Christian Cachin

Orcid: 0000-0001-8967-9213

Affiliations:
  • University of Bern, Switzerland
  • IBM Research Zurich, Switzerland (former)


According to our database1, Christian Cachin authored at least 132 papers between 1993 and 2025.

Collaborative distances:

Awards

ACM Fellow

ACM Fellow 2019, "For contributions to secure distributed computing and cryptographic protocols".

IEEE Fellow

IEEE Fellow 2015, "For contributions to steganography and secure distributed systems".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Synergistic knowledge.
Theor. Comput. Sci., 2025

2024
Asymmetric distributed trust.
Distributed Comput., September, 2024

Nopenena Untraceable Payments: Defeating Graph Analysis with Small Decoy Sets.
IACR Cryptol. ePrint Arch., 2024

An Analysis of Avalanche Consensus.
Proceedings of the Structural Information and Communication Complexity, 2024

Quick Order Fairness: Implementation and Evaluation.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2024

Keynote Talk: Consensus in Blockchains: Theory and Practice.
Proceedings of the 2024 Workshop on Advanced Tools, 2024

2023
A Transaction-Level Model for Blockchain Privacy.
IACR Cryptol. ePrint Arch., 2023

Pay Less for Your Privacy: Towards Cost-Effective On-Chain Mixers.
IACR Cryptol. ePrint Arch., 2023

Practical Large-Scale Proof-of-Stake Asynchronous Total-Order Broadcast.
IACR Cryptol. ePrint Arch., 2023

We will DAG you.
CoRR, 2023

Eating Sandwiches: Modular and Lightweight Elimination of Transaction Reordering Attacks.
Proceedings of the 27th International Conference on Principles of Distributed Systems, 2023

Thetacrypt: A Distributed Service for Threshold Cryptography On-Demand: Demo Abstract.
Proceedings of the 24th International Middleware Conference Demos, 2023

Modal and Justification Logics for Multi-agent Systems (Invited Talk).
Proceedings of the Logic and Argumentation - 5th International Conference, 2023

2022
DSKE: Digital Signature with Key Extraction.
IACR Cryptol. ePrint Arch., 2022

Do Not Trust in Numbers: Practical Distributed Cryptography With General Trust.
IACR Cryptol. ePrint Arch., 2022

Quorum Systems in Permissionless Network.
CoRR, 2022

Quorum Systems in Permissionless Networks.
Proceedings of the 26th International Conference on Principles of Distributed Systems, 2022

Modeling Resources in Permissionless Longest-Chain Total-Order Broadcast.
Proceedings of the 26th International Conference on Principles of Distributed Systems, 2022

When Is Spring Coming? A Security Analysis of Avalanche Consensus.
Proceedings of the 26th International Conference on Principles of Distributed Systems, 2022

Quick Order Fairness.
Proceedings of the Financial Cryptography and Data Security, 2022

2021
Quick Order Fairness.
CoRR, 2021

Brief Announcement: Revisiting Signature-Free Asynchronous Byzantine Consensus.
Proceedings of the 35th International Symposium on Distributed Computing, 2021

Brief Announcement: How to Trust Strangers - Composition of Byzantine Quorum Systems.
Proceedings of the 35th International Symposium on Distributed Computing, 2021

How to Trust Strangers: Composition of Byzantine Quorum Systems.
Proceedings of the 40th International Symposium on Reliable Distributed Systems, 2021

2021 Principles of Distributed Computing Doctoral Dissertation Award.
Proceedings of the PODC '21: ACM Symposium on Principles of Distributed Computing, 2021

On the Synchronization Power of Token Smart Contracts.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

Asymmetric Distributed Trust.
Proceedings of the ICDCN '21: International Conference on Distributed Computing and Networking, 2021

Asymmetric Asynchronous Byzantine Consensus.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2021

Generalizing weighted trees: a bridge from Bitcoin to GHOST.
Proceedings of the AFT '21: 3rd ACM Conference on Advances in Financial Technologies, Arlington, Virginia, USA, September 26, 2021

2020
TZ4Fabric: Executing Smart Contracts with ARM TrustZone.
CoRR, 2020

Asymmetric Byzantine Consensus.
CoRR, 2020

TZ4Fabric: Executing Smart Contracts with ARM TrustZone : (Practical Experience Report).
Proceedings of the International Symposium on Reliable Distributed Systems, 2020

Consensus Beyond Thresholds: Generalized Byzantine Quorums Made Live.
Proceedings of the International Symposium on Reliable Distributed Systems, 2020

Security Analysis of Ripple Consensus.
Proceedings of the 24th International Conference on Principles of Distributed Systems, 2020

Anonymity Preserving Byzantine Vector Consensus.
Proceedings of the Computer Security - ESORICS 2020, 2020

2019
Byzantine Fault Tolerant Vector Consensus with Anonymous Proposals.
CoRR, 2019

Brief Announcement: Asymmetric Distributed Trust.
Proceedings of the 33rd International Symposium on Distributed Computing, 2019

Trusted Computing Meets Blockchain: Rollback Attacks and a Solution for Hyperledger Fabric.
Proceedings of the 38th Symposium on Reliable Distributed Systems, 2019

Asymmetric Distributed Trust.
Proceedings of the 23rd International Conference on Principles of Distributed Systems, 2019

Byzantine faults.
Proceedings of the Concurrency: the Works of Leslie Lamport, 2019

2018
Verifying the consistency of remote untrusted services with conflict-free operations.
Inf. Comput., 2018

Blockchain and Trusted Computing: Problems, Pitfalls, and a Solution for Hyperledger Fabric.
CoRR, 2018

Scalable Key Management for Distributed Cloud Storage.
Proceedings of the 2018 IEEE International Conference on Cloud Engineering, 2018


Channels: Horizontal Scaling and Confidentiality on Permissioned Blockchains.
Proceedings of the Computer Security, 2018

2017
Don't Trust the Cloud, Verify: Integrity and Consistency for Cloud Object Stores.
ACM Trans. Priv. Secur., 2017

Stateful Multi-Client Verifiable Computation.
IACR Cryptol. ePrint Arch., 2017

The Transaction Graph for Modeling Blockchain Semantics.
IACR Cryptol. ePrint Arch., 2017

Updatable Tokenization: Formal Definitions and Provably Secure Constructions.
IACR Cryptol. ePrint Arch., 2017

Permissioned Blockchains and Hyperledger Fabric.
ERCIM News, 2017

Blockchain Consensus Protocols in the Wild.
CoRR, 2017

Blockchain Consensus Protocols in the Wild (Keynote Talk).
Proceedings of the 31st International Symposium on Distributed Computing, 2017

Blockchains and Consensus Protocols: Snake Oil Warning.
Proceedings of the 13th European Dependable Computing Conference, 2017

Rollback and Forking Detection for Trusted Execution Environments Using Lightweight Collective Memory.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

2016
Resource-Efficient Byzantine Fault Tolerance.
IEEE Trans. Computers, 2016

XFT: Practical Fault Tolerance beyond Crashes.
Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation, 2016

Non-Determinism in Byzantine Fault-Tolerant Replication.
Proceedings of the 20th International Conference on Principles of Distributed Systems, 2016

Blockchain - From the Anarchy of Cryptocurrencies to the Enterprise (Keynote Abstract).
Proceedings of the 20th International Conference on Principles of Distributed Systems, 2016

2015
Information-Theoretic Interactive Hashing and Oblivious Transfer to a Storage-Bounded Receiver.
IEEE Trans. Inf. Theory, 2015

XFT: Practical fault tolerance beyond crashes.
CoRR, 2015

2014
Workshop Report: HotDep 2013 - The 9th workshop on hot topics in dependable systems.
ACM SIGOPS Oper. Syst. Rev., 2014

Separating Data and Control: Asynchronous BFT Storage with 2t + 1 Data Replicas.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2014

Verifying the Consistency of Remote Untrusted Services with Commutative Operations.
Proceedings of the Principles of Distributed Systems - 18th International Conference, 2014

Erasure-Coded Byzantine Storage with Separate Metadata.
Proceedings of the Principles of Distributed Systems - 18th International Conference, 2014

Integrity, Consistency, and Verification of Remote Computation.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Policy-based Secure Deletion.
IACR Cryptol. ePrint Arch., 2013

BFT Storage with 2t+1 Data Replicas
CoRR, 2013

On Verifying the Consistency of Remote Untrusted Services
CoRR, 2013

2012
Sicherheits-Forschung für die Cloud - Heisse Luft oder Wolke Sieben?
Proceedings of the Sicherheit 2012: Sicherheit, 2012

CheapBFT: resource-efficient byzantine fault tolerance.
Proceedings of the European Conference on Computer Systems, 2012

On limitations of using cloud storage for data replication.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2012

Robust data sharing with key-value stores.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012

2011
Digital Steganography.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Fail-Aware Untrusted Storage.
SIAM J. Comput., 2011

Integrity and Consistency for Untrusted Services - (Extended Abstract).
Proceedings of the SOFSEM 2011: Theory and Practice of Computer Science, 2011

Robust data sharing with key-value stores.
Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing, 2011

Fork-Consistent Constructions from Registers.
Proceedings of the Principles of Distributed Systems - 15th International Conference, 2011

A Comparison of Secure Multi-Tenancy Architectures for Filesystem Storage Clouds.
Proceedings of the Middleware 2011, 2011

Introduction to Reliable and Secure Distributed Programming (2. ed.).
Springer, ISBN: 978-3-642-15259-7, 2011

2010
Encrypting Keys Securely.
IEEE Secur. Priv., 2010

State Machine Replication with Byzantine Faults.
Proceedings of the Replication: Theory and Practice, 2010

Storyboard: Optimistic Deterministic Multithreading.
Proceedings of the Sixth Workshop on Hot Topics in System Dependability, 2010

Design and Implementation of a Key-Lifecycle Management System.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

Venus: verification for untrusted cloud storage.
Proceedings of the 2nd ACM Cloud Computing Security Workshop, 2010

2009
Preface.
Theor. Comput. Sci., 2009

Trusting the cloud.
SIGACT News, 2009

Fork sequential consistency is blocking.
Inf. Process. Lett., 2009

Rational Protocols.
Proceedings of the iNetSec 2009 - Open Research Problems in Network Security, 2009

A Secure Cryptographic Token Interface.
Proceedings of the 22nd IEEE Computer Security Foundations Symposium, 2009

Integrity Protection for Revision Control.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009

2008
Principles of untrusted storage: a new look at consistency conditions.
Proceedings of the Twenty-Seventh Annual ACM Symposium on Principles of Distributed Computing, 2008

2007
Efficient fork-linearizable access to untrusted shared memory.
Proceedings of the Twenty-Sixth Annual ACM Symposium on Principles of Distributed Computing, 2007

Cryptographic Security for a High-Performance Distributed File System.
Proceedings of the 24th IEEE Conference on Mass Storage Systems and Technologies (MSST 2007), 2007

2006
Intrusion-tolerant middleware: the road to automatic security.
IEEE Secur. Priv., 2006

Parsimonious Asynchronous Byzantine-Fault-Tolerant Atomic Broadcast.
IACR Cryptol. ePrint Arch., 2006

06371 Abstracts Collection -- From Security to Dependability.
Proceedings of the From Security to Dependability, 10.09. - 15.09.2006, 2006

06371 Executive Summary -- From Security to Dependability.
Proceedings of the From Security to Dependability, 10.09. - 15.09.2006, 2006

2005
Digital Steganography.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Random Oracles in Constantinople: Practical Asynchronous Byzantine Agreement Using Cryptography.
J. Cryptol., 2005

Secure Key-Updating for Lazy Revocation.
IACR Cryptol. ePrint Arch., 2005

Asynchronous Verifiable Information Dispersal.
Proceedings of the Distributed Computing, 19th International Conference, 2005

Optimal Resilience for Erasure-Coded Byzantine Distributed Storage.
Proceedings of the Distributed Computing, 19th International Conference, 2005

Asynchronous Veri.able Information Dispersal.
Proceedings of the 24th IEEE Symposium on Reliable Distributed Systems (SRDS 2005), 2005

Lazy Revocation in Cryptographic File Systems.
Proceedings of the 3rd International IEEE Security in Storage Workshop (SISW 2005), 2005

2004
Asynchronous group key exchange with failures.
Proceedings of the Twenty-Third Annual ACM Symposium on Principles of Distributed Computing, 2004

Secure Distributed DNS.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004

2003
Public-Key Steganography with Active Attacks.
IACR Cryptol. ePrint Arch., 2003

An asynchronous protocol for distributed computation of RSA inverses and its applications.
Proceedings of the Twenty-Second ACM Symposium on Principles of Distributed Computing, 2003

Proactive secure message transmission in asynchronous networks.
Proceedings of the Twenty-Second ACM Symposium on Principles of Distributed Computing, 2003

Reliable Broadcast in a Computational Hybrid Model with Byzantine Faults, Crashes, and Recoveries.
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003

Modeling Complexity in Secure Distributed Computing.
Proceedings of the Future Directions in Distributed Computing, 2003

2002
Asynchronous Verifiable Secret Sharing and Proactive Cryptosystems.
IACR Cryptol. ePrint Arch., 2002

Secure Intrusion-tolerant Replication on the Internet.
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002

2001
Secure and Efficient Asynchronous Broadcast Protocols.
IACR Cryptol. ePrint Arch., 2001

Cryptographic Security for Mobile Code.
Proceedings of the 2001 IEEE Symposium on Security and Privacy, 2001

Distributing Trust on the Internet .
Proceedings of the 2001 International Conference on Dependable Systems and Networks (DSN 2001) (formerly: FTCS), 2001

2000
An Information-Theoretic Model for Steganography.
IACR Cryptol. ePrint Arch., 2000

Random oracles in constantipole: practical asynchronous Byzantine agreement using cryptography (extended abstract).
Proceedings of the Nineteenth Annual ACM Symposium on Principles of Distributed Computing, 2000

One-Round Secure Computation and Secure Autonomous Mobile Agents.
Proceedings of the Automata, Languages and Programming, 27th International Colloquium, 2000

Optimistic Fair Secure Computation.
Proceedings of the Advances in Cryptology, 2000

1999
Computationally Private Information Retrieval with Polylogarithmic Communication.
Proceedings of the Advances in Cryptology, 1999

Efficient Private Bidding and Auctions with an Oblivious Third Party.
Proceedings of the CCS '99, 1999

1998
Oblivious Transfer with a Memory-Bounded Receiver.
Proceedings of the 39th Annual Symposium on Foundations of Computer Science, 1998

On the Foundations of Oblivious Transfer.
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998

1997
Entropy measures and unconditional security in cryptography.
PhD thesis, 1997

Linking Information Reconciliation and Privacy Amplification.
J. Cryptol., 1997

Smooth Entropy and Rényi Entropy.
Proceedings of the Advances in Cryptology, 1997

Unconditional Security Against Memory-Bounded Adversaries.
Proceedings of the Advances in Cryptology, 1997

1995
On-Line Secret Sharing.
Proceedings of the Cryptography and Coding, 1995

1994
Pedagogical pattern selection strategies.
Neural Networks, 1994

Linking Information Reconciliation and Privacy Amplification (Extended Abstract).
Proceedings of the Advances in Cryptology, 1994

1993
Locating the Primary Attention Focus of the User.
Proceedings of the Human Computer Interaction, Vienna Conference, 1993


  Loading...