Skip to main content

Showing 1–12 of 12 results for author: Florian, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2310.11294  [pdf, other

    cs.NI cs.GT

    Fair Reward Distribution in Federated Byzantine Agreement Systems

    Authors: Charmaine Ndolo, Martin Florian, Florian Tschorsch

    Abstract: Federated Byzantine Agreement Systems (FBASs) offer a solution to consensus in permissionless systems by adapting the well-studied Byzantine agreement model to permissionless consensus. Unlike its counterparts in the context of permissionless consensus, the FBAS system model does not offer validating nodes protocol-level incentives although they are entrusted with safeguarding and ensuring the fun… ▽ More

    Submitted 17 October, 2023; originally announced October 2023.

    Comments: 9 pages, 5 figures

  2. Dude, where's my NFT? Distributed Infrastructures for Digital Art

    Authors: Leonhard Balduf, Martin Florian, Björn Scheuermann

    Abstract: We explore issues relating to the storage of digital art, based on an empirical investigation into the storage of audiovisual data referenced by non-fungible tokens (NFTs). We identify current trends in NFT data storage and highlight problems with implemented solutions. We particularly focus our investigation on the use of the Interplanetary Filesystem (IPFS), which emerges as a popular and versat… ▽ More

    Submitted 20 October, 2022; originally announced October 2022.

    Comments: To be presented at the DICG Workshop 2022

  3. Analysis of Arbitrary Content on Blockchain-Based Systems using BigQuery

    Authors: Marcel Gregoriadis, Robert Muth, Martin Florian

    Abstract: Blockchain-based systems have gained immense popularity as enablers of independent asset transfers and smart contract functionality. They have also, since as early as the first Bitcoin blocks, been used for storing arbitrary contents such as texts and images. On-chain data storage functionality is useful for a variety of legitimate use cases. It does, however, also pose a systematic risk. If abuse… ▽ More

    Submitted 17 March, 2022; originally announced March 2022.

    Comments: Accepted at 1st International Cryptoasset Analytics Workshop (CAAW), ACM TheWebConf 2022

  4. arXiv:2111.12364  [pdf, other

    cs.DC cs.CR

    Crawling the MobileCoin Quorum System

    Authors: Charmaine Ndolo, Sebastian Henningsen, Martin Florian

    Abstract: We continuously crawl the young MobileCoin network, uncovering the quorum configurations of core nodes and the quorum system resulting from these configurations. This report discusses our crawl methodology, encountered challenges, and our current empirical results. We find that the MobileCoin quorum system currently comprises of 7 organisations controlling a total of 10 validator nodes. Current qu… ▽ More

    Submitted 24 November, 2021; originally announced November 2021.

  5. arXiv:2104.09202  [pdf, other

    cs.NI

    Monitoring Data Requests in Decentralized Data Storage Systems: A Case Study of IPFS

    Authors: Leonhard Balduf, Sebastian Henningsen, Martin Florian, Sebastian Rust, Björn Scheuermann

    Abstract: Decentralized data storage systems like the Interplanetary Filesystem (IPFS) are becoming increasingly popular, e. g., as a data layer in blockchain applications and for sharing content in a censorship-resistant manner. In IPFS, data is hosted by an open set of nodes and data requests are broadcast to connected peers in addition to being routed via a distributed hash table (DHT). In this paper, we… ▽ More

    Submitted 23 May, 2022; v1 submitted 19 April, 2021; originally announced April 2021.

    Comments: Accepted at ICDCS 2022

  6. arXiv:2005.03535  [pdf, ps, other

    cs.CR cs.CY

    Collaborative Deanonymization

    Authors: Patrik Keller, Martin Florian, Rainer Böhme

    Abstract: Privacy-seeking cryptocurrency users rely on anonymization techniques like CoinJoin and ring transactions. By using such technologies benign users potentially provide anonymity to bad actors. We propose overlay protocols to resolve the tension between anonymity and accountability in a peer-to-peer manner. Cryptocurrencies can adopt this approach to enable prosecution of publicly recognized crimes.… ▽ More

    Submitted 26 February, 2021; v1 submitted 7 May, 2020; originally announced May 2020.

  7. The Sum of Its Parts: Analysis of Federated Byzantine Agreement Systems

    Authors: Martin Florian, Sebastian Henningsen, Charmaine Ndolo, Björn Scheuermann

    Abstract: Federated Byzantine Agreement Systems (FBASs) are a fascinating new paradigm in the context of consensus protocols. Originally proposed for powering the Stellar payment network, FBASs can instantiate Byzantine quorum systems without requiring out-of-band agreement on a common set of validators; every node is free to decide for itself with whom it requires agreement. Sybil-resistant and yet energy-… ▽ More

    Submitted 31 March, 2022; v1 submitted 19 February, 2020; originally announced February 2020.

  8. arXiv:2002.07747  [pdf, ps, other

    cs.NI cs.CR

    Map** the Interplanetary Filesystem

    Authors: Sebastian Henningsen, Martin Florian, Sebastian Rust, Björn Scheuermann

    Abstract: The Interplanetary Filesystem (IPFS) is a distributed data storage service frequently used by blockchain applications and for sharing content in a censorship-resistant manner. Data is distributed within an open set of peers using a Kademlia-based distributed hash table (DHT). In this paper, we study the structure of the resulting overlay network, as it significantly influences the robustness and p… ▽ More

    Submitted 18 February, 2020; originally announced February 2020.

    Comments: The code can be found at https://github.com/scriptkitty/ipfs-crawler

    Journal ref: Proceedings of IFIP Networking 2020

  9. arXiv:1908.10141  [pdf, other

    cs.CR cs.NI

    Eclipsing Ethereum Peers with False Friends

    Authors: Sebastian Henningsen, Daniel Teunis, Martin Florian, Björn Scheuermann

    Abstract: Ethereum is a decentralized Blockchain system that supports the execution of Turing-complete smart contracts. Although the security of the Ethereum ecosystem has been studied in the past, the network layer has been mostly neglected. We show that Go Ethereum (Geth), the most widely used Ethereum implementation, is vulnerable to eclipse attacks, effectively circumventing recently introduced (Geth v1… ▽ More

    Submitted 27 August, 2019; originally announced August 2019.

    Comments: Extended version of the original publication in: 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)

  10. arXiv:1905.11905  [pdf, other

    q-fin.GN cs.CR

    Monetary Stabilization in Cryptocurrencies - Design Approaches and Open Questions

    Authors: Ingolf G. A. Pernice, Sebastian Henningsen, Roman Proskalovich, Martin Florian, Hermann Elendner, Björn Scheuermann

    Abstract: The price volatility of cryptocurrencies is often cited as a major hindrance to their wide-scale adoption. Consequently, during the last two years, multiple so called stablecoins have surfaced---cryptocurrencies focused on maintaining stable exchange rates. In this paper, we systematically explore and analyze the stablecoin landscape. Based on a survey of 24 specific stablecoin projects, we go bey… ▽ More

    Submitted 28 May, 2019; originally announced May 2019.

    Comments: Accepted at IEEE Crypto Valley Conference on Blockchain Technology (CVCBT) 2019

  11. arXiv:1904.08901  [pdf, other

    cs.CR cs.CY

    Erasing Data from Blockchain Nodes

    Authors: Martin Florian, Sophie Beaucamp, Sebastian Henningsen, Björn Scheuermann

    Abstract: It is a common narrative that blockchains are immutable and so it is technically impossible to erase data stored on them. For legal and ethical reasons, however, individuals and organizations might be compelled to erase locally stored data, be it encoded on a blockchain or not. The common assumption for blockchain networks like Bitcoin is that forcing nodes to erase data contained on the blockchai… ▽ More

    Submitted 18 April, 2019; originally announced April 2019.

    Comments: Accepted at IEEE Security & Privacy on the Blockchain (IEEE S&B) 2019; https://blockchain.kcl.ac.uk/ieee-sb2019/

  12. arXiv:1408.6378  [pdf, ps, other

    math.CO cs.DS

    Push is Fast on Sparse Random Graphs

    Authors: Meier Florian, Peter Ueli

    Abstract: We consider the classical push broadcast process on a large class of sparse random multigraphs that includes random power law graphs and multigraphs. Our analysis shows that for every $\varepsilon>0$, whp $O(\log n)$ rounds are sufficient to inform all but an $\varepsilon$-fraction of the vertices. It is not hard to see that, e.g. for random power law graphs, the push process needs whp… ▽ More

    Submitted 27 August, 2014; originally announced August 2014.