Corpus ID: 19568615

Proofs of Work for Blockchain Protocols

  title={Proofs of Work for Blockchain Protocols},
  author={J. Garay and A. Kiayias and Giorgos Panagiotakos},
  journal={IACR Cryptol. ePrint Arch.},
  • J. Garay, A. Kiayias, Giorgos Panagiotakos
  • Published 2017
  • Computer Science
  • IACR Cryptol. ePrint Arch.
  • One of the most impactful applications of proofs of work (POW) currently is in the design of blockchain protocols such as Bitcoin. Yet, despite the wide recognition of POWs as the fundamental cryptographic tool in this context, there is no known cryptographic formulation that implies the security of the Bitcoin blockchain protocol. Indeed, all previous works formally arguing the security of the Bitcoin protocol relied on direct proofs in the random oracle model, thus circumventing the di culty… CONTINUE READING
    13 Citations
    Lay Down the Common Metrics: Evaluating Proof-of-Work Consensus Protocols' Security
    • 30
    • PDF
    Moderately Hard Functions: Definition, Instantiations, and Applications
    • 18
    • PDF
    Verify-Your-Vote: A Verifiable Blockchain-Based Online Voting Protocol
    • 14
    • PDF
    SoK: A Consensus Taxonomy in the Blockchain Era
    • 48
    • PDF
    Foundations, Properties, and Security Applications of Puzzles: A Survey
    • 3
    Foundations, Properties, and Security Applications of Puzzles
    • 3
    • PDF
    A Survey on Consensus Mechanisms and Mining Management in Blockchain Networks
    • 73
    • Highly Influenced


    Speed-Security Tradeo s in Blockchain Protocols
    • 17
    • PDF
    Bootstrapping the Blockchain - Directly
    • 12
    • PDF
    Distributed Cryptography Based on the Proofs of Work
    • 23
    • PDF
    Analysis of the Blockchain Protocol in Asynchronous Networks
    • 418
    • PDF
    Pseudonymous Secure Computation from Time-Lock Puzzles
    • 29
    • PDF
    Indistinguishable Proofs of Work or Knowledge
    • 12
    • PDF
    Security and Composition of Multiparty Cryptographic Protocols
    • R. Canetti
    • Computer Science, Mathematics
    • Journal of Cryptology
    • 2000
    • 1,144
    Resource-based corruptions and the combinatorics of hidden diversity
    • 15
    • PDF
    The Bitcoin Backbone Protocol with Chains of Variable Difficulty
    • 143
    • PDF
    Random oracles are practical: a paradigm for designing efficient protocols
    • 4,543
    • PDF