区块链重要工作(截至2017)

Blockchain Bibliography

a selective collection of cryptography research papers on blockchain techniques.
maintained by Hong-Sheng Zhou; work in progress; stay tuned!

Bitcoin Whitepaper and the “Old Ideas”

  • Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto
    whitepaper 2008
  • How to Time-Stamp a Digital Document Stuart Haber, W. Scott Stornetta
    Crypto 1990
  • Hashcash – A Denial of Service Counter-Measure Adam Back 2001
  • Pricing via Processing or Combatting Junk Mail Cynthia Dwork, Moni
    Naor Crypto 1992
  • Exposing Computationally-Challenged Byzantine Impostors James Aspnes,
    Collin Jackson, and Arvind Krishnamurthy 2005

Blockchain Design and Analysis

2013

  • Majority is not Enough: Bitcoin Mining is Vulnerable
    Ittay Eyal, Emin Gun Sirer
    FC 2014
    https://arxiv.org/abs/1311.0243

2014

  • The Bitcoin Backbone Protocol: Analysis and Applications
    Juan Garay and Aggelos Kiayias and Nikos Leonardos
    Eurocrypt 2015
    http://eprint.iacr.org/2014/765

  • The Miner’s Dilemma
    Ittay Eyal
    SP 2015
    https://arxiv.org/abs/1411.7099

  • Permacoin: Repurposing Bitcoin Work for Long-Term Data Preservation
    Andrew Miller, Ari Juels, Elaine Shi, Bryan Parno, Jonathan Katz
    SP 2014

2015

  • Optimal Selfish Mining Strategies in Bitcoin
    Ayelet Sapirstein, Yonatan Sompolinsky, and Aviv Zohar.
    FC 2016
    https://arxiv.org/abs/1507.06183

  • Bitcoin-NG: A Scalable Blockchain Protocol
    Ittay Eyal, Adem Efe Gencer, Emin Gun Sirer, Robbert van Renesse
    NSDI 2016 / Blog
    https://arxiv.org/abs/1510.02037

  • SpaceMint: A Cryptocurrency Based on Proofs of Space
    Sunoo Park and Krzysztof Pietrzak and Albert Kwon and Joël Alwen and Georg Fuchsbauer and Peter Gaži
    https://eprint.iacr.org/2015/528

  • Non-outsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions
    Andrew Miller, Elaine Shi, Ahmed Kosba, and Jonathan Katz
    CCS 2015

  • Secure High-Rate Transaction Processing in Bitcoin
    Yonatan Sompolinsky and Aviv Zohar
    FC 2015

  • Inclusive Block Chain Protocols
    Yoad Lewenberg, Yonatan Sompolinsky, Aviv Zohar
    FC 2015

  • Demystifying incentives in the consensus computer
    Loi Luu, Jason Teutsch, Raghav Kulkarni and Prateek Saxena
    CCS 2015
    https://eprint.iacr.org/2015/702

2016

  • Designing Proof of Human-work Puzzles for Cryptocurrency and Beyond
    Jeremiah Blocki, Hong-Sheng Zhou
    TCC 2016B
    http://eprint.iacr.org/2016/145

  • Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing
    Eleftherios Kokoris-Kogias, Philipp Jovanovic, Nicolas Gailly, Ismail Khoffi, Linus Gasser, Bryan Ford
    USENIX Security 2016 / Blog
    https://arxiv.org/abs/1602.06997

  • Analysis of the Blockchain Protocol in Asynchronous Networks
    Rafael Pass and Lior Seeman and abhi shelat
    Eurocrypt 2017
    http://eprint.iacr.org/2016/454

  • On Trees, Chains and Fast Transactions in the Blockchain
    Aggelos Kiayias and Giorgos Panagiotakos
    http://eprint.iacr.org/2016/545

  • Algorand
    Jing Chen, Silvio Micali
    https://arxiv.org/abs/1607.01341

  • Blockchain Mining Games
    Aggelos Kiayias, Elias Koutsoupias, Maria Kyropoulou, Yiannis Tselekounis
    EC 2016
    https://arxiv.org/abs/1607.02420

  • 2-hop Blockchain: Combining Proof-of-Work and Proof-of-Stake Securely
    Tuyet Duong, Lei Fan, Thomas Veale, Hong-Sheng Zhou
    http://eprint.iacr.org/2016/716

  • Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol
    Aggelos Kiayias and Alexander Russell and Bernardo David and Roman Oliynykov
    Crypto 2017
    https://eprint.iacr.org/2016/889

  • FruitChain: An Incentive Compatible Blockchain
    Rafael Pass and Elaine Shi
    PODC 2017
    https://eprint.iacr.org/2016/916

  • Hybrid Consensus: Efficient Consensus in the Permissionless Model
    Rafael Pass and Elaine Shi
    https://eprint.iacr.org/2016/917

  • The Sleepy Model of Consensus
    Rafael Pass and Elaine Shi
    Asiacrypt 2017
    https://eprint.iacr.org/2016/918

  • Snow White: Provably Secure Proofs of Stake
    Phil Daian and Rafael Pass and Elaine Shi
    https://eprint.iacr.org/2016/919

  • The Bitcoin Backbone Protocol with Chains of Variable Difficulty
    Juan A. Garay and Aggelos Kiayias and Nikos Leonardos
    Crypto 2017
    https://eprint.iacr.org/2016/1048

  • SPECTRE: A Fast and Scalable Cryptocurrency Protocol
    Yonatan Sompolinsky and Yoad Lewenberg and Aviv Zohar
    https://eprint.iacr.org/2016/1159

2017

  • REM: Resource-Efficient Mining for Blockchains
    Fan Zhang and Ittay Eyal and Robert Escriva and Ari Juels and Robbert van Renesse
    USENIX Security
    https://eprint.iacr.org/2017/179

  • TwinsCoin: A Cryptocurrency via Proof-of-Work and Proof-of-Stake
    Alexander Chepurnoy and Tuyet Duong and Lei Fan and Hong-Sheng Zhou
    https://eprint.iacr.org/2017/232

  • Algorand: Scaling Byzantine Agreements for Cryptocurrencies
    Yossi Gilad and Rotem Hemo and Silvio Micali and Georgios Vlachos and Nickolai Zeldovich
    https://eprint.iacr.org/2017/454

  • Ouroboros Praos: An adaptively-secure, semi-synchronous proof-of-stake protocol
    Bernardo David and Peter Gaži and Aggelos Kiayias and Alexander Russell
    https://eprint.iacr.org/2017/573

  • iChing: A Scalable Proof-of-Stake Blockchain in the Open Setting (or, How to Mimic Nakamoto’s Design via Proof-of-Stake)
    Lei Fan and Hong-Sheng Zhou
    https://eprint.iacr.org/2017/656

  • Proofs of Work for Blockchain Protocols
    Juan A. Garay and Aggelos Kiayias and Giorgos Panagiotakos
    https://eprint.iacr.org/2017/775

  • Thunderella: Blockchains with Optimistic Instant Confirmation
    Rafael Pass and Elaine Shi
    https://eprint.iacr.org/2017/913

Blockchain-based Cryptography (Applications)

2014

  • How to Use Bitcoin to Design Fair Protocols
    Iddo Bentov and Ranjit Kumaresan
    Crypto 2014
    http://eprint.iacr.org/2014/129
    How to Use Bitcoin to Incentivize Correct Computations
    Iddo Bentov and Ranjit Kumaresan
    CCS 2014

2015

  • Fair and Robust Multi-Party Computation using a Global Transaction Ledger
    Aggelos Kiayias and Hong-Sheng Zhou and Vassilis Zikas
    Eurocrypt 2016
    http://eprint.iacr.org/2015/574

  • Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts
    Ahmed Kosba and Andrew Miller and Elaine Shi and Zikai Wen and Charalampos Papamanthou
    SP 2016
    https://eprint.iacr.org/2015/675

  • How to Use Bitcoin to Play Decentralized Poker
    Ranjit Kumaresan and Iddo Bentov and Tal Moran
    CCS 2015

2016

2017

  • Overcoming Cryptographic Impossibility Results using Blockchains
    Rishab Goyal and Vipul Goyal
    TCC 2017
    https://eprint.iacr.org/2017/935

  • Instantaneous Decentralized Poker
    Iddo Bentov and Ranjit Kumaresan and Andrew Miller
    Asiacrypt 2017
    https://eprint.iacr.org/2017/875

Proof-of-Work-based Cryptography

  • Pseudonymous Secure Computation from Time-Lock Puzzles.
    Jonathan Katz, Andrew Miller, and Elaine Shi.
    https://eprint.iacr.org/2014/857

  • Distributed Cryptography Based on the Proofs of Work
    Marcin Andrychowicz and Stefan Dziembowski
    Crypto 2015
    https://eprint.iacr.org/2014/796

Survey, Online Courses, Summer/Winter Schools, Tutorials

  • SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies.
    Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, Edward W. Felten
    SP 2014
    https://eprint.iacr.org/2015/261

  • Cryptocurrencies: The Ideas behind the Hype
    Arvind Narayanan
    Video

  • Online Course: Bitcoin and Cryptocurrency Techniques
    Spring 2015 / Textbook/Videos/Slides
    Tutorial: Introduction to Cryptocurrencies
    Stefan Dziembowski
    CCS 2015 / Slides

  • Summer School: Blockchain Technologies, from Cryptographic E-cash to Modern Cryptocurrencies
    June 2016 / Slides

参考文章

https://cryptographylab.bitbucket.io/BlockchainBib.html

猜你喜欢

转载自blog.csdn.net/qq_40713201/article/details/125449260