区块链重要工作
Blockchain Bibliography
a selective collection of cryptography research papers on blockchain techniques.
maintained by Hong-Sheng Zhou; work in progress; stay tuned!
Bitcoin Whitepaper and the “Old Ideas”
- Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto
whitepaper 2008 - How to Time-Stamp a Digital Document Stuart Haber, W. Scott Stornetta
Crypto 1990 - Hashcash – A Denial of Service Counter-Measure Adam Back 2001
- Pricing via Processing or Combatting Junk Mail Cynthia Dwork, Moni
Naor Crypto 1992 - Exposing Computationally-Challenged Byzantine Impostors James Aspnes,
Collin Jackson, and Arvind Krishnamurthy 2005
Blockchain Design and Analysis
2013
- Majority is not Enough: Bitcoin Mining is Vulnerable
Ittay Eyal, Emin Gun Sirer
FC 2014
https://arxiv.org/abs/1311.0243
2014
-
The Bitcoin Backbone Protocol: Analysis and Applications
Juan Garay and Aggelos Kiayias and Nikos Leonardos
Eurocrypt 2015
http://eprint.iacr.org/2014/765 -
The Miner’s Dilemma
Ittay Eyal
SP 2015
https://arxiv.org/abs/1411.7099 -
Permacoin: Repurposing Bitcoin Work for Long-Term Data Preservation
Andrew Miller, Ari Juels, Elaine Shi, Bryan Parno, Jonathan Katz
SP 2014
2015
-
Optimal Selfish Mining Strategies in Bitcoin
Ayelet Sapirstein, Yonatan Sompolinsky, and Aviv Zohar.
FC 2016
https://arxiv.org/abs/1507.06183 -
Bitcoin-NG: A Scalable Blockchain Protocol
Ittay Eyal, Adem Efe Gencer, Emin Gun Sirer, Robbert van Renesse
NSDI 2016 / Blog
https://arxiv.org/abs/1510.02037 -
SpaceMint: A Cryptocurrency Based on Proofs of Space
Sunoo Park and Krzysztof Pietrzak and Albert Kwon and Joël Alwen and Georg Fuchsbauer and Peter Gaži
https://eprint.iacr.org/2015/528 -
Non-outsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions
Andrew Miller, Elaine Shi, Ahmed Kosba, and Jonathan Katz
CCS 2015 -
Secure High-Rate Transaction Processing in Bitcoin
Yonatan Sompolinsky and Aviv Zohar
FC 2015 -
Inclusive Block Chain Protocols
Yoad Lewenberg, Yonatan Sompolinsky, Aviv Zohar
FC 2015 -
Demystifying incentives in the consensus computer
Loi Luu, Jason Teutsch, Raghav Kulkarni and Prateek Saxena
CCS 2015
https://eprint.iacr.org/2015/702
2016
-
Designing Proof of Human-work Puzzles for Cryptocurrency and Beyond
Jeremiah Blocki, Hong-Sheng Zhou
TCC 2016B
http://eprint.iacr.org/2016/145 -
Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing
Eleftherios Kokoris-Kogias, Philipp Jovanovic, Nicolas Gailly, Ismail Khoffi, Linus Gasser, Bryan Ford
USENIX Security 2016 / Blog
https://arxiv.org/abs/1602.06997 -
Analysis of the Blockchain Protocol in Asynchronous Networks
Rafael Pass and Lior Seeman and abhi shelat
Eurocrypt 2017
http://eprint.iacr.org/2016/454 -
On Trees, Chains and Fast Transactions in the Blockchain
Aggelos Kiayias and Giorgos Panagiotakos
http://eprint.iacr.org/2016/545 -
Algorand
Jing Chen, Silvio Micali
https://arxiv.org/abs/1607.01341 -
Blockchain Mining Games
Aggelos Kiayias, Elias Koutsoupias, Maria Kyropoulou, Yiannis Tselekounis
EC 2016
https://arxiv.org/abs/1607.02420 -
2-hop Blockchain: Combining Proof-of-Work and Proof-of-Stake Securely
Tuyet Duong, Lei Fan, Thomas Veale, Hong-Sheng Zhou
http://eprint.iacr.org/2016/716 -
Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol
Aggelos Kiayias and Alexander Russell and Bernardo David and Roman Oliynykov
Crypto 2017
https://eprint.iacr.org/2016/889 -
FruitChain: An Incentive Compatible Blockchain
Rafael Pass and Elaine Shi
PODC 2017
https://eprint.iacr.org/2016/916 -
Hybrid Consensus: Efficient Consensus in the Permissionless Model
Rafael Pass and Elaine Shi
https://eprint.iacr.org/2016/917 -
The Sleepy Model of Consensus
Rafael Pass and Elaine Shi
Asiacrypt 2017
https://eprint.iacr.org/2016/918 -
Snow White: Provably Secure Proofs of Stake
Phil Daian and Rafael Pass and Elaine Shi
https://eprint.iacr.org/2016/919 -
The Bitcoin Backbone Protocol with Chains of Variable Difficulty
Juan A. Garay and Aggelos Kiayias and Nikos Leonardos
Crypto 2017
https://eprint.iacr.org/2016/1048 -
SPECTRE: A Fast and Scalable Cryptocurrency Protocol
Yonatan Sompolinsky and Yoad Lewenberg and Aviv Zohar
https://eprint.iacr.org/2016/1159
2017
-
REM: Resource-Efficient Mining for Blockchains
Fan Zhang and Ittay Eyal and Robert Escriva and Ari Juels and Robbert van Renesse
USENIX Security
https://eprint.iacr.org/2017/179 -
TwinsCoin: A Cryptocurrency via Proof-of-Work and Proof-of-Stake
Alexander Chepurnoy and Tuyet Duong and Lei Fan and Hong-Sheng Zhou
https://eprint.iacr.org/2017/232 -
Algorand: Scaling Byzantine Agreements for Cryptocurrencies
Yossi Gilad and Rotem Hemo and Silvio Micali and Georgios Vlachos and Nickolai Zeldovich
https://eprint.iacr.org/2017/454 -
Ouroboros Praos: An adaptively-secure, semi-synchronous proof-of-stake protocol
Bernardo David and Peter Gaži and Aggelos Kiayias and Alexander Russell
https://eprint.iacr.org/2017/573 -
iChing: A Scalable Proof-of-Stake Blockchain in the Open Setting (or, How to Mimic Nakamoto’s Design via Proof-of-Stake)
Lei Fan and Hong-Sheng Zhou
https://eprint.iacr.org/2017/656 -
Proofs of Work for Blockchain Protocols
Juan A. Garay and Aggelos Kiayias and Giorgos Panagiotakos
https://eprint.iacr.org/2017/775 -
Thunderella: Blockchains with Optimistic Instant Confirmation
Rafael Pass and Elaine Shi
https://eprint.iacr.org/2017/913
Blockchain-based Cryptography (Applications)
2014
- How to Use Bitcoin to Design Fair Protocols
Iddo Bentov and Ranjit Kumaresan
Crypto 2014
http://eprint.iacr.org/2014/129
How to Use Bitcoin to Incentivize Correct Computations
Iddo Bentov and Ranjit Kumaresan
CCS 2014
2015
-
Fair and Robust Multi-Party Computation using a Global Transaction Ledger
Aggelos Kiayias and Hong-Sheng Zhou and Vassilis Zikas
Eurocrypt 2016
http://eprint.iacr.org/2015/574 -
Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts
Ahmed Kosba and Andrew Miller and Elaine Shi and Zikai Wen and Charalampos Papamanthou
SP 2016
https://eprint.iacr.org/2015/675 -
How to Use Bitcoin to Play Decentralized Poker
Ranjit Kumaresan and Iddo Bentov and Tal Moran
CCS 2015
2016
2017
-
Overcoming Cryptographic Impossibility Results using Blockchains
Rishab Goyal and Vipul Goyal
TCC 2017
https://eprint.iacr.org/2017/935 -
Instantaneous Decentralized Poker
Iddo Bentov and Ranjit Kumaresan and Andrew Miller
Asiacrypt 2017
https://eprint.iacr.org/2017/875
Proof-of-Work-based Cryptography
-
Pseudonymous Secure Computation from Time-Lock Puzzles.
Jonathan Katz, Andrew Miller, and Elaine Shi.
https://eprint.iacr.org/2014/857 -
Distributed Cryptography Based on the Proofs of Work
Marcin Andrychowicz and Stefan Dziembowski
Crypto 2015
https://eprint.iacr.org/2014/796
Survey, Online Courses, Summer/Winter Schools, Tutorials
-
SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies.
Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, Edward W. Felten
SP 2014
https://eprint.iacr.org/2015/261 -
Cryptocurrencies: The Ideas behind the Hype
Arvind Narayanan
Video -
Online Course: Bitcoin and Cryptocurrency Techniques
Spring 2015 / Textbook/Videos/Slides
Tutorial: Introduction to Cryptocurrencies
Stefan Dziembowski
CCS 2015 / Slides -
Summer School: Blockchain Technologies, from Cryptographic E-cash to Modern Cryptocurrencies
June 2016 / Slides
参考文章
https://cryptographylab.bitbucket.io/BlockchainBib.html