메뉴 건너뛰기




Volumn 9216, Issue , 2015, Pages 379-399

PoW-based distributed cryptography with no trusted setup

Author keywords

[No Author keywords available]

Indexed keywords

ELECTRONIC MONEY;

EID: 84943402614     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-662-48000-7_19     Document Type: Conference Paper
Times cited : (59)

References (30)
  • 1
    • 84943376145 scopus 로고    scopus 로고
    • Distributed cryptography based on the proofs of work
    • report 2014/796
    • Andrychowicz, M., Dziembowski, S.: Distributed cryptography based on the proofs of work. Cryptology ePrint Archive, report 2014/796 (2014)
    • (2014) Cryptology Eprint Archive
    • Andrychowicz, M.1    Dziembowski, S.2
  • 3
    • 0021980820 scopus 로고
    • Trading group theory for randomness
    • Babai, L.: Trading group theory for randomness. In: STOC (1985)
    • (1985) STOC
    • Babai, L.1
  • 6
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: ACM CCS (1993)
    • (1993) ACM CCS
    • Bellare, M.1    Rogaway, P.2
  • 7
    • 84898960610 scopus 로고
    • Completeness theorems for noncryptographic fault-tolerant distributed computation
    • Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for noncryptographic fault-tolerant distributed computation. In: STOC (1988)
    • (1988) STOC
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 9
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • Canetti, R.: Universally composable security: a new paradigm for cryptographic protocols. In: FOCS (2001)
    • (2001) FOCS
    • Canetti, R.1
  • 10
    • 0036038991 scopus 로고    scopus 로고
    • Universally composable twoparty and multi-party secure computation
    • Canetti, R., Lindell, Y., Ostrovsky, R., Sahai, A.: Universally composable twoparty and multi-party secure computation. In: STOC (2002)
    • (2002) STOC
    • Canetti, R.1    Lindell, Y.2    Ostrovsky, R.3    Sahai, A.4
  • 11
    • 84957671573 scopus 로고
    • Multiparty unconditionally secure protocols (Extended abstract)
    • Chaum, D., Crépeau, C., Damgård, I.: Multiparty unconditionally secure protocols (extended abstract). In: STOC (1988)
    • (1988) STOC
    • Chaum, D.1    Crépeau, C.2    Damgård, I.3
  • 14
    • 0001683636 scopus 로고
    • Authenticated algorithms for byzantine agreement
    • Dolev, D., Strong, H.R.: Authenticated algorithms for byzantine agreement. SIAM J. Comput. 12(4), 656–666 (1983)
    • (1983) SIAM J. Comput , vol.12 , Issue.4 , pp. 656-666
    • Dolev, D.1    Strong, H.R.2
  • 15
    • 84947273682 scopus 로고    scopus 로고
    • The sybil attack
    • Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.), Springer, Heidelberg
    • Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)
    • (2002) IPTPS 2002. LNCS , vol.2429 , pp. 251-260
    • Douceur, J.R.1
  • 16
    • 84943235829 scopus 로고
    • Pricing via processing or combatting junk mail
    • Brickell, E.F. (ed.), Springer, Heidelberg
    • Dwork, C., Naor, M.: Pricing via processing or combatting junk mail. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 139–147. Springer, Heidelberg (1993)
    • (1993) CRYPTO 1992. LNCS , vol.740 , pp. 139-147
    • Dwork, C.1    Naor, M.2
  • 17
    • 33745136796 scopus 로고    scopus 로고
    • Pebbling and proofs of work
    • Shoup, V. (ed.), Springer, Heidelberg
    • Dwork, C., Naor, M., Wee, H.M.: Pebbling and proofs of work. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 37–54. Springer, Heidelberg (2005)
    • (2005) CRYPTO 2005. LNCS , vol.3621 , pp. 37-54
    • Dwork, C.1    Naor, M.2    Wee, H.M.3
  • 18
    • 33845223165 scopus 로고
    • A randomized protocol for signing contracts
    • Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. In: CRYPTO (1982)
    • (1982) CRYPTO
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 19
    • 84910683812 scopus 로고    scopus 로고
    • Majority is not enough: Bitcoin mining is vulnerable
    • Eyal, I., Sirer, E.G.: Majority is not enough: Bitcoin mining is vulnerable. In: Financial Cryptography (2014)
    • (2014) Financial Cryptography
    • Eyal, I.1    Sirer, E.G.2
  • 21
    • 0040597467 scopus 로고
    • Private coins versus public coins in interactive proof systems
    • Goldwasser, S., Sipser, M.: Private coins versus public coins in interactive proof systems. In: STOC (1986)
    • (1986) STOC
    • Goldwasser, S.1    Sipser, M.2
  • 22
    • 84873944088 scopus 로고    scopus 로고
    • Universally composable synchronous computation
    • Sahai, A. (ed.), Springer, Heidelberg
    • Katz, J., Maurer, U., Tackmann, B., Zikas, V.: Universally composable synchronous computation. In: Sahai, A. (ed.) TCC 2013. LNCS, vol. 7785, pp. 477–498. Springer, Heidelberg (2013)
    • (2013) TCC 2013. LNCS , vol.7785 , pp. 477-498
    • Katz, J.1    Maurer, U.2    Tackmann, B.3    Zikas, V.4
  • 23
    • 84943379751 scopus 로고    scopus 로고
    • Pseudonymous secure computation from time-lock puzzles
    • report 2014/857
    • Katz, J., Miller, A., Shi, E.: Pseudonymous secure computation from time-lock puzzles. Cryptology ePrint Archive, report 2014/857, 2014
    • (2014) Cryptology Eprint Archive
    • Katz, J.1    Miller, A.2    Shi, E.3
  • 25
    • 77952345661 scopus 로고    scopus 로고
    • Split-ballot voting: Everlasting privacy with distributed trust
    • Moran, T., Naor, M.: Split-ballot voting: everlasting privacy with distributed trust. In: ACM CCS (2007)
    • (2007) ACM CCS
    • Moran, T.1    Naor, M.2
  • 27
    • 0020829007 scopus 로고
    • Transaction protection by beacons
    • Rabin, M.O.: Transaction protection by beacons. J. Comput. Syst. Sci. 27(2), 256–267 (1983)
    • (1983) J. Comput. Syst. Sci , vol.27 , Issue.2 , pp. 256-267
    • Rabin, M.O.1
  • 30
    • 79961186203 scopus 로고
    • Protocols for secure computations (Extended abstract)
    • Yao, A.C-C.: Protocols for secure computations (extended abstract). In: FOCS (1982)
    • (1982) FOCS
    • Yao, A.C.-C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.