Pedro Moreno-Sánchez
YOU?
Author Swipe
View article: A Secure Sequencer and Data Availability Committee for Rollups (Extended Version)
A Secure Sequencer and Data Availability Committee for Rollups (Extended Version) Open
Blockchains face a scalability limitation, partly due to the throughput limitations of consensus protocols, especially when aiming to obtain a high degree of decentralization. Layer 2 Rollups (L2s) are a faster alternative to conventional …
View article: DTL: Data Tumbling Layer. A Composable Unlinkability for Smart Contracts
DTL: Data Tumbling Layer. A Composable Unlinkability for Smart Contracts Open
We propose Data Tumbling Layer (DTL), a cryptographic scheme for non-interactive data tumbling. The core concept is to enable users to commit to specific data and subsequently re-use to the encrypted version of these data across different …
View article: Lite-PoT: Practical Powers-of-Tau Setup Ceremony
Lite-PoT: Practical Powers-of-Tau Setup Ceremony Open
Zero-Knowledge Succinct Non-Interactive Argument of Knowledge (zk-SNARK) schemes have gained significant adoption in privacy-preserving applications, decentralized systems (e.g., blockchain), and verifiable computation due to their efficie…
View article: BitMLx: Secure Cross-chain Smart Contracts For Bitcoin-style Cryptocurrencies
BitMLx: Secure Cross-chain Smart Contracts For Bitcoin-style Cryptocurrencies Open
A smart contract is an interactive program that governs funds in the realm of a single cryptocurrency. Yet, the many existing cryptocurrencies have spurred the design of cross-chain applications that require interactions with multiple cryp…
View article: Atomic Transfer Graphs: Secure-by-design Protocols for Heterogeneous Blockchain Ecosystems
Atomic Transfer Graphs: Secure-by-design Protocols for Heterogeneous Blockchain Ecosystems Open
The heterogeneity of the blockchain landscape has motivated the design of blockchain protocols tailored to specific blockchains and applications that, hence, require custom security proofs. We observe that many blockchain protocols share c…
View article: MixBuy: Contingent Payment in the Presence of Coin Mixers
MixBuy: Contingent Payment in the Presence of Coin Mixers Open
A contingent payment protocol involves two mutually distrustful parties, a buyer and a seller, operating on the same blockchain, and a digital product, whose ownership is not tracked on a blockchain (e.g. a digital book). The buyer holds c…
View article: Fast and Secure Decentralized Optimistic Rollups Using Setchain
Fast and Secure Decentralized Optimistic Rollups Using Setchain Open
Modern blockchains face a scalability challenge due to the intrinsic throughput limitations of consensus protocols. Layer 2 optimistic rollups (L2) are a faster alternative that offer the same interface in terms of smart contract developme…
View article: Effects of Monitoring Frailty Through a Mobile/Web-Based Application and a Sensor Kit to Prevent Functional Decline in Frail and Prefrail Older Adults: FACET (Frailty Care and Well Function) Pilot Randomized Controlled Trial (Preprint)
Effects of Monitoring Frailty Through a Mobile/Web-Based Application and a Sensor Kit to Prevent Functional Decline in Frail and Prefrail Older Adults: FACET (Frailty Care and Well Function) Pilot Randomized Controlled Trial (Preprint) Open
BACKGROUND Frailty represents a state of susceptibility to stressors and constitutes a dynamic process. Untreated, this state can progress to disability. Hence, timely detection of alterations in patients’ frailty status is imperative to …
View article: LedgerLocks: A Security Framework for Blockchain Protocols Based on Adaptor Signatures
LedgerLocks: A Security Framework for Blockchain Protocols Based on Adaptor Signatures Open
The scalability and interoperability challenges in current cryptocurrencies have motivated the design of cryptographic protocols that enable efficient applications on top and across widely used cryptocurrencies such as Bitcoin or Ethereum.…
View article: Sleepy Channels
Sleepy Channels Open
Payment channels (PC) are a promising solution to the scalability issue of cryptocurrencies, allowing users to perform the bulk of the transactions off-chain without needing to post everything on the blockchain. Many PC proposals however, …
View article: Adoption and Actual Privacy of Decentralized CoinJoin Implementations in Bitcoin
Adoption and Actual Privacy of Decentralized CoinJoin Implementations in Bitcoin Open
We present a first measurement study on the adoption and actual privacy of two popular decentralized CoinJoin implementations, Wasabi and Samourai, in the broader Bitcoin ecosystem. By applying highly accurate (¿ 99%) algorithms we can eff…
View article: Watch Your Back: Identifying Cybercrime Financial Relationships in Bitcoin through Back-and-Forth Exploration
Watch Your Back: Identifying Cybercrime Financial Relationships in Bitcoin through Back-and-Forth Exploration Open
Cybercriminals often leverage Bitcoin for their illicit activities. In this work, we propose back-and-forth exploration, a novel automated Bitcoin transaction tracing technique to identify cybercrime financial relationships. Given seed add…
View article: Adoption and Actual Privacy of Decentralized CoinJoin Implementations in Bitcoin
Adoption and Actual Privacy of Decentralized CoinJoin Implementations in Bitcoin Open
We present a first measurement study on the adoption and actual privacy of two popular decentralized CoinJoin implementations, Wasabi and Samourai, in the broader Bitcoin ecosystem. By applying highly accurate (> 99%) algorithms we can eff…
View article: Pinpointing and Measuring Wasabi and Samourai CoinJoins in the Bitcoin Ecosystem.
Pinpointing and Measuring Wasabi and Samourai CoinJoins in the Bitcoin Ecosystem. Open
We present a first measurement study on two popular wallets with built-in distributed CoinJoin functionality, Wasabi and Samourai, in the context of the broader Bitcoin ecosystem. By applying two novel heuristics, we can effectively pinpoi…
View article: Cross-Layer Deanonymization Methods in the Lightning Protocol
Cross-Layer Deanonymization Methods in the Lightning Protocol Open
Dataset retrieved and used with the code hosted here for this paper published at FC '21. Abstract Bitcoin (BTC) pseudonyms (layer 1) can effectively be deanonymized using heuristic clustering techniques. However, while performing transacti…
View article: The Transaction Graph for Modeling Blockchain Semantics
The Transaction Graph for Modeling Blockchain Semantics Open
The advent of Bitcoin paved the way for a plethora of blockchain systems supporting diverse applications beyond cryptocurrencies. Although in-depth studies of the consensus protocols as well as the privacy of blockchain transactions are av…
View article: Optimizing Virtual Payment Channel Establishment in the Face of On-Path Adversaries
Optimizing Virtual Payment Channel Establishment in the Face of On-Path Adversaries Open
Payment channel networks (PCNs) are among the most promising solutions to the scalability issues in permissionless blockchains, by allowing parties to pay each other off-chain through a path of payment channels (PCs). However, routing tran…
View article: A Quantitative Analysis of Security, Anonymity and Scalability for the Lightning Network
A Quantitative Analysis of Security, Anonymity and Scalability for the Lightning Network Open
Payment channel networks have been introduced to mitigate the scalability issues inherent to permissionless decentralized cryptocurrencies such as Bitcoin. Launched in 2018, the Lightning Network (LN) has been gaining popularity and consis…
View article: <i>MoneyMorph</i>: Censorship Resistant Rendezvous using Permissionless Cryptocurrencies
<i>MoneyMorph</i>: Censorship Resistant Rendezvous using Permissionless Cryptocurrencies Open
Cryptocurrencies play a major role in the global financial ecosystem. Their presence across different geopolitical corridors, including in repressive regimes, has been one of their striking features. In this work, we leverage this feature …
View article: Cross-Layer Deanonymization Methods in the Lightning Protocol
Cross-Layer Deanonymization Methods in the Lightning Protocol Open
Bitcoin (BTC) pseudonyms (layer 1) can effectively be deanonymized using heuristic clustering techniques. However, while performing transactions off-chain (layer 2) in the Lightning Network (LN) seems to enhance privacy, a systematic analy…
View article: Concurrency and Privacy with Payment-Channel Networks
Concurrency and Privacy with Payment-Channel Networks Open
Permissionless blockchains protocols such as Bitcoin are inherently limited in transaction throughput and latency. Current efforts to address this key issue focus on off-chain payment channels that can be combined in a Payment-Channel Netw…
View article: Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability
Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability Open
Tremendous growth in cryptocurrency usage is exposing the inherent scalability issues with permissionless blockchain technology.Payment-channel networks (PCNs) have emerged as the most widely deployed solution to mitigate the scalability i…
View article: Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions
Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions Open
Path-based transaction (PBT) networks, which settle payments from one user to another via a path of intermediaries, are a growing area of research. They overcome the scalability and privacy issues in cryptocurrencies like Bitcoin and Ether…
View article: Exploring Confidentiality Issues in Hyperledger Fabric Business Applications
Exploring Confidentiality Issues in Hyperledger Fabric Business Applications Open
The rise of Bitcoin and cryptocurrencies over the last decade have made its underlying technology (blockchain) come into the spotlight. Blockchain is a secure ledger of linked records called blocks. These records are cryptographically immu…
View article: Mind Your Credit
Mind Your Credit Open
The Ripple credit network has emerged as a payment backbone with key advantages for financial institutions and the remittance industry. Its path-based IOweYou (IOU) settlements across different (crypto)currencies conceptually distinguishes…
View article: PathShuffle: Credit Mixing and Anonymous Payments for Ripple
PathShuffle: Credit Mixing and Anonymous Payments for Ripple Open
The I owe you (IOU) credit network Ripple is one of the most prominent alternatives in the burgeoning field of decentralized payment systems. Ripple’s path-based transactions set it apart from cryptocurrencies such as Bitcoin. Its pseudony…
View article: Mind Your Credit: Assessing the Health of the Ripple Credit Network
Mind Your Credit: Assessing the Health of the Ripple Credit Network Open
The Ripple credit network has emerged as a payment backbone with key advantages for financial institutions and the remittance industry. Its path-based IOweYou (IOU) settlements across different (crypto)currencies conceptually distinguishes…
View article: Listening to Whispers of Ripple: Linking Wallets and Deanonymizing Transactions in the Ripple Network
Listening to Whispers of Ripple: Linking Wallets and Deanonymizing Transactions in the Ripple Network Open
The decentralized I owe you (IOU) transaction network Ripple is gaining prominence as a fast, low-cost and efficient method for performing same and cross-currency payments. Ripple keeps track of IOU credit its users have granted to their b…