Financial cryptography and data security : 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019, Revised selected papers /: 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019, Revised selected papers. (2019)
- Record Type:
- Book
- Title:
- Financial cryptography and data security : 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019, Revised selected papers /: 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019, Revised selected papers. (2019)
- Main Title:
- Financial cryptography and data security : 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019, Revised selected papers
- Other Titles:
- FC 2019
- Further Information:
- Note: Ian Goldberg, Tyler Moore (eds.).
- Editors:
- Goldberg, Ian (Ian Avrum), 1973-
Moore, Tyler (Tyler W.) - Other Names:
- FC (Conference), 23rd
- Contents:
- Intro; Preface; Organization; Financial Cryptography and Data Security 2019 St. Kitts Marriott Resort, St. Kitts and Nevis February 18-22, 2019; Contents; Cryptocurrency Cryptanalysis; Biased Nonce Sense: Lattice Attacks Against Weak ECDSA Signatures in Cryptocurrencies; 1 Introduction; 2 Related Work; 3 The Elliptic Curve Digital Signature Algorithm (ECDSA); 3.1 ECDSA in Cryptocurrencies; 3.2 ECDSA in Network Protocols.; 3.3 Elementary Attacks on ECDSA; 4 Lattice Attacks on ECDSA; 4.1 The Hidden Number Problem; 4.2 Optimizations; 4.3 Implicit Prefixes; 4.4 Implicit Suffixes 4.5 Breaking ECDSA with the Hidden Number Problem5 Bitcoin; 5.1 Collecting Data; 5.2 Cryptanalytic Tests for Biased Nonces; 5.3 Running the Cryptanalysis; 5.4 Results and Analysis; 6 Ethereum; 7 Ripple; 8 SSH; 9 HTTPS; References; Proofs of Stake; Snow White: Robustly Reconfigurable Consensus and Applications to Provably Secure Proof of Stake; 1 Introduction; 1.1 Robustly Reconfigurable Consensus; 1.2 From Robustly Reconfigurable Consensus to Proof-of-Stake; 1.3 Chronological Notes, Closely Related, and Subsequent Works; 2 Snow White's Core Consensus Protocol 2.1 Background: Sleepy Consensus and Sleepy Execution Model2.2 Handling Committee Reconfiguration; 2.3 Handling Mildly Adaptive and Posterior Corruptions; 2.4 Late Joining in the Presence of Posterior Corruption; 2.5 Putting It Altogether: Informal Overview of Snow White; 3 From Robustly Reconfigurable Consensus to PoS; 3.1 Base Security onIntro; Preface; Organization; Financial Cryptography and Data Security 2019 St. Kitts Marriott Resort, St. Kitts and Nevis February 18-22, 2019; Contents; Cryptocurrency Cryptanalysis; Biased Nonce Sense: Lattice Attacks Against Weak ECDSA Signatures in Cryptocurrencies; 1 Introduction; 2 Related Work; 3 The Elliptic Curve Digital Signature Algorithm (ECDSA); 3.1 ECDSA in Cryptocurrencies; 3.2 ECDSA in Network Protocols.; 3.3 Elementary Attacks on ECDSA; 4 Lattice Attacks on ECDSA; 4.1 The Hidden Number Problem; 4.2 Optimizations; 4.3 Implicit Prefixes; 4.4 Implicit Suffixes 4.5 Breaking ECDSA with the Hidden Number Problem5 Bitcoin; 5.1 Collecting Data; 5.2 Cryptanalytic Tests for Biased Nonces; 5.3 Running the Cryptanalysis; 5.4 Results and Analysis; 6 Ethereum; 7 Ripple; 8 SSH; 9 HTTPS; References; Proofs of Stake; Snow White: Robustly Reconfigurable Consensus and Applications to Provably Secure Proof of Stake; 1 Introduction; 1.1 Robustly Reconfigurable Consensus; 1.2 From Robustly Reconfigurable Consensus to Proof-of-Stake; 1.3 Chronological Notes, Closely Related, and Subsequent Works; 2 Snow White's Core Consensus Protocol 2.1 Background: Sleepy Consensus and Sleepy Execution Model2.2 Handling Committee Reconfiguration; 2.3 Handling Mildly Adaptive and Posterior Corruptions; 2.4 Late Joining in the Presence of Posterior Corruption; 2.5 Putting It Altogether: Informal Overview of Snow White; 3 From Robustly Reconfigurable Consensus to PoS; 3.1 Base Security on Distribution of Stake; 4 Achieving Incentive Compatibility; 4.1 Fair Reward Scheme; 4.2 Thwarting Nothing-at-Stake Attacks; References; Compounding of Wealth in Proof-of-Stake Cryptocurrencies; 1 Introduction; 1.1 Related Work; 2 Models and Notation 3 Equitability Under Honest Behavior4 Strategic Behavior; 4.1 Strategic Selfish Mining; 5 Conclusion; A Strategic Behavior; References; Short Paper: I Can't Believe It's Not Stake! Resource Exhaustion Attacks on PoS; 1 Introduction; 2 Background; 2.1 Proof of Stake; 2.2 Validating PoS Blockchains; 3 Explanation of the Attack; 4 Evaluating the Attack; 4.1 Analysis of Affected Cryptocurrencies; 4.2 Benchmarking the Attack; 5 Coordinated Vulnerability Disclosure; 6 Mitigations; 7 Discussion and Conclusion; References; Measurement Short Paper: An Exploration of Code Diversity in the Cryptocurrency Landscape1 Introduction; 2 Related Work; 3 Data Collection; 3.1 Source Code Repositories; 3.2 Deployed Source Code; 4 Bitcoin Code Reuse; 5 Ethereum as a Platform; 6 Conclusions; References; Short Paper: An Empirical Analysis of Blockchain Forks in Bitcoin; 1 Introduction; 2 Fundamentals and Related Work; 3 Measurement and Analysis Method; 4 Analysis of Bitcoin Blockchain Forks; 4.1 Effect of Headstart on Probability of Main Chain Inclusion; 4.2 Deviating Mining Strategy; 4.3 Peer-to-Peer Propagation Comparison … (more)
- Publisher Details:
- Cham, Switzerland : Springer
- Publication Date:
- 2019
- Extent:
- 1 online resource (xiv, 708 pages), illustrations (some color)
- Subjects:
- 005.8/24
Data encryption (Computer science) -- Congresses
Computer security -- Congresses
User-centered system design -- Congresses
Electronic books
Electronic books - Languages:
- English
- ISBNs:
- 9783030321017
3030321010 - Related ISBNs:
- 9783030321000
- Notes:
- Note: Online resource; title from PDF title page (SpringerLink, viewed October 15, 2019).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.465316
- Ingest File:
- 02_609.xml