Scaling blockchain via layered sharding
As a promising solution to blockchain scalability, sharding divides blockchain nodes into
small groups called shards, splitting the workload. Existing works for sharding, however, are …
small groups called shards, splitting the workload. Existing works for sharding, however, are …
Private web search with Tiptoe
Tiptoe is a private web search engine that allows clients to search over hundreds of millions
of documents, while revealing no information about their search query to the search engine's …
of documents, while revealing no information about their search query to the search engine's …
SoK: A Systematic Review of TEE Usage for Developing Trusted Applications
A Paju, MO Javed, J Nurmi, J Savimäki… - Proceedings of the 18th …, 2023 - dl.acm.org
Trusted Execution Environments (TEEs) are a feature of modern central processing units
(CPUs) that aim to provide a high assurance, isolated environment in which to run …
(CPUs) that aim to provide a high assurance, isolated environment in which to run …
Blockchain and NFTs for time-bound access and monetization of private data
Digital data has enabled organizations to anticipate future threats, opportunities, and trends.
However, digital data owners do not know how their data is accessed, shared, and …
However, digital data owners do not know how their data is accessed, shared, and …
A Survey on Content Retrieval on the Decentralised Web
The control, governance, and management of the web have become increasingly
centralised, resulting in security, privacy, and censorship concerns. Decentralised initiatives …
centralised, resulting in security, privacy, and censorship concerns. Decentralised initiatives …
Scaling blockchain consensus via a robust shared mempool
Leader-based Byzantine fault-tolerant (BFT) consensus protocols used by permissioned
blockchains have limited scalability and robustness. To alleviate the leader bottleneck in …
blockchains have limited scalability and robustness. To alleviate the leader bottleneck in …
Confidential Consortium Framework: Secure multiparty applications with confidentiality, integrity, and high availability
Confidentiality, integrity protection, and high availability, abbreviated to CIA, are essential
properties for trustworthy data systems. The rise of cloud computing and the growing …
properties for trustworthy data systems. The rise of cloud computing and the growing …
Addax: A fast, private, and accountable ad exchange infrastructure
This paper proposes Addax, a fast, verifiable, and private online ad exchange. When a user
visits an ad-supported site, Addax runs an auction similar to those of leading exchanges; …
visits an ad-supported site, Addax runs an auction similar to those of leading exchanges; …
Toward Aggregated Payment Channel Networks
Payment channel networks (PCNs) have been designed and utilized to address the
scalability challenge and throughput limitation of blockchains. It provides a high-throughput …
scalability challenge and throughput limitation of blockchains. It provides a high-throughput …
No Forking Way: Detecting Cloning Attacks on Intel SGX Applications
Forking attacks against TEEs like Intel SGX can be carried out either by rolling back the
application to a previous state, or by cloning the application and by partitioning its inputs …
application to a previous state, or by cloning the application and by partitioning its inputs …