Analysis of the Blockchain Protocol in Asynchronous Networks
From MaRDI portal
Publication:5267421
Recommendations
- Algorithmic analysis of blockchain efficiency with communication delay
- A theory of transaction parallelism in blockchains
- A knowledge-based analysis of the blockchain protocol
- Modeling and analysis of block arrival times in the Bitcoin blockchain
- The Bitcoin Backbone Protocol: Analysis and Applications
- Blockchain in dynamic networks
- Asynchronous byzantine agreement protocols
- Distributed sequential consensus in networks: analysis of partially connected blockchains with uncertainty
- Transaction-confirmation time for bitcoin: a queueing analytical approach to blockchain mechanism
Cites work
- scientific article; zbMATH DE number 1690176 (Why is no real title available?)
- scientific article; zbMATH DE number 708802 (Why is no real title available?)
- scientific article; zbMATH DE number 2080852 (Why is no real title available?)
- Analysis of the evolution of peer-to-peer systems
- Byzantizing Paxos by refinement
- Chernoff-Hoeffding bounds for Markov chains: generalized and simplified
- Efficient algorithms for anonymous Byzantine agreement
- FruitChains: a fair blockchain
- How to use bitcoin to design fair protocols
- Majority is not enough: bitcoin mining is vulnerable
- Reaching Agreement in the Presence of Faults
- Secure Computation Without Authentication
- Secure high-rate transaction processing in bitcoin
- The Bitcoin Backbone Protocol: Analysis and Applications
Cited in
(72)- Completeness theorems for adaptively secure broadcast
- Practical settlement bounds for longest-chain consensus
- Compact identity-based signature and puncturable signature from SQISign
- Bitcoin as a Transaction Ledger: A Composable Treatment
- Universal composable transaction serialization with order fairness
- Building blocks of sharding blockchain systems: concepts, approaches, and open problems
- Byzantine generals in the permissionless setting
- Fair delivery of decentralised randomness beacon
- Formalizing delayed adaptive corruptions and the security of flooding networks
- Player-replaceability and forensic support are two sides of the same (crypto) coin
- Data flow dissemination in a network
- Ordering transactions with bounded unfairness: definitions, complexity and constructions
- Proof-of-work-based consensus in expected-constant time
- Permissionless clock synchronization with public setup
- Divide \& Scale: formalization and roadmap to robust sharding
- Round efficient Byzantine agreement from VDFs
- Hybrid consensus: efficient consensus in the permissionless model
- Pay to win: cheap, cross-chain bribing attacks on PoW cryptocurrencies
- Risk framework for bitcoin custody operation with the revault protocol
- SoK: algorithmic incentive manipulation attacks on permissionless PoW cryptocurrencies
- Ouroboros Praos: an adaptively-secure, semi-synchronous proof-of-stake blockchain
- On the bit security of cryptographic primitives
- Mining for privacy: how to bootstrap a snarky blockchain
- Publicly verifiable zero knowledge from (collapsing) blockchains
- Achieving almost all blockchain functionalities with polylogarithmic storage
- Permissionless consensus in the resource model
- Short paper: On the claims of weak block synchronization in Bitcoin
- SNACKs: leveraging proofs of sequential work for blockchain light clients
- Resource-restricted cryptography: revisiting MPC bounds in the proof-of-work era
- Decentralizing information technology: the advent of resource based systems
- Game theoretic notions of fairness in multi-party coin toss
- The Bitcoin Backbone Protocol: Analysis and Applications
- Correctness of Tendermint-Core Blockchains
- Minting mechanism for proof of stake blockchains
- Fair hierarchical secret sharing scheme based on smart contract
- How to extract useful randomness from unreliable sources
- Dynamic ad hoc clock synchronization
- Ouroboros: a provably secure proof-of-stake blockchain protocol
- The Bitcoin backbone protocol with chains of variable difficulty
- How to build time-lock encryption
- Proof-of-reputation blockchain with Nakamoto fallback
- Short Paper: Secure Offline Payments in Bitcoin
- Ofelimos: combinatorial optimization via proof-of-useful-work. A provably secure blockchain protocol
- A knowledge-based analysis of the blockchain protocol
- Encryption to the future. A paradigm for sending secret messages to future (anonymous) committees
- Algorand: a secure and efficient distributed ledger
- Afgjort: a partially synchronous finality layer for blockchains
- Brief announcement: Game theoretical framework for analyzing blockchains robustness
- Timed signatures and zero-knowledge proofs -- timestamping in the blockchain era
- Blockchain in dynamic networks
- Security of the blockchain against long delay attack
- \textsc{Tardigrade}: an atomic broadcast protocol for arbitrary network conditions
- Etherless Ethereum Tokens: simulating native tokens in Ethereum
- The impact of network delay on Nakamoto consensus mechanism
- Fluid MPC: secure multiparty computation with dynamic participants
- A rational protocol treatment of 51\% attacks
- Modeling and analysis of block arrival times in the Bitcoin blockchain
- Building quantum-one-way functions from block ciphers: Davies-Meyer and Merkle-Damgård constructions
- Practical provably secure flooding for blockchains
- The sleepy model of consensus
- FruitChains: a fair blockchain
- Monotonic Prefix Consistency in Distributed Systems
- Shielded computations in smart contracts overcoming forks
- Weight-based Nakamoto-style blockchains
- Blockchain CAP theorem allows user-dependent adaptivity and finality
- Instant block confirmation in the sleepy model
- Fraud and data availability proofs: detecting invalid blocks in light clients
- PoSAT: proof-of-work availability and unpredictability, without the work
- Bootstrapping the blockchain, with applications to consensus and fast PKI setup
- Dirac-based reduction techniques for quantitative analysis of discrete-time Markov models
- Transparent batchable time-lock puzzles and applications to Byzantine consensus
- Fast-to-finalize Nakamoto-like consensus
This page was built for publication: Analysis of the Blockchain Protocol in Asynchronous Networks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5267421)