Skip to main content

Showing 1–13 of 13 results for author: Bissias, G

Searching in archive cs. Search in all archives.
.
  1. arXiv:2502.10592  [pdf, other

    cs.GT

    Deploying Fair and Efficient Course Allocation Mechanisms

    Authors: George Bissias, Cyrus Cousins, Paula Navarrete Diaz, Yair Zick

    Abstract: Universities regularly face the challenging task of assigning classes to thousands of students while considering their preferences, along with course schedules and capacities. Ensuring the effectiveness and fairness of course allocation mechanisms is crucial to guaranteeing student satisfaction and optimizing resource utilization. We approach this problem from an economic perspective, using formal… ▽ More

    Submitted 14 February, 2025; originally announced February 2025.

  2. arXiv:2306.12206  [pdf, other

    cs.CR cs.DC

    Tailstorm: A Secure and Fair Blockchain for Cash Transactions

    Authors: Patrik Keller, Ben Glickenhaus, George Bissias, Gregory Griffith

    Abstract: Proof-of-work (PoW) cryptocurrencies rely on a balance of security and fairness in order to maintain a sustainable ecosystem of miners and users. Users demand fast and consistent transaction confirmation, and in exchange drive the adoption and valuation of the cryptocurrency. Miners provide the confirmations, however, they primarily seek rewards. In unfair systems, miners can amplify their rewards… ▽ More

    Submitted 21 June, 2023; originally announced June 2023.

  3. arXiv:2012.03706  [pdf, other

    cs.CR

    Pricing Security in Proof-of-Work Systems

    Authors: George Bissias, Rainer Böhme, David Thibodeau, Brian N. Levine

    Abstract: A key component of security in decentralized blockchains is proof of opportunity cost among block producers. In the case of proof-of-work (PoW), currently used by the most prominent systems, the cost is due to spent computation. In this paper, we characterize the security investment of miners in terms of its cost in fiat money. This enables comparison of security allocations across PoW blockchains… ▽ More

    Submitted 7 December, 2020; originally announced December 2020.

  4. arXiv:2007.05991  [pdf, other

    cs.CR

    Radium: Improving Dynamic PoW Targeting

    Authors: George Bissias

    Abstract: Most PoW blockchain protocols operate with a simple mechanism whereby a threshold is set for each block and miners generate block hashes until one of those values falls below the threshold. Although largely effective, this mechanism produces blocks at a highly variable rate and also leaves a blockchain susceptible to chain death, i.e. abandonment in the event that the threshold is set too high to… ▽ More

    Submitted 12 July, 2020; originally announced July 2020.

  5. arXiv:1907.09883  [pdf, other

    cs.GT cs.CR

    Greedy but Cautious: Conditions for Miner Convergence to Resource Allocation Equilibrium

    Authors: George Bissias, Brian N. Levine, David Thibodeau

    Abstract: All public blockchains are secured by a proof of opportunity cost among block producers. For example, the security offered by proof-of-work (PoW) systems, like Bitcoin, is due to spent computation; it is work precisely because it cannot be performed for free. In general, more resources provably lost in producing blocks yields more security for the blockchain. When two blockchains share the same me… ▽ More

    Submitted 26 August, 2019; v1 submitted 19 July, 2019; originally announced July 2019.

  6. arXiv:1907.00302  [pdf, other

    cs.CR

    Bonded Mining: Difficulty Adjustment by Miner Commitment

    Authors: George Bissias, David Thibodeau, Brian N. Levine

    Abstract: Proof-of-work blockchains must implement a difficulty adjustment algorithm (DAA) in order to maintain a consistent inter-arrival time between blocks. Conventional DAAs are essentially feedback controllers, and as such, they are inherently reactive. This approach leaves them susceptible to manipulation and often causes them to either under- or over-correct. We present Bonded Mining, a proactive DAA… ▽ More

    Submitted 5 August, 2019; v1 submitted 29 June, 2019; originally announced July 2019.

  7. arXiv:1901.04934  [pdf, other

    cs.DS

    An Algorithm for Bounding the Probability of r-core Formation in k-uniform Random Hypergraphs

    Authors: George Bissias

    Abstract: We present an algorithm for bounding the probability of r-core formation in k-uniform hypergraphs. Understanding the probability of core formation is useful in numerous applications including bounds on the failure rate of Invertible Bloom Lookup Tables (IBLTs) and the probability that a boolean formula is satisfiable.

    Submitted 15 January, 2019; originally announced January 2019.

  8. Ektelo: A Framework for Defining Differentially-Private Computations

    Authors: Dan Zhang, Ryan McKenna, Ios Kotsogiannis, George Bissias, Michael Hay, Ashwin Machanavajjhala, Gerome Miklau

    Abstract: The adoption of differential privacy is growing but the complexity of designing private, efficient and accurate algorithms is still high. We propose a novel programming framework and system, Ektelo, for implementing both existing and new privacy algorithms. For the task of answering linear counting queries, we show that nearly all existing algorithms can be composed from operators, each conforming… ▽ More

    Submitted 24 May, 2019; v1 submitted 10 August, 2018; originally announced August 2018.

    Comments: Journal version under submission

  9. arXiv:1806.07189  [pdf, other

    cs.CR

    Using Economic Risk to Model Miner Hash Rate Allocation in Cryptocurrencies

    Authors: George Bissias, Brian N. Levine, David Thibodeau

    Abstract: Abrupt changes in the miner hash rate applied to a proof-of-work (PoW) blockchain can adversely affect user experience and security. Because different PoW blockchains often share hashing algorithms, miners face a complex choice in deciding how to allocate their hash power among chains. We present an economic model that leverages Modern Portfolio Theory to predict a miner's allocation over time usi… ▽ More

    Submitted 19 June, 2018; originally announced June 2018.

  10. arXiv:1709.08750  [pdf, other

    cs.CR

    Bobtail: A Proof-of-Work Target that Minimizes Blockchain Mining Variance (Draft)

    Authors: George Bissias, Brian Neil Levine

    Abstract: Blockchain systems are designed to produce blocks at a constant average rate. The most popular systems currently employ a Proof of Work (PoW) algorithm as a means of creating these blocks. Bitcoin produces, on average, one block every 10 minutes. An unfortunate limitation of all deployed PoW blockchain systems is that the time between blocks has high variance. For example, 5% of the time, Bitcoin'… ▽ More

    Submitted 13 August, 2019; v1 submitted 25 September, 2017; originally announced September 2017.

  11. arXiv:1707.00082  [pdf, other

    cs.CR

    Estimation of Miner Hash Rates and Consensus on Blockchains (draft)

    Authors: A. Pinar Ozisik, George Bissias, Brian Levine

    Abstract: We make several contributions that quantify the real-time hash rate and therefore the consensus of a blockchain. We show that by using only the hash value of blocks, we can estimate and measure the hash rate of all miners or individual miners, with quanti able accuracy. We apply our techniques to the Ethereum and Bitcoin blockchains; our solution applies to any proof-of-work-based blockchain that… ▽ More

    Submitted 30 June, 2017; originally announced July 2017.

  12. arXiv:1701.03945  [pdf, other

    cs.CR

    Securing the Assets of Decentralized Applications using Financial Derivatives (DRAFT)

    Authors: George Bissias, Brian Levine, Nikunj Kapadia

    Abstract: Ethereum contracts can be designed to function as fully decentralized applications called DAPPs. Many DAPPs have already been fielded, including an online marketplace, a role playing game, a prediction market, and an Internet service provider. Unfortunately, DAPPs can be hacked, and the assets they control can be stolen. A recent attack on an Ethereum decentralized application called The DAO demon… ▽ More

    Submitted 14 January, 2017; originally announced January 2017.

  13. arXiv:1610.07985  [pdf, other

    cs.CR

    An Analysis of Attacks on Blockchain Consensus

    Authors: George Bissias, Brian Neil Levine, A. Pinar Ozisik, Gavin Andresen

    Abstract: We present and validate a novel mathematical model of the blockchain mining process and use it to conduct an economic evaluation of the double-spend attack, which is fundamental to all blockchain systems. Our analysis focuses on the value of transactions that can be secured under a conventional double-spend attack, both with and without a concurrent eclipse attack. Our model quantifies the importa… ▽ More

    Submitted 20 November, 2016; v1 submitted 25 October, 2016; originally announced October 2016.