Financial Cryptography and Data Security Front Cover

Financial Cryptography and Data Security

  • Length: 636 pages
  • Edition: 1st ed. 2017
  • Publisher:
  • Publication Date: 2017-12-24
  • ISBN-10: 3319702777
  • ISBN-13: 9783319702773
  • Sales Rank: #10147565 (See Top 100 Books)
Description

Financial Cryptography and Data Security: FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised … Papers (Lecture Notes in Computer Science)

This book constitutes the refereed proceedings of 5 workshops held at the 21st International Conference on Financial Cryptography and Data Security, FC 2017, in Sliema, Malta, in April 2017.

The 39 full papers presented were carefully reviewed and selected from 96 submissions. They feature the outcome of the 5th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, WAHC 2017, the 4th Workshop on Bitcoin and Blockchain Research, BITCOIN 2017, the Second Workshop on Secure Voting Systems, VOTING 2017, the First Workshop on Trusted Smart Contracts, WTSC 2017, and the First Workshop on Targeted Attacks, TA 2017.

The papers are grouped in topical sections named: encrypted computing and applied homomorphic cryptography; bitcoin and blockchain research; advances in secure electronic voting schemes; trusted smart contracts; targeted attacks.

Table of Contents

Chapter 1. Simple Encrypted Arithmetic Library – SEAL v2.1
Chapter 2. Towards Privacy-Preserving Multi-party Bartering
Chapter 3. Multi-level Access in Searchable Symmetric Encryption
Chapter 4. Privacy-Preserving Computations of Predictive Medical Models with Minimax Approximation and Non-Adjacent Form
Chapter 5. Private Outsourced Kriging Interpolation
Chapter 6. An Analysis of FV Parameters Impact Towards Its Hardware Acceleration
Chapter 7. Controlled Homomorphic Encryption: Definition and Construction
Chapter 8. ValueShuffle: Mixing Confidential Transactions for Comprehensive Transaction Privacy in Bitcoin
Chapter 9. Could Network Information Facilitate Address Clustering in Bitcoin?
Chapter 10. Switch Commitments: A Safety Switch for Confidential Transactions
Chapter 11. (Short Paper) PieceWork: Generalized Outsourcing Control for Proofs of Work
Chapter 12. Enhancing Bitcoin Transactions with Covenants
Chapter 13. Decentralized Prediction Market Without Arbiters
Chapter 14. An Analysis of Bitcoin OP_RETURN Metadata
Chapter 15. Constant-Deposit Multiparty Lotteries on Bitcoin
Chapter 16. Exchange Pattern Mining in the Bitcoin Transaction Directed Hypergraph
Chapter 17. Incentivizing Blockchain Forks via Whale Transactions
Chapter 18. Mixing Coins of Different Quality: A Game-Theoretic Approach
Chapter 19. Smart Contracts Make Bitcoin Mining Pools Vulnerable
Chapter 20. BatchVote: Voting Rules Designed for Auditability
Chapter 21. Existential Assertions for Voting Protocols
Chapter 22. Marked Mix-Nets
Chapter 23. Pseudo-Code Algorithms for Verifiable Re-encryption Mix-Nets
Chapter 24. Using Selene to Verify Your Vote in JCJ
Chapter 25. A Roadmap to Fully Homomorphic Elections: Stronger Security, Better Verifiability
Chapter 26. Enabling Vote Delegation for Boardroom Voting
Chapter 27. Practical Governmental Voting with Unconditional Integrity and Privacy
Chapter 28. Findel: Secure Derivative Contracts for Ethereum
Chapter 29. Decentralized Execution of Smart Contracts: Agent Model Perspective and Its Implications
Chapter 30. A Concurrent Perspective on Smart Contracts
Chapter 31. An Empirical Analysis of Smart Contracts: Platforms, Applications, and Design Patterns
Chapter 32. Trust in Smart Contracts is a Process, As Well
Chapter 33. Defining the Ethereum Virtual Machine for Interactive Theorem Provers
Chapter 34. SmartCast: An Incentive Compatible Consensus Protocol Using Smart Contracts
Chapter 35. On the Feasibility of Decentralized Derivatives Markets
Chapter 36. A Proof-of-Stake Protocol for Consensus on Bitcoin Subchains
Chapter 37. X-Platform Phishing: Abusing Trust for Targeted Attacks Short Paper
Chapter 38. What to Phish in a Subject?
Chapter 39. Unpacking Spear Phishing Susceptibility
Chapter 40. Scripting Smart Contracts for Distributed Ledger Technology
Chapter 41. ZeroTrade: Privacy Respecting Assets Trading System Based on Public Ledger

To access the link, solve the captcha.