Skip to main content

Showing 1–31 of 31 results for author: Kiayias, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.06760  [pdf, other

    cs.CR

    Decentralized Reliability Estimation for Mixnets

    Authors: Claudia Diaz, Harry Halpin, Aggelos Kiayias

    Abstract: Continuous-time decryption mixnets can anonymously route data packets with end to end latency that can be as low as a second, making them usable for a variety of applications. Such mixnets however lack verifiable reliability properties that ensure the correct processing and delivery of packets, while existing verifiability mechanisms are incompatible with scalable low latency continuous-time mixne… ▽ More

    Submitted 10 June, 2024; originally announced June 2024.

  2. arXiv:2403.15429  [pdf, other

    cs.GT econ.TH

    Single-token vs Two-token Blockchain Tokenomics

    Authors: Aggelos Kiayias, Philip Lazos, Paolo Penna

    Abstract: We consider long-term equilibria that arise in the tokenomics design of proof-of-stake (PoS) blockchain systems that comprise of users and validators, both striving to maximize their own utilities. Validators are system maintainers who get rewarded with tokens for performing the work necessary for the system to function properly, while users compete and pay with such tokens for getting a desired p… ▽ More

    Submitted 12 June, 2024; v1 submitted 13 March, 2024; originally announced March 2024.

  3. arXiv:2402.06352  [pdf, ps, other

    cs.GT cs.CR

    Blockchain Bribing Attacks and the Efficacy of Counterincentives

    Authors: Dimitris Karakostas, Aggelos Kiayias, Thomas Zacharias

    Abstract: We analyze bribing attacks in Proof-of-Stake distributed ledgers from a game theoretic perspective. In bribing attacks, an adversary offers participants a reward in exchange for instructing them how to behave, with the goal of attacking the protocol's properties. Specifically, our work focuses on adversaries that target blockchain safety. We consider two types of bribing, depending on how the brib… ▽ More

    Submitted 19 June, 2024; v1 submitted 9 February, 2024; originally announced February 2024.

  4. arXiv:2312.02769  [pdf, ps, other

    cs.GT

    Blockchain Participation Games

    Authors: Pyrros Chaidos, Aggelos Kiayias, Evangelos Markakis

    Abstract: We study game-theoretic models for capturing participation in blockchain systems. Permissionless blockchains can be naturally viewed as games, where a set of potentially interested users is faced with the dilemma of whether to engage with the protocol or not. Engagement here implies that the user will be asked to complete certain tasks, whenever they are selected to contribute (typically according… ▽ More

    Submitted 5 December, 2023; originally announced December 2023.

  5. arXiv:2306.17025  [pdf, ps, other

    econ.TH cs.CR cs.GT

    Would Friedman Burn your Tokens?

    Authors: Aggelos Kiayias, Philip Lazos, Jan Christoph Schlegel

    Abstract: Cryptocurrencies come with a variety of tokenomic policies as well as aspirations of desirable monetary characteristics that have been described by proponents as 'sound money' or even 'ultra sound money.' These propositions are typically devoid of economic analysis so it is a pertinent question how such aspirations fit in the wider context of monetary economic theory. In this work, we develop a fr… ▽ More

    Submitted 29 June, 2023; originally announced June 2023.

  6. arXiv:2304.06014  [pdf, ps, other

    cs.GT

    Tiered Mechanisms for Blockchain Transaction Fees

    Authors: Aggelos Kiayias, Elias Koutsoupias, Philip Lazos, Giorgos Panagiotakos

    Abstract: Blockchain systems come with the promise of being inclusive for a variety of decentralized applications (DApps) that can serve different purposes and have different urgency requirements. Despite this, the transaction fee mechanisms currently deployed in popular platforms as well as previous modeling attempts for the associated mechanism design problem focus on an approach that favors increasing pr… ▽ More

    Submitted 12 April, 2023; originally announced April 2023.

  7. arXiv:2211.01291  [pdf, other

    cs.CR

    SoK: A Stratified Approach to Blockchain Decentralization

    Authors: Christina Ovezik, Dimitris Karakostas, Aggelos Kiayias

    Abstract: Decentralization has been touted as the principal security advantage which propelled blockchain systems at the forefront of developments in the financial technology space. Its exact semantics nevertheless remain highly contested and ambiguous, with proponents and critics disagreeing widely on the level of decentralization offered by existing systems. To address this, we put forth a systematization… ▽ More

    Submitted 15 April, 2024; v1 submitted 2 November, 2022; originally announced November 2022.

  8. Optimal Bootstrap** of PoW Blockchains

    Authors: Ranvir Rana, Dimitris Karakostas, Sreeram Kannan, Aggelos Kiayias, Pramod Viswanath

    Abstract: Proof of Work (PoW) blockchains are susceptible to adversarial majority mining attacks in the early stages due to incipient participation and corresponding low net hash power. Bootstrap** ensures safety and liveness during the transient stage by protecting against a majority mining attack, allowing a PoW chain to grow the participation base and corresponding mining hash power. Liveness is especi… ▽ More

    Submitted 22 August, 2022; originally announced August 2022.

  9. Minotaur: Multi-Resource Blockchain Consensus

    Authors: Matthias Fitzi, Xuechao Wang, Sreeram Kannan, Aggelos Kiayias, Nikos Leonardos, Pramod Viswanath, Gerui Wang

    Abstract: Resource-based consensus is the backbone of permissionless distributed ledger systems. The security of such protocols relies fundamentally on the level of resources actively engaged in the system. The variety of different resources (and related proof protocols, some times referred to as PoX in the literature) raises the fundamental question whether it is possible to utilize many of them in tandem… ▽ More

    Submitted 7 September, 2022; v1 submitted 27 January, 2022; originally announced January 2022.

    Comments: To appear in ACM CCS 2022

  10. arXiv:2201.07188  [pdf, other

    cs.CR cs.CY cs.GT

    SoK: Blockchain Governance

    Authors: Aggelos Kiayias, Philip Lazos

    Abstract: Blockchain systems come with a promise of decentralization that often stumbles on a roadblock when key decisions about modifying the software codebase need to be made. This is attested by the fact that both of the two major cryptocurrencies, Bitcoin and Ethereum, have undergone hard forks that resulted in the creation of alternative systems, creating confusion and opportunities for fraudulent acti… ▽ More

    Submitted 18 January, 2023; v1 submitted 18 January, 2022; originally announced January 2022.

  11. arXiv:2201.00858  [pdf, other

    cs.CR cs.GT

    Blockchain Nash Dynamics and the Pursuit of Compliance

    Authors: Dimitris Karakostas, Aggelos Kiayias, Thomas Zacharias

    Abstract: We study Nash-dynamics in the context of blockchain protocols. We introduce a formal model, within which one can assess whether the Nash dynamics can lead utility-maximizing participants to defect from the "honest" protocol operation, towards variations that exhibit one or more undesirable infractions, such as abstaining from participation and producing conflicting protocol histories. Blockchain p… ▽ More

    Submitted 23 March, 2022; v1 submitted 3 January, 2022; originally announced January 2022.

  12. arXiv:2112.09941  [pdf, other

    cs.CR cs.GT

    Decentralizing Information Technology: The Advent of Resource Based Systems

    Authors: Aggelos Kiayias

    Abstract: The growth of the Bitcoin network during the first decade of its operation to a global scale system is a singular event in the deployment of Information Technology systems. Can this approach serve as a wider paradigm for Information Technology services beyond the use case of digital currencies? We investigate this question by introducing the concept of resource based systems and their four fundame… ▽ More

    Submitted 26 December, 2021; v1 submitted 18 December, 2021; originally announced December 2021.

  13. Incentives Against Power Grabs or How to Engineer the Revolution in a Pooled Proof of Stake System

    Authors: Aggelos Kiayias, Elias Koutsoupias, Aikaterini-Panagiota Stouka

    Abstract: Proof-of-Stake (PoS) blockchain systems, especially those that allow stakeholders to organize themselves in ``stake-pools'', have emerged as a compelling paradigm for the deployment of large scale distributed ledgers. A stake-pool operates a node that engages in the PoS protocol and potentially represents a large number of smaller stakeholders. While such pooled PoS operation is attractive from va… ▽ More

    Submitted 16 November, 2021; originally announced November 2021.

    Comments: 2021 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS)

    Journal ref: 2021 IEEE DAPPS, 2021, pp. 1-10

  14. arXiv:2107.12069  [pdf, ps, other

    cs.CR

    Filling the Tax Gap via Programmable Money

    Authors: Dimitris Karakostas, Aggelos Kiayias

    Abstract: We discuss the problem of facilitating tax auditing assuming "programmable money", i.e., digital monetary instruments that are managed by an underlying distributed ledger. We explore how a taxation authority can verify the declared returns of its citizens and create a counter-incentive to tax evasion by two distinct mechanisms. First, we describe a design which enables auditing it as a built-in fe… ▽ More

    Submitted 26 July, 2021; originally announced July 2021.

  15. arXiv:2106.01161  [pdf, ps, other

    cs.CR

    Babel Fees via Limited Liabilities

    Authors: Manuel M. T. Chakravarty, Nikos Karayannidis, Aggelos Kiayias, Michael Peyton Jones, Polina Vinogradova

    Abstract: Custom currencies (ERC-20) on Ethereum are wildly popular, but they are second class to the primary currency Ether. Custom currencies are more complex and more expensive to handle than the primary currency as their accounting is not natively performed by the underlying ledger, but instead in user-defined contract code. Furthermore, and quite importantly, transaction fees can only be paid in Ether.… ▽ More

    Submitted 8 April, 2022; v1 submitted 2 June, 2021; originally announced June 2021.

    Comments: To appear in "20th International Conference on Applied Cryptography and Network Security (ACNS 2022)"

  16. Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin's Post-Quantum Security

    Authors: Alexandru Cojocaru, Juan Garay, Aggelos Kiayias, Fang Song, Petros Wallden

    Abstract: A proof of work (PoW) is an important cryptographic construct enabling a party to convince others that they invested some effort in solving a computational task. Arguably, its main impact has been in the setting of cryptocurrencies such as Bitcoin and its underlying blockchain protocol, which received significant attention in recent years due to its potential for various applications as well as fo… ▽ More

    Submitted 6 March, 2023; v1 submitted 30 December, 2020; originally announced December 2020.

    Comments: 32 pages. (v4) published version, changed the title, restructured paper and improved readability. This work supersedes the result of our previous work in eprint.iacr.org/2019/1150

    Journal ref: Quantum 7, 944 (2023)

  17. arXiv:2001.06403  [pdf, ps, other

    cs.DC cs.CR cs.DM

    Consistency of Proof-of-Stake Blockchains with Concurrent Honest Slot Leaders

    Authors: Aggelos Kiayias, Saad Quader, Alexander Russell

    Abstract: We improve the fundamental security threshold of eventual consensus Proof-of-Stake (PoS) blockchain protocols under the longest-chain rule by showing, for the first time, the positive effect of rounds with concurrent honest leaders. Current security analyses reduce consistency to the dynamics of an abstract, round-based block creation process that is determined by three events associated with a… ▽ More

    Submitted 28 July, 2020; v1 submitted 14 January, 2020; originally announced January 2020.

    Comments: Includes new sections describing (1) an adaptive online adversary and (2) an efficient algorithm to compute consistency error probabilities. arXiv admin note: text overlap with arXiv:1911.10187

  18. arXiv:2001.00047  [pdf, ps, other

    cs.GT

    Coalition-Safe Equilibria with Virtual Payoffs

    Authors: Aggelos Kiayias, Aikaterini-Panagiota Stouka

    Abstract: Consider a set of parties invited to execute a protocol $Π$. The protocol will incur some cost to run while in the end (or at regular intervals), it will populate and update local tables that assign (virtual) rewards to participants. Each participant aspires to offset the costs of participation by these virtual payoffs that are provided in the course of the protocol. In this setting, we introduce… ▽ More

    Submitted 31 December, 2019; originally announced January 2020.

    Comments: 36 pages

  19. arXiv:1911.10187  [pdf, ps, other

    cs.CR cs.DM

    Linear Consistency for Proof-of-Stake Blockchains

    Authors: Erica Blum, Aggelos Kiayias, Cristopher Moore, Saad Quader, Alexander Russell

    Abstract: The blockchain data structure maintained via the longest-chain rule---popularized by Bitcoin---is a powerful algorithmic tool for consensus algorithms. Such algorithms achieve consistency for blocks in the chain as a function of their depth from the end of the chain. While the analysis of Bitcoin guarantees consistency with error $2^{-k}$ for blocks of depth $O(k)$, the state-of-the-art of proof-o… ▽ More

    Submitted 22 November, 2019; originally announced November 2019.

    Comments: The full version accompanying the paper in SODA 2020

  20. arXiv:1907.02434  [pdf, other

    cs.CY cs.CR

    Cryptocurrency Egalitarianism: A Quantitative Approach

    Authors: Dimitris Karakostas, Aggelos Kiayias, Christos Nasikas, Dionysis Zindros

    Abstract: Since the invention of Bitcoin one decade ago, numerous cryptocurrencies have sprung into existence. Among these, proof-of-work is the most common mechanism for achieving consensus, whilst a number of coins have adopted "ASIC-resistance" as a desirable property, claiming to be more "egalitarian,"S where egalitarianism refers to the power of each coin to participate in the creation of new coins. Wh… ▽ More

    Submitted 4 July, 2019; originally announced July 2019.

    Comments: 29 pages, 4 figures, Tokenomics 2019

  21. On the Practicality of Smart Contract PKI

    Authors: Christos Patsonakis, Katerina Samari, Aggelos Kiayias, Mema Roussopoulos

    Abstract: Public key infrastructures (PKIs) are one of the main building blocks for securing communications over the Internet. Currently, PKIs are under the control of centralized authorities, which is problematic as evidenced by numerous incidents where they have been compromised. The distributed, fault tolerant log of transactions provided by blockchains and more recently, smart contract platforms, consti… ▽ More

    Submitted 3 February, 2019; originally announced February 2019.

    Comments: 10 pages, 3 figures, 2 tables, DAPPCON 2019

    Journal ref: 2019 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPCON)

  22. arXiv:1811.01348  [pdf, other

    cs.CY cs.CR cs.SI

    Structure and Content of the Visible Darknet

    Authors: Georgia Avarikioti, Roman Brunner, Aggelos Kiayias, Roger Wattenhofer, Dionysis Zindros

    Abstract: In this paper, we analyze the topology and the content found on the "darknet", the set of websites accessible via Tor. We created a darknet spider and crawled the darknet starting from a bootstrap list by recursively following links. We explored the whole connected component of more than 34,000 hidden services, of which we found 10,000 to be online. Contrary to folklore belief, the visible part of… ▽ More

    Submitted 7 November, 2018; v1 submitted 4 November, 2018; originally announced November 2018.

  23. arXiv:1810.01719  [pdf, other

    cs.MA

    A Puff of Steem: Security Analysis of Decentralized Content Curation

    Authors: Aggelos Kiayias, Benjamin Livshits, Andrés Monteoliva Mosteiro, Orfeas Stefanos Thyfronitis Litos

    Abstract: Decentralized content curation is the process through which uploaded posts are ranked and filtered based exclusively on users' feedback. Platforms such as the blockchain-based Steemit employ this type of curation while providing monetary incentives to promote the visibility of high quality posts according to the perception of the participants. Despite the wide adoption of the platform very little… ▽ More

    Submitted 2 January, 2019; v1 submitted 3 October, 2018; originally announced October 2018.

    Comments: 15 pages main text, 35 pages in total, 6 figures, 6 algorithms. Contains mathematical analysis and computer simulation

  24. arXiv:1807.11218  [pdf

    cs.GT

    Reward Sharing Schemes for Stake Pools

    Authors: Lars Brünjes, Aggelos Kiayias, Elias Koutsoupias, Aikaterini-Panagiota Stouka

    Abstract: We introduce and study reward sharing schemes (RSS) that promote the fair formation of {\em stake pools}\ in collaborative projects that involve a large number of stakeholders such as the maintenance of a proof-of-stake (PoS) blockchain. Our mechanisms are parameterized by a target value for the desired number of pools. We show that by properly incentivizing participants, the desired number of sta… ▽ More

    Submitted 6 June, 2020; v1 submitted 30 July, 2018; originally announced July 2018.

  25. arXiv:1608.00849  [pdf, ps, other

    cs.CR cs.DC

    Distributed, End-to-end Verifiable, and Privacy-Preserving Internet Voting Systems

    Authors: Nikos Chondros, Bingsheng Zhang, Thomas Zacharias, Panos Diamantopoulos, Stathis Maneas, Christos Patsonakis, Alex Delis, Aggelos Kiayias, Mema Roussopoulos

    Abstract: E-voting systems are a powerful technology for improving democracy. Unfortunately, prior voting systems have single points-of-failure, which may compromise availability, privacy, or integrity of the election results. We present the design, implementation, security analysis, and evaluation of the D-DEMOS suite of distributed, privacy-preserving, and end-to-end verifiable e-voting systems. We pres… ▽ More

    Submitted 2 August, 2016; originally announced August 2016.

    Comments: arXiv admin note: text overlap with arXiv:1507.06812

  26. arXiv:1607.02420  [pdf, other

    cs.GT cs.CR

    Blockchain Mining Games

    Authors: Aggelos Kiayias, Elias Koutsoupias, Maria Kyropoulou, Yiannis Tselekounis

    Abstract: We study the strategic considerations of miners participating in the bitcoin's protocol. We formulate and study the stochastic game that underlies these strategic considerations. The miners collectively build a tree of blocks, and they are paid when they create a node (mine a block) which will end up in the path of the tree that is adopted by all. Since the miners can hide newly mined nodes, they… ▽ More

    Submitted 8 July, 2016; originally announced July 2016.

    Comments: Accepted to EC '16

  27. arXiv:1507.06812  [pdf, ps, other

    cs.CR cs.DC

    D-DEMOS: A distributed, end-to-end verifiable, internet voting system

    Authors: Nikos Chondros, Bingsheng Zhang, Thomas Zacharias, Panos Diamantopoulos, Stathis Maneas, Christos Patsonakis, Alex Delis, Aggelos Kiayias, Mema Roussopoulos

    Abstract: E-voting systems have emerged as a powerful technology for improving democracy by reducing election cost, increasing voter participation, and even allowing voters to directly verify the entire election procedure. Prior internet voting systems have single points of failure, which may result in the compromise of availability, voter secrecy, or integrity of the election results. In this paper, we pre… ▽ More

    Submitted 18 December, 2015; v1 submitted 24 July, 2015; originally announced July 2015.

    Comments: 17 pages, 5 figures

  28. arXiv:1311.4591  [pdf, ps, other

    cs.CR cs.IT

    On the Security of Key Extraction from Measuring Physical Quantities

    Authors: Matt Edman, Aggelos Kiayias, Qiang Tang, Bulent Yener

    Abstract: Key extraction via measuring a physical quantity is a class of information theoretic key exchange protocols that rely on the physical characteristics of the communication channel to enable the computation of a shared key by two (or more) parties that share no prior secret information. The key is supposed to be information theoretically hidden to an eavesdropper. Despite the recent surge of researc… ▽ More

    Submitted 16 December, 2015; v1 submitted 18 November, 2013; originally announced November 2013.

  29. Solving the At-Most-Once Problem with Nearly Optimal Effectiveness

    Authors: Sotirios Kentros, Aggelos Kiayias

    Abstract: We present and analyze a wait-free deterministic algorithm for solving the at-most-once problem: how m shared-memory fail-prone processes perform asynchronously n jobs at most once. Our algorithmic strategy provides for the first time nearly optimal effectiveness, which is a measure that expresses the total number of jobs completed in the worst case. The effectiveness of our algorithm equals n-2m+… ▽ More

    Submitted 2 December, 2013; v1 submitted 15 July, 2011; originally announced July 2011.

    Comments: Updated Version. A Brief Announcement was published in PODC 2011. An Extended Abstract was published in the proceeding of ICDCN 2012. A full version was published in Theoretical Computer Science, Volume 496, 22 July 2013, Pages 69 - 88

    ACM Class: F.1.2; F.2.m

    Journal ref: Theoretical Computer Science, Volume 496, 22 July 2013, Pages 69-88, ISSN 0304-3975

  30. arXiv:0909.4575  [pdf, ps, other

    cs.CR cs.IT

    Randomness Efficient Steganography

    Authors: Aggelos Kiayias, Alexander Russell, Narasimha Shashidhar

    Abstract: Steganographic protocols enable one to embed covert messages into inconspicuous data over a public communication channel in such a way that no one, aside from the sender and the intended receiver, can even detect the presence of the secret message. In this paper, we provide a new provably-secure, private-key steganographic encryption protocol secure in the framework of Hopper et al. We first prese… ▽ More

    Submitted 3 February, 2012; v1 submitted 24 September, 2009; originally announced September 2009.

    Comments: 19 pages

    ACM Class: F.2.2; G.3; E.3

  31. arXiv:0909.3658  [pdf, ps, other

    cs.CR cs.IT

    Efficient Steganography with Provable Security Guarantees

    Authors: Aggelos Kiayias, Yona Raekow, Alexander Russell, Narasimha Shashidhar

    Abstract: We provide a new provably-secure steganographic encryption protocol that is proven secure in the complexity-theoretic framework of Hopper et al. The fundamental building block of our steganographic encryption protocol is a "one-time stegosystem" that allows two parties to transmit messages of length shorter than the shared key with information-theoretic security guarantees. The employment of a p… ▽ More

    Submitted 20 September, 2009; originally announced September 2009.

    Comments: 12 pages

    ACM Class: F.2.2; G.3; E.3