Christian Cachin

According to our database1, Christian Cachin authored at least 112 papers between 1993 and 2019.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2015, "For contributions to steganography and secure distributed systems".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Asymmetric Distributed Trust.
CoRR, 2019

Byzantine Fault Tolerant Vector Consensus with Anonymous Proposals.
CoRR, 2019

2018
Verifying the consistency of remote untrusted services with conflict-free operations.
Inf. Comput., 2018

Blockchain and Trusted Computing: Problems, Pitfalls, and a Solution for Hyperledger Fabric.
CoRR, 2018

Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains.
CoRR, 2018

Scalable Key Management for Distributed Cloud Storage.
Proceedings of the 2018 IEEE International Conference on Cloud Engineering, 2018


Channels: Horizontal Scaling and Confidentiality on Permissioned Blockchains.
Proceedings of the Computer Security, 2018

Stateful Multi-client Verifiable Computation.
Proceedings of the Applied Cryptography and Network Security, 2018

2017
Don't Trust the Cloud, Verify: Integrity and Consistency for Cloud Object Stores.
ACM Trans. Priv. Secur., 2017

Stateful Multi-Client Verifiable Computation.
IACR Cryptology ePrint Archive, 2017

The Transaction Graph for Modeling Blockchain Semantics.
IACR Cryptology ePrint Archive, 2017

Updatable Tokenization: Formal Definitions and Provably Secure Constructions.
IACR Cryptology ePrint Archive, 2017

Permissioned Blockchains and Hyperledger Fabric.
ERCIM News, 2017

Blockchain Consensus Protocols in the Wild.
CoRR, 2017

Rollback and Forking Detection for Trusted Execution Environments using Lightweight Collective Memory.
CoRR, 2017

Blockchain Consensus Protocols in the Wild (Keynote Talk).
Proceedings of the 31st International Symposium on Distributed Computing, 2017

Updatable Tokenization: Formal Definitions and Provably Secure Constructions.
Proceedings of the Financial Cryptography and Data Security, 2017

Blockchains and Consensus Protocols: Snake Oil Warning.
Proceedings of the 13th European Dependable Computing Conference, 2017

Rollback and Forking Detection for Trusted Execution Environments Using Lightweight Collective Memory.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

2016
Resource-Efficient Byzantine Fault Tolerance.
IEEE Trans. Computers, 2016

Non-determinism in Byzantine Fault-Tolerant Replication.
CoRR, 2016

XFT: Practical Fault Tolerance beyond Crashes.
Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation, 2016

Non-Determinism in Byzantine Fault-Tolerant Replication.
Proceedings of the 20th International Conference on Principles of Distributed Systems, 2016

Blockchain - From the Anarchy of Cryptocurrencies to the Enterprise (Keynote Abstract).
Proceedings of the 20th International Conference on Principles of Distributed Systems, 2016

2015
Information-Theoretic Interactive Hashing and Oblivious Transfer to a Storage-Bounded Receiver.
IEEE Trans. Information Theory, 2015

XFT: Practical fault tolerance beyond crashes.
CoRR, 2015

Don't Trust the Cloud, Verify: Integrity and Consistency for Cloud Object Stores.
CoRR, 2015

Don't trust the cloud, verify: integrity and consistency for cloud object stores.
Proceedings of the 8th ACM International Systems and Storage Conference, 2015

2014
Workshop Report: HotDep 2013 - The 9th workshop on hot topics in dependable systems.
Operating Systems Review, 2014

Erasure-Coded Byzantine Storage with Separate Metadata.
CoRR, 2014

Separating Data and Control: Asynchronous BFT Storage with 2t + 1 Data Replicas.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2014

Verifying the Consistency of Remote Untrusted Services with Commutative Operations.
Proceedings of the Principles of Distributed Systems - 18th International Conference, 2014

Erasure-Coded Byzantine Storage with Separate Metadata.
Proceedings of the Principles of Distributed Systems - 18th International Conference, 2014

Integrity, Consistency, and Verification of Remote Computation.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Policy-based Secure Deletion.
IACR Cryptology ePrint Archive, 2013

BFT Storage with 2t+1 Data Replicas
CoRR, 2013

On Verifying the Consistency of Remote Untrusted Services
CoRR, 2013

Policy-based secure deletion.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Sicherheits-Forschung für die Cloud - Heisse Luft oder Wolke Sieben?
Proceedings of the Sicherheit 2012: Sicherheit, 2012

CheapBFT: resource-efficient byzantine fault tolerance.
Proceedings of the European Conference on Computer Systems, 2012

On limitations of using cloud storage for data replication.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2012

Robust data sharing with key-value stores.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012

2011
Fail-Aware Untrusted Storage.
SIAM J. Comput., 2011

Integrity and Consistency for Untrusted Services - (Extended Abstract).
Proceedings of the SOFSEM 2011: Theory and Practice of Computer Science, 2011

Robust data sharing with key-value stores.
Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing, 2011

Fork-Consistent Constructions from Registers.
Proceedings of the Principles of Distributed Systems - 15th International Conference, 2011

A Comparison of Secure Multi-Tenancy Architectures for Filesystem Storage Clouds.
Proceedings of the Middleware 2011, 2011

Introduction to Reliable and Secure Distributed Programming (2. ed.).
Springer, ISBN: 978-3-642-15259-7, 2011

2010
Encrypting Keys Securely.
IEEE Security & Privacy, 2010

State Machine Replication with Byzantine Faults.
Proceedings of the Replication: Theory and Practice, 2010

Storyboard: Optimistic Deterministic Multithreading.
Proceedings of the Sixth Workshop on Hot Topics in System Dependability, 2010

Design and Implementation of a Key-Lifecycle Management System.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

Venus: verification for untrusted cloud storage.
Proceedings of the 2nd ACM Cloud Computing Security Workshop, 2010

2009
Preface.
Theor. Comput. Sci., 2009

Trusting the cloud.
SIGACT News, 2009

Fork sequential consistency is blocking.
Inf. Process. Lett., 2009

Rational Protocols.
Proceedings of the iNetSec 2009 - Open Research Problems in Network Security, 2009

Fail-Aware Untrusted Storage.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

A Secure Cryptographic Token Interface.
Proceedings of the 22nd IEEE Computer Security Foundations Symposium, 2009

Integrity Protection for Revision Control.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009

2008
Fork Sequential Consistency is Blocking
CoRR, 2008

Principles of untrusted storage: a new look at consistency conditions.
Proceedings of the Twenty-Seventh Annual ACM Symposium on Principles of Distributed Computing, 2008

2007
Efficient fork-linearizable access to untrusted shared memory.
Proceedings of the Twenty-Sixth Annual ACM Symposium on Principles of Distributed Computing, 2007

Cryptographic Security for a High-Performance Distributed File System.
Proceedings of the 24th IEEE Conference on Mass Storage Systems and Technologies (MSST 2007), 2007

2006
Intrusion-tolerant middleware: the road to automatic security.
IEEE Security & Privacy, 2006

Parsimonious Asynchronous Byzantine-Fault-Tolerant Atomic Broadcast.
IACR Cryptology ePrint Archive, 2006

Secure Key-Updating for Lazy Revocation.
Proceedings of the Computer Security, 2006

06371 Abstracts Collection -- From Security to Dependability.
Proceedings of the From Security to Dependability, 10.09. - 15.09.2006, 2006

06371 Executive Summary -- From Security to Dependability.
Proceedings of the From Security to Dependability, 10.09. - 15.09.2006, 2006

2005
Digital Steganography.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Random Oracles in Constantinople: Practical Asynchronous Byzantine Agreement Using Cryptography.
J. Cryptology, 2005

Secure Key-Updating for Lazy Revocation.
IACR Cryptology ePrint Archive, 2005

Asynchronous Verifiable Information Dispersal.
Proceedings of the Distributed Computing, 19th International Conference, 2005

Optimal Resilience for Erasure-Coded Byzantine Distributed Storage.
Proceedings of the Distributed Computing, 19th International Conference, 2005

Public-Key Steganography with Active Attacks.
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005

Asynchronous Veri.able Information Dispersal.
Proceedings of the 24th IEEE Symposium on Reliable Distributed Systems (SRDS 2005), 2005

Lazy Revocation in Cryptographic File Systems.
Proceedings of the 3rd International IEEE Security in Storage Workshop (SISW 2005), 2005

Parsimonious Asynchronous Byzantine-Fault-Tolerant Atomic Broadcast.
Proceedings of the Principles of Distributed Systems, 9th International Conference, 2005

2004
An information-theoretic model for steganography.
Inf. Comput., 2004

Asynchronous group key exchange with failures.
Proceedings of the Twenty-Third Annual ACM Symposium on Principles of Distributed Computing, 2004

Secure Distributed DNS.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004

2003
Public-Key Steganography with Active Attacks.
IACR Cryptology ePrint Archive, 2003

An asynchronous protocol for distributed computation of RSA inverses and its applications.
Proceedings of the Twenty-Second ACM Symposium on Principles of Distributed Computing, 2003

Proactive secure message transmission in asynchronous networks.
Proceedings of the Twenty-Second ACM Symposium on Principles of Distributed Computing, 2003

Reliable Broadcast in a Computational Hybrid Model with Byzantine Faults, Crashes, and Recoveries.
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003

Modeling Complexity in Secure Distributed Computing.
Proceedings of the Future Directions in Distributed Computing, 2003

2002
Asynchronous Verifiable Secret Sharing and Proactive Cryptosystems.
IACR Cryptology ePrint Archive, 2002

Secure Intrusion-tolerant Replication on the Internet.
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002

Asynchronous verifiable secret sharing and proactive cryptosystems.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002

2001
Secure and Efficient Asynchronous Broadcast Protocols.
IACR Cryptology ePrint Archive, 2001

Cryptographic Security for Mobile Code.
Proceedings of the 2001 IEEE Symposium on Security and Privacy, 2001

Distributing Trust on the Internet .
Proceedings of the 2001 International Conference on Dependable Systems and Networks (DSN 2001) (formerly: FTCS), 2001

Secure and Efficient Asynchronous Broadcast Protocols.
Proceedings of the Advances in Cryptology, 2001

2000
Random Oracles in Constantinople: Practical Asynchronous Byzantine Agreement using Cryptography.
IACR Cryptology ePrint Archive, 2000

An Information-Theoretic Model for Steganography.
IACR Cryptology ePrint Archive, 2000

Random oracles in constantipole: practical asynchronous Byzantine agreement using cryptography (extended abstract).
Proceedings of the Nineteenth Annual ACM Symposium on Principles of Distributed Computing, 2000

One-Round Secure Computation and Secure Autonomous Mobile Agents.
Proceedings of the Automata, Languages and Programming, 27th International Colloquium, 2000

Optimistic Fair Secure Computation.
Proceedings of the Advances in Cryptology, 2000

1999
Computationally Private Information Retrieval with Polylogarithmic Communication.
Proceedings of the Advances in Cryptology, 1999

Efficient Private Bidding and Auctions with an Oblivious Third Party.
Proceedings of the CCS '99, 1999

1998
An Information-Theoretic Model for Steganography.
Proceedings of the Information Hiding, 1998

Oblivious Transfer with a Memory-Bounded Receiver.
Proceedings of the 39th Annual Symposium on Foundations of Computer Science, 1998

On the Foundations of Oblivious Transfer.
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998

1997
Entropy measures and unconditional security in cryptography.
PhD thesis, 1997

Linking Information Reconciliation and Privacy Amplification.
J. Cryptology, 1997

Smooth Entropy and Rényi Entropy.
Proceedings of the Advances in Cryptology, 1997

Unconditional Security Against Memory-Bounded Adversaries.
Proceedings of the Advances in Cryptology, 1997

1995
On-Line Secret Sharing.
Proceedings of the Cryptography and Coding, 1995

1994
Pedagogical pattern selection strategies.
Neural Networks, 1994

Linking Information Reconciliation and Privacy Amplification (Extended Abstract).
Proceedings of the Advances in Cryptology, 1994

1993
Locating the Primary Attention Focus of the User.
Proceedings of the Human Computer Interaction, Vienna Conference, 1993


  Loading...