Analysis of blockchain protocol against static adversarial miners corrupted by long delay attackers
Bitcoin, which was initially introduced by Nakamoto, is the most disruptive and impactive cryptocurrency. The core Bitcoin technology is the so-called blockchain protocol. In recent years, several studies have focused on rigorous analyses of the security of Nakamoto’s blockchain protocol in an async...
Saved in:
Main Authors: | YUAN, Quan, WEI, Puwen, JIA, Keting, XUE, Haiyang |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2020
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/9182 https://ink.library.smu.edu.sg/context/sis_research/article/10187/viewcontent/s11432_019_9916_5.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
FAIRNESS AND SECURITY ON BLOCKCHAIN INCENTIVES
by: HUANG YUMING
Published: (2023) -
PIAS: Privacy-Preserving Incentive Announcement System based on Blockchain for Internet of Vehicles
by: ZHAN, Yonghua, et al.
Published: (2024) -
Optimal fee structure for efficient lightning networks
by: Heng, Alvin Jun Ren, et al.
Published: (2021) -
Traceable Monero: Anonymous cryptocurrency with enhanced accountability
by: LI, Yannan, et al.
Published: (2021) -
Proof-of-stake consensus mechanisms for future blockchain networks : fundamentals, applications and opportunities
by: Nguyen, Cong T., et al.
Published: (2019)