YACL Talks
To be notified about future talks, register to our mailing list and calendar.
To view past talks, check our YouTube out.
Interested in giving a talk? Reach out!
YACL Talks
To be notified about future talks, register to our mailing list and calendar.
To view past talks, check our YouTube out.
Interested in giving a talk? Reach out!
Upcoming Talks
Jacob D. Leshno, Chicago Booth School of Business - On the Viability of Open-Source Financial Rails: The Economic Security of Permissionless Consensus
September 19, 2025, 11am ET
Abstract: Bitcoin demonstrated the possibility of a financial ledger that operates without the need for a trusted central authority. However, concerns persist regarding its security and considerable energy consumption. We assess the consensus protocols that underpin Bitcoin's functionality, questioning whether they can ensure economically meaningful security while maintaining a permissionless design that allows free entry of operators. We answer this affirmatively by constructing a protocol that guarantees economic security and preserves Bitcoin's permissionless design. This protocol's security does not depend on monetary payments to miners or immense electricity consumption, which our analysis suggests are ineffective. Our framework integrates economic theory with distributed systems theory, and formalizes the role of the protocol's user community.
Bio: Jacob studies market design, using theoretical tools to explore market structures and design effective market rules. His research has been recognized by the ACM SIGecom Test of Time Award and the INFORMS Frederick W. Lanchester Prize. A significant portion of his work focuses on matching markets, such as college admissions and the NRMP medical residency match. His research includes using tractable cutoff characterizations to clarify the structure of these markets and support empirical estimation and design optimization. He also work on cryptocurrencies, Web3, and blockchain technology. This technology allows for a new form of market design in the form of platforms whose rules are given by open-source computer code. His work explores the potential and limitations of these open systems. He taught a PhD class on the economics of distributed systems to bridge computer science theory and economic theory.
Livestream: https://yale.zoom.us/j/95177972176?pwd=50OPfMvWmn3z3IoEJrXcfoArBHrUkr.1
Ben Berger, Offchain Labs - BoLD: Fast and Cheap Dispute Resolution
September 26, 2025, 11am ET
Abstract: BoLD is a new dispute resolution protocol that is designed to replace the originally deployed Arbitrum dispute resolution protocol. Unlike that protocol, BoLD is resistant to delay attacks. It achieves this resistance without a significant increase in onchain computation costs and with reduced staking costs.
Bio: Ben is a research scientist at Offchain Labs, working on blockchain related problems mostly from an economic perspective. Prior to that he was a Ph.D. student at Tel Aviv University, under the supervision of Prof. Michal Feldman. During that time he studied a broad range of problems at the border of Computer Science and Economics. He received his M.Sc. from the Weizmann Institute of Science in 2018, where he was advised by Prof. Zvika Brakerski. During his M.Sc. he worked on Complexity Theory and Cryptography.
Livestream: https://yale.zoom.us/j/95323676182?pwd=24h5b6W80YhGp2mFFXQMEvdQ9jaDei.1
Friedhelm Victor, TRM Labs - TBA
October 3, 2025, 11am ET
Abstract: TBA.
Bio: Friedhelm is a Research Scientist at TRM Labs, a blockchain intelligence company that helps financial institutions, businesses and government agencies detect and investigate financial crime and fraud. He has completed a doctoral degree at Technische Universität Berlin in 2022, and has gained several years of experience analyzing financial transaction networks in both traditional finance and modern cryptoasset networks. Most of his research works involve blockchain-based cryptoassets and the Ethereum network. More generally, he is interested in: Complex Network Analysis and Empirical Measurement Studies, Cryptoasset Analytics and Forensics, Financial Crime Detection, Underground Marketplaces, Web and Mobile Privacy, Open Source Intelligence (OSINT). Prior to completing a doctoral degree at Technische Universität Berlin, he has completed a Dual Master Degree in Computer Science at TU Berlin and at the Korea Advanced Institute of Science and Technology.
Livestream: https://yale.zoom.us/j/95935631837?pwd=oVgd6ntVnr1wlG0OrnKlqpa58YOKRF.1
Tiantian Gong, Yale University and The Technion - TBA
October 10, 2025, 11am ET
Abstract: TBA.
Bio: TBA.
Livestream: https://yale.zoom.us/j/96788195628?pwd=awSp3BkQls4IndlWqf8RLwk2323tZv.1
Mahimna Kelkar, Cornell University - TBA
October 24, 2025, 11am ET
Abstract: TBA.
Bio: TBA.
Livestream: https://yale.zoom.us/j/99405439112?pwd=dCSaehviaCda3alDcuy5llDkZIKC8x.1
Sarisht Wadhwa, Duke University - TBA
October 31, 2025, 11am ET
Abstract: TBA.
Bio: TBA.
Livestream: https://yale.zoom.us/j/94311398970?pwd=xsujqLr7XCvHDXiLSqWnRhBl8kc4hS.1
Jesko Dujmovic, Northwestern University - TBA
November 7, 2025, 11am ET
Abstract: TBA.
Bio: TBA.
Livestream: https://yale.zoom.us/j/95371310133?pwd=OgRvZlwwt80On26WFAvNWnb8BRCndF.1
Jhonatan Tavori, Columbia University - Exploiting Miscoordination of Microservices in Cloud Applications by DDoS Attacks
November 14, 2025, 11am ET
Abstract: The delay and throttling (service-blocking) experienced by users are critical measures of quality-of-service in cloud-based services. To maintain their functionality, service providers allocate substantial budgets to cloud infrastructure for their services. In this talk, we examine loosely-coupled components within a request's journey through a cloud-based service. Numerous cloud systems are now constructed using loosely connected services. Each of these services is tasked with a specific function and is characterized by distinct scaling attributes. We observe that when microservices which utilize separate auto-scaling mechanisms operate in tandem to process traffic, they may perform ineffectively, especially under overload conditions, due to DDoS attacks. This can result in throttling and over-provisioning of resources (Economic Denial of Sustainability – EDoS). We further demonstrate how an attacker can exploit the tandem behavior to initiate effective DDoS attacks, causing service providers to incur charges for requests that fail to be serviced. Joint work with Anat Bremler-Barr, Michael Czeizler and Hanoch Levy (IEEE INFOCOM 2024).
Bio: Jhonatan Tavori is a Fulbright Postdoctoral Fellow and a Zuckerman STEM Leadership Scholar at Columbia University. He received the Ph.D. degree in Computer Science from Tel Aviv University in 2025, advised by Prof. Hanoch Levy. His research interests revolve around stochastic network analysis and security, DDoS attacks on microservices-based applications, and edge-cloud systems resilience. Recently, he was recognized with the Blavatnik Prize for Outstanding Doctoral Fellows in Computer Science and the EU Horizon’s Next Generation Internet Fellowship.
Livestream: https://yale.zoom.us/j/97543200429?pwd=M0zaSWWpi8mDRpch8eAuRqyVeYSM2X.1
Harjasleen Malvai, UIUC - TBA
November 21, 2025, 11am ET
Abstract: TBA.
Bio: TBA.
Livestream: https://yale.zoom.us/j/92019907023?pwd=bBhXvpxbOvVW6zUzoPqJclrpFIeFcz.1
Alireza Shirzad, UPenn - TBA
November 28, 2025, 11am ET
Abstract: TBA.
Bio: TBA.
Livestream: https://yale.zoom.us/j/92678913996?pwd=DDM61mbgozlXO3bIpt6Q75SrYDL209.1
Somiya Singh Chhillar, GMU - TBA
January 30, 2026, 11am ET
Abstract: TBA.
Bio: TBA.
Livestream: https://yale.zoom.us/j/97853715719?pwd=opa2J8zWq4fHLAuZmue1qBZV0KHDvb.1
Past Talks
Abstract: A specter is haunting consensus protocols—the specter of adversary majority. Dolev and Strong in 1983 showed an early possibility for up to 99% adversaries. Yet, other works show impossibility results for adversaries above 50% under synchrony, seemingly the same setting as Dolev and Strong's. What gives? It is high time that we pinpoint a key culprit for this ostensible contradiction: the modeling details of clients. Are the clients sleepy or always-on? Are they silent or communicating? Can validators be sleepy too? We systematize models for consensus across four dimensions (sleepy/always-on clients, silent/communicating clients, sleepy/always-on validators, and synchrony/partial-synchrony), some of which are new, and tightly characterize the achievable safety and liveness resiliences with matching possibilities and impossibilities for each of the sixteen models. To this end, we unify folklore and earlier results, and fill gaps left in the literature with new protocols and impossibility theorems.
Link: https://ia.cr/2024/1799
Bio: I am a post-doc Research Partner at a16z Crypto Research led by Tim Roughgarden. Previously, I earned a PhD from Stanford, advised by David Tse. My current research focus is blockchain-era consensus and decentralized-systems security. My broader interests include distributed computing and systems, applied cryptography, and networking and communications.
Abstract: Inner Product Arguments (IPA) [BCC+16,BBB+17] are a family of proof systems with O(log n) sized proofs, O(n) time verifiers, and transparent setup. Bootle, Chiesa and Sotiraki [BCS21] observed that an IPA can be viewed as a sumcheck protocol [LFKN92] where the summed polynomial is allowed to have coefficients in a group rather than a field. We leverage this viewpoint to improve the performance of multi-linear polynomial commitments based on IPA. Specifically, - We introduce a simplified variant of Halo-style accumulation that works for multilinear evaluation claims, rather than only univariate ones as in [BGH19,BCMS20]. - We show that the size n MSM the IPA verifier performs can be replaced by a ``group variant'' of basefold[ZCF23]. This reduces the verifier complexity from O(n) to O(λ*log^2 n).
Link: https://ia.cr/2025/1325
Bio: Ariel is currently Chief Scientist at Aztec Labs. He holds a PhD in Theoretical Computer Science from the Weizmann Institute. He transitioned from pure theory to applied ZK working in Eli Ben-Sasson's lab on STARKs. Joined Zcash in 2016 to help with the first-ever SNARK trusted setup and real-life deployment and working in the applied ZK space since. Co-author of PlonK.
Grace Jia, Yale University - Found in Translation: A Generative Language Modeling Approach to Memory Access Pattern Attacks (video)
September 5, 2025
Abstract: Confidential computing environments (CCEs) provide a secure way for privacy-sensitive applications to ensure the confidentiality and integrity of data and computations offloaded to the cloud, relying on a hardware root of trust. However, the cloud provider-controlled Operating System (OS) stack still manages key memory management system services such as paging. Several recent works have demonstrated that these services can leverage side channels, specifically page access patterns, to reconstruct private application data. However, related attacks have primarily targeted applications with simple one-to-one mappings between application-level objects and OS-level pages, which is seldom true for most real-world cloud applications. Moreover, these attacks tend to overlook correlations in access patterns—a common occurrence in most real-world applications—leaving untapped critical side-channel information for improving attack accuracy. We propose a novel attack approach that leverages access correlations across pages in cloud applications using generative language models. Our key insight is that there are strong parallels between application page access patterns and grammatical structures in natural languages, making language modeling an excellent fit for reconstructing sensitive application data with high accuracy. Our attack, named FIT, utilizes a recurrent encoder-decoder architecture to predict application-level object accesses from a sequence of page-level accesses. Our evaluations on popular AI/ML model inference services and semantic search applications show that FIT can predict object-level access sequences with an average accuracy ranging from 71.7% to 99.9%, significantly outperforming prior state-of-the-art approaches.
Link: https://www.usenix.org/conference/usenixsecurity25/presentation/jia-grace
Bio: Grace is a third-year PhD student in Computer Science at Yale University, advised by Prof. Anurag Khandelwal. Her research interests are broadly in cloud security, and she is currently focused on data privacy in machine learning and on compute platforms.
Abstract: Optimistic rollups rely on fraud proofs -- interactive protocols executed on Ethereum to resolve conflicting claims about the rollup's state -- to scale Ethereum securely. To mitigate against potential censorship of protocol moves, fraud proofs grant participants a significant time window, known as the challenge period, to ensure their moves are processed on chain. Major optimistic rollups today set this period at roughly one week, mainly to guard against strong censorship that undermines Ethereum's own crypto-economic security. However, other forms of censorship are possible, and their implication on optimistic rollup security is not well understood. This paper considers economic censorship attacks, where an attacker censors the defender's transactions by bribing block proposers. At each step, the attacker can either censor the defender -- depleting the defender's time allowance at the cost of the bribe -- or allow the current transaction through while conserving funds for future censorship. We analyze three game theoretic models of these dynamics and determine the challenge period length required to ensure the defender's success, as a function of the number of required protocol moves and the players' available budgets.
Bio: Akaki has a Ph.D. in theoretical computer science from ETH Zurich. After graduation, he worked as a postdoc and then senior researcher in microeconomics at ETH Zurich. Currently, he is a Senior Research Scientist at Offchain, where he works on optimization and design of rollup protocols.
Abstract: Set reconciliation, where two parties hold fixed-length bit strings and run a protocol to learn the strings they are missing from each other, is a fundamental task in many distributed systems. We present Rateless Invertible Bloom Lookup Tables (Rateless IBLT), the first set reconciliation protocol, to the best of our knowledge, that achieves low computation cost and near-optimal communication cost across a wide range of scenarios: set differences of one to millions, bit strings of a few bytes to megabytes, and workloads injected by potential adversaries. Rateless IBLT is based on a novel encoder that incrementally encodes the set difference into an infinite stream of coded symbols, resembling rateless error-correcting codes. We compare Rateless IBLT with state-of-the-art set reconciliation schemes and demonstrate significant improvements. Rateless IBLT achieves 3--4x lower communication cost than non-rateless schemes with similar computation cost, and 2--2000x lower computation cost than schemes with similar communication cost. We show the real-world benefits of Rateless IBLT by applying it to synchronize the state of the Ethereum blockchain, and demonstrate 5.6x lower end-to-end completion time and 4.4x lower communication cost compared to the system used in production.
Bio: Lei Yang is a cofounder and the CTO of Mega Labs, a startup that is building MegaETH, the first real-time blockchains. He recently finished his PhD on distributed consensus and networking at MIT CSAIL advised by Mohammad Alizadeh. He also holds an SM from MIT and a BS from Peking University on Computer Science.
Sen Yang, Yale - DAG-based BFT: Liveness, Safety, and Latency
April 18, 2025
Abstract: DAG-based Byzantine Fault Tolerant (BFT) protocols offer a path to improved consensus performance by enabling concurrent block proposals and high throughput. In this talk, I will present two recent papers on DAG-based consensus accepted to IEEE S&P 2025. The first paper, "Constant Latency and Finality for Dynamically Available DAGs," explores two types of DAG-based protocols that prioritize either liveness or safety -- one with constant expected latency, providing high-throughput dynamic availability under the sleepy model, and another that ensures safety under network partition. The second paper, "Sailfish: Towards Improving the Latency of DAG-based BFT," introduces a reliable-broadcast (RBC)-based DAG protocol that supports leaders in every RBC round, outperforming the state of the art in terms of latency.
Links:
Fahad Saleh, University of Florida - An Economic Model of the L1-L2 Interaction
April 11, 2025
Abstract: We provide an economic model of the interaction between a Layer-1 (L1) blockchain and an associated Layer-2 (L2). Our main finding is that, even when the L1 blockchain features value-creating decentralized applications (dApps), there nevertheless exist realistic conditions such that both L1 blockchain investment and L1 cryptoasset market value vanish over time. These results arise when the L2 becomes sufficiently attractive for investment relative to the L1, a situation that would occur if developers focus exclusively on improving L2s while ignoring the L1. Crucially, our results establish that, even if L2s are intended as the primary vehicle for scaling, developers must nonetheless continue to improve the L1 to avoid an adverse outcome for the L1.
Bio: Fahad is an Associate Professor at the University of Florida and a Visiting Associate Professor at the Massachusetts Institute of Technology. His research focuses primarily on economic analysis associated with permissionless blockchains and differs from work in computer science particularly in that it studies outcomes when investment capital is determined endogenously based on participants being rational investors. Specifically, some of Fahad's work examines blockchain security when mining or staking investments are determined endogenously based on optimal investor behavior. Moreover, other parts of Fahad's work analyzes economic outcomes for decentralized applications (e.g., decentralized exchanges and decentralized lending protocols) and this work determines liquidity endogenously based on the opportunity cost of capital rather than taking liquidity as given. Fahad's work has been published in the top business school journals including Management Science and the Review of Financial Studies. Additionally, Fahad serves on the editorial board of Management Science, is the lead organizer of the Crypto and Blockchain Economic Research (CBER) Forum and is a fellow of the FinTech Initiative at Cornell University. Fahad holds a PhD in Finance from the New York University Stern School of Business. He also holds graduate and undergraduate degrees in engineering from Columbia University and Cornell University respectively.
Abstract: Trading on decentralized exchanges via an Automated Market Maker (AMM) mechanism has been massively adopted, with a daily trading volume reaching $1B. This trading method has also received close attention from researchers, central banks, and financial firms, who have the potential to adopt it to traditional financial markets such as foreign exchanges and stock markets. A critical challenge of AMM-powered trading is that transaction order has high financial value, so a policy or method to order transactions in a "good" (optimal) manner is vital. We offer economic measures of both price stability (low volatility) and inequality that inform how a "social planner" should pick an optimal ordering. We show that there is a trade-off between achieving price stability and reducing inequality, and that policymakers must choose which to prioritize. In addition, picking the optimal order can often be costly, especially when performing an exhaustive search over trade orderings (permutations). As an alternative we provide a simple algorithm, Clever Look-ahead Volatility Reduction (CLVR). This algorithm constructs an ordering which approximately minimizes price volatility with a small computation cost. We also provide insight into the strategy changes that may occur if traders are subject to this sequencing algorithm.
Bio: Nir is currently a postdoc with Dahlia Malkhi at UC Santa Barbara (UCSB), and an incoming economics professor at Ben-Gurion University. His research interests include finance, blockchain and experimental and behavioral economics.
Abstract: Early stopping agreement protocols ensure termination based on the actual number of malicious parties encountered during execution, $f \leq t$, rather than assuming the worst-case corruption bound of $t < n$. The fundamental lower bound on round complexity for such protocols is $\min{f+2, t+1}$ rounds. In this talk, I will provide a comprehensive overview of techniques for achieving early stopping in different settings: the information-theoretic setting, which tolerates up to $t < n/3$, and the authenticated setting, which tolerates up to $t < n/2$ and how it can be extended to tolerate $t < n$ corruptions. I will also discuss recent advancements in this area and highlight key open problems that remain unresolved.
Ferhat Erata, Yale - Learning Randomized Reductions and Program Properties for Security, Privacy, and Side-Channel Resilience
March 19, 2025
Abstract: Modern computing systems face multifaceted challenges in security, privacy, and leakage resilience. This dissertation makes four key contributions to addressing these challenges. First, it focuses on analyzing side-channel vulnerabilities in low-level cryptographic code and quantum computers using symbolic AI techniques. I introduce novel symbolic register analyses to automatically detect power side-channel vulnerabilities in constant-time cryptographic implementations. Additionally, I demonstrate an algebraic reconstruction method to reverse-engineer quantum circuits from power traces, aiming to extract proprietary information from these circuits. Second, my research explores learning randomized reductions. Informally, a randomized self-reduction allows computing a function’s value at a specific point by evaluating it on randomized inputs. Here, I present a new framework that dynamically infers such properties from implementations using machine learning. Third, the dissertation demonstrates practical applications of these randomized reductions in compiling effective countermeasures against power side-channel and fault injection attacks. It also develops protocols for leakage-resilient machine learning and private quantum computations. Finally, it investigates learning-based methods for partitioning propositional encodings of combinatorial security analysis problems within the cube-and-conquer paradigm, which splits large SAT instances into smaller, more tractable subproblems. We train transformer models to learn branching heuristics within SAT-solving frameworks. Together, these contributions advance automated security analysis and resilience across classical and quantum domains.
Advisors: Ruzica Piskac, Jakub Szefer (co-advisor). Committee: Zhong Shao, Shafi Goldwasser (UC Berkeley), Byron Cook (AWS), Scott Shapiro.
Abstract: Following the invention of Bitcoin, there has been a proliferation of many permissionless blockchains. Each such chain provides a public ledger that can be written to and read from by anyone. In this multi-chain world, a natural question arises: what is the optimal security an existing blockchain, a consumer chain, can extract by only reading from and writing to ‘k’ other existing blockchains, so-called the provider chains? In this talk, we will answer this question in three ways: (1) We will first see a protocol, where an off-the-shelf PBFT-style proof-of-stake protocol (acting as a consumer chain) sends timestamps to Bitcoin (the provider chain) to reduce its stake withdrawal delay and to resolve issues such as non-slashable long-range safety attacks and low liveness resilience. (2) Applying the checkpointing method iteratively, we will then design a protocol called 'interchain timestamping', which enables a consumer chain to extract the maximum economic security from the provider chains, as quantified by the slashable safety resilience. (3) Finally, drawing an analogy with switching circuits, we will design two basic compositional operations between blockchains, serial and triangular compositions, and use these operations as building blocks to construct general overlay blockchains that read from and write to a given set of blockchains. This talk is based on the following papers: 1. Bitcoin-Enhanced Proof-of-Stake Security: Possibilities and Impossibilities (IEEE S&P 2023), 2. Interchain Timestamping for Mesh Security (ACM CCS 2023), 3. A Circuit Approach to Constructing Blockchains on Blockchains (AFT 2024).
Bio: Ertem Nusret Tas is a PhD student in Electrical Engineering at Stanford University, working with Prof. David Tse on the analysis of blockchains. He completed both his BS and MEng degrees at the Electrical Engineering and Computer Science department at MIT. His current research focuses on blockchains, consensus protocols and cryptography. He has previously completed summer internships at a16z Crypto Research, BabylonChain, Celestia and Apple. He received a distinguished paper award at ACM CCS 2024, and his papers on blockchains, consensus protocols and cryptography have appeared in top venues such as ACM CCS, IEEE S&P, Financial Cryptography (FC) and Advances in Financial Technologies (AFT).
Kirill Nikitin, Columbia University & NY Genome Center - Private Information Leakage from Polygenic Risk Scores
February 21, 2025
Abstract: Polygenic Risk Scores (PRSs) estimate the likelihood of individuals to develop diseases based on their genetic variations. They are commonly considered non-sensitive information and are publicly shared with results of clinical studies or on health forums. In this talk, I will describe how PRSs can be exploited to recover genotypes of individuals and to de-anonymize them. By framing genotype recovery as the subset-sum problem with side information from population statistics, we show that it is possible to reconstruct a significant portion of an individual’s genome from their individual PRS values with 95% accuracy. Even imperfect recovery is then sufficient to identify the individual or their relatives in genealogy databases or public anonymized biobanks.
Bio: Kirill Nikitin is a postdoctoral researcher at Columbia University and the New York Genome Center working with Gamze Gürsoy on analyzing privacy leakages from genomic data. Previously, he worked as a postdoc with Vitaly Shmatikov at Cornell Tech, and he received his PhD in Computer and Communication Sciences from EPFL, where he was advised by Bryan Ford. Besides genomics privacy, he has worked on metadata protection in encrypted files and communication, private information retrieval, security of software-update systems, and blockchains. Personal website: https://nikirill.com
Jiasun Li, George Mason University - Game Theory in Blockchain Research and My Attempts to Connect to Cryptography (video)
February 14, 2025
Abstract: I plan to divide the talk into two parts. In the first part, I will review my past and ongoing research on applying game theory and mechanism design to blockchain research, highlight two pieces of work: 1. The economic forces that simultaneously compromise and sustain decentralization; 2. The promise of Bitcoin mining to actually lower total carbon emission in the overall economy. In the second half, I will introduce my current interests in incorporating cryptography into mechanism design. I will explain how cryptography may enable the implementation of otherwise infeasible mechanisms, and envision how economic approaches may complement cryptography.If there is extra time (highly unlikely), I can dive in more other work that fall in the same theme.
Bio: Jiasun Li is currently visiting Yale CS while on sabbatical from associate professor of finance at the Costello College of Business, George Mason University. His research interest is at the intersection of economics and computer science, with focus on applying game theoretical modeling to various blockchain-related topics such as mining, distributed consensus, blockchain scaling, tokenomics. His broader interests encompass empirical studies of the blockchain ecosystem and the application of game theory and mechanism design to other topics such as security design, human-genAI interaction, and traffic control.Dr Li's research has appeared in leading business/finance journals including the Journal of Finance, Review of Financial Studies, and Management Science as well as computer science workshops including ACM Web (WWW) and Financial Cryptography (FC), among others. His ongoing research is supported by grants from the NSF CAREER Award and the Ethereum Foundation, among others. His past work has won the Chicago Quantitative Alliance (CQA) academic paper competition and Yihong Xia Best Paper Award, among other prizes. Besides academic talks at business schools/CS departments, he has also been invited to speak at the Federal Reserve, Securities and Exchange Commission, Department of Homeland Security, and International Monetary Fund (IMF). Dr Li received his Ph.D. in Finance from UCLA Anderson School of Management and B.S. in Mathematics from Fudan University in Shanghai, China.
Adam O'Neill, UMass Amherst - Schnorr Signatures are Tightly Secure in the ROM under a Non-Interactive Assumption (video)
February 7, 2025
Abstract: We show that the widely-used Schnorr signature scheme meets existential unforgeability under chosen-message attack (EUF-CMA) in the random oracle model (ROM) if the circular discrete-logarithm (CDL) assumption, a new, non-interactive, and falsifiable variant of DL we introduce, holds in the underlying group. Notably, our reduction is *tight*, meaning the constructed adversary against CDL has essentially the same running time and success probability as the assumed forger. Tightness is essential for justifying the key length used in practice. To our knowledge, we are the first to exhibit such a reduction to even a non-interactive assumption. We justify CDL by showing it is as hard as DL in two carefully chosen idealized models, which idealize different aspects of the assumption.
Bio: Adam O’Neill is an Assistant Professor in the Manning College of Information and Computer Sciences at the University of Massachusetts, Amherst. Previously, he was an Assistant Professor of Computer Science at Georgetown University. He received his Ph.D. in Computer Science at the Georgia Institute of Technology and held postdoctoral appointments at the University of Texas at Austin and Boston University. His doctoral work was recognized with the CRYPTO 2022 Test-of-Time Award.
Gustavo Grivol, NYU Stern - Optimal Arbitrage Timing between Decentralized and Centralized Exchanges (video)
January 31, 2025
Abstract: In this work, we try to map how arbitrage between decentralized and centralized exchanges can create incentives for reducing or increasing latency in blockchains. Under specific price dynamics, we demonstrate that arbitrage opportunities may incentivize block producers to delay releasing a new block until certain price deviations occur. In other price dynamics, latency strategies may even become irrelevant. We not only analyze price dynamics but also examine how factors such as transaction fees, interest rates, and the blockchain consensus mechanism shape different timing strategies. To support the model and results, we developed a more flexible framework for stopping time policies in blockchains and characterized the profit function for arbitrage in Constant Function Market Makers. To empirically assess these incentives, we examine data on Multi-Block Maximal Extractable Value (MEV), a scenario that allows more sophisticated timing strategies.
Links: https://pages.stern.nyu.edu/~jreed/papers/paper28.pdf
Bio: Gustavo Grivol is an Operations Management Ph.D. student at NYU Stern, advised by Prof. Hanna Halaburda and Prof. Josh Reed. His research focuses on applications of stochastic processes in decision making and platform design. His research interests also include social networks and blockchains.
Grace Jia, Yale - Length Leakage in Oblivious Data Access Mechanisms
December 13, 2024
Abstract: This paper explores the problem of preventing length leakage in oblivious data access mechanisms with passive persistent adversaries. We show that designing mechanisms that prevent both length leakage and access pattern leakage requires navigating a three-way tradeoff between storage footprint, bandwidth footprint, and the information leaked to the adversary. We establish powerful lower bounds on achievable storage and bandwidth footprints for a variety of leakage profiles, and present constructions that perfectly or near-perfectly match the lower bounds.
Aviv Yaish, Yale - Transaction Fee Mechanisms: Theory & Practice
December 6, 2024
Abstract: In a series of works, we study Transaction Fee Mechanisms (TFMs), which determine how much fees user transactions have to pay to be processed, and the amount of fees miners can collect as revenue. We tackle the question of whether one can design "perfect" TFMs, and prove the elegant prior work does not fully address it due to relying on stricter definitions than the canonical ones. We also prove that two TFMs satisfy relaxations of the canonical definitions while enjoying good revenue. We go beyond the myopic setting of prior work and consider transactions that can expire, presenting a novel allocation strategy which outperforms the myopic greedy strategy's revenue.
Links: A partial list of the body of work covered:
Bio: Aviv researches the economics and security of distributed systems. He is a postdoc at Yale, where he is grateful for being hosted by Prof. Fan Zhang, and co-hosted by Profs. Ben Fisch, Charalampos (Babis) Papamanthou, and Zhong Shao. He is also a visiting researcher at Innsbruck University, graciously hosted by Prof. Rainer Böhme. Previously, he had the pleasure of doing a PhD with Prof. Aviv Zohar at HUJI, where he also was a lecturer for two courses and received a teaching award. Among other honors, the CBER Forum named him one of the top PhD graduates of 23-24, and he received the CCS Distinguished Paper award, the CBER Best Paper award, two Ethereum Foundation grants, the AIANI and Ze'ev Jabotinsky fellowships, and HUJI's rector award for first-in-class MSc students.