Fraud and data availability proofs: detecting invalid blocks in light clients
From MaRDI portal
Publication:2147248
DOI10.1007/978-3-662-64331-0_15zbMATH Open1493.91148OpenAlexW3210283590MaRDI QIDQ2147248FDOQ2147248
Authors: Mustafa Al-Bassam, Alberto Sonnino, Vitalik Buterin, Ismail Khoffi
Publication date: 22 June 2022
Full work available at URL: https://doi.org/10.1007/978-3-662-64331-0_15
Recommendations
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Actuarial science and mathematical finance (91G99)
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Impossibility of distributed consensus with one faulty process
- Algebraic-geometric codes and multidimensional cyclic codes: a unified theory and algorithms for decoding using Grobner bases
- Title not available (Why is that?)
- New multilevel codes over GF(q)
- The fast decoding of Reed-Solomon codes using Fermat theoretic transforms and continued fractions
- Analysis of the Blockchain Protocol in Asynchronous Networks
- Ouroboros: a provably secure proof-of-stake blockchain protocol
- Asymptotic Enumeration Methods for Analyzing LDPC Codes
- Coded Merkle tree: solving data availability attacks in blockchains
Cited In (9)
- Cryptoeconomic security for data availability committees
- Proof of necessary work: succinct state verification with fairness guarantees
- Proof of availability and retrieval in a modular blockchain architecture
- Coded Merkle tree: solving data availability attacks in blockchains
- Plumo: an ultralight blockchain client
- SoK: blockchain light clients
- SNACKs: leveraging proofs of sequential work for blockchain light clients
- Asymptotically optimal message dissemination with applications to blockchains
- FRIDA: data availability sampling from FRI
Uses Software
This page was built for publication: Fraud and data availability proofs: detecting invalid blocks in light clients
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2147248)