Skip to main content

Showing 1–25 of 25 results for author: Kate, A

.
  1. arXiv:2406.08252  [pdf, other

    cs.CR

    Sharding SMR with Optimal-size Shards for Highly Scalable Blockchains

    Authors: Jianting Zhang, Zhongtang Luo, Raghavendra Ramesh, Aniket Kate

    Abstract: Sharding can enhance blockchain scalability by dividing nodes into multiple shards to handle transactions in parallel. However, the size-security dilemma where a shard must be large enough to ensure its security constrains the overall number of shards, rendering blockchain sharding low parallelism and poor scalability. This paper presents Arete, an optimally scalable blockchain sharding architec… ▽ More

    Submitted 12 June, 2024; originally announced June 2024.

  2. arXiv:2405.02431  [pdf, other

    cs.DC cs.CR

    Delphi: Efficient Asynchronous Approximate Agreement for Distributed Oracles

    Authors: Akhil Bandarupalli, Adithya Bhat, Saurabh Bagchi, Aniket Kate, Chen-Da Liu-Zhang, Michael K. Reiter

    Abstract: Agreement protocols are crucial in various emerging applications, spanning from distributed (blockchains) oracles to fault-tolerant cyber-physical systems. In scenarios where sensor/oracle nodes measure a common source, maintaining output within the convex range of correct inputs, known as convex validity, is imperative. Present asynchronous convex agreement protocols employ either randomization,… ▽ More

    Submitted 7 May, 2024; v1 submitted 3 May, 2024; originally announced May 2024.

    Comments: 14 pages, 8 figures, Accepted to DSN 2024

  3. arXiv:2402.02476  [pdf, other

    astro-ph.EP

    Constraints on Triton atmospheric evolution from occultations: 1989-2022

    Authors: B. Sicardy, A. Tej, A. R. Gomes-Junior, F. D. Romanov, T. Bertrand, N. M. Ashok, E. Lellouch, B. E. Morgado, M. Assafin, J. Desmars, J. I. B. Camargo, Y. Kilic, J. L. Ortiz, R. Vieira-Martins, F. Braga-Ribas, J. P. Ninan, B. C. Bhatt, S. Pramod Kumar, V. Swain, S. Sharma, A. Saha, D. K. Ojha, G. Pawar, S. Deshmukh, A. Deshpande , et al. (27 additional authors not shown)

    Abstract: Context - Around the year 2000, Triton's south pole experienced an extreme summer solstice that occurs every about 650 years, when the subsolar latitude reached about 50°. Bracketing this epoch, a few occultations probed Triton's atmosphere in 1989, 1995, 1997, 2008 and 2017. A recent ground-based stellar occultation observed on 6 October 2022 provides a new measurement of Triton's atmospheric pre… ▽ More

    Submitted 4 February, 2024; originally announced February 2024.

    Comments: 8 pages, 4 figures, accepted for publication in Astronomy and Astrophysics

  4. arXiv:2306.06299  [pdf, other

    cs.CR

    Front-running Attack in Sharded Blockchains and Fair Cross-shard Consensus

    Authors: Jianting Zhang, Wuhui Chen, Sifu Luo, Tiantian Gong, Zicong Hong, Aniket Kate

    Abstract: Sharding is a prominent technique for scaling blockchains. By dividing the network into smaller components known as shards, a sharded blockchain can process transactions in parallel without introducing inconsistencies through the coordination of intra-shard and cross-shard consensus protocols. However, we observe a critical security issue with sharded systems: transaction ordering manipulations ca… ▽ More

    Submitted 8 September, 2023; v1 submitted 9 June, 2023; originally announced June 2023.

  5. arXiv:2305.03903  [pdf, other

    cs.DC

    DORA: Distributed Oracle Agreement with Simple Majority

    Authors: Prasanth Chakka, Saurabh Joshi, Aniket Kate, Joshua Tobkin, David Yang

    Abstract: Oracle networks feeding off-chain information to a blockchain are required to solve a distributed agreement problem since these networks receive information from multiple sources and at different times. We make a key observation that in most cases, the value obtained by oracle network nodes from multiple information sources are in close proximity. We define a notion of agreement distance and lever… ▽ More

    Submitted 11 May, 2023; v1 submitted 5 May, 2023; originally announced May 2023.

    Comments: 13 pages, 4 figures, accepted at ICDCS 2023

  6. arXiv:2304.04998  [pdf, other

    cs.CR cs.DC

    EESMR: Energy Efficient BFT-SMR for the masses

    Authors: Adithya Bhat, Akhil Bandarupalli, Manish Nagaraj, Saurabh Bagchi, Aniket Kate, Michael K. Reiter

    Abstract: Modern Byzantine Fault-Tolerant State Machine Replication (BFT-SMR) solutions focus on reducing communication complexity, improving throughput, or lowering latency. This work explores the energy efficiency of BFT-SMR protocols. First, we propose a novel SMR protocol that optimizes for the steady state, i.e., when the leader is correct. This is done by reducing the number of required signatures per… ▽ More

    Submitted 14 October, 2023; v1 submitted 11 April, 2023; originally announced April 2023.

    Comments: Appearing in Middleware 2023

  7. arXiv:2302.01177  [pdf, other

    cs.CR cs.GT

    Order but Not Execute in Order

    Authors: Tiantian Gong, Aniket Kate

    Abstract: This work aims to address the general order manipulation issue in blockchain-based decentralized exchanges (DEX) by exploring the benefits of employing a novel combination of order-fair atomic broadcast (of-ABC) mechanisms for transaction ordering and frequent batch auction (FBA) for breaking the order while executing those transactions. In of-ABC, transactions submitted to a sufficient number of… ▽ More

    Submitted 27 September, 2023; v1 submitted 2 February, 2023; originally announced February 2023.

    Comments: 14 pages, 31 figures

  8. arXiv:2212.03383  [pdf

    cs.CR

    Last Mile of Blockchains: RPC and Node-as-a-service

    Authors: Zhongtang Luo, Rohan Murukutla, Aniket Kate

    Abstract: While much research focuses on different methods to secure blockchain, information on the chain needs to be accessed by end-users to be useful. This position paper surveys different ways that end-users may access blockchains. We observe that between the two extremes of running a full node and fully utilizing a trusted third-party service, many solutions regarding light nodes are emerging. We analy… ▽ More

    Submitted 6 December, 2022; originally announced December 2022.

  9. arXiv:2204.09282  [pdf, other

    cs.CR

    The Danger of Small Anonymity Sets in Privacy-Preserving Payment Systems

    Authors: Christiane Kuhn, Aniket Kate, Thorsten Strufe

    Abstract: Unlike suggested during their early years of existence, Bitcoin and similar cryptocurrencies in fact offer significantly less privacy as compared to traditional banking. A myriad of privacy-enhancing extensions to those cryptocurrencies as well as several clean-slate privacy-protecting cryptocurrencies have been proposed in turn. To convey a better understanding of the protection of popular design… ▽ More

    Submitted 20 April, 2022; originally announced April 2022.

  10. arXiv:2201.07740  [pdf, other

    cs.CR cs.GT

    More is Merrier: Relax the Non-Collusion Assumption in Multi-Server PIR

    Authors: Tiantian Gong, Ryan Henry, Alexandros Psomas, Aniket Kate

    Abstract: A long line of research on secure computation has confirmed that anything that can be computed, can be computed securely using a set of non-colluding parties. Indeed, this non-collusion assumption makes a number of problems solvable, as well as reduces overheads and bypasses computational hardness results, and it is pervasive across different privacy-enhancing technologies. However, it remains hig… ▽ More

    Submitted 4 December, 2023; v1 submitted 19 January, 2022; originally announced January 2022.

    Comments: 19 pages, 6 figures

  11. arXiv:2009.01489  [pdf, other

    cs.PL

    HACCLE: Metaprogramming for Secure Multi-Party Computation -- Extended Version

    Authors: Yuyan Bao, Kirshanthan Sundararajah, Raghav Malik, Qianchuan Ye, Christopher Wagner, Nouraldin Jaber, Fei Wang, Mohammad Hassan Ameri, Donghang Lu, Alexander Seto, Benjamin Delaware, Roopsha Samanta, Aniket Kate, Christina Garman, Jeremiah Blocki, Pierre-David Letourneau, Benoit Meister, Jonathan Springer, Tiark Rompf, Milind Kulkarni

    Abstract: Cryptographic techniques have the potential to enable distrusting parties to collaborate in fundamentally new ways, but their practical implementation poses numerous challenges. An important class of such cryptographic techniques is known as Secure Multi-Party Computation (MPC). Develo** Secure MPC applications in realistic scenarios requires extensive knowledge spanning multiple areas of crypto… ▽ More

    Submitted 30 September, 2021; v1 submitted 3 September, 2020; originally announced September 2020.

  12. arXiv:2008.11317  [pdf, other

    cs.CR cs.SI

    Empirical Understanding of Deletion Privacy: Experiences, Expectations, and Measures

    Authors: Mohsen Minaei, Mainack Mondal, Aniket Kate

    Abstract: Social platforms are heavily used by individuals to share their thoughts and personal information. However, due to regret over time about posting inappropriate social content, embarrassment, or even life or relationship changes, some past posts might also pose serious privacy concerns for them. To cope with these privacy concerns, social platforms offer deletion mechanisms that allow users to remo… ▽ More

    Submitted 4 October, 2021; v1 submitted 25 August, 2020; originally announced August 2020.

  13. arXiv:2007.11480  [pdf, other

    cs.CR cs.GT

    Towards Overcoming the Undercutting Problem

    Authors: Tiantian Gong, Mohsen Minaei, Wenhai Sun, Aniket Kate

    Abstract: Mining processes of Bitcoin and similar cryptocurrencies are currently incentivized with voluntary transaction fees and fixed block rewards which will halve gradually to zero. In the setting where optional and arbitrary transaction fee becomes the remaining incentive, Carlsten et al.\ [CCS~2016] find that an undercutting attack can become the equilibrium strategy for miners. In undercutting, the a… ▽ More

    Submitted 13 July, 2022; v1 submitted 22 July, 2020; originally announced July 2020.

    Comments: 14 pages, 3 figures

  14. arXiv:2005.14113  [pdf, other

    cs.SI cs.CR cs.LG

    Deceptive Deletions for Protecting Withdrawn Posts on Social Platforms

    Authors: Mohsen Minaei, S Chandra Mouli, Mainack Mondal, Bruno Ribeiro, Aniket Kate

    Abstract: Over-sharing poorly-worded thoughts and personal information is prevalent on online social platforms. In many of these cases, users regret posting such content. To retrospectively rectify these errors in users' sharing decisions, most platforms offer (deletion) mechanisms to withdraw the content, and social media users often utilize them. Ironically and perhaps unfortunately, these deletions make… ▽ More

    Submitted 28 May, 2020; originally announced May 2020.

  15. arXiv:2001.00486  [pdf, other

    cs.CR

    Reparo: Publicly Verifiable Layer to Repair Blockchains

    Authors: Sri Aravinda Krishnan Thyagarajan, Adithya Bhat, Bernardo Magri, Daniel Tschudi, Aniket Kate

    Abstract: Although blockchains aim for immutability as their core feature, several instances have exposed the harms with perfect immutability. The permanence of illicit content inserted in Bitcoin poses a challenge to law enforcement agencies like Interpol, and millions of dollars are lost in buggy smart contracts in Ethereum. A line of research then spawned on Redactable blockchains with the aim of solving… ▽ More

    Submitted 10 March, 2021; v1 submitted 2 January, 2020; originally announced January 2020.

    Comments: Appeared in Financial Cryptography 2021 (https://fc21.ifca.ai/program.php#abstract-talk-66)

  16. arXiv:1911.09148  [pdf, other

    cs.CR

    Concurrency and Privacy with Payment-Channel Networks

    Authors: Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, Srivatsan Ravi

    Abstract: Permissionless blockchains protocols such as Bitcoin are inherently limited in transaction throughput and latency. Current efforts to address this key issue focus on off-chain payment channels that can be combined in a Payment-Channel Network (PCN) to enable an unlimited number of payments without requiring to access the blockchain other than to register the initial and final capacity of each chan… ▽ More

    Submitted 20 November, 2019; originally announced November 2019.

  17. arXiv:1909.01531  [pdf, other

    cs.CR

    A Tale of Two Trees: One Writes, and Other Reads. Optimized Oblivious Accesses to Large-Scale Blockchains

    Authors: Duc V. Le, Lizzy Tengana Hurtado, Adil Ahmad, Mohsen Minaei, Byoungyoung Lee, Aniket Kate

    Abstract: The Bitcoin network has offered a new way of securely performing financial transactions over the insecure network. Nevertheless, this ability comes with the cost of storing a large (distributed) ledger, which has become unsuitable for personal devices of any kind. Although the simplified payment verification (SPV) clients can address this storage issue, a Bitcoin SPV client has to rely on other Bi… ▽ More

    Submitted 16 September, 2019; v1 submitted 3 September, 2019; originally announced September 2019.

  18. arXiv:1902.06095  [pdf, other

    cs.CR

    Brief Note: Asynchronous Verifiable Secret Sharing with Optimal Resilience and Linear Amortized Overhead

    Authors: Aniket Kate, Andrew Miller, Tom Yurek

    Abstract: In this work we present hbAVSS, the Honey Badger of Asynchronous Verifiable Secret Sharing (AVSS) protocols - an AVSS protocol that guarantees linear amortized communication overhead even in the worst case. The best prior work can achieve linear overhead only at a suboptimal resilience level (t < n/4) or by relying on optimism (falling back to quadratic overhead in case of network asynchrony or By… ▽ More

    Submitted 16 February, 2019; originally announced February 2019.

  19. arXiv:1810.10123  [pdf, other

    cs.CR

    Finding Safety in Numbers with Secure Allegation Escrows

    Authors: Venkat Arun, Aniket Kate, Deepak Garg, Peter Druschel, Bobby Bhattacharjee

    Abstract: For fear of retribution, the victim of a crime may be willing to report it only if other victims of the same perpetrator also step forward. Common examples include 1) identifying oneself as the victim of sexual harassment, especially by a person in a position of authority or 2) accusing an influential politician, an authoritarian government, or ones own employer of corruption. To handle such situa… ▽ More

    Submitted 29 December, 2019; v1 submitted 23 October, 2018; originally announced October 2018.

    Comments: To appear in NDSS 2020. New version includes improvements to writing and proof. The protocol is unchanged

  20. arXiv:1710.11271  [pdf, other

    cs.CR cs.SI

    Forgetting the Forgotten with Letheia, Concealing Content Deletion from Persistent Observers

    Authors: Mohsen Minaei, Mainack Mondal, Patrick Loiseau, Krishna Gummadi, Aniket Kate

    Abstract: Most social platforms offer mechanisms allowing users to delete their posts, and a significant fraction of users exercise this right to be forgotten. However, ironically, users' attempt to reduce attention to sensitive posts via deletion, in practice, attracts unwanted attention from stalkers specifically to those posts. Thus, deletions may leave users more vulnerable to attacks on their privacy i… ▽ More

    Submitted 25 September, 2018; v1 submitted 30 October, 2017; originally announced October 2017.

    Comments: 15 pages, 10 figures

  21. arXiv:1709.05748  [pdf, other

    cs.CR cs.DC

    Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions

    Authors: Stefanie Roos, Pedro Moreno-Sanchez, Aniket Kate, Ian Goldberg

    Abstract: Path-based transaction (PBT) networks, which settle payments from one user to another via a path of intermediaries, are a growing area of research. They overcome the scalability and privacy issues in cryptocurrencies like Bitcoin and Ethereum by replacing expensive and slow on-chain blockchain operations with inexpensive and fast off-chain transfers. In the form of credit networks such as Ripple a… ▽ More

    Submitted 13 December, 2017; v1 submitted 17 September, 2017; originally announced September 2017.

    Comments: 15 pages, 3 figures

  22. arXiv:1706.02358  [pdf, other

    cs.SI cs.CR

    Mind Your Credit: Assessing the Health of the Ripple Credit Network

    Authors: Pedro Moreno-Sanchez, Navin Modi, Raghuvir Songhela, Aniket Kate, Sonia Fahmy

    Abstract: The Ripple credit network has emerged as a payment backbone with key advantages for financial institutions and the remittance industry. Its path-based IOweYou (IOU) settlements across different (crypto)currencies conceptually distinguishes the Ripple blockchain from cryptocurrencies, and makes it highly suitable to an orthogonal yet vast set of applications in the remittance world for cross-border… ▽ More

    Submitted 11 March, 2018; v1 submitted 7 June, 2017; originally announced June 2017.

  23. arXiv:1408.1076  [pdf, ps, other

    cs.CR

    Lime: Data Lineage in the Malicious Environment

    Authors: Michael Backes, Niklas Grimm, Aniket Kate

    Abstract: Intentional or unintentional leakage of confidential data is undoubtedly one of the most severe security threats that organizations face in the digital era. The threat now extends to our personal lives: a plethora of personal information is available to social networks and smartphone providers and is indirectly transferred to untrustworthy third party and fourth party applications. In this work,… ▽ More

    Submitted 5 August, 2014; originally announced August 2014.

  24. arXiv:1311.3151  [pdf, other

    cs.CR

    Introducing Accountability to Anonymity Networks

    Authors: Michael Backes, Jeremy Clark, Peter Druschel, Aniket Kate, Milivoj Simeonovski

    Abstract: Many anonymous communication (AC) networks rely on routing traffic through proxy nodes to obfuscate the originator of the traffic. Without an accountability mechanism, exit proxy nodes risk sanctions by law enforcement if users commit illegal actions through the AC network. We present BackRef, a generic mechanism for AC networks that provides practical repudiation for the proxy nodes by tracing ba… ▽ More

    Submitted 13 November, 2013; originally announced November 2013.

  25. arXiv:1107.1072  [pdf, other

    cs.CR cs.DC

    Adding Query Privacy to Robust DHTs

    Authors: Michael Backes, Ian Goldberg, Aniket Kate, Tomas Toft

    Abstract: Interest in anonymous communication over distributed hash tables (DHTs) has increased in recent years. However, almost all known solutions solely aim at achieving sender or requestor anonymity in DHT queries. In many application scenarios, it is crucial that the queried key remains secret from intermediate peers that (help to) route the queries towards their destinations. In this paper, we satisfy… ▽ More

    Submitted 3 April, 2012; v1 submitted 6 July, 2011; originally announced July 2011.

    Comments: To appear at ACM ASIACCS 2012