1,937 research outputs found

    Impact of Geo-distribution and Mining Pools on Blockchains: A Study of Ethereum

    Full text link
    Given the large adoption and economical impact of permissionless blockchains, the complexity of the underlying systems and the adversarial environment in which they operate, it is fundamental to properly study and understand the emergent behavior and properties of these systems. We describe our experience on a detailed, one-month study of the Ethereum network from several geographically dispersed observation points. We leverage multiple geographic vantage points to assess the key pillars of Ethereum, namely geographical dispersion, network efficiency, blockchain efficiency and security, and the impact of mining pools. Among other new findings, we identify previously undocumented forms of selfish behavior and show that the prevalence of powerful mining pools exacerbates the geographical impact on block propagation delays. Furthermore, we provide a set of open measurement and processing tools, as well as the data set of the collected measurements, in order to promote further research on understanding permissionless blockchains.Comment: To appear in 50th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 202

    Key Reduction of McEliece's Cryptosystem Using List Decoding

    Get PDF
    International audienceDifferent variants of the code-based McEliece cryptosystem were pro- posed to reduce the size of the public key. All these variants use very structured codes, which open the door to new attacks exploiting the underlying structure. In this paper, we show that the dyadic variant can be designed to resist all known attacks. In light of a new study on list decoding algorithms for binary Goppa codes, we explain how to increase the security level for given public keysizes. Using the state-of-the-art list decoding algorithm instead of unique decoding, we exhibit a keysize gain of about 4% for the standard McEliece cryptosystem and up to 21% for the adjusted dyadic variant

    Kalman filter applied to a digital computing process to find its latency

    Get PDF
    Instantaneous observability is a method used here to watch a system whose internal states vary very fast. It is a system property which allows us to estimate the system internal states. A discrete computing process which is time-varying can be represented by a mathematical model. This model has linear, discrete, stochastic and time-varying equations which contain matrices and vectors whose elements are deterministic functions of discrete time k. This computing process is performed during a period of time called latency. The process is performed in four steps in sequence, the system states: new process, ready-queue, CPU running, process end. The system propertyinstantaneous observabilitydepends on the pair of matrices {A(k), C(k)} and regards the possibility to estimate the system internal states when the system state equations are known. The problem is the system states are inside and they are not always accessible directly. In this paper we propose a method to determine: the instantaneous observability matrices at discrete time k, the system state estimation and the system latency when the system output measurements are known. We will show when instantaneous observability property comes true, the system instantaneous internal states and latency can be estimated. This is an advantage compared to usual observability method based on static scenarios. The potential application of the results is a prediction of data traffic-jam on a computer process. In a broader perspective, the instantaneous observability method can be applied on identification of pathology, weather forecast, navigation, tracking, stock market and many other areas411625CONSELHO NACIONAL DE DESENVOLVIMENTO CIENTÍFICO E TECNOLÓGICO - CNPQnão te

    Modelling the torque with artificial neural networks on a tunnel boring machine

    Get PDF
    The performance of earth pressure balanced tunnel boring machines (EPB-TBM) is dependent of a variety of parameters. Moreover, these parameters interact in a rather challenging way, making it difficult to adequately model their behaviour. Artificial neural networks have the aptitude to model complex problems and have been used in a variety of construction engineering problems. They can learn from existing data and then be used to predict the results, which makes them adequate for modelling problems where large amount of data is generated. In this work, a multilayer feedforward artificial neural network has been used to predict the torque at the cutter head of an EPB-TBM. A time series neural network has been used, where torque was predicted as a function of the measured torque and the volume of the injected foam on previous time steps. Results indicate that feedforward artificial neural network can be used to predict the torque at the cutter head in a EPB-TB

    Evolution of cooperation in multilayer networks

    Get PDF
    Dissertation presented as the partial requirement for obtaining a Master's degree in Information Management, specialization in Information Systems and Technologies ManagementIndividuals take part in multiple layers of networks of interactions simultaneously. These interdependent networks account for the different sort of social ties individuals maintain per layer. In each layer individuals participate in N-Player Public Goods Games where benefits collected increase with amounts invested. It is, however, tempting to be a free-rider, i.e., to take advantage of the common pool without contributing to it, a situation from which a social dilemma results. This thesis offers new insights on how cooperation dynamics is shaped by multiple layers of social interactions and diversity of contributions invested per game. To this end, we resort to Evolutionary Game Theory and Network Science to provide a convenient framework to address the most important prototypical social conflicts and/or dilemmas in large networked populations. In particular, we propose a novel mean-field approach capable of tracking the self-organization of Cooperators when co-evolving with Defectors in a multilayer environment. We show that the emerging collective dynamics, which depends (i) on the underlying layer networks of interactions and (ii) on the criteria to share a finite investment across all games, often does not bear any resemblance with the local processes supporting them. Our findings suggest that, whenever individual investments are distributed among games or layers, resilience of cooperation against free-riders increases with the number of layers, and that cooperation emerges from a non-trivial organization of cooperation across the layers. In opposition, under constant, non-distributed investments, the level of cooperation shows little sensibility to variations in the number of layers. These findings put in evidence the importance of asymmetric contributions across games and social contexts in the emergence of human cooperation

    A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM

    Get PDF
    Oblivious Transfer (OT) is a fundamental cryptographic protocol that finds a number of applications, in particular, as an essential building block for two-party and multi-party computation. We construct a round-optimal (2 rounds) universally composable (UC) protocol for oblivious transfer secure against active adaptive adversaries from any OW-CPA secure public-key encryption scheme with certain properties in the random oracle model (ROM). In terms of computation, our protocol only requires the generation of a public/secret-key pair, two encryption operations and one decryption operation, apart from a few calls to the random oracle. In~terms of communication, our protocol only requires the transfer of one public-key, two ciphertexts, and three binary strings of roughly the same size as the message. Next, we show how to instantiate our construction under the low noise LPN, McEliece, QC-MDPC, LWE, and CDH assumptions. Our instantiations based on the low noise LPN, McEliece, and QC-MDPC assumptions are the first UC-secure OT protocols based on coding assumptions to achieve: 1) adaptive security, 2) optimal round complexity, 3) low communication and computational complexities. Previous results in this setting only achieved static security and used costly cut-and-choose techniques.Our instantiation based on CDH achieves adaptive security at the small cost of communicating only two more group elements as compared to the gap-DH based Simplest OT protocol of Chou and Orlandi (Latincrypt 15), which only achieves static security in the ROM
    corecore