Zum Hauptinhalt springen

Showing 1–32 of 32 results for author: Danezis, G

Searching in archive cs. Search in all archives.
.
  1. arXiv:2310.18042  [pdf, other

    cs.DC cs.CR

    Sui Lutris: A Blockchain Combining Broadcast and Consensus

    Authors: Sam Blackshear, Andrey Chursin, George Danezis, Anastasios Kichidis, Lefteris Kokoris-Kogias, Xun Li, Mark Logan, Ashok Menon, Todd Nowacki, Alberto Sonnino, Brandon Williams, Lu Zhang

    Abstract: Sui Lutris is the first smart-contract platform to sustainably achieve sub-second finality. It achieves this significant decrease by employing consensusless agreement not only for simple payments but for a large variety of transactions. Unlike prior work, Sui Lutris neither compromises expressiveness nor throughput and can run perpetually without restarts. Sui Lutris achieves this by safely integr… ▽ More

    Submitted 12 August, 2024; v1 submitted 27 October, 2023; originally announced October 2023.

  2. arXiv:2310.14821  [pdf, other

    cs.DC cs.CR

    Mysticeti: Reaching the Limits of Latency with Uncertified DAGs

    Authors: Kushal Babel, Andrey Chursin, George Danezis, Anastasios Kichidis, Lefteris Kokoris-Kogias, Arun Koshy, Alberto Sonnino, Mingwei Tian

    Abstract: We introduce Mysticeti-C, the first DAG-based Byzantine consensus protocol to achieve the lower bounds of latency of 3 message rounds. Since Mysticeti-C is built over DAGs it also achieves high resource efficiency and censorship resistance. Mysticeti-C achieves this latency improvement by avoiding explicit certification of the DAG blocks and by proposing a novel commit rule such that every block c… ▽ More

    Submitted 13 July, 2024; v1 submitted 23 October, 2023; originally announced October 2023.

  3. arXiv:2309.12715  [pdf, other

    cs.CR

    Cuttlefish: Expressive Fast Path Blockchains with FastUnlock

    Authors: Lefteris Kokoris-Kogias, Alberto Sonnino, George Danezis

    Abstract: Cuttlefish addresses several limitations of existing consensus-less and consensus-minimized decentralized ledgers, including restricted programmability and the risk of deadlocked assets. The key insight of Cuttlefish is that consensus in blockchains is necessary due to contention, rather than multiple owners of an asset as suggested by prior work. Previous proposals proactively use consensus to pr… ▽ More

    Submitted 22 September, 2023; originally announced September 2023.

  4. arXiv:2203.06871  [pdf, other

    cs.DC cs.PF

    Block-STM: Scaling Blockchain Execution by Turning Ordering Curse to a Performance Blessing

    Authors: Rati Gelashvili, Alexander Spiegelman, Zhuolun Xiang, George Danezis, Zekun Li, Dahlia Malkhi, Yu Xia, Runtian Zhou

    Abstract: Block-STM is a parallel execution engine for smart contracts, built around the principles of Software Transactional Memory. Transactions are grouped in blocks, and every execution of the block must yield the same deterministic outcome. Block-STM further enforces that the outcome is consistent with executing transactions according to a preset order, leveraging this order to dynamically detect depen… ▽ More

    Submitted 25 August, 2022; v1 submitted 14 March, 2022; originally announced March 2022.

  5. arXiv:2201.05671  [pdf, other

    cs.CR

    Zef: Low-latency, Scalable, Private Payments

    Authors: Mathieu Baudet, Alberto Sonnino, Mahimna Kelkar, George Danezis

    Abstract: We introduce Zef, the first Byzantine-Fault Tolerant (BFT) protocol to support payments in anonymous digital coins at arbitrary scale. Zef follows the communication and security model of FastPay: both protocols are asynchronous, low-latency, linearly-scalable, and powered by partially-trusted sharded authorities. Zef further introduces opaque coins represented as off-chain certificates that are bo… ▽ More

    Submitted 8 March, 2022; v1 submitted 14 January, 2022; originally announced January 2022.

  6. arXiv:2105.11827  [pdf, other

    cs.CR cs.DC

    Narwhal and Tusk: A DAG-based Mempool and Efficient BFT Consensus

    Authors: George Danezis, Eleftherios Kokoris Kogias, Alberto Sonnino, Alexander Spiegelman

    Abstract: We propose separating the task of reliable transaction dissemination from transaction ordering, to enable high-performance Byzantine fault-tolerant quorum-based consensus. We design and evaluate a mempool protocol, Narwhal, specializing in high-throughput reliable dissemination and storage of causal histories of transactions. Narwhal tolerates an asynchronous network and maintains high performance… ▽ More

    Submitted 16 March, 2022; v1 submitted 25 May, 2021; originally announced May 2021.

  7. Embedding a Deterministic BFT Protocol in a Block DAG

    Authors: Maria A Schett, George Danezis

    Abstract: This work formalizes the structure and protocols underlying recent distributed systems leveraging block DAGs, which are essentially encoding Lamport's happened-before relations between blocks, as their core network primitives. We then present an embedding of any deterministic Byzantine fault tolerant protocol $\mathcal{P}$ to employ a block DAG for interpreting interactions between servers. Our ma… ▽ More

    Submitted 6 June, 2021; v1 submitted 18 February, 2021; originally announced February 2021.

  8. arXiv:2003.11506  [pdf, other

    cs.CR

    FastPay: High-Performance Byzantine Fault Tolerant Settlement

    Authors: Mathieu Baudet, George Danezis, Alberto Sonnino

    Abstract: FastPay allows a set of distributed authorities, some of which are Byzantine, to maintain a high-integrity and availability settlement system for pre-funded payments. It can be used to settle payments in a native unit of value (crypto-currency), or as a financial side-infrastructure to support retail payments in fiat currencies. FastPay is based on Byzantine Consistent Broadcast as its core primit… ▽ More

    Submitted 3 November, 2020; v1 submitted 25 March, 2020; originally announced March 2020.

  9. arXiv:1906.12237  [pdf, ps, other

    cs.CR

    SybilQuorum: Open Distributed Ledgers Through Trust Networks

    Authors: Alberto Sonnino, George Danezis

    Abstract: The Sybil attack plagues all peer-to-peer systems, and modern open distributed ledgers employ a number of tactics to prevent it from proof of work, or other resources such as space, stake or memory, to traditional admission control in permissioned settings. With SybilQuorum we propose an alternative approach to securing an open distributed ledger against Sybil attacks, and ensuring consensus among… ▽ More

    Submitted 28 June, 2019; originally announced June 2019.

  10. arXiv:1901.11218  [pdf, other

    cs.CR

    Replay Attacks and Defenses Against Cross-shard Consensus in Sharded Distributed Ledgers

    Authors: Alberto Sonnino, Shehar Bano, Mustafa Al-Bassam, George Danezis

    Abstract: We present a family of replay attacks against sharded distributed ledgers, that target cross-shard consensus protocols, such as the recently proposed Chainspace and Omniledger. They allow an attacker, with network access only, to double-spend or lock resources with minimal efforts. The attacker can act independently without colluding with any nodes, and succeed even if all nodes are honest; most o… ▽ More

    Submitted 1 September, 2020; v1 submitted 31 January, 2019; originally announced January 2019.

  11. arXiv:1809.01620  [pdf, ps, other

    cs.CR

    Blockmania: from Block DAGs to Consensus

    Authors: George Danezis, David Hrycyszyn

    Abstract: Blockmania is a byzantine consensus protocol. Nodes emit blocks forming a directed acyclic graph (block DAG) that is subsequently interpreted by each node separately to ensure consensus with safety, liveness and finality. The resulting system has communication complexity $O(N^2)$ even in the worse case, and very low constant factors --- as compared to $O(N^4)$ for PBFT; it is leaderless; and netwo… ▽ More

    Submitted 25 September, 2018; v1 submitted 5 September, 2018; originally announced September 2018.

  12. arXiv:1802.08415  [pdf, other

    cs.CR

    TARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer

    Authors: Chen Chen, Daniele E. Asoni, Adrian Perrig, David Barrera, George Danezis, Carmela Troncoso

    Abstract: Modern low-latency anonymity systems, no matter whether constructed as an overlay or implemented at the network layer, offer limited security guarantees against traffic analysis. On the other hand, high-latency anonymity systems offer strong security guarantees at the cost of computational overhead and long delays, which are excessive for interactive applications. We propose TARANET, an anonymity… ▽ More

    Submitted 23 February, 2018; originally announced February 2018.

  13. arXiv:1802.07344  [pdf, other

    cs.CR

    Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers

    Authors: Alberto Sonnino, Mustafa Al-Bassam, Shehar Bano, Sarah Meiklejohn, George Danezis

    Abstract: Coconut is a novel selective disclosure credential scheme supporting distributed threshold issuance, public and private attributes, re-randomization, and multiple unlinkable selective attribute revelations. Coconut integrates with blockchains to ensure confidentiality, authenticity and availability even when a subset of credential issuing authorities are malicious or offline. We implement and eval… ▽ More

    Submitted 16 March, 2020; v1 submitted 20 February, 2018; originally announced February 2018.

  14. arXiv:1711.03936  [pdf, ps, other

    cs.CR

    Consensus in the Age of Blockchains

    Authors: Shehar Bano, Alberto Sonnino, Mustafa Al-Bassam, Sarah Azouvi, Patrick McCorry, Sarah Meiklejohn, George Danezis

    Abstract: The blockchain initially gained traction in 2008 as the technology underlying bitcoin, but now has been employed in a diverse range of applications and created a global market worth over $150B as of 2017. What distinguishes blockchains from traditional distributed databases is the ability to operate in a decentralized setting without relying on a trusted third party. As such their core technical c… ▽ More

    Submitted 13 November, 2017; v1 submitted 10 November, 2017; originally announced November 2017.

  15. arXiv:1709.03817  [pdf, other

    cs.CR

    A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components

    Authors: Vasilios Mavroudis, Andrea Cerulli, Petr Svenda, Dan Cvrcek, Dusan Klinec, George Danezis

    Abstract: The semiconductor industry is fully globalized and integrated circuits (ICs) are commonly defined, designed and fabricated in different premises across the world. This reduces production costs, but also exposes ICs to supply chain attacks, where insiders introduce malicious circuitry into the final products. Additionally, despite extensive post-fabrication testing, it is not uncommon for ICs with… ▽ More

    Submitted 28 October, 2017; v1 submitted 12 September, 2017; originally announced September 2017.

  16. arXiv:1709.01008  [pdf, ps, other

    cs.CR

    Mix-ORAM: Using delegate shuffles

    Authors: Raphael R. Toledo, George Danezis, Isao Echizen

    Abstract: Oblivious RAM (ORAM) is a key technology for providing private storage and querying on untrusted machines but is commonly seen as impractical due to the high overhead of the re-randomization, called the eviction, the client incurs. We propose in this work to securely delegate the eviction to semi-trusted third parties to enable any client to accede the ORAM technology and present four different de… ▽ More

    Submitted 4 September, 2017; originally announced September 2017.

  17. arXiv:1708.05207  [pdf, other

    cs.CR cs.LG stat.ML

    Learning Universal Adversarial Perturbations with Generative Models

    Authors: Jamie Hayes, George Danezis

    Abstract: Neural networks are known to be vulnerable to adversarial examples, inputs that have been intentionally perturbed to remain visually similar to the source input, but cause a misclassification. It was recently shown that given a dataset and classifier, there exists so called universal adversarial perturbations, a single perturbation that causes a misclassification when applied to any input. In this… ▽ More

    Submitted 5 January, 2018; v1 submitted 17 August, 2017; originally announced August 2017.

  18. arXiv:1708.03778  [pdf, other

    cs.CR

    Chainspace: A Sharded Smart Contracts Platform

    Authors: Mustafa Al-Bassam, Alberto Sonnino, Shehar Bano, Dave Hrycyszyn, George Danezis

    Abstract: Chainspace is a decentralized infrastructure, known as a distributed ledger, that supports user defined smart contracts and executes user-supplied transactions on their objects. The correct execution of smart contract transactions is verifiable by all. The system is scalable, by sharding state and the execution of transactions, and using S-BAC, a distributed commit protocol, to guarantee consisten… ▽ More

    Submitted 12 August, 2017; originally announced August 2017.

  19. ClaimChain: Improving the Security and Privacy of In-band Key Distribution for Messaging

    Authors: Bogdan Kulynych, Wouter Lueks, Marios Isaakidis, George Danezis, Carmela Troncoso

    Abstract: The social demand for email end-to-end encryption is barely supported by mainstream service providers. Autocrypt is a new community-driven open specification for e-mail encryption that attempts to respond to this demand. In Autocrypt the encryption keys are attached directly to messages, and thus the encryption can be implemented by email clients without any collaboration of the providers. The dec… ▽ More

    Submitted 12 October, 2018; v1 submitted 19 July, 2017; originally announced July 2017.

    Comments: Appears in 2018 Workshop on Privacy in the Electronic Society (WPES'18)

  20. arXiv:1705.07663  [pdf, other

    cs.CR cs.LG

    LOGAN: Membership Inference Attacks Against Generative Models

    Authors: Jamie Hayes, Luca Melis, George Danezis, Emiliano De Cristofaro

    Abstract: Generative models estimate the underlying distribution of a dataset to generate realistic samples according to that distribution. In this paper, we present the first membership inference attacks against generative models: given a data point, the adversary determines whether or not it was used to train the model. Our attacks leverage Generative Adversarial Networks (GANs), which combine a discrimin… ▽ More

    Submitted 21 August, 2018; v1 submitted 22 May, 2017; originally announced May 2017.

    Journal ref: Proceedings on Privacy Enhancing Technologies (PoPETs), Vol. 2019, Issue 1

  21. Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments

    Authors: Carmela Troncoso, Marios Isaakidis, George Danezis, Harry Halpin

    Abstract: Decentralized systems are a subset of distributed systems where multiple authorities control different components and no authority is fully trusted by all. This implies that any component in a decentralized system is potentially adversarial. We revise fifteen years of research on decentralization and privacy, and provide an overview of key systems, as well as key insights for designers of future s… ▽ More

    Submitted 28 June, 2017; v1 submitted 26 April, 2017; originally announced April 2017.

    Journal ref: Proceedings on Privacy Enhancing Technologies (2017) 404-426

  22. arXiv:1703.00536  [pdf, other

    cs.CR

    The Loopix Anonymity System

    Authors: Ania Piotrowska, Jamie Hayes, Tariq Elahi, Sebastian Meiser, George Danezis

    Abstract: We present Loopix, a low-latency anonymous communication system that provides bi-directional 'third-party' sender and receiver anonymity and unobservability. Loopix leverages cover traffic and brief message delays to provide anonymity and achieve traffic analysis resistance, including against a global network adversary. Mixes and clients self-monitor the network via loops of traffic to provide pro… ▽ More

    Submitted 1 March, 2017; originally announced March 2017.

  23. arXiv:1703.00371  [pdf, other

    stat.ML cs.CR cs.MM

    Generating Steganographic Images via Adversarial Training

    Authors: Jamie Hayes, George Danezis

    Abstract: Adversarial training was recently shown to be competitive against supervised learning methods on computer vision tasks, however, studies have mainly been confined to generative tasks such as image synthesis. In this paper, we apply adversarial training techniques to the discriminative task of learning a steganographic algorithm. Steganography is a collection of techniques for concealing informatio… ▽ More

    Submitted 24 July, 2017; v1 submitted 1 March, 2017; originally announced March 2017.

    Comments: 9 pages

  24. arXiv:1611.02968  [pdf, other

    cs.CR

    A Public Comment on NCCoE's White Paper on Privacy-Enhancing Identity Brokers

    Authors: Luís T. A. N. Brandão, Nicolas Christin, George Danezis

    Abstract: The National Cybersecurity Center of Excellence (NCCoE) (in the United States) has published on October 19, 2015, a white paper on "privacy-enhanced identity brokers." We present here a reply to their request for public comments. We enumerate concerns whose consideration we find paramount for the design of a privacy-enhancing identity brokering solution, for identification and authentication of ci… ▽ More

    Submitted 9 November, 2016; originally announced November 2016.

    Comments: 18 pages

  25. arXiv:1604.00223  [pdf, other

    cs.IR cs.CR

    Lower-Cost epsilon-Private Information Retrieval

    Authors: Raphael R. Toledo, George Danezis, Ian Goldberg

    Abstract: Private Information Retrieval (PIR), despite being well studied, is computationally costly and arduous to scale. We explore lower-cost relaxations of information-theoretic PIR, based on dummy queries, sparse vectors, and compositions with an anonymity system. We prove the security of each scheme using a flexible differentially private definition for private queries that can capture notions of impe… ▽ More

    Submitted 1 April, 2016; originally announced April 2016.

  26. arXiv:1509.00789  [pdf, other

    cs.CR

    k-fingerprinting: a Robust Scalable Website Fingerprinting Technique

    Authors: Jamie Hayes, George Danezis

    Abstract: Website fingerprinting enables an attacker to infer which web page a client is browsing through encrypted or anonymized network connections. We present a new website fingerprinting technique based on random decision forests and evaluate performance over standard web pages as well as Tor hidden services, on a larger scale than previous works. Our technique, k-fingerprinting, performs better than cu… ▽ More

    Submitted 18 February, 2016; v1 submitted 2 September, 2015; originally announced September 2015.

    Comments: 17 pages

  27. arXiv:1508.06110  [pdf, other

    cs.CR

    Efficient Private Statistics with Succinct Sketches

    Authors: Luca Melis, George Danezis, Emiliano De Cristofaro

    Abstract: Large-scale collection of contextual information is often essential in order to gather statistics, train machine learning models, and extract knowledge from data. The ability to do so in a {\em privacy-preserving} way -- i.e., without collecting fine-grained user data -- enables a number of additional computational scenarios that would be hard, or outright impossible, to realize without strong pri… ▽ More

    Submitted 6 January, 2016; v1 submitted 25 August, 2015; originally announced August 2015.

    Comments: To appear in NDSS 2016

  28. arXiv:1507.05724  [pdf, ps, other

    cs.CR

    HORNET: High-speed Onion Routing at the Network Layer

    Authors: Chen Chen, Daniele Enrico Asoni, David Barrera, George Danezis, Adrian Perrig

    Abstract: We present HORNET, a system that enables high-speed end-to-end anonymous channels by leveraging next generation network architectures. HORNET is designed as a low-latency onion routing system that operates at the network layer thus enabling a wide range of applications. Our system uses only symmetric cryptography for data forwarding yet requires no per-flow state on intermediate nodes. This design… ▽ More

    Submitted 8 February, 2016; v1 submitted 21 July, 2015; originally announced July 2015.

    Comments: 14 pages, 5 figures

  29. arXiv:1505.06895  [pdf, other

    cs.CR

    Centrally Banked Cryptocurrencies

    Authors: George Danezis, Sarah Meiklejohn

    Abstract: Current cryptocurrencies, starting with Bitcoin, build a decentralized blockchain-based transaction ledger, maintained through proofs-of-work that also generate a monetary supply. Such decentralization has benefits, such as independence from national political control, but also significant limitations in terms of scalability and computational cost. We introduce RSCoin, a cryptocurrency framework i… ▽ More

    Submitted 18 December, 2015; v1 submitted 26 May, 2015; originally announced May 2015.

    Comments: 15 pages, 4 figures, 2 tables in Proceedings of NDSS 2016

  30. arXiv:1502.07661  [pdf, other

    cs.CR cs.CC

    Detecting Malware with Information Complexity

    Authors: Nadia Alshahwan, Earl T. Barr, David Clark, George Danezis

    Abstract: This work focuses on a specific front of the malware detection arms-race, namely the detection of persistent, disk-resident malware. We exploit normalised compression distance (NCD), an information theoretic measure, applied directly to binaries. Given a zoo of labelled malware and benign-ware, we ask whether a suspect program is more similar to our malware or to our benign-ware. Our approach clas… ▽ More

    Submitted 26 February, 2015; originally announced February 2015.

  31. Privacy and Data Protection by Design - from policy to engineering

    Authors: George Danezis, Josep Domingo-Ferrer, Marit Hansen, Jaap-Henk Hoepman, Daniel Le Metayer, Rodica Tirtea, Stefan Schiffner

    Abstract: Privacy and data protection constitute core values of individuals and of democratic societies. There have been decades of debate on how those values -and legal obligations- can be embedded into systems, preferably from the very beginning of the design process. One important element in this endeavour are technical mechanisms, known as privacy-enhancing technologies (PETs). Their effectiveness has… ▽ More

    Submitted 10 April, 2015; v1 submitted 12 January, 2015; originally announced January 2015.

    Comments: 79 pages in European Union Agency for Network and Information Security (ENISA) report, December 2014, ISBN 978-92-9204-108-3

    MSC Class: 94A60 ACM Class: K.4.1; D.4.6; H.2.0

  32. arXiv:1408.1276  [pdf, other

    cs.CR cs.SI

    An Automated Social Graph De-anonymization Technique

    Authors: Kumar Sharad, George Danezis

    Abstract: We present a generic and automated approach to re-identifying nodes in anonymized social networks which enables novel anonymization techniques to be quickly evaluated. It uses machine learning (decision forests) to matching pairs of nodes in disparate anonymized sub-graphs. The technique uncovers artefacts and invariants of any black-box anonymization scheme from a small set of examples. Despite a… ▽ More

    Submitted 7 August, 2014; v1 submitted 6 August, 2014; originally announced August 2014.

    Comments: 12 pages