IC3: Advancing the science and applications of blockchains

Latest on Blog

by Ari Juels, Ittay Eyal, and Mahimna Kelkar on March 07, 2021
There's a simple word for projects that seek to advantage miners while systematically exploiting blockchain users, say three researchers.
by Jun-You Liu, Surya Bakshi, Shreyas Gandlur, Ankush Das, and Andrew Miller on February 15, 2021
Payment channels are one of the fundamental approaches for scaling cryptocurrency networks. In the academic cryptography literature on payment channels, it has been effective to use universal composability (UC) framework as a way of rigorously modeling and giving security definitions. However, there's been a big gap between the UC model and the actual software implementations of payment channels that have been designed and maintained by cryptocurrency developers, not getting as much benefit from the UC as we could. SaUCy is a project that aims to bridge the world of cryptocurrency developers with the UC framework.
by Deepak Maram and Harjasleen Malvai on January 12, 2021
Decentralized identity systems allow users to gather and amnage their own credentials under the banner of self-created decentralized identifiers (DIDs). The key focus of DIDs is on shifting the control of a credential into users' hands. Existing decentralized identity proposals, however, suffer from several problems. First and foremost, how do you bootstrap an ecosystem of credential issuers? It is unlikely that most existing legacy providers suddenly switch and issue such credentials. Second, like with cryptocurrencies, DID systems burden users with managing their own keys creating a significant risk of key loss. They also omit essential functionality, like resistance to Sybil attacks and the ability to detect misbehaving or sanctioned users. We address these problems by introducing CanDID in our new paper.
by Patrick McCorry on December 08, 2020
We have focused on building a non-custodial relayer, Infura Transaction Service (ITX), that takes a pre-signed message (e.g. meta-transaction), packs it into an Ethereum transaction and then gradually bumps the fee until it is mined in the blockchain.
by Scott Bigelow, Phil Daian, Stephane Gosselin, Alex Obadia, and Tina Zhen on November 23, 2020
Flashbots is a research and development organization formed to mitigate the negative externalities and existential risks posed by miner-extractable value (MEV) to smart-contract blockchains. We propose a permissionless, transparent, and fair ecosystem for MEV extraction to reinforce the Ethereum ideals.
by Scott Bigelow, Phil Daian, Stephane Gosselin, Alex Obadia, and Tina Zhen on November 23, 2020
Flashbots is a research and development organization formed to mitigate the negative externalities and existential risks posed by miner-extractable value (MEV) to smart-contract blockchains. We propose a permissionless, transparent, and fair ecosystem for MEV extraction to reinforce the Ethereum ideals.
Older blogs...

Events

Saturday February 27, 2021
The third annual Cornell High School Programming Contest Warm Up is a computer programming competition for high school girls and underrepresented high school student groups in technology.
Friday February 26, 2021
2021 has seen unprecedented interest in Bitcoin and related technologies like the Lightning Network. As these technologies see increases in use, volume, and price, we must consider - how secure and private are they really? Join us for our February webinar to learn about two relevant attacks from IC3 researchers at Cornell and UCL.
December 7-8, 2020
This event is only open to IC3 faculty, students, partners, and invited guests.
Thursday October 15, 2020
Join IC3 and Chainlink for this virtual meetup on Order-Fairness for Blockchains with speaker Mahimna Kelkar
Tuesday August 11, 2020
Join us for a presentation of "Crystals and Mud on the Blockchain" by James Grimmelmann hosted by IC3.
More events

News

Featured Projects

CanDID

CanDID is a platform for practical, user-friendly realization of decentralized identity, the idea of empowering end users with management of their own credentials. For further details, please check out the Projects Page.

Keywords:
Decentralized Identity
Sybil-Resistance
Confidentiality
Legacy Compatibility

More projects:

  • Mad-HTCL: Because HTCL is Crazy-Cheap to Attack
  • CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds
  • CHURP: CHUrn-Robust Proactive secret sharing
  • Proof-of-Personhood: Redemocratizing Permissionless Cryptocurrencies
  • HiveMind: A Blockchain-based Machine Learning Platform
Even more projects...