A Survey on Consensus Mechanisms and Mining Management in Blockchain Networks

The past decade has witnessed the rapid evolution in blockchain technologies, which has attracted tremendous interests from both the research communities and the industry. The blockchain network was originated in the Internet finical sector as a decentralized, immutable ledger system for transactional data ordering. Nowadays, it is envisioned as a powerful backbone/framework for decentralized data processing and data-driven self-organization in flat, open-access networks. In particular, the plausible characteristics of decentralization, immutability and self-organization are primarily owing to the unique decentralized consensus mechanisms introduced by blockchain networks. This survey is motivated by the lack of a comprehensive literature review on the development of decentralized consensus mechanisms in blockchain networks. In this survey, we provide a systematic vision of the organization of blockchain networks. By emphasizing the unique characteristics of incentivized consensus in blockchain networks, our in-depth review of the state-of-the-art consensus protocols is focused on both the perspective of distributed consensus system design and the perspective of incentive mechanism design. From a game-theoretic point of view, we also provide a thorough review on the strategy adoption for self-organization by the individual nodes in the blockchain backbone networks. Consequently, we provide a comprehensive survey on the emerging applications of the blockchain networks in a wide range of areas. We highlight our special interest in how the consensus mechanisms impact these applications. Finally, we discuss several open issues in the protocol design for blockchain consensus and the related potential research directions.

[1]  Zekeriya Erkin,et al.  A Scale-Out Blockchain for Value Transfer with Spontaneous Sharding , 2018, 2018 Crypto Valley Conference on Blockchain Technology (CVCBT).

[2]  Aggelos Kiayias,et al.  Proofs of Proofs of Work with Sublinear Complexity , 2016, Financial Cryptography Workshops.

[3]  George Danezis,et al.  SoK: Consensus in the Age of Blockchains , 2017, AFT.

[4]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[5]  Nicolas Courtois,et al.  On The Longest Chain Rule and Programmed Self-Destruction of Crypto Currencies , 2014, ArXiv.

[6]  Ke Xiao,et al.  A Blockchain Based Privacy-Preserving Incentive Mechanism in Crowdsensing Applications , 2018, IEEE Access.

[7]  Joseph J. LaViola,et al.  Byzantine Consensus from Moderately-Hard Puzzles : A Model for Bitcoin , 2014 .

[8]  Damon McCoy,et al.  Stressing Out: Bitcoin "Stress Testing" , 2016, Financial Cryptography Workshops.

[9]  Davor Svetinovic,et al.  Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging Streams , 2018, IEEE Transactions on Dependable and Secure Computing.

[10]  T. Moran,et al.  Rational Proofs of Space-Time , 2017 .

[11]  Hari Balakrishnan,et al.  Secure Incentivization for Decentralized Content Delivery , 2018, HotEdge.

[12]  Aggelos Kiayias,et al.  Speed-Security Tradeoffs in Blockchain Protocols , 2015, IACR Cryptol. ePrint Arch..

[13]  Guido Caldarelli,et al.  Blockchain inefficiency in the Bitcoin peers network , 2017, EPJ Data Science.

[14]  Alysson Bessani,et al.  A Byzantine Fault-Tolerant Ordering Service for the Hyperledger Fabric Blockchain Platform , 2017, 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).

[15]  S. Athey,et al.  Bitcoin Pricing, Adoption, and Usage: Theory and Evidence , 2016 .

[16]  Miguel Correia,et al.  From Consensus to Atomic Broadcast: Time-Free Byzantine-Resistant Protocols without Signatures , 2006, Comput. J..

[17]  Hong-Sheng Zhou,et al.  Designing Proof of Human-Work Puzzles for Cryptocurrency and Beyond , 2016, TCC.

[18]  Victor C. M. Leung,et al.  Computation Offloading and Content Caching in Wireless Blockchain Networks With Mobile Edge Computing , 2018, IEEE Transactions on Vehicular Technology.

[19]  Shai Halevi,et al.  Supporting Private Data on Hyperledger Fabric with Secure Multiparty Computation , 2018, 2018 IEEE International Conference on Cloud Engineering (IC2E).

[20]  Dong In Kim,et al.  Competitive Data Trading in Wireless-Powered Internet of Things (IoT) Crowdsensing Systems with Blockchain , 2018, 2018 IEEE International Conference on Communication Systems (ICCS).

[21]  Nicola Dimitri,et al.  Bitcoin Mining as a Contest , 2017, Ledger.

[22]  Brent Waters,et al.  How to Generate and Use Universal Samplers , 2016, ASIACRYPT.

[23]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[24]  Garrick Hileman,et al.  2017 Global Blockchain Benchmarking Study , 2017 .

[25]  Mariana Raykova,et al.  RapidChain: Scaling Blockchain via Full Sharding , 2018, CCS.

[26]  Ali Shoker,et al.  Sustainable blockchain through proof of exercise , 2017, 2017 IEEE 16th International Symposium on Network Computing and Applications (NCA).

[27]  Miguel Castro,et al.  Practical byzantine fault tolerance and proactive recovery , 2002, TOCS.

[28]  Haipeng Yao,et al.  A Survey of Mobile Information-Centric Networking: Research Issues and Challenges , 2018, IEEE Communications Surveys & Tutorials.

[29]  Daniel Kraft,et al.  Difficulty control for blockchain-based consensus systems , 2016, Peer-to-Peer Netw. Appl..

[30]  Miao Pan,et al.  A Survey of Contract Theory-Based Incentive Mechanism Design in Wireless Networks , 2017, IEEE Wireless Communications.

[31]  Jeremy Clark,et al.  SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies , 2015, 2015 IEEE Symposium on Security and Privacy.

[32]  George Danezis,et al.  Consensus in the Age of Blockchains , 2017, ArXiv.

[33]  Simon Duquennoy,et al.  Towards Blockchain-based Auditable Storage and Sharing of IoT Data , 2017, CCSW.

[34]  Alex Biryukov,et al.  Deanonymisation of Clients in Bitcoin P2P Network , 2014, CCS.

[35]  David Mazières,et al.  Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.

[36]  Zhetao Li,et al.  Consortium Blockchain for Secure Energy Trading in Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.

[37]  Serguei Popov,et al.  Equilibria in the Tangle , 2017, Comput. Ind. Eng..

[38]  Khashayar Kotobi,et al.  Secure Blockchains for Dynamic Spectrum Access: A Decentralized Database in Moving Cognitive Radio Networks Enhances Security and User Access , 2018, IEEE Vehicular Technology Magazine.

[39]  Massimo Bartoletti,et al.  An Analysis of Bitcoin OP_RETURN Metadata , 2017, Financial Cryptography Workshops.

[40]  Austin Mohr,et al.  A Survey of Zero-Knowledge Proofs with Applications to Cryptography , 2007 .

[41]  Kouichi Sakurai,et al.  Yet Another Note on Block Withholding Attack on Bitcoin Mining Pools , 2016, ISC.

[42]  Rainer Böhme,et al.  Trends, Tips, Tolls: A Longitudinal Study of Bitcoin Transaction Fees , 2014, Financial Cryptography Workshops.

[43]  Fred B. Schneider,et al.  Implementing fault-tolerant services using the state machine approach: a tutorial , 1990, CSUR.

[44]  Dusit Niyato,et al.  Decentralized Caching for Content Delivery Based on Blockchain: A Game Theoretic Perspective , 2018, 2018 IEEE International Conference on Communications (ICC).

[45]  Aggelos Kiayias,et al.  Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol , 2017, CRYPTO.

[46]  Joel J. P. C. Rodrigues,et al.  Decentralized Consensus for Edge-Centric Internet of Things: A Review, Taxonomy, and Research Issues , 2018, IEEE Access.

[47]  Dusit Niyato,et al.  Optimal Auction for Edge Computing Resource Management in Mobile Blockchain Networks: A Deep Learning Approach , 2017, 2018 IEEE International Conference on Communications (ICC).

[48]  Ning Zhang,et al.  A Secure Charging Scheme for Electric Vehicles With Smart Communities in Energy Blockchain , 2019, IEEE Internet of Things Journal.

[49]  F. Sun,et al.  Solving Byzantine Problems in Synchronized Systems using Bitcoin , 2014 .

[50]  Sachin Shetty,et al.  ProvChain: A Blockchain-Based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability , 2017, 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID).

[51]  Andreas M. Antonopoulos,et al.  Mastering Bitcoin: Unlocking Digital Crypto-Currencies , 2014 .

[52]  A. Juels,et al.  PROOFS OF WORK AND BREAD PUDDING PROTOCOLS (EXTENDED ABSTRACT) , 1999 .

[53]  James H. Davenport,et al.  Cryptographic Hash Functions: Recent Design Trends and Security Notions , 2011, IACR Cryptol. ePrint Arch..

[54]  Amos Fiat,et al.  How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.

[55]  Aggelos Kiayias,et al.  Non-Interactive Proofs of Proof-of-Work , 2020, IACR Cryptol. ePrint Arch..

[56]  Dusit Niyato,et al.  On Cyber Risk Management of Blockchain Networks: A Game Theoretic Approach , 2018, IEEE Transactions on Services Computing.

[57]  Petar Tsankov,et al.  Securify: Practical Security Analysis of Smart Contracts , 2018, CCS.

[58]  N. Houy The Economics of Bitcoin Transaction Fees , 2014 .

[59]  Ghassan O. Karame,et al.  Is Bitcoin a Decentralized Currency? , 2014, IEEE Security & Privacy.

[60]  Peter Richtárik,et al.  Federated Optimization: Distributed Machine Learning for On-Device Intelligence , 2016, ArXiv.

[61]  Song Guo,et al.  Information and Communications Technologies for Sustainable Development Goals: State-of-the-Art, Needs and Perspectives , 2018, IEEE Communications Surveys & Tutorials.

[62]  Elaine Shi,et al.  Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions , 2015, CCS.

[63]  Prashant Nalini Vasudevan,et al.  Proofs of Useful Work , 2017, IACR Cryptol. ePrint Arch..

[64]  L. Ren Proof of Stake Velocity: Building the Social Currency of the Digital Age , 2014 .

[65]  Matthew Green,et al.  Bolt: Anonymous Payment Channels for Decentralized Currencies , 2017, CCS.

[66]  Jitender S. Deogun,et al.  Identity management using blockchain for cognitive cellular networks , 2017, 2017 IEEE International Conference on Communications (ICC).

[67]  Christian Decker,et al.  Bitcoin meets strong consistency , 2014, ICDCN.

[68]  Stefano Secci,et al.  Securing virtual machine orchestration with blockchains , 2017, 2017 1st Cyber Security in Networking Conference (CSNet).

[69]  Prateek Saxena,et al.  A Secure Sharding Protocol For Open Blockchains , 2016, CCS.

[70]  Emin Gün Sirer,et al.  (Short Paper) PieceWork: Generalized Outsourcing Control for Proofs of Work , 2017, Financial Cryptography Workshops.

[71]  Jere Backman,et al.  Blockchain network slice broker in 5G: Slice leasing in factory of the future use case , 2017, 2017 Internet of Things Business Models, Users, and Networks.

[72]  Kai Wang,et al.  Enabling Collaborative Edge Computing for Software Defined Vehicular Networks , 2018, IEEE Network.

[73]  Stefan Dziembowski,et al.  Proofs of Space , 2015, CRYPTO.

[74]  Ittay Eyal,et al.  The Miner's Dilemma , 2014, 2015 IEEE Symposium on Security and Privacy.

[75]  Ralph C. Merkle,et al.  A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.

[76]  Leslie Lamport,et al.  Reaching Agreement in the Presence of Faults , 1980, JACM.

[77]  Shanzhi Chen,et al.  A Security Authentication Scheme of 5G Ultra-Dense Network Based on Block Chain , 2018, IEEE Access.

[78]  Zhu Han,et al.  Optimal Pricing-Based Edge Computing Resource Management in Mobile Blockchain , 2017, 2018 IEEE International Conference on Communications (ICC).

[79]  Michel Raynal,et al.  Communication and Agreement Abstractions for Fault-Tolerant Asynchronous Distributed Systems , 2010, Synthesis Lectures on Distributed Computing Theory.

[80]  Bogdan Carbunar,et al.  Hardening Stratum, the Bitcoin Pool Mining Protocol , 2017, Proc. Priv. Enhancing Technol..

[81]  Aggelos Kiayias,et al.  Proofs of Work for Blockchain Protocols , 2017, IACR Cryptol. ePrint Arch..

[82]  Oded Goldreich,et al.  Zero-Knowledge twenty years after its invention , 2002, Electron. Colloquium Comput. Complex..

[83]  Yoad Lewenberg,et al.  SPECTRE: A Fast and Scalable Cryptocurrency Protocol , 2016, IACR Cryptol. ePrint Arch..

[84]  John Langford,et al.  CAPTCHA: Using Hard AI Problems for Security , 2003, EUROCRYPT.

[85]  Michael Devetsikiotis,et al.  Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.

[86]  Victor C. M. Leung,et al.  Blockchain-Based Decentralized Trust Management in Vehicular Networks , 2019, IEEE Internet of Things Journal.

[87]  Jagdeep Sidhu,et al.  Syscoin: A Peer-to-Peer Electronic Cash System with Blockchain-Based Services for E-Business , 2017, 2017 26th International Conference on Computer Communication and Networks (ICCCN).

[88]  Shrisha Rao,et al.  Distributed Systems: An Algorithmic Approach , 2008, IEEE Distributed Systems Online.

[89]  Eli Ben-Sasson,et al.  SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge , 2013, CRYPTO.

[90]  Xiang Zhang,et al.  BlockNDN: A bitcoin blockchain decentralized system over named data networking , 2017, 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN).

[91]  Meni Rosenfeld,et al.  Analysis of Bitcoin Pooled Mining Reward Systems , 2011, ArXiv.

[92]  Pieter Wuille,et al.  Enabling Blockchain Innovations with Pegged Sidechains , 2014 .

[93]  Aggelos Kiayias,et al.  Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain , 2018, EUROCRYPT.

[94]  Victor Shoup,et al.  Secure and Efficient Asynchronous Broadcast Protocols , 2001, CRYPTO.

[95]  Iddo Bentov,et al.  Proof of Activity: Extending Bitcoin's Proof of Work via Proof of Stake [Extended Abstract]y , 2014, PERV.

[96]  Marko Vukolic,et al.  Blockchain Consensus Protocols in the Wild , 2017, DISC.

[97]  Elaine Shi,et al.  Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts , 2016, 2016 IEEE Symposium on Security and Privacy (SP).

[98]  Silvio Micali,et al.  Verifiable random functions , 1999, 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039).

[99]  Praveen Gauravaram,et al.  Blockchain for IoT security and privacy: The case study of a smart home , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).

[100]  David A. Wagner,et al.  A Generalized Birthday Problem , 2002, CRYPTO.

[101]  Lei Fan,et al.  A Scalable Proof-of-Stake Blockchain in the Open Se ing ∗ ( or , How to Mimic Nakamoto ’ s Design via Proof-of-Stake ) , 2018 .

[102]  Zhu Han,et al.  Performance Analysis and Application of Mobile Blockchain , 2017, 2018 International Conference on Computing, Networking and Communications (ICNC).

[103]  Holger Paul Keeler,et al.  Bitcoin blockchain dynamics: The selfish-mine strategy in the presence of propagation delay , 2015, Perform. Evaluation.

[104]  Yoad Lewenberg,et al.  Inclusive Block Chain Protocols , 2015, Financial Cryptography.

[105]  Vitalik Buterin A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .

[106]  Aggelos Kiayias,et al.  The Bitcoin Backbone Protocol with Chains of Variable Difficulty , 2017, CRYPTO.

[107]  Christian Cachin,et al.  Architecture of the Hyperledger Blockchain Fabric , 2016 .

[108]  Hiroyuki Yamada,et al.  What’s So Different about Blockchain? — Blockchain is a Probabilistic State Machine , 2016, 2016 IEEE 36th International Conference on Distributed Computing Systems Workshops (ICDCSW).

[109]  Tim Roughgarden,et al.  Algorithmic Game Theory , 2007 .

[110]  Moshe Babaioff,et al.  On bitcoin and red balloons , 2011, EC '12.

[111]  Prateek Saxena,et al.  On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining , 2015, 2015 IEEE 28th Computer Security Foundations Symposium.

[112]  A. Poelstra Distributed Consensus from Proof of Stake is Impossible , 2015 .

[113]  F. Richard Yu,et al.  Biologically inspired consensus-based spectrum sensing in mobile Ad Hoc networks with cognitive radios , 2010, IEEE Network.

[114]  Lin Chen,et al.  On Security Analysis of Proof-of-Elapsed-Time (PoET) , 2017, SSS.

[115]  Marko Vukolic,et al.  The Quest for Scalable Blockchain Fabric: Proof-of-Work vs. BFT Replication , 2015, iNetSeC.

[116]  Aggelos Kiayias,et al.  The Bitcoin Backbone Protocol: Analysis and Applications , 2015, EUROCRYPT.

[117]  Gang Chen,et al.  Untangling Blockchain: A Data Processing View of Blockchain Systems , 2017, IEEE Transactions on Knowledge and Data Engineering.

[118]  Philipp Jovanovic,et al.  OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding , 2018, 2018 IEEE Symposium on Security and Privacy (SP).

[119]  Emin Gün Sirer,et al.  Bitcoin-NG: A Scalable Blockchain Protocol , 2015, NSDI.

[120]  Zhili Sun,et al.  Blockchain-Based Dynamic Key Management for Heterogeneous Intelligent Transportation Systems , 2017, IEEE Internet of Things Journal.

[121]  Elaine Shi,et al.  Snow White: Provably Secure Proofs of Stake , 2016, IACR Cryptol. ePrint Arch..

[122]  Massimo Bartoletti,et al.  A Survey of Attacks on Ethereum Smart Contracts (SoK) , 2017, POST.

[123]  Erik Blasch,et al.  Real-Time Index Authentication for Event-Oriented Surveillance Video Query using Blockchain , 2018, 2018 IEEE International Smart Cities Conference (ISC2).

[124]  Rob Jansen,et al.  A TorPath to TorCoin: Proof-of-Bandwidth Altcoins for Compensating Relays , 2014 .

[125]  Aviv Zohar,et al.  Bitcoin's Security Model Revisited , 2016, ArXiv.

[126]  Michael K. Reiter A Secure Group Membership Protocol , 1996, IEEE Trans. Software Eng..

[127]  Robert H. Deng,et al.  CrowdBC: A Blockchain-Based Decentralized Framework for Crowdsourcing , 2019, IEEE Transactions on Parallel and Distributed Systems.

[128]  Frank Kargl,et al.  KopperCoin - A Distributed File Storage with Financial Incentives , 2016, ISPEC.

[129]  Carlos V. Rozas,et al.  Intel® Software Guard Extensions: EPID Provisioning and Attestation Services , 2016 .

[130]  Mohsen Guizani,et al.  Deep Learning for IoT Big Data and Streaming Analytics: A Survey , 2017, IEEE Communications Surveys & Tutorials.

[131]  Allison Bishop,et al.  Unbounded HIBE and Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..

[132]  Zhu Han,et al.  Cloud/Fog Computing Resource Management and Pricing for Blockchain Networks , 2017, IEEE Internet of Things Journal.

[133]  David Schwartz,et al.  The Ripple Protocol Consensus Algorithm , 2014 .

[134]  Kartik Nayak,et al.  Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).

[135]  Abhi Shelat,et al.  Analysis of the Blockchain Protocol in Asynchronous Networks , 2017, EUROCRYPT.

[136]  Nicolas Houy,et al.  The Bitcoin Mining Game , 2014, Ledger.

[137]  Marko Vukolic,et al.  Blockchain Consensus Protocols in the Wild (Keynote Talk) , 2017, DISC.

[138]  Zibin Zheng,et al.  Blockchain challenges and opportunities: a survey , 2018, Int. J. Web Grid Serv..

[139]  Cesare Pautasso,et al.  A Taxonomy of Blockchain-Based Systems for Architecture Design , 2017, 2017 IEEE International Conference on Software Architecture (ICSA).

[140]  Wei Xu,et al.  Scaling Nakamoto Consensus to Thousands of Transactions per Second , 2018, ArXiv.

[141]  Dusit Niyato,et al.  Evolutionary Game for Mining Pool Selection in Blockchain Networks , 2017, IEEE Wireless Communications Letters.

[142]  Kartik Nayak,et al.  Solidus: An Incentive-compatible Cryptocurrency Based on Permissionless Byzantine Consensus , 2016, ArXiv.

[143]  Hubert Ritzdorf,et al.  On the Security and Performance of Proof of Work Blockchains , 2016, IACR Cryptol. ePrint Arch..

[144]  Elaine Shi,et al.  Hybrid Consensus: Efficient Consensus in the Permissionless Model , 2016, DISC.

[145]  Davor Svetinovic,et al.  Data Analysis of Digital Currency Networks: Namecoin Case Study , 2016, 2016 21st International Conference on Engineering of Complex Computer Systems (ICECCS).

[146]  Nicolas Houy,et al.  It Will Cost You Nothing to 'Kill' a Proof-of-Stake Crypto-Currency , 2014 .

[147]  Ari Juels,et al.  Pors: proofs of retrievability for large files , 2007, CCS '07.

[148]  Warren He,et al.  Proof of Luck: an Efficient Blockchain Consensus Protocol , 2016, SysTEX@Middleware.

[149]  Björn Tackmann,et al.  Moderately Hard Functions: Definition, Instantiations, and Applications , 2017, TCC.

[150]  David Hutchison,et al.  A survey of key management for secure group communication , 2003, CSUR.

[151]  Song Guo,et al.  Big Data Meet Green Challenges: Big Data Toward Green Applications , 2016, IEEE Systems Journal.

[152]  Yan Zhang,et al.  Enabling Localized Peer-to-Peer Electricity Trading Among Plug-in Hybrid Electric Vehicles Using Consortium Blockchains , 2017, IEEE Transactions on Industrial Informatics.

[153]  Peter R. Rizun,et al.  Subchains: A Technique to Scale Bitcoin and Improve the User Experience , 2016, Ledger.

[154]  Michael Bedford Taylor,et al.  The Evolution of Bitcoin Hardware , 2017, Computer.

[155]  Dusit Niyato,et al.  Social Welfare Maximization Auction in Edge Computing Resource Allocation for Mobile Blockchain , 2017, 2018 IEEE International Conference on Communications (ICC).

[156]  Aviv Zohar,et al.  Secure High-Rate Transaction Processing in Bitcoin , 2015, Financial Cryptography.

[157]  Kun Wang,et al.  Intelligent Resource Management in Blockchain-Based Cloud Datacenters , 2018, IEEE Cloud Computing.

[158]  Emin Gün Sirer,et al.  Decentralization in Bitcoin and Ethereum Networks , 2018, Financial Cryptography.

[159]  Björn Scheuermann,et al.  Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies , 2016, IEEE Communications Surveys & Tutorials.

[160]  Shawn Wilkinson,et al.  Storj A Peer-to-Peer Cloud Storage Network , 2014 .

[161]  Jitender S. Deogun,et al.  Design and analysis of elastic handoff in cognitive cellular networks , 2017, 2017 IEEE International Conference on Communications (ICC).

[162]  Daniel Davis Wood,et al.  ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .

[163]  Nikos Fotiou,et al.  Decentralized name-based security for content distribution using blockchains , 2016, 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[164]  Aggelos Kiayias,et al.  Edinburgh Research Explorer On Trees, Chains and Fast Transactions in the Blockchain , 2017 .

[165]  Ariel Gabizon,et al.  Cryptocurrencies Without Proof of Work , 2014, Financial Cryptography Workshops.

[166]  PRADIP KUMAR SHARMA,et al.  A Software Defined Fog Node Based Distributed Blockchain Cloud Architecture for IoT , 2018, IEEE Access.

[167]  Christian Decker,et al.  Information propagation in the Bitcoin network , 2013, IEEE P2P 2013 Proceedings.

[168]  Nesrine Kaaniche,et al.  A blockchain-based data usage auditing architecture with enhanced privacy and availability , 2017, 2017 IEEE 16th International Symposium on Network Computing and Applications (NCA).

[169]  Bryan Ford,et al.  Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing , 2016, USENIX Security Symposium.

[170]  Silvio Micali,et al.  Algorand: Scaling Byzantine Agreements for Cryptocurrencies , 2017, IACR Cryptol. ePrint Arch..

[171]  C. Jaag,et al.  The Bitcoin Mining Game: On the Optimality of Honesty in Proof-of-work Consensus Mechanism , 2017 .

[172]  Mauro Conti,et al.  A Survey on Security and Privacy Issues of Bitcoin , 2017, IEEE Communications Surveys & Tutorials.

[173]  Praveen Gauravaram,et al.  LSB: A Lightweight Scalable BlockChain for IoT Security and Privacy , 2017, ArXiv.

[174]  Mehmet A. Orgun,et al.  A Proof-of-Trust Consensus Protocol for Enhancing Accountability in Crowdsourcing Services , 2019, IEEE Transactions on Services Computing.

[175]  Ghassan O. Karame,et al.  Securing Proof-of-Stake Blockchain Protocols , 2017, DPM/CBT@ESORICS.

[176]  Hong Li,et al.  Blockchain for Large-Scale Internet of Things Data Storage and Protection , 2019, IEEE Transactions on Services Computing.

[177]  Emin Gün Sirer,et al.  Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.

[178]  Sushmita Ruj,et al.  Bitcoin Block Withholding Attack: Analysis and Mitigation , 2017, IEEE Transactions on Information Forensics and Security.

[179]  Benjamin Aziz,et al.  A Temporal Blockchain: A Formal Analysis , 2016, 2016 International Conference on Collaboration Technologies and Systems (CTS).

[180]  Arvind Narayanan,et al.  An Empirical Study of Namecoin and Lessons for Decentralized Namespace Design , 2015, WEIS.

[181]  Khashayar Kotobi,et al.  Blockchain-enabled spectrum access in cognitive radio networks , 2017, 2017 Wireless Telecommunications Symposium (WTS).

[182]  Muneeb Ali,et al.  Blockstack: A Global Naming and Storage System Secured by Blockchains , 2016, USENIX Annual Technical Conference.

[183]  Adam Mackenzie,et al.  MRL-0004 Improving Obfuscation in the CryptoNote Protocol , 2015 .

[184]  C. Cachin Yet Another Visit to Paxos , 2010 .

[185]  Vitalik Buterin,et al.  Casper the Friendly Finality Gadget , 2017, ArXiv.

[186]  Fan Zhang,et al.  REM: Resource-Efficient Mining for Blockchains , 2017, IACR Cryptol. ePrint Arch..

[187]  P. Rizun A Transaction Fee Market Exists Without a Block Size Limit , 2016 .

[188]  Aron Laszka,et al.  When Bitcoin Mining Pools Run Dry - A Game-Theoretic Analysis of the Long-Term Impact of Attacks Between Mining Pools , 2015, Financial Cryptography Workshops.

[189]  Mehdi Bennis,et al.  On-Device Federated Learning via Blockchain and its Latency Analysis , 2018, ArXiv.

[190]  Alex Biryukov,et al.  Equihash: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem , 2016, NDSS.

[191]  Zekeriya Erkin,et al.  Information Propagation on Permissionless Blockchains , 2017, ArXiv.

[192]  Marko Vukolic,et al.  XFT: Practical Fault Tolerance beyond Crashes , 2015, OSDI.

[193]  Sachin Shetty,et al.  Security Implications of Blockchain Cloud with Analysis of Block Withholding Attack , 2017, 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID).

[194]  Joshua A. Kroll,et al.  The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries , 2013 .

[195]  Zhu Han,et al.  When Mobile Blockchain Meets Edge Computing: Challenges and Applications , 2017, ArXiv.

[196]  Sunny King,et al.  PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake , 2012 .

[197]  Florian Glaser,et al.  Pervasive Decentralisation of Digital Infrastructures: A Framework for Blockchain enabled System and Use Case Analysis , 2017, HICSS.

[198]  Elaine Shi,et al.  Permacoin: Repurposing Bitcoin Work for Data Preservation , 2014, 2014 IEEE Symposium on Security and Privacy.

[199]  Zhu Han,et al.  When Mobile Blockchain Meets Edge Computing , 2017, IEEE Communications Magazine.

[200]  Nicolas Herbaut,et al.  A Model for Collaborative Blockchain-Based Video Delivery Relying on Advanced Network Services Chains , 2017, IEEE Communications Magazine.

[201]  Aviv Zohar,et al.  Optimal Selfish Mining Strategies in Bitcoin , 2015, Financial Cryptography.

[202]  Michael O. Rabin,et al.  Transaction Protection by Beacons , 1983, J. Comput. Syst. Sci..

[203]  Michael J. Fischer,et al.  Scalable Bias-Resistant Distributed Randomness , 2017, 2017 IEEE Symposium on Security and Privacy (SP).

[204]  J. Aspnes,et al.  Exposing Computationally-Challenged Byzantine Impostors , 2005 .

[205]  Nir Kshetri,et al.  Can Blockchain Strengthen the Internet of Things? , 2017, IT Professional.

[206]  Pan Hui,et al.  FlopCoin: A Cryptocurrency for Computation Offloading , 2018, IEEE Transactions on Mobile Computing.

[207]  Georg Fuchsbauer,et al.  SpaceMint: A Cryptocurrency Based on Proofs of Space , 2018, ERCIM News.

[208]  Alex Pentland,et al.  Enigma: Decentralized Computation Platform with Guaranteed Privacy , 2015, ArXiv.