Corpus ID: 17945060

Distributed Cryptography Based on the Proofs of Work

@article{Andrychowicz2014DistributedCB,
  title={Distributed Cryptography Based on the Proofs of Work},
  author={Marcin Andrychowicz and Stefan Dziembowski},
  journal={IACR Cryptol. ePrint Arch.},
  year={2014},
  volume={2014},
  pages={796}
}
  • Marcin Andrychowicz, Stefan Dziembowski
  • Published 2014
  • Computer Science
  • IACR Cryptol. ePrint Arch.
  • Motivated by the recent success of Bitcoin we study the question of constructing distributed crypto- graphic protocols in a fully peer-to-peer scenario (without any trusted setup) under the assumption that the adver- sary has limited computing power. We propose a formal model for this scenario and then we construct the following protocols working in it: (i) a broadcast protocol secure under the assumption that the honest parties have computing power that is some non-negligible fraction of… CONTINUE READING
    23 Citations
    PoW-Based Distributed Cryptography with No Trusted Setup
    • 45
    • PDF
    Improvement on Bitcoin’s Verifiable Public Randomness with Semi-Trusted Delegates
    • 1
    Blockchain and Consensus from Proofs of Work without Random Oracles
    • 2
    • PDF
    Proofs of Work for Blockchain Protocols
    • 13
    • PDF
    Bootstrapping the Blockchain - Directly
    • 12
    • PDF
    Scalable Distributed Random Number Generation Based on Homomorphic Encryption
    • 3
    Consensus from Signatures of Work
    • 3
    • PDF
    Robust Synchronous P2P Primitives Using SGX Enclaves
    • 4
    • Highly Influenced
    • PDF

    References

    SHOWING 1-10 OF 58 REFERENCES
    Rational Protocol Design: Cryptography against Incentive-Driven Adversaries
    • 60
    • PDF
    Player Simulation and General Adversary Structures in Perfect Multiparty Computation
    • 220
    • PDF
    Multiparty computation secure against continual memory leakage
    • 44
    • PDF
    Leakage Resilient Secure Two-Party Computation
    • 12
    • PDF
    Rational secure computation and ideal mechanism design
    • 144
    • PDF
    Byzantine Agreement Given Partial Broadcast
    • 39
    • PDF
    Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft)
    • Lear Bahack
    • Computer Science
    • IACR Cryptol. ePrint Arch.
    • 2013
    • 90
    • PDF
    Leakage-Tolerant Interactive Protocols
    • 58
    • PDF