Skip to main content

Showing 1–10 of 10 results for author: Galindo, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2203.08548  [pdf, other

    cs.CR

    SoK: TEE-assisted Confidential Smart Contract

    Authors: Rujia Li, Qin Wang, Qi Wang, David Galindo, Mark Ryan

    Abstract: The blockchain-based smart contract lacks privacy since the contract state and instruction code are exposed to the public. Combining smart-contract execution with Trusted Execution Environments (TEEs) provides an efficient solution, called TEE-assisted smart contracts, for protecting the confidentiality of contract states. However, the combination approaches are varied, and a systematic study is a… ▽ More

    Submitted 19 April, 2022; v1 submitted 16 March, 2022; originally announced March 2022.

    Comments: Accepted by PETs 2022

  2. arXiv:2202.08699  [pdf, other

    cs.CR

    How Do Smart Contracts Benefit Security Protocols?

    Authors: Rujia Li, Qin Wang, Qi Wang, David Galindo

    Abstract: Smart contracts have recently been adopted by many security protocols. However, existing studies lack satisfactory theoretical support on how contracts benefit security protocols. This paper aims to give a systematic analysis of smart contract (SC)-based security protocols to fulfill the gap of unclear arguments and statements. We firstly investigate \textit{state of the art studies} and establish… ▽ More

    Submitted 19 April, 2022; v1 submitted 17 February, 2022; originally announced February 2022.

  3. arXiv:2111.12456  [pdf, other

    cs.CR

    SoK: Untangling File-based Encryption on Mobile Devices

    Authors: David Galindo, Jia Liu, Chris McMahon Stone, Mihai Ordean

    Abstract: File-based encryption (FBE) schemes have been developed by software vendors to address security concerns related to data storage. While methods of encrypting data-at-rest may seem relatively straightforward, the main proponents of these technologies in mobile devices have nonetheless created seemingly different FBE solutions. As most of the underlying design decisions are described either at a hig… ▽ More

    Submitted 24 November, 2021; originally announced November 2021.

  4. arXiv:2103.12905  [pdf, other

    cs.CR

    An Offline Delegatable Cryptocurrency System

    Authors: Rujia Li, Qin Wang, Xinrui Zhang, Qi Wang, David Galindo, Yang Xiang

    Abstract: Blockchain-based cryptocurrencies, facilitating the convenience of payment by providing a decentralized online solution, have not been widely adopted so far due to slow confirmation of transactions. Offline delegation offers an efficient way to exchange coins. However, in such an approach, the coins that have been delegated confront the risk of being spent twice since the delegator's behaviour can… ▽ More

    Submitted 23 March, 2021; originally announced March 2021.

    Comments: ICBC21

  5. arXiv:2008.02538  [pdf, other

    cs.CY

    Efficiency in Digital Economies -- A Primer on Tokenomics

    Authors: Ricky Lamberty, Alexander Poddey, David Galindo, Danny de Waard, Tobias Koelbel, Daniel Kirste

    Abstract: Cryptographic tokens are a new digital paradigm that can facilitate the establishment of economic incentives in digital ecoystems. Tokens can be leveraged for the coordination, optimization and governance of large networks at scale in a decentralized manner. A key aspect is their programmability, that can reward participants relative to their stage of adoption, according to the value they contribu… ▽ More

    Submitted 17 March, 2023; v1 submitted 6 August, 2020; originally announced August 2020.

    Comments: 11 pages, 1 figure

  6. arXiv:2006.05390  [pdf, ps, other

    cs.CR cs.DC cs.MA

    Democratising blockchain: A minimal agency consensus model

    Authors: Marcin Abram, David Galindo, Daniel Honerkamp, Jonathan Ward, **-Mann Wong

    Abstract: We propose a novel consensus protocol based on a hybrid approach, that combines a directed acyclic graph (DAG) and a classical chain of blocks. This architecture allows us to enforce collective block construction, minimising the monopolistic power of the round-leader. In this way, we decrease the possibility for collusion among senders and miners, as well as miners themselves, allowing the use of… ▽ More

    Submitted 9 June, 2020; originally announced June 2020.

  7. arXiv:1908.02443  [pdf, other

    cs.CR

    Auditable Credential Anonymity Revocation Based on Privacy-Preserving Smart Contracts

    Authors: Rujia Li, David Galindo, Qi Wang

    Abstract: Anonymity revocation is an essential component of credential issuing systems since unconditional anonymity is incompatible with pursuing and sanctioning credential misuse. However, current anonymity revocation approaches have shortcomings with respect to the auditability of the revocation process. In this paper, we propose a novel anonymity revocation approach based on privacy-preserving blockchai… ▽ More

    Submitted 10 August, 2019; v1 submitted 7 August, 2019; originally announced August 2019.

  8. CAOS: Concurrent-Access Obfuscated Store

    Authors: Mihai Ordean, Mark Ryan, David Galindo

    Abstract: This paper proposes Concurrent-Access Obfuscated Store (CAOS), a construction for remote data storage that provides access-pattern obfuscation in a honest-but-curious adversarial model, while allowing for low bandwidth overhead and client storage. Compared to the state of the art, the main advantage of CAOS is that it supports concurrent access without a proxy, for multiple read-only clients and a… ▽ More

    Submitted 3 June, 2019; v1 submitted 29 September, 2017; originally announced September 2017.

    Journal ref: The 24th ACM Symposium on Access Control Models and Technologies (SACMAT '19), June 3--6, 2019, Toronto, ON, Canada

  9. arXiv:1507.01888  [pdf, ps, other

    cs.MS cs.CE math.NA

    MADNESS: A Multiresolution, Adaptive Numerical Environment for Scientific Simulation

    Authors: Robert J. Harrison, Gregory Beylkin, Florian A. Bischoff, Justus A. Calvin, George I. Fann, Jacob Fosso-Tande, Diego Galindo, Jeff R. Hammond, Rebecca Hartman-Baker, Judith C. Hill, Jun Jia, Jakob S. Kottmann, M-J. Yvonne Ou, Laura E. Ratcliff, Matthew G. Reuter, Adam C. Richie-Halford, Nichols A. Romero, Hideo Sekino, William A. Shelton, Bryan E. Sundahl, W. Scott Thornton, Edward F. Valeev, Álvaro Vázquez-Mayagoitia, Nicholas Vence, Yukina Yokoi

    Abstract: MADNESS (multiresolution adaptive numerical environment for scientific simulation) is a high-level software environment for solving integral and differential equations in many dimensions that uses adaptive and fast harmonic analysis methods with guaranteed precision based on multiresolution analysis and separated representations. Underpinning the numerical capabilities is a powerful petascale para… ▽ More

    Submitted 5 July, 2015; originally announced July 2015.

    Journal ref: SIAM SISC 38, S123-S142 (2016)

  10. arXiv:0903.0069  [pdf, ps, other

    cs.CR

    Improved identity-based identification using correcting codes

    Authors: Pierre-Louis Cayrel, Philippe Gaborit, David Galindo, Marc Girault

    Abstract: In this paper, a new identity-based identification scheme based on error-correcting codes is proposed. Two well known code-based schemes are combined : the signature scheme by Courtois, Finiasz and Sendrier and an identification scheme by Stern. A proof of security for the scheme in the Random Oracle Model is given.

    Submitted 28 February, 2009; originally announced March 2009.

    Comments: 9 pages