Bitcoin as a Transaction Ledger: A Composable Treatment
暂无分享,去创建一个
Ueli Maurer | Christian Badertscher | Daniel Tschudi | Vassilis Zikas | U. Maurer | Vassilis Zikas | Christian Badertscher | Daniel Tschudi
[1] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[2] Michael O. Rabin,et al. Randomized byzantine generals , 1983, 24th Annual Symposium on Foundations of Computer Science (sfcs 1983).
[3] Leslie Lamport,et al. The part-time parliament , 1998, TOCS.
[4] Ran Canetti,et al. Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.
[5] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[6] Leslie Lamport,et al. Paxos Made Simple, Fast, and Byzantine , 2002, OPODIS.
[7] Michael Backes,et al. On fairness in simulatability-based cryptographic systems , 2005, FMSE '05.
[8] Ran Canetti,et al. Universally Composable Security with Global Setup , 2007, TCC.
[9] Alessandro Panconesi,et al. Concentration of Measure for the Analysis of Randomized Algorithms , 2009 .
[10] Aviv Zohar,et al. On bitcoin and red balloons , 2012, EC '12.
[11] Mike Rosulek. Must You Know the Code of f to Securely Compute f? , 2012, CRYPTO.
[12] Matthew Green,et al. Zerocoin: Anonymous Distributed E-Cash from Bitcoin , 2013, 2013 IEEE Symposium on Security and Privacy.
[13] Ueli Maurer,et al. Universally Composable Synchronous Computation , 2013, TCC.
[14] Iddo Bentov,et al. How to Use Bitcoin to Incentivize Correct Computations , 2014, CCS.
[15] Eli Ben-Sasson,et al. Zerocash: Decentralized Anonymous Payments from Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.
[16] Marcin Andrychowicz,et al. Secure Multiparty Computations on Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.
[17] Marcin Andrychowicz,et al. Fair Two-Party Computations via Bitcoin Deposits , 2014, Financial Cryptography Workshops.
[18] Iddo Bentov,et al. How to Use Bitcoin to Design Fair Protocols , 2014, CRYPTO.
[19] Iddo Bentov,et al. How to Use Bitcoin to Play Decentralized Poker , 2015, CCS.
[20] Vitalik Buterin. A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .
[21] Marcin Andrychowicz,et al. PoW-Based Distributed Cryptography with No Trusted Setup , 2015, CRYPTO.
[22] Ittay Eyal,et al. The Miner's Dilemma , 2014, 2015 IEEE Symposium on Security and Privacy.
[23] Aviv Zohar,et al. Secure High-Rate Transaction Processing in Bitcoin , 2015, Financial Cryptography.
[24] Aggelos Kiayias,et al. The Bitcoin Backbone Protocol: Analysis and Applications , 2015, EUROCRYPT.
[25] Aviv Zohar. Bitcoin , 2015, Commun. ACM.
[26] Iddo Bentov,et al. Amortizing Secure Computation with Penalties , 2016, CCS.
[27] Abhi Shelat,et al. Analysis of the Blockchain Protocol in Asynchronous Networks , 2017, EUROCRYPT.
[28] Martin Hirt,et al. Constant-Round Asynchronous Multi-Party Computation Based on One-Way Functions , 2016, ASIACRYPT.
[29] Elaine Shi,et al. FruitChains: A Fair Blockchain , 2017, IACR Cryptol. ePrint Arch..
[30] Aggelos Kiayias,et al. Fair and Robust Multi-party Computation Using a Global Transaction Ledger , 2016, EUROCRYPT.
[31] Vinod Vaikuntanathan,et al. Improvements to Secure Computation with Penalties , 2016, CCS.
[32] Aggelos Kiayias,et al. Blockchain Mining Games , 2016, EC.
[33] Ran Canetti,et al. Universally Composable Authentication and Key-Exchange with Global PKI , 2016, Public Key Cryptography.
[34] Ledger. Edinburgh Research Explorer Fair and Robust Multi-party Computation Using a Global Transaction Ledger , 2016 .
[35] Aggelos Kiayias,et al. The Bitcoin Backbone Protocol with Chains of Variable Difficulty , 2017, CRYPTO.
[36] Emin Gün Sirer,et al. Majority is not enough , 2013, Financial Cryptography.