Design Choices for Central Bank Digital Currency: Policy and Technical Considerations

Central banks around the world are exploring and in some cases even piloting Central Bank Digital Currencies (CBDCs). CBDCs promise to realize a broad range of new capabilities, including direct government disbursements to citizens, frictionless consumer payment and money-transfer systems, and a range of new financial instruments and monetary policy levers. CBDCs also give rise, however, to a host of challenging technical goals and design questions that are qualitatively and quantitatively different from those in existing government and consumer payment systems. A well-functioning CBDC will require an extremely resilient, secure, and performant new infrastructure, with the ability to onboard, authenticate, and support users on massive scale. It will necessitate an architecture simple enough to support modular design and rigorous security analysis, but flexible enough to accommodate current and future functional requirements and use cases. A CBDC will also in some way need to address an innate tension between privacy and transparency, protecting user data from abuse while selectively permitting data mining for end-user services, policymakers, and law enforcement investigations and interventions. In this paper, we enumerate the fundamental technical design challenges facing CBDC designers, with a particular focus on performance, privacy, and security. Through a survey of relevant academic and industry research and deployed systems, we discuss the state of the art in technologies that can address the challenges involved in successful CBDC deployment. We also present a vision of the rich range of functionalities and use cases that a well-designed CBDC platform could ultimately offer users.

[1]  Silvio Gesell The Natural Economic Order , 1934 .

[2]  Leslie Lamport,et al.  Time, clocks, and the ordering of events in a distributed system , 1978, CACM.

[3]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[4]  David Chaum,et al.  Blind Signatures for Untraceable Payments , 1982, CRYPTO.

[5]  Moni Naor,et al.  Pricing via Processing or Combatting Junk Mail , 1992, CRYPTO.

[6]  Ronald L. Rivest,et al.  SDSI - A Simple Distributed Security Infrastructure , 1996 .

[7]  Markus G. Kuhn,et al.  Tamper resistance: a cautionary note , 1996 .

[8]  Philip R. Zimmermann,et al.  The official PGP user's guide , 1996 .

[9]  E. Hughes A cypherpunk's manifesto , 1997 .

[10]  Markus G. Kuhn,et al.  Low Cost Attacks on Tamper Resistant Devices , 1997, Security Protocols Workshop.

[11]  Leslie Lamport,et al.  The part-time parliament , 1998, TOCS.

[12]  Markus Jakobsson,et al.  Proofs of Work and Bread Pudding Protocols , 1999, Communications and Multimedia Security.

[13]  M. Kuhn,et al.  The Advanced Computing Systems Association Design Principles for Tamper-resistant Smartcard Processors Design Principles for Tamper-resistant Smartcard Processors , 2022 .

[14]  J. Doug Tygar,et al.  Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.

[15]  Miguel Oom Temudo de Castro,et al.  Practical Byzantine fault tolerance , 1999, OSDI '99.

[16]  Victor Shoup,et al.  Practical Threshold Signatures , 2000, EUROCRYPT.

[17]  John Langford,et al.  CAPTCHA: Using Hard AI Problems for Security , 2003, EUROCRYPT.

[18]  Roberto Tamassia,et al.  Authenticated Data Structures , 2003, ESA.

[19]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[20]  Idit Keidar,et al.  Byzantine disk paxos: optimal resilience with byzantine shared memory , 2004, PODC '04.

[21]  T. Alves,et al.  TrustZone : Integrated Hardware and Software Security , 2004 .

[22]  Moti Yung,et al.  Fourth-factor authentication: somebody you know , 2006, CCS '06.

[23]  Jan Camenisch,et al.  Balancing accountability and privacy using E-cash , 2006 .

[24]  Leslie Lamport,et al.  Fast Paxos , 2006, Distributed Computing.

[25]  Krishna P. Gummadi,et al.  Measurement and analysis of online social networks , 2007, IMC '07.

[26]  Super Crunchers: Why Thinking-by-Numbers Is the New Way to Be Smart , 2008, Journal of Advertising Research.

[27]  Krishna P. Gummadi,et al.  Ostra: Leveraging Trust to Thwart Unwanted Communication , 2008, NSDI.

[28]  Rafail Ostrovsky,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..

[29]  Bruce A. Champ Stamp Scrip: Money People Paid to Use , 2008 .

[30]  Feng Xiao,et al.  SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[31]  Amit A. Levy,et al.  Vanish: Increasing Data Privacy with Self-Destructing Data , 2009, USENIX Security Symposium.

[32]  Lakshminarayanan Subramanian,et al.  Sybil-Resilient Online Content Voting , 2009, NSDI.

[33]  Dan S. Wallach,et al.  Efficient Data Structures For Tamper-Evident Logging , 2009, USENIX Security Symposium.

[34]  Ji Xiang,et al.  CAPTCHA Phishing: A Practical Attack on Human Interaction Proofing , 2009, Inscrypt.

[35]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[36]  Chi-Ho Chan,et al.  An Evaluation of Video-to-Video Face Verification , 2010, IEEE Transactions on Information Forensics and Security.

[37]  Krishna P. Gummadi,et al.  An analysis of social network-based Sybil defenses , 2010, SIGCOMM '10.

[38]  Jeffrey P. Dew,et al.  The Association Between Consumer Debt and the Likelihood of Divorce , 2011 .

[39]  M. Pshirkov,et al.  Weak microlensing effect and stability of pulsar time scale , 2006, astro-ph/0610681.

[40]  James A. Hendler,et al.  Accountability and deterrence in online life , 2011, WebSci '11.

[41]  Marios Savvides,et al.  How to Generate Spoofed Irises From an Iris Code Template , 2011, IEEE Transactions on Information Forensics and Security.

[42]  Sunny King,et al.  PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake , 2012 .

[43]  Krishna P. Gummadi,et al.  Canal: scaling social network-based Sybil tolerance schemes , 2012, EuroSys '12.

[44]  Irina Sakharova Payment card fraud: Challenges and solutions , 2012, 2012 IEEE International Conference on Intelligence and Security Informatics.

[45]  Jörg Becker,et al.  Can We Afford Integrity by Proof-of-Work? Scenarios Inspired by the Bitcoin Currency , 2012, WEIS.

[46]  Qijun Zhao,et al.  Fingerprint image synthesis based on statistical feature models , 2012, 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[47]  Krishna P. Gummadi,et al.  Understanding and combating link farming in the twitter social network , 2012, WWW.

[48]  Jacob Appelbaum,et al.  Cypherpunks: Freedom and the Future of the Internet , 2012 .

[49]  Ghassan O. Karame,et al.  Evaluating User Privacy in Bitcoin , 2013, Financial Cryptography.

[50]  Adrienne Porter Felt,et al.  Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness , 2013, USENIX Security Symposium.

[51]  Ittai Anati,et al.  Innovative Technology for CPU Based Attestation and Sealing , 2013 .

[52]  Fabrício Benevenuto,et al.  You followed my bot! Transforming robots into influential users in Twitter , 2013, First Monday.

[53]  Adi Shamir,et al.  Quantitative Analysis of the Full Bitcoin Transaction Graph , 2013, Financial Cryptography.

[54]  S A R A H M E I K L E J O H N,et al.  A Fistful of Bitcoins Characterizing Payments Among Men with No Names , 2013 .

[55]  Joshua A. Kroll,et al.  The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries , 2013 .

[56]  Joan Feigenbaum,et al.  Catching Bandits and Only Bandits: Privacy-Preserving Intersection Warrants for Lawful Surveillance , 2014, FOCI.

[57]  Stefano Zanero,et al.  BitIodine: Extracting Intelligence from the Bitcoin Network , 2014, Financial Cryptography.

[58]  Alysson Neves Bessani,et al.  Analysis of operating system diversity for intrusion tolerance , 2014, Softw. Pract. Exp..

[59]  Pieter Wuille,et al.  Enabling Blockchain Innovations with Pegged Sidechains , 2014 .

[60]  Eli Ben-Sasson,et al.  Zerocash: Decentralized Anonymous Payments from Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.

[61]  David Berger,et al.  Consumption Dynamics During Recessions , 2014 .

[62]  John K. Ousterhout,et al.  In Search of an Understandable Consensus Algorithm , 2014, USENIX Annual Technical Conference.

[63]  Emin Gün Sirer,et al.  Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.

[64]  Jae Kwon,et al.  Tendermint : Consensus without Mining , 2014 .

[65]  Elaine Shi,et al.  Permacoin: Repurposing Bitcoin Work for Data Preservation , 2014, 2014 IEEE Symposium on Security and Privacy.

[66]  Joshua A. Kroll Secure protocols for accountable warrant execution , 2014 .

[67]  Vitalik Buterin A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .

[68]  J. Schroeder Bitcoin and the Uniform Commercial Code , 2015 .

[69]  John W. Goodell,et al.  Lending to women in microfinance: Role of social trust , 2015 .

[70]  Michael J. Freedman,et al.  CONIKS: Bringing Key Transparency to End Users , 2015, USENIX Security Symposium.

[71]  M. Demertzis,et al.  Digital currencies , 2015, The Routledge Handbook of FinTech.

[72]  Adrian Perrig,et al.  Efficient gossip protocols for verifying the consistency of Certificate logs , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).

[73]  Fabrício Benevenuto,et al.  Reverse engineering socialbot infiltration strategies in Twitter , 2014, 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).

[74]  Ashay Rane,et al.  Raccoon: Closing Digital Side-Channels through Obfuscated Execution , 2015, USENIX Security Symposium.

[75]  Hélène Rey Dilemma Not Trilemma: The Global Financial Cycle and Monetary Policy Independence , 2015 .

[76]  Karl Crary,et al.  Peer-to-peer affine commitment using bitcoin , 2015, PLDI.

[77]  Adi Shamir,et al.  Physical key extraction attacks on PCs , 2016, Commun. ACM.

[78]  George Danezis,et al.  Centrally Banked Cryptocurrencies , 2015, NDSS.

[79]  B. Fung,et al.  Central Bank Digital Currencies: A Framework for Assessing Why and How , 2016 .

[80]  Elaine Shi,et al.  FruitChains: A Fair Blockchain , 2017, IACR Cryptol. ePrint Arch..

[81]  Emin Gün Sirer,et al.  Bitcoin Covenants , 2016, Financial Cryptography Workshops.

[82]  Aviv Zohar,et al.  Optimal Selfish Mining Strategies in Bitcoin , 2015, Financial Cryptography.

[83]  John Barrdear,et al.  The Macroeconomics of Central Bank Issued Digital Currencies , 2016 .

[84]  Emilio Ferrara,et al.  Social Bots Distort the 2016 US Presidential Election Online Discussion , 2016, First Monday.

[85]  Aggelos Kiayias,et al.  Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol , 2017, CRYPTO.

[86]  Elaine Shi,et al.  The Ring of Gyges: Investigating the Future of Criminal Smart Contracts , 2016, CCS.

[87]  Filippo Menczer,et al.  The rise of social bots , 2014, Commun. ACM.

[88]  Songwu Lu,et al.  New Security Threats Caused by IMS-based SMS Service in 4G LTE Networks , 2016, CCS.

[89]  Matthew Green,et al.  Accountable Privacy for Decentralized Anonymous Payments , 2016, Financial Cryptography.

[90]  Ari Juels,et al.  Setting Standards for Altering and Undoing Smart Contracts , 2016, RuleML.

[91]  David Wolinsky,et al.  Keeping Authorities "Honest or Bust" with Decentralized Witness Cosigning , 2015, 2016 IEEE Symposium on Security and Privacy (SP).

[92]  Elaine Shi,et al.  Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts , 2016, 2016 IEEE Symposium on Security and Privacy (SP).

[93]  Liuqing Yang,et al.  Where does AlphaGo go: from church-turing thesis to AlphaGo thesis and beyond , 2016, IEEE/CAA Journal of Automatica Sinica.

[94]  Emin Gün Sirer,et al.  Bitcoin-NG: A Scalable Blockchain Protocol , 2015, NSDI.

[95]  Felix Wu No easy answers in the fight over iPhone decryption , 2016, Commun. ACM.

[96]  Laurent Vanbever,et al.  Hijacking Bitcoin: Large-scale Network Attacks on Cryptocurrencies , 2016, ArXiv.

[97]  Emin Gün Sirer,et al.  Service-Oriented Sharding with Aspen , 2016, ArXiv.

[98]  Bryan Ford,et al.  Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing , 2016, USENIX Security Symposium.

[99]  D. Yermack,et al.  Digital Currencies, Decentralized Ledgers, and the Future of Central Banking , 2016 .

[100]  Jim Groom,et al.  The Path to Self-Sovereign Identity , 2017 .

[101]  Qian Yao,et al.  A systematic framework to understand central bank digital currency , 2018, Science China Information Sciences.

[102]  徐忠,et al.  A kind of safety method, system and the terminal of digital cash of the use based on block chain , 2017 .

[103]  Kenneth S. Rogoff,et al.  The Curse of Cash: How Large-Denomination Bills Aid Crime and Tax Evasion and Constrain Monetary Policy , 2017 .

[104]  Prateek Saxena,et al.  A Traceability Analysis of Monero's Blockchain , 2017, ESORICS.

[105]  Kevin Lee,et al.  An Empirical Analysis of Linkability in the Monero Blockchain , 2017, ArXiv.

[106]  Johannes Götzfried,et al.  Cache Attacks on Intel SGX , 2017, EUROSEC.

[107]  Fan Zhang,et al.  Solidus: Confidential Distributed Ledger Transactions via PVORM , 2017, CCS.

[108]  Joan Feigenbaum,et al.  Multiple Objectives of Lawful-Surveillance Protocols (Transcript of Discussion) , 2017, Security Protocols Workshop.

[109]  Srinivas Devadas,et al.  Catena: Efficient Non-equivocation via Bitcoin , 2017, 2017 IEEE Symposium on Security and Privacy (SP).

[110]  Giuseppe Ateniese,et al.  Redactable Blockchain – or – Rewriting History in Bitcoin and Friends , 2017, 2017 IEEE European Symposium on Security and Privacy (EuroS&P).

[111]  Ole Bjerg Designing New Money - The Policy Trilemma of Central Bank Digital Currency , 2017 .

[112]  Elaine Shi,et al.  Thunderella: Blockchains with Optimistic Instant Confirmation , 2018, IACR Cryptol. ePrint Arch..

[113]  Silvio Micali,et al.  Algorand: Scaling Byzantine Agreements for Cryptocurrencies , 2017, IACR Cryptol. ePrint Arch..

[114]  Pam Dixon A Failure to “Do No Harm” -- India’s Aadhaar biometric ID program and its inability to protect privacy in relation to measures in Europe and the U.S. , 2017, Health and technology.

[115]  Morten L. Bech,et al.  Central Bank Cryptocurrencies , 2017 .

[116]  Srdjan Capkun,et al.  Software Grand Exposure: SGX Cache Attacks Are Practical , 2017, WOOT.

[117]  Andrew T. Levin,et al.  Central Bank Digital Currency and the Future of Monetary Policy , 2017 .

[118]  Walter Engert,et al.  Central Bank Digital Currency: Motivations and Implications , 2017 .

[119]  Aleksi Grym,et al.  Central bank digital currency , 2020, The Economics of Cryptocurrencies.

[120]  Ari Juels,et al.  Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts , 2018, IACR Cryptol. ePrint Arch..

[121]  Amiya Bhatia,et al.  India’s Aadhaar scheme and the promise of inclusive social protection , 2017 .

[122]  Leonid Reyzin,et al.  Improving Authenticated Dynamic Dictionaries, with Applications to Cryptocurrencies , 2017, Financial Cryptography.

[123]  Hal Berghel,et al.  Equifax and the Latest Round of Identity Theft Roulette , 2017, Computer.

[124]  Justin Cappos,et al.  CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds , 2017, USENIX Security Symposium.

[125]  Bidisha Chaudhuri,et al.  The Aadhaar scheme: a cornerstone of a new citizenship regime in India? , 2018 .

[126]  A. Carstens Money in the digital age: what role for central banks? , 2018 .

[127]  Xuan-Thao N. Nguyen Lessons From Case Study of Secured Transactions With Bitcoin , 2018 .

[128]  Katrin Assenmacher,et al.  Monetary Policy with Negative Interest Rates: Decoupling Cash from Electronic Money , 2018, SSRN Electronic Journal.

[129]  Yi Zhang,et al.  KEVM: A Complete Formal Semantics of the Ethereum Virtual Machine , 2018, 2018 IEEE 31st Computer Security Foundations Symposium (CSF).

[130]  Ronald J. Mann Reliable Perfection of Security Interests in Crypto-Currency , 2018 .

[131]  Rosario Gennaro,et al.  Fast Multiparty Threshold ECDSA with Fast Trustless Setup , 2018, CCS.

[132]  S. Ingves Stefan Ingves: Do we need an e-krona? , 2018 .

[133]  Somesh Jha,et al.  Smart Contracts and Opportunities for Formal Methods , 2018, ISoLA.

[134]  Michele Marchesi,et al.  The ICO phenomenon and its relationships with ethereum smart contract environment , 2018, 2018 International Workshop on Blockchain Oriented Software Engineering (IWBOSE).

[135]  Julian Schütte,et al.  reclaimID: Secure, Self-Sovereign Identities Using Name Systems and Attribute-Based Encryption , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).

[136]  Tommaso Mancini Griffoli,et al.  Casting Light on Central Bank Digital Currencies , 2018 .

[137]  Michael Kumhof,et al.  Central Bank Digital Currencies - Design Principles and Balance Sheet Implications , 2018 .

[138]  Zheng Wang,et al.  Yet Another Text Captcha Solver: A Generative Adversarial Network Based Approach , 2018, CCS.

[139]  Thomas F. Wenisch,et al.  Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution , 2018, USENIX Security Symposium.

[140]  Janaki Srinivasan,et al.  Privacy at the Margins| The Poverty of Privacy: Understanding Privacy Trade-Offs From Identity Infrastructure Users in India , 2018 .

[141]  David A. Broniatowski,et al.  Weaponized Health Communication: Twitter Bots and Russian Trolls Amplify the Vaccine Debate , 2018, American journal of public health.

[142]  Srdjan Capkun,et al.  ZLiTE: Lightweight Clients for Shielded Zcash Transactions using Trusted Execution , 2019, IACR Cryptol. ePrint Arch..

[143]  Christoph Meinel,et al.  A Survey on Essential Components of a Self-Sovereign Identity , 2018, Comput. Sci. Rev..

[144]  Johan A. Pouwelse,et al.  Deployment of a Blockchain-Based Self-Sovereign Identity , 2018, 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).

[145]  Shafi Goldwasser,et al.  Practical Accountability of Secret Processes , 2018, IACR Cryptol. ePrint Arch..

[146]  Ross P. Buckley,et al.  The ICO Gold Rush: It's a Scam, It's a Bubble, It's a Super Challenge for Regulators , 2018 .

[147]  Sarah Meiklejohn,et al.  An Empirical Analysis of Anonymity in Zcash , 2018, USENIX Security Symposium.

[148]  Mariana Raykova,et al.  RapidChain: A Fast Blockchain Protocol via Full Sharding , 2018, IACR Cryptol. ePrint Arch..

[149]  D. Andolfatto Assessing the Impact of Central Bank Digital Currency on Private Banks , 2018 .

[150]  Aleksandr Ometov,et al.  Multi-Factor Authentication: A Survey , 2018, Cryptogr..

[151]  Robert M. Chesney,et al.  Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security , 2018 .

[152]  Sarah Meiklejohn,et al.  Contour: A Practical System for Binary Transparency , 2017, DPM/CBT@ESORICS.

[153]  Michael Hamburg,et al.  Meltdown: Reading Kernel Memory from User Space , 2018, USENIX Security Symposium.

[154]  S. Matthew Weinberg,et al.  Arbitrum: Scalable, private smart contracts , 2018, USENIX Security Symposium.

[155]  Joseph Bonneau,et al.  Hostile Blockchain Takeovers (Short Paper) , 2018, Financial Cryptography Workshops.

[156]  Ghassan O. Karame,et al.  BITE: Bitcoin Lightweight Client Privacy using Trusted Execution , 2018, IACR Cryptol. ePrint Arch..

[157]  Philipp Jovanovic,et al.  OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding , 2018, 2018 IEEE Symposium on Security and Privacy (SP).

[158]  Shai Halevi,et al.  Supporting Private Data on Hyperledger Fabric with Secure Multiparty Computation , 2018, 2018 IEEE International Conference on Cloud Engineering (IC2E).

[159]  Edgar R. Weippl,et al.  Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies , 2019, IACR Cryptol. ePrint Arch..

[160]  Alain Brenzikofer encointer - An Ecological, Egalitarian and Private Cryptocurrency and Self-Sovereign Identity System , 2019, ArXiv.

[161]  Farinaz Koushanfar,et al.  Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric Matching Algorithms , 2019, IACR Cryptol. ePrint Arch..

[162]  Sreeram Kannan,et al.  Prism: Deconstructing the Blockchain to Approach Physical Limits , 2019, CCS.

[163]  Srdjan Capkun,et al.  DR.SGX: automated and adjustable side-channel protection for SGX using data location randomization , 2019, ACSAC.

[164]  Ittai Abraham,et al.  HotStuff: BFT Consensus with Linearity and Responsiveness , 2019, PODC.

[165]  Roopa Vishwanathan,et al.  SAMPL: Scalable Auditability of Monitoring Processes using Public Ledgers , 2019, CCS.

[166]  Timothy A. K. Zakian,et al.  The Libra Blockchain , 2019 .

[167]  L. LoPucki,et al.  Secured Transactions: A Systems Approach , 2019 .

[168]  Alexander Spiegelman,et al.  HEB: Hybrid Expenditure Blockchain. , 2019 .

[169]  A. Sonnino,et al.  State Machine Replication in the Libra Blockchain , 2019 .

[170]  Majd Latah,et al.  The Art of Social Bots: A Review and a Refined Taxonomy , 2019, ArXiv.

[171]  Shiroq Al-Megren,et al.  Usability and Security Analysis of the KeepKey Wallet , 2019, 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).

[172]  Kari Kostiainen,et al.  PRCash: Fast, Private and Regulated Transactions for Digital Currencies , 2019, Financial Cryptography.

[173]  Nicolas Gailly,et al.  Verifiable Management of Private Data under Byzantine Failures , 2019 .

[174]  Andrew T. Levin,et al.  Digital Cash: Principles & Practical Steps , 2019 .

[175]  Fan Zhang,et al.  Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts , 2018, 2019 IEEE European Symposium on Security and Privacy (EuroS&P).

[176]  Ari Juels,et al.  SquirRL: Automating Attack Discovery on Blockchain Incentive Mechanisms with Deep Reinforcement Learning , 2019, Proceedings 2021 Network and Distributed System Security Symposium.

[177]  David Mazières,et al.  Fast and secure global payments with Stellar , 2019, SOSP.

[178]  Peng Gao,et al.  HyperService: Interoperability and Programmability Across Heterogeneous Blockchains , 2019, CCS.

[179]  Rainer Böhme,et al.  Rationality is Self-Defeating in Permissionless Systems , 2019, ArXiv.

[180]  michel How Much of the Internet Is Fake ? Turns Out, a Lot of It, Actually. - e-traces , 2019 .

[181]  Bryan Ford,et al.  Rethinking General-Purpose Decentralized Computing , 2019, HotOS.

[182]  Ian Miers,et al.  Paralysis Proofs: Secure Dynamic Access Structures for Cryptocurrency Custody and More , 2019, AFT.

[183]  Prateek Saxena,et al.  OHIE: Blockchain Scaling Made Simple , 2018, 2020 IEEE Symposium on Security and Privacy (SP).

[184]  Ari Juels,et al.  Flash Boys 2.0: Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability , 2020, 2020 IEEE Symposium on Security and Privacy (SP).

[185]  Ari Juels,et al.  BDoS: Blockchain Denial-of-Service , 2019, CCS.

[186]  Y. Mersch Yves Mersch: An ECB digital currency - a flight of fancy? , 2020 .

[187]  Ittay Eyal,et al.  Multi-Party Timed Commitments , 2020, ArXiv.

[188]  Kenneth G. Paterson,et al.  Remote Side-Channel Attacks on Anonymous Transactions , 2020, IACR Cryptol. ePrint Arch..

[189]  U. Bindseil Tiered CBDC and the Financial System , 2020, SSRN Electronic Journal.

[190]  Mariarosaria Taddeo,et al.  Artificial Intelligence Crime: An Interdisciplinary Analysis of Foreseeable Threats and Solutions , 2020, Sci. Eng. Ethics.

[191]  Ittay Eyal,et al.  Efficient MDP Analysis for Selfish-Mining in Blockchains , 2020, AFT.

[192]  Dawn Song,et al.  Keystone: an open framework for architecting trusted execution environments , 2020, EuroSys.

[193]  Matthew Green,et al.  ZEXE: Enabling Decentralized Private Computation , 2020, 2020 IEEE Symposium on Security and Privacy (SP).

[194]  Matthias P. Lutolf,et al.  High-throughput automated organoid culture via stem-cell aggregation in microcavity arrays , 2020, Nature Biomedical Engineering.

[195]  Ittay Eyal,et al.  Ostraka: Secure Blockchain Scaling by Node Sharding , 2019, 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).

[196]  Bryan Ford Democratic Value and Money for Decentralized Digital Society , 2020, ArXiv.

[197]  Codruta Boar,et al.  Impending Arrival – A Sequel to the Survey on Central Bank Digital Currency , 2020 .

[198]  Marta Gomez-Barrero,et al.  Reversing the irreversible: A survey on inverse biometrics , 2020, Comput. Secur..

[199]  Yonatan Sompolinsky,et al.  PHANTOM and GHOSTDAG A Scalable Generalization of Nakamoto Consensus February 2, 2020 , 2020 .

[200]  Alexandra Giannopoulou,et al.  Self-sovereign identity , 2021, Internet Policy Rev..

[201]  Tao Zhang,et al.  Blockchain and central bank digital currency , 2021, ICT Express.

[202]  B. Livshits,et al.  Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit , 2020, Financial Cryptography.

[203]  Aniket Kate,et al.  Reparo: Publicly Verifiable Layer to Repair Blockchains , 2020, Financial Cryptography.

[204]  Yiping Huang,et al.  The genesis, design and implications of China’s central bank digital currency , 2021 .

[205]  A. Howitt Roadmap to a Government-Independent Basic Income (UBI) Digital Currency , .