Scaling blockchain via layered sharding

Z Hong, S Guo, P Li - IEEE Journal on Selected Areas in …, 2022 - ieeexplore.ieee.org
As a promising solution to blockchain scalability, sharding divides blockchain nodes into
small groups called shards, splitting the workload. Existing works for sharding, however, are …

Private web search with Tiptoe

A Henzinger, E Dauterman, H Corrigan-Gibbs… - Proceedings of the 29th …, 2023 - dl.acm.org
Tiptoe is a private web search engine that allows clients to search over hundreds of millions
of documents, while revealing no information about their search query to the search engine's …

SoK: A Systematic Review of TEE Usage for Developing Trusted Applications

A Paju, MO Javed, J Nurmi, J Savimäki… - Proceedings of the 18th …, 2023 - dl.acm.org
Trusted Execution Environments (TEEs) are a feature of modern central processing units
(CPUs) that aim to provide a high assurance, isolated environment in which to run …

Blockchain and NFTs for time-bound access and monetization of private data

M Madine, K Salah, R Jayaraman, A Battah… - IEEE …, 2022 - ieeexplore.ieee.org
Digital data has enabled organizations to anticipate future threats, opportunities, and trends.
However, digital data owners do not know how their data is accessed, shared, and …

A Survey on Content Retrieval on the Decentralised Web

N Keizer, O Ascigil, M Król, D Kutscher… - ACM Computing …, 2024 - dl.acm.org
The control, governance, and management of the web have become increasingly
centralised, resulting in security, privacy, and censorship concerns. Decentralised initiatives …

Scaling blockchain consensus via a robust shared mempool

F Gai, J Niu, I Beschastnikh, C Feng… - 2023 IEEE 39th …, 2023 - ieeexplore.ieee.org
Leader-based Byzantine fault-tolerant (BFT) consensus protocols used by permissioned
blockchains have limited scalability and robustness. To alleviate the leader bottleneck in …

Confidential Consortium Framework: Secure multiparty applications with confidentiality, integrity, and high availability

H Howard, F Alder, E Ashton, A Chamayou… - arXiv preprint arXiv …, 2023 - arxiv.org
Confidentiality, integrity protection, and high availability, abbreviated to CIA, are essential
properties for trustworthy data systems. The rise of cloud computing and the growing …

Addax: A fast, private, and accountable ad exchange infrastructure

K Zhong, Y Ma, Y Mao, S Angel - 20th USENIX Symposium on …, 2023 - usenix.org
This paper proposes Addax, a fast, verifiable, and private online ad exchange. When a user
visits an ad-supported site, Addax runs an auction similar to those of leading exchanges; …

Toward Aggregated Payment Channel Networks

X Zhang, C Qian - IEEE/ACM Transactions on Networking, 2024 - ieeexplore.ieee.org
Payment channel networks (PCNs) have been designed and utilized to address the
scalability challenge and throughput limitation of blockchains. It provides a high-throughput …

No Forking Way: Detecting Cloning Attacks on Intel SGX Applications

S Briongos, G Karame, C Soriente… - Proceedings of the 39th …, 2023 - dl.acm.org
Forking attacks against TEEs like Intel SGX can be carried out either by rolling back the
application to a previous state, or by cloning the application and by partitioning its inputs …