no code implementations • 27 Mar 2020 • George Kappos, Haaroon Yousaf, Ania Piotrowska, Sanket Kanjalkar, Sergi Delgado-Segura, Andrew Miller, Sarah Meiklejohn
Payment channel networks, and the Lightning Network in particular, seem to offer a solution to the lack of scalability and privacy offered by Bitcoin and other blockchain-based cryptocurrencies.
Cryptography and Security
1 code implementation • 30 Oct 2018 • Haaroon Yousaf, George Kappos, Sarah Meiklejohn
One of the defining features of a cryptocurrency is that its ledger, containing all transactions that have evertaken place, is globally visible.
Cryptography and Security
no code implementations • 12 May 2018 • Alexander Hicks, Vasilios Mavroudis, Mustafa Al-Bassam, Sarah Meiklejohn, Steven J. Murdoch
We propose VAMS, a system that enables transparency for audits of access to data requests without compromising the privacy of parties in the system.
Cryptography and Security
3 code implementations • 8 May 2018 • George Kappos, Haaroon Yousaf, Mary Maller, Sarah Meiklejohn
Among the now numerous alternative cryptocurrencies derived from Bitcoin, Zcash is often touted as the one with the strongest anonymity guarantees, due to its basis in well-regarded cryptographic research.
Cryptography and Security
8 code implementations • 20 Feb 2018 • Alberto Sonnino, Mustafa Al-Bassam, Shehar Bano, Sarah Meiklejohn, George Danezis
Coconut is a novel selective disclosure credential scheme supporting distributed threshold issuance, public and private attributes, re-randomization, and multiple unlinkable selective attribute revelations.
Cryptography and Security
no code implementations • 10 Nov 2017 • Shehar Bano, Alberto Sonnino, Mustafa Al-Bassam, Sarah Azouvi, Patrick McCorry, Sarah Meiklejohn, George Danezis
The blockchain initially gained traction in 2008 as the technology underlying bitcoin, but now has been employed in a diverse range of applications and created a global market worth over $150B as of 2017.
Cryptography and Security
no code implementations • 26 May 2015 • George Danezis, Sarah Meiklejohn
Current cryptocurrencies, starting with Bitcoin, build a decentralized blockchain-based transaction ledger, maintained through proofs-of-work that also generate a monetary supply.
Cryptography and Security