-04T09:06:02Z","publication_status":"published","citation":{"mla":"De la Rocha, Alfonso, et al. “Hierarchical Consensus: A Horizontal Scaling Framework for Blockchains.” <i>42nd International Conference on Distributed Computing Systems Workshops</i>, vol. 2022, Institute of Electrical and Electronics Engineers, 2022, pp. 45–52, doi:<a href=\"https://doi.org/10.1109/icdcsw56584.2022.00018\">10.1109/icdcsw56584.2022.00018</a>.","ieee":"A. De la Rocha, E. Kokoris Kogias, J. M. Soares, and M. Vukolic, “Hierarchical consensus: A horizontal scaling framework for blockchains,” in <i>42nd International Conference on Distributed Computing Systems Workshops</i>, Bologna, Italy, 2022, vol. 2022, pp. 45–52.","short":"A. De la Rocha, E. Kokoris Kogias, J.M. Soares, M. Vukolic, in:, 42nd International Conference on Distributed Computing Systems Workshops, Institute of Electrical and Electronics Engineers, 2022, pp. 45–52.","ama":"De la Rocha A, Kokoris Kogias E, Soares JM, Vukolic M. Hierarchical consensus: A horizontal scaling framework for blockchains. In: <i>42nd International Conference on Distributed Computing Systems Workshops</i>. Vol 2022. Institute of Electrical and Electronics Engineers; 2022:45-52. doi:<a href=\"https://doi.org/10.1109/icdcsw56584.2022.00018\">10.1109/icdcsw56584.2022.00018</a>","ista":"De la Rocha A, Kokoris Kogias E, Soares JM, Vukolic M. 2022. Hierarchical consensus: A horizontal scaling framework for blockchains. 42nd International Conference on Distributed Computing Systems Workshops. ICDCSW: International Conference on Distributed Computing Systems Workshop vol. 2022, 45–52.","chicago":"De la Rocha, Alfonso, Eleftherios Kokoris Kogias, Jorge M. Soares, and Marko Vukolic. “Hierarchical Consensus: A Horizontal Scaling Framework for Blockchains.” In <i>42nd International Conference on Distributed Computing Systems Workshops</i>, 2022:45–52. Institute of Electrical and Electronics Engineers, 2022. <a href=\"https://doi.org/10.1109/icdcsw56584.2022.00018\">https://doi.org/10.1109/icdcsw56584.2022.00018</a>.","apa":"De la Rocha, A., Kokoris Kogias, E., Soares, J. M., &#38; Vukolic, M. (2022). Hierarchical consensus: A horizontal scaling framework for blockchains. In <i>42nd International Conference on Distributed Computing Systems Workshops</i> (Vol. 2022, pp. 45–52). Bologna, Italy: Institute of Electrical and Electronics Engineers. <a href=\"https://doi.org/10.1109/icdcsw56584.2022.00018\">https://doi.org/10.1109/icdcsw56584.2022.00018</a>"},"day":"29","type":"conference","oa_version":"None","quality_controlled":"1","doi":"10.1109/icdcsw56584.2022.00018","abstract":[{"lang":"eng","text":"We present the Filecoin Hierarchical Consensus framework, which aims to overcome the throughput challenges of blockchain consensus by horizontally scaling the network. Unlike traditional sharding designs, based on partitioning the state of the network, our solution centers on the concept of subnets -which are organized hierarchically- and can be spawned on-demand to manage new state. Child sub nets are firewalled from parent subnets, have their own specific policies, and run a different consensus algorithm, increasing the network capacity and enabling new applications. Moreover, they benefit from the security of parent subnets by periodically checkpointing state. In this paper, we introduce the overall system architecture, our detailed designs for cross-net transaction handling, and the open questions that we are still exploring."}],"volume":2022,"intvolume":"      2022","department":[{"_id":"ElKo"}],"date_created":"2023-01-12T12:09:28Z","conference":{"start_date":"2022-07-10","name":"ICDCSW: International Conference on Distributed Computing Systems Workshop","location":"Bologna, Italy","end_date":"2022-07-10"},"language":[{"iso":"eng"}],"scopus_import":"1","title":"Hierarchical consensus: A horizontal scaling framework for blockchains"},{"publication":"International Conference on Financial Cryptography and Data Security","month":"10","publisher":"Springer Nature","publication_status":"published","date_updated":"2023-09-05T15:11:35Z","_id":"12168","arxiv":1,"oa":1,"external_id":{"arxiv":["2110.00960"]},"author":[{"last_name":"Cohen","first_name":"Shir","full_name":"Cohen, Shir"},{"last_name":"Gelashvili","full_name":"Gelashvili, Rati","first_name":"Rati"},{"full_name":"Kokoris Kogias, Eleftherios","first_name":"Eleftherios","last_name":"Kokoris Kogias","id":"f5983044-d7ef-11ea-ac6d-fd1430a26d30"},{"last_name":"Li","first_name":"Zekun","full_name":"Li, Zekun"},{"full_name":"Malkhi, Dahlia","first_name":"Dahlia","last_name":"Malkhi"},{"last_name":"Sonnino","full_name":"Sonnino, Alberto","first_name":"Alberto"},{"first_name":"Alexander","full_name":"Spiegelman, Alexander","last_name":"Spiegelman"}],"publication_identifier":{"eissn":["1611-3349"],"isbn":["9783031182822"],"issn":["0302-9743"],"eisbn":["9783031182839"]},"year":"2022","date_published":"2022-10-22T00:00:00Z","status":"public","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","page":"279-295","article_processing_charge":"No","quality_controlled":"1","doi":"10.1007/978-3-031-18283-9_13","oa_version":"Preprint","main_file_link":[{"url":"https://doi.org/10.48550/arXiv.2110.00960","open_access":"1"}],"type":"conference","day":"22","citation":{"mla":"Cohen, Shir, et al. “Be Aware of Your Leaders.” <i>International Conference on Financial Cryptography and Data Security</i>, vol. 13411, Springer Nature, 2022, pp. 279–95, doi:<a href=\"https://doi.org/10.1007/978-3-031-18283-9_13\">10.1007/978-3-031-18283-9_13</a>.","ista":"Cohen S, Gelashvili R, Kokoris Kogias E, Li Z, Malkhi D, Sonnino A, Spiegelman A. 2022. Be aware of your leaders. International Conference on Financial Cryptography and Data Security. FC: Financial Cryptography and Data Security, LNCS, vol. 13411, 279–295.","chicago":"Cohen, Shir, Rati Gelashvili, Eleftherios Kokoris Kogias, Zekun Li, Dahlia Malkhi, Alberto Sonnino, and Alexander Spiegelman. “Be Aware of Your Leaders.” In <i>International Conference on Financial Cryptography and Data Security</i>, 13411:279–95. Springer Nature, 2022. <a href=\"https://doi.org/10.1007/978-3-031-18283-9_13\">https://doi.org/10.1007/978-3-031-18283-9_13</a>.","apa":"Cohen, S., Gelashvili, R., Kokoris Kogias, E., Li, Z., Malkhi, D., Sonnino, A., &#38; Spiegelman, A. (2022). Be aware of your leaders. In <i>International Conference on Financial Cryptography and Data Security</i> (Vol. 13411, pp. 279–295). Grenada: Springer Nature. <a href=\"https://doi.org/10.1007/978-3-031-18283-9_13\">https://doi.org/10.1007/978-3-031-18283-9_13</a>","short":"S. Cohen, R. Gelashvili, E. Kokoris Kogias, Z. Li, D. Malkhi, A. Sonnino, A. Spiegelman, in:, International Conference on Financial Cryptography and Data Security, Springer Nature, 2022, pp. 279–295.","ama":"Cohen S, Gelashvili R, Kokoris Kogias E, et al. Be aware of your leaders. In: <i>International Conference on Financial Cryptography and Data Security</i>. Vol 13411. Springer Nature; 2022:279-295. doi:<a href=\"https://doi.org/10.1007/978-3-031-18283-9_13\">10.1007/978-3-031-18283-9_13</a>","ieee":"S. Cohen <i>et al.</i>, “Be aware of your leaders,” in <i>International Conference on Financial Cryptography and Data Security</i>, Grenada, 2022, vol. 13411, pp. 279–295."},"scopus_import":"1","title":"Be aware of your leaders","alternative_title":["LNCS"],"conference":{"start_date":"2022-05-02","name":"FC: Financial Cryptography and Data Security","end_date":"2022-05-06","location":"Grenada"},"date_created":"2023-01-12T12:10:49Z","language":[{"iso":"eng"}],"department":[{"_id":"ElKo"}],"intvolume":"     13411","abstract":[{"lang":"eng","text":"Advances in blockchains have influenced the State-Machine-Replication (SMR) world and many state-of-the-art blockchain-SMR solutions are based on two pillars: Chaining and Leader-rotation. A predetermined round-robin mechanism used for Leader-rotation, however, has an undesirable behavior: crashed parties become designated leaders infinitely often, slowing down overall system performance. In this paper, we provide a new Leader-Aware SMR framework that, among other desirable properties, formalizes a Leader-utilization requirement that bounds the number of rounds whose leaders are faulty in crash-only executions.\r\nWe introduce Carousel, a novel, reputation-based Leader-rotation solution to achieve Leader-Aware SMR. The challenge in adaptive Leader-rotation is that it cannot rely on consensus to determine a leader, since consensus itself needs a leader. Carousel uses the available on-chain information to determine a leader locally and achieves Liveness despite this difficulty. A HotStuff implementation fitted with Carousel demonstrates drastic performance improvements: it increases throughput over 2x in faultless settings and provided a 20x throughput increase and 5x latency reduction in the presence of faults."}],"volume":13411},{"abstract":[{"text":"We present Bullshark, the first directed acyclic graph (DAG) based asynchronous Byzantine Atomic Broadcast protocol that is optimized for the common synchronous case. Like previous DAG-based BFT protocols [19, 25], Bullshark requires no extra communication to achieve consensus on top of building the DAG. That is, parties can totally order the vertices of the DAG by interpreting their local view of the DAG edges. Unlike other asynchronous DAG-based protocols, Bullshark provides a practical low latency fast-path that exploits synchronous periods and deprecates the need for notoriously complex view-change and view-synchronization mechanisms. Bullshark achieves this while maintaining all the desired properties of its predecessor DAG-Rider [25]. Namely, it has optimal amortized communication complexity, it provides fairness and asynchronous liveness, and safety is guaranteed even under a quantum adversary.\r\n\r\nIn order to show the practicality and simplicity of our approach, we also introduce a standalone partially synchronous version of Bullshark, which we evaluate against the state of the art. The implemented protocol is embarrassingly simple (200 LOC on top of an existing DAG-based mempool implementation). It is highly efficient, achieving for example, 125,000 transactions per second with a 2 seconds latency for a deployment of 50 parties. In the same setting, the state of the art pays a steep 50% latency increase as it optimizes for asynchrony.","lang":"eng"}],"title":"Bullshark: DAG BFT protocols made practical","scopus_import":"1","language":[{"iso":"eng"}],"date_created":"2023-01-16T09:49:48Z","conference":{"start_date":"2022-11-07","name":"CCS: CConference on Computer and Communications Security","location":"Los Angeles, CA, United States","end_date":"2022-11-11"},"department":[{"_id":"ElKo"}],"main_file_link":[{"open_access":"1","url":"https://doi.org/10.48550/arXiv.2201.05677"}],"day":"01","type":"conference","citation":{"ama":"Spiegelman A, Giridharan N, Sonnino A, Kokoris Kogias E. Bullshark: DAG BFT protocols made practical. In: <i>Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security</i>. Association for Computing Machinery; 2022:2705–2718. doi:<a href=\"https://doi.org/10.1145/3548606.3559361\">10.1145/3548606.3559361</a>","ieee":"A. Spiegelman, N. Giridharan, A. Sonnino, and E. Kokoris Kogias, “Bullshark: DAG BFT protocols made practical,” in <i>Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security</i>, Los Angeles, CA, United States, 2022, pp. 2705–2718.","short":"A. Spiegelman, N. Giridharan, A. Sonnino, E. Kokoris Kogias, in:, Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, Association for Computing Machinery, 2022, pp. 2705–2718.","apa":"Spiegelman, A., Giridharan, N., Sonnino, A., &#38; Kokoris Kogias, E. (2022). Bullshark: DAG BFT protocols made practical. In <i>Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security</i> (pp. 2705–2718). Los Angeles, CA, United States: Association for Computing Machinery. <a href=\"https://doi.org/10.1145/3548606.3559361\">https://doi.org/10.1145/3548606.3559361</a>","chicago":"Spiegelman, Alexander, Neil Giridharan, Alberto Sonnino, and Eleftherios Kokoris Kogias. “Bullshark: DAG BFT Protocols Made Practical.” In <i>Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security</i>, 2705–2718. Association for Computing Machinery, 2022. <a href=\"https://doi.org/10.1145/3548606.3559361\">https://doi.org/10.1145/3548606.3559361</a>.","ista":"Spiegelman A, Giridharan N, Sonnino A, Kokoris Kogias E. 2022. Bullshark: DAG BFT protocols made practical. Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. CCS: CConference on Computer and Communications Security, 2705–2718.","mla":"Spiegelman, Alexander, et al. “Bullshark: DAG BFT Protocols Made Practical.” <i>Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security</i>, Association for Computing Machinery, 2022, pp. 2705–2718, doi:<a href=\"https://doi.org/10.1145/3548606.3559361\">10.1145/3548606.3559361</a>."},"quality_controlled":"1","doi":"10.1145/3548606.3559361","oa_version":"Preprint","author":[{"last_name":"Spiegelman","first_name":"Alexander","full_name":"Spiegelman, Alexander"},{"first_name":"Neil","full_name":"Giridharan, Neil","last_name":"Giridharan"},{"last_name":"Sonnino","first_name":"Alberto","full_name":"Sonnino, Alberto"},{"id":"f5983044-d7ef-11ea-ac6d-fd1430a26d30","last_name":"Kokoris Kogias","first_name":"Eleftherios","full_name":"Kokoris Kogias, Eleftherios"}],"external_id":{"arxiv":["2201.05677"]},"oa":1,"date_published":"2022-11-01T00:00:00Z","status":"public","year":"2022","publication_identifier":{"isbn":["9781450394505"]},"article_processing_charge":"No","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","page":"2705–2718","publication_status":"published","date_updated":"2023-01-27T10:33:17Z","arxiv":1,"_id":"12229","publisher":"Association for Computing Machinery","publication":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","month":"11"},{"volume":13411,"abstract":[{"lang":"eng","text":"Existing committee-based Byzantine state machine replication (SMR) protocols, typically deployed in production blockchains, face a clear trade-off: (1) they either achieve linear communication cost in the steady state, but sacrifice liveness during periods of asynchrony, or (2) they are robust (progress with probability one) but pay quadratic communication cost. We believe this trade-off is unwarranted since existing linear protocols still have asymptotic quadratic cost in the worst case. We design Ditto, a Byzantine SMR protocol that enjoys the best of both worlds: optimal communication on and off the steady state (linear and quadratic, respectively) and progress guarantee under asynchrony and DDoS attacks. We achieve this by replacing the view-synchronization of partially synchronous protocols with an asynchronous fallback mechanism at no extra asymptotic cost. Specifically, we start from HotStuff, a state-of-the-art linear protocol, and gradually build Ditto. As a separate contribution and an intermediate step, we design a 2-chain version of HotStuff, Jolteon, which leverages a quadratic view-change mechanism to reduce the latency of the standard 3-chain HotStuff. We implement and experimentally evaluate all our systems to prove that breaking the robustness-efficiency trade-off is in the realm of practicality."}],"intvolume":"     13411","department":[{"_id":"ElKo"}],"conference":{"name":"FC: Financial Cryptography","location":"Radisson Grenada Beach Resort, Grenada","end_date":"2022-05-06","start_date":"2022-05-02"},"date_created":"2023-01-16T10:05:51Z","language":[{"iso":"eng"}],"alternative_title":["LNCS"],"scopus_import":"1","title":"Jolteon and ditto: Network-adaptive efficient consensus with asynchronous fallback","citation":{"mla":"Gelashvili, Rati, et al. “Jolteon and Ditto: Network-Adaptive Efficient Consensus with Asynchronous Fallback.” <i>Financial Cryptography and Data Security</i>, vol. 13411, Springer Nature, 2022, pp. 296–315, doi:<a href=\"https://doi.org/10.1007/978-3-031-18283-9_14\">10.1007/978-3-031-18283-9_14</a>.","ama":"Gelashvili R, Kokoris Kogias E, Sonnino A, Spiegelman A, Xiang Z. Jolteon and ditto: Network-adaptive efficient consensus with asynchronous fallback. In: <i>Financial Cryptography and Data Security</i>. Vol 13411. Springer Nature; 2022:296-315. doi:<a href=\"https://doi.org/10.1007/978-3-031-18283-9_14\">10.1007/978-3-031-18283-9_14</a>","short":"R. Gelashvili, E. Kokoris Kogias, A. Sonnino, A. Spiegelman, Z. Xiang, in:, Financial Cryptography and Data Security, Springer Nature, 2022, pp. 296–315.","ieee":"R. Gelashvili, E. Kokoris Kogias, A. Sonnino, A. Spiegelman, and Z. Xiang, “Jolteon and ditto: Network-adaptive efficient consensus with asynchronous fallback,” in <i>Financial Cryptography and Data Security</i>, Radisson Grenada Beach Resort, Grenada, 2022, vol. 13411, pp. 296–315.","chicago":"Gelashvili, Rati, Eleftherios Kokoris Kogias, Alberto Sonnino, Alexander Spiegelman, and Zhuolun Xiang. “Jolteon and Ditto: Network-Adaptive Efficient Consensus with Asynchronous Fallback.” In <i>Financial Cryptography and Data Security</i>, 13411:296–315. Springer Nature, 2022. <a href=\"https://doi.org/10.1007/978-3-031-18283-9_14\">https://doi.org/10.1007/978-3-031-18283-9_14</a>.","apa":"Gelashvili, R., Kokoris Kogias, E., Sonnino, A., Spiegelman, A., &#38; Xiang, Z. (2022). Jolteon and ditto: Network-adaptive efficient consensus with asynchronous fallback. In <i>Financial Cryptography and Data Security</i> (Vol. 13411, pp. 296–315). Radisson Grenada Beach Resort, Grenada: Springer Nature. <a href=\"https://doi.org/10.1007/978-3-031-18283-9_14\">https://doi.org/10.1007/978-3-031-18283-9_14</a>","ista":"Gelashvili R, Kokoris Kogias E, Sonnino A, Spiegelman A, Xiang Z. 2022. Jolteon and ditto: Network-adaptive efficient consensus with asynchronous fallback. Financial Cryptography and Data Security. FC: Financial Cryptography, LNCS, vol. 13411, 296–315."},"type":"conference","day":"22","main_file_link":[{"open_access":"1","url":" https://doi.org/10.48550/arXiv.2106.10362"}],"oa_version":"Preprint","quality_controlled":"1","doi":"10.1007/978-3-031-18283-9_14","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","page":"296-315","article_processing_charge":"No","year":"2022","publication_identifier":{"eisbn":["9783031182839"],"issn":["0302-9743"],"eissn":["1611-3349"],"isbn":["9783031182822"]},"date_published":"2022-10-22T00:00:00Z","status":"public","acknowledgement":"We thank our shepherd Aniket Kate and the anonymous reviewers at FC 2022 for their helpful feedback. This work is supported by the Novi team at Facebook. We also thank the Novi Research and Engineering teams for valuable feedback, and in particular Mathieu Baudet, Andrey Chursin, George Danezis, Zekun Li, and Dahlia Malkhi for discussions that shaped this work.","author":[{"full_name":"Gelashvili, Rati","first_name":"Rati","last_name":"Gelashvili"},{"first_name":"Eleftherios","full_name":"Kokoris Kogias, Eleftherios","id":"f5983044-d7ef-11ea-ac6d-fd1430a26d30","last_name":"Kokoris Kogias"},{"last_name":"Sonnino","full_name":"Sonnino, Alberto","first_name":"Alberto"},{"last_name":"Spiegelman","first_name":"Alexander","full_name":"Spiegelman, Alexander"},{"first_name":"Zhuolun","full_name":"Xiang, Zhuolun","last_name":"Xiang"}],"oa":1,"external_id":{"arxiv":["2106.10362"]},"_id":"12298","arxiv":1,"date_updated":"2023-09-05T15:13:17Z","publication_status":"published","publisher":"Springer Nature","month":"10","publication":"Financial Cryptography and Data Security"},{"publication":"2022 IEEE Symposium on Security and Privacy","doi":"10.1109/sp46214.2022.9833584","quality_controlled":"1","month":"07","oa_version":"Preprint","main_file_link":[{"open_access":"1","url":"https://eprint.iacr.org/2021/1591"}],"publisher":"Institute of Electrical and Electronics Engineers","citation":{"mla":"Das, Sourav, et al. “Practical Asynchronous Distributed Key Generation.” <i>2022 IEEE Symposium on Security and Privacy</i>, Institute of Electrical and Electronics Engineers, 2022, pp. 2518–34, doi:<a href=\"https://doi.org/10.1109/sp46214.2022.9833584\">10.1109/sp46214.2022.9833584</a>.","short":"S. Das, T. Yurek, Z. Xiang, A. Miller, E. Kokoris Kogias, L. Ren, in:, 2022 IEEE Symposium on Security and Privacy, Institute of Electrical and Electronics Engineers, 2022, pp. 2518–2534.","ama":"Das S, Yurek T, Xiang Z, Miller A, Kokoris Kogias E, Ren L. Practical asynchronous distributed key generation. In: <i>2022 IEEE Symposium on Security and Privacy</i>. Institute of Electrical and Electronics Engineers; 2022:2518-2534. doi:<a href=\"https://doi.org/10.1109/sp46214.2022.9833584\">10.1109/sp46214.2022.9833584</a>","ieee":"S. Das, T. Yurek, Z. Xiang, A. Miller, E. Kokoris Kogias, and L. Ren, “Practical asynchronous distributed key generation,” in <i>2022 IEEE Symposium on Security and Privacy</i>, San Francisco, CA, United States, 2022, pp. 2518–2534.","apa":"Das, S., Yurek, T., Xiang, Z., Miller, A., Kokoris Kogias, E., &#38; Ren, L. (2022). Practical asynchronous distributed key generation. In <i>2022 IEEE Symposium on Security and Privacy</i> (pp. 2518–2534). San Francisco, CA, United States: Institute of Electrical and Electronics Engineers. <a href=\"https://doi.org/10.1109/sp46214.2022.9833584\">https://doi.org/10.1109/sp46214.2022.9833584</a>","ista":"Das S, Yurek T, Xiang Z, Miller A, Kokoris Kogias E, Ren L. 2022. Practical asynchronous distributed key generation. 2022 IEEE Symposium on Security and Privacy. SP: Symposium on Security and Privacy, 2518–2534.","chicago":"Das, Sourav, Thomas Yurek, Zhuolun Xiang, Andrew Miller, Eleftherios Kokoris Kogias, and Ling Ren. “Practical Asynchronous Distributed Key Generation.” In <i>2022 IEEE Symposium on Security and Privacy</i>, 2518–34. Institute of Electrical and Electronics Engineers, 2022. <a href=\"https://doi.org/10.1109/sp46214.2022.9833584\">https://doi.org/10.1109/sp46214.2022.9833584</a>."},"day":"27","type":"conference","date_updated":"2023-02-16T07:43:53Z","scopus_import":"1","title":"Practical asynchronous distributed key generation","publication_status":"published","department":[{"_id":"ElKo"}],"date_created":"2023-01-16T10:06:11Z","conference":{"start_date":"2022-05-23","location":"San Francisco, CA, United States","end_date":"2022-05-26","name":"SP: Symposium on Security and Privacy"},"_id":"12300","language":[{"iso":"eng"}],"acknowledgement":"The authors would like to thank Amit Agarwal, Adithya Bhat, Kobi Gurkan, Dakshita Khurana, Nibesh Shrestha, and Gilad Stern for the helpful discussions related to the paper.\r\nAlso, the authors would like to thank Sylvain Bellemare for helping with the hbACSS codebase and Nicolas Gailly for helping with running the Drand experiments.","author":[{"first_name":"Sourav","full_name":"Das, Sourav","last_name":"Das"},{"full_name":"Yurek, Thomas","first_name":"Thomas","last_name":"Yurek"},{"last_name":"Xiang","full_name":"Xiang, Zhuolun","first_name":"Zhuolun"},{"first_name":"Andrew","full_name":"Miller, Andrew","last_name":"Miller"},{"full_name":"Kokoris Kogias, Eleftherios","first_name":"Eleftherios","id":"f5983044-d7ef-11ea-ac6d-fd1430a26d30","last_name":"Kokoris Kogias"},{"first_name":"Ling","full_name":"Ren, Ling","last_name":"Ren"}],"oa":1,"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","page":"2518-2534","article_processing_charge":"No","abstract":[{"lang":"eng","text":"Distributed Key Generation (DKG) is a technique to bootstrap threshold cryptosystems without a trusted third party and is a building block to decentralized protocols such as randomness beacons, threshold signatures, and general multiparty computation. Until recently, DKG protocols have assumed the synchronous model and thus are vulnerable when their underlying network assumptions do not hold. The recent advancements in asynchronous DKG protocols are insufficient as they either have poor efficiency or limited functionality, resulting in a lack of concrete implementations. In this paper, we present a simple and concretely efficient asynchronous DKG (ADKG) protocol. In a network of n nodes, our ADKG protocol can tolerate up to t<n/3 malicious nodes and have an expected O(κn3) communication cost, where κ is the security parameter. Our ADKG protocol produces a field element as the secret and is thus compatible with off-the-shelf threshold cryptosystems. We implement our ADKG protocol and evaluate it using a network of up to 128 nodes in geographically distributed AWS instances. Our evaluation shows that our protocol takes as low as 3 and 9.5 seconds to terminate for 32 and 64 nodes, respectively. Also, each node sends only 0.7 Megabytes and 2.9 Megabytes of data during the two experiments, respectively."}],"year":"2022","publication_identifier":{"eissn":["2375-1207"],"eisbn":["9781665413169"]},"status":"public","date_published":"2022-07-27T00:00:00Z"},{"citation":{"mla":"Blackshear, Sam, et al. “Reactive Key-Loss Protection in Blockchains.” <i>FC 2021 Workshops</i>, vol. 12676, Springer Nature, 2021, pp. 431–50, doi:<a href=\"https://doi.org/10.1007/978-3-662-63958-0_34\">10.1007/978-3-662-63958-0_34</a>.","ista":"Blackshear S, Chalkias K, Chatzigiannis P, Faizullabhoy R, Khaburzaniya I, Kokoris Kogias E, Lind J, Wong D, Zakian T. 2021. Reactive key-loss protection in blockchains. FC 2021 Workshops. FC: International Conference on Financial Cryptography and Data Security, LNCS, vol. 12676, 431–450.","apa":"Blackshear, S., Chalkias, K., Chatzigiannis, P., Faizullabhoy, R., Khaburzaniya, I., Kokoris Kogias, E., … Zakian, T. (2021). Reactive key-loss protection in blockchains. In <i>FC 2021 Workshops</i> (Vol. 12676, pp. 431–450). Virtual: Springer Nature. <a href=\"https://doi.org/10.1007/978-3-662-63958-0_34\">https://doi.org/10.1007/978-3-662-63958-0_34</a>","chicago":"Blackshear, Sam, Konstantinos Chalkias, Panagiotis Chatzigiannis, Riyaz Faizullabhoy, Irakliy Khaburzaniya, Eleftherios Kokoris Kogias, Joshua Lind, David Wong, and Tim Zakian. “Reactive Key-Loss Protection in Blockchains.” In <i>FC 2021 Workshops</i>, 12676:431–50. Springer Nature, 2021. <a href=\"https://doi.org/10.1007/978-3-662-63958-0_34\">https://doi.org/10.1007/978-3-662-63958-0_34</a>.","short":"S. Blackshear, K. Chalkias, P. Chatzigiannis, R. Faizullabhoy, I. Khaburzaniya, E. Kokoris Kogias, J. Lind, D. Wong, T. Zakian, in:, FC 2021 Workshops, Springer Nature, 2021, pp. 431–450.","ieee":"S. Blackshear <i>et al.</i>, “Reactive key-loss protection in blockchains,” in <i>FC 2021 Workshops</i>, Virtual, 2021, vol. 12676, pp. 431–450.","ama":"Blackshear S, Chalkias K, Chatzigiannis P, et al. Reactive key-loss protection in blockchains. In: <i>FC 2021 Workshops</i>. Vol 12676. Springer Nature; 2021:431-450. doi:<a href=\"https://doi.org/10.1007/978-3-662-63958-0_34\">10.1007/978-3-662-63958-0_34</a>"},"day":"17","type":"conference","main_file_link":[{"url":"https://research.fb.com/publications/reactive-key-loss-protection-in-blockchains/","open_access":"1"}],"oa_version":"Preprint","quality_controlled":"1","doi":"10.1007/978-3-662-63958-0_34","abstract":[{"text":"We present a novel approach for blockchain asset owners to reclaim their funds in case of accidental private-key loss or transfer to a mistyped address. Our solution can be deployed upon failure or absence of proactively implemented backup mechanisms, such as secret sharing and cold storage. The main advantages against previous proposals is it does not require any prior action from users and works with both single-key and multi-sig accounts. We achieve this by a 3-phase   Commit()→Reveal()→Claim()−or−Challenge()  smart contract that enables accessing funds of addresses for which the spending key is not available. We provide an analysis of the threat and incentive models and formalize the concept of reactive KEy-Loss Protection (KELP).","lang":"eng"}],"volume":"12676 ","department":[{"_id":"ElKo"}],"conference":{"location":"Virtual","end_date":"2021-03-05","name":"FC: International Conference on Financial Cryptography and Data Security","start_date":"2021-03-01"},"date_created":"2021-10-03T22:01:24Z","language":[{"iso":"eng"}],"alternative_title":["LNCS"],"scopus_import":"1","title":"Reactive key-loss protection in blockchains","publisher":"Springer Nature","month":"09","publication":"FC 2021 Workshops","user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","page":"431-450","article_processing_charge":"No","publication_identifier":{"eissn":["1611-3349"],"isbn":["978-3-6626-3957-3"],"issn":["0302-9743"],"eisbn":["978-3-662-63958-0"]},"year":"2021","date_published":"2021-09-17T00:00:00Z","status":"public","acknowledgement":"The authors would like to thank all anonymous reviewers of FC21 WTSC workshop for comments and suggestions that greatly improved the quality of this paper.","oa":1,"isi":1,"external_id":{"isi":["000713005000034"]},"author":[{"first_name":"Sam","full_name":"Blackshear, Sam","last_name":"Blackshear"},{"first_name":"Konstantinos","full_name":"Chalkias, Konstantinos","last_name":"Chalkias"},{"last_name":"Chatzigiannis","full_name":"Chatzigiannis, Panagiotis","first_name":"Panagiotis"},{"first_name":"Riyaz","full_name":"Faizullabhoy, Riyaz","last_name":"Faizullabhoy"},{"last_name":"Khaburzaniya","first_name":"Irakliy","full_name":"Khaburzaniya, Irakliy"},{"full_name":"Kokoris Kogias, Eleftherios","first_name":"Eleftherios","last_name":"Kokoris Kogias","id":"f5983044-d7ef-11ea-ac6d-fd1430a26d30"},{"full_name":"Lind, Joshua","first_name":"Joshua","last_name":"Lind"},{"last_name":"Wong","first_name":"David","full_name":"Wong, David"},{"last_name":"Zakian","full_name":"Zakian, Tim","first_name":"Tim"}],"_id":"10076","date_updated":"2023-08-14T07:06:16Z","publication_status":"published"},{"isi":1,"oa":1,"external_id":{"isi":["000712016200011"],"arxiv":["1905.11360"]},"author":[{"full_name":"Avarikioti, Zeta","first_name":"Zeta","last_name":"Avarikioti"},{"first_name":"Eleftherios","full_name":"Kokoris Kogias, Eleftherios","id":"f5983044-d7ef-11ea-ac6d-fd1430a26d30","last_name":"Kokoris Kogias"},{"last_name":"Wattenhofer","full_name":"Wattenhofer, Roger","first_name":"Roger"},{"last_name":"Zindros","full_name":"Zindros, Dionysis","first_name":"Dionysis"}],"acknowledgement":"We would like to thank Kaoutar Elkhiyaoui for her valuable feedback as well as Jakub Sliwinski for his impactful contribution to this work.","status":"public","date_published":"2021-10-23T00:00:00Z","publication_identifier":{"eissn":["1611-3349"],"isbn":["9-783-6626-4330-3"],"eisbn":["978-3-662-64331-0"],"issn":["0302-9743"]},"year":"2021","article_processing_charge":"No","page":"209-230","user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","publication_status":"published","date_updated":"2023-08-14T12:59:58Z","_id":"10324","arxiv":1,"publisher":"Springer Nature","publication":"25th International Conference on Financial Cryptography and Data Security","month":"10","abstract":[{"lang":"eng","text":"Off-chain protocols (channels) are a promising solution to the scalability and privacy challenges of blockchain payments. Current proposals, however, require synchrony assumptions to preserve the safety of a channel, leaking to an adversary the exact amount of time needed to control the network for a successful attack. In this paper, we introduce Brick, the first payment channel that remains secure under network asynchrony and concurrently provides correct incentives. The core idea is to incorporate the conflict resolution process within the channel by introducing a rational committee of external parties, called wardens. Hence, if a party wants to close a channel unilaterally, it can only get the committee’s approval for the last valid state. Additionally, Brick provides sub-second latency because it does not employ heavy-weight consensus. Instead, Brick uses consistent broadcast to announce updates and close the channel, a light-weight abstraction that is powerful enough to preserve safety and liveness to any rational parties. We formally define and prove for Brick the properties a payment channel construction should fulfill. We also design incentives for Brick such that honest and rational behavior aligns. Finally, we provide a reference implementation of the smart contracts in Solidity."}],"volume":"12675 ","title":"Brick: Asynchronous incentive-compatible payment channels","scopus_import":"1","alternative_title":["LNCS"],"language":[{"iso":"eng"}],"date_created":"2021-11-21T23:01:29Z","conference":{"start_date":"2021-03-01","name":"FC: Financial Cryptography","location":"Virtual","end_date":"2021-03-05"},"department":[{"_id":"ElKo"}],"main_file_link":[{"url":"https://arxiv.org/abs/1905.11360","open_access":"1"}],"type":"conference","day":"23","citation":{"mla":"Avarikioti, Zeta, et al. “Brick: Asynchronous Incentive-Compatible Payment Channels.” <i>25th International Conference on Financial Cryptography and Data Security</i>, vol. 12675, Springer Nature, 2021, pp. 209–30, doi:<a href=\"https://doi.org/10.1007/978-3-662-64331-0_11\">10.1007/978-3-662-64331-0_11</a>.","apa":"Avarikioti, Z., Kokoris Kogias, E., Wattenhofer, R., &#38; Zindros, D. (2021). Brick: Asynchronous incentive-compatible payment channels. In <i>25th International Conference on Financial Cryptography and Data Security</i> (Vol. 12675, pp. 209–230). Virtual: Springer Nature. <a href=\"https://doi.org/10.1007/978-3-662-64331-0_11\">https://doi.org/10.1007/978-3-662-64331-0_11</a>","ista":"Avarikioti Z, Kokoris Kogias E, Wattenhofer R, Zindros D. 2021. Brick: Asynchronous incentive-compatible payment channels. 25th International Conference on Financial Cryptography and Data Security. FC: Financial Cryptography, LNCS, vol. 12675, 209–230.","chicago":"Avarikioti, Zeta, Eleftherios Kokoris Kogias, Roger Wattenhofer, and Dionysis Zindros. “Brick: Asynchronous Incentive-Compatible Payment Channels.” In <i>25th International Conference on Financial Cryptography and Data Security</i>, 12675:209–30. Springer Nature, 2021. <a href=\"https://doi.org/10.1007/978-3-662-64331-0_11\">https://doi.org/10.1007/978-3-662-64331-0_11</a>.","ama":"Avarikioti Z, Kokoris Kogias E, Wattenhofer R, Zindros D. Brick: Asynchronous incentive-compatible payment channels. In: <i>25th International Conference on Financial Cryptography and Data Security</i>. Vol 12675. Springer Nature; 2021:209-230. doi:<a href=\"https://doi.org/10.1007/978-3-662-64331-0_11\">10.1007/978-3-662-64331-0_11</a>","ieee":"Z. Avarikioti, E. Kokoris Kogias, R. Wattenhofer, and D. Zindros, “Brick: Asynchronous incentive-compatible payment channels,” in <i>25th International Conference on Financial Cryptography and Data Security</i>, Virtual, 2021, vol. 12675, pp. 209–230.","short":"Z. Avarikioti, E. Kokoris Kogias, R. Wattenhofer, D. Zindros, in:, 25th International Conference on Financial Cryptography and Data Security, Springer Nature, 2021, pp. 209–230."},"doi":"10.1007/978-3-662-64331-0_11","quality_controlled":"1","oa_version":"Preprint"},{"quality_controlled":"1","doi":"10.1007/978-3-662-64331-0_1","oa_version":"Preprint","main_file_link":[{"open_access":"1","url":"https://eprint.iacr.org/2019/1128"}],"citation":{"ama":"Zamyatin A, Al-Bassam M, Zindros D, et al. SoK: Communication across distributed ledgers. In: <i>25th International Conference on Financial Cryptography and Data Security</i>. Vol 12675. Springer Nature; 2021:3-36. doi:<a href=\"https://doi.org/10.1007/978-3-662-64331-0_1\">10.1007/978-3-662-64331-0_1</a>","ieee":"A. Zamyatin <i>et al.</i>, “SoK: Communication across distributed ledgers,” in <i>25th International Conference on Financial Cryptography and Data Security</i>, Virtual, 2021, vol. 12675, pp. 3–36.","short":"A. Zamyatin, M. Al-Bassam, D. Zindros, E. Kokoris Kogias, P. Moreno-Sanchez, A. Kiayias, W.J. Knottenbelt, in:, 25th International Conference on Financial Cryptography and Data Security, Springer Nature, 2021, pp. 3–36.","ista":"Zamyatin A, Al-Bassam M, Zindros D, Kokoris Kogias E, Moreno-Sanchez P, Kiayias A, Knottenbelt WJ. 2021. SoK: Communication across distributed ledgers. 25th International Conference on Financial Cryptography and Data Security. FC: Financial Cryptography, LNCS, vol. 12675, 3–36.","apa":"Zamyatin, A., Al-Bassam, M., Zindros, D., Kokoris Kogias, E., Moreno-Sanchez, P., Kiayias, A., &#38; Knottenbelt, W. J. (2021). SoK: Communication across distributed ledgers. In <i>25th International Conference on Financial Cryptography and Data Security</i> (Vol. 12675, pp. 3–36). Virtual: Springer Nature. <a href=\"https://doi.org/10.1007/978-3-662-64331-0_1\">https://doi.org/10.1007/978-3-662-64331-0_1</a>","chicago":"Zamyatin, Alexei, Mustafa Al-Bassam, Dionysis Zindros, Eleftherios Kokoris Kogias, Pedro Moreno-Sanchez, Aggelos Kiayias, and William J. Knottenbelt. “SoK: Communication across Distributed Ledgers.” In <i>25th International Conference on Financial Cryptography and Data Security</i>, 12675:3–36. Springer Nature, 2021. <a href=\"https://doi.org/10.1007/978-3-662-64331-0_1\">https://doi.org/10.1007/978-3-662-64331-0_1</a>.","mla":"Zamyatin, Alexei, et al. “SoK: Communication across Distributed Ledgers.” <i>25th International Conference on Financial Cryptography and Data Security</i>, vol. 12675, Springer Nature, 2021, pp. 3–36, doi:<a href=\"https://doi.org/10.1007/978-3-662-64331-0_1\">10.1007/978-3-662-64331-0_1</a>."},"type":"conference","day":"23","alternative_title":["LNCS"],"scopus_import":"1","title":"SoK: Communication across distributed ledgers","department":[{"_id":"ElKo"}],"date_created":"2021-11-21T23:01:29Z","conference":{"location":"Virtual","end_date":"2021-03-05","name":"FC: Financial Cryptography","start_date":"2021-03-01"},"language":[{"iso":"eng"}],"abstract":[{"text":"Since the inception of Bitcoin, a plethora of distributed ledgers differing in design and purpose has been created. While by design, blockchains provide no means to securely communicate with external systems, numerous attempts towards trustless cross-chain communication have been proposed over the years. Today, cross-chain communication (CCC) plays a fundamental role in cryptocurrency exchanges, scalability efforts via sharding, extension of existing systems through sidechains, and bootstrapping of new blockchains. Unfortunately, existing proposals are designed ad-hoc for specific use-cases, making it hard to gain confidence in their correctness and composability. We provide the first systematic exposition of cross-chain communication protocols. We formalize the underlying research problem and show that CCC is impossible without a trusted third party, contrary to common beliefs in the blockchain community. With this result in mind, we develop a framework to design new and evaluate existing CCC protocols, focusing on the inherent trust assumptions thereof, and derive a classification covering the field of cross-chain communication to date. We conclude by discussing open challenges for CCC research and the implications of interoperability on the security and privacy of blockchains.","lang":"eng"}],"volume":"12675 ","publication":"25th International Conference on Financial Cryptography and Data Security","month":"10","publisher":"Springer Nature","date_updated":"2023-08-14T12:59:26Z","publication_status":"published","_id":"10325","acknowledgement":"We would like express our gratitude to Georgia Avarikioti, Daniel Perez and Dominik Harz for helpful comments and feedback on earlier versions of this manuscript. We also thank Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Edgar Weippl, and Alistair Stewart for insightful discussions during the early stages of this research. We also wish to thank the anonymous reviewers for their valuable comments that helped improve the presentation of our results. This research was funded by Bridge 1 858561 SESC; Bridge 1 864738 PR4DLT (all FFG); the Christian Doppler Laboratory for Security and Quality Improvement in the Production System Lifecycle (CDL-SQI); the competence center SBA-K1 funded by COMET; Chaincode Labs through the project SLN: Scalability for the Lightning Network; and by the Austrian Science Fund (FWF) through the Meitner program (project M-2608). Mustafa Al-Bassam is funded by a scholarship from the Alan Turing Institute. Alexei Zamyatin conducted the early stages of this work during his time at SBA Research, and was supported by a Binance Research Fellowship.","oa":1,"isi":1,"external_id":{"isi":["000712016200001"]},"author":[{"first_name":"Alexei","full_name":"Zamyatin, Alexei","last_name":"Zamyatin"},{"first_name":"Mustafa","full_name":"Al-Bassam, Mustafa","last_name":"Al-Bassam"},{"last_name":"Zindros","full_name":"Zindros, Dionysis","first_name":"Dionysis"},{"full_name":"Kokoris Kogias, Eleftherios","first_name":"Eleftherios","last_name":"Kokoris Kogias","id":"f5983044-d7ef-11ea-ac6d-fd1430a26d30"},{"full_name":"Moreno-Sanchez, Pedro","first_name":"Pedro","last_name":"Moreno-Sanchez"},{"last_name":"Kiayias","full_name":"Kiayias, Aggelos","first_name":"Aggelos"},{"first_name":"William J.","full_name":"Knottenbelt, William J.","last_name":"Knottenbelt"}],"user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","page":"3-36","article_processing_charge":"No","publication_identifier":{"isbn":["9-783-6626-4330-3"],"eissn":["1611-3349"],"eisbn":["978-3-662-64331-0"],"issn":["0302-9743"]},"year":"2021","date_published":"2021-10-23T00:00:00Z","status":"public"},{"date_created":"2021-12-16T13:20:19Z","conference":{"name":"PODC: Principles of Distributed Computing","end_date":"2021-07-30","location":"Virtual, Italy","start_date":"2021-07-26"},"language":[{"iso":"eng"}],"department":[{"_id":"ElKo"}],"scopus_import":"1","title":"Brief announcement: Be prepared when network goes bad: An asynchronous view-change protocol","abstract":[{"text":"The popularity of permissioned blockchain systems demands BFT SMR protocols that are efficient under good network conditions (synchrony) and robust under bad network conditions (asynchrony). The state-of-the-art partially synchronous BFT SMR protocols provide optimal linear communication cost per decision under synchrony and good leaders, but lose liveness under asynchrony. On the other hand, the state-of-the-art asynchronous BFT SMR protocols are live even under asynchrony, but always pay quadratic cost even under synchrony. In this paper, we propose a BFT SMR protocol that achieves the best of both worlds -- optimal linear cost per decision under good networks and leaders, optimal quadratic cost per decision under bad networks, and remains always live.","lang":"eng"}],"oa_version":"Preprint","quality_controlled":"1","doi":"10.1145/3465084.3467941","day":"21","type":"conference","citation":{"ista":"Gelashvili R, Kokoris Kogias E, Spiegelman A, Xiang Z. 2021. Brief announcement: Be prepared when network goes bad: An asynchronous view-change protocol. Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing. PODC: Principles of Distributed Computing, 187–190.","chicago":"Gelashvili, Rati, Eleftherios Kokoris Kogias, Alexander Spiegelman, and Zhuolun Xiang. “Brief Announcement: Be Prepared When Network Goes Bad: An Asynchronous View-Change Protocol.” In <i>Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing</i>, 187–90. Association for Computing Machinery, 2021. <a href=\"https://doi.org/10.1145/3465084.3467941\">https://doi.org/10.1145/3465084.3467941</a>.","apa":"Gelashvili, R., Kokoris Kogias, E., Spiegelman, A., &#38; Xiang, Z. (2021). Brief announcement: Be prepared when network goes bad: An asynchronous view-change protocol. In <i>Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing</i> (pp. 187–190). Virtual, Italy: Association for Computing Machinery. <a href=\"https://doi.org/10.1145/3465084.3467941\">https://doi.org/10.1145/3465084.3467941</a>","short":"R. Gelashvili, E. Kokoris Kogias, A. Spiegelman, Z. Xiang, in:, Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing, Association for Computing Machinery, 2021, pp. 187–190.","ieee":"R. Gelashvili, E. Kokoris Kogias, A. Spiegelman, and Z. Xiang, “Brief announcement: Be prepared when network goes bad: An asynchronous view-change protocol,” in <i>Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing</i>, Virtual, Italy, 2021, pp. 187–190.","ama":"Gelashvili R, Kokoris Kogias E, Spiegelman A, Xiang Z. Brief announcement: Be prepared when network goes bad: An asynchronous view-change protocol. In: <i>Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing</i>. Association for Computing Machinery; 2021:187-190. doi:<a href=\"https://doi.org/10.1145/3465084.3467941\">10.1145/3465084.3467941</a>","mla":"Gelashvili, Rati, et al. “Brief Announcement: Be Prepared When Network Goes Bad: An Asynchronous View-Change Protocol.” <i>Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing</i>, Association for Computing Machinery, 2021, pp. 187–90, doi:<a href=\"https://doi.org/10.1145/3465084.3467941\">10.1145/3465084.3467941</a>."},"main_file_link":[{"url":"https://arxiv.org/abs/2103.03181","open_access":"1"}],"_id":"10553","arxiv":1,"publication_status":"published","date_updated":"2023-09-04T11:42:10Z","publication_identifier":{"isbn":["9-781-4503-8548-0"]},"year":"2021","status":"public","date_published":"2021-07-21T00:00:00Z","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","page":"187-190","article_processing_charge":"No","isi":1,"external_id":{"arxiv":["2103.03181"],"isi":["000744439800018"]},"author":[{"full_name":"Gelashvili, Rati","first_name":"Rati","last_name":"Gelashvili"},{"full_name":"Kokoris Kogias, Eleftherios","first_name":"Eleftherios","last_name":"Kokoris Kogias","id":"f5983044-d7ef-11ea-ac6d-fd1430a26d30"},{"last_name":"Spiegelman","full_name":"Spiegelman, Alexander","first_name":"Alexander"},{"last_name":"Xiang","first_name":"Zhuolun","full_name":"Xiang, Zhuolun"}],"keyword":["optimal","state machine replication","fallback","asynchrony","byzantine faults"],"oa":1,"month":"07","publication":"Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing","publisher":"Association for Computing Machinery"},{"day":"21","type":"conference","citation":{"apa":"Keidar, I., Kokoris Kogias, E., Naor, O., &#38; Spiegelman, A. (2021). All You Need is DAG. In <i>Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing</i> (pp. 165–175). Virtual, Italy: Association for Computing Machinery. <a href=\"https://doi.org/10.1145/3465084.3467905\">https://doi.org/10.1145/3465084.3467905</a>","ista":"Keidar I, Kokoris Kogias E, Naor O, Spiegelman A. 2021. All You Need is DAG. Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing. PODC: Principles of Distributed Computing, 165–175.","chicago":"Keidar, Idit, Eleftherios Kokoris Kogias, Oded Naor, and Alexander Spiegelman. “All You Need Is DAG.” In <i>Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing</i>, 165–75. Association for Computing Machinery, 2021. <a href=\"https://doi.org/10.1145/3465084.3467905\">https://doi.org/10.1145/3465084.3467905</a>.","ieee":"I. Keidar, E. Kokoris Kogias, O. Naor, and A. Spiegelman, “All You Need is DAG,” in <i>Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing</i>, Virtual, Italy, 2021, pp. 165–175.","short":"I. Keidar, E. Kokoris Kogias, O. Naor, A. Spiegelman, in:, Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing, Association for Computing Machinery, 2021, pp. 165–175.","ama":"Keidar I, Kokoris Kogias E, Naor O, Spiegelman A. All You Need is DAG. In: <i>Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing</i>. Association for Computing Machinery; 2021:165-175. doi:<a href=\"https://doi.org/10.1145/3465084.3467905\">10.1145/3465084.3467905</a>","mla":"Keidar, Idit, et al. “All You Need Is DAG.” <i>Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing</i>, Association for Computing Machinery, 2021, pp. 165–75, doi:<a href=\"https://doi.org/10.1145/3465084.3467905\">10.1145/3465084.3467905</a>."},"main_file_link":[{"url":"https://arxiv.org/abs/2102.08325","open_access":"1"}],"oa_version":"Preprint","quality_controlled":"1","doi":"10.1145/3465084.3467905","abstract":[{"text":"We present DAG-Rider, the first asynchronous Byzantine Atomic Broadcast protocol that achieves optimal resilience, optimal amortized communication complexity, and optimal time complexity. DAG-Rider is post-quantum safe and ensures that all values proposed by correct processes eventually get delivered. We construct DAG-Rider in two layers: In the first layer, processes reliably broadcast their proposals and build a structured Directed Acyclic Graph (DAG) of the communication among them. In the second layer, processes locally observe their DAGs and totally order all proposals with no extra communication.","lang":"eng"}],"date_created":"2021-12-16T13:21:13Z","conference":{"start_date":"2021-07-26","location":"Virtual, Italy","end_date":"2021-07-30","name":"PODC: Principles of Distributed Computing"},"language":[{"iso":"eng"}],"department":[{"_id":"ElKo"}],"scopus_import":"1","title":"All You Need is DAG","publisher":"Association for Computing Machinery","month":"07","publication":"Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing","publication_identifier":{"isbn":["978-1-4503-8548-0"]},"year":"2021","date_published":"2021-07-21T00:00:00Z","status":"public","user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","page":"165-175","article_processing_charge":"No","external_id":{"isi":["000744439800016"],"arxiv":["2102.08325"]},"author":[{"last_name":"Keidar","first_name":"Idit","full_name":"Keidar, Idit"},{"last_name":"Kokoris Kogias","id":"f5983044-d7ef-11ea-ac6d-fd1430a26d30","first_name":"Eleftherios","full_name":"Kokoris Kogias, Eleftherios"},{"first_name":"Oded","full_name":"Naor, Oded","last_name":"Naor"},{"last_name":"Spiegelman","first_name":"Alexander","full_name":"Spiegelman, Alexander"}],"isi":1,"oa":1,"acknowledgement":"Oded Naor is grateful to the Technion Hiroshi Fujiwara Cyber-Security Research Center for providing a research grant. Part of Oded’s work was done while at Novi Research. This work was funded by the Novi team at Facebook. We also wish to thank the Novi Research team for valuable feedback, and in particular George Danezis, Alberto Sonnino, and Dahlia Malkhi.\r\n","arxiv":1,"_id":"10554","publication_status":"published","date_updated":"2023-08-17T06:24:44Z"},{"title":"CALYPSO: Private data management for decentralized ledgers","scopus_import":"1","department":[{"_id":"ElKo"}],"language":[{"iso":"eng"}],"date_created":"2021-01-17T23:01:13Z","intvolume":"        14","issue":"4","article_type":"original","tmp":{"image":"/images/cc_by_nc_nd.png","legal_code_url":"https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode","name":"Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0)","short":"CC BY-NC-ND (4.0)"},"volume":14,"abstract":[{"lang":"eng","text":"Distributed ledgers provide high availability and integrity, making them a key enabler for practical and secure computation of distributed workloads among mutually distrustful parties. Many practical applications also require strong confidentiality, however. This work enhances permissioned and permissionless blockchains with the ability to manage confidential data without forfeiting availability or decentralization. The proposed Calypso architecture addresses two orthogonal challenges confronting modern distributed ledgers: (a) enabling the auditable management of secrets and (b) protecting distributed computations against arbitrage attacks when their results depend on the ordering and secrecy of inputs.\r\n\r\nCalypso introduces on-chain secrets, a novel abstraction that enforces atomic deposition of an auditable trace whenever users access confidential data. Calypso provides user-controlled consent management that ensures revocation atomicity and accountable anonymity. To enable permissionless deployment, we introduce an incentive scheme and provide users with the option to select their preferred trustees. We evaluated our Calypso prototype with a confidential document-sharing application and a decentralized lottery. Our benchmarks show that transaction-processing latency increases linearly in terms of security (number of trustees) and is in the range of 0.2 to 8 seconds for 16 to 128 trustees."}],"quality_controlled":"1","doi":"10.14778/3436905.3436917","oa_version":"Published Version","main_file_link":[{"open_access":"1","url":"https://dl.acm.org/doi/10.14778/3436905.3436917"}],"citation":{"mla":"Kokoris Kogias, Eleftherios, et al. “CALYPSO: Private Data Management for Decentralized Ledgers.” <i>Proceedings of the VLDB Endowment</i>, vol. 14, no. 4, Association for Computing Machinery, 2020, pp. 586–99, doi:<a href=\"https://doi.org/10.14778/3436905.3436917\">10.14778/3436905.3436917</a>.","ama":"Kokoris Kogias E, Alp EC, Gasser L, Jovanovic P, Syta E, Ford B. CALYPSO: Private data management for decentralized ledgers. <i>Proceedings of the VLDB Endowment</i>. 2020;14(4):586-599. doi:<a href=\"https://doi.org/10.14778/3436905.3436917\">10.14778/3436905.3436917</a>","ieee":"E. Kokoris Kogias, E. C. Alp, L. Gasser, P. Jovanovic, E. Syta, and B. Ford, “CALYPSO: Private data management for decentralized ledgers,” <i>Proceedings of the VLDB Endowment</i>, vol. 14, no. 4. Association for Computing Machinery, pp. 586–599, 2020.","short":"E. Kokoris Kogias, E.C. Alp, L. Gasser, P. Jovanovic, E. Syta, B. Ford, Proceedings of the VLDB Endowment 14 (2020) 586–599.","apa":"Kokoris Kogias, E., Alp, E. C., Gasser, L., Jovanovic, P., Syta, E., &#38; Ford, B. (2020). CALYPSO: Private data management for decentralized ledgers. <i>Proceedings of the VLDB Endowment</i>. Association for Computing Machinery. <a href=\"https://doi.org/10.14778/3436905.3436917\">https://doi.org/10.14778/3436905.3436917</a>","ista":"Kokoris Kogias E, Alp EC, Gasser L, Jovanovic P, Syta E, Ford B. 2020. CALYPSO: Private data management for decentralized ledgers. Proceedings of the VLDB Endowment. 14(4), 586–599.","chicago":"Kokoris Kogias, Eleftherios, Enis Ceyhun Alp, Linus Gasser, Philipp Jovanovic, Ewa Syta, and Bryan Ford. “CALYPSO: Private Data Management for Decentralized Ledgers.” <i>Proceedings of the VLDB Endowment</i>. Association for Computing Machinery, 2020. <a href=\"https://doi.org/10.14778/3436905.3436917\">https://doi.org/10.14778/3436905.3436917</a>."},"type":"journal_article","day":"01","date_updated":"2023-08-24T13:57:13Z","publication_status":"published","_id":"9011","acknowledgement":"We thank Nicolas Gailly, Vincent Graf, Jean-Pierre Hubaux, Wouter Lueks, Massimo Marelli, Carmela Troncoso, Juan-Ramón Troncoso Pastoriza, Frédéric Pont, and Sandra Siby for their valuable feedback. This project was supported in part by the ETH domain under PHRT grant #2017−201, and by the AXA Research Fund, Byzgen, DFINITY, and the Swiss Data Science Center (SDSC).","oa":1,"external_id":{"isi":["000658495400012"]},"isi":1,"author":[{"last_name":"Kokoris Kogias","id":"f5983044-d7ef-11ea-ac6d-fd1430a26d30","first_name":"Eleftherios","full_name":"Kokoris Kogias, Eleftherios"},{"last_name":"Alp","first_name":"Enis Ceyhun","full_name":"Alp, Enis Ceyhun"},{"full_name":"Gasser, Linus","first_name":"Linus","last_name":"Gasser"},{"full_name":"Jovanovic, Philipp","first_name":"Philipp","last_name":"Jovanovic"},{"last_name":"Syta","first_name":"Ewa","full_name":"Syta, Ewa"},{"full_name":"Ford, Bryan","first_name":"Bryan","last_name":"Ford"}],"article_processing_charge":"No","user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","page":"586-599","license":"https://creativecommons.org/licenses/by-nc-nd/4.0/","date_published":"2020-12-01T00:00:00Z","status":"public","publication_identifier":{"eissn":["2150-8097"]},"year":"2020","publication":"Proceedings of the VLDB Endowment","month":"12","publisher":"Association for Computing Machinery"}]
