• Corpus ID: 4836820

ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER

@inproceedings{Wood2014ETHEREUMAS,
  title={ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER},
  author={Daniel Davis Wood},
  year={2014}
}
The blockchain paradigm when coupled with cryptographically-secured transactions has demonstrated its utility through a number of projects, with Bitcoin being one of the most notable ones. Each such project can be seen as a simple application on a decentralised, but singleton, compute resource. We can call this paradigm a transactional singleton machine with shared-state. Ethereum implements this paradigm in a generalised manner. Furthermore it provides a plurality of such resources, each with… 

Ethereum: State of Knowledge and Research Perspectives

Ethereum is a major blockchain-based platform for smart contracts – Turing complete programs that are executed in a decentralized network and usually manipulate digital units of value. A peer-to-peer

A Comparative Analysis of Current Cryptocurrencies

TLDR
This paper focuses on three of the most diffused platforms, i.e. Bitcoin, Ripple, and Ethereum, and provides a comparative analysis of their most important features such as the architecture, the scripting language, the economic and security properties.

A privacy-preserving decentralized storage with payments based on a blockchain

TLDR
A second proposal to realize smart contracts in a blockchain setting is called Hawk, where financial transactions are not stored in clear on the blockchain but instead in an “encrypted” form, informally speaking.

Coda: Decentralized Cryptocurrency at Scale

TLDR
Coda, a payment system (cryptocurrency) using a succinct blockchain, is introduced, a replicated state machine in which each state transition (block) can be efficiently verified in constant time regardless of the number of prior transitions in the system.

A Systematic Approach To Cryptocurrency Fees

TLDR
This paper proposes a modification of a transaction fee scheme based on how much additional space will be needed for the objects created as a result of transaction processing and for how long will they live in the state and shows a possible implementation in a form of regular payments to miners.

Towards Usable Protection Against Honeypots

TLDR
This paper proposes a system that aims to protect users from falling into honeypots by consisting of a plugin for MetaMask and a back-end service that continuously scans the Ethereum blockchain for honeypots.

Decentralization in Bitcoin and Ethereum Networks

TLDR
The extent of decentralization is investigated by measuring the network resources of nodes and the interconnection among them, the protocol requirements affecting the operation of nodes, and the robustness of the two systems against attacks.

Ques-Chain: an Ethereum Based E-Voting System

TLDR
An Ethereum based eletronic voting (e-voting) protocol, Ques-Chain, which can ensure the authentication can be done without hurting confidentiality and the anonymity can be protected without problems of scams at the same time is proposed.

Generic Superlight Client for Permissionless Blockchains

TLDR
A superlight-client protocol to enable a client to employ some relaying full nodes (e.g. two or one) to read the blockchain and captures a wide variety of important use-cases such as multi-chain wallets, DApp browsers and more.

Segurança e Escalabilidade em Sharding Blockchain

TLDR
This work proposes to present some sharding models highlighting their particularities and security solutions, and considers Crash Only Nodes e Byzantine Nodes as potential models for sharding.
...

References

SHOWING 1-10 OF 68 REFERENCES

A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM

When Satoshi Nakamoto first set the Bitcoin blockchain into motion in January 2009, he was simultaneously introducing two radical and untested concepts. The first is the "bitcoin", a decentralized

Formalizing and Securing Relationships on Public Networks

TLDR
Protocols with application in important contracting areas, including credit, content rights management, payment systems, and contracts with bearer are discussed.

Bitcoin: A Peer-to-Peer Electronic Cash System

TLDR
This work proposes a solution to the double-spending problem using a peer-to-peer network, where the network timestamps transactions by hashing them into an ongoing chain of hash-based proof-of-work, forming a record that cannot be changed without redoing the proof- of-work.

Accelerating Bitcoin's Transaction Processing. Fast Money Grows on Trees, Not Chains

TLDR
The block generation rate can be securely increased to more than one block per second – a 600 fold speedup compared to today’s rate, while still allowing the network to processes many transactions per second.

Overview of Colored Coins

TLDR
The implementation details of colored bitcoins are discussed, which can make use of the existing Bitcoin infrastructure and can be stored and transferred without the need for a third party, and even be exchanged for one another in an atomic transaction.

Optimizing SHA256 in Bitcoin Mining

TLDR
This paper revisit the cryptographic process which allows one to make money by producing new bitcoins, reformulate this problem as a specific sort of Constrained Input Small Output (CISO) hashing problem and reduce the problem to a pure block cipher problem.

KARMA : A Secure Economic Framework for Peer-to-Peer Resource Sharing

TLDR
A general economic framework for avoiding freeloaders in peer-to-peer systems that is resistant to malicious attempts by the resource provider, consumer, and a fraction of the members of the bank set.

Hashcash - Amortizable Publicly Auditable Cost-Functions

TLDR
A distributed efficiently amortizable CPU cost-function with no trap–door is presented which can be used in situations where the server can issue a challenge, and where it can’t (where the communication is store–and–forward, or packet oriented) respectively.

The BLAKE2 Cryptographic Hash and Message Authentication Code (MAC)

This document describes the cryptographic hash function BLAKE2 and makes the algorithm specification and C source code conveniently available to the Internet community. BLAKE2 comes in two main

The Elliptic Curve Digital Signature Algorithm (ECDSA)

TLDR
The ANSI X9.62 ECDSA is described and related security, implementation, and interoperability issues are discussed, and the strength-per-key-bit is substantially greater in an algorithm that uses elliptic curves.
...