Program

 
Financial Cryptography and Data Security 2021

Twenty-Fifth International Conference
March 1–5, 2021
Radisson Grenada Beach Resort
Grenada

A detailed program is not yet available, but here is a provisional list of accepted papers:

A formal model of Algorand smart contracts. Massimo Bartoletti (Università degli Studi di Cagliari), Andrea Bracciali, Cristian Lepore (Stirling University), Alceste Scalas (Technical University of Denmark), Roberto Zunino (Università degli Studi di Trento)

ACeD: Scalable Data Availability Oracle. Peiyao Sheng (University of Illinois Urbana-Champaign), Bowen Xue, Sreeram Kannan (University of Washington Seattle), Pramod Viswanath (University of Illinois Urbana-Champaign)

An Empirical Analysis of Privacy in the Lightning Network. George Kappos, Haaroon Yousaf (University College London), Ania M. Piotrowska (Nym Technologies), Sanket Kanjalkar (University of Illinois Urbana-Champaign), Sergi Delgado-Segura (Talaia Labs), Andrew Miller (University of Illinois at Urbana-Champaign), Sarah Meiklejohn (University College London / IC3)

Another Look at Extraction and Randomization of Groth's zk-SNARK. Karim Baghery (imec-COSIC, KU Leuven), Markulf Kohlweiss (The University of Edinburgh and IOHK), Janno Siim (University of Tartu and The University of Edinburgh), Mikhail Volkhov (The University of Edinburgh)

Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit. Kaihua Qin, Liyi Zhou, Benjamin Livshits, Arthur Gervais (Imperial College London)

BooLigero: Improved Sublinear Zero Knowledge Proofs for Boolean Circuits. Yaron Gvili (Cryptomnium LLC), Sarah Scheffler, Mayank Varia (Boston University)

Brick: Asynchronous Payment Channels. Zeta Avarikioti (ETH Zurich), Eleftherios Kokoris-Kogias (IST Austria), Roger Wattenhofer (ETH Zurich), Dionysis Zindros (NKUA, IOHK)

Congestion Attacks in Payment Channel Networks. Ayelet Mizrahi, Aviv Zohar (The Hebrew University of Jerusalem)

Cross-Layer Deanonymization Methods in the Lightning Protocol. Matteo Romiti (Austrian Institute of Technology), Friedhelm Victor (Technische Universität Berlin), Pedro Moreno-Sanchez (IMDEA Software Institute), Peter Sebastian Nordholt (Chainalysis), Bernhard Haslhofer (Austrian Institute of Technology), Matteo Maffei (Technische Universität Wien)

DAHash: Distribution Aware Tuning of Password Hashing Costs. Wenjie Bai, Jeremiah Blocki (Purdue University)

Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Multiparty Computation. Reo Eriguchi (The University of Tokyo / AIST), Atsunori Ichikawa (NTT Secure Platform Laboratories), Noboru Kunihiro (University of Tsukuba), Koji Nuida (The University of Tokyo / AIST)

Efficient State Management in Distributed Ledgers. Nikos Karayannidis (IOHK), Dimitris Karakostas, Aggelos Kiayias (University of Edinburgh & IOHK)

Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask). Jaswant Pakki, Yan Shoshitaishvili, Ruoyu Wang, Tiffany Bao, Adam Doupe (Arizona State University)

FPPW: A Fair and Privacy Preserving Watchtower For Bitcoin. Arash Mirzaei, Amin Sakzad, Jiangshan Yu, Ron Steinfeld (Monash University)

Fast Isomorphic State Channels. Manuel Chakravarty, Sandro Coretti, Matthias Fitzi, Peter Gazi, Philipp Kant (IOHK), Aggelos Kiayias (University of Edinburgh & IOHK), Alexander Russell (University of Connecticut & IOHK)

Faster Homomorphic Encryption over GPGPUs via hierarchical DGT. Pedro G. M. R. Alves (University of Campinas), Diego F. Aranha (Aarhus University), Jheyne N. Ortiz (University of Campinas)

Fine-Grained Forward Secrecy: Allow-List/Deny-List Encryption and Applications. David Derler (DFINITY), Sebastian Ramacher, Daniel Slamanig, Christoph Striecks (AIT Austrian Institute of Technology)

Fraud and Data Availability Proofs: Detecting Invalid Blocks in Light Clients. Mustafa Al-Bassam, Alberto Sonnino (University College London), Vitalik Buterin (Ethereum Research), Ismail Khoffi (LazyLedger)

Generic Plaintext Equality and Inequality Proofs. Olivier Blazy (Université de Limoges), Xavier Bultel (INSA Centre Val de Loire, LIFO lab), Pascal Lafourcade (LIMOS, University Clermont Auvergne), Octavio Perez Kempner (DIENS, École normale supérieure, CNRS, PSL University)

Global Internet Censorship in the Time of COVID-19. Anjali Vyas, Ram Sundara Raman, Nick Ceccio (University of Michigan), Philipp Lutscher (University of Konstanz), Roya Ensafi (University of Michigan)

HaPPY-mine: Designing a Mining Reward Function. Lucianna Kiffer, Rajmohan Rajaraman (Northeastern University)

High-Threshold AVSS with Optimal Communication Complexity. Nicolas Alhaddad, Mayank Varia (Boston University), Haibin Zhang

Ignore the Extra Zeroes: Variance-Optimal Mining Pools. Clara Shikhelman (Chaincode Labs), Tim Roughgarden (Columbia University)

Improving the Efficiency of AES Protocols In Multi-Party Computation. Betül Durak, Jorge Merchan (Robert Bosch LLC)

Instant Block Confirmation in the Sleepy Model. Vipul Goyal, Hanjun Li, Justin Raizes (Carnegie Mellon University)

Liquidations: DeFi on a Knife-edge. Daniel Perez, Sam Maximilian Werner (Imperial College London), Jiahua Xu (University College London), Benjamin Livshits (Imperial College London)

Mining for Privacy: How to Bootstrap a Snarky Blockchain. Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss (The University of Edinburgh & IOHK)

Multi-instance Publicly Verifiable Time-lock Puzzle and its Applications. Aydin Abadi (University of Edinburgh), Aggelos Kiayias (University of Edinburgh & IOHK)

PERIMETER: A network-layer attack on the anonymity of cryptocurrencies. Maria Apostolaki, Cedric Maire, Vanbever Laurent (ETH Zurich)

Payment Trees: Low Collateral Payments for Payment Channel Networks. Maxim Jourenko (Tokyo Institute of Technology), Mario Larangeira (Tokyo Institute of Technology, IOHK), Keisuke Tanaka (Tokyo Institute of Technology)

PoSAT: Proof-of-Work Dynamic Availability and Unpredictability, without the Work. Soubhik Deb, Sreeram Kannan (University of Washington Seattle), David Tse (Stanford University)

Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments. Erkan Tairi (TU Wien), Pedro Moreno-Sanchez (IMDEA Software Institute), Matteo Maffei (TU Wien)

Practical Post-Quantum Few-Time Verifiable Random Function with Applications to Algorand. Muhammed F. Esgin (Monash University and Data61, CSIRO), Veronika Kuchta, Amin Sakzad, Ron Steinfeld (Monash University), Zhenfei Zhang (Algorand), Shifeng Sun (Monash University), Shumo Chu (UCSB)

Practical Witness-Key-Agreement for Blockchain-based Dark Pools Financial Trading. Nam Ngo (University of Trento, Italy), Fabio Massacci (University of Trento, Vrije Universiteit Amsterdam), Florian Kerschbaum (University of Waterloo), Julian Williams (Durham Business School)

Rabbit: Efficient Comparison for Secure Multi-Party Computation. Eleftheria Makri (imec-COSIC, KU Leuven), Dragos Rotaru (Cape Privacy, imec-COSIC, KU Leuven), Frederik Vercauteren (imec-COSIC, KU Leuven), Sameer Wagh (UC Berkeley, Princeton University)

Reparo: Publicly Verifiable Layer to Repair Blockchains. Sri AravindaKrishnan Thyagarajan (Friedrich Alexander Universität Erlangen-Nürnberg), Adithya Bhat (Purdue University), Bernardo Magri (Concordium Blockchain Research Center, Aarhus University), Daniel Tschudi (Concordium), Aniket Kate (Purdue University)

Shielded Computations in Smart Contracts Overcoming Forks. Vincenzo Botta (University of Salerno), Daniele Friolo, Daniele Venturi (Sapenza University of Rome), Ivan Visconti (University of Salerno)

Short Paper: Debt representation in UTXO blockchains. Michael Chiu (University of Toronto), Uros Kalabic (Mitsubishi Electric Research Laboratories (MERL))

Short Paper: Organizational Security: Implementing a Risk-Reduction-Based Incentivization Model for MFA Adoption. Sanchari Das (University of Denver), Andrew Kim, L. Jean Camp (Indiana University Bloomington)

Short Paper: Selfish Mining Attacks Exacerbated by Elastic Hash Supply. Yoko Shibuya, Go Yamamoto, Fuhito Kojima (NTT Research Inc), Elaine Shi (Cornell University), Shin'ichiro Matsuo (NTT Research Inc / Georgetown University), Aron Laszka (University of Houston)

Short Paper: Terrorist Fraud in Distance Bounding: Getting Around the Models. David Gerault (University of Surrey)

Sigforgery: Breaking and Fixing Data Authenticity in Sigfox. Loïc Ferreira (Orange)

SoK: Communication Across Distributed Ledgers. Alexei Zamyatin (Imperial College London and Interlay), Mustafa Al-Bassam (University College London), Dionysis Zindros (University of Athens and IOHK), Lefteris Kokoris-Kogias (IST Austria), Pedro Moreno-Sanchez (IMDEA Software Institute), Aggelos Kiayias (University of Edinburgh and IOHK), William J. Knottenbelt (Imperial College London)

SoK: Securing Email—A Stakeholder-Based Analysis. Jeremy Clark (Concordia University), P.C. van Oorschot (Carleton University), Scott Ruoti (University of Tennessee), Kent Seamons, Daniel Zappala (Brigham Young University)

Somewhere Statistically Binding Commitment Schemes with Applications. Prastudy Fauzi (Simula UiB), Helger Lipmaa (Simula UiB, Norway, University of Tartu), Zaira Pindado (Universitat Pompeu Fabra), Janno Siim (University of Edinburgh, University of Tartu)

Specfuscator: Evaluating Branch Removal as a Spectre Mitigation. Martin Schwarzl, Claudio Canella, Daniel Gruss (Graz University of Technology), Michael Schwarz (CISPA Helmholtz Center for Information Security)

Speculative Dereferencing of Registers: Reviving Foreshadow. Martin Schwarzl, Thomas Schuster (Graz University of Technology), Michael Schwarz (CISPA Helmholtz Center for Information Security), Daniel Gruss (Graz University of Technology)

The Checkpointed Longest Chain: User-dependent Adaptivity and Finality. Suryanarayana Sankagiri, Xuechao Wang (University of Illinois, Urbana-Champaign), Sreeram Kannan (University of Washington Seattle), Pramod Viswanath (University of Illinois at Urbana-Champaign)

The Complex Shape of Anonymity in Cryptocurrencies: Case Studies from a Systematic Approach. Niluka Amarasinghe, Xavier Boyen, Matthew McKague (Queensland University of Technology)

The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts. Christof Ferreira Torres, Antonio Ken Iannillo (University of Luxembourg), Arthur Gervais (Imperial College London), Radu State (University of Luxembourg)

Timelocked Bribing. Tejaswi Nadahalli (ETH Zurich), Majid Khabbazian (University of Alberta), Roger Wattenhofer (ETH Zurich)

Unbounded Simulation-Sound Subversion-Resistant Quasi-Adaptive NIZK Proofs and Applications to Modular zk-SNARKs. Behzad Abdolmaleki (University of Tartu), Daniel Slamanig (AIT Austrian Institute of Technology)

Under the Hood of the Ethereum Gossip Protocol. Lucianna Kiffer, Asad Salman (Northeastern University), Dave Levin (University of Maryland), Alan Mislove, Cristina Nita-Rotaru (Northeastern University)

What's in Score for Website Users: A Data-driven Long-term Study on Risk-based Authentication Characteristics. Stephan Wiefling (H-BRS University of Applied Sciences, Ruhr University Bochum), Markus Dürmuth (Ruhr University Bochum), Luigi Lo Iacono (H-BRS University of Applied Sciences)

Zero-Knowledge Proofs for Set Membership: Efficient, Succinct, Modular. Daniel Benarroch (QEDIT), Matteo Campanelli (Aarhus University), Dario Fiore (IMDEA Software Institute), Kobi Gurkan (Ethereum Foundation, cLabs), Dimitris Kolonelos (IMDEA Software Institute, Universidad Politecnica de Madrid)

 

 

 

This conference is organized annually by the International Financial Cryptography Association.