Bitcoin: A Peer-to-Peer Electronic Cash System
Satoshi Nakamoto
whitepaper 2008
How to Time-Stamp a Digital Document
Stuart Haber, W. Scott Stornetta
Crypto 1990
Hashcash -- A Denial of Service Counter-Measure
Adam Back
2001
Pricing via Processing or Combatting Junk Mail
Cynthia Dwork, Moni Naor
Crypto 1992
Exposing Computationally-Challenged Byzantine Impostors
James Aspnes, Collin Jackson, and Arvind Krishnamurthy
2005
2013
Majority is not Enough: Bitcoin Mining is Vulnerable
Ittay Eyal, Emin Gun Sirer
FC 2014
https://arxiv.org/abs/1311.0243
2014
The Bitcoin Backbone Protocol: Analysis and Applications
Juan Garay and Aggelos Kiayias and Nikos Leonardos
Eurocrypt 2015
http://eprint.iacr.org/2014/765
The Miner's Dilemma
Ittay Eyal
SP 2015
https://arxiv.org/abs/1411.7099
Permacoin: Repurposing Bitcoin Work for Long-Term Data Preservation
Andrew Miller, Ari Juels, Elaine Shi, Bryan Parno, Jonathan Katz
SP 2014
2015
Optimal Selfish Mining Strategies in Bitcoin
Ayelet Sapirstein, Yonatan Sompolinsky, and Aviv Zohar.
FC 2016
https://arxiv.org/abs/1507.06183
Bitcoin-NG: A Scalable Blockchain Protocol
Ittay Eyal, Adem Efe Gencer, Emin Gun Sirer, Robbert van Renesse
NSDI 2016 / Blog
https://arxiv.org/abs/1510.02037
SpaceMint: A Cryptocurrency Based on Proofs of Space
Sunoo Park and Krzysztof Pietrzak and Albert Kwon and Joël Alwen and Georg Fuchsbauer and Peter Gaži
https://eprint.iacr.org/2015/528
Non-outsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions
Andrew Miller, Elaine Shi, Ahmed Kosba, and Jonathan Katz
CCS 2015
Secure High-Rate Transaction Processing in Bitcoin
Yonatan Sompolinsky and Aviv Zohar
FC 2015
Inclusive Block Chain Protocols
Yoad Lewenberg, Yonatan Sompolinsky, Aviv Zohar
FC 2015
Demystifying incentives in the consensus computer
Loi Luu, Jason Teutsch, Raghav Kulkarni and Prateek Saxena
CCS 2015
https://eprint.iacr.org/2015/702
2016
Designing Proof of Human-work Puzzles for Cryptocurrency and Beyond
Jeremiah Blocki, Hong-Sheng Zhou
TCC 2016B
http://eprint.iacr.org/2016/145
Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing
Eleftherios Kokoris-Kogias, Philipp Jovanovic, Nicolas Gailly, Ismail Khoffi, Linus Gasser, Bryan Ford
USENIX Security 2016 / Blog
https://arxiv.org/abs/1602.06997
Analysis of the Blockchain Protocol in Asynchronous Networks
Rafael Pass and Lior Seeman and abhi shelat
Eurocrypt 2017
http://eprint.iacr.org/2016/454
On Trees, Chains and Fast Transactions in the Blockchain
Aggelos Kiayias and Giorgos Panagiotakos
http://eprint.iacr.org/2016/545
Algorand
Jing Chen, Silvio Micali
https://arxiv.org/abs/1607.01341
Blockchain Mining Games
Aggelos Kiayias, Elias Koutsoupias, Maria Kyropoulou, Yiannis Tselekounis
EC 2016
https://arxiv.org/abs/1607.02420
2-hop Blockchain: Combining Proof-of-Work and Proof-of-Stake Securely
Tuyet Duong, Lei Fan, Thomas Veale, Hong-Sheng Zhou
http://eprint.iacr.org/2016/716
Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol
Aggelos Kiayias and Alexander Russell and Bernardo David and Roman Oliynykov
Crypto 2017
https://eprint.iacr.org/2016/889
FruitChain: An Incentive Compatible Blockchain
Rafael Pass and Elaine Shi
PODC 2017
https://eprint.iacr.org/2016/916
Hybrid Consensus: Efficient Consensus in the Permissionless Model
Rafael Pass and Elaine Shi
https://eprint.iacr.org/2016/917
The Sleepy Model of Consensus
Rafael Pass and Elaine Shi
Asiacrypt 2017
https://eprint.iacr.org/2016/918
Snow White: Provably Secure Proofs of Stake
Phil Daian and Rafael Pass and Elaine Shi
https://eprint.iacr.org/2016/919
The Bitcoin Backbone Protocol with Chains of Variable Difficulty
Juan A. Garay and Aggelos Kiayias and Nikos Leonardos
Crypto 2017
https://eprint.iacr.org/2016/1048
SPECTRE: A Fast and Scalable Cryptocurrency Protocol
Yonatan Sompolinsky and Yoad Lewenberg and Aviv Zohar
https://eprint.iacr.org/2016/1159
2017
REM: Resource-Efficient Mining for Blockchains
Fan Zhang and Ittay Eyal and Robert Escriva and Ari Juels and Robbert van Renesse
USENIX Security
https://eprint.iacr.org/2017/179
TwinsCoin: A Cryptocurrency via Proof-of-Work and Proof-of-Stake
Alexander Chepurnoy and Tuyet Duong and Lei Fan and Hong-Sheng Zhou
https://eprint.iacr.org/2017/232
Algorand: Scaling Byzantine Agreements for Cryptocurrencies
Yossi Gilad and Rotem Hemo and Silvio Micali and Georgios Vlachos and Nickolai Zeldovich
https://eprint.iacr.org/2017/454
Ouroboros Praos: An adaptively-secure, semi-synchronous proof-of-stake protocol
Bernardo David and Peter Gaži and Aggelos Kiayias and Alexander Russell
https://eprint.iacr.org/2017/573
iChing: A Scalable Proof-of-Stake Blockchain in the Open Setting (or, How to Mimic Nakamoto's Design via Proof-of-Stake)
Lei Fan and Hong-Sheng Zhou
https://eprint.iacr.org/2017/656
Proofs of Work for Blockchain Protocols
Juan A. Garay and Aggelos Kiayias and Giorgos Panagiotakos
https://eprint.iacr.org/2017/775
Thunderella: Blockchains with Optimistic Instant Confirmation
Rafael Pass and Elaine Shi
https://eprint.iacr.org/2017/913
2014
How to Use Bitcoin to Design Fair Protocols
Iddo Bentov and Ranjit Kumaresan
Crypto 2014
http://eprint.iacr.org/2014/129
How to Use Bitcoin to Incentivize Correct Computations
Iddo Bentov and Ranjit Kumaresan
CCS 2014
2015
Fair and Robust Multi-Party Computation using a Global Transaction Ledger
Aggelos Kiayias and Hong-Sheng Zhou and Vassilis Zikas
Eurocrypt 2016
http://eprint.iacr.org/2015/574
Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts
Ahmed Kosba and Andrew Miller and Elaine Shi and Zikai Wen and Charalampos Papamanthou
SP 2016
https://eprint.iacr.org/2015/675
How to Use Bitcoin to Play Decentralized Poker
Ranjit Kumaresan and Iddo Bentov and Tal Moran
CCS 2015
2016
2017
Overcoming Cryptographic Impossibility Results using Blockchains
Rishab Goyal and Vipul Goyal
TCC 2017
https://eprint.iacr.org/2017/935
Instantaneous Decentralized Poker
Iddo Bentov and Ranjit Kumaresan and Andrew Miller
Asiacrypt 2017
https://eprint.iacr.org/2017/875
Pseudonymous Secure Computation from Time-Lock Puzzles.
Jonathan Katz, Andrew Miller, and Elaine Shi.
https://eprint.iacr.org/2014/857
Distributed Cryptography Based on the Proofs of Work
Marcin Andrychowicz and Stefan Dziembowski
Crypto 2015
https://eprint.iacr.org/2014/796
著作权归作者所有。商业转载请联系作者获得授权,非商业转载请注明出处。