The following list includes all publications of the group and publications of Christian Cachin from 2010 onward.

For a complete bibliography of Christian Cachin see the DBLP bibliography page or the Google Scholar list.

Recent Work

  1. Azouvi, S., Cachin, C., Le, D. V., Vukolic, M., & Zanolini, L. (2022). Modeling Resources in Permissionless Longest-chain Total-order Broadcast. e-print, arXiv.2211:12050 [cs.DC]. https://arxiv.org/abs/2211.12050
  2. Cachin, C., Losa, G., & Zanolini, L. (2022). Quorum Systems in Permissionless Network. In CoRR. e-print, arXiv.2211:12050 [cs.DC]. https://arxiv.org/abs/2211.05630
  3. Amores-Sesar, I., Cachin, C., & Tedeschi, E. (2022). When is Spring coming? A Security Analysis of Avalanche Consensus. e-print, arXiv.2210:03423 [cs.DC]. https://arxiv.org/abs/2210.03423
  4. Cachin, C., & Zanolini, L. (2020). From Symmetric to Asymmetric Asynchronous Byzantine Consensus. e-print, arXiv:2005.08795v3 [cs.DC]. https://arxiv.org/abs/2005.08795v3
  5. Pellegrini, A., & Zanolini, L. (2020). An Algebraic Model For Quorum Systems. e-print, arXiv:2005.08536 [cs.SC]. https://arxiv.org/abs/2005.08536

Journal Papers

  1. Cachin, C., De Caro, A., Moreno-Sanchez, P., Tackmann, B., & Vukolić, M. (2021). The Transaction Graph for Modeling Blockchain Semantics. Cryptoeconomic Systems, 1(1). https://doi.org/10.21428/58320208.a12c57e6
  2. Cachin, C., & Ohrimenko, O. (2018). Verifying the Consistency of Remote Untrusted Services with Conflict-Free Operations. Information and Computation, 260, 72–88. https://doi.org/10.1016/j.ic.2018.03.004
  3. Distler, T., Cachin, C., & Kapitza, R. (2016). Resource-efficient Byzantine Fault Tolerance. IEEE Transactions on Computers, 65(9), 2807–2819. https://doi.org/10.1109/TC.2015.2495213
  4. Cachin, C., Crépeau, C., Marcil, J., & Savvides, G. (2015). Information-Theoretic Interactive Hashing and Oblivious Transfer to a Storage-Bounded Receiver. IEEE Transactions on Information Theory, 61(10), 5623–5635. http://dx.doi.org/10.1109/TIT.2015.2450732
  5. Brandenburger, M., Cachin, C., & Knežević, N. (2017). Don’t Trust the Cloud, Verify: Integrity and Consistency for Cloud Object Stores. ACM Transactions on Privacy and Security, 20(3), 8:1–8:30. https://doi.acm.org/10.1145/3079762
  6. Cachin, C., Keidar, I., & Shraer, A. (2011). Fail-Aware Untrusted Storage. SIAM Journal on Computing, 40(2), 493–533.

Conference Papers

  1. Cachin, C., Mićić, J., & Steinhauer, N. (2022). Quick Order Fairness. In I. Eyal & J. A. Garay (Eds.), Proc. Financial Cryptography and Data Security (FC) (Vol. 13411, pp. 316–333). Springer. https://doi.org/10.1007/978-3-031-18283-9_15
  2. Amores-Sesar, I., Cachin, C., & Parker, A. (2021). Generalizing Weighted Trees: A Bridge from Bitcoin to GHOST. In F. Baldimtsi & T. Roughgarden (Eds.), Proc. 3rd ACM Conference on Advances in Financial Technologies (AFT) (pp. 156–169). https://doi.org/10.1145/3479722.3480995
  3. Alpos, O., Cachin, C., & Zanolini, L. (2021). How to Trust Strangers: Composition of Byzantine Quorum Systems. Proc. 40th Symposium on Reliable Distributed Systems (SRDS), 120–131. https://doi.org/10.1109/SRDS53918.2021.00021
  4. Alpos, O., Cachin, C., Marson, G. A., & Zanolini, L. (2021). On the Synchronization Power of Token Smart Contracts. Proc. 41st International Conference on Distributed Computing Systems (ICDCS), 640–651. https://doi.org/10.1109/ICDCS51616.2021.00067
  5. Cachin, C., & Zanolini, L. (2021). Brief Announcement: Revisiting Signature-Free Asynchronous Byzantine Consensus. In S. Gilbert (Ed.), Proc. 35th International Symposium on Distributed Computing (DISC) (Vol. 209, pp. 51:1–51:4). Schloss Dagstuhl - Leibniz-Zentrum für Informatik. https://doi.org/10.4230/LIPIcs.DISC.2021.51
  6. Cachin, C., & Zanolini, L. (2021). Asymmetric Asynchronous Byzantine Consensus. In Garcı́a-Alfaro Joaquı́n, J. L. Muñoz-Tapia, G. Navarro-Arribas, & M. Soriano (Eds.), Proc. ESORICS Workshops on Data Privacy Management (DPM), Cryptocurrencies and Blockchain Technology (CBT) (Vol. 13140, pp. 192–207). Springer. https://doi.org/10.1007/978-3-030-93944-1_13
  7. Amores-Sesar, I., Cachin, C., & Mićić, J. (2021). Security Analysis of Ripple Consensus. In Q. Bramas, R. Oshman, & P. Romano (Eds.), Proc. 24th International Conference on Principles of Distributed Systems (OPODIS) (Vol. 184, pp. 10:1–10:16). Schloss Dagstuhl–Leibniz-Zentrum für Informatik. https://drops.dagstuhl.de/opus/volltexte/2021/13495
  8. Cachin, C., Collins, D., Crain, T., & Gramoli, V. (2020). Byzantine Fault Tolerant Vector Consensus with Anonymous Proposals. In L. Chen, N. Li, K. Liang, & S. Schneider (Eds.), Proc. 23rd European Symposium On Research In Computer Security (ESORICS) (Vol. 12308, pp. 133–152). Springer. https://doi.org/10.1007/978-3-030-58951-6_7
  9. Müller, C., Brandenburger, M., Cachin, C., Felber, P., Göttel, C., & Schiavoni, V. (2020). TZ4Fabric: Executing Smart Contracts with ARM TrustZone (Practical Experience Report). Proc. 39th Symposium on Reliable Distributed Systems (SRDS), 21–30. https://doi.org/10.1109/SRDS51746.2020.00011
  10. Alpos, O., & Cachin, C. (2020). Consensus Beyond Thresholds: Generalized Byzantine Quorums Made Live. Proc. 39th Symposium on Reliable Distributed Systems (SRDS), 31–40. https://doi.org/10.1109/SRDS51746.2020.00010
  11. Cachin, C., & Tackmann, B. (2019). Asymmetric Distributed Trust. In P. Felber, R. Friedman, S. Gilbert, & A. Miller (Eds.), Proc. 23rd International Conference on Principles of Distributed Systems (OPODIS) (Vol. 153, pp. 7:1–7:16). Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik. https://doi.org/10.4230/LIPIcs.OPODIS.2019.7
  12. Cachin, C., De Caro, A., Moreno-Sanchez, P., Tackmann, B., & Vukolić, M. (2020, March). The Transaction Graph for Modeling Blockchain Semantics. Proc. Cryptoeconomic Systems Conference (CES ’20). https://assets.pubpub.org/oh4wbdb0/71581340107043.pdf
  13. Brandenburger, M., Cachin, C., Kapitza, R., & Sorniotti, A. (2019). Trusted Computing meets Blockchain: Rollback Attacks and a Solution for Hyperledger Fabric. Proc. 38th Symposium on Reliable Distributed Systems (SRDS), 324–333. https://doi.org/10.1109/SRDS47363.2019.00045
  14. Kokoris-Kogias, E., Androulaki, E., De Caro, A., & Cachin, C. (2018). Channels: Horizontal Scaling and Confidentiality on Permissioned Blockchains. Proc. 23rd European Symposium On Research In Computer Security (ESORICS), 11098, 111–131. https://doi.org/10.1007/978-3-319-99073-6_6
  15. Cachin, C., Ghosh, E., Papadopoulos, D., & Tackmann, B. (2018). Stateful Multi-Client Verifiable Computation. In B. Preneel & F. Vercauteren (Eds.), Proc. Applied Cryptography and Network Security (ACNS) (Vol. 10892, pp. 637–656). Springer.
  16. Björkqvist, M., Cachin, C., Engelmann, F., & Sorniotti, A. (2018). Scalable Key Management for Distributed Cloud Storage. Proc. IEEE International Conference on Cloud Engineering (IC2E).
  17. Androulaki, E., Barger, A., Bortnikov, V., Cachin, C., Christidis, K., De Caro, A., Enyeart, D., Ferris, C., Laventman, G., Manevich, Y., Muralidharan, S., Murthy, C., Nguyen, B., Sethi, M., Singh, G., Smith, K., Sorniotti, A., Stathakopoulou, C., Vukolić, M., … Yellick, J. (2018). Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains. Proc. 13th European Conference on Computer Systems (EuroSys), 30:1–30:15. https://doi.org/10.1145/3190508.3190538
  18. Cachin, C., & Vukolic, M. (2017). Blockchain Consensus Protocols in the Wild. In A. W. Richa (Ed.), Proc. 31st Intl. Symposium on Distributed Computing (DISC 2017) (Vol. 91, pp. 1:1–1:16). Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik. http://dx.doi.org/10.4230/LIPIcs.DISC.2017.1
  19. Cachin, C., Camenisch, J., Freire-Stögbuchner, E., & Lehmann, A. (2017). Updatable Tokenization: Formal Definitions and Provably Secure Constructions. Proc. Financial Cryptography and Data Security (FC), 10322, 59–75. https://doi.org/10.1007/978-3-319-70972-7_4
  20. Brandenburger, M., Cachin, C., Lorenz, M., & Kapitza, R. (2017, June). Rollback and Forking Detection for Trusted Execution Environments using Lightweight Collective Memory. Proc. Intl. Conference on Dependable Systems And Networks (DSN). https://doi.org/10.1109/DSN.2017.45
  21. Cachin, C., Schubert, S., & Vukolić, M. (2016). Non-determinism in Byzantine Fault-Tolerant Replication. In P. Fatourou, E. Jiménez, & F. Pedone (Eds.), Proc. 20th International Conference on Principles of Distributed Systems (OPODIS) (Vol. 70, pp. 24:1–24:16). Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik. http://dx.doi.org/10.4230/LIPIcs.OPODIS.2016.24
  22. Liu, S., Cachin, C., Quéma, V., & Vukolić, M. (2016). XFT: Practical Fault Tolerance Beyond Crashes. In K. Keeton & T. Roscoe (Eds.), Proc. 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI). https://www.usenix.org/system/files/conference/osdi16/osdi16-liu.pdf
  23. Brandenburger, M., Cachin, C., & Knežević, N. (2015). Don’t Trust the Cloud, Verify: Integrity and Consistency for Cloud Object Stores. In D. Naor, G. Heiser, & I. Keidar (Eds.), Proc. 8th ACM International Systems and Storage Conference (SYSTOR) (p. 16). ACM. http://dx.doi.org/10.1145/2757667.2757681
  24. Androulaki, E., Cachin, C., Dobre, D., & Vukolić, M. (2014). Erasure-Coded Byzantine Storage with Separate Metadata. In M. K. Aguilera, L. Querzoni, & M. Shapiro (Eds.), Proc. 18th International Conference on Principles of Distributed Systems (OPODIS) (Vol. 8878, pp. 76–90). Springer. http://dx.doi.org/10.1007/978-3-319-14472-6_6
  25. Cachin, C., & Ohrimenko, O. (2014). Verifying the Consistency of Remote Untrusted Services with Commutative Operations. In M. K. Aguilera, L. Querzoni, & M. Shapiro (Eds.), Proc. 18th International Conference on Principles of Distributed Systems (OPODIS) (Vol. 8878, pp. 1–16). Springer. http://dx.doi.org/10.1007/978-3-319-14472-6_1
  26. Cachin, C., Dobre, D., & Vukolić, M. (2014). Separating Data and Control: Asynchronous BFT Storage with 2t+1 Data Replicas. Proc. 16th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS), 8756, 1–17. http://dx.doi.org/10.1007/978-3-319-11764-5_1
  27. Cachin, C., Haralambiev, K., Hsiao, H.-C., & Sorniotti, A. (2013). Policy-based Secure Deletion. Proc. 20th ACM Conference on Computer and Communications Security (CCS). http://doi.acm.org/10.1145/2508859.2516690
  28. Kapitza, R., Behl, J., Cachin, C., Distler, T., Kuhnle, S., Mohammadi, S. V., Schröder-Preikschat, W., & Stengel, K. (2012). CheapBFT: Resource-efficient Byzantine Fault Tolerance. Proc. 7th European Conference on Computer Systems (EuroSys), 295–308.
  29. Băsescu, C., Cachin, C., Eyal, I., Haas, R., Sorniotti, A., Vukolić, M., & Zachevsky, I. (2012, June). Robust Data Sharing with Key-Value Stores. Proc. Intl. Conference on Dependable Systems And Networks (DSN).
  30. Majuntke, M., Dobre, D., Cachin, C., & Suri, N. (2011). Fork-Consistent Constructions From Registers. In A. Fernández Anta, G. Lipari, & M. Roy (Eds.), Proc. 15th Intl. Conference on Principles of Distributed Systems (OPODIS) (Vol. 7109, pp. 283–298). Springer.
  31. Kurmus, A., Gupta, M., Pletka, R., Cachin, C., & Haas, R. (2011). A Comparison of Secure Multi-tenancy Architectures for Filesystem Storage Clouds. In F. Kon & A.-M. Kermarrec (Eds.), Proc. 12th International Middleware Conference (Vol. 7049, pp. 471–490). Springer.
  32. Cachin, C. (2011). Integrity and Consistency for Untrusted Services. In I. Cerná & others (Eds.), Proc. 37th Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM 2011) (Vol. 6543, pp. 1–14). Springer.
  33. Shraer, A., Cachin, C., Cidon, A., Keidar, I., Michalevsky, Y., & Shaket, D. (2010). Venus: Verification for Untrusted Cloud Storage. Proc. Workshop on Cloud Computing Security.
  34. Björkqvist, M., Cachin, C., Haas, R., Hu, X.-Y., Kurmus, A., Pawlitzek, R., & Vukolić, M. (2010). Design and Implementation of a Key-Lifecycle Management System. In R. Sion (Ed.), Proc. Financial Cryptography and Data Security (FC) (Vol. 6052, pp. 160–174). Springer.

Proceedings, Books and Book Chapters

  1. Emek, Y., & Cachin, C. (Eds.). (2020). Proc. 39th ACM Symposium on Principles of Distributed Computing (PODC ’20). ACM. https://doi.org/10.1145/3382734
  2. Cachin, C. (2019). Byzantine Faults. In D. Malkhi (Ed.), Concurrency: The Works of Leslie Lamport (pp. 67–81). ACM. https://doi.org/10.1145/3335772.3335778
  3. Anceaume, E., Cachin, C., & Potop-Butucaru, M. (2016). Principles of Distributed Systems, 19th International Conference (OPODIS 2015) (E. Anceaume, C. Cachin, & M. Potop-Butucaru, Eds.; Vol. 46). Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik. http://www.dagstuhl.de/dagpub/978-3-939897-98-9
  4. Cachin, C., & van Renesse, R. (Eds.). (2013). Proc. 9th Workshop on Hot Topics in Dependable Systems (HotDep), Farmington (PA), USA. ACM. http://dl.acm.org/citation.cfm?id=2524224
  5. Cachin, C., Guerraoui, R., & Rodrigues, L. (2011). Introduction to Reliable and Secure Distributed Programming (Second Edition). Springer. https://doi.org/10.1007/978-3-642-15260-3
  6. Cachin, C. (2010). State Machine Replication with Byzantine Faults. In B. Charron-Bost, F. Pedone, & A. Schiper (Eds.), Replication: Theory and Practice (Vol. 5959, pp. 169–184). Springer. http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=5959

Other Publications

  1. Eggen, M., & Cachin, C. (2020). Modernisierung der Formerfordernisse bei der Übertragung von Rechten (Zession und Wertpapierrecht). Teil 1: Wertpapierrecht. Gutachten, im Auftrag des Bundesamtes für Justiz (BJ). https://www.bj.admin.ch/bj/de/home/publiservice/publikationen/externe/2020-12-22.html
  2. Alpos, O., Cachin, C., & Zanolini, L. (2021). Brief Announcement: How to Trust Strangers – Composition of Byzantine Quorum Systems. In S. Gilbert (Ed.), Proc. 35th International Symposium on Distributed Computing (DISC) (Vol. 209, pp. 44:1–44:4). Schloss Dagstuhl - Leibniz-Zentrum für Informatik. https://doi.org/10.4230/LIPIcs.DISC.2021.44
  3. Cachin, C. (2017, September). Blockchain consensus protocols: Snake oil warning. Proc. 13th European Dependable Computing Conference (EDCC).
  4. Androulaki, E., Cachin, C., Caro, A. D., Sorniotti, A., & Vukolic, M. (2017). Permissioned Blockchains and Hyperledger Fabric. ERCIM News, 2017(110). https://ercim-news.ercim.eu/en110/special/permissioned-blockchains-and-hyperledger-fabric
  5. Stathakopoulou, C., & Cachin, C. (2017). Threshold Signatures for Blockchain Systems (Research Report RZ 3910; Number RZ 3910). IBM Research.
  6. Cachin, C. (2016). Architecture of the Hyperledger Blockchain Fabric. Workshop on Distributed Cryptocurrencies and Consensus Ledgers (DCCL 2016). https://www.zurich.ibm.com/dccl/papers/cachin_dccl.pdf
  7. Cachin, C. (2014). Integrity, Consistency, and Verification of Remote Computation. Tutorial, presented at 21st ACM Conference on Computer and Communications Security (CCS 2014) and 18th International Conference on Principles of Distributed Systems (OPODIS 2014). talks/veriftut.pdf
  8. Burger, R. A., Cachin, C., & Husmann, E. (2013). Cloud, Trust, Privacy: Trustworthy Cloud Computing Whitepaper. TClouds project. http://www.tclouds-project.eu
  9. Cachin, C., Dobre, D., & Vukolić, M. (2013). Brief Announcement: BFT Storage with 2t+1 Data Replicas. In Y. Afek (Ed.), Proc. 27th International Conference on Distributed Computing (DISC) (Vol. 8205, pp. 573–574). Springer.
  10. Cachin, C. (2012). From Reliable to Secure Distributed Programming. Tutorial, presented at the 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). http://www.distributedprogramming.net/teaching.shtml
  11. Cachin, C., Bansal, D., & Karjoth, G. (2012). Key Management with Policy-based Access Control. Presented at 6th International Workshop on Analysis of Security APIs.
  12. Cachin, C., Junker, B., & Sorniotti, A. (2012). On Limitations of Using Cloud Storage for Data Replication. Proc. 6th Workshop on Recent Advances in Intrusion Tolerance and reSilience (WRAITS 2012).
  13. Băsescu, C., Cachin, C., Eyal, I., Haas, R., & Vukolić, M. (2011, June). Robust Data Sharing with Key-Value Stores. Proc. 30th ACM Symposium on Principles of Distributed Computing (PODC).
  14. Cachin, C., & Schunter, M. (2011). A Cloud You Can Trust. IEEE Spectrum, 28–32. http://spectrum.ieee.org/computing/networks/a-cloud-you-can-trust/0
  15. Cachin, C. (2011). Secure Distributed Programming. Tutorial, presented at the 18th ACM Conference on Computer and Communications Security (CCS). http://www.distributedprogramming.net/teaching.shtml
  16. Cachin, C. (2011). From Reliable to Secure Distributed Programming. Tutorial, presented at the 25th International Symposium on Distributed Computing (DISC). http://www.distributedprogramming.net/teaching.shtml
  17. Cachin, C. (2011). Protocols for Secure Cloud Computing. Tutorial, presented at METIS-CTDS 2011, International Spring School on Distributed Systems, Marrakech.
  18. Kapitza, R., Schunter, M., Cachin, C., Stengel, K., & Distler, T. (2010). Storyboard: Optimistic Deterministic Multithreading. Proc. 6th Workshop on Hot Topics in System Dependability.
  19. Cachin, C., & Camenisch, J. (2010). Encrypting Keys Securely. IEEE Security & Privacy Magazine, 8(4), 66–69.