Share This Author
Majority Is Not Enough: Bitcoin Mining Is Vulnerable
The Bitcoin cryptocurrency records its transactions in a public log called the blockchain, and conventional wisdom asserts that the mining protocol is incentive-compatible and secure against colluding minority groups.
Bitcoin-NG: A Scalable Blockchain Protocol
This paper implements Bitcoin-NG, a new blockchain protocol designed to scale, which is Byzantine fault tolerant, is robust to extreme churn, and shares the same trust model obviating qualitative changes to the ecosystem.
Extensibility safety and performance in the SPIN operating system
This paper describes the motivation, architecture and performance of SPIN, an extensible operating system. SPIN provides an extension infrastructure, together with a core set of extensible services,…
Meridian: a lightweight network location service without virtual coordinates
This paper introduces a lightweight, scalable and accurate framework, called Meridian, for performing node selection based on network location, which is scalable with logarithmic convergence when Internet latencies are modeled as a growth-constrained metric, a low-dimensional Euclidean metric, or a metric of low doubling dimension.
Merlin: A Language for Provisioning Network Resources
Overall, Merlin simplifies network administration by providing high-level abstractions for specifying network policies that provision network resources.
Octant: A Comprehensive Framework for the Geolocalization of Internet Hosts
Octant is a novel, comprehensive framework for determining the location of Internet hosts in the real world based solely on network measurements that can reason in the presence of uncertainty, enabling it to gracefully cope with aggressively derived constraints that may contain errors.
Majority is not enough
This work shows that the Bitcoin mining protocol is not incentive-compatible, and proposes a practical modification to the Bitcoin protocol that protects Bitcoin in the general case, and prohibits selfish mining by a coalition that command less than 1/4 of the resources.
On Scaling Decentralized Blockchains - (A Position Paper)
- Kyle Croman, Christian Decker, Roger Wattenhofer
- Computer ScienceFinancial Cryptography Workshops
- 22 February 2016
The results suggest that reparameterization of block size and intervals should be viewed only as a first increment toward achieving next-generation, high-load blockchain protocols, and major advances will additionally require a basic rethinking of technical approaches.
SHARP: a hybrid adaptive routing protocol for mobile ad hoc networks
This paper describes application-specific protocols built on top of SHARP for minimizing packet overhead, bounding loss rate, and controlling jitter, and shows that the resulting protocols outperform the purely proactive and purely reactive protocols across a wide range of network characteristics.
KARMA : A Secure Economic Framework for Peer-to-Peer Resource Sharing
A general economic framework for avoiding freeloaders in peer-to-peer systems that is resistant to malicious attempts by the resource provider, consumer, and a fraction of the members of the bank set.