
-
LazyLedger: A Distributed Data Availability Ledger With Client-Side Smart Contracts
We propose LazyLedger, a design for distributed ledgers where the blockc...
read it
-
Proof-of-Prestige: A Useful Work Reward System for Unverifiable Tasks
As cryptographic tokens and altcoins are increasingly being built to ser...
read it
-
Replay Attacks and Defenses against Cross-shard Consensus in Sharded Distributed Ledgers
We present the first replay attacks against sharded distributed ledgers....
read it
-
Fraud Proofs: Maximising Light Client Security and Scaling Blockchains with Dishonest Majorities
Light clients, also known as Simple Payment Verification (SPV) clients, ...
read it
-
Airtnt: Fair Exchange Payment for Outsourced Secure Enclave Computations
We present Airtnt, a novel scheme that enables users with CPUs that supp...
read it
-
VAMS: Verifiable Auditing of Access to Confidential Data
The sharing of personal data has the potential to bring substantial bene...
read it
-
Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers
We present Coconut, a novel selective disclosure credential scheme suppo...
read it
-
Contour: A Practical System for Binary Transparency
Transparency is crucial in security-critical applications that rely on a...
read it
-
Consensus in the Age of Blockchains
The blockchain initially gained traction in 2008 as the technology under...
read it