搜索结果: 1-15 共查到“军事学 bitcoin”相关记录76条 . 查询时间(0.093 秒)
Utreexo: A dynamic hash-based accumulator optimized for the Bitcoin UTXO set
accumulators bitcoin merkle proofs
font style='font-size:12px;'>
2019/6/4
In the Bitcoin consensus network, all nodes come to agreement on the set of Unspent Transaction Outputs (The “UTXO” set). The size of this shared state is a scalability constraint for the network, as ...
Atomic Multi-Channel Updates with Constant Collateral in Bitcoin-Compatible Payment-Channel Networks
payment channel networks collateral scalability
font style='font-size:12px;'>
2019/5/31
Current cryptocurrencies provide a heavily limited transaction throughput that is clearly insufficient to cater to their growing adoption. Payment-channel networks (PCNs) have emerged as an interestin...
How many transactions per second can bitcoin really handle ? Theoretically.
maximal throughput bitcoin protocol blockchain
font style='font-size:12px;'>
2019/4/25
Transactions are arguably the most important part in the bitcoin mechanism, with everything else facilitating the proper creation, propagation and validation; culminating with their addition to the pu...
FastKitten: Practical Smart Contracts on Bitcoin
Blockchain Bitcoin Smart Contracts
font style='font-size:12px;'>
2019/2/25
Smart contracts are envisioned to be one of the killer applications of decentralized cryptocurrencies. They enable self-enforcing payments between users depending on complex program logic. Unfortunate...
Verifying liquidity of Bitcoin contracts
Bitcoin smart contracts verification
font style='font-size:12px;'>
2018/11/29
A landmark security property of smart contracts is liquidity: in a non-liquid contract, it may happen that some funds remain frozen. The relevance of this issue is witnessed by a recent liquidity atta...
BITE: Bitcoin Lightweight Client Privacy using Trusted Execution
Trusted Execution SGX
font style='font-size:12px;'>
2018/11/20
Decentralized blockchains offer attractive advantages over traditional payments such as the ability to operate without a trusted authority and increased user privacy. However, the verification of bloc...
A New Blind ECDSA Scheme for Bitcoin Transaction Anonymity
Blind signature ECDSA Paillier cryptosystem
font style='font-size:12px;'>
2018/7/9
In this paper, we consider a scenario where a bitcoin liquidity provider sells bitcoins to clients. When a client pays for a bitcoin online, the provider is able to link the client's payment informati...
Aggregation of Gamma-Signatures and Applications to Bitcoin
IKE NMDL
font style='font-size:12px;'>
2018/5/11
Aggregate signature allows non-interactively condensing multiple individual signatures into a compact one. Besides the faster verification, it is useful to reduce storage and bandwidth, and is especia...
Fun with Bitcoin smart contracts
bitcoin smart contracts process algebras
font style='font-size:12px;'>
2018/5/3
Besides simple transfers of currency, Bitcoin also enables various forms of smart contracts, i.e. protocols where users interact within pre-agreed rules, which determine (possibly depending on the act...
A New Approach to Deanonymization of Unreachable Bitcoin Nodes
Anonymity Bitcoin
font style='font-size:12px;'>
2018/3/9
Mounting deanonymization attacks on the unreachable Bitcoin nodes -- these nodes do not accept incoming connections -- residing behind the NAT is a challenging task. Such an attack was first given by ...
SoK: unraveling Bitcoin smart contracts
cryptographic protocols cryptocurrencies
font style='font-size:12px;'>
2018/3/5
Albeit the primary usage of Bitcoin is to exchange currency, its blockchain and consensus mechanism can also be exploited to securely execute some forms of smart contracts. These are agreements among ...
Committing to Quantum Resistance: A Slow Defence for Bitcoin against a Fast Quantum Computing Attack
Bitcoin blockchain quantum computing
font style='font-size:12px;'>
2018/3/5
Quantum computers are expected to have a dramatic impact on numerous fields, due to their anticipated ability to solve classes of mathematical problems much more efficiently than their classical count...
But Why does it Work? A Rational Protocol Design Treatment of Bitcoin
Blockchain Protocols Rational Protocol Design Bitcoin
font style='font-size:12px;'>
2018/2/8
An exciting recent line of work has focused on formally investigating the core cryptographic assumptions underlying the security of Bitcoin. In a nutshell, these works conclude that Bitcoin is secure ...
BitML: a calculus for Bitcoin smart contracts
Bitcoin smart contracts computational attacks
font style='font-size:12px;'>
2018/2/1
We propose a domain-specific language for smart contracts, which allows participants to transfer cryptocurrency according to agreed contract terms. We define a symbolic and a computational model for r...
Simple Schnorr Multi-Signatures with Applications to Bitcoin
multi-signatures Schnorr signatures one-more discrete logarithm problem
font style='font-size:12px;'>
2018/1/19
We describe a new Schnorr-based multi-signature scheme (i.e., a protocol which allows a group of signers to produce a short, joint signature on a common message), provably secure in the plain public-k...