LNCS proceedings
Online access to LNCS 11025 is already available at SpringerLink
Aims and Scope
Since the appearance of Bitcoin in 2009, a plethora of new cryptocurrencies and other blockchain based systems have been deployed with different success. While some of them are slightly different copies of Bitcoin, other ones propose interesting improvements or new usages of the underlying blockchain technology. However, the novelty of such technologies is often tied with rapid developments and proof-of-concept software, and rigorous scientific analyses of the proposed systems are often skipped.
This workshop aims to provide a forum for researchers in this area to carefully analyze current systems and propose new ones in order to create a scientific background for a solid development of new cryptocurrencies and blockchain technology systems.
Topics
The main topics include (but are not limited to):
- Anonymity and privacy in cryptocurrencies.
- Cryptocurrency based trust systems.
- Security analysis of existing cryptocurrencies.
- Formal threat models in cryptocurrency systems.
- Improvement proposals for existing cryptocurrencies.
- P2P network cryptocurrencies analysis.
- Private transactions in blockchain based systems.
- Consensus mechanisms: proof-of-work, proof of stake, proof of burn, proof-of-useful-work.
- New usages of the blockchain technology.
- Scalability solutions for blockchain systems.
- Smart contracts.
Program Commitee
PC Chairs:
Joaquin Garcia-Alfaro, Télécom SudParis, France
Email: joaquin.garcia_alfaro [at] telecom-sudparis [dot] eu
Jordi Herrera-Joancomartí, Universitat Autònoma de Barcelona, Catalonia
Email: jordi.herrera [at] uab [dot] cat
PC Members:
Daniel Augot - INRIA Saclay (France)
Rainer Böhme - Universität Innsbruck (Austria)
Joseph Bonneau - NYU (USA)
Jeremy Clark - Concordia University (Canada)
Ittay Eyal - Technion (Israel)
Hannes Hartenstein - KIT (Germany)
Akira Kanaoka - Toho university (Japan)
Ghassan Karame - NEC Research (Germany)
Shin'ichiro Matsuo - Georgetown University (USA)
Patrick McCorry - UCL (UK)
Sarah Meiklejohn - UCL (UK)
Andrew Miller - University of Illinois, Urbana-Champaign (USA)
Pedro Moreno Sanchez - Purdue university (USA)
Jose Luis Muñoz Tapia - UPC (Catalonia)
Guillermo Navarro - UAB (Catalonia)
Cristina Pérez-Solà - UAB (Catalonia)
Tim Ruffing - Saarland University (Germany)
Roger Wattenhofer - ETH (Switzerland)
Aviv Zohar - The Hebrew University (Israel)
Accepted papers
List of accepted papers:
- Hisham Galal and Amr Youssef. "Succinctly Verifiable Sealed-Bid Auction Smart Contract"
- Macià Mut Puigserver, Magdalena Payeras-Capellà and Miquel Àngel Cabot-Nadal. "Blockchain-Based Fair Certified Notifications"
- Tommy Koens and Erik Poll. "What Blockchain Alternative Do You Need?"
- Shira Werman and Aviv Zohar. "Avoiding Deadlocks in Payment Channel Networks"
- Dmytro Piatkivskyi and Mariusz Nowostawski. "Split payments in payment networks"
- Colin Boyd and Christopher Carr. "Valuable Puzzles for Proofs-of-Work"
- Georgia Avarikioti, Gerrit Janssen, Yuyi Wang and Roger Wattenhofer. "Payment Network Design with Fees"
- Mohiuddin Ahmed, Jinpeng Wei, Yongge Wang and Ehab Al-Shaer. "A Poisoning Attack against Crypto-currency Mining Pools"
- Felix Engelmann, Frank Kargl and Christoph Bösch. "Coloured Ring Confidential Transactions"
- Aljosha Judmayer, Nicholas Stifter, Philipp Schindler and Edgar Weippl. "Enforcing rule changes through offensive forking- and consensus techniques"
- Rick Klomp and Andrea Bracciali. "On symbolic verification of Bitcoin's SCRIPT language"
- Oliver Stengele and Hannes Hartenstein. "Atomic Information Disclosure of Off-Chained Computations using Threshold Encryption"
- George Bissias, Brian Levine and David Thibodeau. "Using Economic Risk to Model Miner Hash Rate Allocation in Cryptocurrencies"
- Alexander Chepurnoy, Vasily Kharin and Dmitry Meshkov. "Short Paper: Self-Reproducing Coins as Universal Turing Machine"
- Mustafa Al-Bassam and Sarah Meiklejohn. "Contour: A Practical System for Binary Transparency"
Accepted posters
List of accepted posters:
- Livio Pompianu, Stefano Lande, Massimo Bartoletti, Andrea Bracciali. "BlockAPI: Blockchain analytics API"
- Alejandro Ranchal-Pedrosa, Sara Tucci-Piergiovanni, Maria Potop-Butucaru, Yannick Seurin. "Scalable Funding of Bitcoin's Layer2"
- Sergio Serusi, Stefano Lande, Massimo Bartoletti, Barbara Pes. "Bitcoin Deponzifier: data mining for detecting Bitcoin Ponzi schemes"
- Siamak Solat. "RDV: An Alternative to Proof-of-Work"
- Stefano Lande, Nicola Atzei, Massimo Bartoletti, Roberto Zunino. "Balzac: a DSL for Bitcoin transactions"
- Sergi Delgado-Segura and Cristina Perez-Sola. "STATUS: Don't trust, analyse"
- Alexei Zamyatin, Dominik Harz, Joshua Lind, Panayiotis Panayiotou, Arthur Gervais and William J. Knottenbelt. "Multisignatures for Cryptocurrency-Backed Tokens"
Keynote
We are pleased to announce that Sarah Meiklejohn
will be our keynote speaker.
Title: Anonymity in Cryptocurrencies
Abstract: A long line of recent research has demonstrated that existing cryptocurrencies often do
not achieve the level of anonymity that users might expect they do, while at the same time another line of
research has worked to increase the level of anonymity by adding new features to existing cryptocurrencies
or creating entirely new cryptocurrencies. This talk will explore both of these lines of research,
demonstrating both de-anonymization attacks and techniques for anonymity that achieve provably secure
guarantees.
Short Biography:
Dr. Sarah Meiklejohn is Reader (Associate Professor) in Cryptography and Security at UCL, in the
Computer Science department. I am affiliated with the Information Security Group, and am also a member
of the Open Music Initiative and the Initiative for Cryptocurrencies and Contracts (IC3).
Before joining UCL, she received a PhD in Computer Science from the University of California, San Diego
under the joint supervision of Mihir Bellare and Stefan Savage. During her PhD, she spent the summers
of 2011 and 2013 at MSR Redmond, working in the cryptography group with Melissa Chase. She obtained an
Sc.M. in Computer Science from Brown University under the guidance of Anna Lysyanskaya in 2009, and an
Sc.B. in Mathematics from Brown University in 2008.
Workshop Program
September 6
08:45 - 09:00 Registration
09:00 - 09:30 General Welcome
(Room: Agora. Chairs: Jordi Herrera-Joancomarti & Joaquin Garcia-Alfaro)09:30 - 10:30 Invited Talk
(Room: Agora)-
Anonymity in Cryptocurrencies
By Sarah Meiklejohn.
Abstract: A long line of recent research has demonstrated that existing cryptocurrencies often do not achieve the level of anonymity that users might expect they do, while at the same time another line of research has worked to increase the level of anonymity by adding new features to existing cryptocurrencies or creating entirely new cryptocurrencies. This talk will explore both of these lines of research, demonstrating both de-anonymization attacks and techniques for anonymity that achieve provably secure guarantees.
10:30 - 11:00 Coffee Break
11:00 - 12:30 Session 1: Smart contracts
(Room: Agora. Chair: Guillermo Navarro-Arribas)-
11:00-11:30 - Succinctly Verifiable Sealed-Bid Auction Smart Contract.
By Hisham Galal and Amr Youssef. -
11:30-12:00 - Blockchain-Based Fair Certified Notifications.
By Macia Mut-Puigserver, Magdalena Payeras-Capella and Miquel Angel Cabot-Nadal. -
12:00-12:25 - Self-Reproducing Coins as Universal Turing Machine (Short Paper).
By Alexander Chepurnoy, Vasily Kharin and Dmitry Meshkov.
12:30 - 14:00 Lunch and poster session
14:00 - 15:30 Session 2: Economic modeling, transparency and consensus
(Room: Agora. Chair: Rainer Böhme)-
14:00-14:30 - Using Economic Risk to Model Miner Hash Rate Allocation in Cryptocurrencies.
By George Bissias, Brian Levine and David Thibodeau. -
14:30-15:00 - Contour: A Practical System for Binary Transparency.
By Mustafa Al-Bassam and Sarah Meiklejohn. -
15:00-15:25 - Valuable Puzzles for Proofs-of-Work (Short Paper).
By Colin Boyd and Christopher Carr.
15:30 - 16:00 Coffee Break and poster session
16:00-17:35 Session 3: Attacks, privacy and atomic disclosure
(Room: Agora. Chair: Sarah Meiklejohn)-
16:00-16:25 - Enforcing rule changes through offensive forking- and consensus techniques (Short Paper).
By Aljosha Judmayer, Nicholas Stifter, Philipp Schindler and Edgar Weippl. -
16:25-16:50 - Coloured Ring Confidential Transactions (Short Paper).
By Felix Engelmann, Frank Kargl and Christoph Bosch. -
16:50-17:15 - Atomic Information Disclosure of Off-Chained Computations using Threshold Encryption (Short Paper).
By Oliver Stengele and Hannes Hartenstein. -
17:15-17:35 - Poster Presentations (1/2)
- 17:15-17:20 - Livio Pompianu, Stefano Lande, Massimo Bartoletti, Andrea Bracciali. BlockAPI: Blockchain analytics API
- 17:20-17:25 - Alejandro Ranchal-Pedrosa, Sara Tucci-Piergiovanni, Maria Potop-Butucaru, Yannick Seurin. Scalable Funding of Bitcoin's Layer2
- 17:25-17:30 - Sergio Serusi, Stefano Lande, Massimo Bartoletti, Barbara Pes. Bitcoin Deponzifier: data mining for detecting Bitcoin Ponzi schemes
- 17:30-17:35 - Siamak Solat. RDV: An Alternative to Proof-of-Work
19:00 Social activity
21:00 Gala dinner
September 7
09:00 - 10:30 Session 4: Second Layer and lightning networks
(Room: Agora. Chair: Hannes Hartenstein)-
09:00-09:25 - Split payments in payment networks (Short Paper).
By Dmytro Piatkivskyi and Mariusz Nowostawski. -
09:25-09:50 - Payment Network Design with Fees (Short Paper).
By Georgia Avarikioti, Gerrit Janssen, Yuyi Wang and Roger Wattenhofer. -
09:50-10:15 - Avoiding Deadlocks in Payment Channel Networks (Short Paper).
By Shira Werman and Aviv Zohar. -
10:15-10:30 - Poster Presentations (2/2)
- 10:15-10:20 - Stefano Lande, Nicola Atzei, Massimo Bartoletti, Roberto Zunino. Balzac: a DSL for Bitcoin transactions
- 10:20-10:25 - Sergi Delgado-Segura and Cristina Perez-Sola. STATUS: Don't trust, analyse
- 10:25-10:30 - Alexei Zamyatin, Dominik Harz, Joshua Lind, Panayiotis Panayiotou, Arthur Gervais and William J. Knottenbelt. Multisignatures for Cryptocurrency-Backed Tokens
10:30 - 11:00 Coffee Break and poster session
11:00 - 12:30 Session 5: Bitcoin proposals and mining pools
(Room: Agora. Chair: Joaquin Garcia-Alfaro)-
11:00-11:30 - On symbolic verification of Bitcoin's SCRIPT language.
By Rick Klomp and Andrea Bracciali. -
11:30-12:00 - What Blockchain Alternative Do You Need?
By Tommy Koens and Erik Poll. -
12:00-12:30 - A Poisoning Attack against Crypto-currency Mining Pools.
By Mohiuddin Ahmed, Jinpeng Wei, Yongge Wang and Ehab Al-Shaer.
12:30 - 14:00 Farewell and lunch
Call for posters
We welcome poster abstracts describing works in progress, or innovative ideas not mature enough to be presented as a paper. The poster track will provide an opportunity to present early-stage work and receive feedback from the community, especially on thought-provoking or controversial work, approaches, or ideas from students.
Submit your posters to cbt2018@easychair.org
Posters shall be submitted for review in the form of an extended
abstract that has to be formatted in LNCS-style and not exceed 1
page in length, with a PDF draft of the proposed poster included
as page 2 of the submission (A0 size in portrait mode, W 841mm x
H 1189 mm, with all fonts embedded in the PDF file). In addition,
poster titles should always start with the phrase 'Poster
Abstract:'. Accepted posters will be presented at the symposium
in a separate session. Authors of accepted full papers are also
encouraged to submit and present posters of their paper in the
poster session. If the poster submission is for an accepted
paper, add the following keywords to your submission: 'Poster for
Accepted Paper:
Registration stipends for the worshop registration are available for students that present their posters at CBT2018.
Note that the poster abstracts have a separate deadline from the full papers and will not be included in the proceedings.
Please contact cbt2018@easychair.org in case of doubts and questions.
Call for papers
Submitted papers must be original and not submitted for publication elsewhere. Authors are invited to submit their manuscripts following the LNCS Proceedings Manuscript style. Papers are limited to 16 pages (full papers), or 8 pages (short papers) including references and appendices, and can be submitted as PDF via the CBT 2018 submission site.
Accepted conference papers will be published by Springer in the LNCS collection. At least one author of each accepted paper is required to register and present their work at the workshop; otherwise the paper will not be included in the proceedings.
Registration
To register to CBT 2018, please follow the general registration instructions for ESORICS 2018 (kindly specify CBT when registering to the registration service).
Link to ESORICS 2018 registration page
Venue
The workshop will be held in Barcelona, Catalonia, in conjunction with the 23rd annual European research event in Computer Security (ESORICS 2018) symposium.
More information about the venue is available on the ESORICS 2018 website at https://esorics2018.upc.edu/venue.do.
Travel and accommodation information is also available from the ESORICS 2018 website at https://esorics2018.upc.edu/hotels.do