区块链论文汇总(持续更新)

Bitcoin Whitepaper and the "Old Ideas"

Bitcoin: A Peer-to-Peer Electronic Cash System
Satoshi Nakamoto
whitepaper 2008

How to Time-Stamp a Digital Document
Stuart Haber, W. Scott Stornetta
Crypto 1990

Hashcash -- A Denial of Service Counter-Measure
Adam Back
2001

Pricing via Processing or Combatting Junk Mail
Cynthia Dwork, Moni Naor
Crypto 1992

Exposing Computationally-Challenged Byzantine Impostors
James Aspnes, Collin Jackson, and Arvind Krishnamurthy
2005

Blockchain Design and Analysis

2013
Majority is not Enough: Bitcoin Mining is Vulnerable
Ittay Eyal, Emin Gun Sirer
FC 2014
https://arxiv.org/abs/1311.0243

2014
The Bitcoin Backbone Protocol: Analysis and Applications
Juan Garay and Aggelos Kiayias and Nikos Leonardos
Eurocrypt 2015
http://eprint.iacr.org/2014/765

The Miner's Dilemma
Ittay Eyal
SP 2015
https://arxiv.org/abs/1411.7099

Permacoin: Repurposing Bitcoin Work for Long-Term Data Preservation
Andrew Miller, Ari Juels, Elaine Shi, Bryan Parno, Jonathan Katz
SP 2014

2015
Optimal Selfish Mining Strategies in Bitcoin
Ayelet Sapirstein, Yonatan Sompolinsky, and Aviv Zohar.
FC 2016
https://arxiv.org/abs/1507.06183

Bitcoin-NG: A Scalable Blockchain Protocol
Ittay Eyal, Adem Efe Gencer, Emin Gun Sirer, Robbert van Renesse
NSDI 2016 / Blog
https://arxiv.org/abs/1510.02037

SpaceMint: A Cryptocurrency Based on Proofs of Space
Sunoo Park and Krzysztof Pietrzak and Albert Kwon and Joël Alwen and Georg Fuchsbauer and Peter Gaži
https://eprint.iacr.org/2015/528
Non-outsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions
Andrew Miller, Elaine Shi, Ahmed Kosba, and Jonathan Katz
CCS 2015

Secure High-Rate Transaction Processing in Bitcoin
Yonatan Sompolinsky and Aviv Zohar
FC 2015

Inclusive Block Chain Protocols
Yoad Lewenberg, Yonatan Sompolinsky, Aviv Zohar
FC 2015

Demystifying incentives in the consensus computer
Loi Luu, Jason Teutsch, Raghav Kulkarni and Prateek Saxena
CCS 2015
https://eprint.iacr.org/2015/702

2016
Designing Proof of Human-work Puzzles for Cryptocurrency and Beyond
Jeremiah Blocki, Hong-Sheng Zhou
TCC 2016B
http://eprint.iacr.org/2016/145
Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing
Eleftherios Kokoris-Kogias, Philipp Jovanovic, Nicolas Gailly, Ismail Khoffi, Linus Gasser, Bryan Ford
USENIX Security 2016 / Blog
https://arxiv.org/abs/1602.06997

Analysis of the Blockchain Protocol in Asynchronous Networks
Rafael Pass and Lior Seeman and abhi shelat
Eurocrypt 2017
http://eprint.iacr.org/2016/454

On Trees, Chains and Fast Transactions in the Blockchain
Aggelos Kiayias and Giorgos Panagiotakos
http://eprint.iacr.org/2016/545
Algorand
Jing Chen, Silvio Micali
https://arxiv.org/abs/1607.01341

Blockchain Mining Games
Aggelos Kiayias, Elias Koutsoupias, Maria Kyropoulou, Yiannis Tselekounis
EC 2016
https://arxiv.org/abs/1607.02420
2-hop Blockchain: Combining Proof-of-Work and Proof-of-Stake Securely
Tuyet Duong, Lei Fan, Thomas Veale, Hong-Sheng Zhou
http://eprint.iacr.org/2016/716

Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol
Aggelos Kiayias and Alexander Russell and Bernardo David and Roman Oliynykov
Crypto 2017
https://eprint.iacr.org/2016/889

FruitChain: An Incentive Compatible Blockchain
Rafael Pass and Elaine Shi
PODC 2017
https://eprint.iacr.org/2016/916

Hybrid Consensus: Efficient Consensus in the Permissionless Model
Rafael Pass and Elaine Shi
https://eprint.iacr.org/2016/917

The Sleepy Model of Consensus
Rafael Pass and Elaine Shi
Asiacrypt 2017
https://eprint.iacr.org/2016/918

Snow White: Provably Secure Proofs of Stake
Phil Daian and Rafael Pass and Elaine Shi
https://eprint.iacr.org/2016/919

The Bitcoin Backbone Protocol with Chains of Variable Difficulty
Juan A. Garay and Aggelos Kiayias and Nikos Leonardos
Crypto 2017
https://eprint.iacr.org/2016/1048

SPECTRE: A Fast and Scalable Cryptocurrency Protocol
Yonatan Sompolinsky and Yoad Lewenberg and Aviv Zohar
https://eprint.iacr.org/2016/1159

2017
REM: Resource-Efficient Mining for Blockchains
Fan Zhang and Ittay Eyal and Robert Escriva and Ari Juels and Robbert van Renesse
USENIX Security
https://eprint.iacr.org/2017/179

TwinsCoin: A Cryptocurrency via Proof-of-Work and Proof-of-Stake
Alexander Chepurnoy and Tuyet Duong and Lei Fan and Hong-Sheng Zhou
https://eprint.iacr.org/2017/232

Algorand: Scaling Byzantine Agreements for Cryptocurrencies
Yossi Gilad and Rotem Hemo and Silvio Micali and Georgios Vlachos and Nickolai Zeldovich
https://eprint.iacr.org/2017/454

Ouroboros Praos: An adaptively-secure, semi-synchronous proof-of-stake protocol
Bernardo David and Peter Gaži and Aggelos Kiayias and Alexander Russell
https://eprint.iacr.org/2017/573

iChing: A Scalable Proof-of-Stake Blockchain in the Open Setting (or, How to Mimic Nakamoto's Design via Proof-of-Stake)
Lei Fan and Hong-Sheng Zhou
https://eprint.iacr.org/2017/656

Proofs of Work for Blockchain Protocols
Juan A. Garay and Aggelos Kiayias and Giorgos Panagiotakos
https://eprint.iacr.org/2017/775

Thunderella: Blockchains with Optimistic Instant Confirmation
Rafael Pass and Elaine Shi
https://eprint.iacr.org/2017/913

Blockchain-based Cryptography (Applications)

2014
How to Use Bitcoin to Design Fair Protocols
Iddo Bentov and Ranjit Kumaresan
Crypto 2014
http://eprint.iacr.org/2014/129
How to Use Bitcoin to Incentivize Correct Computations
Iddo Bentov and Ranjit Kumaresan
CCS 2014

2015

Fair and Robust Multi-Party Computation using a Global Transaction Ledger
Aggelos Kiayias and Hong-Sheng Zhou and Vassilis Zikas
Eurocrypt 2016
http://eprint.iacr.org/2015/574

Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts
Ahmed Kosba and Andrew Miller and Elaine Shi and Zikai Wen and Charalampos Papamanthou
SP 2016
https://eprint.iacr.org/2015/675
How to Use Bitcoin to Play Decentralized Poker
Ranjit Kumaresan and Iddo Bentov and Tal Moran
CCS 2015
2016
2017
Overcoming Cryptographic Impossibility Results using Blockchains
Rishab Goyal and Vipul Goyal
TCC 2017
https://eprint.iacr.org/2017/935

Instantaneous Decentralized Poker
Iddo Bentov and Ranjit Kumaresan and Andrew Miller
Asiacrypt 2017
https://eprint.iacr.org/2017/875

Proof-of-Work-based Cryptography

Pseudonymous Secure Computation from Time-Lock Puzzles.
Jonathan Katz, Andrew Miller, and Elaine Shi.
https://eprint.iacr.org/2014/857

Distributed Cryptography Based on the Proofs of Work
Marcin Andrychowicz and Stefan Dziembowski
Crypto 2015
https://eprint.iacr.org/2014/796



作者:vdes
链接:https://www.jianshu.com/p/aec8faa50bd1
來源:简书

著作权归作者所有。商业转载请联系作者获得授权,非商业转载请注明出处。


猜你喜欢

转载自blog.csdn.net/omnispace/article/details/80234477