1 code implementation • 16 Feb 2020 • Ayelet Mizrahi, Aviv Zohar
As we evaluate the attacks, we also look at statistics on parameters in the Lightning Network, which are of independent interest and compare the various implementations of Lightning nodes.
Cryptography and Security
1 code implementation • 26 Sep 2017 • Ron Lavi, Or Sattath, Aviv Zohar
The Bitcoin payment system involves two agent types: Users that transact with the currency and pay fees and miners in charge of authorizing transactions and securing the system in return for these fees.
Cryptography and Security Computer Science and Game Theory
no code implementations • NeurIPS 2016 • Michal Feldman, Tomer Koren, Roi Livni, Yishay Mansour, Aviv Zohar
We consider a seller with an unlimited supply of a single good, who is faced with a stream of $T$ buyers.
no code implementations • 24 Jun 2016 • Omer Lev, Moshe Tennenholtz, Aviv Zohar
Information delivery in a network of agents is a key issue for large, complex systems that need to do so in a predictable, efficient manner.
1 code implementation • 24 May 2016 • Maria Apostolaki, Aviv Zohar, Laurent Vanbever
By isolating parts of the network or delaying block propagation, attackers can cause a significant amount of mining power to be wasted, leading to revenue losses and enabling a wide range of exploits such as double spending.
Networking and Internet Architecture Cryptography and Security
no code implementations • 10 Nov 2011 • Moshe Babaioff, Shahar Dobzinski, Sigal Oren, Aviv Zohar
Our solution is to augment the protocol with a scheme that rewards information propagation.
Computer Science and Game Theory