-
1
-
-
84910660043
-
Secure multiparty computations on bitcoin
-
Andrychowicz, M., Dziembowski, S., Malinowski, D., Mazurek, L.: Secure multiparty computations on bitcoin. IEEE Security and Privacy (2014)
-
(2014)
IEEE Security and Privacy
-
-
Andrychowicz, M.1
Dziembowski, S.2
Malinowski, D.3
Mazurek, L.4
-
2
-
-
77956586366
-
-
Technical Report YALEU/DCS/TR-1332, Yale University Department of Computer Science
-
Aspnes, J., Jackson, C., Krishnamurthy, A.: Exposing computationally-challenged Byzantine impostors. Technical Report YALEU/DCS/TR-1332, Yale University Department of Computer Science (July 2005)
-
(2005)
Exposing Computationally-Challenged Byzantine Impostors
-
-
Aspnes, J.1
Jackson, C.2
Krishnamurthy, A.3
-
3
-
-
84863512336
-
On bitcoin and red balloons
-
Faltings, B., Leyton-Brown, K., Ipeirotis, P. (eds.)
-
Babaioff, M., Dobzinski, S., Oren, S., Zohar, A.: On bitcoin and red balloons. In: Faltings, B., Leyton-Brown, K., Ipeirotis, P. (eds.) EC, pp. 56–73. ACM (2012)
-
(2012)
EC
, pp. 56-73
-
-
Babaioff, M.1
Dobzinski, S.2
Oren, S.3
Zohar, A.4
-
4
-
-
21644435024
-
-
Back, A.: Hashcash (1997). http://www.cypherspace.org/hashcash
-
(1997)
Hashcash
-
-
Back, A.1
-
5
-
-
80053053264
-
Secure computation without authentication
-
Barak, B., Canetti, R., Lindell, Y., Pass, R., Rabin, T.: Secure computation without authentication. J. Cryptology 24(4), 720–760 (2011)
-
(2011)
J. Cryptology
, vol.24
, Issue.4
, pp. 720-760
-
-
Barak, B.1
Canetti, R.2
Lindell, Y.3
Pass, R.4
Rabin, T.5
-
6
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
Fairfax, Virginia, USA, November 3–5
-
Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: CCS 1993, Proceedings of the 1st ACM Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 3–5, pp. 62–73 (1993)
-
(1993)
CCS 1993, Proceedings of the 1St ACM Conference on Computer and Communications Security
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
7
-
-
0020976844
-
Another advantage of free choice: Completely asynchronous agreement protocols (Extended abstract)
-
Probert, R.L., Lynch, N.A., Santoro, N. (eds.)
-
Ben-Or, M.: Another advantage of free choice: Completely asynchronous agreement protocols (extended abstract). In: Probert, R.L., Lynch, N.A., Santoro, N. (eds.) PODC, pp. 27–30. ACM (1983)
-
(1983)
PODC
, pp. 27-30
-
-
Ben-Or, M.1
-
8
-
-
84905400056
-
Zerocash: Decentralized anonymous payments from bitcoin
-
Ben-Sasson, E., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E., Virza, M.: Zerocash: Decentralized anonymous payments from bitcoin. IACR Cryptology ePrint Archive 2014, 349 (2014)
-
(2014)
IACR Cryptology Eprint Archive
, vol.2014
, pp. 349
-
-
Ben-Sasson, E.1
Chiesa, A.2
Garman, C.3
Green, M.4
Miers, I.5
Tromer, E.6
Virza, M.7
-
9
-
-
84905409094
-
How to Use Bitcoin to Design Fair Protocols
-
In: Garay, J.A., Gennaro, R. (eds.), Springer, Heidelberg
-
Bentov, I., Kumaresan, R.: How to Use Bitcoin to Design Fair Protocols. In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014, Part II. LNCS, vol. 8617, pp. 421–439. Springer, Heidelberg (2014)
-
(2014)
CRYPTO 2014, Part II. LNCS
, vol.8617
, pp. 421-439
-
-
Bentov, I.1
Kumaresan, R.2
-
10
-
-
84910657489
-
How to use bitcoin to incentivize correct computations
-
Bentov, I., Kumaresan, R.: How to use bitcoin to incentivize correct computations. ACM CCS 2014, (2014)
-
(2014)
ACM CCS
, pp. 2014
-
-
Bentov, I.1
Kumaresan, R.2
-
11
-
-
0027868957
-
Randomized distributed agreement revisited
-
Toulouse, France, June 22–24, IEEE Computer Society
-
Berman, P., Garay, J.A.: Randomized distributed agreement revisited. In: Digest of Papers: FTCS-23, The Twenty-Third Annual International Symposium on Fault- Tolerant Computing, Toulouse, France, June 22–24, pp. 412–419. IEEE Computer Society (1993)
-
(1993)
Digest of Papers: FTCS-23, the Twenty-Third Annual International Symposium on Fault- Tolerant Computing
, pp. 412-419
-
-
Berman, P.1
Garay, J.A.2
-
12
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
Canetti, R.: Security and composition of multiparty cryptographic protocols. J. Cryptology 13(1), 143–202 (2000)
-
(2000)
J. Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
14
-
-
84942644619
-
-
Cunicula. Why doesn’t bitcoin use a tiebreaking rule when comparing chains of equal length? (2013)
-
Cunicula. Why doesn’t bitcoin use a tiebreaking rule when comparing chains of equal length? (2013) https://bitcointalk.org/index.php?topic=355644.0
-
-
-
-
15
-
-
84893243047
-
Information propagation in the bitcoin network
-
Decker, C., Wattenhofer, R.: Information propagation in the bitcoin network. In: P2P, pp. 1–10. IEEE (2013)
-
(2013)
P2P
, pp. 1-10
-
-
Decker, C.1
Wattenhofer, R.2
-
16
-
-
84943235829
-
Pricing via Processing or Combatting Junk Mail
-
In: Brickell, E.F. (ed.), Springer, Heidelberg
-
Dwork, C., Naor, M.: Pricing via Processing or Combatting Junk Mail. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 139–147. Springer, Heidelberg (1993)
-
(1993)
CRYPTO 1992. LNCS
, vol.740
, pp. 139-147
-
-
Dwork, C.1
Naor, M.2
-
17
-
-
84910683812
-
Majority is not enough: Bitcoin mining is vulnerable
-
Eyal, I., Sirer, E.G.: Majority is not enough: Bitcoin mining is vulnerable. In: Financial Cryptography (2014)
-
(2014)
Financial Cryptography
-
-
Eyal, I.1
Sirer, E.G.2
-
18
-
-
0031210863
-
An optimal probabilistic protocol for synchronous byzantine agreement
-
Feldman, P., Micali, S.: An optimal probabilistic protocol for synchronous byzantine agreement. SIAM J. Comput. 26(4), 873–933 (1997)
-
(1997)
SIAM J. Comput
, vol.26
, Issue.4
, pp. 873-933
-
-
Feldman, P.1
Micali, S.2
-
19
-
-
0022045868
-
Impossibility of distributed consensus with one faulty process
-
Fischer, M.J., Lynch, N.A., Paterson, M.: Impossibility of distributed consensus with one faulty process. J. ACM 32(2), 374–382 (1985)
-
(1985)
J. ACM
, vol.32
, Issue.2
, pp. 374-382
-
-
Fischer, M.J.1
Lynch, N.A.2
Paterson, M.3
-
20
-
-
1142293099
-
Efficient player-optimal protocols for strong and differential consensus
-
Borowsky, E., Rajsbaum, S. (eds.)
-
Fitzi, M., Garay, J.A.: Efficient player-optimal protocols for strong and differential consensus. In: Borowsky, E., Rajsbaum, S. (eds.) PODC, pp. 211–220. ACM (2003)
-
(2003)
PODC
, pp. 211-220
-
-
Fitzi, M.1
Garay, J.A.2
-
21
-
-
79959901514
-
Adaptively secure broadcast, revisited
-
Gavoille, C., Fraigniaud, P., (eds.), San Jose, CA, USA, June 6–8
-
Garay, J.A., Katz, J., Kumaresan, R., Zhou, H.: Adaptively secure broadcast, revisited. In: Gavoille, C., Fraigniaud, P., (eds.) Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing, PODC 2011, San Jose, CA, USA, June 6–8, pp. 179–186. ACM (2011)
-
(2011)
Proceedings of the 30Th Annual ACM Symposium on Principles of Distributed Computing, PODC 2011
, pp. 179-186
-
-
Garay, J.A.1
Katz, J.2
Kumaresan, R.3
Zhou, H.4
-
22
-
-
84978170294
-
The Bitcoin Backbone Protocol: Analysis and Applications
-
Garay, J.A., Kiayias, A., Leonardos, N.: The Bitcoin Backbone Protocol: Analysis and Applications. IACR Cryptology ePrint Archive 2014, 765 (2014)
-
(2014)
IACR Cryptology Eprint Archive
, vol.2014
, pp. 765
-
-
Garay, J.A.1
Kiayias, A.2
Leonardos, N.3
-
23
-
-
77954642421
-
Adaptively Secure Broadcast
-
In: Gilbert, H. (ed.), Springer, Heidelberg
-
Hirt, M., Zikas, V.: Adaptively Secure Broadcast. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 466–485. Springer, Heidelberg (2010)
-
(2010)
EUROCRYPT 2010. LNCS
, vol.6110
, pp. 466-485
-
-
Hirt, M.1
Zikas, V.2
-
24
-
-
84861587712
-
Client puzzles: A cryptographic countermeasure against connection depletion attacks
-
Juels, A., Brainard, J.G.: Client puzzles: A cryptographic countermeasure against connection depletion attacks. In: NDSS. The Internet Society (1999)
-
(1999)
NDSS. the Internet Society
-
-
Juels, A.1
Brainard, J.G.2
-
25
-
-
58149153139
-
On expected constant-round protocols for byzantine agreement
-
Katz, J., Koo, C.-Y.: On expected constant-round protocols for byzantine agreement. Journal of Computer and System Sciences 75(2), 91–112 (2009)
-
(2009)
Journal of Computer and System Sciences
, vol.75
, Issue.2
, pp. 91-112
-
-
Katz, J.1
Koo, C.-Y.2
-
27
-
-
84976699318
-
The byzantine generals problem
-
Lamport, L., Shostak, R.E., Pease, M.C.: The byzantine generals problem. ACM Trans. Program. Lang. Syst. 4(3), 382–401 (1982)
-
(1982)
ACM Trans. Program. Lang. Syst
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.E.2
Pease, M.C.3
-
32
-
-
0028375687
-
Distributed consensus revisited
-
Neiger, G.: Distributed consensus revisited. Inf. Process. Lett. 49(4), 195–201 (1994)
-
(1994)
Inf. Process. Lett
, vol.49
, Issue.4
, pp. 195-201
-
-
Neiger, G.1
-
33
-
-
33646426627
-
Agreement Among Unacquainted Byzantine Generals
-
In: Fraigniaud, P. (ed.), Springer, Heidelberg
-
Okun, M.: Agreement Among Unacquainted Byzantine Generals. In: Fraigniaud, P. (ed.) DISC 2005. LNCS, vol. 3724, pp. 499–500. Springer, Heidelberg (2005)
-
(2005)
DISC 2005. LNCS
, vol.3724
, pp. 499-500
-
-
Okun, M.1
-
35
-
-
37749030751
-
Efficient algorithms for anonymous byzantine agreement.
-
Okun, M., Barak, A.: Efficient algorithms for anonymous byzantine agreement. Theor. Comp. Sys. 42(2), 222–238 (2008)
-
(2008)
Theor. Comp. Sys
, vol.42
, Issue.2
, pp. 222-238
-
-
Okun, M.1
Barak, A.2
-
36
-
-
84976810569
-
Reaching agreement in the presence of faults
-
Pease, M.C., Shostak, R.E., Lamport, L.: Reaching agreement in the presence of faults. J. ACM 27(2), 228–234 (1980)
-
(1980)
J. ACM
, vol.27
, Issue.2
, pp. 228-234
-
-
Pease, M.C.1
Shostak, R.E.2
Lamport, L.3
-
37
-
-
0020881178
-
Randomized byzantine generals
-
IEEE Computer Society
-
Rabin, M.O.: Randomized byzantine generals. In: FOCS, pp. 403–409. IEEE Computer Society (1983)
-
(1983)
FOCS
, pp. 403-409
-
-
Rabin, M.O.1
-
38
-
-
0010602889
-
-
Technical report, Cambridge, MA, USA
-
Rivest, R.L., Shamir, A., Wagner, D.A.: Time-lock puzzles and timed-release crypto. Technical report, Cambridge, MA, USA (1996)
-
(1996)
Time-Lock Puzzles and Timed-Release Crypto
-
-
Rivest, R.L.1
Shamir, A.2
Wagner, D.A.3
-
39
-
-
84920743145
-
Accelerating bitcoin’s transaction processing. Fast money grows on trees, not chains
-
Sompolinsky, Y., Zohar, A.: Accelerating bitcoin’s transaction processing. fast money grows on trees, not chains. IACR Cryptology ePrint Archive, 2013:881 (2013)
-
(2013)
IACR Cryptology Eprint Archive
, vol.2013
, pp. 881
-
-
Sompolinsky, Y.1
Zohar, A.2
|