Search Results for author: Sarah Meiklejohn

Found 7 papers, 3 papers with code

An Empirical Analysis of Privacy in the Lightning Network

no code implementations27 Mar 2020 George Kappos, Haaroon Yousaf, Ania Piotrowska, Sanket Kanjalkar, Sergi Delgado-Segura, Andrew Miller, Sarah Meiklejohn

Payment channel networks, and the Lightning Network in particular, seem to offer a solution to the lack of scalability and privacy offered by Bitcoin and other blockchain-based cryptocurrencies.

Cryptography and Security

Tracing Transactions Across Cryptocurrency Ledgers

1 code implementation30 Oct 2018 Haaroon Yousaf, George Kappos, Sarah Meiklejohn

One of the defining features of a cryptocurrency is that its ledger, containing all transactions that have evertaken place, is globally visible.

Cryptography and Security

VAMS: Verifiable Auditing of Access to Confidential Data

no code implementations12 May 2018 Alexander Hicks, Vasilios Mavroudis, Mustafa Al-Bassam, Sarah Meiklejohn, Steven J. Murdoch

We propose VAMS, a system that enables transparency for audits of access to data requests without compromising the privacy of parties in the system.

Cryptography and Security

An Empirical Analysis of Anonymity in Zcash

3 code implementations8 May 2018 George Kappos, Haaroon Yousaf, Mary Maller, Sarah Meiklejohn

Among the now numerous alternative cryptocurrencies derived from Bitcoin, Zcash is often touted as the one with the strongest anonymity guarantees, due to its basis in well-regarded cryptographic research.

Cryptography and Security

Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers

8 code implementations20 Feb 2018 Alberto Sonnino, Mustafa Al-Bassam, Shehar Bano, Sarah Meiklejohn, George Danezis

Coconut is a novel selective disclosure credential scheme supporting distributed threshold issuance, public and private attributes, re-randomization, and multiple unlinkable selective attribute revelations.

Cryptography and Security

Consensus in the Age of Blockchains

no code implementations10 Nov 2017 Shehar Bano, Alberto Sonnino, Mustafa Al-Bassam, Sarah Azouvi, Patrick McCorry, Sarah Meiklejohn, George Danezis

The blockchain initially gained traction in 2008 as the technology underlying bitcoin, but now has been employed in a diverse range of applications and created a global market worth over $150B as of 2017.

Cryptography and Security

Centrally Banked Cryptocurrencies

no code implementations26 May 2015 George Danezis, Sarah Meiklejohn

Current cryptocurrencies, starting with Bitcoin, build a decentralized blockchain-based transaction ledger, maintained through proofs-of-work that also generate a monetary supply.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.