搜索结果: 1-15 共查到“密码学 Proof-of-work”相关记录15条 . 查询时间(0.14 秒)
Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies
Cryptocurrencies blockchain smart contracts
2019/7/4
The feasibility of bribing attacks on cryptocurrencies was first highlighted in 2016, with various new techniques and approaches having since been proposed. Recent reports of real world 51%51% attacks...
We introduce a new variant of decentralised, trustless, permissionless proof-of-work blockchain. The main novelty of the new variant is a multi-stage proof of work which is analogous to multi-stage pi...
During the last decade, the blockchain space has exploded with a plethora of new cryptocurrencies, covering a wide array of different features, performance and security characteristics. Nevertheless, ...
Flux: Revisting Near Blocks for Proof-of-Work Blockchains
Bitcoin proof-of-work weak blocks
2018/5/11
The term near or weak blocks describes Bitcoin blocks whose PoW does not meet the required target difficulty to be considered valid under the regular consensus rules of the protocol. Near blocks are g...
Proof-of-Work (PoW) schemes allow to limit access to resources or to share rewards for crypto-currency mining. The MTP-Argon2 PoW by Biryukov and Khovratovich is loosely based on the Argon2 memory-har...
Blockchain protocols such as bitcoin provide decentralized consensus mechanisms based on proof-of-work (PoW). In this work we introduce and instantiate a new primitive for blockchain protocols called ...
Time-Memory Tradeoff Attacks on the MTP Proof-of-Work Scheme
Proof-of-work Merkle Tree Proof
2017/6/2
Proof-of-work (PoW) schemes are cryptographic primitives with numerous applications, and in particular, they play a crucial role in maintaining consensus in cryptocurrency networks. Ideally, a cryptoc...
TwinsCoin: A Cryptocurrency via Proof-of-Work and Proof-of-Stake
cryptocurrency blockchain implementation
2017/3/9
We design and implement TwinsCoin, the first cryptocurrency based on a provably secure and scalable public blockchain design using both proof-of-work and proof-of-stake mechanisms. Different from the ...
On the Security and Performance of Proof of Work Blockchains
Blockchain Security Performance
2016/6/6
Proof of Work (PoW) powered blockchains currently account for more than 90% of the total market capitalization of existing digital currencies. Although the security provisions of Bitcoin have been tho...
Cuckoo Cycle: a memory bound graph-theoretic proof-of-work
proof-of-work graph-theory large random graphs
2016/1/26
We introduce the first graph-theoretic proof-of-work system, based on finding small cycles or
other structures in large random graphs. Such problems are trivially verifiable and arbitrarily
scalable...
Proof of Activity: Extending Bitcoin’s Proof of Work via Proof of Stake
Bitcoin Proof of Work Proof of Stake
2016/1/9
We propose a new protocol for a cryptocurrency, that builds upon the Bitcoin protocol by combining
its Proof of Work component with a Proof of Stake type of system. Our Proof of Activity (PoA) protoc...
Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay
Tor Proof of Work Crypto-currency
2016/1/5
In this paper we propose a new micropayments scheme which
can be used to reward Tor relay operators. Tor clients do not pay Tor
relays with electronic cash directly but submit proof of work shares w...
Asymmetric proof-of-work based on the Generalized Birthday problem
Bitcoin memory-hard asymmetric proof-of-work
2015/12/22
The proof-of-work is a central concept in modern cryptocurrencies, but the requirement for fast verification so far made it an easy prey for GPU-, ASIC-, and botnet-equipped users. The attempts to rel...
Exponential Memory-Bound Functions for Proof of Work Protocols
proof of work protocol memory-bound function anti-spam technique
2009/3/10
In Year 2005, Internet users were twice more likely to receive unsolicited electronic mes-
sages, known as spams, than regular emails. Proof of work protocols are designed to deter
such phenomena an...
An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol based on Merkle Trees Technical Report A/390/CRI
Solution-Verification Proof-of-Work Protocol Merkle Trees A/390/CRI
2008/5/22
Proof-of-work schemes are economic measures to deter
denial-of-service attacks: service requesters compute
moderately hard functions that are easy to check
by the provider.