Financial Cryptography and Data Security
Springer International Publishing (Verlag)
978-3-031-78678-5 (ISBN)
The two-volume set LNCS 14744 + 14745 constitutes the proceedings of the 28th International Conference on Financial Cryptography and Data Security, FC 2024, which took place in Willemstad, Curaçao, during March 4-8, 2024.
The number of 36 full and 6 short papers included in the proceedings were carefully reviewed and selected from 199 submissions. They were organized in topical sections as follows:
Part I: Consensus; AMMs; fees and rewards; hardware attacks;
Part II: Feeling Optimistic; randomness and time; signatures; applied cryptography; PETS; designing for the real world.
Feeling Optimistic.- Light Clients for Lazy Blockchains.- Short paper: Naysayer proofs.- Randomness and Time.- GoAT: File Geolocation via Anchor Timestamping.- Improved YOSO Randomness Generation with Worst-Case Corruptions.- Short Paper: Breaking X-VRF, a Post-Quantum Verifiable Random Function.- Truncator: Time-space Tradeoff of Cryptographic Primitives.- Signatures.- Foundations of Anonymous Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions.- Proactive Refresh for Accountable Threshold Signatures.- SoK: Signatures With Randomizable Keys.- Subset-optimized BLS Multi-signature with Key Aggregation.- Applied Cryptography.- SAVER: SNARK-compatible Verifiable Encryption.- Owl: An Augmented Password-Authenticated Key Exchange Scheme.- PETS.- Anonymous Reputation Systems with Revocation, Revisited.- Towards Practical Doubly-Efficient Private Information Retrieval.- Short Paper: Onion Messages on Leash.- A Transaction-Level Model for Blockchain Privacy.- Designing for the Real World.- The Governance of Distributed Autonomous Organizations: A Study of Contributors' Influence, Networks, and Shifts in Voting Power.- Privacy-preserving Anti-Money Laundering using Secure Multi-Party Computation.- Scan, Shuffle, Rescan: Two-Prover Election Audits With Untrusted Scanners.- DeFi composability as MEV non-interference.
| Erscheinungsdatum | 19.02.2025 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science |
| Zusatzinfo | XVI, 391 p. 71 illus., 38 illus. in color. |
| Verlagsort | Cham |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
| Schlagworte | anonymity and untraceability • Blockchain • Computer Networks • Computer Security • cryptography • Databases • Data communication systems • distributed algorithms • distributed computer systems • privacy-preserving protocols • security protocols • Signal Processing |
| ISBN-10 | 3-031-78678-5 / 3031786785 |
| ISBN-13 | 978-3-031-78678-5 / 9783031786785 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich