暂无分享,去创建一个
[1] Ran Canetti,et al. Practical delegation of computation using multiple servers , 2011, CCS '11.
[2] Ran Canetti,et al. Refereed delegation of computation , 2013, Inf. Comput..
[3] Eli Ben-Sasson,et al. SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge , 2013, CRYPTO.
[4] Joshua A. Kroll,et al. The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries , 2013 .
[5] Nir Bitansky,et al. Indistinguishability Obfuscation vs. Auxiliary-Input Extractable Functions: One Must Fall , 2013, IACR Cryptol. ePrint Arch..
[6] M. Frans Kaashoek,et al. VerSum: Verifiable Computations over Large Public Logs , 2014, CCS.
[7] Elaine Shi,et al. Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions , 2015, CCS.
[8] Jason Teutsch,et al. Demystifying Incentives in the Consensus Computer , 2015, CCS.
[9] Andrew J. Blumberg,et al. Verifying computations without reexecuting them , 2015, Commun. ACM.
[10] Sanjay Jain,et al. When Cryptocurrencies Mine Their Own Business , 2016, Financial Cryptography.
[11] Christian Decker,et al. Bitcoin meets strong consistency , 2014, ICDCN.
[12] Silvio Micali,et al. ALGORAND: The Efficient and Democratic Ledger , 2016, ArXiv.
[13] Sanjay Jain,et al. How to verify computation with a rational network , 2016, ArXiv.
[14] Yoad Lewenberg,et al. SPECTRE: A Fast and Scalable Cryptocurrency Protocol , 2016, IACR Cryptol. ePrint Arch..
[15] Elaine Shi,et al. On Scaling Decentralized Blockchains - (A Position Paper) , 2016, Financial Cryptography Workshops.
[16] Prateek Saxena,et al. A Secure Sharding Protocol For Open Blockchains , 2016, CCS.
[17] Kartik Nayak,et al. Solidus: An Incentive-compatible Cryptocurrency Based on Permissionless Byzantine Consensus , 2016, ArXiv.
[18] Emin Gün Sirer,et al. Bitcoin-NG: A Scalable Blockchain Protocol , 2015, NSDI.
[19] Elaine Shi,et al. The Honey Badger of BFT Protocols , 2016, CCS.
[20] Bryan Ford,et al. Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing , 2016, USENIX Security Symposium.
[21] Elaine Shi,et al. Hybrid Consensus: Efficient Consensus in the Permissionless Model , 2016, DISC.
[22] Jason Teutsch,et al. Smart Contracts Make Bitcoin Mining Pools Vulnerable , 2017, Financial Cryptography Workshops.
[23] Christian Reitwießner. zkSNARKs in a Nutshell unicode , 2017 .
[24] Alon Zakai,et al. Bringing the web up to speed with WebAssembly , 2017, PLDI.