• Corpus ID: 169596211

The Stellar Consensus Protocol (SCP)

@inproceedings{Mazires2018TheSC,
  title={The Stellar Consensus Protocol (SCP)},
  author={David Mazi{\`e}res and Stanislas Polu and Nicolas Barry and Jed McCaleb and Giuliano Losa},
  year={2018}
}
SCP is an open Byzantine agreement protocol resistant to Sybil attacks. It allows Internet infrastructure stakeholders to reach agreement on a series of values without unanimous agreement on what constitutes the set of important stakeholders. A big differentiator from other Byzantine agreement protocols is that, in SCP, nodes determine the composition of quorums in a decentralized way: each node selects sets of nodes it considers large or important enough to speak for the whole network, and a… 

Formal Modeling and Verification of a Federated Byzantine Agreement Algorithm for Blockchain Platforms

This study model the Stellar Consensus Protocol with timed automata and verify the model using a model checking technique, with the purpose of investigating and evaluating the SCP.

Fast and secure global payments with Stellar

Stellar's model, protocol, and formal verification are presented; the Stellar payment network is described; the network's performance is evaluated empirically through benchmarks and the experience with several years of production use.

Blockchain Consensus Mechanisms and Their Applications in IoT: A Literature Survey

The requirements of consensus mechanisms in IoT networks are introduced to help researchers understand the connection of blockchain consensus mechanisms and IoT and the potential direction of Blockchain consensus designs are pointed out.

Taming the many EdDSAs

A formulation of Ed25519 signature scheme that achieves the highest level of security, explaining how each step of the algorithm links with the formal security properties is explained, and optimizations are developed to allow for more efficient secure implementations.

Security Standardisation Research: 6th International Conference, SSR 2020, London, UK, November 30 – December 1, 2020, Proceedings

A slight modification is presented for the nonce generation in TLS 1.3 which withstands full fault attacks on the handshake protocol and differential faults, where the adversary can flip selected memory cells, do not seem to be harmful to key derivation in the pre-shared-key mode for the handshake.