1,937 research outputs found
Impact of Geo-distribution and Mining Pools on Blockchains: A Study of Ethereum
Given the large adoption and economical impact of permissionless blockchains,
the complexity of the underlying systems and the adversarial environment in
which they operate, it is fundamental to properly study and understand the
emergent behavior and properties of these systems. We describe our experience
on a detailed, one-month study of the Ethereum network from several
geographically dispersed observation points. We leverage multiple geographic
vantage points to assess the key pillars of Ethereum, namely geographical
dispersion, network efficiency, blockchain efficiency and security, and the
impact of mining pools. Among other new findings, we identify previously
undocumented forms of selfish behavior and show that the prevalence of powerful
mining pools exacerbates the geographical impact on block propagation delays.
Furthermore, we provide a set of open measurement and processing tools, as well
as the data set of the collected measurements, in order to promote further
research on understanding permissionless blockchains.Comment: To appear in 50th IEEE/IFIP International Conference on Dependable
Systems and Networks (DSN), 202
Key Reduction of McEliece's Cryptosystem Using List Decoding
International audienceDifferent variants of the code-based McEliece cryptosystem were pro- posed to reduce the size of the public key. All these variants use very structured codes, which open the door to new attacks exploiting the underlying structure. In this paper, we show that the dyadic variant can be designed to resist all known attacks. In light of a new study on list decoding algorithms for binary Goppa codes, we explain how to increase the security level for given public keysizes. Using the state-of-the-art list decoding algorithm instead of unique decoding, we exhibit a keysize gain of about 4% for the standard McEliece cryptosystem and up to 21% for the adjusted dyadic variant
Kalman filter applied to a digital computing process to find its latency
Instantaneous observability is a method used here to watch a system whose internal states vary very fast. It is a system property which allows us to estimate the system internal states. A discrete computing process which is time-varying can be represented by a mathematical model. This model has linear, discrete, stochastic and time-varying equations which contain matrices and vectors whose elements are deterministic functions of discrete time k. This computing process is performed during a period of time called latency. The process is performed in four steps in sequence, the system states: new process, ready-queue, CPU running, process end. The system propertyinstantaneous observabilitydepends on the pair of matrices {A(k), C(k)} and regards the possibility to estimate the system internal states when the system state equations are known. The problem is the system states are inside and they are not always accessible directly. In this paper we propose a method to determine: the instantaneous observability matrices at discrete time k, the system state estimation and the system latency when the system output measurements are known. We will show when instantaneous observability property comes true, the system instantaneous internal states and latency can be estimated. This is an advantage compared to usual observability method based on static scenarios. The potential application of the results is a prediction of data traffic-jam on a computer process. In a broader perspective, the instantaneous observability method can be applied on identification of pathology, weather forecast, navigation, tracking, stock market and many other areas411625CONSELHO NACIONAL DE DESENVOLVIMENTO CIENTÍFICO E TECNOLÓGICO - CNPQnão te
Modelling the torque with artificial neural networks on a tunnel boring machine
The performance of earth pressure balanced tunnel boring machines (EPB-TBM) is dependent of a variety of parameters. Moreover, these parameters interact in a rather challenging way, making it difficult to adequately model their behaviour. Artificial neural networks have the aptitude to model complex problems and have been used in a variety of construction engineering problems. They can learn from existing data and then be used to predict the results, which makes them adequate for modelling problems where large amount of data is generated. In this work, a multilayer feedforward artificial neural network has been used to predict the torque at the cutter head of an EPB-TBM. A time series neural network has been used, where torque was predicted as a function of the measured torque and the volume of the injected foam on previous time steps. Results indicate that feedforward artificial neural network can be used to predict the torque at the cutter head in a EPB-TB
Evolution of cooperation in multilayer networks
Dissertation presented as the partial requirement for obtaining a Master's degree in Information Management, specialization in Information Systems and Technologies ManagementIndividuals take part in multiple layers of networks of interactions simultaneously. These interdependent networks account for the different sort of social ties individuals maintain per layer. In each layer individuals participate in N-Player Public Goods Games where benefits collected increase with amounts invested. It is, however, tempting to be a free-rider, i.e., to take advantage of the common pool without contributing to it, a situation from which a social dilemma results. This thesis offers new insights on how cooperation dynamics is shaped by multiple layers of social interactions and diversity of contributions invested per game. To this end, we resort to Evolutionary Game Theory and Network Science to provide a convenient framework to address the most important prototypical social conflicts and/or dilemmas in large networked populations. In particular, we propose a novel mean-field approach capable of tracking the self-organization of Cooperators when co-evolving with Defectors in a multilayer environment. We show that the emerging collective dynamics, which depends (i) on the underlying layer networks of interactions and (ii) on the criteria to share a finite investment across all games, often does not bear any resemblance with the local processes supporting them. Our findings suggest that, whenever individual investments are distributed among games or layers, resilience of cooperation against free-riders increases with the number of layers, and that cooperation emerges from a non-trivial organization of cooperation across the layers. In opposition, under constant, non-distributed investments, the level of cooperation shows little sensibility to variations in the number of layers. These findings put in evidence the importance of asymmetric contributions across games and social contexts in the emergence of human cooperation
A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM
Oblivious Transfer (OT) is a fundamental cryptographic protocol that finds a
number of applications, in particular, as an essential building block for
two-party and multi-party computation. We construct a round-optimal (2 rounds)
universally composable (UC) protocol for oblivious transfer secure against
active adaptive adversaries from any OW-CPA secure public-key encryption scheme
with certain properties in the random oracle model (ROM). In terms of
computation, our protocol only requires the generation of a public/secret-key
pair, two encryption operations and one decryption operation, apart from a few
calls to the random oracle. In~terms of communication, our protocol only
requires the transfer of one public-key, two ciphertexts, and three binary
strings of roughly the same size as the message. Next, we show how to
instantiate our construction under the low noise LPN, McEliece, QC-MDPC, LWE,
and CDH assumptions. Our instantiations based on the low noise LPN, McEliece,
and QC-MDPC assumptions are the first UC-secure OT protocols based on coding
assumptions to achieve: 1) adaptive security, 2) optimal round complexity, 3)
low communication and computational complexities. Previous results in this
setting only achieved static security and used costly cut-and-choose
techniques.Our instantiation based on CDH achieves adaptive security at the
small cost of communicating only two more group elements as compared to the
gap-DH based Simplest OT protocol of Chou and Orlandi (Latincrypt 15), which
only achieves static security in the ROM
- …