Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Anonymous Sidechains

    Sidechains allow two or more blockchains to communicate with each other by transferring coins (or other ledger assets) from one to the other. Their functionalities set sidechains as one of the most prominent s...

    Foteini Baldimtsi, Ian Miers, **nyuan Zhang in Data Privacy Management, Cryptocurrencies … (2022)

  2. No Access

    Chapter and Conference Paper

    Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End Encryption

    Content moderation is crucial for stop** abusive and harassing messages in online platforms. Existing moderation mechanisms, such as message franking, require platform providers to be able to associate user ...

    Nirvan Tyagi, Paul Grubbs, Julia Len, Ian Miers in Advances in Cryptology – CRYPTO 2019 (2019)

  3. No Access

    Chapter and Conference Paper

    ZLiTE: Lightweight Clients for Shielded Zcash Transactions Using Trusted Execution

    Cryptocurrencies record transactions between parties in a blockchain maintained by a peer-to-peer network. In most cryptocurrencies, transactions explicitly identify the previous transaction providing the fund...

    Karl Wüst, Sinisa Matetic, Moritz Schneider in Financial Cryptography and Data Security (2019)

  4. Chapter and Conference Paper

    Updatable and Universal Common Reference Strings with Applications to zk-SNARKs

    By design, existing (pre-processing) zk-SNARKs embed a secret trapdoor in a relation-dependent common reference strings (CRS). The trapdoor is exploited by a (hypothetical) simulator to prove the scheme is zer...

    Jens Groth, Markulf Kohlweiss, Mary Maller in Advances in Cryptology – CRYPTO 2018 (2018)

  5. No Access

    Chapter and Conference Paper

    Proof of Censorship: Enabling Centralized Censorship-Resistant Content Providers

    Content providers often face legal or economic pressures to censor or remove objectionable or infringing content they host. While decentralized providers can enable censorship-resistant storage, centralized co...

    Ian Martiny, Ian Miers, Eric Wustrow in Financial Cryptography and Data Security (2018)

  6. Chapter and Conference Paper

    Decentralized Anonymous Micropayments

    Micropayments (payments worth a few pennies) have numerous potential applications. A challenge in achieving them is that payment networks charge fees that are high compared to “micro” sums of money.

    Alessandro Chiesa, Matthew Green, **gcheng Liu in Advances in Cryptology – EUROCRYPT 2017 (2017)

  7. No Access

    Chapter and Conference Paper

    Accountable Privacy for Decentralized Anonymous Payments

    Decentralized ledger-based currencies such as Bitcoin provide a means to construct payment systems without requiring a trusted bank. Removing this trust assumption comes at the significant cost of transaction ...

    Christina Garman, Matthew Green, Ian Miers in Financial Cryptography and Data Security (2017)

  8. No Access

    Chapter and Conference Paper

    Rational Zero: Economic Security for Zerocoin with Everlasting Anonymity

    Zerocoin proposed adding decentralized cryptographically anonymous e-cash to Bitcoin. Given the increasing popularity of Bitcoin and its reliance on a distributed pseudononymous public ledger, this anonymity i...

    Christina Garman, Matthew Green, Ian Miers in Financial Cryptography and Data Security (2014)

  9. No Access

    Article

    Charm: a framework for rapidly prototy** cryptosystems

    We describe Charm, an extensible framework for rapidly prototy** cryptographic systems. Charm provides a number of features that explicitly support the development of new protocols, including support for mod...

    Joseph A. Akinyele, Christina Garman, Ian Miers in Journal of Cryptographic Engineering (2013)