Skip to main content

Showing 1–11 of 11 results for author: Avarikioti, Z

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.18214  [pdf, other

    cs.GT cs.CE

    A Composable Game-Theoretic Framework for Blockchains

    Authors: Zeta Avarikioti, Georg Fuchsbauer, Pim Keer, Matteo Maffei, Fabian Regen

    Abstract: Blockchains rely on economic incentives to ensure secure and decentralised operation, making incentive compatibility a core design concern. However, protocols are rarely deployed in isolation. Applications interact with the underlying consensus and network layers, and multiple protocols may run concurrently on the same chain. These interactions give rise to complex incentive dynamics that traditio… ▽ More

    Submitted 25 April, 2025; originally announced April 2025.

    Comments: 19 pages (12 for main paper), 5 figures

  2. arXiv:2504.14965  [pdf, other

    cs.CR

    A Security Framework for General Blockchain Layer 2 Protocols

    Authors: Zeta Avarikioti, Matteo Maffei, Yuheng Wang

    Abstract: Layer 2 (L2) solutions are the cornerstone of blockchain scalability, enabling high-throughput and low-cost interactions by shifting execution off-chain while maintaining security through interactions with the underlying ledger. Despite their common goals, the principal L2 paradigms -- payment channels, rollups, and sidechains -- differ substantially in architecture and assumptions, making it diff… ▽ More

    Submitted 21 April, 2025; originally announced April 2025.

  3. arXiv:2503.16783  [pdf, ps, other

    cs.CR cs.DC

    CoBRA: A Universal Strategyproof Confirmation Protocol for Quorum-based Proof-of-Stake Blockchains

    Authors: Zeta Avarikioti, Eleftherios Kokoris Kogias, Ray Neiheiser, Christos Stefo

    Abstract: We present a formal analysis of quorum-based State Machine Replication (SMR) protocols in Proof-of-Stake (PoS) systems under a hybrid threat model comprising honest, Byzantine, and rational validators. Our analysis of traditional quorum-based protocols establishes two fundamental impossibility results: (1) in partially synchronous networks, no quorum-based protocol can achieve SMR when rational an… ▽ More

    Submitted 13 June, 2025; v1 submitted 20 March, 2025; originally announced March 2025.

  4. arXiv:2503.10185  [pdf, other

    cs.GT cs.CR

    Optimal Reward Allocation via Proportional Splitting

    Authors: Lukas Aumayr, Zeta Avarikioti, Dimitris Karakostas, Karl Kreder, Shreekara Shastry

    Abstract: Following the publication of Bitcoin's arguably most famous attack, selfish mining, various works have introduced mechanisms to enhance blockchain systems' game theoretic resilience. Some reward mechanisms, like FruitChains, have been shown to be equilibria in theory. However, their guarantees assume non-realistic parameters and their performance degrades significantly in a practical deployment se… ▽ More

    Submitted 13 March, 2025; originally announced March 2025.

  5. arXiv:2501.14418  [pdf, other

    cs.CR cs.DC cs.GT

    Thunderdome: Timelock-Free Rationally-Secure Virtual Channels

    Authors: Zeta Avarikioti, Yuheng Wang, Yuyi Wang

    Abstract: Payment channel networks (PCNs) offer a promising solution to address the limited transaction throughput of deployed blockchains. However, several attacks have recently been proposed that stress the vulnerability of PCNs to timelock and censoring attacks. To address such attacks, we introduce Thunderdome, the first timelock-free PCN. Instead, Thunderdome leverages the design rationale of virtual c… ▽ More

    Submitted 2 February, 2025; v1 submitted 24 January, 2025; originally announced January 2025.

  6. arXiv:2402.01363  [pdf, other

    cs.CR

    Bribe & Fork: Cheap Bribing Attacks via Forking Threat

    Authors: Zeta Avarikioti, Paweł Kędzior, Tomasz Lizurej, Tomasz Michalak

    Abstract: In this work, we reexamine the vulnerability of Payment Channel Networks (PCNs) to bribing attacks, where an adversary incentivizes blockchain miners to deliberately ignore a specific transaction to undermine the punishment mechanism of PCNs. While previous studies have posited a prohibitive cost for such attacks, we show that this cost may be dramatically reduced (to approximately \$125), thereby… ▽ More

    Submitted 17 July, 2024; v1 submitted 2 February, 2024; originally announced February 2024.

    Comments: This is a full version of the paper Bribe & Fork: Cheap Bribing Attacks via Forking Threat which was accepted to AFT'24

  7. arXiv:2306.16006  [pdf, other

    cs.GT cs.CR

    Lightning Creation Games

    Authors: Zeta Avarikioti, Tomasz Lizurej, Tomasz Michalak, Michelle Yeo

    Abstract: Payment channel networks (PCNs) are a promising solution to the scalability problem of cryptocurrencies. Any two users connected by a payment channel in the network can theoretically send an unbounded number of instant, costless transactions between them. Users who are not directly connected can also transact with each other in a multi-hop fashion. In this work, we study the incentive structure be… ▽ More

    Submitted 28 June, 2023; originally announced June 2023.

  8. arXiv:2205.11597  [pdf, other

    cs.CR cs.DC

    Wiser: Increasing Throughput in Payment Channel Networks with Transaction Aggregation

    Authors: Samarth Tiwari, Michelle Yeo, Zeta Avarikioti, Iosif Salem, Krzysztof Pietrzak, Stefan Schmid

    Abstract: Payment channel networks (PCNs) are one of the most prominent solutions to the limited transaction throughput of blockchains. Nevertheless, PCNs suffer themselves from a throughput limitation due to the capital constraints of their channels. A similar dependence on high capital is also found in inter-bank payment settlements, where the so-called netting technique is used to mitigate liquidity dema… ▽ More

    Submitted 23 May, 2022; originally announced May 2022.

  9. arXiv:2110.08848  [pdf, other

    cs.CR cs.DC

    HIDE & SEEK: Privacy-Preserving Rebalancing on Payment Channel Networks

    Authors: Zeta Avarikioti, Krzysztof Pietrzak, Iosif Salem, Stefan Schmid, Samarth Tiwari, Michelle Yeo

    Abstract: Payment channels effectively move the transaction load off-chain thereby successfully addressing the inherent scalability problem most cryptocurrencies face. A major drawback of payment channels is the need to ``top up'' funds on-chain when a channel is depleted. Rebalancing was proposed to alleviate this issue, where parties with depleting channels move their funds along a cycle to replenish thei… ▽ More

    Submitted 17 October, 2021; originally announced October 2021.

  10. arXiv:2009.02235  [pdf, other

    cs.DC

    FnF-BFT: Exploring Performance Limits of BFT Protocols

    Authors: Zeta Avarikioti, Lioba Heimbach, Roland Schmid, Laurent Vanbever, Roger Wattenhofer, Patrick Wintermeyer

    Abstract: We introduce FnF-BFT, a parallel-leader byzantine fault-tolerant state-machine replication protocol for the partially synchronous model with theoretical performance bounds during synchrony. By allowing all replicas to act as leaders and propose requests independently, FnF-BFT parallelizes the execution of requests. Leader parallelization distributes the load over the entire network -- increasing t… ▽ More

    Submitted 10 March, 2021; v1 submitted 4 September, 2020; originally announced September 2020.

    Comments: 31 pages, 25 figures (including algorithms)

  11. arXiv:1912.04797  [pdf, other

    cs.GT

    Ride the Lightning: The Game Theory of Payment Channels

    Authors: Zeta Avarikioti, Lioba Heimbach, Yuyi Wang, Roger Wattenhofer

    Abstract: Payment channels were introduced to solve various eminent cryptocurrency scalability issues. Multiple payment channels build a network on top of a blockchain, the so-called layer 2. In this work, we analyze payment networks through the lens of network creation games. We identify betweenness and closeness centrality as central concepts regarding payment networks. We study the topologies that emerge… ▽ More

    Submitted 10 December, 2019; originally announced December 2019.

    Comments: In Proceedings of Financial Cryptography and Data Security (FC) 2020