Minting Mechanisms for Blockchain - or - Moving from Cryptoassets to Cryptocurrencies.

作者: Bernardo Magri , Giulio Malavolta , Nico Döttling , Sri Aravinda Krishnan Thyagarajan , Dominic Deuber

DOI:

关键词:

摘要:

参考文章(9)
Silvio Micali, Paul Feldman, Manuel Blum, Non-Interactive Zero-Knowledge and Its Applications (Extended Abstract) symposium on the theory of computing. pp. 103- 112 ,(1988)
Giuseppe Ateniese, Ilario Bonacina, Antonio Faonio, Nicola Galesi, Proofs of Space: When Space Is of the Essence international conference on security and cryptography. pp. 538- 557 ,(2014) , 10.1007/978-3-319-10879-7_31
Joseph Bonneau, Arvind Narayanan, Andrew Miller, Jeremy Clark, Joshua A. Kroll, Edward W. Felten, Mixcoin: Anonymity for Bitcoin with Accountable Mixes Financial Cryptography and Data Security. pp. 486- 504 ,(2014) , 10.1007/978-3-662-45472-5_31
Cynthia Dwork, Moni Naor, Pricing via Processing or Combatting Junk Mail international cryptology conference. pp. 139- 147 ,(1992) , 10.1007/3-540-48071-4_10
Mihir Bellare, Phillip Rogaway, Random oracles are practical: a paradigm for designing efficient protocols computer and communications security. pp. 62- 73 ,(1993) , 10.1145/168588.168596
Stefan Dziembowski, Sebastian Faust, Vladimir Kolmogorov, Krzysztof Pietrzak, Proofs of Space international cryptology conference. ,vol. 2013, pp. 585- 605 ,(2015) , 10.1007/978-3-662-48000-7_29
Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Jens Groth, Christophe Petit, Efficient Zero-Knowledge Arguments for Arithmetic Circuits in the Discrete Log Setting Advances in Cryptology – EUROCRYPT 2016. ,vol. 2016, pp. 327- 357 ,(2016) , 10.1007/978-3-662-49896-5_12
Miles Carlsten, Harry Kalodner, S. Matthew Weinberg, Arvind Narayanan, On the Instability of Bitcoin Without the Block Reward computer and communications security. pp. 154- 167 ,(2016) , 10.1145/2976749.2978408
Bernardo David, Peter Gaži, Aggelos Kiayias, Alexander Russell, Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain theory and application of cryptographic techniques. pp. 66- 98 ,(2018) , 10.1007/978-3-319-78375-8_3