Mayank Raikwar
YOU?
Author Swipe
View article: zkToken: Empowering Holders to Limit Revocation Checks for Verifiable Credentials
zkToken: Empowering Holders to Limit Revocation Checks for Verifiable Credentials Open
Systems managing Verifiable Credentials are becoming increasingly popular. Unfortunately, their support for revoking previously issued credentials allows verifiers to effectively monitor the validity of the credentials, which is sensitive …
View article: Slipstream: Ebb-and-Flow Consensus on a DAG with Fast Confirmation for UTXO Transactions
Slipstream: Ebb-and-Flow Consensus on a DAG with Fast Confirmation for UTXO Transactions Open
This paper introduces Slipstream, a Byzantine Fault Tolerance (BFT) protocol where nodes concurrently propose blocks to be added to a Directed Acyclic Graph (DAG) and aim to agree on block ordering. Slipstream offers two types of block ord…
View article: SMedIR: secure medical image retrieval framework with ConvNeXt-based indexing and searchable encryption in the cloud
SMedIR: secure medical image retrieval framework with ConvNeXt-based indexing and searchable encryption in the cloud Open
The security and privacy of medical images are crucial due to their sensitive nature and the potential for severe consequences from unauthorized modifications, including data breaches and inaccurate diagnoses. This paper introduces a metho…
View article: SoK: DAG-based Consensus Protocols
SoK: DAG-based Consensus Protocols Open
International audience
View article: Fairness Notions in DAG-based DLTs
Fairness Notions in DAG-based DLTs Open
This paper investigates the issue of fairness in Distributed Ledger Technology (DLT), specifically focusing on the shortcomings observed in current blockchain systems due to Miner Extractable Value (MEV) phenomena and systemic centralizati…
View article: Databases fit for blockchain technology: A complete overview
Databases fit for blockchain technology: A complete overview Open
Efficient data storage and query processing systems play a vital role in many different research areas. Blockchain technology and distributed ledgers attract massive attention and trigger multiple projects in various industries. Neverthele…
View article: SoK: Decentralized Randomness Beacon Protocols
SoK: Decentralized Randomness Beacon Protocols Open
The scientific interest in the area of Decentralized Randomness Beacon (DRB) protocols has been thriving recently. Partially that interest is due to the success of the disruptive technologies introduced by modern cryptography, such as cryp…
View article: DoS Attacks on Blockchain Ecosystem
DoS Attacks on Blockchain Ecosystem Open
Denial of Service (DoS) attacks are a growing threat in network services. The frequency and intensity of DoS attacks are rapidly increasing day by day. The immense financial potential of the Cryptocurrency market is a prevalent target of t…
View article: Competitive Decentralized Randomness Beacon Protocols
Competitive Decentralized Randomness Beacon Protocols Open
A distributed and reliable source of randomness is always a critical element in cryptography, both in the construction and application of cryptographic primitives. Modern cryptography such as blockchain, cryptocurrencies, decentralized fin…
View article: SoK of Used Cryptography in Blockchain
SoK of Used Cryptography in Blockchain Open
The underlying fundaments of blockchain are cryptography and cryptographic concepts that provide reliable and secure decentralized solutions. Although many recent papers study the use-cases of blockchain in different industrial areas, such…