SR

Authored

6 records found

Get Me Out of This Payment! Bailout

An HTLC Re-routing Protocol

The Lightning Network provides almost-instant payments to its parties. In addition to direct payments requiring a shared payment channel, parties can pay each other in the form of multi-hop payments via existing channels. Such multi-hop payments rely on a 2-phase commit protocol ...

Extras and Premiums

Local PCN Routing with Redundancy and Fees

Payment channel networks (PCNs) are a promising solution to the blockchain scalability problem. In PCNs, a sender can route a multi-hop payment to a receiver via intermediaries. Yet, Lightning, the only prominent payment channel network, has two major issues when it comes to mult ...

Fabricated Flips

Poisoning Federated Learning without Data

Attacks on Federated Learning (FL) can severely reduce the quality of the generated models and limit the usefulness of this emerging learning paradigm that enables on-premise decentralized learning. However, existing untargeted attacks are not practical for many scenarios as they ...

Maverick Matters

Client Contribution and Selection in Federated Learning

Federated learning (FL) enables collaborative learning between parties, called clients, without sharing the original and potentially sensitive data. To ensure fast convergence in the presence of such heterogeneous clients, it is imperative to timely select clients who can effecti ...

The Merchant

Avoiding Payment Channel Depletion through Incentives

Payment channels networks drastically increase the throughput and hence scalability of blockchains by performing transactions off-chain. Hence, they are a promising substrate for all decentralized applications that require instant payments. In an off-chain payment, parties deposi ...
Generative Adversarial Networks (GANs) are increasingly adopted by the industry to synthesize realistic images using competing generator and discriminator neural networks. Due to data not being centrally available, Multi-Discriminator (MD)-GANs training frameworks employ multiple ...

Contributed

14 records found

Searchable Symmetric Encryption (SSE) schemes provide secure search over encrypted databases while allowing admitted information leakages. Generally, the leakages can be categorized into access, search, and volume pattern. In most existing Searchable Encryption (SE) schemes, thes ...

Clusus

A cyber range for network attack simulations

This report documents the design and implementation of Clusus, a cyber range to provide students with a safe isolated environment to learn about cyber security and computer networks. This Bachelor project was proposed by the TU Delft cyber security group. During a two week resear ...

Bubblechain

An IoT authentication system

Authentication of domains has been a crucial part of the growth of web browsing, especially for e-commerce and secure browsing. However, the digital space has expanded from web domains to include devices such as smart cars, smart houses, and other IoT devices. The future for thes ...

Periscope

Censorship-Resistant Off-Chain Traffic Tunnelling

There is an everlasting arms race between censoring bodies and those in its grip. When the censor is employing increasingly sophisticated techniques to digitally monitor and restrict those in its scope, equally sophisticated means to circumvent the digital repression come forward ...

Unsatisfiable core learning for Chuffed

Improving the performance of Chuffed, a Lazy-Clause-Generation solver, by using machine learning to predict unsatisfiable cores

Solving propositional satisfiability (SAT) and constraint programming (CP) instances has been a fundamental part of a wide range of modern applications. For this reason a lot of research went into improving the efficiency of modern SAT and CP solvers. Recently much of this resear ...

Grip on Energy

With Blockchain Technology

Switching energy suppliers can be a time consuming process and the manner in which permissions regarding consumer data are stored lacks transparency. To overcome these issues, a solution was proposed in the form of a mandate register. Said register keeps track of which consumer g ...

Privacy-Preserving Verifiable Double Auctions

An application for electricity trading

Double Auctions are mechanisms to trade commodities such as electricity or parts of the wireless spectrum at optimal prices. Bidders and sellers simultaneously submit quantity-price pairs to an auctioneer, denoting the quantity they want to buy or sell at specific prices. The auc ...

Measuring Polkadot

The Impact of Tor and a VPN on Polkadot's Performance and Security

Begun in 2020, Polkadot is one of the largest blockchains in market capitalization and development. However, privacy on the Polkadot network has yet to be one of the key focus points. Especially unlinkability between the user’s IP address and Polkadot address is essential. Withou ...

SSE Is Not As Secure As It Looks

New Attacks On Range Queries Using PQ-Trees And Auxiliary Information

In a world where more data gets uploaded to the cloud, it is essential that the data gets stored securely. For users to keep search functionality, searchable symmetric encryption has been developed. SSE works by a user sending a token representing a keyword (or a range), after wh ...

The impact of reactionary behavior in channel creation games

How actions influence transaction routing in the bitcoin lightning network

Payment channels allow parties to utilize the blockchain to send transactions for a cheaper fee. Previous work has analyzed to which degree a party can profit by facilitating the transaction process. The aim is to increase the usability of the network and to be rewarded for provi ...

MarketPalace

A Sybil-Resistant and Decentralized Marketplace

Fraudulent behavior within online marketplaces is a prominent but unsolved problem. Most marketplace operators try to mitigate this behavior by serving as the central authority. This approach requires user data collection and is not privacy-friendly. In an attempt to build a foun ...

Black-box Adversarial Attacks using Substitute models

Effects of Data Distributions on Sample Transferability

Consensus-less Security

A truly scalable distributed ledger

Tor is an anonymity network used by a vast number of users in order to protect their privacy on the internet. It should not come as a surprise that this service is also used for abuse such as Denial of service attacks and other malicious activities because of the anonymity it pro ...