Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Physical Sciences and Mathematics

Concise Mercurial Subvector Commitments: Definitions And Constructions, Yannan Li, Willy Susilo, Guomin Yang, Tran Viet Xuan Phuong, Yong Yu, Dongxi Liu Dec 2021

Concise Mercurial Subvector Commitments: Definitions And Constructions, Yannan Li, Willy Susilo, Guomin Yang, Tran Viet Xuan Phuong, Yong Yu, Dongxi Liu

Research Collection School Of Computing and Information Systems

Vector commitment and its variants have attracted a lot of attention recently as they have been exposed to a wide range of applications in blockchain. Two special extensions of vector commitments, namely subvector commitments and mercurial commitments, have been proposed with attractive features that are desirable in many applications. Nevertheless, to the best of our knowledge, a single construction satisfying all those attractive features is still missing. In this work, we analyze those important properties and propose a new primitive called mercurial subvector commitments, which are efficiently updatable, mercurial hiding, position binding, and aggregatable. We formalize the system model and …


Etherlearn: Decentralizing Learning Via Blockchain, Nguyen Binh Duong Ta, Tian Jun Joel Yang Dec 2021

Etherlearn: Decentralizing Learning Via Blockchain, Nguyen Binh Duong Ta, Tian Jun Joel Yang

Research Collection School Of Computing and Information Systems

In institutes of higher learning, most of the time course material development and delivery follow a centralized model which is fully lecturer-controlled. In this model, engaging students as partners in learning is a challenging problem as: 1) students are usually hesitant to contribute due to the fear of getting it wrong, 2) not much incentive for them to put in the extra effort, and 3) current online learning systems lack adequate facilities to support seamless and anonymous interactions between students. In this work, we propose EtherLearn, a blockchain based peer-learning system to distribute the control of how course material and …


Checking Smart Contracts With Structural Code Embedding, Zhipeng Gao, Lingxiao Jiang, Xin Xia, David Lo, John Grundy Dec 2021

Checking Smart Contracts With Structural Code Embedding, Zhipeng Gao, Lingxiao Jiang, Xin Xia, David Lo, John Grundy

Research Collection School Of Computing and Information Systems

Smart contracts have been increasingly used together with blockchains to automate financial and business transactions. However, many bugs and vulnerabilities have been identified in many contracts which raises serious concerns about smart contract security, not to mention that the blockchain systems on which the smart contracts are built can be buggy. Thus, there is a significant need to better maintain smart contract code and ensure its high reliability. In this paper, we propose an automated approach to learn characteristics of smart contracts in Solidity, useful for repetitive contract code, bug detection and contract validation. Our new approach is based on …


Strategic Behavior And Market Inefficiency In Blockchain-Based Auctions, Ping Fan Ke, Jianqing Chen, Zhiling Guo Dec 2021

Strategic Behavior And Market Inefficiency In Blockchain-Based Auctions, Ping Fan Ke, Jianqing Chen, Zhiling Guo

Research Collection School Of Computing and Information Systems

Blockchain-based auctions play a key role in decentralized finance, such as liquidation of collaterals in crypto-lending. In this research, we show that a Blockchain-based auction is subject to the threat to availability because of the characteristics of the Blockchain platform, which could lead to auction inefficiency or even market failure. Specifically, an adversary could occupy all of the transaction capacity of an auction by sending transactions with sufficiently high transaction fees, and then win the item in an auction with a nearly zero bid price as there are no competitors available. We discuss how to prevent this kind of strategic …


Privacy-Preserving Voluntary-Tallying Leader Election For Internet Of Things, Tong Wu, Guomin Yang, Liehuang Zhu, Yulin Wu Oct 2021

Privacy-Preserving Voluntary-Tallying Leader Election For Internet Of Things, Tong Wu, Guomin Yang, Liehuang Zhu, Yulin Wu

Research Collection School Of Computing and Information Systems

The Internet of Things (IoT) is commonly deployed with devices of limited power and computation capability. A centralized IoT architecture provides a simplified management for IoT system but brings redundancy by the unnecessary data traffic with a data center. A decentralized IoT reduces the cost on data traffic and is resilient to the single-point-of failure. The blockchain technique has attracted a large amount of research, which is redeemed as a perspective of decentralized IoT system infrastructure. It also brings new privacy challenges for that the blockchain is a public ledger of all digital events executed and shared among all participants. …


Smart Contract Development: Challenges And Opportunities, Weiqin Zou, David Lo, Pavneet Singh Kochhar, Xuan-Bach D. Le, Xin Xia, Yang Feng, Zhenyu Chen, Baowen Xu Oct 2021

Smart Contract Development: Challenges And Opportunities, Weiqin Zou, David Lo, Pavneet Singh Kochhar, Xuan-Bach D. Le, Xin Xia, Yang Feng, Zhenyu Chen, Baowen Xu

Research Collection School Of Computing and Information Systems

Smart contract, a term which was originally coined to refer to the automation of legal contracts in general, has recently seen much interest due to the advent of blockchain technology. Recently, the term is popularly used to refer to low-level code scripts running on a blockchain platform. Our study focuses exclusively on this subset of smart contracts. Such smart contracts have increasingly been gaining ground, finding numerous important applications (e.g., crowdfunding) in the real world. Despite the increasing popularity, smart contract development still remains somewhat a mystery to many developers largely due to its special design and applications. Are there …


Data Pricing And Data Asset Governance In The Ai Era, Jian Pei, Feida Zhu, Zicun Cong, Luo Xuan, Liu Huiwen, Xin Mu Aug 2021

Data Pricing And Data Asset Governance In The Ai Era, Jian Pei, Feida Zhu, Zicun Cong, Luo Xuan, Liu Huiwen, Xin Mu

Research Collection School Of Computing and Information Systems

Data is one of the most critical resources in the AI Era. While substantial research has been dedicated to training machine learning models using various types of data, much less efforts have been invested in the exploration of assessing and governing data assets in end-to-end processes of machine learning and data science, that is, the pipeline where data is collected and processed, and then machine learning models are produced, requested, deployed, shared and evolved. To provide a state-of-the-art overall picture of this important and novel area and advocate the related research and development, we present a tutorial addressing two essential …


Non-Equivocation In Blockchain: Double-Authentication-Preventing Signatures Gone Contractual, Yannan Li, Willy Susilo, Guomin Yang, Yong Yu, Tran Viet Xuan Phuong, Dongxi Liu Jun 2021

Non-Equivocation In Blockchain: Double-Authentication-Preventing Signatures Gone Contractual, Yannan Li, Willy Susilo, Guomin Yang, Yong Yu, Tran Viet Xuan Phuong, Dongxi Liu

Research Collection School Of Computing and Information Systems

Equivocation is one of the most fundamental problems that need to be solved when designing distributed protocols. Traditional methods to defeat equivocation rely on trusted hardware or particular assumptions, which may hinder their adoption in practice. The advent of blockchain and decentralized cryptocurrencies provides an auspicious breakthrough paradigm to resolve the problem above. In this paper, we propose a blockchain-based solution to address contractual equivocation, which supports user-defined fine-grained policybased equivocation. Specifically, users will be de-incentive if the statements they made breach the predefined access rules. The core of our solution is a newly introduced primitive named Policy-Authentication-Preventing Signature (PoAPS), …


Fine-Grained And Controllably Redactable Blockchain With Harmful Data Forced Removal, Huiying Hou, Shidi Hao, Jiaming Yuan, Shengmin Xu, Yunlei Zhao May 2021

Fine-Grained And Controllably Redactable Blockchain With Harmful Data Forced Removal, Huiying Hou, Shidi Hao, Jiaming Yuan, Shengmin Xu, Yunlei Zhao

Research Collection School Of Computing and Information Systems

Notoriously, immutability is one of the most striking properties of blockchains. As the data contained in blockchains may be compelled to redact for personal and legal reasons, immutability needs to be skillfully broken. In most existing redactable blockchains, fine-grained redaction and effective deletion of harmful data are mutually exclusive. To close the gap, we propose a fine-grained and controllably redactable blockchain with harmful data forced removal. In the scheme, the originator of the transaction has fine-grained control over who can perform the redaction and which portions of the transaction can be redacted. The redaction transaction is performed after collecting enough …


On Decentralization Of Bitcoin: An Asset Perspective, Ling Cheng, Feida Zhu, Huiwen Liu, Chunyan Miao May 2021

On Decentralization Of Bitcoin: An Asset Perspective, Ling Cheng, Feida Zhu, Huiwen Liu, Chunyan Miao

Research Collection School Of Computing and Information Systems

Since its advent in 2009, Bitcoin, a cryptography-enabled peer-to-peer digital payment system, has been gaining increasing attention from both academia and industry. An effort designed to overcome a cluster of bottlenecks inherent in existing centralized financial systems, Bitcoin has always been championed by the crypto community as an example of the spirit of decentralization. While the decentralized nature of Bitcoin's Proof-of-Work consensus algorithm has often been discussed in great detail, no systematic study has so far been conducted to quantitatively measure the degree of decentralization of Bitcoin from an asset perspective -- How decentralized is Bitcoin as a financial asset? …


Robust And Universal Seamless Handover Authentication In 5g Hetnets, Yinghui Zhang, Robert H. Deng, Elisa Bertino, Dong Zheng Apr 2021

Robust And Universal Seamless Handover Authentication In 5g Hetnets, Yinghui Zhang, Robert H. Deng, Elisa Bertino, Dong Zheng

Research Collection School Of Computing and Information Systems

The evolving fifth generation (5G) cellular networks will be a collection of heterogeneous and backward-compatible networks. With the increased heterogeneity and densification of 5G heterogeneous networks (HetNets), it is important to ensure security and efficiency of frequent handovers in 5G wireless roaming environments. However, existing handover authentication mechanisms still have challenging issues, such as anonymity, robust traceability and universality. In this paper, we address these issues by introducing RUSH, a Robust and Universal Seamless Handover authentication protocol for 5G HetNets. In RUSH, anonymous mutual authentication with key agreement is enabled for handovers by exploiting the trapdoor collision property of chameleon …


Traceable Monero: Anonymous Cryptocurrency With Enhanced Accountability, Yannan Li, Guomin Yang, Wily Susilo, Yong Yu, Man Ho Au, Dongxi Liu Mar 2021

Traceable Monero: Anonymous Cryptocurrency With Enhanced Accountability, Yannan Li, Guomin Yang, Wily Susilo, Yong Yu, Man Ho Au, Dongxi Liu

Research Collection School Of Computing and Information Systems

Monero provides a high level of anonymity for both users and their transactions. However, many criminal activities might be committed with the protection of anonymity in cryptocurrency transactions. Thus, user accountability (or traceability) is also important in Monero transactions, which is unfortunately lacking in the current literature. In this paper, we fill this gap by introducing a new cryptocurrency named Traceable Monero to balance the user anonymity and accountability. Our framework relies on a tracing authority, but is optimistic, in that it is only involved when investigations in certain transactions are required. We formalize the system model and security model …