Skip to main content

Showing 1–3 of 3 results for author: Bettinger, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2503.19063  [pdf, other

    cs.DC

    COoL-TEE: Client-TEE Collaboration for Resilient Distributed Search

    Authors: Matthieu Bettinger, Etienne Rivière, Sonia Ben Mokhtar, Anthony Simonet-Boulogne

    Abstract: Current marketplaces rely on search mechanisms with distributed systems but centralized governance, making them vulnerable to attacks, failures, censorship and biases. While search mechanisms with more decentralized governance (e.g., DeSearch) have been recently proposed, these are still exposed to information head-start attacks (IHS) despite the use of Trusted Execution Environments (TEEs). These… ▽ More

    Submitted 24 March, 2025; originally announced March 2025.

  2. arXiv:2503.19055  [pdf, other

    cs.DC

    Reliability is Blind: Collective Incentives for Decentralized Computing Marketplaces without Individual Behavior Information

    Authors: Henry Mont, Matthieu Bettinger, Sonia Ben Mokhtar, Anthony Simonet-Boulogne

    Abstract: In decentralized cloud computing marketplaces, ensuring fair and efficient interactions among asset providers and end-users is crucial. A key concern is meeting agreed-upon service-level objectives like the service's reliability. In this decentralized context, traditional mechanisms often fail to address the complexity of task failures, due to limited available and trustworthy insights into these… ▽ More

    Submitted 24 March, 2025; originally announced March 2025.

  3. Collusion-Resistant Worker Set Selection for Transparent and Verifiable Voting

    Authors: Matthieu Bettinger, Lucas Barbero, Omar Hasan

    Abstract: Collusion occurs when multiple malicious participants of a distributed protocol work together to sabotage or spy on honest participants. Decentralized protocols often rely on a subset of participants called workers for critical operations. Collusion between workers can be particularly harmful to the security of the protocol. We propose two protocols that select a subset of workers from the set of… ▽ More

    Submitted 15 June, 2022; originally announced June 2022.

    Comments: 34 pages, 5 figures

    Journal ref: SN COMPUT. SCI. 3, 334 (2022)