SmartCast: An Incentive Compatible Consensus Protocol Using Smart Contracts

@inproceedings{Kothapalli2017SmartCastAI,
  title={SmartCast: An Incentive Compatible Consensus Protocol Using Smart Contracts},
  author={Abhiram Kothapalli and A. Miller and N. Borisov},
  booktitle={Financial Cryptography Workshops},
  year={2017}
}
  • Abhiram Kothapalli, A. Miller, N. Borisov
  • Published in
    Financial Cryptography…
    2017
  • Computer Science
  • Motivated by the desire for high-throughput public databases (i.e., “blockchains”), we design incentive compatible protocols that run “off-chain”, but rely on an existing cryptocurrency to implement a reward and/or punishment mechanism. Our protocols are incentive compatible in the sense that behaving honestly is a weak Nash equilibrium, even in spite of potentially malicious behavior from a small fraction of the participants (i.e., the BAR model from Clement et al. [7]). To show the… CONTINUE READING
    8 Citations
    Coalition-Safe Equilibria with Virtual Payoffs
    • 1
    • PDF
    Lever: Breaking the Shackles of Scalable On-chain Validation
    SoK : Consensus in the Age of Blockchains Shehar Bano
    SoK: Consensus in the Age of Blockchains
    • 57
    • PDF
    Consensus in the Age of Blockchains
    • 130
    • PDF
    Security, Performance, and Applications of Smart Contracts: A Systematic Survey
    • 33
    Incentives in Security Protocols
    • 8
    • PDF
    Security Protocols XXVI

    References

    SHOWING 1-10 OF 21 REFERENCES
    Rational Protocol Design: Cryptography against Incentive-Driven Adversaries
    • 60
    • PDF
    Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts
    • 1,109
    • PDF
    Making Smart Contracts Smarter
    • 748
    • PDF
    When Cryptocurrencies Mine Their Own Business
    • 37
    • PDF
    Why Buy When You Can Rent? - Bribery Attacks on Bitcoin-Style Consensus
    • J. Bonneau
    • Computer Science
    • Financial Cryptography Workshops
    • 2016
    • 60
    • PDF
    Malleability of the blockchain’s entropy
    • 38
    • PDF
    Broadcast and Verifiable Secret Sharing: New Security Models and Round Optimal Constructions
    • 2
    • Highly Influential
    • PDF
    How to Use Bitcoin to Design Fair Protocols
    • 243
    • PDF
    Transparency Overlays and Applications
    • 35
    • PDF