[fc-announce] FC21 to be held virtually, provisional list of accepted papers

FC General Chairs fc21general at ifca.ai
Mon Jan 11 03:44:49 CET 2021


Unfortunately, due to the COVID-19 pandemic, we will not be able to
organize an in-person meeting for FC21.  Instead we will be hosting a
virtual event with authors presenting their papers by video that will
be made available online, as well as some additional live/interactive
content.  We are still working out the details and will provide
updates on the conference website (http://fc21.ifca.ai/).  A Call for
Participation will follow when more details are available.

We're disappointed not to hold the conference in Grenada as originally
planned, but are currently planning to go there for FC22 instead, and
to postpone the anniversary celebration until then.

This year there were a record number of submissions (227), and the
committee was able to put together a strong (and large) program of 55
papers.  A provisional list of accepted papers is attached below.

----------------------------------------------------------------------

A formal model of Algorand smart contracts. Massimo Bartoletti 
(Università degli Studi di Cagliari), Andrea Bracciali, Cristian Lepore 
(Stirling University), Alceste Scalas (Technical University of Denmark), 
Roberto Zunino (Università degli Studi di Trento)

ACeD: Scalable Data Availability Oracle. Peiyao Sheng (University of 
Illinois Urbana-Champaign), Bowen Xue, Sreeram Kannan (University of 
Washington Seattle), Pramod Viswanath (University of Illinois 
Urbana-Champaign)

An Empirical Analysis of Privacy in the Lightning Network. George 
Kappos, Haaroon Yousaf (University College London), Ania M. Piotrowska 
(Nym Technologies), Sanket Kanjalkar (University of Illinois 
Urbana-Champaign), Sergi Delgado-Segura (Talaia Labs), Andrew Miller 
(University of Illinois at Urbana-Champaign), Sarah Meiklejohn 
(University College London / IC3)

Another Look at Extraction and Randomization of Groth's zk-SNARK. Karim 
Baghery (imec-COSIC, KU Leuven), Markulf Kohlweiss (The University of 
Edinburgh and IOHK), Janno Siim (University of Tartu and The University 
of Edinburgh), Mikhail Volkhov (The University of Edinburgh)

Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit. Kaihua 
Qin, Liyi Zhou, Benjamin Livshits, Arthur Gervais (Imperial College 
London)

BooLigero: Improved Sublinear Zero Knowledge Proofs for Boolean 
Circuits. Yaron Gvili (Cryptomnium LLC), Sarah Scheffler, Mayank Varia 
(Boston University)

Brick: Asynchronous Payment Channels. Zeta Avarikioti (ETH Zurich), 
Eleftherios Kokoris-Kogias (IST Austria), Roger Wattenhofer (ETH 
Zurich), Dionysis Zindros (NKUA, IOHK)

Congestion Attacks in Payment Channel Networks. Ayelet Mizrahi, Aviv 
Zohar (The Hebrew University of Jerusalem)

Cross-Layer Deanonymization Methods in the Lightning Protocol. Matteo 
Romiti (Austrian Institute of Technology), Friedhelm Victor (Technische 
Universität Berlin), Pedro Moreno-Sanchez (IMDEA Software Institute), 
Peter Sebastian Nordholt (Chainalysis), Bernhard Haslhofer (Austrian 
Institute of Technology), Matteo Maffei (Technische Universität Wien)

DAHash: Distribution Aware Tuning of Password Hashing Costs. Wenjie Bai, 
Jeremiah Blocki (Purdue University)

Efficient Noise Generation to Achieve Differential Privacy with 
Applications to Secure Multiparty Computation. Reo Eriguchi (The 
University of Tokyo / AIST), Atsunori Ichikawa (NTT Secure Platform 
Laboratories), Noboru Kunihiro (University of Tsukuba), Koji Nuida (The 
University of Tokyo / AIST)

Efficient State Management in Distributed Ledgers. Nikos Karayannidis 
(IOHK), Dimitris Karakostas, Aggelos Kiayias (University of Edinburgh & 
IOHK)

Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid 
to Ask). Jaswant Pakki, Yan Shoshitaishvili, Ruoyu Wang, Tiffany Bao, 
Adam Doupe (Arizona State University)

FPPW: A Fair and Privacy Preserving Watchtower For Bitcoin. Arash 
Mirzaei, Amin Sakzad, Jiangshan Yu, Ron Steinfeld (Monash University)

Fast Isomorphic State Channels. Manuel Chakravarty, Sandro Coretti, 
Matthias Fitzi, Peter Gazi, Philipp Kant (IOHK), Aggelos Kiayias 
(University of Edinburgh & IOHK), Alexander Russell (University of 
Connecticut & IOHK)

Faster Homomorphic Encryption over GPGPUs via hierarchical DGT. Pedro G. 
M. R. Alves (University of Campinas), Diego F. Aranha (Aarhus 
University), Jheyne N. Ortiz (University of Campinas)

Fine-Grained Forward Secrecy: Allow-List/Deny-List Encryption and 
Applications. David Derler (DFINITY), Sebastian Ramacher, Daniel 
Slamanig, Christoph Striecks (AIT Austrian Institute of Technology)

Fraud and Data Availability Proofs: Detecting Invalid Blocks in Light 
Clients. Mustafa Al-Bassam, Alberto Sonnino (University College London), 
Vitalik Buterin (Ethereum Research), Ismail Khoffi (LazyLedger)

Generic Plaintext Equality and Inequality Proofs. Olivier Blazy 
(Université de Limoges), Xavier Bultel (INSA Centre Val de Loire, LIFO 
lab), Pascal Lafourcade (LIMOS, University Clermont Auvergne), Octavio 
Perez Kempner (DIENS, École normale supérieure, CNRS, PSL University)

Global Internet Censorship in the Time of COVID-19. Anjali Vyas, Ram 
Sundara Raman, Nick Ceccio (University of Michigan), Philipp Lutscher 
(University of Konstanz), Roya Ensafi (University of Michigan)

HaPPY-mine: Designing a Mining Reward Function. Lucianna Kiffer, 
Rajmohan Rajaraman (Northeastern University)

High-Threshold AVSS with Optimal Communication Complexity. Nicolas 
Alhaddad, Mayank Varia (Boston University), Haibin Zhang

Ignore the Extra Zeroes: Variance-Optimal Mining Pools. Clara Shikhelman 
(Chaincode Labs), Tim Roughgarden (Columbia University)

Improving the Efficiency of AES Protocols In Multi-Party Computation. 
Betül Durak, Jorge Merchan (Robert Bosch LLC)

Instant Block Confirmation in the Sleepy Model. Vipul Goyal, Hanjun Li, 
Justin Raizes (Carnegie Mellon University)

Liquidations: DeFi on a Knife-edge. Daniel Perez, Sam Maximilian Werner 
(Imperial College London), Jiahua Xu (University College London), 
Benjamin Livshits (Imperial College London)

Mining for Privacy: How to Bootstrap a Snarky Blockchain. Thomas Kerber, 
Aggelos Kiayias, Markulf Kohlweiss (The University of Edinburgh & IOHK)

Multi-instance Publicly Verifiable Time-lock Puzzle and its 
Applications. Aydin Abadi (University of Edinburgh), Aggelos Kiayias 
(University of Edinburgh & IOHK)

PERIMETER: A network-layer attack on the anonymity of cryptocurrencies. 
Maria Apostolaki, Cedric Maire, Vanbever Laurent (ETH Zurich)

Payment Trees: Low Collateral Payments for Payment Channel Networks. 
Maxim Jourenko (Tokyo Institute of Technology), Mario Larangeira (Tokyo 
Institute of Technology, IOHK), Keisuke Tanaka (Tokyo Institute of 
Technology)

PoSAT: Proof-of-Work Dynamic Availability and Unpredictability, without 
the Work. Soubhik Deb, Sreeram Kannan (University of Washington 
Seattle), David Tse (Stanford University)

Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain 
Payments. Erkan Tairi (TU Wien), Pedro Moreno-Sanchez (IMDEA Software 
Institute), Matteo Maffei (TU Wien)

Practical Post-Quantum Few-Time Verifiable Random Function with 
Applications to Algorand. Muhammed F. Esgin (Monash University and 
Data61, CSIRO), Veronika Kuchta, Amin Sakzad, Ron Steinfeld (Monash 
University), Zhenfei Zhang (Algorand), Shifeng Sun (Monash University), 
Shumo Chu (UCSB)

Practical Witness-Key-Agreement for Blockchain-based Dark Pools 
Financial Trading. Nam Ngo (University of Trento, Italy), Fabio Massacci 
(University of Trento, Vrije Universiteit Amsterdam), Florian Kerschbaum 
(University of Waterloo), Julian Williams (Durham Business School)

Rabbit: Efficient Comparison for Secure Multi-Party Computation. 
Eleftheria Makri (imec-COSIC, KU Leuven), Dragos Rotaru (Cape Privacy, 
imec-COSIC, KU Leuven), Frederik Vercauteren (imec-COSIC, KU Leuven), 
Sameer Wagh (UC Berkeley, Princeton University)

Reparo: Publicly Verifiable Layer to Repair Blockchains. Sri 
AravindaKrishnan Thyagarajan (Friedrich Alexander Universität 
Erlangen-Nürnberg), Adithya Bhat (Purdue University), Bernardo Magri 
(Concordium Blockchain Research Center, Aarhus University), Daniel 
Tschudi (Concordium), Aniket Kate (Purdue University)

Shielded Computations in Smart Contracts Overcoming Forks. Vincenzo 
Botta (University of Salerno), Daniele Friolo, Daniele Venturi (Sapenza 
University of Rome), Ivan Visconti (University of Salerno)

Short Paper: Debt representation in UTXO blockchains. Michael Chiu 
(University of Toronto), Uros Kalabic (Mitsubishi Electric Research 
Laboratories (MERL))

Short Paper: Organizational Security: Implementing a 
Risk-Reduction-Based Incentivization Model for MFA Adoption. Sanchari 
Das (University of Denver), Andrew Kim, L. Jean Camp (Indiana University 
Bloomington)

Short Paper: Selfish Mining Attacks Exacerbated by Elastic Hash Supply. 
Yoko Shibuya, Go Yamamoto, Fuhito Kojima (NTT Research Inc), Elaine Shi 
(Cornell University), Shin'ichiro Matsuo (NTT Research Inc), Aron Laszka 
(University of Houston)

Short Paper: Terrorist Fraud in Distance Bounding: Getting Around the 
Models. David Gerault (University of Surrey)

Sigforgery: Breaking and Fixing Data Authenticity in Sigfox. Loïc 
Ferreira (Orange)

SoK: Communication Across Distributed Ledgers. Alexei Zamyatin (Imperial 
College London and Interlay), Mustafa Al-Bassam (University College 
London), Dionysis Zindros (University of Athens and IOHK), Lefteris 
Kokoris-Kogias (IST Austria), Pedro Moreno-Sanchez (IMDEA Software 
Institute), Aggelos Kiayias (University of Edinburgh and IOHK), William 
J. Knottenbelt (Imperial College London)

SoK: Securing Email—A Stakeholder-Based Analysis. Jeremy Clark 
(Concordia University), P.C. van Oorschot (Carleton University), Scott 
Ruoti (University of Tennessee), Kent Seamons, Daniel Zappala (Brigham 
Young University)

Somewhere Statistically Binding Commitment Schemes with Applications. 
Prastudy Fauzi (Simula UiB), Helger Lipmaa (Simula UiB, Norway, 
University of Tartu), Zaira Pindado (Universitat Pompeu Fabra), Janno 
Siim (University of Edinburgh, University of Tartu)

Specfuscator: Evaluating Branch Removal as a Spectre Mitigation. Martin 
Schwarzl, Claudio Canella, Daniel Gruss (Graz University of Technology), 
Michael Schwarz (CISPA Helmholtz Center for Information Security)

Speculative Dereferencing of Registers: Reviving Foreshadow. Martin 
Schwarzl, Thomas Schuster (Graz University of Technology), Michael 
Schwarz (CISPA Helmholtz Center for Information Security), Daniel Gruss 
(Graz University of Technology)

The Checkpointed Longest Chain: User-dependent Adaptivity and Finality. 
Suryanarayana Sankagiri, Xuechao Wang (University of Illinois, 
Urbana-Champaign), Sreeram Kannan (University of Washington Seattle), 
Pramod Viswanath (University of Illinois at Urbana-Champaign)

The Complex Shape of Anonymity in Cryptocurrencies: Case Studies from a 
Systematic Approach. Niluka Amarasinghe, Xavier Boyen, Matthew McKague 
(Queensland University of Technology)

The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart 
Contracts. Christof Ferreira Torres, Antonio Ken Iannillo (University of 
Luxembourg), Arthur Gervais (Imperial College London), Radu State 
(University of Luxembourg)

Timelocked Bribing. Tejaswi Nadahalli (ETH Zurich), Majid Khabbazian 
(University of Alberta), Roger Wattenhofer (ETH Zurich)

Unbounded Simulation-Sound Subversion-Resistant Quasi-Adaptive NIZK 
Proofs and Applications to Modular zk-SNARKs. Behzad Abdolmaleki 
(University of Tartu), Daniel Slamanig (AIT Austrian Institute of 
Technology)

Under the Hood of the Ethereum Gossip Protocol. Lucianna Kiffer, Asad 
Salman (Northeastern University), Dave Levin (University of Maryland), 
Alan Mislove, Cristina Nita-Rotaru (Northeastern University)

What's in Score for Website Users: A Data-driven Long-term Study on 
Risk-based Authentication Characteristics. Stephan Wiefling (H-BRS 
University of Applied Sciences, Ruhr University Bochum), Markus Dürmuth 
(Ruhr University Bochum), Luigi Lo Iacono (H-BRS University of Applied 
Sciences)

Zero-Knowledge Proofs for Set Membership: Efficient, Succinct, Modular. 
Daniel Benarroch (QEDIT), Matteo Campanelli (Aarhus University), Dario 
Fiore (IMDEA Software Institute), Kobi Gurkan (Ethereum Foundation, 
cLabs), Dimitris Kolonelos (IMDEA Software Institute, Universidad 
Politecnica de Madrid)


More information about the fc-announce mailing list