Bootstrapping the Blockchain - Directly
暂无分享,去创建一个
[1] Marcin Andrychowicz,et al. PoW-Based Distributed Cryptography with No Trusted Setup , 2015, CRYPTO.
[2] Ran Canetti,et al. Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.
[3] Andrew Chi-Chih Yao,et al. Protocols for Secure Computations (Extended Abstract) , 1982, FOCS.
[4] Elaine Shi,et al. Pseudonymous Secure Computation from Time-Lock Puzzles , 2014, IACR Cryptol. ePrint Arch..
[5] Eli Ben-Sasson,et al. Zerocash: Decentralized Anonymous Payments from Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.
[6] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[7] Aggelos Kiayias,et al. The Bitcoin Backbone Protocol: Analysis and Applications , 2015, EUROCRYPT.
[8] Emin Gün Sirer,et al. Bitcoin-NG: A Scalable Blockchain Protocol , 2015, NSDI.
[9] Ronald L. Rivest,et al. Time-lock Puzzles and Timed-release Crypto , 1996 .
[10] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[11] Marcin Andrychowicz,et al. Distributed Cryptography Based on the Proofs of Work , 2014, IACR Cryptol. ePrint Arch..
[12] Speed-Security Tradeo s in Blockchain Protocols , 2015 .
[13] Leslie Lamport,et al. Reaching Agreement in the Presence of Faults , 1980, JACM.
[14] Ari Juels,et al. $evwu Dfw , 1998 .
[15] Moni Naor,et al. Pricing via Processing or Combatting Junk Mail , 1992, CRYPTO.
[16] J. Aspnes,et al. Exposing Computationally-Challenged Byzantine Impostors , 2005 .
[17] Abhi Shelat,et al. Analysis of the Blockchain Protocol in Asynchronous Networks , 2017, EUROCRYPT.
[18] Pedro Moreno-Sanchez,et al. P2P Mixing and Unlinkable Bitcoin Transactions , 2017, NDSS.
[19] David Chaum,et al. The dining cryptographers problem: Unconditional sender and recipient untraceability , 1988, Journal of Cryptology.
[20] Danny Dolev,et al. Authenticated Algorithms for Byzantine Agreement , 1983, SIAM J. Comput..
[21] Emin Gün Sirer,et al. Majority is not enough , 2013, Financial Cryptography.
[22] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[23] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[24] Malte Borcherding,et al. Levels of authentication in distributed agreement , 1996 .
[25] Ueli Maurer,et al. Universally Composable Synchronous Computation , 2013, TCC.