Buch, Englisch, Band 14745, 391 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 616 g
28th International Conference, FC 2024, Willemstad, Curaçao, March 4-8, 2024, Revised Selected Papers, Part II
Buch, Englisch, Band 14745, 391 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 616 g
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-031-78678-5
Verlag: Springer Nature Switzerland
The two-volume set LNCS 14744 + 14745 constitutes the proceedings of the 28th International Conference on Financial Cryptography and Data Security, FC 2024, which took place in Willemstad, Curaçao, during March 4–8, 2024.
The number of 36 full and 6 short papers included in the proceedings were carefully reviewed and selected from 199 submissions. They were organized in topical sections as follows:
Part I: Consensus; AMMs; fees and rewards; hardware attacks;
Part II: Feeling Optimistic; randomness and time; signatures; applied cryptography; PETS; designing for the real world.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Angewandte Informatik
- Mathematik | Informatik EDV | Informatik Betriebssysteme
- Interdisziplinäres Wissenschaften Wissenschaften: Forschung und Information Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Technische Informatik Netzwerk-Hardware
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerksicherheit
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
Weitere Infos & Material
Feeling Optimistic.- Light Clients for Lazy Blockchains.- Short paper: Naysayer proofs.- Randomness and Time.- GoAT: File Geolocation via Anchor Timestamping.- Improved YOSO Randomness Generation with Worst-Case Corruptions.- Short Paper: Breaking X-VRF, a Post-Quantum Verifiable Random Function.- Truncator: Time-space Tradeoff of Cryptographic Primitives.- Signatures.- Foundations of Anonymous Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions.- Proactive Refresh for Accountable Threshold Signatures.- SoK: Signatures With Randomizable Keys.- Subset-optimized BLS Multi-signature with Key Aggregation.- Applied Cryptography.- SAVER: SNARK-compatible Verifiable Encryption.- Owl: An Augmented Password-Authenticated Key Exchange Scheme.- PETS.- Anonymous Reputation Systems with Revocation, Revisited.- Towards Practical Doubly-Efficient Private Information Retrieval.- Short Paper: Onion Messages on Leash.- A Transaction-Level Model for Blockchain Privacy.- Designing for the Real World.- The Governance of Distributed Autonomous Organizations: A Study of Contributors' Influence, Networks, and Shifts in Voting Power.- Privacy-preserving Anti-Money Laundering using Secure Multi-Party Computation.- Scan, Shuffle, Rescan: Two-Prover Election Audits With Untrusted Scanners.- DeFi composability as MEV non-interference.