1 code implementation • 31 Jan 2019 • Alberto Sonnino, Shehar Bano, Mustafa Al-Bassam, George Danezis
We present a family of replay attacks against sharded distributed ledgers, that target cross-shard consensus protocols, such as the recently proposed Chainspace and Omniledger.
Cryptography and Security
1 code implementation • 9 Mar 2018 • Shweta Bhatt, Sagar Joglekar, Shehar Bano, Nishanth Sastry
This paper aims to shed light on alternative news media ecosystems that are believed to have influenced opinions and beliefs by false and/or biased news reporting during the 2016 US Presidential Elections.
Social and Information Networks
8 code implementations • 20 Feb 2018 • Alberto Sonnino, Mustafa Al-Bassam, Shehar Bano, Sarah Meiklejohn, George Danezis
Coconut is a novel selective disclosure credential scheme supporting distributed threshold issuance, public and private attributes, re-randomization, and multiple unlinkable selective attribute revelations.
Cryptography and Security
no code implementations • 10 Nov 2017 • Shehar Bano, Alberto Sonnino, Mustafa Al-Bassam, Sarah Azouvi, Patrick McCorry, Sarah Meiklejohn, George Danezis
The blockchain initially gained traction in 2008 as the technology underlying bitcoin, but now has been employed in a diverse range of applications and created a global market worth over $150B as of 2017.
Cryptography and Security