Suche auf der Schloss Dagstuhl Webseite
Sie suchen nach Informationen auf den Webseiten der einzelnen Seminare? - Dann:
Nicht fündig geworden? - Einige unserer Dienste laufen auf separaten Webseiten mit jeweils eigener Suche. Bitte beachten Sie folgende Liste:
Schloss Dagstuhl - LZI - Logo
Schloss Dagstuhl Services
Innerhalb dieser Seite:
Externe Seiten:
  • DOOR (zum Registrieren eines Dagstuhl Aufenthaltes)
  • DOSA (zum Beantragen künftiger Dagstuhl Seminare oder Dagstuhl Perspektiven Workshops)
Innerhalb dieser Seite:
Externe Seiten:
Innerhalb dieser Seite:
Externe Seiten:
  • die Informatik-Bibliographiedatenbank dblp

Dagstuhl-Seminar 24362

Next-Generation Secure Distributed Computing

( 01. Sep – 06. Sep, 2024 )

Bitte benutzen Sie folgende Kurz-Url zum Verlinken dieser Seite:

  • Christian Cachin (Universität Bern, CH)
  • Aniket Kate (Purdue University - West Lafayette, US & Supra Research - West Lafayette, US)
  • Julian Loss (CISPA - Saarbrücken, DE)
  • Kartik Nayak (Duke University - Durham, US)



Trust in a single or a group of parties is fundamentally needed to design any secure system. A common approach to establishing this trust is to use secure distributed computing (SDC) protocols. In this approach, systems rely on multiple different communicating parties and the correct behavior of a subset of those. Several SDC primitives are used in practice underneath a wide array of other cryptographic primitives and applications. Examples include blockchains, decentralized oracles, random beacons, and primitives such as threshold signatures.

The formal models for such systems' security/correctness guarantees were introduced in the 80s and 90s and have been used ever since. However, ever-evolving software, (trusted) hardware, and communication infrastructure present new threats, attack vectors as well as opportunities that often fall outside the scope of these classical security models. Therefore, it is necessary to revisit and reevaluate these system models and threat assumptions in today's distributed systems context.

Moreover, tremendous growth in the cryptocurrency space demands high-performance solutions that scale to billions of users. It also introduces fascinating new challenges related to fairness, incentive compatibility, and crypto-economics that have received comparatively little attention in the existing literature.

This Dagstuhl Seminar will reveal and exploit synergies in the fields of cryptography, distributed computing, game theory, and systems to identify promising new application domains for SDC. These topics are directly motivated by discussion and collaborations with the blockchain industry as well as emerging IoT needs. The goal of this Dagstuhl Seminar is to bring together researchers from these distinct communities, identify gaps and overlaps, and foster future collaboration.

Copyright Christian Cachin, Aniket Kate, Julian Loss, and Kartik Nayak

  • Computer Science and Game Theory
  • Cryptography and Security
  • Distributed / Parallel / and Cluster Computing

  • Distributed Computing
  • Cryptography
  • Game Theory
  • Blockchain