IC3: Advancing the science and applications of blockchains

Latest on Blog

by Yunqi Li, Sylvain Bellemare, Mikerah Quintyne-Collins, and Andrew Miller on April 21, 2021
In this post, we show how to provide pivacy for smart contracts in a general purpose way by using "Multiparty Computation (MPC) as a Sidechain". In this model, smart contract developers can label any of their member fields as "secret".
by Ari Juels, Ittay Eyal, and Mahimna Kelkar on March 07, 2021
There's a simple word for projects that seek to advantage miners while systematically exploiting blockchain users, say three researchers.
by Jun-You Liu, Surya Bakshi, Shreyas Gandlur, Ankush Das, and Andrew Miller on February 15, 2021
Payment channels are one of the fundamental approaches for scaling cryptocurrency networks. In the academic cryptography literature on payment channels, it has been effective to use universal composability (UC) framework as a way of rigorously modeling and giving security definitions. However, there's been a big gap between the UC model and the actual software implementations of payment channels that have been designed and maintained by cryptocurrency developers, not getting as much benefit from the UC as we could. SaUCy is a project that aims to bridge the world of cryptocurrency developers with the UC framework.
by Deepak Maram and Harjasleen Malvai on January 12, 2021
Decentralized identity systems allow users to gather and amnage their own credentials under the banner of self-created decentralized identifiers (DIDs). The key focus of DIDs is on shifting the control of a credential into users' hands. Existing decentralized identity proposals, however, suffer from several problems. First and foremost, how do you bootstrap an ecosystem of credential issuers? It is unlikely that most existing legacy providers suddenly switch and issue such credentials. Second, like with cryptocurrencies, DID systems burden users with managing their own keys creating a significant risk of key loss. They also omit essential functionality, like resistance to Sybil attacks and the ability to detect misbehaving or sanctioned users. We address these problems by introducing CanDID in our new paper.
by Patrick McCorry on December 08, 2020
We have focused on building a non-custodial relayer, Infura Transaction Service (ITX), that takes a pre-signed message (e.g. meta-transaction), packs it into an Ethereum transaction and then gradually bumps the fee until it is mined in the blockchain.
by Scott Bigelow, Phil Daian, Stephane Gosselin, Alex Obadia, and Tina Zhen on November 23, 2020
Flashbots is a research and development organization formed to mitigate the negative externalities and existential risks posed by miner-extractable value (MEV) to smart-contract blockchains. We propose a permissionless, transparent, and fair ecosystem for MEV extraction to reinforce the Ethereum ideals.
Older blogs...


July 25-31, 2021
Thank you to all of those that attended the 6th annual Blockchain Camp!
Tuesday June 1, 2021
Join us for Tyler Kell's presentation of "DeFi State of the Union", this webinar will be on June 1, 2021.
Thursday April 29, 2021
Join us to hear from Ariah Klages-Mundt presenting his work on Stablecoins.
Saturday February 27, 2021
The third annual Cornell High School Programming Contest Warm Up is a computer programming competition for high school girls and underrepresented high school student groups in technology.
Friday February 26, 2021
2021 has seen unprecedented interest in Bitcoin and related technologies like the Lightning Network. As these technologies see increases in use, volume, and price, we must consider - how secure and private are they really? Join us for our February webinar to learn about two relevant attacks from IC3 researchers at Cornell and UCL.
More events


Featured Projects

MAD-HTCL - Because HTCL is Crazy-Cheap to Attack

MAD-HTCL employs a novel approach of utilizing the existing blockchain operators, called miners, as part of the design. If a user misbehaves, MAD-HTCL incentivizes the miners to confiscate all their funds. For further details, please check out the Projects Page.

Hased Time-Locked Contract
Bribery Attacks
Payment Channels

More projects:

  • HoneyBadgerMPC: A Flexible Paradigm for Computing on Confidential Data
  • Avalanche: A New Consensus Protocol
  • Ironwood: A Verification Framework for Byzantine-fault Tolerant Consensus Protocols
  • BDoS: Blockchin Denial of Service
  • AIRS: Automated Incentives for Reforestation Stewardship
Even more projects...