4th Workshop on Trusted Smart Contracts
February 14, 2020
Accepted papers and Programme
09:00-09:15 | Openings |
09:15-10:15 | Session 1: "Applications and empirical studies (I)" |
09:15 | "Characterizing Types of Smart Contracts in the Ethereum Landscape" |
Monika di Angelo and Gernot Salzer. | |
09:35 | "Smart Contract Development from the Perspective of Developers: Topics and Issues Discussed on Social Media" |
Afiya Ayman, Shanto Roy, Amin Alipour and Aron Laszka. | |
09:55 | "Bypassing Non-Outsourceable Proof-of-Work Schemes Using Collateralized Smart Contracts" |
Alexander Chepurnoy and Amitabh Saxena. | |
10:15-10:45 | Break |
10:45-11:25 | Session 1: "Applications and empirical studies (II)" |
10:45 | "Scalable Open-Vote Network on Ethereum" |
Mohamed Seifelnasr, Hisham Galal and Amr Youssef. | |
11:05 | "How to Dynamically Incentivize Sufficient Level of IoT Security" |
Jianan Su, Michael Bartholic, Andrew Stange, Ryosuke Ushida and Shin'Ichiro Matsuo. | |
11:25-12:25 | Session 2: "Payments" |
11:25 | "Confidential and auditable payments" |
Tatsuo Mitani and Akira Otsuka. | |
11:45 | "MAPPCN: Multi-hop Anonymous and Privacy-Preserving Payment Channel Network" |
Somanath Tripathy and Susil Kumar Mohanty. | |
12:05 | "Marlowe: implementing and analysing financial contracts on blockchain" |
Simon Thompson, Pablo Lamela Seijas, Alexander Nemish and David Smith. | |
12:25-13:30 | Lunch |
13:30-14:50 | Session 3: "Blockchains and platforms" |
13:30 | "Load Balancing in Sharded Blockchains" |
Naoya Okanami, Ryuya Nakamura and Takashi Nishide. | |
13:50 | "The Extended UTxO Model" |
Kenneth MacKenzie, Orestis Melkonian, Manuel M.T. Chakravarty, James Chapman, Philip Wadler and Michael Peyton Jones.
Talk presented by Alexnder Nemish. |
|
14:10 | "Privacy-Preserving Cross-Chain Atomic Swaps" |
Apoorvaa Deshpande and Maurice Herlihy (Videoconference). | |
14:20 | "A block-chain based approach to Resource Sharing in Smart Neighbourhoods" |
Sepideh Avizheh, Muni Venkateswarlu Kumaramangalam and Reihaneh Safavi-Naini. | |
14:40-15:10 | Break |
15:10-16:00 | Session 4: "Languages" |
15:10 | "Enforcing Determinism of Java Smart Contracts" |
Fausto Spoto. | |
15:30 | "Albert, an intermediate smart-contract language for the Tezos blockchain" |
Bruno Bernardo, Raphaël Cauderlier, Basile Pesin and Julien Tesson. | |
15:50 | "A Formally Verified Static Analysis Framework for Compositional Contracts" |
Fritz Henglein, Christian Kjær Larsen and Agata Murawska (Videoconference). | |
16:00-17:30 | Keynote: Peter Gutmann, University of Auckland |
Hard and Not-necessarily-hard Problems in Cryptography Security people often respond to security problems by throwing crypto at them. After all, if crypto is good then more of it has to be even "gooder". However, there are some problems that simply can't be solved by crypto, no matter how much of it you use. Conversely, some problems can be addressed using far simpler mechanisms than the ones that cryptographers come up with, often by moving the goalposts slightly to make the problem solvable, if less cryptographically interesting. This talk on "Hard and Not-necessarily-hard Problems in Cryptography" looks at some problems that can't be solved through cryptography even if at first glance they may appear solvable, as well as ones that can be solved if you're prepared to turn them into slightly different problems. Peter Claus Gutmann is a computer scientist in the Department of Computer Science at the University of Auckland, Auckland, New Zealand. He has a Ph.D. in computer science from the University of Auckland. His Ph.D. thesis and a book based on the thesis were about a cryptographic security architecture. He is interested in computer security issues, including security architecture, security usability (or more usually the lack thereof), and hardware security; he has discovered several flaws in publicly released cryptosystems and protocols. He is most famous for contributions to SFS, pgp, debates about encryption policy and of course the gutman method. More details can be found in his wiki page. |
|
This conference is organized annually by the International Financial Cryptography Association in cooperation with IACR.