A survey of Layer-two blockchain protocols

A Gangwal, HR Gangavalli, A Thirupathi - Journal of Network and …, 2023 - Elsevier
After the success of the Bitcoin blockchain, came several cryptocurrencies and blockchain
solutions in the last decade. Nonetheless, Blockchain-based systems still suffer from low …

Intel software guard extensions applications: A survey

NC Will, CA Maziero - ACM Computing Surveys, 2023 - dl.acm.org
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …

Sok: Layer-two blockchain protocols

L Gudgeon, P Moreno-Sanchez, S Roos… - … Cryptography and Data …, 2020 - Springer
Blockchains have the potential to revolutionize markets and services. However, they
currently exhibit high latencies and fail to handle transaction loads comparable to those …

Design choices for central bank digital currency: Policy and technical considerations

S Allen, S Čapkun, I Eyal, G Fanti, BA Ford… - 2020 - nber.org
Central banks around the world are exploring and in some cases even piloting Central Bank
Digital Currencies (CBDCs). CBDCs promise to realize a broad range of new capabilities …

Platypus: A central bank digital currency with unlinkable transactions and privacy-preserving regulation

K Wüst, K Kostiainen, N Delius, S Capkun - Proceedings of the 2022 …, 2022 - dl.acm.org
Due to the popularity of blockchain-based cryptocurrencies, the increasing digitalization of
payments, and the constantly reducing role of cash in society, central banks have shown an …

Pantheon: Private retrieval from public key-value store

I Ahmad, D Agrawal, AE Abbadi, T Gupta - Proceedings of the VLDB …, 2022 - dl.acm.org
Consider a cloud server that owns a key-value store and provides a private query service to
its clients. Preserving client privacy in this setting is difficult because the key-value store is …

Oblivious message retrieval

Z Liu, E Tromer - Annual International Cryptology Conference, 2022 - Springer
Anonymous message delivery systems, such as private messaging services and privacy-
preserving payment systems, need a mechanism for recipients to retrieve the messages …

Reducing participation costs via incremental verification for ledger systems

W Chen, A Chiesa, E Dauterman… - Cryptology ePrint Archive, 2020 - eprint.iacr.org
Ledger systems are applications run on peer-to-peer networks that provide strong integrity
guarantees. However, these systems often have high participation costs. For a server to join …

Sok: A systematic review of tee usage for develo** trusted applications

A Paju, MO Javed, J Nurmi, J Savimäki… - Proceedings of the 18th …, 2023 - dl.acm.org
Trusted Execution Environments (TEEs) are a feature of modern central processing units
(CPUs) that aim to provide a high assurance, isolated environment in which to run …

Scalable private signaling

S Jakkamsetti, Z Liu, V Madathil - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Private messaging systems that use a bulletin board, like privacy-preserving blockchains,
have been a popular topic during the last couple of years. In these systems, typically a …