Proof of Necessary Work: Succinct State Verification with Fairness Guarantees
暂无分享,去创建一个
[1] Nir Bitansky,et al. Recursive composition and bootstrapping for SNARKS and proof-carrying data , 2013, STOC '13.
[2] Sunny King,et al. PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake , 2012 .
[3] C. P. Schnorr,et al. Efficient Identification and Signatures for Smart Cards (Abstract) , 1989, EUROCRYPT.
[4] Aggelos Kiayias,et al. Non-Interactive Proofs of Proof-of-Work , 2020, IACR Cryptol. ePrint Arch..
[5] Eric Wustrow,et al. The Proof is in the Pudding: Proofs of Work for Solving Discrete Logarithms , 2018, IACR Cryptol. ePrint Arch..
[6] Eli Ben-Sasson,et al. SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge , 2013, CRYPTO.
[7] Eli Ben-Sasson,et al. Zerocash: Decentralized Anonymous Payments from Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.
[8] Aggelos Kiayias,et al. Proofs of Proofs of Work with Sublinear Complexity , 2016, Financial Cryptography Workshops.
[9] Jens Groth,et al. On the Size of Pairing-Based Non-interactive Arguments , 2016, EUROCRYPT.
[10] Loi Luu,et al. FlyClient: Super-Light Clients for Cryptocurrencies , 2020, 2020 IEEE Symposium on Security and Privacy (SP).
[11] Matthew Green,et al. ZEXE: Enabling Decentralized Private Computation , 2020, 2020 IEEE Symposium on Security and Privacy (SP).
[12] Ian Miers,et al. Scalable Multi-party Computation for zk-SNARK Parameters in the Random Beacon Model , 2017, IACR Cryptol. ePrint Arch..
[13] Eli Ben-Sasson,et al. Scalable, transparent, and post-quantum secure computational integrity , 2018, IACR Cryptol. ePrint Arch..
[14] Rosario Gennaro,et al. Lattice-Based zk-SNARKs from Square Span Programs , 2018, IACR Cryptol. ePrint Arch..
[15] Craig Gentry,et al. Pinocchio: Nearly Practical Verifiable Computation , 2013, 2013 IEEE Symposium on Security and Privacy.
[16] Adam Back,et al. Hashcash - A Denial of Service Counter-Measure , 2002 .
[17] Dan Boneh,et al. Zether: Towards Privacy in a Smart Contract World , 2020, IACR Cryptol. ePrint Arch..
[18] Eli Ben-Sasson,et al. Scalable Zero Knowledge Via Cycles of Elliptic Curves , 2014, Algorithmica.
[19] Eli Ben-Sasson,et al. Succinct Non-Interactive Arguments for a von Neumann Architecture , 2013, IACR Cryptol. ePrint Arch..
[20] Mary Maller,et al. Marlin: Preprocessing zkSNARKs with Universal and Updatable SRS , 2020, IACR Cryptol. ePrint Arch..
[21] Markulf Kohlweiss,et al. Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updatable Structured Reference Strings , 2019, IACR Cryptol. ePrint Arch..
[22] Ivan Damgård,et al. On the existence of statistically hiding bit commitment schemes and fail-stop signatures , 1994, Journal of Cryptology.
[23] Matthew Green,et al. A multi-party protocol for constructing the public parameters of the Pinocchio zk-SNARK , 2018, IACR Cryptol. ePrint Arch..
[24] Jeremy Clark,et al. SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies , 2015, 2015 IEEE Symposium on Security and Privacy.
[25] Nicholas Spooner,et al. Fractal: Post-Quantum and Transparent Recursive Proofs from Holography , 2020, IACR Cryptol. ePrint Arch..
[26] Aggelos Kiayias,et al. Compact Storage of Superblocks for NIPoPoW Applications , 2019, IACR Cryptol. ePrint Arch..