dc.contributor.advisor | Kiayias, Aggelos | |
dc.contributor.advisor | Etessami, Kousha | |
dc.contributor.author | Thyfronitis Litos, Orfeas Stefanos | |
dc.contributor.author | Litos, Orfeas | |
dc.date.accessioned | 2022-06-22T09:58:20Z | |
dc.date.available | 2022-06-22T09:58:20Z | |
dc.date.issued | 2022-07-11 | |
dc.identifier.uri | https://hdl.handle.net/1842/39168 | |
dc.identifier.uri | http://dx.doi.org/10.7488/era/2419 | |
dc.description.abstract | The advent of blockchains has expanded the horizon of possibilities to novel decentralised applications and protocols that were not possible before. Designing and building such applications, be it for offering new ways for humans to interact or for circumventing the shortcomings of existing blockchains, requires analysing their security
with a rigorous and multi-faceted approach. Indeed, the attack surface of decentralised,
trustless applications is vastly more expansive than that of classical, server-client-based
ones. Desirable properties such as security, privacy and scalability are attainable via
established and widely applied approaches in the centralised case, where clients can
afford to trust third party servers. Is it possible though for clients to self organize and
attain these properties in use cases of interest without reliance on central authorities?
We examine this question in the setting of a variety of blockchain-based applications.
With an explicit aim of improving the state of the art and extending the limits of possible decentralised operations with precision and robustness, the present thesis explores,
builds, analyses, and improves upon payments, content curation and decision making. | en |
dc.language.iso | en | en |
dc.publisher | The University of Edinburgh | en |
dc.relation.hasversion | Kiayias A., Litos O. S. T.: Elmo: Recursive Virtual Payment Channels for Bit coin. IACR Cryptol. ePrint Arch.: p. 747: URL https://eprint.iacr.org/ 2021/747 (2021) | en |
dc.relation.hasversion | Kiayias A., Litos O. S. T.: A Composable Security Treatment of the Light ning Network. In 33rd IEEE Computer Security Foundations Symposium, CSF 2020, Boston, MA, USA, June 22-26, 2020: pp. 334–349: doi:10.1109/ CSF49147.2020.00031: URL https://doi.org/10.1109/CSF49147.2020. 00031 (2020) | en |
dc.relation.hasversion | Kiayias A., Livshits B., Mosteiro A. M., Litos O. S. T.: A Puff of Steem: Se curity Analysis of Decentralized Content Curation. In International Conference on Blockchain Economics, Security and Protocols, Tokenomics 2019, May 6- 7, 2019, Paris, France: pp. 3:1–3:21: doi:10.4230/OASIcs.Tokenomics.2019.3: URL https://doi.org/10.4230/OASIcs.Tokenomics.2019.3 (2019) | en |
dc.subject | blockchain | en |
dc.subject | decentralised applications | en |
dc.subject | security | en |
dc.subject | performance | en |
dc.subject | decentralised payment networks | en |
dc.title | Reclaiming scalability and privacy in the decentralized setting | en |
dc.type | Thesis or Dissertation | en |
dc.type.qualificationlevel | Doctoral | en |
dc.type.qualificationname | PhD Doctor of Philosophy | en |