Corpus ID: 13752623

Yellow Paper: Version 1.2 Practical Proof of Kernel Work & Distributed Adaptiveness A Resilient & Scalable Blockchain Platform for Dynamic Low-Energy Networks

@inproceedings{Lundbk2017YellowPV,
  title={Yellow Paper: Version 1.2 Practical Proof of Kernel Work \& Distributed Adaptiveness A Resilient \& Scalable Blockchain Platform for Dynamic Low-Energy Networks},
  author={Leif-Nissen Lundb{\ae}k and Daniel J. Beutel},
  year={2017}
}

References

SHOWING 1-10 OF 38 REFERENCES
Algorand: Scaling Byzantine Agreements for Cryptocurrencies
TLDR
Experimental results show that Algorand confirms transactions in under a minute, achieves 125x Bitcoin's throughput, and incurs almost no penalty for scaling to more users. Expand
Bitcoin: A Peer-to-Peer Electronic Cash System
A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution. Digital signatures provideExpand
Bitcoin and Cryptocurrency Technologies : A Comprehensive Introduction
Centrally Governed Blockchains: Optimizing Security, Cost, and Availability
TLDR
This work develops a detailed mathematical model to derive MINLP optimization problems for computing optimal Proof of Work configuration parameters that trade off potentially conflicting aspects such as availability, resiliency, security, and cost in this governed setting. Expand
Ethereum’s Big Switch: The New Roadmap to Proof-of-Stake
  • Online at https://coindesk.com/ethereums-big-switch-the-new-roadmap-to-proof-of-stake/,
  • 2017
NuCypher KMS: Decentralized key management system
TLDR
NuCypher KMS provides encryption and cryptographic access controls, performed by a decentralized network, leveraging proxy re-encryption, that addresses the limitations of using consensus networks to securely store and manipulate private, encrypted data. Expand
Oligarchic Control of Business-to-Business Blockchains
TLDR
It is believed that more research in this direction could establish firm foundations for domain-specific or coalition-specific blockchains, and that such underpinnings would offer novel trust architectures beyond those provided by completely open/public blockchains and third-party operated, closed/private blockchains. Expand
Proxy Re-Encryption: Analysis of constructions and its application to secure access delegation
This paper analyzes the secure access delegation problem, which occurs naturally in the cloud, and postulate that Proxy Re-Encryption is a feasible cryptographic solution, both from the functionalExpand
Quorum
  • Online at https://jpmorgan.com/global/Quorum,
  • 2017
The First Collision for Full SHA-1
SHA-1 is a widely used 1995 NIST cryptographic hash function standard that was officially deprecated by NIST in 2011 due to fundamental security weaknesses demonstrated in various analyses andExpand
...
1
2
3
4
...