A Survey on Blockchain Consensus with a Performance Comparison of PoW, PoS and Pure PoS

作者: Cristian Lepore , Michela Ceria , Andrea Visconti , Udai Pratap Rao , Kaushal Arvindbhai Shah

DOI: 10.3390/MATH8101782

关键词:

摘要: … The size of the committees is preselected by a multi-round procedure and may vary for each round of the BFT (as we defined in Section 5.4). Transactions are disseminated by gossip …

参考文章(41)
A. Nadeem, M.Y. Javed, A Performance Comparison of Data Encryption Algorithms international conference on information and communication technologies. pp. 84- 89 ,(2005) , 10.1109/ICICT.2005.1598556
M. Kazantzidis, M. Gerla, Sung-Ju Lee, Permissible throughput network feedback for adaptive multimedia in AODV MANETs international conference on communications. ,vol. 5, pp. 1352- 1356 ,(2001) , 10.1109/ICC.2001.937142
Ari Juels, Markus Jakobsson, Proofs of Work and Bread Pudding Protocols communications and multimedia security. pp. 258- 272 ,(1999)
Ralph C. Merkle, A Digital Signature Based on a Conventional Encryption Function international cryptology conference. pp. 369- 378 ,(1987) , 10.1007/3-540-48184-2_32
Ralph C. Merkle, One way hash functions and DES international cryptology conference. pp. 428- 446 ,(1989) , 10.1007/0-387-34805-0_40
Cynthia Dwork, Moni Naor, Pricing via Processing or Combatting Junk Mail international cryptology conference. pp. 139- 147 ,(1992) , 10.1007/3-540-48071-4_10
Eric Brewer, CAP twelve years later: How the "rules" have changed IEEE Computer. ,vol. 45, pp. 23- 29 ,(2012) , 10.1109/MC.2012.37
R.R. Jueneman, S.M. Matyas, C.H. Meyer, Message Authentication with Manipulation Detection Code ieee symposium on security and privacy. pp. 33- 33 ,(1983) , 10.1109/SP.1983.10005
André B. Bondi, Characteristics of scalability and their impact on performance workshop on software and performance. pp. 195- 203 ,(2000) , 10.1145/350391.350432