SmartCast: An Incentive Compatible Consensus Protocol Using Smart Contracts
暂无分享,去创建一个
Nikita Borisov | Andrew Miller | Abhiram Kothapalli | Andrew K. Miller | N. Borisov | Abhiram Kothapalli
[1] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[2] Ranjit Kumaresan,et al. Broadcast and Verifiable Secret Sharing: New Security Models and Round Optimal Constructions , 2012 .
[3] Sanjay Jain,et al. When Cryptocurrencies Mine Their Own Business , 2016, Financial Cryptography.
[4] Danny Dolev,et al. Authenticated Algorithms for Byzantine Agreement , 1983, SIAM J. Comput..
[5] Jeremy Clark,et al. On Bitcoin as a public randomness source , 2015, IACR Cryptol. ePrint Arch..
[6] Cécile Pierrot,et al. Malleability of the blockchain’s entropy , 2016, Cryptography and Communications.
[7] Joseph Bonneau,et al. Why Buy When You Can Rent? - Bribery Attacks on Bitcoin-Style Consensus , 2016, Financial Cryptography Workshops.
[8] Joshua A. Kroll,et al. Why buy when you can rent ? Bribery attacks on Bitcoin consensus , 2015 .
[9] Elaine Shi,et al. Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[10] Prateek Saxena,et al. Making Smart Contracts Smarter , 2016, IACR Cryptol. ePrint Arch..
[11] Jeremy Clark,et al. SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies , 2015, 2015 IEEE Symposium on Security and Privacy.
[12] Ueli Maurer,et al. Rational Protocol Design: Cryptography against Incentive-Driven Adversaries , 2013, 2013 IEEE 54th Annual Symposium on Foundations of Computer Science.
[13] Melissa Chase,et al. Transparency Overlays and Applications , 2016, IACR Cryptol. ePrint Arch..
[14] Michael Dahlin,et al. BAR primer , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).
[15] Miguel Oom Temudo de Castro,et al. Practical Byzantine fault tolerance , 1999, OSDI '99.
[16] Iddo Bentov,et al. How to Use Bitcoin to Design Fair Protocols , 2014, CRYPTO.
[17] Elaine Shi,et al. Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab , 2016, Financial Cryptography Workshops.