Tian Gong

12 posts

Tian Gong banner
Tian Gong

Tian Gong

@esnie17

I mainly do mechanism design in secure distributed computations.

Katılım Ekim 2020
44 Takip Edilen46 Takipçiler
Aniket Kate
Aniket Kate@aniketpkate·
Congratulations to @esnie17 on the successful defense of her Ph.D. thesis titled "Relax the Reliance on Honesty in Distributed Cryptographic Protocols" at @PurdueCS This thesis is a culmination of her arduous efforts over the last five years combining ideas from game theory, cryptography, and distributed computing. These results are foundational to the different Web3/DeFi sub-systems. Check out her research at ttiangong.com
Aniket Kate tweet media
English
1
3
30
1.7K
Tian Gong
Tian Gong@esnie17·
@aniketpkate Thanks! I did not realize it actually took this much time. Arxiv has the simplified version. We should be uploading the current version in a month.
English
0
1
0
525
Aniket Kate
Aniket Kate@aniketpkate·
Our paper 'More is Merrier: Relax the Non-Collusion Assumption in Multi-Server PIR' (arxiv.org/abs/2201.07740) led by @esnie17 got accepted to IEEE S&P 2024 recently. (w/ Ryan Hnery, n Alex Psomas) The journey of this paper has been long and is indeed worth sharing. [1/n]
English
4
15
69
9.7K
Lúcás Meier
Lúcás Meier@cronokirby·
This scheme is secure against adversaries with a quantum computer, but what about adversaries with a time machine?
English
13
5
32
0
Tian Gong
Tian Gong@esnie17·
@socrates1024 hawk? they seems to stabilize their heads unless vision changes
English
0
0
0
0
Andrew Miller
Andrew Miller@socrates1024·
What's the animal mascot between bull and bear that best embodies the Efficient Market Hypothesis, aggressively sideways, proclaiming "today will be the exactly the same, unlike yesterday or any of the pior days either"
English
13
0
8
0
Tian Gong
Tian Gong@esnie17·
@sanket1729 @paddypisa @dankrad @evan_van_ness @adam3us i see. thanks for pointing this out. The two mitigations both have an embedded assumption that new transactions are "necessary" or "game-changing-ly important". To undercut is to forsake at least some new transactions appearing during a certain time window
English
0
0
0
0
Tian Gong
Tian Gong@esnie17·
@sanket1729 @dankrad @evan_van_ness @adam3us @paddypisa please correct me if i'm understanding it wrong. so one possible scenario is that at time t0, we have 10B pending transactions with block size limit being B. A potential undercutter does not need to use new transactions as enough ingredients are in the pool
English
1
0
0
0
sanket1729
sanket1729@sanket1729·
@esnie17 @dankrad @evan_van_ness @adam3us @paddypisa This means that the fees from the newer transactions cannot be undercut by a previous block. And extending the longer chain has the availability to a larger set of mempool transactions. Of course, concrete analysis needs to be done. But this is seen a potential mitigation
English
1
0
1
0
Dankrad Feist
Dankrad Feist@dankrad·
@sanket1729 @evan_van_ness @adam3us @paddypisa I had an extensive discussion about this with the authors back when the initial paper came out. I honestly think their model was wrong back then, and they never came back to me. Just saw the updated version, to be fair I haven't read it in detail yet.
English
2
0
0
0
Tian Gong
Tian Gong@esnie17·
@dankrad @sanket1729 @evan_van_ness @adam3us @paddypisa That's why the undercutter can always undercut. Because there are few fees remaining, which makes extending the undercutter's chain more promising. We also allowed the undercutter to attack all the time in the previous model. But we applied conditions in the new model.
English
0
0
0
0
Dankrad Feist
Dankrad Feist@dankrad·
@sanket1729 @evan_van_ness @adam3us @paddypisa Unfortunately, that paper comes way short of the original paper. As a simple example, in their model, a rational miner, when faced with two chains of the same length, follows the earlier one, rather than the one with more fees left over (and where their block can thus earn more).
English
4
0
3
0