extra.bib (13003B)
1 @ARTICLE{blockchaintrilemma, 2 author={Nakai, Taishi and Sakurai, Akira and Hironaka, Shiori and Shudo, Kazuyuki}, 3 journal={IEEE Access}, 4 title={A Formulation of the Trilemma in Proof of Work Blockchain}, 5 year={2024}, 6 volume={12}, 7 pages={80559-80578}, 8 doi={10.1109/ACCESS.2024.3410025} 9 } 10 11 12 @techreport{project-hamilton-boston-fed, 13 author = {{Jim Cunha, Robert Bench, James Lovejoy, Cory Fields, Madars Virza, Tyler Frederick, David Urness, Kevin Karwaski, Anders Brownworth, Neha Narula}}, 14 institution = {Federal Reserve Bank of Boston and Massachusetts Institute of Technology Digital Currency Initiative}, 15 title = {Project Hamilton Phase 1 A High Performance Payment Processing System Designed for Central Bank Digital Currencies}, 16 month = {Feb}, 17 year = {2022}, 18 note = {Available at \url{https://www.bostonfed.org/-/media/Documents/Project-Hamilton/Project-Hamilton-Phase-1-Whitepaper.pdf} [05.05.2022]} 19 } 20 21 @techreport{riskbank-e-krona-phase-2, 22 author = {Sveriges Riskbank}, 23 institution = {Sveriges Riskbank}, 24 title = {e-krona pilot Phase 2}, 25 note = {Available at \url{https://www.riksbank.se/globalassets/media/rapporter/e-krona/2022/e-krona-pilot-phase-2.pdf} [05.05.2022]}, 26 year = {2022}, 27 month = {Apr}, 28 } 29 30 @techreport{pboc-e-cny, 31 author = {People's Bank of China}, 32 institution = {People's Bank of China}, 33 month = {Jul}, 34 year = {2021}, 35 title = {Progress of Research \& Development of E-CNY in China}, 36 note = {Available at \url{http://www.pbc.gov.cn/en/3688110/3688172/4157443/4293696/2021071614584691871.pdf} [05.05.2022]}, 37 } 38 39 @misc{atlanticcouncil-e-cny, 40 author = {Kunar, Ananya}, 41 note = {Available at \url{https://www.atlanticcouncil.org/blogs/econographics/a-report-card-on-chinas-central-bank-digital-currency-the-e-cny/} [05.05.2022]}, 42 title = {A Report Card on China's Central Bank Digital Currency: the e-CNY}, 43 year = {2022}, 44 month = {Jan}, 45 } 46 47 @article{ruiz:hal-01334135, 48 TITLE = {{Reconstructable Software Appliances with Kameleon}}, 49 AUTHOR = {Ruiz, Cristian and Harrache, Salem and Mercier, Michael and Richard, Olivier}, 50 JOURNAL = {{Operating Systems Review}}, 51 PUBLISHER = {{Association for Computing Machinery}}, 52 VOLUME = {49}, 53 NUMBER = {1}, 54 PAGES = {80-89}, 55 YEAR = {2015}, 56 } 57 58 @misc{postgres-wiki-perf, 59 url={https://wiki.postgresql.org/wiki/Performance_Optimization}, 60 title={PostgreSQL Wiki}, 61 publisher={PostgreSQL}, 62 author={Postgres}, 63 note = {Avaliable at \url{https://wiki.postgresql.org/wiki/Performance_Optimization} [24.04.2022]}, 64 year={2020}, 65 month={Sep} 66 } 67 68 @incollection{grid5000, 69 title = {Adding Virtualization Capabilities to the {Grid'5000} Testbed}, 70 author = {Balouek, Daniel and Carpen Amarie, Alexandra and Charrier, Ghislain and Desprez, Fr{\'e}d{\'e}ric and Jeannot, Emmanuel and Jeanvoine, Emmanuel and L{\`e}bre, Adrien and Margery, David and Niclausse, Nicolas and Nussbaum, Lucas and Richard, Olivier and P{\'e}rez, Christian and Quesnel, Flavien and Rohr, Cyril and Sarzyniec, Luc}, 71 booktitle = {Cloud Computing and Services Science}, 72 publisher = {Springer International Publishing}, 73 pages = {3-20}, 74 volume = {367}, 75 year = {2013}, 76 } 77 78 79 @Misc{dirksen2018, 80 author = {Alexandra Dirksen}, 81 title = {A Blockchain Picture Book}, 82 howpublished = {\url{https://media.ccc.de/v/35c3-9573-a_blockchain_picture_book)}}, 83 month = {12}, 84 year = {2018}, 85 } 86 87 88 @incollection{crdt, 89 author = {Pregui{\c c}a, Nuno and Baquero, Carlos and Shapiro, Marc}, 90 title = {Conflict-Free Replicated Data Types ({CRDT}s)}, 91 booktitle = {Encyclopedia of Big Data Technologies}, 92 year = {2018}, 93 month = may, 94 publisher = {Springer}, 95 doi = {10.1007/978-3-319-63962-8_185-1}, 96 eprint = {1805.06358}, 97 keywords = {introduction} 98 } 99 100 101 @conference {rogaway2016, 102 author = {Phillip Rogaway}, 103 title = {The Moral Character of Cryptographic Work}, 104 year = {2016}, 105 address = {Austin, TX}, 106 publisher = {USENIX Association}, 107 month = aug 108 } 109 110 @article{stainton2023post, 111 title={Post Quantum Sphinx}, 112 author={Stainton, David Anthony}, 113 journal={Cryptology ePrint Archive}, 114 year={2023} 115 } 116 117 @inproceedings{danezis2009sphinx, 118 title={Sphinx: A compact and provably secure mix format}, 119 author={Danezis, George and Goldberg, Ian}, 120 booktitle={2009 30th IEEE Symposium on Security and Privacy}, 121 pages={269--282}, 122 year={2009}, 123 organization={IEEE} 124 } 125 126 @article{diaz2021nym, 127 title={The nym network}, 128 author={Diaz, Claudia and Halpin, Harry and Kiayias, Aggelos}, 129 year={2021} 130 } 131 132 @Techreport{ sdsi, 133 title = "SDSI - A Simple Distributed Security Infrastructure", 134 author = "Ronald L. Rivest,Butler Lampson", 135 year = "1996", 136 month = "April", 137 day = "30", 138 url = "http://research.microsoft.com/pubs/68726/acrobat.pdf", 139 } 140 141 @Article{suerf2023huang, 142 author = {Priscilla Huang and Emmanuel Benoist and Christian Grothoff and Sebastian Javier Marchano}, 143 title = {Practical Offline Payments Using One-Time Passcodes}, 144 journal = {SUERF Policy Briefs}, 145 year = {2023}, 146 number = {622}, 147 month = {June}, 148 } 149 150 @InProceedings{depolymerization, 151 author = {Antoine d’Aligny and Emmanuel Benoist and Christian Grothoff}, 152 title = {Project Depolymerization: Tokenization of Blockchains}, 153 booktitle = {4th Conference on Blockchain Research and Applications for Innovative Networks and Services}, 154 year = {2022}, 155 month = {September}, 156 } 157 158 @misc{schnorr:perfect-dl-signatures, 159 author = {Claus Peter Schnorr}, 160 title = {Enhancing the Security of Perfect Blind DL-Signatures.}, 161 howpublished = {Universität Frankfurt}, 162 year = {2004}, 163 note = {\url{https://www.math.uni-frankfurt.de/~dmst/teaching/SS2012/Vorlesung/EBS5.pdf}} 164 } 165 166 @inproceedings{Schnorr01securityof, 167 author = {Claus Peter Schnorr}, 168 title = {Security of Blind Discrete Log Signatures against Interactive Attacks}, 169 booktitle = {ICICS 2001, LNCS 2229}, 170 year = {2001}, 171 pages = {1--12}, 172 publisher = {Springer-Verlag} 173 } 174 @misc{cryptoeprint:2020:945, 175 author = {Fabrice Benhamouda and 176 Tancrède Lepoint and 177 Julian Loss and 178 Michele Orrù and 179 Mariana Raykova}, 180 title = {On the (in)security of ROS}, 181 howpublished = {Cryptology ePrint Archive, Report 2020/945}, 182 year = {2020}, 183 note = {\url{https://ia.cr/2020/945}} 184 } 185 186 @MastersThesis{thesis_demarmels_heuzeveldt, 187 author = {Demarmels, Gian and Hezeveldt, Lucien}, 188 title = {Adding Schnorr's Blind Signature in Taler}, 189 school = {Bern University of Applied Sciences}, 190 year = {2022}, 191 } 192 193 @inproceedings{agrawal2022practical, 194 title={Practical, round-optimal lattice-based blind signatures}, 195 author={Agrawal, Shweta and Kirshanova, Elena and Stehl{\'e}, Damien and Yadav, Anshu}, 196 booktitle={Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security}, 197 pages={39--53}, 198 year={2022} 199 } 200 201 @inproceedings{evans2009practical, 202 title={A Practical Congestion Attack on Tor Using Long Paths.}, 203 author={Evans, Nathan S and Dingledine, Roger and Grothoff, Christian}, 204 booktitle={USENIX Security Symposium}, 205 pages={33--50}, 206 year={2009} 207 } 208 @inproceedings{jansen2014sniper, 209 title={The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network.}, 210 author={Jansen, Rob and Tschorsch, Florian and Johnson, Aaron and Scheuermann, Bj{\"o}rn}, 211 booktitle={NDSS}, 212 year={2014} 213 } 214 @inproceedings{arp2015torben, 215 title={Torben: A practical side-channel attack for deanonymizing tor communication}, 216 author={Arp, Daniel and Yamaguchi, Fabian and Rieck, Konrad}, 217 booktitle={Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security}, 218 pages={597--602}, 219 year={2015} 220 } 221 @inproceedings{iacovazzi2019duster, 222 title={The $\{$DUSTER$\}$ attack: Tor onion service attribution based on flow watermarking with track hiding}, 223 author={Iacovazzi, Alfonso and Frassinelli, Daniel and Elovici, Yuval}, 224 booktitle={22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019)}, 225 pages={213--225}, 226 year={2019} 227 } 228 229 @article{ling2012new, 230 title={A new cell-counting-based attack against Tor}, 231 author={Ling, Zhen and Luo, Junzhou and Yu, Wei and Fu, Xinwen and Xuan, Dong and Jia, Weijia}, 232 journal={IEEE/ACM Transactions On Networking}, 233 volume={20}, 234 number={4}, 235 pages={1245--1261}, 236 year={2012}, 237 publisher={IEEE} 238 } 239 240 @InProceedings{acquisti2003, 241 author="Acquisti, Alessandro 242 and Dingledine, Roger 243 and Syverson, Paul", 244 editor="Wright, Rebecca N.", 245 title="On the Economics of Anonymity", 246 booktitle="Financial Cryptography", 247 year="2003", 248 publisher="Springer Berlin Heidelberg", 249 address="Berlin, Heidelberg", 250 pages="84--102", 251 abstract="Decentralized anonymity infrastructures are still not in wide use today. While there are technical barriers to a secure robust design, our lack of understanding of the incentives to participate in such systems remains a major roadblock. Here we explore some reasons why anonymity systems are particularly hard to deploy, enumerate the incentives to participate either as senders or also as nodes, and build a general model to describe the effects of these incentives. We then describe and justify some simplifying assumptions to make the model manageable, and compare optimal strategies for participants based on a variety of scenarios.", 252 isbn="978-3-540-45126-6" 253 } 254 255 256 @INPROCEEDINGS{sp2018anonymity, 257 author={Das, Debajyoti and Meiser, Sebastian and Mohammadi, Esfandiar and Kate, Aniket}, 258 booktitle={2018 IEEE Symposium on Security and Privacy (SP)}, 259 title={Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency - Choose Two}, 260 year={2018}, 261 pages={108-126}, 262 doi={10.1109/SP.2018.00011}} 263 264 @InProceedings{ pitchblack, 265 author = {Nathan S. Evans and Chris GauthierDickey and Christian Grothoff}, 266 title = {Routing in the Dark: Pitch Black}, 267 booktitle = {23rd Annual Computer Security Applications Conference (ACSAC 268 2007)}, 269 month = {December}, 270 location = {Miami Beach, Florida, USA}, 271 pages = {305--314}, 272 year = {2007}, 273 publisher = {IEEE Computer Society}, 274 } 275 276 @article{dijkstra1974selfstabilization, 277 author = {Dijkstra, Edsger W.}, 278 title = {Self-stabilizing systems in spite of distributed control}, 279 year = {1974}, 280 issue_date = {Nov. 1974}, 281 publisher = {Association for Computing Machinery}, 282 address = {New York, NY, USA}, 283 volume = {17}, 284 number = {11}, 285 issn = {0001-0782}, 286 url = {https://doi.org/10.1145/361179.361202}, 287 doi = {10.1145/361179.361202}, 288 abstract = {The synchronization task between loosely coupled cyclic sequential processes (as can be distinguished in, for instance, operating systems) can be viewed as keeping the relation “the system is in a legitimate state” invariant. As a result, each individual process step that could possibly cause violation of that relation has to be preceded by a test deciding whether the process in question is allowed to proceed or has to be delayed. The resulting design is readily—and quite systematically—implemented if the different processes can be granted mutually exclusive access to a common store in which “the current system state” is recorded.}, 289 journal = {Commun. ACM}, 290 month = {nov}, 291 pages = {643–644}, 292 numpages = {2}, 293 keywords = {synchronization, sharing, self-stabilization, self-repair, robustness, networks, mutual exclusion, multiprocessing, harmonious cooperation, error recovery, distributed control} 294 } 295 296 297 298 299 300 @Misc{pipenet, 301 author = {Wei Dai}, 302 title = {PipeNet 1.1}, 303 howpublished = {\url{http://www.weidai.com/pipenet.txt}}, 304 } 305 306 @InProceedings{gns2014wachs, 307 author = {Matthias Wachs and Martin Schanzenbach and Christian Grothoff}, 308 title = {A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System}, 309 booktitle = { 13th International Conference on Cryptology and Network Security (CANS 2014)}, 310 year = {2014}, 311 pages = {127--142}, 312 } 313 @article{eppstein, 314 author = {Eppstein, David and Goodrich, Michael T. and Uyeda, Frank and Varghese, George}, 315 title = {What's the Difference?: Efficient Set Reconciliation Without Prior Context}, 316 journal = {SIGCOMM Comput. Commun. Rev.}, 317 issue_date = {August 2011}, 318 volume = {41}, 319 number = {4}, 320 month = aug, 321 year = {2011}, 322 issn = {0146-4833}, 323 pages = {218--229}, 324 numpages = {12}, 325 acmid = {2018462}, 326 publisher = {ACM}, 327 address = {New York, NY, USA}, 328 keywords = {difference digest, invertible bloom filter, set difference}, 329 } 330 331 332 @misc{setu, 333 author = {Elias Summermatter and Christian Grothoff}, 334 title = {Byzantine Fault Tolerant Set Reconciliation}, 335 howpublished = {\url{https://datatracker.ietf.org/doc/html/draft-summermatter-set-union}}, 336 month = {1}, 337 year = {2021}, 338 }