817 research outputs found

    How to attribute credit if you must

    Get PDF
    Data ownership is of fundamental importance in the digital economy of today. Commercializing academic research, whilst maintaining ownership of it, is a task that can now be accomplished due to the strengths of blockchain technology, which allows data to be registered, made unique, and traced to its origins. We propose a blockchain use-case for licencing academic research, based off an academic project named UniCoin. In this thesis, we discuss how to fairly attribute credit between all sources of knowledge that contribute to new pieces of academic research, using citation network analysis and centrality measures. Katz centrality, in-degree centrality, and PageRank are three potentially useful centrality measures, with varying results: these are compared using case studies based on three papers co-authored by Andrei Shleifer. We use these centrality measures to guide how to fairly attribute credit, and thus how to distribute licencing revenues generated through UniCoin

    Möbius: Trustless Tumbling for Transaction Privacy

    Get PDF
    Cryptocurrencies allow users to securely transfer money without relying on a trusted intermediary, and the transparency of their underlying ledgers also enables public verifiability. This openness, however, comes at a cost to privacy, as even though the pseudonyms users go by are not linked to their real-world identities, all movement of money among these pseudonyms is traceable. In this paper, we present Möbius, an Ethereum-based tumbler or mixing service. Möbius achieves strong notions of anonymity, as even malicious senders cannot identify which pseudonyms belong to the recipients to whom they sent money, and is able to resist denial-of-service attacks. It also achieves a much lower off-chain communication complexity than all existing tumblers, with senders and recipients needing to send only two initial messages in order to engage in an arbitrary number of transactions

    Transparency overlays and applications

    Get PDF
    In this paper, we initiate a formal study of transparency, which in recent years has become an increasingly critical requirement for the systems in which people place trust. We present the abstract concept of a transparency overlay, which can be used in conjunction with any system to give it provable transparency guarantees, and then apply the overlay to two settings: Certificate Transparency and Bitcoin. In the latter setting, we show that the usage of our transparency overlay eliminates the need to engage in mining and allows users to store a single small value rather than the entire blockchain. Our transparency overlay is generically constructed from a signature scheme and a new primitive we call a dynamic list commitment, which in practice can be instantiated using a collision-resistant hash function

    Exchange bias with Fe substitution in LaMnO_3

    Full text link
    The exchange bias (EB) in LaMn_{0.7}Fe_{0.3}O_3 is observed by the negative shift and training effect of the hysteresis loops, while the sample was cooled in external magnetic field. The analysis of cooling field dependence of EB gives the size of the ferromagnetic (FM) cluster ~ 25 Angstrom, where the magnetic anisotropy of FM cluster is found two order of magnitude higher than the FM bulk manganites. We propose that the nanoscale FM clusters are embedded in the glassy magnetic host with EB at the FM/glassy magnetic interface.Comment: 6 figure

    Distributed Execution Indexing

    Full text link
    This work-in-progress report presents both the design and partial evaluation of distributed execution indexing, a technique for microservice applications that precisely identifies dynamic instances of inter-service remote procedure calls (RPCs). Such an indexing scheme is critical for request-level fault injection techniques, which aim to automatically find failure-handling bugs in microservice applications.Distributed execution indexes enable granular specification of request-level faults, while also establishing a correspondence between inter-service RPCs across multiple executions, as is required to perform a systematic search of the fault space.In this paper, we formally define the general concept of a distributed execution index, which can be parameterized on different ways of identifying an RPC in a single service. We identify an instantiation that maintains precision in the presence of a variety of program structure complexities such as loops, function indirection, and concurrency with scheduling nondeterminism. We demonstrate that this particular instantiation addresses gaps in the state-of-the-art in request-level fault injection and show that they are all special cases of distributed execution indexing. We discuss the implementation challenges and provide an implementation of distributed execution indexing as an extension of \Filibuster{}, a resilience testing tool for microservice applications for the Java programming language, which supports fault injection for gRPC and HTTP

    Top Ten Obstacles along Distributed Ledgers' Path to Adoption

    Get PDF
    This article presents the top ten obstacles towards the adoption of distributed ledgers, ranging from identifying the right ledger to use for the right use case to developing scalable consensus protocols that provide some meaningful notion of public verifiability

    Natural Selection and Morphological Variability: The Case of Europe From Neolithic to Modern Times [Comment]

    Get PDF
    https://www.journals.uchicago.edu/doi/abs/10.1086/20200

    Pisa: Arbitration outsourcing for state channels

    Get PDF
    State channels are a leading approach for improving the scalability of blockchains and cryptocurrencies. They allow a group of distrustful parties to optimistically execute an application-defined program amongst themselves, while the blockchain serves as a backstop in case of a dispute or abort. This effectively bypasses the congestion, fees and performance constraints of the underlying blockchain in the typical case. However, state channels introduce a new and undesirable assumption that a party must remain online and synchronised with the blockchain at all times to defend against execution fork attacks. An execution fork can revert a state channel's history, potentially causing financial damage to a party that is innocent except for having crashed. To provide security even to parties that may go offline for an extended period of time, we present Pisa, the first protocol to propose an accountable third party who can be hired by parties to cancel execution forks on their behalf. To evaluate Pisa, we provide a proof-of-concept implementation for a simplified Sprites and we demonstrate that it is cost-efficient to deploy on the Ethereum network

    A Fistful of Bitcoins: Characterizing Payments among Men with No Names

    Get PDF
    Bitcoin is a purely online virtual currency, unbacked by either physical commodities or sovereign obligation; instead, it relies on a combination of cryptographic protection and a peer-to-peer protocol for witnessing settlements. Consequently, Bitcoin has the unintuitive property that while the ownership of money is implicitly anonymous, its flow is globally visible. In this paper we explore this unique characteristic further, using heuristic clustering to group Bitcoin wallets based on evidence of shared authority, and then using re-identification attacks (i.e., empirical purchasing of goods and services) to classify the operators of those clusters. From this analysis, we consider the challenges for those seeking to use Bitcoin for criminal or fraudulent purposes at scale
    • …
    corecore