Category Archives: Publications

New publication about Blockchain Mining Games

Blockchain Mining Games Aggelos Kiayias, Elias Koutsoupias, Maria Kyropoulou, and Yiannis Tselekounis Abstract: We study the strategic considerations of miners participating in the bitcoin’s protocol. We formulate and study the stochastic game that underlies these strategic considerations. The miners collectively build a tree of blocks, and they are paid when they create a node (mine a

Read More

New publication about privacy-preserving interactive proofs

Foteini Baldimtsi, Aggelos Kiayias,  Thomas Zacharias and Bingsheng Zhang: “Indistinguishable Proofs of Work or Knowledge“. Indistinguishable Proofs of Work or Knowledge (PoWorKs) constitute a novel class of interactive protocols where a prover can convince a verifier that she has either performed work or that she possesses knowledge of a witness to a public statement without the verifier

Read More

New publication from PANORAMIX members to appear in ASIACRYPT 2016

The PANORAMIX members Aggelos Kiayias and Thomas Zacharias in joint work with Foteini Baldimtsi and Bingsheng Zhang will present their work “Indistinguishable Proofs of Work or Knowledge”  (PoWorKs) at the ASIACRYPT conference that will be held in December 4-8 2016, Hanoi, Vietnam. PoWorKs constitute a novel class of interactive protocols where a prover can convince a

Read More

New paper about Password-Protected Secret Sharing

Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online) Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu,  Abstract: PPSS is a central primitive introduced by Bagherzandi et al [BJSL10] which allows a user to store a secret among n servers such that the user can later reconstruct the secret with the sole possession

Read More

New publication about lower cost PIR

  Lower-Cost epsilon-Private Information Retrieval. Raphael R. Toledo, George Danezis, Ian Goldberg Abstract: Private Information Retrieval (PIR), despite being well studied, is computationally costly and arduous to scale. We explore lower-cost relaxations of information-theoretic PIR, based on dummy queries, sparse vectors, and compositions with an anonymity system. We prove the security of each scheme using a

Read More

Panoramix Research Publications

ANONYMOUS MESSAGING:  HORNET: High-speed Onion Routing at the Network Layer. Chen Chen, Daniele Enrico Asoni, David Barrera, George Danezis, Adrian Perrig Abstract: We present HORNET, a system that enables high-speed end-to-end anonymous channels by leveraging next generation network architectures. HORNET is designed as a low-latency onion routing system that operates at the network layer thus enabling

Read More