What is Meant by Permissionless Blockchains?
暂无分享,去创建一个
Walid Fdhila | Aljosha Judmayer | Nicholas Stifter | Philipp Schindler | Andreas Kern | Aljosha Judmayer | Nicholas Stifter | Philipp Schindler | W. Fdhila | Andreas Kern
[1] S. Nakamoto,et al. Bitcoin: A Peer-to-Peer Electronic Cash System , 2008 .
[2] Hannes Hartenstein,et al. Short Paper: An Empirical Analysis of Blockchain Forks in Bitcoin , 2019, Financial Cryptography.
[3] Hubert Ritzdorf,et al. TLS-N: Non-repudiation over TLS Enablign Ubiquitous Content Signing , 2018, NDSS.
[4] Jeremy Clark,et al. SoK: Transparent Dishonesty: Front-Running Attacks on Blockchain , 2019, Financial Cryptography Workshops.
[5] Jason Teutsch,et al. SmartPool: Practical Decentralized Pooled Mining , 2017, USENIX Security Symposium.
[6] George Danezis,et al. Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers , 2018, NDSS.
[7] Srdjan Capkun,et al. Snappy: Fast On-chain Payments with Practical Collaterals , 2020, NDSS.
[8] Emin Gün Sirer,et al. Selfish Mining Re-Examined , 2020, Financial Cryptography.
[9] Ari Juels,et al. Flash Boys 2.0: Frontrunning, Transaction Reordering, and Consensus Instability in Decentralized Exchanges , 2019, ArXiv.
[10] Yuliang Zheng,et al. Security of the Blockchain against Long Delay Attack , 2018, IACR Cryptol. ePrint Arch..
[11] Ueli Maurer,et al. Bitcoin as a Transaction Ledger: A Composable Treatment , 2017, CRYPTO.
[12] Stefan Dziembowski,et al. Multi-party Virtual State Channels , 2019, EUROCRYPT.
[13] Peng Gao,et al. HyperService: Interoperability and Programmability Across Heterogeneous Blockchains , 2019, CCS.
[14] Sreeram Kannan,et al. Prism: Deconstructing the Blockchain to Approach Physical Limits , 2019, CCS.
[15] Aggelos Kiayias,et al. The Bitcoin Backbone Protocol: Analysis and Applications , 2015, EUROCRYPT.
[16] Daniel Slamanig,et al. Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based , 2019, NDSS.
[17] Christopher Carr,et al. Security Properties of Light Clients on the Ethereum Blockchain , 2020, IEEE Access.
[18] Massimo Bartoletti,et al. BitML: A Calculus for Bitcoin Smart Contracts , 2018, IACR Cryptol. ePrint Arch..
[19] Elaine Shi,et al. The Sleepy Model of Consensus , 2017, ASIACRYPT.
[20] Eli Ben-Sasson,et al. Zerocash: Decentralized Anonymous Payments from Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.
[21] Bernhard Haslhofer,et al. A Deep Dive into Bitcoin Mining Pools: An Empirical Analysis of Mining Shares , 2019, ArXiv.
[22] Bart Preneel,et al. Lay Down the Common Metrics: Evaluating Proof-of-Work Consensus Protocols' Security , 2019, 2019 IEEE Symposium on Security and Privacy (SP).
[23] Ghassan O. Karame,et al. BITE: Bitcoin Lightweight Client Privacy using Trusted Execution , 2018, IACR Cryptol. ePrint Arch..
[24] Min Suk Kang,et al. A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network , 2019, 2020 IEEE Symposium on Security and Privacy (SP).
[25] Petar Tsankov,et al. Securify: Practical Security Analysis of Smart Contracts , 2018, CCS.
[26] Srinivas Devadas,et al. Transparency Logs via Append-Only Authenticated Dictionaries , 2019, IACR Cryptol. ePrint Arch..
[27] Jeremy Clark,et al. SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies , 2015, 2015 IEEE Symposium on Security and Privacy.
[28] Rami Khalil,et al. Revive: Rebalancing Off-Blockchain Payment Networks , 2017, IACR Cryptol. ePrint Arch..
[29] Pawel Szalachowski,et al. StrongChain: Transparent and Collaborative Proof-of-Work Consensus , 2019, USENIX Security Symposium.
[30] Fan Zhang,et al. Tesseract: Real-Time Cryptocurrency Exchange using Trusted Hardware , 2017, IACR Cryptol. ePrint Arch..
[31] Vincent Gramoli,et al. The Attack of the Clones against Proof-of-Authority , 2019, NDSS.
[32] Giulio Malavolta,et al. SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks , 2017, NDSS.
[33] Benjamin Livshits,et al. Broken Metre: Attacking Resource Metering in EVM , 2019, NDSS.
[34] Aggelos Kiayias,et al. Resource-Restricted Cryptography: Revisiting MPC Bounds in the Proof-of-Work Era , 2020, EUROCRYPT.
[35] Mariana Raykova,et al. RapidChain: A Fast Blockchain Protocol via Full Sharding , 2018, IACR Cryptol. ePrint Arch..
[36] Edgar R. Weippl,et al. Merged Mining: Curse or Cure? , 2017, DPM/CBT@ESORICS.
[37] Alexei Zamyatin,et al. XCLAIM: Trustless, Interoperable, Cryptocurrency-Backed Assets , 2019, 2019 IEEE Symposium on Security and Privacy (SP).
[38] Edgar R. Weippl,et al. Agreement with Satoshi - On the Formalization of Nakamoto Consensus , 2018, IACR Cryptol. ePrint Arch..
[39] Bernardo Magri,et al. Redactable Blockchain in the Permissionless Setting , 2019, 2019 IEEE Symposium on Security and Privacy (SP).
[40] Prateek Saxena,et al. A Secure Sharding Protocol For Open Blockchains , 2016, CCS.
[41] Tong Cao,et al. Exploring the Monero Peer-to-Peer Network , 2020, IACR Cryptol. ePrint Arch..
[42] Dan Boneh,et al. Zether: Towards Privacy in a Smart Contract World , 2020, IACR Cryptol. ePrint Arch..
[43] Sukrit Kalra,et al. ZEUS: Analyzing Safety of Smart Contracts , 2018, NDSS.
[44] Pedro Moreno-Sanchez,et al. Atomic Multi-Channel Updates with Constant Collateral in Bitcoin-Compatible Payment-Channel Networks , 2019, IACR Cryptol. ePrint Arch..
[45] Ittay Eyal,et al. The Gap Game , 2018, SYSTOR.
[46] Elaine Shi,et al. Thunderella: Blockchains with Optimistic Instant Confirmation , 2018, IACR Cryptol. ePrint Arch..
[47] Nickolai Zeldovich,et al. Vault: Fast Bootstrapping for the Algorand Cryptocurrency , 2019, NDSS.
[48] Pedro Moreno-Sanchez,et al. SoK: Layer-Two Blockchain Protocols , 2020, Financial Cryptography.
[49] Shen Noether,et al. Ring SIgnature Confidential Transactions for Monero , 2015, IACR Cryptol. ePrint Arch..
[50] Ten-Hwang Lai,et al. OPERA: Open Remote Attestation for Intel's Secure Enclaves , 2019, CCS.
[51] Marko Vukolic,et al. The Quest for Scalable Blockchain Fabric: Proof-of-Work vs. BFT Replication , 2015, iNetSeC.
[52] Jan Camenisch,et al. Practical UC-Secure Delegatable Credentials with Attributes and Their Application to Blockchain , 2017, CCS.
[53] Abhi Shelat,et al. Analysis of the Blockchain Protocol in Asynchronous Networks , 2017, EUROCRYPT.
[54] Giulio Malavolta,et al. Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability , 2019, NDSS.
[55] Abhi Shelat,et al. A Better Method to Analyze Blockchain Consistency , 2018, CCS.
[56] Edgar R. Weippl,et al. Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies , 2019, IACR Cryptol. ePrint Arch..
[57] Srinivas Devadas,et al. Catena: Efficient Non-equivocation via Bitcoin , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[58] Elaine Shi,et al. The Honey Badger of BFT Protocols , 2016, CCS.
[59] Kari Kostiainen,et al. PRCash: Fast, Private and Regulated Transactions for Digital Currencies , 2019, Financial Cryptography.
[60] Alex Norta,et al. Designing a Smart-Contract Application Layer for Transacting Decentralized Autonomous Organizations , 2016, ICACDS.
[61] Philipp Jovanovic,et al. OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[62] Prateek Saxena,et al. OHIE: Blockchain Scaling Made Simple , 2018, 2020 IEEE Symposium on Security and Privacy (SP).
[63] Ari Juels,et al. Order-Fairness for Byzantine Consensus , 2020, IACR Cryptol. ePrint Arch..
[64] Sourav Das,et al. YODA: Enabling computationally intensive contracts on blockchains with Byzantine and Selfish nodes , 2019, NDSS.
[65] Prateek Saxena,et al. Making Smart Contracts Smarter , 2016, IACR Cryptol. ePrint Arch..
[66] Srdjan Capkun,et al. ZLiTE: Lightweight Clients for Shielded Zcash Transactions using Trusted Execution , 2019, IACR Cryptol. ePrint Arch..
[67] Stake Shift in Major Cryptocurrencies: An Empirical Study , 2020, Financial Cryptography.
[68] Fan Zhang,et al. REM: Resource-Efficient Mining for Blockchains , 2017, IACR Cryptol. ePrint Arch..
[69] David Cerezo Sánchez. Zero-Knowledge Proof-of-Identity: Sybil-Resistant, Anonymous Authentication on Permissionless Blockchains and Incentive Compatible, Strictly Dominant Cryptocurrencies , 2019, IACR Cryptol. ePrint Arch..
[70] Emin Gün Sirer,et al. Decentralization in Bitcoin and Ethereum Networks , 2018, Financial Cryptography.
[71] Carmela Troncoso,et al. Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments , 2017, Proc. Priv. Enhancing Technol..
[72] Wessel Reijers,et al. Now the Code Runs Itself: On-Chain and Off-Chain Governance of Blockchain Technologies , 2018, Topoi.