Skip to main content

Showing 1–4 of 4 results for author: Le, D V

.
  1. arXiv:2211.12050  [pdf, ps, other

    cs.CR cs.DC

    Modeling Resources in Permissionless Longest-chain Total-order Broadcast

    Authors: Sarah Azouvi, Christian Cachin, Duc V. Le, Marko Vukolic, Luca Zanolini

    Abstract: Blockchain protocols implement total-order broadcast in a permissionless setting, where processes can freely join and leave. In such a setting, to safeguard against Sybil attacks, correct processes rely on cryptographic proofs tied to a particular type of resource to make them eligible to order transactions. For example, in the case of Proof-of-Work (PoW), this resource is computation, and the pro… ▽ More

    Submitted 22 November, 2022; originally announced November 2022.

  2. arXiv:2010.01056  [pdf, other

    cs.CR

    AMR:Autonomous Coin Mixer with Privacy Preserving Reward Distribution

    Authors: Duc V. Le, Arthur Gervais

    Abstract: It is well known that users on open blockchains are tracked by an industry providing services to governments, law enforcement, secret services, and alike. While most blockchains do not protect their users' privacy and allow external observers to link transactions and addresses, a growing research interest attempts to design add-on privacy solutions to help users regain their privacy on non-private… ▽ More

    Submitted 7 June, 2021; v1 submitted 2 October, 2020; originally announced October 2020.

  3. arXiv:2009.14021  [pdf, other

    cs.CR

    High-Frequency Trading on Decentralized On-Chain Exchanges

    Authors: Liyi Zhou, Kaihua Qin, Christof Ferreira Torres, Duc V Le, Arthur Gervais

    Abstract: Decentralized exchanges (DEXs) allow parties to participate in financial markets while retaining full custody of their funds. However, the transparency of blockchain-based DEX in combination with the latency for transactions to be processed, makes market-manipulation feasible. For instance, adversaries could perform front-running -- the practice of exploiting (typically non-public) information tha… ▽ More

    Submitted 29 September, 2020; originally announced September 2020.

  4. arXiv:1909.01531  [pdf, other

    cs.CR

    A Tale of Two Trees: One Writes, and Other Reads. Optimized Oblivious Accesses to Large-Scale Blockchains

    Authors: Duc V. Le, Lizzy Tengana Hurtado, Adil Ahmad, Mohsen Minaei, Byoungyoung Lee, Aniket Kate

    Abstract: The Bitcoin network has offered a new way of securely performing financial transactions over the insecure network. Nevertheless, this ability comes with the cost of storing a large (distributed) ledger, which has become unsuitable for personal devices of any kind. Although the simplified payment verification (SPV) clients can address this storage issue, a Bitcoin SPV client has to rely on other Bi… ▽ More

    Submitted 16 September, 2019; v1 submitted 3 September, 2019; originally announced September 2019.