The Sleepy Model of Consensus

@inproceedings{Pass2016TheSM,
  title={The Sleepy Model of Consensus},
  author={Rafael Pass and Elaine Shi},
  booktitle={IACR Cryptology ePrint Archive},
  year={2016}
}
The literature on distributed computing (as well as the cryptography literature) typically considers two types of players—honest players and corrupted players. Resilience properties are then analyzed assuming a lower bound on the fraction of honest players. Honest players, however, are not only assumed to follow the prescribed the protocol, but also assumed to be online throughout the whole execution of the protocol. The advent of “large-scale” consensus protocols (e.g., the blockchain protocol… CONTINUE READING
BETA

Citations

Publications citing this paper.
SHOWING 1-10 OF 47 CITATIONS

Bitcoin Security under Temporary Dishonest Majority Bachelor Thesis

VIEW 4 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Rethinking Large-Scale Consensus

  • 2017 IEEE 30th Computer Security Foundations Symposium (CSF)
  • 2017
VIEW 8 EXCERPTS
CITES RESULTS, METHODS & BACKGROUND
HIGHLY INFLUENCED

Snow White: Provably Secure Proofs of Stake

  • IACR Cryptology ePrint Archive
  • 2016
VIEW 10 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Another Look at ALGORAND

  • ArXiv
  • 2019
VIEW 3 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Bitcoin Security under Temporary Dishonest Majority

VIEW 3 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Consensus Through Herding

VIEW 6 EXCERPTS
CITES METHODS, BACKGROUND & RESULTS
HIGHLY INFLUENCED

Analysis of Deterministic Longest-Chain Protocols

  • IACR Cryptology ePrint Archive
  • 2018
VIEW 10 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability

  • ACM Conference on Computer and Communications Security
  • 2018
VIEW 3 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

References

Publications referenced by this paper.
SHOWING 1-10 OF 37 REFERENCES

ALGORAND: The Efficient and Democratic Ledger

  • ArXiv
  • 2016
VIEW 10 EXCERPTS
HIGHLY INFLUENTIAL

Analysis of the Blockchain Protocol in Asynchronous Networks

  • IACR Cryptology ePrint Archive
  • 2016
VIEW 9 EXCERPTS
HIGHLY INFLUENTIAL

FruitChains: A Fair Blockchain

VIEW 7 EXCERPTS
HIGHLY INFLUENTIAL

Snow White: Provably Secure Proofs of Stake

  • IACR Cryptology ePrint Archive
  • 2016
VIEW 9 EXCERPTS
HIGHLY INFLUENTIAL

The Bitcoin Backbone Protocol: Analysis and Applications

  • IACR Cryptology ePrint Archive
  • 2014
VIEW 8 EXCERPTS
HIGHLY INFLUENTIAL

Development of the Domain Name System

  • Computer Communication Review
  • 1988
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

Authenticated Algorithms for Byzantine Agreement

  • SIAM J. Comput.
  • 1983
VIEW 5 EXCERPTS
HIGHLY INFLUENTIAL

Similar Papers

Loading similar papers…