The Bitcoin Backbone Protocol: Analysis and Applications

From MaRDI portal
Publication:2948386

DOI10.1007/978-3-662-46803-6_10zbMath1371.94636OpenAlexW851575271MaRDI QIDQ2948386

Nikos Leonardos, Aggelos Kiayias, Juan A. Garay

Publication date: 30 September 2015

Published in: Advances in Cryptology - EUROCRYPT 2015 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-46803-6_10




Related Items (78)

The consensus number of a cryptocurrencyMonotonic Prefix Consistency in Distributed SystemsFluid MPC: secure multiparty computation with dynamic participantsA rational protocol treatment of 51\% attacksGame theoretic notions of fairness in multi-party coin tossSTRATEGIC ALLIANCE FOR BLOCKCHAIN GOVERNANCE GAMEBuilding quantum-one-way functions from block ciphers: Davies-Meyer and Merkle-Damgård constructionsShielded computations in smart contracts overcoming forksMining for privacy: how to bootstrap a snarky blockchainWeight-based Nakamoto-style blockchainsDesigning Proof of Human-Work Puzzles for Cryptocurrency and BeyondBlockchain CAP theorem allows user-dependent adaptivity and finalityPoSAT: proof-of-work availability and unpredictability, without the work\textsc{Brick}: asynchronous incentive-compatible payment channelsEvolutionary equilibrium analysis for decision on block size in blockchain systemsSurvey of information securityProof-of-reputation blockchain with Nakamoto fallbackOn the bit security of cryptographic primitivesOperations research in the blockchain technologyA search-theoretic model of double-spending fraudRisk framework for bitcoin custody operation with the revault protocolSoft power: upgrading chain macroeconomic policy through soft forksSoK: algorithmic incentive manipulation attacks on permissionless PoW cryptocurrenciesPay to win: cheap, cross-chain bribing attacks on PoW cryptocurrenciesResource Burning for Permissionless Systems (Invited Paper)Be aware of your leaders\textsc{Hide} \& \textsc{Seek}: privacy-preserving rebalancing on payment channel networksThe availability-accountability dilemma and its resolution via accountability gadgetsPermissionless consensus in the resource modelAchieving almost all blockchain functionalities with polylogarithmic storageA Novel Two-Stage Game Model for Pricing Cloud/ Fog Computing Resource in Blockchain SystemsPFLM: privacy-preserving federated learning with membership proofTransparent batchable time-lock puzzles and applications to Byzantine consensusIndistinguishable Proofs of Work or KnowledgeMulti-stage proof-of-works: properties and vulnerabilitiesTowards reducing delegation overhead in replication-based verification: an incentive-compatible rational delegation computing schemeOfelimos: combinatorial optimization via proof-of-useful-work. A provably secure blockchain protocolFormalizing delayed adaptive corruptions and the security of flooding networksPractical provably secure flooding for blockchainsSNACKs: leveraging proofs of sequential work for blockchain light clientsEncryption to the future. A paradigm for sending secret messages to future (anonymous) committeesHigh Performance, Low Energy, and Trustworthy Blockchains Using SatellitesMarket Equilibria and Risk Diversification in Blockchain Mining EconomiesGriefing Factors and Evolutionary In-Stabilities in Blockchain Mining GamesBetter incentives for proof-of-work\textsc{Tardigrade}: an atomic broadcast protocol for arbitrary network conditionsOn elapsed time consensus protocolsBuilding blocks of sharding blockchain systems: concepts, approaches, and open problemsDecentralizing information technology: the advent of resource based systemsShort Paper: Secure Offline Payments in BitcoinPermissionless clock synchronization with public setup(Public) verifiability for composable protocols without adaptivity or zero-knowledgeCompleteness theorems for adaptively secure broadcastPractical settlement bounds for longest-chain consensusDivide \& Scale: formalization and roadmap to robust shardingCommunication complexity of Byzantine agreement, revisitedALBATROSS: publicly AttestabLe BATched Randomness based On Secret SharingEtherless Ethereum Tokens: simulating native tokens in EthereumThe impact of network delay on Nakamoto consensus mechanismPublish or Perish: A Backward-Compatible Defense Against Selfish Mining in BitcoinSecurity of the blockchain against long delay attackUnnamed ItemCompact Storage of Superblocks for NIPoPoW ApplicationsOceanic Games: Centralization Risks and Incentives in Blockchain MiningMinting mechanism for proof of stake blockchainsTimed signatures and zero-knowledge proofs -- timestamping in the blockchain eraMalleability of the blockchain's entropyHow to build time-lock encryptionHow to extract useful randomness from unreliable sourcesDynamic ad hoc clock synchronizationCorrectness of Tendermint-Core BlockchainsPublicly verifiable zero knowledge from (collapsing) blockchainsRecent Results on Fault-Tolerant Consensus in Message-Passing NetworksCArrency: an energy-efficient proof-of-work scheme for crypto-currenciesAbout blockchain interoperabilityDecision on block size in blockchain systems by evolutionary equilibrium analysisAnalysis of the Blockchain Protocol in Asynchronous NetworksResource-restricted cryptography: revisiting MPC bounds in the proof-of-work era




This page was built for publication: The Bitcoin Backbone Protocol: Analysis and Applications