Teechain: a secure payment network with asynchronous blockchain access
暂无分享,去创建一个
Emin Gün Sirer | Peter R. Pietzuch | Ittay Eyal | Florian Kelbert | Oded Naor | Joshua Lind | Ittay Eyal | E. Sirer | O. Naor | Joshua Lind | Florian Kelbert
[1] Ronald Cramer,et al. The ESPRIT Project CAFE - High Security Digital Payment Systems , 1994, ESORICS.
[2] Eric K. Clemons,et al. Reengineering Money: The Mondex Stored Value Card and Beyond , 1996, Int. J. Electron. Commer..
[3] Miguel Oom Temudo de Castro,et al. Practical Byzantine fault tolerance , 1999, OSDI '99.
[4] Jim Woodcock,et al. An Electronic Purse: Specification, Refinement and Proof , 2000 .
[5] Leslie Lamport,et al. Paxos Made Simple , 2001 .
[6] Sean W. Smith,et al. Building the IBM 4758 Secure Coprocessor , 2001, Computer.
[7] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[8] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[9] Hugo Krawczyk,et al. SIGMA: The 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE-Protocols , 2003, CRYPTO.
[10] Ran Canetti,et al. Universally composable signature, certification, and authentication , 2004, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004..
[11] Robbert van Renesse,et al. Chain Replication for Supporting High Throughput and Availability , 2004, OSDI.
[12] S. Nakamoto,et al. Bitcoin: A Peer-to-Peer Electronic Cash System , 2008 .
[13] Aviv Zohar,et al. Accelerating Bitcoin's Transaction Processing. Fast Money Grows on Trees, Not Chains , 2013, IACR Cryptol. ePrint Arch..
[14] Ittai Anati,et al. Innovative Technology for CPU Based Attestation and Sealing , 2013 .
[15] Eli Ben-Sasson,et al. Zerocash: Decentralized Anonymous Payments from Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.
[16] Iddo Bentov,et al. Proof of Activity: Extending Bitcoin's Proof of Work via Proof of Stake [Extended Abstract]y , 2014, PERV.
[17] Daniel Davis Wood,et al. ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .
[18] Yoad Lewenberg,et al. Inclusive Block Chain Protocols , 2015, Financial Cryptography.
[19] David Mazières. The Stellar Consensus Protocol: A Federated Model for Internet-level Consensus , 2015 .
[20] Ethan Heilman,et al. Eclipse Attacks on Bitcoin's Peer-to-Peer Network , 2015, USENIX Security Symposium.
[21] Christian Decker,et al. A Fast and Scalable Payment Network with Bitcoin Duplex Micropayment Channels , 2015, SSS.
[22] Christos Gkantsidis,et al. VC3: Trustworthy Data Analytics in the Cloud Using SGX , 2015, 2015 IEEE Symposium on Security and Privacy.
[23] Marko Vukolic,et al. The Quest for Scalable Blockchain Fabric: Proof-of-Work vs. BFT Replication , 2015, iNetSeC.
[24] Abhi Shelat,et al. Analysis of the Blockchain Protocol in Asynchronous Networks , 2017, EUROCRYPT.
[25] Emin Gün Sirer,et al. Teechan: Payment Channels Using Trusted Execution Environments , 2016, ArXiv.
[26] Fan Zhang,et al. Town Crier: An Authenticated Data Feed for Smart Contracts , 2016, CCS.
[27] Carlos V. Rozas,et al. Intel® Software Guard Extensions: EPID Provisioning and Attestation Services , 2016 .
[28] Bogdan Warinschi,et al. Foundations of Hardware-Based Attested Computation and Application to SGX , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[29] Srinivas Devadas,et al. Sanctum: Minimal Hardware Extensions for Strong Software Isolation , 2016, USENIX Security Symposium.
[30] Emin Gün Sirer,et al. Bitcoin-NG: A Scalable Blockchain Protocol , 2015, NSDI.
[31] Frank Piessens,et al. Ariadne: A Minimal Approach to State Continuity , 2016, USENIX Security Symposium.
[32] Elaine Shi,et al. The Honey Badger of BFT Protocols , 2016, CCS.
[33] Bryan Ford,et al. Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing , 2016, USENIX Security Symposium.
[34] Elaine Shi,et al. Hybrid Consensus: Efficient Consensus in the Permissionless Model , 2016, DISC.
[35] Srdjan Capkun,et al. ROTE: Rollback Protection for Trusted Execution , 2017, USENIX Security Symposium.
[36] Elaine Shi,et al. Formal Abstractions for Attested Execution Secure Processors , 2017, EUROCRYPT.
[37] Rami Khalil,et al. Revive: Rebalancing Off-Blockchain Payment Networks , 2017, IACR Cryptol. ePrint Arch..
[38] Elaine Shi,et al. Thunderella: Blockchains with Optimistic Instant Confirmation , 2018, IACR Cryptol. ePrint Arch..
[39] Silvio Micali,et al. Algorand: Scaling Byzantine Agreements for Cryptocurrencies , 2017, IACR Cryptol. ePrint Arch..
[40] Srdjan Capkun,et al. Software Grand Exposure: SGX Cache Attacks Are Practical , 2017, WOOT.
[41] Syed Taha Ali,et al. The Nuts and Bolts of Micropayments: A Survey , 2017, ArXiv.
[42] Andrew Miller,et al. Sprites: Payment Channels that Go Faster than Lightning , 2017, ArXiv.
[43] Rüdiger Kapitza,et al. Rollback and Forking Detection for Trusted Execution Environments Using Lightweight Collective Memory , 2017, 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[44] Giulio Malavolta,et al. Concurrency and Privacy with Payment-Channel Networks , 2017, IACR Cryptol. ePrint Arch..
[45] Gorka Irazoqui Apecechea,et al. CacheZoom: How SGX Amplifies The Power of Cache Attacks , 2017, CHES.
[46] Fan Zhang,et al. Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge , 2017, 2017 IEEE European Symposium on Security and Privacy (EuroS&P).
[47] Joseph Poon,et al. Plasma : Scalable Autonomous Smart Contracts , 2017 .
[48] Prateek Saxena,et al. Obscuro: A Bitcoin Mixer using Trusted Execution Environments , 2018, IACR Cryptol. ePrint Arch..
[49] Fan Zhang,et al. Tesseract: Real-Time Cryptocurrency Exchange using Trusted Hardware , 2017, IACR Cryptol. ePrint Arch..
[50] Stefan Dziembowski,et al. General State Channel Networks , 2018, CCS.
[51] Andrew Miller,et al. Pisa: Arbitration Outsourcing for State Channels , 2019, IACR Cryptol. ePrint Arch..
[52] Alexander Kmentt. 2017 , 2018, The Treaty Prohibiting Nuclear Weapons.
[53] Ethan Heilman,et al. Low-Resource Eclipse Attacks on Ethereum's Peer-to-Peer Network , 2020, IACR Cryptol. ePrint Arch..
[54] Conrad Burchert,et al. Scalable funding of Bitcoin micropayment channel networks , 2017, Royal Society Open Science.
[55] Dawn Xiaodong Song,et al. Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contract Execution , 2018, ArXiv.
[56] Iddo Bentov,et al. Paralysis Proofs : Secure Dynamic Access Structures for Cryptocurrencies and More , 2018 .
[57] Thomas F. Wenisch,et al. Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution , 2018, USENIX Security Symposium.
[58] Fan Zhang,et al. Paralysis Proofs: Safe Access-Structure Updates for Cryptocurrencies and More , 2018, IACR Cryptol. ePrint Arch..
[59] Marko Vukolic,et al. Hyperledger fabric: a distributed operating system for permissioned blockchains , 2018, EuroSys.
[60] Snowflake to Avalanche : A Novel Metastable Consensus Protocol Family for Cryptocurrencies Team Rocket , 2018 .
[61] Philipp Jovanovic,et al. OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[62] Patrick McCorry,et al. You Sank My Battleship! A Case Study to Evaluate State Channels as a Scaling Solution for Cryptocurrencies , 2019, Financial Cryptography Workshops.
[63] Kartik Nayak,et al. CCF: A Framework for Building Confidential Verifiable Replicated Services , 2019 .
[64] Pedro Moreno-Sanchez,et al. SoK: Off The Chain Transactions , 2019, IACR Cryptol. ePrint Arch..
[65] László Gulyás,et al. Topological Analysis of Bitcoin's Lightning Network , 2019, MARBLE.
[66] Fan Zhang,et al. Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts , 2018, 2019 IEEE European Symposium on Security and Privacy (EuroS&P).
[67] André Orléan. The Bitcoin community , 2019 .
[68] MultiChain Private Blockchain — White Paper , 2022 .