Publications
Peer-reviewed Papers:
ADESS: A Proof-of-Work Blockchain Protocol to Deter Double-Spend Attacks (2024)
Authors: Daniel Aronoff, Isaac Ardis
APA Citation: Aronoff, D., Ardis, I. (2024). ADESS: A Proof-of-Work Protocol to Deter Double-Spend Attacks. In: Arai, K. (eds) Advances in Information and Communication. FICC 2024. Lecture Notes in Networks and Systems, vol 920. Springer, Cham. https://link.springer.com/chapter/10.1007/978-3-031-53963-3_11
Authors: James Lovejoy, Cory Fields, Madars Virza, Tyler Frederick, David Urness, Kevin Karwaski, Anders Brownworth, Neha Narula
APA Citation: Lovejoy, J., Fields, C., Virza, M., Frederick, T., Urness, D., Karwaski, K., Brownworth, A. & Narula, N. (2023). Hamilton: A High-Performance Transaction Processor for Central Bank Digital Currencies. 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI 23). https://www.usenix.org/conference/nsdi23/presentation/lovejoy
Double-Spend Counterattacks: Threat of Retaliation in Proof-of-Work Systems (2020)
Authors: Daniel J. Moroz, Daniel J. Aronoff, Neha Narula, David C. Parkes
APA Citation: Moroz, D. J., Aronoff, D. J., Narula, N., & Parkes, D. C. (2020). Double-Spend Counter-Attacks: Threat of Retaliation in Proof-of-Work Systems. Cryptoeconomic Systems, 0(1). https://cryptoeconomicsystems.pubpub.org/pub/cb2oh2jw
Clockwork: An Exchange Protocol for Proofs of Non Front-Running (2020)
Authors: Dan Cline, Thaddeus Dryja, Neha Narula
APA Citation: Cline, D., Dryja, T., & Narula, N. (2020). Clockwork: an exchange protocol for proofs of non front-running. The Stanford Blockchain Conference.
Responsible Vulnerability Disclosure in Cryptocurrencies (2020)
Authors: Rainer Böhme, Lisa Eckey, Tyler Moore, Neha Narula, Tim Ruffing, Aviv Zohar
APA Citation: Böhme, R., Eckey, L., Moore, T., Narula, N., Ruffing, T., & Zohar, A. (2020). Responsible Vulnerability Disclosure in Cryptocurrencies. Communications of the ACM, 63(10), 62-71. https://cacm.acm.org/research/responsible-vulnerability-disclosure-in-cryptocurrencies/
Going from bad to worse: from Internet voting to blockchain voting
Authors: Sunoo Park, Michael Specter, Neha Narula, Ronald L Rivest
APA Citation: Park, S., Specter, M., Narula, N., & Rivest, R. L. (2021). Going from bad to worse: from internet voting to blockchain voting. Journal of Cybersecurity, 7(1), tyaa025l,
https://doi.org/10.1093/cybsec/tyaa025
Cryptanalysis of Curl-P and Other Attacks on the IOTA Cryptocurrency (2020)
Authors: Ethan Heilman, Neha Narula, Garrett Tanzer, James Lovejoy, Michael Colavita, Madars Virza, Tadge Dryja
APA Citation: Heilman, E., Narula, N., Tanzer, G., Lovejoy, J., Colavita, M., Virza, M., & Dryja, T. (2020). Cryptanalysis of Curl-P and Other Attacks on the IOTA Cryptocurrency. IACR
Transactions on Symmetric Cryptology, 2020(3), 367-391. https://doi.org/10.13154/tosc.v2020.i3.367-391
A Lower Bound for Byzantine Agreement and Consensus for Adaptive Adversaries using VDFs (2020)
Authors: Thaddeus Dryja, Quanquan Liu, Neha Narula
APA Citation: Dryja, T., Liu, Q. C., & Narula, N. (2020). A Lower Bound for Byzantine Agreement and Consensus for Adaptive Adversaries using VDFs. CoRR abs/2004.01939. https://arxiv.org/pdf/2004.01939
On the Financing Benefits of Supply Chain Transparency and Blockchain Adoption (2020)
Authors: Jiri Chod, Nikolaos Trichakis, Gerry Tsoukalas, Henry Aspegren, Mark Weber
APA Citation: Chod, J., Trichakis, N., Tsoukalas, G., Aspegren, H., & Weber, M. (2020). On the Financing Benefits of Supply Chain Transparency and Blockchain Adoption. Management Science 66(10):4378-4396. https://doi.org/10.1287/mnsc.2019.3434
Compelled Decryption and the Fifth Amendment: Exploring the Technical Boundaries (2018)
Authors: Aloni Cohen, Sunoo Park
APA Citation: Cohen, A., & Park, S. (2018). Compelled Decryption and the Fifth Amendment: Exploring the Technical Boundaries. Harv. JL & Tech., 32, 169. https://jolt.law.harvard.edu/assets/articlePDFs/v32/32HarvJLTech169.pdf
The Impact of Blockchain Technology on Finance: A Catalyst for Change (2018)
Authors: Michael Casey, Jonah Crane, Gary Gensler, Simon Johnson, Neha Narula
APA Citation: Casey, M, J Crane, G Gensler, S Johnson and N Narula (eds) (2018), ‘Geneva 21: The Impact of Blockchain Technology on Finance: A Catalyst for Change‘, CEPR Press, Paris & London. https://cepr.org/publications/books-and-reports/geneva-21-impact-blockchain-technology-finance-catalyst-change
Practical Accountability of Secret Processes (2018)
Authors: Jonathan Frankle, Sunoo Park, Daniel Shaar, Shafi Goldwasser, Daniel Weitzner
APA Citation: Frankle, J., Park, S., Shaar, D., Goldwasser, S., & Weitzner, D. (2018). Practical Accountability of Secret Processes. In 27th USENIX Security Symposium (USENIX Security 18) (pp. 657-674). https://www.usenix.org/conference/usenixsecurity18/presentation/frankie
It wasn’t me! Repudiability and Unclaimability of Ring Signatures (2018)
Authors: Sunoo Park, Adam Sealfon
APA Citation: Park, S., & Sealfon, A. (2019). It wasn’t me! Repudiability and claimability of ring signatures. In Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part III 39 (pp. 159-190). Springer International Publishing. https://link.springer.com/chapter/10.1007/978-3-030-26954-8_6
Static-Memory-Hard Functions, and Modeling the Cost of Space vs. Time (2018)
Authors: Thaddeus Dryja, Quanquan Liu, Sunoo Park
APA Citation: Dryja, T., Liu, Q. C., & Park, S. (2018). Static-memory-hard functions, and modeling the cost of space vs. time. In Theory of Cryptography: 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part I 16 (pp. 33-66). Springer International Publishing. https://eprint.iacr.org/2018/205.pdf
zkLedger: Privacy-Preserving Auditing for Distributed Ledgers (2018)
Authors: Neha Narula, Willy Vasquez, Madars Virza
APA Citation: Narula, N., Vasquez, W., & Virza, M. (2018). zkLedger:Privacy-Preserving Auditing for Distributed Ledgers. In 15th USENIX symposium on networked systems design and implementation (NSDI 18) (pp. 65-80). https://www.usenix.org/system/files/conference/nsdi18/nsdi18-narula.pdf
SpaceMint: A Cryptocurrency Based on Proofs of Space (2017)
Authors: Sunoo Park, Albert Kwon, Georg Fuchsbauer, Peter Gaži, Joël Alwen, Krzysztof Pietrzak
APA Citation: Park, S., Kwon, A., Fuchsbauer, G., Gaži, P., Alwen, J., & Pietrzak, K. (2018). Spacemint: A Cryptocurrency Based on Proofs of Space. In Financial Cryptography and Data Security: 22nd International Conference, FC 2018, Nieuwpoort, Curaçao, February 26–March 2, 2018, Revised Selected Papers 22 (pp. 480-499). Springer Berlin Heidelberg. https://link.springer.com/chapter/10.1007/978-3-662-58387-6_26
Reports:
Beware the Weak Sentinel: Making OpenCBDC Auditable without Compromising Privacy (working draft)
Targeted Nakamoto: A Bitcoin Protocol to Balance Network Security and Energy Consumption (in submission)
Enhancing the Privacy of a Digital Pound with the Bank of England (2024)
Application of Programmability to Commercial Banking and Payments with JPMC (2024)
A Framework for Programmability in Digital Currency (2023)
PARSEC: Executing Smart Contracts in Parallel (2023) - pdf of executive summary
CBDC: Expanding Financial Inclusion or Deepening the Divide (2022) - pdf of executive summary
Project Hamilton Phase 1 Executive Summary (2022)
The Future of Our Money: Centering Users in the Design of Digital Currency (2021) - pdf of executive summary
51% Attacks report 5 - January 23 - February 5 reorgs (no defense) (2020)
51% Attacks report 4 - Bitcoin Gold (BTG) was 51% attacked (2020)
51% Attacks report 3 - Vertcoin (VTC) was 51% attacked (2020)
51% Attacks report 2 - Expanse (EXP) was 51% attacked (2019)
51% Attacks report 1 - Litecoin Cash (LCC) was 51% attacked (2019)
Utreexo: A dynamic hash-based accumulator optimized for the Bitcoin UTXO set (2019)
The Decentralized Web: Defending Internet Freedom through Decentralization: Back to the Future? (2017)
Discreet Log Contracts (2017)
Student Master’s Theses:
Scaling Privacy Preserving Payments (2024)
Mitigating Undercutting Attacks: A Study on Mining and Transaction Fee Behavior (2024)
Transformable Discreet Log Contracts (2021)
b_verify: Scalable Non-Equivocation for Verifiable Management of Data (2017)
Auditable Private Ledgers (2016)
Code:
Blockchain Labs Working Group Reports (MIT student action lab course)
Adoption of Digital Currencies at Scale in Online Retail Payments with American Express (2021)
Wholesale CBDC: Potential Impacts to Dollar Funding Markets with Fidelity Investments (2021)
Lightning Network Interest Rate with Fidelity (2021)
Mining Pools with Fidelity (2021)
Digital Identity: International Benchmarking with the Federal Reserve Bank of Boston (2021)
Central Bank Digital Currency (CBDC) Privacy with Boston Consulting Group (BCG) (2020)
Central Bank Digital Currency (CBDC) Flowback Impact with Monetary Authority of Singapore (MAS) (2020)
Price Discovery in the Bitcoin Spot and Derivatives Markets (Spot vs. Unregulated with Fidelity) (2020)
Bitcoin and Bitcoin Derivatives with Fidelity (2020)
Traceability in Genetic Data Sharing (Healthcare Applications with Boston Consulting Group (BCG)) (2019)
The Shipping Industry & Blockchain Interoperability (Blockchain Interoperability with Deloitte) (2019)
UTreeXO (UTreeXO Wallet with Digital Garage (DG)) (2019)
The Economics of Mining with Fidelity (2019)
Loanchain Protocol (Social Capital and Blockchain with Nomura Research Institute (NRI)) (2019)
Network Value To Transaction Volume (NVT) Analysis (Valuing Cryptoassets with Fidelity) (2018)
Capital Formation in the Age of Blockchain (Initial Coin Offerings with Fidelity) (2018)
Does your Supply Chain Need a Blockchain? (Supply Chains with the Boston Consulting Company (BCG)) (2018)