Skip to main content

Showing 1–9 of 9 results for author: Jehl, L

.
  1. arXiv:2404.04948  [pdf, other

    cs.CR cs.DC

    Iniva: Inclusive and Incentive-compatible Vote Aggregation

    Authors: Arian Baloochestani, Hanish Gogada, Leander Jehl, Hein Meling

    Abstract: Many blockchain platforms use committee-based consensus for scalability, finality, and security. In this consensus scheme, a committee decides which blocks get appended to the chain, typically through several voting phases. Platforms typically leverage the committee members' recorded votes to reward, punish, or detect failures. A common approach is to let the block proposer decide which votes to i… ▽ More

    Submitted 7 April, 2024; originally announced April 2024.

    Comments: Committee-based blockchains, Vote omission attack, Vote inclusion, Signature aggregation, Incentive-compatible

  2. arXiv:2307.02231  [pdf, other

    cs.NI cs.DC

    Tit-for-Token: Understanding Fairness when Forwarding Data by Incentivized Peers in Decentralized Storage Networks

    Authors: Vahid Heidaripour Lakhani, Arman Babaei, Leander Jehl, Georgy Ishmaev, Vero Estrada-Galiñanes

    Abstract: Decentralized storage networks offer services with intriguing possibilities to reduce inequalities in an extremely centralized market. The challenge is to conceive incentives that are fair in regard to the income distribution among peers. Despite many systems using tokens to incentivize forwarding data, like Swarm, little is known about the interplay between incentives, storage-, and network-param… ▽ More

    Submitted 2 October, 2023; v1 submitted 5 July, 2023; originally announced July 2023.

    Comments: 28 pages, 15 figures

  3. arXiv:2303.11045  [pdf, other

    cs.DC

    SoK: Scalability Techniques for BFT Consensus

    Authors: Christian Berger, Signe Schwarz-Rüsch, Arne Vogel, Kai Bleeke, Leander Jehl, Hans P. Reiser, Rüdiger Kapitza

    Abstract: With the advancement of blockchain systems, many recent research works have proposed distributed ledger technology~(DLT) that employs Byzantine fault-tolerant~(BFT) consensus protocols to decide which block to append next to the ledger. Notably, BFT consensus can offer high performance, energy efficiency, and provable correctness properties, and it is thus considered a promising building block for… ▽ More

    Submitted 20 March, 2023; originally announced March 2023.

    Comments: 18 pages, accepted to appear in the proceedings of the 5th IEEE International Conference on Blockchain and Cryptocurrency

    ACM Class: A.1; C.2

  4. arXiv:2208.07067  [pdf, other

    cs.NI

    Fair Incentivization of Bandwidth Sharing in Decentralized Storage Networks

    Authors: Vahid Heidaripour Lakhani, Leander Jehl, Rinke Hendriksen, Vero Estrada-Galiñanes

    Abstract: Peer-to-peer (p2p) networks are not independent of their peers, and the network efficiency depends on peers contributing resources. Because shared resources are not free, this contribution must be rewarded. Peers across the network may share computation power, storage capacity, and bandwidth. This paper looks at how bandwidth incentive encourages peers to share bandwidth and rewards them for their… ▽ More

    Submitted 15 August, 2022; originally announced August 2022.

    Comments: The Workshop on Decentralized Internet, Networks, Protocols, and Systems (DINPS22)

  5. arXiv:2205.08938  [pdf, other

    cs.DC

    SplitBFT: Improving Byzantine Fault Tolerance Safety Using Trusted Compartments

    Authors: Ines Messadi, Markus Horst Becker, Kai Bleeke, Leander Jehl, Sonia Ben Mokhtar, Rüdiger Kapitza

    Abstract: Byzantine fault-tolerant agreement (BFT) in a partially synchronous system usually requires 3f + 1 nodes to tolerate f faulty replicas. Due to their high throughput and finality property BFT algorithms build the core of recent permissioned blockchains. As a complex and resource-demanding infrastructure, multiple cloud providers have started offering Blockchain-as-a-Service. This eases the deployme… ▽ More

    Submitted 24 May, 2022; v1 submitted 18 May, 2022; originally announced May 2022.

  6. arXiv:2109.11590  [pdf, other

    cs.CR

    A Tree-based Construction for Verifiable Diplomas with Issuer Transparency

    Authors: Rodrigo Q. Saramago, Leander Jehl, Hein Meling, Vero Estrada-Galiñanes

    Abstract: Still to this day, academic credentials are primarily paper-based, and the process to verify the authenticity of such documents is costly, time-consuming, and prone to human error and fraud. Digitally signed documents facilitate a cost-effective verification process. However, vulnerability to fraud remains due to reliance on centralized authorities that lack full transparency. In this paper, we pr… ▽ More

    Submitted 23 September, 2021; originally announced September 2021.

  7. arXiv:1912.04269  [pdf

    cs.NI cs.DC

    [Invited talk] Building a Disaster-resilient Storage Layer for Next Generation Networks: The Role of Redundancy

    Authors: Vero Estrada-Galinanes, Racin Nygaard, Viktor Tron, Rodrigo Saramago, Leander Jehl, Hein Meling

    Abstract: Blockchain is the driving force behind a myriad of decentralized applications (dapps) that promise to transform the Internet. The next generation Internet, or web3, introduces a "universal state layer" to store data in p2p networks. Swarm, a native layer of the Ethereum web3 stack, aims at providing redundant storage for dapp code, data, as well as, blockchain and state data. Based on a diploma ve… ▽ More

    Submitted 5 December, 2019; originally announced December 2019.

    Comments: 6 pages, Invited talk at Technical Committee on Network Systems Workshop 2019-10-10 - 2019-10-11, Nagoya Institute of Technology, Japan

    Journal ref: IEICE Technical Report, 2019, vol. 119, no. 221, Print edition ISSN 0913-5685, Online edition ISSN 2432-6380

  8. arXiv:1907.03748  [pdf, other

    cs.CL cs.LG stat.ML

    Learning Neural Sequence-to-Sequence Models from Weak Feedback with Bipolar Ramp Loss

    Authors: Laura Jehl, Carolin Lawrence, Stefan Riezler

    Abstract: In many machine learning scenarios, supervision by gold labels is not available and consequently neural models cannot be trained directly by maximum likelihood estimation (MLE). In a weak supervision scenario, metric-augmented objectives can be employed to assign feedback to model outputs, which can be used to extract a supervision signal for training. We present several objectives for two separat… ▽ More

    Submitted 6 July, 2019; originally announced July 2019.

    Comments: Transactions of the Association for Computational Linguistics 2019 Vol. 7, 233-248. Presented at ACL, Florence, Italy

  9. arXiv:1704.05808  [pdf, other

    cs.NI

    Reliable Probabilistic Gossip over Large-Scale Random Topologies

    Authors: Rui**g Hu, Leander Jehl

    Abstract: This paper studies reliability of probabilistic neighbor-aware gossip algorithms over three well- known large-scale random topologies, namely Bernoulli (or Erdős-Rényi) graph, the random geometric graph, and the scale-free graph. We propose a new and simple algorithm which ensures higher reliability at lower message complexity than the three families of gossip algorithms over every topology in our… ▽ More

    Submitted 19 April, 2017; originally announced April 2017.

    Comments: 18 pages, 3 figures, Journal