FleetChain: A Secure Scalable and Responsive Blockchain Achieving Optimal Sharding
暂无分享,去创建一个
Dawei Li | Yizhong Liu | Jianwei Liu | Hui Yu | Qianhong Wu | Qianhong Wu | Jianwei Liu | Dawei Li | Hui Yu | Yizhong Liu
[1] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[2] Ittay Eyal,et al. The Miner's Dilemma , 2014, 2015 IEEE Symposium on Security and Privacy.
[3] Kartik Nayak,et al. Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[4] Abhi Shelat,et al. Analysis of the Blockchain Protocol in Asynchronous Networks , 2017, EUROCRYPT.
[5] Miguel Oom Temudo de Castro,et al. Practical Byzantine fault tolerance , 1999, OSDI '99.
[6] Eleftherios Kokoris-Kogias,et al. Robust and Scalable Consensus for Sharded Distributed Ledgers , 2019, IACR Cryptol. ePrint Arch..
[7] Hao Wang,et al. Monoxide: Scale out Blockchains with Asynchronous Consensus Zones , 2019, NSDI.
[8] Mauro Conti,et al. A Survey on Security and Privacy Issues of Bitcoin , 2017, IEEE Communications Surveys & Tutorials.
[9] Ee-Chien Chang,et al. Towards Scaling Blockchain Systems via Sharding , 2018, SIGMOD Conference.
[10] George Danezis,et al. The Road to Scalable Blockchain Designs , 2017, Login: The Usenix Magazine.
[11] Ittai Abraham,et al. HotStuff: BFT Consensus with Linearity and Responsiveness , 2019, PODC.
[12] Joseph Bonneau,et al. Why Buy When You Can Rent? - Bribery Attacks on Bitcoin-Style Consensus , 2016, Financial Cryptography Workshops.
[13] George Danezis,et al. Chainspace: A Sharded Smart Contracts Platform , 2017, NDSS.
[14] Sushmita Ruj,et al. Bitcoin Block Withholding Attack: Analysis and Mitigation , 2017, IEEE Transactions on Information Forensics and Security.
[15] Aggelos Kiayias,et al. SoK: Communication Across Distributed Ledgers , 2019, IACR Cryptol. ePrint Arch..
[16] Alexandra Boldyreva,et al. Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme , 2003, Public Key Cryptography.
[17] Tongge Xu,et al. An Evaluation of Uncle Block Mechanism Effect on Ethereum Selfish and Stubborn Mining Combined With an Eclipse Attack , 2020, IEEE Access.
[18] Kartik Nayak,et al. Practical Synchronous Byzantine Consensus , 2017, IACR Cryptol. ePrint Arch..
[19] Aggelos Kiayias,et al. The Bitcoin Backbone Protocol: Analysis and Applications , 2015, EUROCRYPT.
[20] Philipp Jovanovic,et al. OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[21] Ethan Heilman,et al. Eclipse Attacks on Bitcoin's Peer-to-Peer Network , 2015, USENIX Security Symposium.
[22] Mariana Raykova,et al. RapidChain: Scaling Blockchain via Full Sharding , 2018, CCS.
[23] Thomas Ristenpart,et al. The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks , 2007, EUROCRYPT.
[24] Prateek Saxena,et al. A Secure Sharding Protocol For Open Blockchains , 2016, CCS.
[25] Ittay Eyal,et al. Ostraka: Secure Blockchain Scaling by Node Sharding , 2019, 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
[26] Benny Pinkas,et al. SBFT: A Scalable and Decentralized Trust Infrastructure , 2018, 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[27] George Danezis,et al. Replay Attacks and Defenses Against Cross-shard Consensus in Sharded Distributed Ledgers , 2019, 2020 IEEE European Symposium on Security and Privacy (EuroS&P).
[28] Roger Wattenhofer,et al. Divide and Scale: Formalization of Distributed Ledger Sharding Protocols , 2019, ArXiv.
[29] Jianwei Liu,et al. A fair selection protocol for committee-based permissionless blockchains , 2020, Comput. Secur..
[30] Stefan Dziembowski,et al. Perun: Virtual Payment Hubs over Cryptocurrencies , 2019, 2019 IEEE Symposium on Security and Privacy (SP).