Bitcoin-NG: a scalable blockchain protocol

作者: Emin Gün Sirer , Adem Efe Gencer , Ittay Eyal , Robbert Van Renesse

DOI:

关键词:

摘要: … In addition to Bitcoin-NG, we introduce several novel metrics of interest in quantifying … Bitcoin-NG does not introduce a new vulnerability to selfish mining strategies, and so Bitcoin-NG is …

参考文章(32)
Fred B. Schneider, Implementing fault-tolerant services using the state machine approach: a tutorial ACM Computing Surveys. ,vol. 22, pp. 299- 319 ,(1990) , 10.1145/98163.98167
Pieter Wuille, Andrew Miller, Gregory Maxwell, Andrew Poelstra, Matt Corallo, Mark Friedenbach, Luke Dashjr, Jorge Timón, Adam Back, Enabling Blockchain Innovations with Pegged Sidechains ,(2014)
Edward W. Felten, Joshua A. Kroll, Ian C. Davey, The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries ,(2013)
Andrew Miller, Rob Jansen, Shadow-Bitcoin: scalable simulation via direct execution of multi-threaded applications CSET'15 Proceedings of the 8th USENIX Conference on Cyber Security Experimentation and Test. pp. 7- 7 ,(2015)
Yoram Bachrach, Jeffrey S. Rosenschein, Aviv Zohar, Yoad Lewenberg, Yonatan Sompolinsky, Bitcoin Mining Pools: A Cooperative Game Theoretic Analysis adaptive agents and multi-agents systems. pp. 919- 927 ,(2015) , 10.5555/2772879.2773270
Christian Decker, Roger Wattenhofer, A Fast and Scalable Payment Network with Bitcoin Duplex Micropayment Channels international symposium on stabilization safety and security of distributed systems. pp. 3- 18 ,(2015) , 10.1007/978-3-319-21741-3_1
Yoad Lewenberg, Yonatan Sompolinsky, Aviv Zohar, Inclusive Block Chain Protocols financial cryptography. pp. 528- 547 ,(2015) , 10.1007/978-3-662-47854-7_33
Kartik Nayak, Srijan Kumar, Andrew Miller, Elaine Shi, Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack ieee european symposium on security and privacy. pp. 305- 320 ,(2016) , 10.1109/EUROSP.2016.32
Mohammad Hajiabadi, Bruce M. Kapron, Venkatesh Srinivasan, On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes public key cryptography. ,vol. 2015, pp. 129- 158 ,(2016) , 10.1007/978-3-662-49387-8_6
Yonatan Sompolinsky, Aviv Zohar, Secure High-Rate Transaction Processing in Bitcoin financial cryptography. pp. 507- 527 ,(2015) , 10.1007/978-3-662-47854-7_32