• Corpus ID: 4836820

ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER

@inproceedings{Wood2014ETHEREUMAS,
  title={ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER},
  author={Daniel Davis Wood},
  year={2014}
}
The blockchain paradigm when coupled with cryptographically-secured transactions has demonstrated its utility through a number of projects, with Bitcoin being one of the most notable ones. Each such project can be seen as a simple application on a decentralised, but singleton, compute resource. We can call this paradigm a transactional singleton machine with shared-state. Ethereum implements this paradigm in a generalised manner. Furthermore it provides a plurality of such resources, each with… 

Ethereum: State of Knowledge and Research Perspectives

Ethereum is a major blockchain-based platform for smart contracts – Turing complete programs that are executed in a decentralized network and usually manipulate digital units of value. A peer-to-peer

A Comparative Analysis of Current Cryptocurrencies

This paper focuses on three of the most diffused platforms, i.e. Bitcoin, Ripple, and Ethereum, and provides a comparative analysis of their most important features such as the architecture, the scripting language, the economic and security properties.

A privacy-preserving decentralized storage with payments based on a blockchain

A second proposal to realize smart contracts in a blockchain setting is called Hawk, where financial transactions are not stored in clear on the blockchain but instead in an “encrypted” form, informally speaking.

Coda: Decentralized Cryptocurrency at Scale

Coda, a payment system (cryptocurrency) using a succinct blockchain, is introduced, a replicated state machine in which each state transition (block) can be efficiently verified in constant time regardless of the number of prior transitions in the system.

Landcoin: A Practical Protocol for Transfer-of-Asset

A transfer-of-asset system for land management that borrows from Litecoin protocol its script, underlying consensus, and block structure and is a permissioned blockchain, where only a set of pre-approved miners can append land records to the blockchain.

A Systematic Approach To Cryptocurrency Fees

This paper proposes a modification of a transaction fee scheme based on how much additional space will be needed for the objects created as a result of transaction processing and for how long will they live in the state and shows a possible implementation in a form of regular payments to miners.

Towards Usable Protection Against Honeypots

This paper proposes a system that aims to protect users from falling into honeypots by consisting of a plugin for MetaMask and a back-end service that continuously scans the Ethereum blockchain for honeypots.

Decentralization in Bitcoin and Ethereum Networks

The extent of decentralization is investigated by measuring the network resources of nodes and the interconnection among them, the protocol requirements affecting the operation of nodes, and the robustness of the two systems against attacks.

Ques-Chain: an Ethereum Based E-Voting System

An Ethereum based eletronic voting (e-voting) protocol, Ques-Chain, which can ensure the authentication can be done without hurting confidentiality and the anonymity can be protected without problems of scams at the same time is proposed.

Generic Superlight Client for Permissionless Blockchains

A superlight-client protocol to enable a client to employ some relaying full nodes (e.g. two or one) to read the blockchain and captures a wide variety of important use-cases such as multi-chain wallets, DApp browsers and more.
...

References

SHOWING 1-10 OF 47 REFERENCES

A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM

When Satoshi Nakamoto first set the Bitcoin blockchain into motion in January 2009, he was simultaneously introducing two radical and untested concepts. The first is the "bitcoin", a decentralized

Formalizing and Securing Relationships on Public Networks

Protocols with application in important contracting areas, including credit, content rights management, payment systems, and contracts with bearer are discussed.

Accelerating Bitcoin's Transaction Processing. Fast Money Grows on Trees, Not Chains

The block generation rate can be securely increased to more than one block per second – a 600 fold speedup compared to today’s rate, while still allowing the network to processes many transactions per second.

Overview of Colored Coins

The implementation details of colored bitcoins are discussed, which can make use of the existing Bitcoin infrastructure and can be stored and transferred without the need for a third party, and even be exchanged for one another in an atomic transaction.

Optimizing SHA256 in Bitcoin Mining

This paper revisit the cryptographic process which allows one to make money by producing new bitcoins, reformulate this problem as a specific sort of Constrained Input Small Output (CISO) hashing problem and reduce the problem to a pure block cipher problem.

Hashcash - Amortizable Publicly Auditable Cost-Functions

A distributed efficiently amortizable CPU cost-function with no trap–door is presented which can be used in situations where the server can issue a challenge, and where it can’t (where the communication is store–and–forward, or packet oriented) respectively.

The BLAKE2 Cryptographic Hash and Message Authentication Code (MAC)

This document describes the cryptographic hash function BLAKE2 and makes the algorithm specification and C source code conveniently available to the Internet community. BLAKE2 comes in two main

The Elliptic Curve Digital Signature Algorithm (ECDSA)

The ANSI X9.62 ECDSA is described and related security, implementation, and interoperability issues are discussed, and the strength-per-key-bit is substantially greater in an algorithm that uses elliptic curves.

BitCoin software finds new life

Pricing via Processing or Combatting Junk Mail

We present a computational technique for combatting junk mail in particular and controlling access to a shared resource in general. The main idea is to require a user to compute a moderately hard,