搜索结果: 1-15 共查到“密码学 cryptocurrencies”相关记录25条 . 查询时间(0.031 秒)
Bitcontracts: Adding Expressive Smart Contracts to Legacy Cryptocurrencies
Blockchain Smart Contracts Cryptocurrency
font style='font-size:12px;'>
2019/7/24
In contrast to traditional contracts, cryptocurrency-based smart contracts can provide improved business automation and more transparency. However, not all cryptocurrencies support expressive contract...
Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies
Cryptocurrencies blockchain smart contracts
font style='font-size:12px;'>
2019/7/4
The feasibility of bribing attacks on cryptocurrencies was first highlighted in 2016, with various new techniques and approaches having since been proposed. Recent reports of real world 51%51% attacks...
ShareLock: Mixing for Cryptocurrencies from Multiparty ECDSA
Cryptocurrency Cryptographic protocol Privacy
font style='font-size:12px;'>
2019/5/28
Many cryptocurrencies, such as Bitcoin and Ethereum, do not provide any financial privacy to their users. These systems cannot be used as a medium of exchange as long as they are transparent. Therefor...
SoK: A Taxonomy for Layer-2 Scalability Related Protocols for Cryptocurrencies
cryptographic protocols electronic commerce and payment blockchain
font style='font-size:12px;'>
2019/4/3
Blockchain based systems, in particular cryptocurrencies, face a serious limitation: scalability. This holds, especially, in terms of number of transactions per second. Several alternatives are curren...
Flyclient: Super-Light Clients for Cryptocurrencies
blockchain proof of work
font style='font-size:12px;'>
2019/3/4
To ensure the validity of transactions, cryptocurrencies such as Bitcoin and Ethereum require nodes to verify that a proof-of-work blockchain is valid. Unfortunately, this often entails downloading an...
Biased Nonce Sense: Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies
Hidden number problem ECDSA Lattices
font style='font-size:12px;'>
2019/1/10
In this paper, we compute hundreds of Bitcoin private keys and dozens of Ethereum, Ripple, SSH, and HTTPS private keys by carrying out cryptanalytic attacks against digital signatures contained in pub...
Minting Mechanisms for Blockchain -- or -- Moving from Cryptoassets to Cryptocurrencies
Blockchain Cryptocurrencies Auction
font style='font-size:12px;'>
2018/11/20
Permissionless blockchain systems, such as Bitcoin, rely on users using their computational power to solve a puzzle in order to achieve a consensus. To incentivise users in maintaining the system, new...
Pitchforks in Cryptocurrencies: Enforcing rule changes through offensive forking- and consensus techniques
cryptographic protocols consensus techniques
font style='font-size:12px;'>
2018/11/16
The increasing number of cryptocurrencies, as well as the rising number of actors within each single cryptocurrency, inevitably leads to tensions between the respective communities. As with open sourc...
QuisQuis: A New Design for Anonymous Cryptocurrencies
anonymity cryptocurrencies
font style='font-size:12px;'>
2018/11/5
Despite their usage of pseudonyms rather than persistent identifiers, most existing cryptocurrencies do not provide users with any meaningful levels of privacy. This has prompted the creation of priva...
Another coin bites the dust: An analysis of dust in UTXO based cryptocurrencies
blockchain UTXO Bitcoin
font style='font-size:12px;'>
2018/5/28
Unspent Transaction Outputs (UTXOs) are the internal mechanism used in many cryp- tocurrencies to represent coins. Such representation has some clear benefits, but also entails some complexities that,...
An Abstract Model of UTxO-based Cryptocurrencies with Scripts
Cryptocurrency Blockchain Validator-Redeemer Scripts
font style='font-size:12px;'>
2018/5/23
In [1], an abstract accounting model for UTXO-based cryptocurrencies has been presented. However, that model considered only the simplest kind of transaction (known in Bitcoin as pay-to-pubkey-hash) a...
R3C3: Cryptographically secure Censorship Resistant Rendezvous using Cryptocurrencies
cryptographic protocols R3C3
font style='font-size:12px;'>
2018/5/22
Cryptocurrencies and blockchains are set to play a major role in the financial and supply-chain systems. Their presence and acceptance across different geopolitical corridors, including in repressive ...
A Treasury System for Cryptocurrencies: Enabling Better Collaborative Intelligence
cryptographic protocols treasury participants
font style='font-size:12px;'>
2018/5/15
A treasury system is a community controlled and decentralized collaborative decision-making mechanism for sustainable funding of the blockchain development and maintenance. During each treasury period...
Vault: Fast Bootstrapping for Cryptocurrencies
applications cryptocurrencies
font style='font-size:12px;'>
2018/3/14
Decentralized cryptocurrencies rely on participants to keep track of the state of the system in order to verify new transactions. As the number of users and transactions grows, this requirement places...
Chimeric Ledgers: Translating and Unifying UTXO-based and Account-based Cryptocurrencies
Blockchain Bitcoin Ehtereum
font style='font-size:12px;'>
2018/3/13
Cryptocurrencies are historically divided in two broad groups with respect to the style of transactions that they accept. In the account-based style, each address is seen as an account with a balance,...