Publications

Peer-reviewed journals and conference proceedings:

  1. Channels: Horizontal Scaling and Confidentiality on Permissioned Blockchains

    by Elli Androulaki, Christian Cachin, Angelo De Caro, Eleftherios Kokoris-Kogias.
    In proceedings part I of  23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, pages 111-131. https://doi.org/10.1007/978-3-319-99073-6
  2. Combining private set-intersection with secure two-party computation

    by Michele Ciampi and Claudio Orlandi.
    In proceedings of International Conference on Security and Cryptography for Networks, SCN 2018, Amalfi, Italy, September 5-7, 2018, pages 464-482. Available at https://eprint.iacr.org/2018/105
  3. Ouroboros genesis: Composable proof-of-stake blockchains with dynamic availability.

    by Christian Badertscher, Peter Gazi, Aggelos Kiayias, Alexander Russell, and Vassilis Zikas.
    In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, Toronto, ON, Canada, October 15-19, 2018, pages 913–930, 2018. Available at https://eprint.iacr.org/2018/378
  4. On the Security Properties of e-Voting Bulletin Boards.

    by Aggelos Kiayias, Annabell Kuldmaa, Helger Lipmaa, Janno Siim, Thomas Zacharias.
    In Catalano D., De Prisco R. (eds) Security and Cryptography for Networks. SCN 2018. Lecture Notes in Computer Science, vol 11035. Springer, Cham. Available at https://eprint.iacr.org/2018/567
  5. On Trade-offs of Applying Block Chains for Electronic Voting Bulletin Boards

    by Sven Heiberg, Ivo Kubjas, Janno Siim and Jan Willemson.
    In proceedings of the Third International Joint Conference on Electronic Voting E-Vote-ID 2018, 2–5 October 2018, Lochau/Bregenz, Austria, TUT press, pp. 259-276. Available at http://eprint.iacr.org/2018/685
  6. Non-Interactive Secure Computation from One-Way Functions

    by Saikrishna Badrinarayanan, Abhishek Jain; Rafail Ostrovsky and Ivan Visconti.
    In proceedings Part III of 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018.

  7. Publicly Verifiable Proofs from Blockchains

    by Alessandra Scafuro; Luisa Siniscalchi; Ivan Visconti 
    In proceedings Part I of 2nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019

  8. DL-Extractable UC-Commitment Schemes

    by Behzad Abdolmaleki, Karim Baghery, Helger Lipmaa, Janno Siim and Michal Zajac
    In Robert Deng and Moti Yung, editors, ACNS 2019, volume ? of Lecture Notes in Computer Science, pages ?--?, Bogotá , Colombia, June 5--7, 2019. Springer, Heidelberg.

  9. UC-Secure CRS Generation for SNARKs

    by Behzad Abdolmaleki, Karim Baghery, Helger Lipmaa, Janno Siim and Michal Zajac
    In Johannes Buchmann, Abderrahmane Nitaj and Tajjeeddine Rachidi, editors, Africacrypt 2019, volume ? of Lecture Notes in Computer Science, pages ?--?, Rabat, Morocco, July 9--11, 2019. Springer, Heidelberg

  10. On the Efficiency of Privacy-Preserving Smart Contract Systems

    by Karim Baghery
    In Johannes Buchmann, Abderrahmane Nitaj and Tajjeeddine Rachidi, editors, Africacrypt 2019, volume ? of Lecture Notes in Computer Science, pages ?--?, Rabat, Morocco, July 9--11, 2019. Springer, Heidelberg

Technical reports

  1. New Protocols for Secure Linear Algebra: Pivoting-Free Elimination and Fast Block Recursive Matrix Decomposition. By Niek J. Bouman and Niels de Vreede. Cryptology ePrint Archive, Report 2018/703. Available at https://eprint.iacr.org/2018/703.
  2. A consensus taxonomy in the blockchain era. By Juan Garay and Aggelos Kiayias. Cryptology ePrint Archive, Report 2018/754, 2018. Available at https://eprint.iacr.org/2018/754.
  3. Proof-of-work sidechains. By Aggelos Kiayias and Dionysis Zindros. Cryptology ePrint Archive, Report 2018/1048, 2018. Available at https://eprint.iacr.org/2018/1048.
  4. Ouroboros-BFT: A simple Byzantine fault tolerant consensus protocol. By Aggelos Kiayias and Alexander Russell. Cryptology ePrintArchive, Report 2018/1049, 2018. Available at https://eprint.iacr.org/2018/1049.
  5. Fast Secure Comparison for Medium-Sized Integers and Its Application in Binarized Neural Networks. By Mark Abspoel and Niek J. Bouman and Berry Schoenmakers and Niels de Vreede. Cryptology ePrint Archive, Report 2018/1236, 2018. Available at https://eprint.iacr.org/2018/1236.

Toolkits

2018
MPyC for Secure Multiparty Computation in Python. Available at  https://github.com/lschoe/mpyc