Consensus Mechanisms and Related Issues

[1]  A.W.G. de Vries Bitcoin's Growing Energy Problem , 2018 .

[2]  Elaine Shi,et al.  Permacoin: Repurposing Bitcoin Work for Data Preservation , 2014, 2014 IEEE Symposium on Security and Privacy.

[3]  Arnd Huchzermeier,et al.  Consensus Mechanisms , 2020, Build Your Own Blockchain.

[4]  A.W.G. de Vries,et al.  Renewable Energy Will Not Solve Bitcoin’s Sustainability Problem , 2019, Joule.

[5]  Aviv Zohar,et al.  Bitcoin's Security Model Revisited , 2016, ArXiv.

[6]  Tanja Lange,et al.  Post-quantum cryptography , 2008, Nature.

[7]  Ghassan O. Karame,et al.  Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin , 2012, IACR Cryptol. ePrint Arch..

[8]  Sunny King,et al.  PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake , 2012 .

[9]  Miguel Oom Temudo de Castro,et al.  Practical Byzantine fault tolerance , 1999, OSDI '99.

[10]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[11]  Ari Juels,et al.  BDoS: Blockchain Denial-of-Service , 2020, CCS.

[12]  Vitalik Buterin A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .

[13]  Gavriel Christofi Study of consensus protocols and improvement of the Delegated Byzantine Fault Tolerance (DBFT) algorithm , 2019 .

[14]  Aleksander Berentsen Aleksander Berentsen Recommends “Bitcoin: A Peer-to-Peer Electronic Cash System” by Satoshi Nakamoto , 2019, 21st Century Economics.

[15]  Yonggang Wen,et al.  A Survey on Consensus Mechanisms and Mining Strategy Management in Blockchain Networks , 2018, IEEE Access.

[16]  Juri Mattila,et al.  The Blockchain Phenomenon – The Disruptive Potential of Distributed Consensus Architectures , 2016 .

[17]  Emin Gün Sirer,et al.  Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.

[18]  Abdul Wahab,et al.  Survey of Consensus Protocols , 2018, ArXiv.

[19]  Constantinos Patsakis,et al.  A Survey on Long-Range Attacks for Proof of Stake Protocols , 2019, IEEE Access.

[20]  Lin Chen,et al.  On Security Analysis of Proof-of-Elapsed-Time (PoET) , 2017, SSS.

[21]  Aggelos Kiayias,et al.  Proof-of-Burn , 2020, IACR Cryptol. ePrint Arch..

[22]  Ari Juels,et al.  Proofs of retrievability: theory and implementation , 2009, CCSW '09.