Program
Financial Cryptography and Data Security 2021
Twenty-Fifth International Conference
March 1–5, 2021
Radisson Grenada Beach Resort
Grenada
A detailed program is not yet available, but here is a provisional list of accepted papers:
A formal model of Algorand smart contracts. (Università degli Studi di Cagliari), , (Stirling University), (Technical University of Denmark), (Università degli Studi di Trento)
ACeD: Scalable Data Availability Oracle. (University of Illinois Urbana-Champaign), , (University of Washington Seattle), (University of Illinois Urbana-Champaign)
An Empirical Analysis of Privacy in the Lightning Network. , (University College London), (Nym Technologies), (University of Illinois Urbana-Champaign), (Talaia Labs), (University of Illinois at Urbana-Champaign), (University College London / IC3)
Another Look at Extraction and Randomization of Groth's zk-SNARK. (imec-COSIC, KU Leuven), (The University of Edinburgh and IOHK), (University of Tartu and The University of Edinburgh), (The University of Edinburgh)
Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit. , , , (Imperial College London)
BooLigero: Improved Sublinear Zero Knowledge Proofs for Boolean Circuits. (Cryptomnium LLC), , (Boston University)
Brick: Asynchronous Payment Channels. (ETH Zurich), (IST Austria), (ETH Zurich), (NKUA, IOHK)
Congestion Attacks in Payment Channel Networks. , (The Hebrew University of Jerusalem)
Cross-Layer Deanonymization Methods in the Lightning Protocol. (Austrian Institute of Technology), (Technische Universität Berlin), (IMDEA Software Institute), (Chainalysis), (Austrian Institute of Technology), (Technische Universität Wien)
DAHash: Distribution Aware Tuning of Password Hashing Costs. , (Purdue University)
Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Multiparty Computation. (The University of Tokyo / AIST), (NTT Secure Platform Laboratories), (University of Tsukuba), (The University of Tokyo / AIST)
Efficient State Management in Distributed Ledgers. (IOHK), , (University of Edinburgh & IOHK)
Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask). , , , , (Arizona State University)
FPPW: A Fair and Privacy Preserving Watchtower For Bitcoin. , , , (Monash University)
Fast Isomorphic State Channels. , , , , (IOHK), (University of Edinburgh & IOHK), (University of Connecticut & IOHK)
Faster Homomorphic Encryption over GPGPUs via hierarchical DGT. (University of Campinas), (Aarhus University), (University of Campinas)
Fine-Grained Forward Secrecy: Allow-List/Deny-List Encryption and Applications. (DFINITY), , , (AIT Austrian Institute of Technology)
Fraud and Data Availability Proofs: Detecting Invalid Blocks in Light Clients. , (University College London), (Ethereum Research), (LazyLedger)
Generic Plaintext Equality and Inequality Proofs. (Université de Limoges), (INSA Centre Val de Loire, LIFO lab), (LIMOS, University Clermont Auvergne), (DIENS, École normale supérieure, CNRS, PSL University)
Global Internet Censorship in the Time of COVID-19. , , (University of Michigan), (University of Konstanz), (University of Michigan)
HaPPY-mine: Designing a Mining Reward Function. , (Northeastern University)
High-Threshold AVSS with Optimal Communication Complexity. , (Boston University),
Ignore the Extra Zeroes: Variance-Optimal Mining Pools. (Chaincode Labs), (Columbia University)
Improving the Efficiency of AES Protocols In Multi-Party Computation. , (Robert Bosch LLC)
Instant Block Confirmation in the Sleepy Model. , , (Carnegie Mellon University)
Liquidations: DeFi on a Knife-edge. , (Imperial College London), (University College London), (Imperial College London)
Mining for Privacy: How to Bootstrap a Snarky Blockchain. , , (The University of Edinburgh & IOHK)
Multi-instance Publicly Verifiable Time-lock Puzzle and its Applications. (University of Edinburgh), (University of Edinburgh & IOHK)
PERIMETER: A network-layer attack on the anonymity of cryptocurrencies. , , (ETH Zurich)
Payment Trees: Low Collateral Payments for Payment Channel Networks. (Tokyo Institute of Technology), (Tokyo Institute of Technology, IOHK), (Tokyo Institute of Technology)
PoSAT: Proof-of-Work Dynamic Availability and Unpredictability, without the Work. , (University of Washington Seattle), (Stanford University)
Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments. (TU Wien), (IMDEA Software Institute), (TU Wien)
Practical Post-Quantum Few-Time Verifiable Random Function with Applications to Algorand. (Monash University and Data61, CSIRO), , , (Monash University), (Algorand), (Monash University), (UCSB)
Practical Witness-Key-Agreement for Blockchain-based Dark Pools Financial Trading. (University of Trento, Italy), (University of Trento, Vrije Universiteit Amsterdam), (University of Waterloo), (Durham Business School)
Rabbit: Efficient Comparison for Secure Multi-Party Computation. (imec-COSIC, KU Leuven), (Cape Privacy, imec-COSIC, KU Leuven), (imec-COSIC, KU Leuven), (UC Berkeley, Princeton University)
Reparo: Publicly Verifiable Layer to Repair Blockchains. (Friedrich Alexander Universität Erlangen-Nürnberg), (Purdue University), (Concordium Blockchain Research Center, Aarhus University), (Concordium), (Purdue University)
Shielded Computations in Smart Contracts Overcoming Forks. (University of Salerno), , (Sapenza University of Rome), (University of Salerno)
Short Paper: Debt representation in UTXO blockchains. (University of Toronto), (Mitsubishi Electric Research Laboratories (MERL))
Short Paper: Organizational Security: Implementing a Risk-Reduction-Based Incentivization Model for MFA Adoption. (University of Denver), , (Indiana University Bloomington)
Short Paper: Selfish Mining Attacks Exacerbated by Elastic Hash Supply. , , (NTT Research Inc), (Cornell University), (NTT Research Inc), (University of Houston)
Short Paper: Terrorist Fraud in Distance Bounding: Getting Around the Models. (University of Surrey)
Sigforgery: Breaking and Fixing Data Authenticity in Sigfox. (Orange)
SoK: Communication Across Distributed Ledgers. (Imperial College London and Interlay), (University College London), (University of Athens and IOHK), (IST Austria), (IMDEA Software Institute), (University of Edinburgh and IOHK), (Imperial College London)
SoK: Securing Email—A Stakeholder-Based Analysis. (Concordia University), (Carleton University), (University of Tennessee), , (Brigham Young University)
Somewhere Statistically Binding Commitment Schemes with Applications. (Simula UiB), (Simula UiB, Norway, University of Tartu), (Universitat Pompeu Fabra), (University of Edinburgh, University of Tartu)
Specfuscator: Evaluating Branch Removal as a Spectre Mitigation. , , (Graz University of Technology), (CISPA Helmholtz Center for Information Security)
Speculative Dereferencing of Registers: Reviving Foreshadow. , (Graz University of Technology), (CISPA Helmholtz Center for Information Security), (Graz University of Technology)
The Checkpointed Longest Chain: User-dependent Adaptivity and Finality. , (University of Illinois, Urbana-Champaign), (University of Washington Seattle), (University of Illinois at Urbana-Champaign)
The Complex Shape of Anonymity in Cryptocurrencies: Case Studies from a Systematic Approach. , , (Queensland University of Technology)
The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts. , (University of Luxembourg), (Imperial College London), (University of Luxembourg)
Timelocked Bribing. (ETH Zurich), (University of Alberta), (ETH Zurich)
Unbounded Simulation-Sound Subversion-Resistant Quasi-Adaptive NIZK Proofs and Applications to Modular zk-SNARKs. (University of Tartu), (AIT Austrian Institute of Technology)
Under the Hood of the Ethereum Gossip Protocol. , (Northeastern University), (University of Maryland), , (Northeastern University)
What's in Score for Website Users: A Data-driven Long-term Study on Risk-based Authentication Characteristics. (H-BRS University of Applied Sciences, Ruhr University Bochum), (Ruhr University Bochum), (H-BRS University of Applied Sciences)
Zero-Knowledge Proofs for Set Membership: Efficient, Succinct, Modular. (QEDIT), (Aarhus University), (IMDEA Software Institute), (Ethereum Foundation, cLabs), (IMDEA Software Institute, Universidad Politecnica de Madrid)
This conference is organized annually by the International Financial Cryptography Association.