Lefteris Kokoris Kogias
Kokoris Group
30 Publications
2022 | Conference Paper | IST-REx-ID: 11331 |

Danezis, George, et al. “Narwhal and Tusk: A DAG-Based Mempool and Efficient BFT Consensus.” Proceedings of the 17th European Conference on Computer Systems, Association for Computing Machinery, 2022, pp. 34–50, doi:10.1145/3492321.3519594.
View
| DOI
| Download Preprint (ext.)
| arXiv
2022 | Conference Paper | IST-REx-ID: 12160
De la Rocha, Alfonso, et al. “Hierarchical Consensus: A Horizontal Scaling Framework for Blockchains.” 42nd International Conference on Distributed Computing Systems Workshops, vol. 2022, Institute of Electrical and Electronics Engineers, 2022, pp. 45–52, doi:10.1109/icdcsw56584.2022.00018.
View
| DOI
2022 | Conference Paper | IST-REx-ID: 12168 |

Cohen, Shir, et al. “Be Aware of Your Leaders.” International Conference on Financial Cryptography and Data Security, vol. 13411, Springer Nature, 2022, pp. 279–95, doi:10.1007/978-3-031-18283-9_13.
View
| DOI
| Download Preprint (ext.)
| arXiv
2022 | Conference Paper | IST-REx-ID: 12229 |

Spiegelman, Alexander, et al. “Bullshark: DAG BFT Protocols Made Practical.” Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, Association for Computing Machinery, 2022, pp. 2705–2718, doi:10.1145/3548606.3559361.
View
| DOI
| Download Preprint (ext.)
| arXiv
2022 | Conference Paper | IST-REx-ID: 12298 |

Gelashvili, Rati, et al. “Jolteon and Ditto: Network-Adaptive Efficient Consensus with Asynchronous Fallback.” Financial Cryptography and Data Security, vol. 13411, Springer Nature, 2022, pp. 296–315, doi:10.1007/978-3-031-18283-9_14.
View
| DOI
| Download Preprint (ext.)
| arXiv
2022 | Conference Paper | IST-REx-ID: 12300 |

Das, Sourav, et al. “Practical Asynchronous Distributed Key Generation.” 2022 IEEE Symposium on Security and Privacy, Institute of Electrical and Electronics Engineers, 2022, pp. 2518–34, doi:10.1109/sp46214.2022.9833584.
View
| DOI
| Download Preprint (ext.)
2021 | Conference Paper | IST-REx-ID: 10076 |

Blackshear, Sam, et al. “Reactive Key-Loss Protection in Blockchains.” FC 2021 Workshops, vol. 12676, Springer Nature, 2021, pp. 431–50, doi:10.1007/978-3-662-63958-0_34.
View
| DOI
| Download Preprint (ext.)
2021 | Conference Paper | IST-REx-ID: 10325 |

Zamyatin, Alexei, et al. “SoK: Communication across Distributed Ledgers.” 25th International Conference on Financial Cryptography and Data Security, vol. 12675, Springer Nature, 2021, pp. 3–36, doi:10.1007/978-3-662-64331-0_1.
View
| DOI
| Download Preprint (ext.)
2021 | Conference Paper | IST-REx-ID: 10324 |

Avarikioti, Zeta, et al. “Brick: Asynchronous Incentive-Compatible Payment Channels.” 25th International Conference on Financial Cryptography and Data Security, vol. 12675, Springer Nature, 2021, pp. 209–30, doi:10.1007/978-3-662-64331-0_11.
View
| DOI
| Download Preprint (ext.)
| arXiv
2021 | Conference Paper | IST-REx-ID: 10556 |

Kokoris Kogias, Eleftherios, et al. “Asynchronous Distributed Key Generation for Computationally-Secure Randomness, Consensus, and Threshold Signatures.” Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, Association for Computing Machinery, 2021, pp. 1751–1767, doi:10.1145/3372297.3423364.
View
| DOI
| Download Preprint (ext.)
2021 | Conference Paper | IST-REx-ID: 10553 |

Gelashvili, Rati, et al. “Brief Announcement: Be Prepared When Network Goes Bad: An Asynchronous View-Change Protocol.” Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing, Association for Computing Machinery, 2021, pp. 187–90, doi:10.1145/3465084.3467941.
View
| DOI
| Download Preprint (ext.)
| arXiv
2021 | Conference Paper | IST-REx-ID: 10554 |

Keidar, Idit, et al. “All You Need Is DAG.” Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing, Association for Computing Machinery, 2021, pp. 165–75, doi:10.1145/3465084.3467905.
View
| DOI
| Download Preprint (ext.)
| arXiv
2020 | Patent | IST-REx-ID: 10557 |

Ford, Bryan, et al. Cryptographically Verifiable Data Structure Having Multi-Hop Forward and Backwards Links and Associated Systems and Methods. 2020.
View
| Files available
| Download Published Version (ext.)
2020 | Preprint | IST-REx-ID: 8307 |

Stewart, Alistair, and Eleftherios Kokoris Kogias. “GRANDPA: A Byzantine Finality Gadget.” ArXiv, 2007.01560.
View
| Download Preprint (ext.)
| arXiv
2020 | Journal Article | IST-REx-ID: 9011 |

Kokoris Kogias, Eleftherios, et al. “CALYPSO: Private Data Management for Decentralized Ledgers.” Proceedings of the VLDB Endowment, vol. 14, no. 4, Association for Computing Machinery, 2020, pp. 586–99, doi:10.14778/3436905.3436917.
View
| DOI
| Download Published Version (ext.)
2019 | Conference Paper | IST-REx-ID: 8296
Alp, Enis Ceyhun, et al. “Rethinking General-Purpose Decentralized Computing.” Proceedings of the Workshop on Hot Topics in Operating Systems, ACM, 2019, pp. 105–12, doi:10.1145/3317550.3321448.
View
| DOI
2019 | Preprint | IST-REx-ID: 8304 |

Zamyatin, Alexei, et al. “SoK: Communication across Distributed Ledgers.” Cryptology EPrint Archive, 2019/1128.
View
| Download Preprint (ext.)
2019 | Preprint | IST-REx-ID: 8303 |

Kokoris Kogias, Eleftherios. “Robust and Scalable Consensus for Sharded Distributed Ledgers.” Cryptology EPrint Archive, 2019/676.
View
| Download Preprint (ext.)
2019 | Thesis | IST-REx-ID: 8311 |

Kokoris Kogias, Eleftherios. Secure, Confidential Blockchains Providing High Throughput and Low Latency. École Polytechnique Fédérale de Lausanne, 2019, doi:10.5075/epfl-thesis-7101.
View
| DOI
| Download Published Version (ext.)
2019 | Preprint | IST-REx-ID: 8314 |

Avarikioti, Georgia, et al. “Brick: Asynchronous Payment Channels.” ArXiv, 1905.11360.
View
| Download Preprint (ext.)
| arXiv
2019 | Preprint | IST-REx-ID: 8315 |

Avarikioti, Georgia, et al. “Divide and Scale: Formalization of Distributed Ledger Sharding Protocols.” ArXiv, 1910.10434.
View
| Download Preprint (ext.)
| arXiv
2019 | Patent | IST-REx-ID: 8313 |

Ford, Bryan, et al. Methods and Systems for Secure Data Exchange. 2019.
View
| Download Published Version (ext.)
2019 | Preprint | IST-REx-ID: 8305 |

Kokoris Kogias, Eleftherios, et al. “Bootstrapping Consensus without Trusted Setup: Fully Asynchronous Distributed Key Generation.” Cryptology EPrint Archive, 2019/1015.
View
| Download Preprint (ext.)
2018 | Conference Paper | IST-REx-ID: 8298
Androulaki, Elli, et al. “Channels: Horizontal Scaling and Confidentiality on Permissioned Blockchains.” Computer Security, vol. 11098, Springer Nature, 2018, pp. 111–31, doi:10.1007/978-3-319-99073-6_6.
View
| DOI
2018 | Conference Paper | IST-REx-ID: 8297 |

Kokoris Kogias, Eleftherios, et al. “OmniLedger: A Secure, Scale-out, Decentralized Ledger via Sharding.” 2018 IEEE Symposium on Security and Privacy, IEEE, 2018, pp. 583–98, doi:10.1109/sp.2018.000-5.
View
| DOI
| Download Preprint (ext.)
2017 | Conference Paper | IST-REx-ID: 8299
Borge, Maria, et al. “Proof-of-Personhood: Redemocratizing Permissionless Cryptocurrencies.” 2017 IEEE European Symposium on Security and Privacy Workshops, 7966966, IEEE, 2017, doi:10.1109/eurospw.2017.46.
View
| DOI
2017 | Conference Paper | IST-REx-ID: 8306 |

Syta, E., et al. “Scalable Bias-Resistant Distributed Randomness.” 2017 IEEE Symposium on Security and Privacy, IEEE, 2017, pp. 444–60, doi:10.1109/SP.2017.45.
View
| DOI
| Download Preprint (ext.)
2017 | Conference Paper | IST-REx-ID: 8301 |

Nikitin, Kirill, et al. “CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds.” Proceedings of the 26th USENIX Conference on Security Symposium, USENIX Association, 2017, pp. 1271–1287.
View
| Download Published Version (ext.)
2016 | Conference Paper | IST-REx-ID: 8302 |

Kokoris Kogias, Eleftherios, et al. “Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing.” Proceedings of the 25th USENIX Conference on Security Symposium, USENIX Association, 2016, pp. 279–296.
View
| Download Published Version (ext.)
| arXiv
2016 | Conference Paper | IST-REx-ID: 8300
Kokoris Kogias, Eleftherios, et al. “TRM-SIoT: A Scalable Hybrid Trust & Reputation Model for the Social Internet of Things.” 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation, 7733612, IEEE, 2016, doi:10.1109/etfa.2016.7733612.
View
| DOI
30 Publications
2022 | Conference Paper | IST-REx-ID: 11331 |

Danezis, George, et al. “Narwhal and Tusk: A DAG-Based Mempool and Efficient BFT Consensus.” Proceedings of the 17th European Conference on Computer Systems, Association for Computing Machinery, 2022, pp. 34–50, doi:10.1145/3492321.3519594.
View
| DOI
| Download Preprint (ext.)
| arXiv
2022 | Conference Paper | IST-REx-ID: 12160
De la Rocha, Alfonso, et al. “Hierarchical Consensus: A Horizontal Scaling Framework for Blockchains.” 42nd International Conference on Distributed Computing Systems Workshops, vol. 2022, Institute of Electrical and Electronics Engineers, 2022, pp. 45–52, doi:10.1109/icdcsw56584.2022.00018.
View
| DOI
2022 | Conference Paper | IST-REx-ID: 12168 |

Cohen, Shir, et al. “Be Aware of Your Leaders.” International Conference on Financial Cryptography and Data Security, vol. 13411, Springer Nature, 2022, pp. 279–95, doi:10.1007/978-3-031-18283-9_13.
View
| DOI
| Download Preprint (ext.)
| arXiv
2022 | Conference Paper | IST-REx-ID: 12229 |

Spiegelman, Alexander, et al. “Bullshark: DAG BFT Protocols Made Practical.” Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, Association for Computing Machinery, 2022, pp. 2705–2718, doi:10.1145/3548606.3559361.
View
| DOI
| Download Preprint (ext.)
| arXiv
2022 | Conference Paper | IST-REx-ID: 12298 |

Gelashvili, Rati, et al. “Jolteon and Ditto: Network-Adaptive Efficient Consensus with Asynchronous Fallback.” Financial Cryptography and Data Security, vol. 13411, Springer Nature, 2022, pp. 296–315, doi:10.1007/978-3-031-18283-9_14.
View
| DOI
| Download Preprint (ext.)
| arXiv
2022 | Conference Paper | IST-REx-ID: 12300 |

Das, Sourav, et al. “Practical Asynchronous Distributed Key Generation.” 2022 IEEE Symposium on Security and Privacy, Institute of Electrical and Electronics Engineers, 2022, pp. 2518–34, doi:10.1109/sp46214.2022.9833584.
View
| DOI
| Download Preprint (ext.)
2021 | Conference Paper | IST-REx-ID: 10076 |

Blackshear, Sam, et al. “Reactive Key-Loss Protection in Blockchains.” FC 2021 Workshops, vol. 12676, Springer Nature, 2021, pp. 431–50, doi:10.1007/978-3-662-63958-0_34.
View
| DOI
| Download Preprint (ext.)
2021 | Conference Paper | IST-REx-ID: 10325 |

Zamyatin, Alexei, et al. “SoK: Communication across Distributed Ledgers.” 25th International Conference on Financial Cryptography and Data Security, vol. 12675, Springer Nature, 2021, pp. 3–36, doi:10.1007/978-3-662-64331-0_1.
View
| DOI
| Download Preprint (ext.)
2021 | Conference Paper | IST-REx-ID: 10324 |

Avarikioti, Zeta, et al. “Brick: Asynchronous Incentive-Compatible Payment Channels.” 25th International Conference on Financial Cryptography and Data Security, vol. 12675, Springer Nature, 2021, pp. 209–30, doi:10.1007/978-3-662-64331-0_11.
View
| DOI
| Download Preprint (ext.)
| arXiv
2021 | Conference Paper | IST-REx-ID: 10556 |

Kokoris Kogias, Eleftherios, et al. “Asynchronous Distributed Key Generation for Computationally-Secure Randomness, Consensus, and Threshold Signatures.” Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, Association for Computing Machinery, 2021, pp. 1751–1767, doi:10.1145/3372297.3423364.
View
| DOI
| Download Preprint (ext.)
2021 | Conference Paper | IST-REx-ID: 10553 |

Gelashvili, Rati, et al. “Brief Announcement: Be Prepared When Network Goes Bad: An Asynchronous View-Change Protocol.” Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing, Association for Computing Machinery, 2021, pp. 187–90, doi:10.1145/3465084.3467941.
View
| DOI
| Download Preprint (ext.)
| arXiv
2021 | Conference Paper | IST-REx-ID: 10554 |

Keidar, Idit, et al. “All You Need Is DAG.” Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing, Association for Computing Machinery, 2021, pp. 165–75, doi:10.1145/3465084.3467905.
View
| DOI
| Download Preprint (ext.)
| arXiv
2020 | Patent | IST-REx-ID: 10557 |

Ford, Bryan, et al. Cryptographically Verifiable Data Structure Having Multi-Hop Forward and Backwards Links and Associated Systems and Methods. 2020.
View
| Files available
| Download Published Version (ext.)
2020 | Preprint | IST-REx-ID: 8307 |

Stewart, Alistair, and Eleftherios Kokoris Kogias. “GRANDPA: A Byzantine Finality Gadget.” ArXiv, 2007.01560.
View
| Download Preprint (ext.)
| arXiv
2020 | Journal Article | IST-REx-ID: 9011 |

Kokoris Kogias, Eleftherios, et al. “CALYPSO: Private Data Management for Decentralized Ledgers.” Proceedings of the VLDB Endowment, vol. 14, no. 4, Association for Computing Machinery, 2020, pp. 586–99, doi:10.14778/3436905.3436917.
View
| DOI
| Download Published Version (ext.)
2019 | Conference Paper | IST-REx-ID: 8296
Alp, Enis Ceyhun, et al. “Rethinking General-Purpose Decentralized Computing.” Proceedings of the Workshop on Hot Topics in Operating Systems, ACM, 2019, pp. 105–12, doi:10.1145/3317550.3321448.
View
| DOI
2019 | Preprint | IST-REx-ID: 8304 |

Zamyatin, Alexei, et al. “SoK: Communication across Distributed Ledgers.” Cryptology EPrint Archive, 2019/1128.
View
| Download Preprint (ext.)
2019 | Preprint | IST-REx-ID: 8303 |

Kokoris Kogias, Eleftherios. “Robust and Scalable Consensus for Sharded Distributed Ledgers.” Cryptology EPrint Archive, 2019/676.
View
| Download Preprint (ext.)
2019 | Thesis | IST-REx-ID: 8311 |

Kokoris Kogias, Eleftherios. Secure, Confidential Blockchains Providing High Throughput and Low Latency. École Polytechnique Fédérale de Lausanne, 2019, doi:10.5075/epfl-thesis-7101.
View
| DOI
| Download Published Version (ext.)
2019 | Preprint | IST-REx-ID: 8314 |

Avarikioti, Georgia, et al. “Brick: Asynchronous Payment Channels.” ArXiv, 1905.11360.
View
| Download Preprint (ext.)
| arXiv
2019 | Preprint | IST-REx-ID: 8315 |

Avarikioti, Georgia, et al. “Divide and Scale: Formalization of Distributed Ledger Sharding Protocols.” ArXiv, 1910.10434.
View
| Download Preprint (ext.)
| arXiv
2019 | Patent | IST-REx-ID: 8313 |

Ford, Bryan, et al. Methods and Systems for Secure Data Exchange. 2019.
View
| Download Published Version (ext.)
2019 | Preprint | IST-REx-ID: 8305 |

Kokoris Kogias, Eleftherios, et al. “Bootstrapping Consensus without Trusted Setup: Fully Asynchronous Distributed Key Generation.” Cryptology EPrint Archive, 2019/1015.
View
| Download Preprint (ext.)
2018 | Conference Paper | IST-REx-ID: 8298
Androulaki, Elli, et al. “Channels: Horizontal Scaling and Confidentiality on Permissioned Blockchains.” Computer Security, vol. 11098, Springer Nature, 2018, pp. 111–31, doi:10.1007/978-3-319-99073-6_6.
View
| DOI
2018 | Conference Paper | IST-REx-ID: 8297 |

Kokoris Kogias, Eleftherios, et al. “OmniLedger: A Secure, Scale-out, Decentralized Ledger via Sharding.” 2018 IEEE Symposium on Security and Privacy, IEEE, 2018, pp. 583–98, doi:10.1109/sp.2018.000-5.
View
| DOI
| Download Preprint (ext.)
2017 | Conference Paper | IST-REx-ID: 8299
Borge, Maria, et al. “Proof-of-Personhood: Redemocratizing Permissionless Cryptocurrencies.” 2017 IEEE European Symposium on Security and Privacy Workshops, 7966966, IEEE, 2017, doi:10.1109/eurospw.2017.46.
View
| DOI
2017 | Conference Paper | IST-REx-ID: 8306 |

Syta, E., et al. “Scalable Bias-Resistant Distributed Randomness.” 2017 IEEE Symposium on Security and Privacy, IEEE, 2017, pp. 444–60, doi:10.1109/SP.2017.45.
View
| DOI
| Download Preprint (ext.)
2017 | Conference Paper | IST-REx-ID: 8301 |

Nikitin, Kirill, et al. “CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds.” Proceedings of the 26th USENIX Conference on Security Symposium, USENIX Association, 2017, pp. 1271–1287.
View
| Download Published Version (ext.)
2016 | Conference Paper | IST-REx-ID: 8302 |

Kokoris Kogias, Eleftherios, et al. “Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing.” Proceedings of the 25th USENIX Conference on Security Symposium, USENIX Association, 2016, pp. 279–296.
View
| Download Published Version (ext.)
| arXiv
2016 | Conference Paper | IST-REx-ID: 8300
Kokoris Kogias, Eleftherios, et al. “TRM-SIoT: A Scalable Hybrid Trust & Reputation Model for the Social Internet of Things.” 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation, 7733612, IEEE, 2016, doi:10.1109/etfa.2016.7733612.
View
| DOI