This book constitutes revised selected papers from the proceedings of the 26th International Conference on Financial Cryptography and Data Security, FC 2022, which was held in Grenada during May 2022.
The 32 full papers and 4 short papers included in this book were carefully reviewed and
selected from 159 submissions. They were organized in topical sections as follows: tokenomics; MPC (mostly); privacy; ZKP; old-school consensus; mostly payment networks; incentives; not proof of work; performance; measurements.
Tokenomics.- Maximizing Extractable Value from Automated Market
Makers.- Kicking-the-Bucket: Fast Privacy-Preserving Trading Using
Buckets.- Speculative Multipliers on DeFi: Quantifying On-Chain Leverage
Risks.- MPC (mostly).- Explainable Arguments.- MPCCache: Privacy-Preserving
Multi-Party Cooperative Cache Sharing at the Edge.- Multi-party Updatable
Delegated Private Set Intersection.- Privacy.- The Effect of False Positives:
Why Fuzzy Message Detection Leads to Fuzzy Privacy Guarantees?.- Differential
Privacy in Constant Function Market Makers.- Anonymous Tokens with Public
Metadata and Applications to Private Contact Tracing.- ZKP.- SnarkPack:
Practical SNARK Aggregation.- On Interactive Oracle Proofs for Boolean R1CS
Statements.- Zero Knowledge Proofs towards Verifiable Decentralized
AI.- Old-School Consensus.- Be Aware of Your Leaders.- Jolteon and Ditto:
Network-Adaptive Efficient Consensus with Asynchronous Fallback.- Quick Order
Fairness.- Mostly Payment Networks.- Analysis and Probing of Parallel
Channels in the Lightning Network.- Hide & Seek: Privacy-Preserving
Rebalancing on Payment Channel Networks.- Short Paper: A Centrality Analysis
of the Lightning Network.- Resurrecting Address Clustering in
Bitcoin.- Incentives.- ABSNFT: Securitization and Repurchase Scheme for
Non-Fungible Tokens Based on Game Theoretical Analysis.- Decentralization
Conscious Players And System Reliability.- Towards Overcoming the
Undercutting Problem.- Arbitrage attack: Miners of the world, unite!.- Suborn
Channels: Incentives Against Timelock Bribes.- Sliding Window Challenge
Process for Congestion Detection.- Short Paper: On Game-Theoretically-Fair
Leader Election.- Not Proof of Work.- The Availability-Accountability Dilemma
and its Resolution via Accountability Gadgets.- Three Attacks on
Proof-of-Stake Ethereum.- Permissionless Consensus in the Resource
Model.- Performance.- Plumo: An Ultralight Blockchain Client.- SoK:
Blockchain Light Clients.- Achieving Almost All Blockchain Functionalities
with Polylogarithmic Storage.- Measurements.- Short Paper: On the Claims of
Weak Block Synchronization in Bitcoin.- India's "Aadhaar" Biometric ID:
Structure, Security, and Vulnerabilities.- Short Paper: What Peer
Announcements Tell Us About the Size of the Bitcoin P2P Network.- An
empirical study of two Bitcoin artifacts through deep learning.