Bootstrapping the Blockchain, with Applications to Consensus and Fast PKI Setup
暂无分享,去创建一个
Aggelos Kiayias | Nikos Leonardos | Juan A. Garay | Giorgos Panagiotakos | J. Garay | A. Kiayias | Nikos Leonardos | Giorgos Panagiotakos
[1] Sunny King,et al. PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake , 2012 .
[2] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[3] Christian Cachin,et al. Architecture of the Hyperledger Blockchain Fabric , 2016 .
[4] Ueli Maurer,et al. Universally Composable Synchronous Computation , 2013, TCC.
[5] Ravi Montenegro,et al. Near Optimal Bounds for Collision in Pollard Rho for Discrete Log , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).
[6] Marcin Andrychowicz,et al. PoW-Based Distributed Cryptography with No Trusted Setup , 2015, CRYPTO.
[7] Andrew Chi-Chih Yao,et al. Protocols for Secure Computations (Extended Abstract) , 1982, FOCS.
[8] Silvio Micali,et al. How to play any mental game, or a completeness theorem for protocols with honest majority , 2019, Providing Sound Foundations for Cryptography.
[9] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[10] Matthias Fitzi,et al. Generalized communication and security models in Byzantine agreement , 2002 .
[11] Ran Canetti,et al. Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.
[12] Elaine Shi,et al. Pseudonymous Secure Computation from Time-Lock Puzzles , 2014, IACR Cryptol. ePrint Arch..
[13] J. Aspnes,et al. Exposing Computationally-Challenged Byzantine Impostors , 2005 .
[14] Danny Dolev,et al. Authenticated Algorithms for Byzantine Agreement , 1983, SIAM J. Comput..
[15] Rafail Ostrovsky,et al. Round Complexity of Authenticated Broadcast with a Dishonest Majority , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).
[16] Moni Naor,et al. Pricing via Processing or Combatting Junk Mail , 1992, CRYPTO.
[17] Sandro Coretti,et al. Probabilistic Termination and Composability of Cryptographic Protocols , 2016, Journal of Cryptology.
[18] Aggelos Kiayias,et al. Bootstrapping the Blockchain - Directly , 2016, IACR Cryptol. ePrint Arch..
[19] Jeffrey Considine,et al. Byzantine Agreement Given Partial Broadcast , 2005, Journal of Cryptology.
[20] Eli Ben-Sasson,et al. Zerocash: Decentralized Anonymous Payments from Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.
[21] Leslie Lamport,et al. Reaching Agreement in the Presence of Faults , 1980, JACM.
[22] Ari Juels,et al. $evwu Dfw , 1998 .
[23] Malte Borcherding,et al. Levels of authentication in distributed agreement , 1996 .
[24] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[25] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[26] Ronald L. Rivest,et al. Time-lock Puzzles and Timed-release Crypto , 1996 .
[27] Speed-Security Tradeo s in Blockchain Protocols , 2015 .
[28] Abhi Shelat,et al. Analysis of the Blockchain Protocol in Asynchronous Networks , 2017, EUROCRYPT.
[29] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[30] Aggelos Kiayias,et al. Speed-Security Tradeoffs in Blockchain Protocols , 2015, IACR Cryptol. ePrint Arch..
[31] Aggelos Kiayias,et al. The Bitcoin Backbone Protocol: Analysis and Applications , 2015, EUROCRYPT.
[32] Emin Gün Sirer,et al. Bitcoin-NG: A Scalable Blockchain Protocol , 2015, NSDI.
[33] Nancy A. Lynch,et al. Consensus in the presence of partial synchrony , 1988, JACM.
[34] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[35] Aggelos Kiayias,et al. Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol , 2017, CRYPTO.
[36] Emin Gün Sirer,et al. Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.