FC 2020论文录用列表
2019-11-29 11:00:17 Author: mp.weixin.qq.com(查看原文) 阅读量:109 收藏

金融密码学与数据安全国际会议(FC 2020:International Conference on Financial Cryptography and Data Security)属于CCF C类会议,聚焦计算机安全和金融的交叉领域,侧重关注区块链应用与安全、金融系统中的安全性和加密技术等,是发表区块链论文最多的会议。FC2020共录取36篇论文,小编将录用论文标题列举如下:

•Leveraging Bitcoin Testnet for Bidirectional Botnet Command and Control Systems.

Federico Franzoni (Universitat Pompeu Fabra), Vanesa Daza (Universitat Pompeu Fabra), Iván Abellán (Universitat Pompeu Fabra)

Security Analysis on dBFT protocol of NEO.

Qin Wang (Swinburne University of Technology), Jiangshan Yu (Monash University), Zhiniang Peng (Qihoo 360 Core Security), Vancuong Bui (Swinburne University of Technology), Shiping Chen (Csiro, Data61), Yong Ding (Cyberspace Security Research Center), Yang Xiang (Swinburne University of Technology)

Breaking the encryption scheme of the Moscow internet voting system.

Pierrick Gaudry (CNRS, Inria, Université de Lorraine), Alexander Golovnev (Harvard University)

Short Paper: XOR Arbiter PUFs have Systematic Response Bias.

Nils Wisiol (Technische Universität Berlin), Niklas Pirnay (Technische Universität Berlin)

Selfish Mining Re-Examined.

Kevin Alarcón Negy (Cornell University), Peter R. Rizun (Bitcoin Unlimited), Emin Gün Sirer (Cornell University)

Fairness and Efficiency in DAG-based Cryptocurrencies. 

Georgios Birmpas (University of Oxford), Elias Koutsoupias (University of Oxford), Philip Lazos (Sapienza University of Rome), Francisco J. Marmolejo Cossío (University of Oxford)

Stake Shift in Major Cryptocurrencies: An Empirical Study.

Rainer Stütz (Austrian Institute of Technology), Peter Gaži (IOHK), Bernhard Haslhofer (Austrian Institute of Technology), Jacob Illium (Chainalysis)

Distributed Privacy-Preserving Netting Protocolon Blockchain for Payment Systems. 

Shengjiao Cao (Ant Financial), Yuan Yuan (Ant Financial), Angelo De Caro (IBM Research), Karthik Nandakumar (IBM Research), Kaoutar Elkhiyaoui (IBM Research), Yanyan Hu (IBM Research)

The Arwen Trading Protocols.

Ethan Heilman (Boston University/Arwen), Sebastien Lipmann (Arwen), Sharon Goldberg (Boston University/Arwen)

SoK: A Classification Framework for Stablecoin Designs.

Amani Moin (Cornell University), Kevin Sekniqi (Cornell University), Emin Gün Sirer (Cornell University)

SoK: Layer-Two Blockchain Protocols. 

Lewis Gudgeon (Imperial College London), Pedro Moreno-Sanchez (TU Wein), Stefanie Roos (TU Delft), Patrick McCorry (PISA Research), Arthur Gervais (Imperial College London)

MicroCash: Practical Concurrent Processing of Micropayments. 

Ghada Almashaqbeh (Columbia), Allison Bishop (Proof of Trading and Columbia), Justin Cappos (New York University)

•LockDown: Balance Availability Attack against Lightning Network Channels.

Cristina Pérez-Solà (Universitat Oberta de Catalunya), Alejandro Ranchal-Pedrosa (University of Sydney), Jordi Herrera-Joancomarti (Universitat Autònoma de Barcelona), Guillermo Navarro-Arribas (Universitat Autònoma de Barcelona), Joaquin Garcia-Alfaro (Institut Polytechnique de Paris)

Payment Channel Creation Game.

Georgia Avarikioti (ETH Zurich), Lioba Heimbach (ETH Zurich), Yuyi Wang (ETH Zurich), Roger Wattenhofer (ETH Zurich)

How to profit from payment channels.

Oguzhan Ersoy (Delft University of Technology), Stefanie Roos (Delft University of Technology), Zekeriya Erkin (Delft University of Technology)

Boomerang: Redundancy Improves Latency and Throughput in Payment Networks.  

Joachim Neu (Stanford University), Vivek Bagaria (Stanford University), David Tse (Stanford University)

DLSAG: Non-Interactive Refund Transactions For Interoperable Payment Channels in Monero.

Pedro Moreno-Sanchez (TU Wien), Arthur Blue, Duc Le (Purdue University), Sarang Noether (Monero Research Lab), Brandon Goodell (Monero Research Lab), Aniket Kate (Purdue University)

•Cerberus Channels: Incentivizing Watchtowers for Bitcoin.

Georgia Avarikioti (ETH Zurich), Orfeas Stefanos Thyfronitis Litos (University of Edinburgh), Roger Wattenhofer (ETH Zurich)

Communication-Efficient (Client-Aided) Secure Two-Party Protocols and Its Application.

Satsuya Ohata (AIST), Koji Nuida (The University of Tokyo / AIST)

Secure Computation of the kth-Ranked Element in a Star Network.

Anselme Tueno (SAP SE), Florian Kerschbaum (University of Waterloo), Stefan Katzenbeisser (University of Passau), Yordan Boev (SAP SE), Mubashir Qureshi (SAP SE)

•Insured MPC: Efficient Secure Computation with Financial Penalties.

Carsten Baum (Aarhus University), Bernardo David (IT University of Copenhagen), Rafael Dowsley (Bar-Ilan University)

Zether: Towards Privacy in a Smart Contract World.

Benedikt Bünz (Stanford University), Shashank Agrawal (Visa Research), Mahdi Zamani (Visa Research), Dan Boneh (Stanford University)

An airdrop that preserves recipient privacy.

Riad S. Wahby (Stanford), Dan Boneh (Stanford), Christopher Jeffrey (Purse.io), Joseph Poon (Lightning Network)

•RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security. 

Tsz Hon Yuen (The University of Hong Kong), Shi-feng Sun (Monash University), Joseph K. Liu (Monash University), Man Ho Au (Hong Kong Polytechnic University), Muhammed F. Esgin (Monash University), Qingzhao Zhang (Shanghai Jiao Tong University), Dawu Gu (Shanghai Jiao Tong University)

BLAZE: Practical Lattice-Based Blind Signatures for Privacy-Preserving Applications. 

Nabil Alkeilani Alkadri (Technische Universität Darmstadt), Rachid El Bansarkhani (QuantiCor Security GmbH), Johannes Buchmann (Technische Universität Darmstadt)

Non-Interactive Proofs of Proof-of-Work.

Aggelos Kiayias (University of Edinburgh and IOHK), Andrew Miller (University of Illinois at Urbana-Champaign), Dionysis Zindros (University of Athens and IOHK)

Proof-of-Burn.

Kostis Karantias (IOHK), Aggelos Kiayias (University of Edinburgh and IOHK), Dionysis Zindros (University of Athens and IOHK)

Non-interactive Cryptographic Timestamping based on Verifiable Delay Functions.

Esteban Landerreche (CWI Amsterdam), Marc Stevens (CWI Amsterdam), Christian Schaffner (University of Amsterdam)

Coded Merkle Tree: Solving Data Availability Attacks in Blockchains.

Mingchao Yu (University of Southern California), Saeid Sahraei (University of Southern California), Songze Li, Salman Avestimehr (University of Southern California), Sreeram Kannan (University of Washington), Pramod Viswanath (University of Illinois at Urbana-Champaign)

•Open Market or Ghost Town? The Curious Case of OpenBazaar.

James E. Arps (Carnegie Mellon University), Nicolas Christin (Carnegie Mellon University)

Exploring the Monero Peer-to-Peer Network.

Tong Cao (University of Luxembourg), Jiangshan Yu (Monash University), Jérémie Decouchant (University of Luxembourg), Xiapu Luo (The Hong Kong Polytechnic University), Paulo Esteves-Veríssimo (University of Luxembourg)

Surviving the Cryptojungle: Perception and Management of Risk Among North American Cryptocurrency (Non)Users.

Artemij Voskobojnikov (University of British Columbia), Borke Obada-Obieh (University of British Columbia), Yue Huang (University of British Columbia), Konstantin Beznosov (University of British Columbia)

•Entity identification for Ethereum's account model.

Friedhelm Victor (Technical University of Berlin)

What are the Actual Flaws in Important Smart Contracts (and How Can We Find Them)?.

Alex Groce (Northern Arizona University), Josselin Feist (Trail of Bits), Gustavo Grieco (Trail of Bits), Michael Colburn (Trail of Bits)

Characterizing Code Clones in the Ethereum Smart Contract Ecosystem. 

Ningyu He (Peking University), Lei Wu (Zhejiang University), Haoyu Wang (Beijing University of Posts and Telecommunications), Yao Guo (Peking University), Xuxian Jiang (PeckShield, Inc)

•Short Paper: Smart Contracts for Government Processes Case Study and Prototype Implementation.

Magnus Krogsbøll (IT University of Copenhagen), Liv Hartoft (IT University of Copenhagen), Tijs Slaats (University of Copenhagen), Søren Debois (IT University of Copenhagen)

会议主页:

http://fc20.ifca.ai/index.html

安全学术圈招募队友-ing,有兴趣加入学术圈的请联系secdr#qq.com


文章来源: http://mp.weixin.qq.com/s?__biz=MzU5MTM5MTQ2MA==&mid=2247484685&idx=1&sn=518d162f84bfb4e1e002f0fcf45ec416&chksm=fe2efa86c959739058e984fdc9cf0e327297af8fdba6eb791fb1871eff11c8efdf9257569573#rd
如有侵权请联系:admin#unsafe.sh