Proofs of Work for Blockchain Protocols
@article{Garay2017ProofsOW, title={Proofs of Work for Blockchain Protocols}, author={J. Garay and A. Kiayias and Giorgos Panagiotakos}, journal={IACR Cryptol. ePrint Arch.}, year={2017}, volume={2017}, pages={775} }
One of the most impactful applications of proofs of work (POW) currently is in the design of blockchain protocols such as Bitcoin. Yet, despite the wide recognition of POWs as the fundamental cryptographic tool in this context, there is no known cryptographic formulation that implies the security of the Bitcoin blockchain protocol. Indeed, all previous works formally arguing the security of the Bitcoin protocol relied on direct proofs in the random oracle model, thus circumventing the di culty… CONTINUE READING
Figures, Tables, and Topics from this paper
13 Citations
Coin.AI: A Proof-of-Useful-Work Scheme for Blockchain-Based Distributed Deep Learning
- Computer Science, Medicine
- Entropy
- 2019
- 15
- PDF
Lay Down the Common Metrics: Evaluating Proof-of-Work Consensus Protocols' Security
- Computer Science
- 2019 IEEE Symposium on Security and Privacy (SP)
- 2019
- 30
- PDF
Verify-Your-Vote: A Verifiable Blockchain-Based Online Voting Protocol
- Computer Science
- EMCIS
- 2018
- 14
- PDF
Topics in Cryptology – CT-RSA 2020: The Cryptographers’ Track at the RSA Conference 2020, San Francisco, CA, USA, February 24–28, 2020, Proceedings
- Computer Science
- CT-RSA
- 2020
- 3
Agreement with Satoshi - On the Formalization of Nakamoto Consensus
- Computer Science
- IACR Cryptol. ePrint Arch.
- 2018
- 29
- PDF
Foundations, Properties, and Security Applications of Puzzles
- Computer Science
- ACM Comput. Surv.
- 2020
- 3
- PDF
A Survey on Consensus Mechanisms and Mining Management in Blockchain Networks
- Computer Science
- ArXiv
- 2018
- 73
- Highly Influenced
References
SHOWING 1-10 OF 28 REFERENCES
Distributed Cryptography Based on the Proofs of Work
- Computer Science
- IACR Cryptol. ePrint Arch.
- 2014
- 23
- PDF
Pseudonymous Secure Computation from Time-Lock Puzzles
- Computer Science
- IACR Cryptol. ePrint Arch.
- 2014
- 29
- PDF
Security and Composition of Multiparty Cryptographic Protocols
- Computer Science, Mathematics
- Journal of Cryptology
- 2000
- 1,144
Resource-based corruptions and the combinatorics of hidden diversity
- Computer Science, Mathematics
- ITCS '13
- 2013
- 15
- PDF
Random oracles are practical: a paradigm for designing efficient protocols
- Computer Science
- CCS '93
- 1993
- 4,543
- PDF