May 19, 2022, 1:20 a.m. | Truc Nguyen, My T. Thai

cs.CR updates on arXiv.org arxiv.org

Since 2016, sharding has become an auspicious solution to tackle the
scalability issue in legacy blockchain systems. Despite its potential to
strongly boost the blockchain throughput, sharding comes with its own security
issues. To ease the process of deciding which shard to place transactions,
existing sharding protocols use a hash-based transaction sharding in which the
hash value of a transaction determines its output shard. Unfortunately, we show
that this mechanism opens up a loophole that could be exploited to conduct …

attack hash service sharding vulnerability

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Security Engineering Professional

@ Nokia | India

Cyber Intelligence Exercise Planner

@ Peraton | Fort Gordon, GA, United States

Technical Lead, HR Systems Security

@ Sun Life | Sun Life Wellesley

SecOps Manager *

@ WTW | Thane, Maharashtra, India

Consultant Appels d'Offres Marketing Digital

@ Numberly | Paris, France