@misc{dai1998bmoney, author = {Wei Dai}, title = {bmoney}, year = {1998}, note = {Accessed: 2016-04-31}, url = {http://www.weidai.com/bmoney.txt}, }
@misc{back2002hashcash, author = {Adam Back and others}, title = {Hashcash-a denial of service counter-measure}, year = {2002}, note = {Accessed: 2016-03-09}, url = {http://www.hashcash.org/papers/hashcash.pdf}, }
@misc{szabo2003advances, author = {Nick Szabo}, title = {Advances in Distributed Security}, year = {2003}, note = {Accessed: 2016-04-31}, }
@misc{finney2004rpow, author = {Hal Finney}, title = {Reusable Proofs of Work (RPOW)}, year = {2004}, note = {Accessed: 2016-04-31}, url = {http://web.archive.org/web/20071222072154/http://rpow.net/}, }
@misc{szabo2005bitgold, author = {Nick Szabo}, title = {Bit gold}, year = {2005}, note = {Accessed: 2016-04-31}, url = {http://unenumerated.blogspot.co.at/2005/12/bit-gold.html}, }
@misc{nakamoto2008bitcoin, author = {Satoshi Nakamoto}, title = {Bitcoin: A Peer-to-Peer Electronic Cash System}, year = {2008}, month = {Dec}, note = {Accessed: 2015-07-01}, url = {https://bitcoin.org/bitcoin.pdf}, }
@misc{percival2009scrypt, author = {Colin Percival}, title = {Stronger key derivation via sequential memory-hard functions}, year = {2009}, note = {Accessed: 2016-03-09}, url = {http://www.bsdcan.org/2009/schedule/attachments/87_scrypt.pdf}, }
@phdthesis{golze2009fairness, author = {Sebastian Golze}, title = {Fairness in \"{U}berlastsituationen mittels Proof-of-Work-Funktionen.}, year = {2009}, school = {Berlin Institute of Technology}, note = {Accessed: 2016-03-09}, url = {https://depositonce.tu-berlin.de/bitstream/11303/2499/2/Dokument_41.pdf}, }
@misc{schwarz2011zooko, author = {Aaron Schwarz}, title = {{Squaring the Triangle: Secure, Decentralized, Human-Readable Names}}, year = {2011}, month = {Jan}, note = {Accessed 2014-11-14}, url = {http://www.aaronsw.com/weblog/squarezooko}, }
@misc{laurie2011decentralised, author = {Ben Laurie}, title = {Decentralised currencies are probably impossible (but let's at least make them efficient)}, year = {2011}, note = {Accessed 2016-09-02}, url = {http://w.fipr.org/files/decentralised-currencies.pdf}, }
@article{rosenfeld2011analysis, author = {Meni Rosenfeld}, title = {Analysis of Bitcoin pooled mining reward systems}, journal = {arXiv preprint arXiv:1112.4980}, year = {2011}, note = {Accessed 2017-11-24}, url = {https://arxiv.org/pdf/1112.4980.pdf}, }
@misc{rosenfeld2012overview, author = {Meni Rosenfeld}, title = {Overview of colored coins}, journal = {White paper, bitcoil. co. il}, year = {2012}, note = {Accessed: 2016-03-09}, url = {https://bitcoil.co.il/BitcoinX.pdf}, }
@misc{ron2012quantitative, author = {D. Ron and A. Shamir}, title = {Quantitative Analysis of the Full Bitcoin Transaction Graph}, publisher = {Cryptology ePrint Archive, Report 2012/584}, year = {2012}, note = {Accessed: 2016-03-09}, url = {https://eprint.iacr.org/2012/584.pdf}, }
@misc{taylor2012bitmessage, author = {M. B. Taylor}, title = {Bitmessage: A Peer-to-Peer Message Authentication and Delivery System}, year = {2012}, month = {nov}, note = {Accessed: 2015-05-06}, url = {https://bitmessage.org/bitmessage.pdf}, }
@mastersthesis{herrmann2012implementation, author = {Matthias Herrmann}, title = {Implementation, evaluation and detection of a doublespend-attack on Bitcoin}, year = {2012}, month = {Apr}, school = {Master Thesis ETH Z{\"u}rich, 2012}, url = {http://e-collection.library.ethz.ch/eserv/eth:5606/eth-5606-01.pdf?pid=eth:5606&dsID=eth-5606-01.pdf}, }
@misc{bahack2013theoretical, author = {Lear Bahack}, title = {Theoretical Bitcoin Attacks with less than Half of the Computational Power}, year = {2013}, note = {Accessed: 2017-11-23}, url = {https://arxiv.org/pdf/1312.7013.pdf}, }
@misc{sompolinsky2013accelerating, author = {Yonatan Sompolinsky and Aviv Zohar}, title = {Accelerating Bitcoin's Transaction Processing. Fast Money Grows on Trees, Not Chains}, journal = {IACR Cryptology ePrint Archive}, year = {2013}, pages = {881}, url = {http://eprint.iacr.org/2013/881.pdf}, }
@misc{sun2014solving, author = {Felix Sun and Peitong Duan}, title = {Solving Byzantine Problems in Synchronized Systems using Bitcoin}, year = {2014}, note = {Accessed: 2016-09-02}, url = {http://web.mit.edu/felixsun/www/projects/bitcoin.pdf}, }
@misc{courtois2013unreasonable, author = {Nicolas T Courtois and Marek Grajek and Rahul Naik}, title = {The unreasonable fundamental incertitudes behind bitcoin mining}, howpublished = {arXiv preprint arXiv:1310.7935}, year = {2013}, note = {Accessed: 2017-07-04}, url = {https://arxiv.org/pdf/1310.7935.pdf}, }
@phdthesis{naik2013optimising, author = {Rahul P Naik and Nicolas T Courtois}, title = {Optimising the SHA256 Hashing Algorithm for Faster and More Efficient Bitcoin Mining}, year = {2013}, month = {Sep}, school = {University College London}, url = {http://www.nicolascourtois.com/bitcoin/Optimising%20the%20SHA256%20Hashing%20Algorithm%20for%20Faster%20and%20More%20Efficient%20Bitcoin%20Mining_Rahul_Naik.pdf}, }
@misc{rosenfeld2014doublespending, author = {M. Rosenfeld}, title = {Analysis of Hashrate-Based Double Spending}, journal = {CoRR}, volume = {abs/1402.2009}, year = {2014}, note = {Accessed: 2016-03-09}, url = {https://arxiv.org/pdf/1402.2009.pdf}, }
@article{fromknecht2014decentralized, author = {Conner Fromknecht and Dragos Velicanu and Sophia Yakoubov}, title = {A Decentralized Public Key Infrastructure with Identity Retention.}, journal = {IACR Cryptology ePrint Archive}, volume = {2014}, pages = {803}, year = {2014}, url = {https://eprint.iacr.org/2014/803.pdf}, }
@misc{bentov2014cryptocurrencies, author = {Iddo Bentov and Ariel Gabizon and Alex Mizrahi}, title = {Cryptocurrencies without proof of work}, journal = {arXiv preprint arXiv:1406.5694}, year = {2014}, note = {Accessed: 2016-03-09}, url = {http://arxiv.org/pdf/1406.5694.pdf}, }
@misc{miller2014anonymous, author = {A Miller and LaViola JJ}, title = {Anonymous byzantine consensus from moderately-hard puzzles: A model for bitcoin}, year = {2014}, note = {Accessed: 2016-03-09}, url = {https://socrates1024.s3.amazonaws.com/consensus.pdf}, }
@misc{bruce2014miniblock, author = {J. D. Bruce}, title = {The Mini-Blockchain Scheme (a.k.a Purely P2P Crypto-Currency With Finite Mini-Blockchain)}, year = {2014}, month = {Jul}, note = {Accessed: 2014-04-05}, url = {http://cryptonite.info/files/mbc-scheme-rev2.pdf}, }
@misc{jacobs2014namecoin, author = {F. Jacobs}, title = {Providing better confidentiality and authentication on the Internet using Namecoin and MinimaLT}, year = {2014}, month = {apr}, note = {Accessed: 2014-04-02}, url = {https://raw.githubusercontent.com/FredericJacobs/safeweb/master/paper.pdf}, }
@misc{filecoin2014filecoin, author = {Filecoin community}, title = {Filecoin: A Cryptocurrency Operated File Storage Network}, organization = {filecoin.io}, year = {2014}, month = {Oct}, note = {Accessed: 2014-10-14}, url = {http://filecoin.io/filecoin.pdf}, }
@misc{back2014enabling, author = {Adam Back and Matt Corallo and Luke Dashjr and Mark Friedenbach and Gregory Maxwell and Andrew Miller and Andrew Poelstra and Jorge Tim{\'o}n and Pieter Wuille}, title = {Enabling blockchain innovations with pegged sidechains}, year = {2014}, note = {Accessed: 2016-07-05}, url = {http://newspaper23.com/ripped/2014/11/http-_____-___-_www___-blockstream___-com__-_sidechains.pdf}, }
@misc{beukema2014formalising, author = {WJB Beukema}, title = {Formalising the Bitcoin protocol}, year = {2014}, note = {Accessed: 2016-08-01}, url = {http://referaat.cs.utwente.nl/conference/21/paper/7450/formalising-the-bitcoin-protocol.pdf}, }
@misc{schwartz2014ripple, author = {David Schwartz and Noah Youngs and Arthur Britto}, title = {The Ripple protocol consensus algorithm}, journal = {Ripple Labs Inc White Paper}, year = {2014}, note = {Accessed: 2016-08-08}, url = {https://ripple.com/files/ripple_consensus_whitepaper.pdf}, }
@misc{buterin2014ethereum, author = {Vitalik Buterin}, title = {Ethereum: A next-generation smart contract and decentralized application platform}, year = {2014}, note = {Accessed: 2016-08-22}, url = {https://github.com/ethereum/wiki/wiki/White-Paper}, }
@misc{wood2014ethereum, author = {Gavin Wood}, title = {Ethereum: A secure decentralised generalised transaction ledger EIP-150 REVISION (759dccd - 2017-08-07)}, journal = {Ethereum Project Yellow Paper}, year = {2017}, note = {Accessed: 2018-01-03}, url = {https://ethereum.github.io/yellowpaper/paper.pdf}, }
@misc{shomer2014phase, author = {Assaf Shomer}, title = {On the Phase Space of Block-Hiding Strategies in Bitcoin-like networks}, journal = {arXiv preprint arXiv:1402.4233}, year = {2014}, month = {Feb}, note = {Accessed: 2016-10-17}, url = {https://arxiv.org/pdf/1402.4233v1.pdf}, }
@misc{katz2014pseudonymous, author = {Jonathan Katz and Andrew Miller and Elaine Shi}, title = {Pseudonymous Broadcast and Secure Computation from Cryptographic Puzzles}, howpublished = {Cryptology ePrint Archive, Report 2014/857}, year = {2014}, url = {http://eprint.iacr.org/2014/857.pdf}, }
@misc{courtois2014subversive, author = {Nicolas T Courtois and Lear Bahack}, title = {On subversive miner strategies and block withholding attack in bitcoin digital currency}, howpublished = {arXiv preprint arXiv:1402.1718}, year = {2014}, note = {Accessed: 2016-07-04}, url = {https://arxiv.org/pdf/1402.1718.pdf}, }
@misc{courtois2014longest, author = {Nicolas T Courtois}, title = {On the longest chain rule and programmed self-destruction of crypto currencies}, howpublished = {arXiv preprint arXiv:1405.0534}, year = {2014}, note = {Accessed: 2016-07-04}, url = {https://arxiv.org/pdf/1405.0534.pdf}, }
@article{o2014bitcoin, author = {Karl J O'Dwyer and David Malone}, title = {Bitcoin mining and its energy footprint}, year = {2014}, publisher = {IET}, url = {http://karlodwyer.com/publications/pdf/bitcoin_KJOD_2014.pdf}, }
@misc{miller2015topology, author = {Andrew Miller and James Litton and Andrew Pachulski and Neal Gupta and Dave Levin and Neil Spring and Bobby Bhattacharjee}, title = {Discovering bitcoin's public topology and influential nodes}, year = {2015}, month = {May}, note = {Accsessed: 2016-03-09}, url = {http://cs.umd.edu/projects/coinscope/coinscope.pdf}, }
@misc{bonneau2015random, author = {Joseph Bonneau and Jeremy Clark and Steven Goldfeder}, title = {On Bitcoin as a public randomness source}, year = {2015}, note = {Accessed: 2015-10-25}, url = {https://eprint.iacr.org/2015/1015.pdf}, }
@misc{goldfeder2015threshold, author = {Steven Goldfeder and Rosario Gennaro and Harry Kalodner and Joseph Bonneau and Joshua Kroll and Edward W. Felten and Arvind Narayanan}, title = {{Securing Bitcoin wallets via a new DSA/ECDSA threshold signature scheme}}, year = {2015}, note = {Accessed: 2015-07-13}, url = {http://www.cs.princeton.edu/~stevenag/threshold_sigs.pdf}, }
@misc{gobel2015simulation, author = {Johannes G{\"o}bel and Paul Keeler and Anthony E Krzesinski and Peter G Taylor}, title = {Bitcoin Blockchain Dynamics: the Selfish-Mine Strategy in the Presence of Propagation Delay}, journal = {arXiv preprint arXiv:1505.05343}, year = {2015}, note = {Accessed: 2015-03-01}, url = {http://arxiv.org/pdf/1505.05343.pdf}, }
@misc{chaudhary2015modeling, author = {Kaylash Chaudhary and Ansgar Fehnker and Jaco Pol and Marielle Stoelinga}, title = {Modeling and verification of the bitcoin protocol}, journal = {arXiv preprint arXiv:1511.04173}, year = {2015}, note = {Accessed: 2016-08-01}, url = {http://arxiv.org/pdf/1511.04173.pdf}, }
@misc{mazieres2015modeling, author = {David Mazieres}, title = {The Stellar Consensus Protocol: A Federated Model for Internet-level Consensus}, year = {2015}, note = {Accessed: 2016-08-01}, url = {https://www.stellar.org/papers/stellar-consensus-protocol.pdf}, }
@misc{luu2015scp, author = {Loi Luu and Viswesh Narayanan and Kunal Baweja and Chaodong Zheng and Seth Gilbert and Prateek Saxena}, title = {SCP: a computationally-scalable Byzantine consensus protocol for blockchains}, year = {2015}, note = {Accessed: 2016-08-10}, url = {https://www.weusecoins.com/assets/pdf/library/SCP - +A Computationally-Scalable Byzantine.pdf}, }
@misc{delmolino2015step, author = {Kevin Delmolino and Mitchell Arnett and Ahmed E Kosba and Andrew Miller and Elaine Shi}, title = {Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab.}, journal = {IACR Cryptology ePrint Archive}, year = {2015}, note = {Accessed: 2016-08-10}, url = {http://eprint.iacr.org/2015/460.pdf}, }
@misc{sapirshtein2015optimal, author = {Ayelet Sapirshtein and Yonatan Sompolinsky and Aviv Zohar}, title = {Optimal selfish mining strategies in Bitcoin}, journal = {arXiv preprint arXiv:1507.06183}, year = {2015}, note = {Accessed: 2016-08-22}, url = {http://arxiv.org/pdf/1507.06183.pdf}, }
@misc{kiayias2015speed, author = {Aggelos Kiayias and Giorgos Panagiotakos}, title = {Speed-Security Tradeoff s in Blockchain Protocols}, year = {2015}, month = {Oct}, note = {Accessed: 2016-10-17}, url = {https://eprint.iacr.org/2015/1019.pdf}, }
@misc{andrychowicz2015multiparty, author = {Marcin Andrychowicz}, title = {Multiparty Computation Protocols Based on Cryptocurrencies}, year = {2015}, note = {Accessed: 2017-02-15}, url = {https://depotuw.ceon.pl/bitstream/handle/item/1327/dis.pdf}, }
@misc{mazieres2015stellar, author = {David Mazieres}, title = {The stellar consensus protocol: A federated model for internet-level consensus}, year = {2015}, note = {Accessed: 2017-02-20}, url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.696.93&=&rep=rep1&=&type=pdf}, }
@misc{park2015spacemint, author = {Sunoo Park and Krzysztof Pietrzak and Albert Kwon and Jo{\"e}l Alwen and Georg Fuchsbauer and Peter Ga{\v z}i}, title = {SpaceMint: A Cryptocurrency Based on Proofs of Space}, howpublished = {Cryptology ePrint Archive, Report 2015/528}, year = {2015}, note = {Accessed: 2017-06-29}, url = {https://eprint.iacr.org/2015/528.pdf}, }
@misc{zyskind2015enigma, author = {Guy Zyskind and Oz Nathan and Alex Pentland}, title = {Enigma: Decentralized computation platform with guaranteed privacy}, howpublished = {arXiv preprint arXiv:1506.03471}, year = {2015}, note = {Accessed: 2017-08-22}, url = {https://arxiv.org/pdf/1506.03471.pdf}, }
@misc{swanson2015consensus, author = {Tim Swanson}, title = {Consensus-as-a-service: a brief report on the emergence of permissioned, distributed ledger systems}, year = {2015}, month = {Apr}, note = {Accessed: 2017-10-03}, url = {http://www.ofnumbers.com/wp-content/uploads/2015/04/Permissioned-distributed-ledgers.pdf}, }
@inproceedings{sapirshtein2016optimal, author = {Ayelet Sapirshtein and Yonatan Sompolinsky and Aviv Zohar}, title = {Optimal selfish mining strategies in bitcoin}, booktitle = {International Conference on Financial Cryptography and Data Security}, pages = {515--532}, year = {2016}, organization = {Springer}, url = {https://fc16.ifca.ai/preproceedings/30_Sapirshtein.pdf}, }
@misc{ali2016blockstack, author = {Muneeb Ali and Jude Nelson and Ryan Shea and Michael J Freedman}, title = {Blockstack: Design and Implementation of a Global Naming System with Blockchains}, year = {2016}, note = {Accessed: 2016-03-29}, url = {http://www.the-blockchain.com/docs/Blockstack Design and Implementation of a Global Naming System.pdf}, }
@misc{narayanan2016bitcoin, author = {{Narayanan, Arvind and Bonneau, Joseph and Felten, Edward and Miller, Andrew and Goldfeder, Steven}}, title = {Bitcoin and Cryptocurrency Technologies}, year = {2016}, booktitle = {Bitcoin and Cryptocurrency Technologies}, note = {Accessed: 2016-03-29}, url = {https://d28rh4a8wq0iu5.cloudfront.net/bitcointech/readings/princeton_bitcoin_book.pdf}, }
@misc{judmayer2016c4, author = {Aljosha Judmayer and Edgar Weippl}, title = {Cryptographic Currencies Crash Course (C4)}, journal = {Tutorial at WWW2016}, year = {2016}, month = {Apr}, note = {Accessed: 2016-06-06}, url = {http://www2016.net/proceedings/companion/p1021.pdf}, }
@misc{bentov2016bitcoin, author = {Iddo Bentov and Ariel Gabizon and David Zuckerman}, title = {Bitcoin Beacon}, journal = {arXiv prepring arXiv:1605.04559}, year = {2016}, note = {Accessed: 2016-06-06}, url = {https://arxiv.org/pdf/1605.04559v2.pdf}, }
@misc{sompolinsky2016bitcoin, author = {Yonatan Sompolinsky and Aviv Zohar}, title = {Bitcoin's Security Model Revisited}, journal = {arXiv preprint arXiv:1605.09193}, year = {2016}, note = {Accessed: 2016-07-04}, url = {http://arxiv.org/pdf/1605.09193.pdf}, }
@misc{anderson2016new, author = {Luke Anderson and Ralph Holz and Alexander Ponomarev and Paul Rimba and Ingo Weber}, title = {New kids on the block: an analysis of modern blockchains}, journal = {arXiv preprint arXiv:1606.06530}, year = {2016}, note = {Accessed: 2016-07-04}, url = {http://arxiv.org/pdf/1606.06530.pdf}, }
@misc{poon2016bitcoin, author = {Joseph Poon and Thaddeus Dryja}, title = {The bitcoin lightning network}, year = {2016}, note = {Accessed: 2016-07-07}, url = {https://lightning.network/lightning-network-paper.pdf}, }
@misc{pass2016analysis, author = {Rafael Pass and Lior Seeman and abhi shelat}, title = {Analysis of the Blockchain Protocol in Asynchronous Networks}, year = {2016}, note = {Accessed: 2016-08-01}, url = {http://eprint.iacr.org/2016/454.pdf}, }
@misc{pass2016hybrid, author = {Rafael Pass and Elaine Shi}, title = {Hybrid Consensus: Scalable Permissionless Consensus}, year = {2016}, month = {Sep}, note = {Accessed: 2016-10-17}, url = {https://eprint.iacr.org/2016/917.pdf}, }
@misc{nelson2016extending, author = {Jude Nelson and Muneeb Ali and Ryan Shea and Michael J Freedman}, title = {Extending Existing Blockchains with Virtualchain}, year = {2016}, note = {Accessed: 2016-08-01}, url = {https://www.zurich.ibm.com/dccl/papers/nelson_dccl.pdf}, }
@misc{cachin2016architecture, author = {Christian Cachin}, title = {Architecture of the Hyperledger Blockchain Fabric}, year = {2016}, note = {Accessed: 2016-08-10}, url = {https://www.zurich.ibm.com/dccl/papers/cachin_dccl.pdf}, }
@misc{vukolic2016eventually, author = {Marko Vukolic}, title = {Eventually Returning to Strong Consistency}, year = {2016}, note = {Accessed: 2016-08-10}, url = {https://pdfs.semanticscholar.org/a6a1/b70305b27c556aac779fb65429db9c2e1ef2.pdf}, }
@misc{gramoli2016danger, author = {Vincent Gramoli}, title = {On the Danger of Private Blockchains}, year = {2016}, note = {Accessed: 2016-08-10}, url = {https://www.zurich.ibm.com/dccl/papers/gramoli_dccl.pdf}, }
@misc{bhargavan2016short, author = {Karthikeyan Bhargavan and Antoine Delignat-Lavaud and C{\'e}dric Fournet and Anitha Gollamudi and Georges Gonthier and Nadim Kobeissi and Aseem Rastogi and Thomas Sibut-Pinote and Nikhil Swamy and Santiago Zanella-B{\'e}guelin}, title = {Short Paper: Formal Verification of Smart Contracts}, year = {2016}, month = {Aug}, note = {Accessed: 2018-09-19}, url = {https://www.cs.umd.edu/~aseem/solidetherplas.pdf}, }
@misc{pettersson2016safer, author = {Jack Pettersson and Robert Edstr{\"o}m}, title = {Safer smart contracts through type-driven development}, school = {Chalmers University of Technology and University of Gothenburg}, year = {2016}, address = {Gothenburg, Sweden}, note = {Accessed: 2016-08-10}, url = {https://publications.lib.chalmers.se/records/fulltext/234939/234939.pdf}, }
@misc{blocki2016designing, author = {Jeremiah Blocki and Hong-Sheng Zhou}, title = {Designing Proof of Human-work Puzzles for Cryptocurrency and Beyond}, publisher = {Cryptology ePrint Archive, Report 2016/145}, year = {2016}, month = {Aug}, note = {Accessed: 2016-10-17}, url = {https://eprint.iacr.org/2016/145.pdf}, }
@misc{cachin2016non, author = {Christian Cachin and Simon Schubert and Marko Vukolic}, title = {Non-determinism in Byzantine Fault-Tolerant Replication}, year = {2016}, month = {Mar}, note = {Accessed: 2016-11-08}, url = {http://www.zurich.ibm.com/~cca/papers/sieve.pdf}, }
@misc{abraham2016bvp, author = {Ittai Abraham and Dahlia Malkhi}, title = {BVP: Byzantine Vertical Paxos}, year = {2016}, month = {May}, note = {Accessed: 2016-11-08}, url = {https://www.zurich.ibm.com/dccl/papers/abraham_dccl.pdf}, }
@misc{wust2016security, author = {Karl W{\"u}st}, title = {Security of Blockchain Technologies}, publisher = {Master's Thesis - Department of Computer Science, ETH Z{\"u}rich}, year = {2016}, month = {Jul}, note = {Accessed: 2016-11-08}, url = {http://e-collection.library.ethz.ch/eserv/eth:49632/eth-49632-01.pdf}, }
@phdthesis{miller2016provable, author = {Andrew Miller}, title = {Provable Security for Cryptocurrencies}, year = {2016}, school = {University of Maryland, College Park}, note = {Accessed: 2016-11-08}, url = {http://www.cs.umd.edu/~jkatz/THESES/amiller-thesis.pdf}, }
@misc{pass2016fruitchains, author = {Rafael Pass and Elaine Shi}, title = {Fruitchains: A fair blockchain}, publisher = {Cryptology ePrint Archive, Report 2016/916}, year = {2016}, note = {Accessed: 2016-11-08}, url = {http://eprint.iacr.org/2016/916.pdf}, }
@misc{bentov2016sleepy, author = {Iddo Bentov and Rafael Pass and Elaine Shi}, title = {The sleepy model of consensus}, publisher = {Cryptology ePrint Archive, Report 2016/918}, year = {2016}, note = {Accessed: 2016-11-08}, url = {https://eprint.iacr.org/2016/918.pdf}, }
@misc{bentov2016snow, author = {Iddo Bentov and Rafael Pass and Elaine Shi}, title = {Snow White: Provably Secure Proofs of Stake}, publisher = {Cryptology ePrint Archive, Report 2016/919}, year = {2016}, note = {Accessed: 2016-11-08}, url = {https://eprint.iacr.org/2016/919.pdf}, }
@misc{garay2016bootstrapping, author = {Juan A. Garay and Aggelos Kiayias and Nikos Leonardos and Giorgos Panagiotakos}, title = {Bootstrapping the Blockchain --- Directly}, publisher = {Cryptology ePrint Archive, Report 2016/991}, year = {2016}, month = {Oct}, note = {Accessed: 2016-11-08}, url = {https://eprint.iacr.org/2016/991.pdf}, }
@misc{atzei2016survey, author = {Nicola Atzei and Massimo Bartoletti and Tiziana Cimoli}, title = {A survey of attacks on Ethereum smart contracts}, publisher = {Cryptology ePrint Archive, Report 2016/1007}, year = {2016}, month = {Oct}, note = {Accessed: 2016-11-08}, url = {https://eprint.iacr.org/2016/1007.pdf}, }
@misc{kiayias2016provably, author = {Aggelos Kiayias and Ioannis Konstantinou and Alexander Russell and Bernardo David and Roman Oliynykov}, title = {A Provably Secure Proof-of-Stake Blockchain Protocol}, publisher = {Cryptology ePrint Archive, Report 2016/889}, month = {Sep}, year = {2016}, note = {Accessed: 2016-11-09}, url = {http://eprint.iacr.org/2016/889.pdf}, }
@misc{miller2016honey, author = {Andrew Miller and Yu Xia and Kyle Croman and Elaine Shi and Dawn Song}, title = {The honey badger of BFT protocols}, publisher = {Cryptology ePrint Archive: Report 2016/199}, year = {2016}, note = {Accessed: 2017-01-10}, url = {https://eprint.iacr.org/2016/199.pdf}, }
@misc{clack2016smart, author = {Christopher D. Clack and Vikram A. Bakshi and Lee Braine}, title = {Smart Contract Templates: foundations, design landscape and research directions}, journal = {CoRR}, volume = {abs/1608.00771}, year = {2016}, note = {Accessed: 2017-01-10}, url = {https://arxiv.org/pdf/1608.00771v2.pdf}, }
@misc{lajoie2016increasing, author = {Thibaut Lajoie-Mazenc}, title = {Increasing the robustness of the Bitcoincrypto-system in presence of undesirable behaviours}, publisher = {Master's Thesis sumbmitted at KTH CSC}, year = {2016}, note = {Accessed: 2017-01-19}, url = {http://www.nada.kth.se/~ann/exjobb/thibaut_lajoie-mazenc.pdf}, }
@misc{baars2016towards, author = {Djuri Baars}, title = {Towards Self-Sovereign Identity using Blockchain Technology}, year = {2016}, publisher = {Master's Thesis at University of Twente}, note = {Accessed: 2017-01-19}, url = {http://essay.utwente.nl/71274/1/Baars_MA_BMS.pdf}, }
@misc{abraham2016solidus, author = {Ittai Abraham and Dahlia Malkhi and Kartik Nayak and Ling Ren and Alexander Spiegelman}, title = {Solidus: An Incentive-compatible Cryptocurrency Based on Permissionless Byzantine Consensus}, journal = {CoRR}, volume = {abs/1612.02916}, year = {2016}, month = {Dec}, note = {Accessed: 2017-02-06}, url = {https://arxiv.org/pdf/1612.02916.pdf}, }
@misc{buchman2016tendermint, author = {Ethan Buchman}, title = {Tendermint: Byzantine Fault Tolerance in the Age of Blockchains}, publisher = {Master's Thesis at University of Guelph, Ontario}, year = {2016}, month = {Jun}, note = {Accessed: 2017-02-06}, url = {http://atrium.lib.uoguelph.ca/xmlui/bitstream/handle/10214/9769/Buchman_Ethan_201606_MAsc.pdf}, }
@misc{duong2016hop, author = {Tuyet Duong and Lei Fan and Hong-Sheng Zhou}, title = {2-hop Blockchain: Combining Proof-of-Work and Proof-of-Stake Securely}, howpublished = {Cryptology ePrint Archive, Report 2016/716}, year = {2016}, note = {Accessed: 2017-02-06}, url = {https://eprint.iacr.org/2016/716.pdf}, }
@misc{garay2016bitcoin, author = {Juan A. Garay and Aggelos Kiayias and Nikos Leonardos}, title = {The Bitcoin Backbone Protocol with Chains of Variable Difficulty}, journal = {{IACR} Cryptology ePrint Archive, Report 2016/1048}, year = {2016}, note = {Accessed: 2017-02-06}, url = {http://eprint.iacr.org/2016/1048.pdf}, }
@misc{kiayias2016trees, author = {Aggelos Kiayias and Giorgos Panagiotakos}, title = {On Trees, Chains and Fast Transactions in the Blockchain.}, journal = {IACR Cryptology ePrint Archive, Report 2016/545}, year = {2016}, note = {Accessed: 2017-02-06}, url = {http://eprint.iacr.org/2016/545.pdf}, }
@misc{jarecki2016highly, author = {Stanislaw Jarecki and Aggelos Kiayias and Hugo Krawczyk and Jiayu Xu}, title = {Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online)}, journal = {IACR Cryptology ePrint Archive, Report 2016/144}, year = {2016}, note = {Accessed: 2017-02-06}, url = {http://eprint.iacr.org/2016/144.pdf}, }
@misc{gencer2016service, author = {Adem Efe Gencer and Robbert Renesse and Emin G{\"u}n Sirer}, title = {Service-Oriented Sharding with Aspen}, journal = {arXiv preprint arXiv:1611.06816}, year = {2016}, note = {Accessed: 2017-02-06}, url = {http://arxiv.org/pdf/1611.06816.pdf}, }
@misc{kiayias2016blockchain, author = {Aggelos Kiayias and Elias Koutsoupias and Maria Kyropoulou and Yiannis Tselekounis}, title = {Blockchain Mining Games}, journal = {CoRR}, volume = {abs/1607.02420}, year = {2016}, note = {Accessed: 2017-02-07}, url = {https://arxiv.org/pdf/1607.02420.pdf}, }
@misc{micali2016algorand, author = {Silvio Micali}, title = {ALGORAND: The Efficient and Democratic Ledger}, journal = {CoRR}, volume = {abs/1607.01341}, year = {2016}, note = {Accessed: 2017-02-09}, url = {https://arxiv.org/pdf/1607.01341.pdf}, }
@misc{miller2016zero, author = {Andrew Miller and Iddo Bentov}, title = {Zero-Collateral Lotteries in Bitcoin and Ethereum}, journal = {CoRR}, volume = {abs/1612.05390}, year = {2016}, note = {Accessed: 2017-02-13}, url = {https://arxiv.org/pdf/1612.05390.pdf}, }
@misc{natoli2016balance, author = {Christopher Natoli and Vincent Gramoli}, title = {The Balance Attack Against Proof-Of-Work Blockchains: The {R3} Testbed as an Example}, journal = {CoRR}, volume = {abs/1612.09426}, year = {2016}, note = {Accessed: 2017-02-15}, url = {https://arxiv.org/pdf/1612.09426.pdf}, }
@misc{jain2016verify, author = {Sanjay Jain and Prateek Saxena and Frank Stephan and Jason Teutsch}, title = {How to verify computation with a rational network}, journal = {arXiv preprint arXiv:1606.05917}, year = {2016}, note = {Accessed: 2017-02-15}, url = {https://arxiv.org/pdf/1606.05917.pdf}, }
@misc{duong2016securing, author = {Tuyet Duong and Lei Fan and Thomas Veale and Hong-Sheng Zhou}, title = {Securing Bitcoin-like Backbone Protocols against a Malicious Majority of Computing Power}, year = {2016}, note = {Accessed: 2017-02-15}, url = {https://eprint.iacr.org/eprint-bin/getfile.pl?entry=2016/716&version=20160721:174624&file=716.pdf}, }
@misc{kiayias2016ouroboros, author = {Aggelos Kiayias and Alexander Russell and Bernardo David and Roman Oliynykov}, title = {Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol}, year = {2016}, note = {Accessed: 2018-08-19}, url = {https://pdfs.semanticscholar.org/a583/3270b14e251f0b16d86438d04652b1b8d7f3.pdf}, }
@misc{sompolinsky2016spectre, author = {Yonatan Sompolinsky and Yoad Lewenberg and Aviv Zohar}, title = {SPECTRE: A Fast and Scalable Cryptocurrency Protocol}, howpublished = {Cryptology ePrint Archive, Report 2016/1159}, year = {2016}, note = {Accessed: 2017-02-20}, url = {http://eprint.iacr.org/2016/1159.pdf}, }
@misc{camacho2016decor, author = {Philippe Camacho and Sergio Demian Lerner}, title = {DECOR+ LAMI: A Scalable Blockchain Protocol}, year = {2016}, note = {Accessed: 2017-02-20}, url = {https://scalingbitcoin.org/papers/DECOR-LAMI.pdf}, }
@misc{boyen2016blockchain, author = {Xavier Boyen and Christopher Carr and Thomas Haines}, title = {Blockchain-Free Cryptocurrencies. A Rational Framework for Truly Decentralised Fast Transactions}, howpublished = {Cryptology ePrint Archive, Report 2016/871}, year = {2016}, note = {Accessed: 2017-02-20}, url = {http://eprint.iacr.org/2016/871.pdf}, }
@misc{mccorry2016removing, author = {Patrick McCorry and Ehsan Toreini and Maryam Mehrnezhad}, title = {Removing Trusted Tallying Authorities}, year = {2016}, publisher = {Newcastle University}, note = {Accessed: 2017-02-20}, url = {https://www.economist.com/sites/default/files/newcastle.pdf}, }
@misc{reyzin2016improving, author = {Leonid Reyzin and Dmitry Meshkov and Alexander Chepurnoy and Sasha Ivanov}, title = {Improving Authenticated Dynamic Dictionaries, with Applications to Cryptocurrencies}, howpublished = {Cryptology ePrint Archive, Report 2016/994}, year = {2016}, note = {Accessed: 2017-02-27}, url = {https://eprint.iacr.org/2016/994.pdf}, }
@misc{seijas2016scripting, author = {Pablo Lamela Seijas and Simon Thompson and Darryl McAdams}, title = {Scripting smart contracts for distributed ledger technology}, journal = {Cryptology ePrint Archive, Report 2016/1156}, year = {2016}, note = {Accessed: 2017-03-03}, url = {https://eprint.iacr.org/2016/1156.pdf}, }
@misc{bartoletti2016constant, author = {Massimo Bartoletti and Roberto Zunino}, title = {Constant-deposit multiparty lotteries on Bitcoin}, howpublished = {Cryptology ePrint Archive, Report 2016/955}, year = {2016}, note = {Accessed: 2017-03-09}, url = {http://eprint.iacr.org/2016/955.pdf}, }
@misc{lind2016teechan, author = {Joshua Lind and Ittay Eyal and Peter R. Pietzuch and Emin G{\"{u}}n Sirer}, title = {Teechan: Payment Channels Using Trusted Execution Environments}, journal = {CoRR}, volume = {abs/1612.07766}, year = {2016}, note = {Accessed: 2017-03-09}, url = {https://arxiv.org/pdf/1612.07766.pdf}, }
@misc{norta2016designing, author = {Alex Norta}, title = {Designing a Smart-Contract Application Layer for Transacting Decentralized Autonomous Organizations}, year = {2016}, note = {Accessed: 2017-03-16}, url = {https://www.researchgate.net/profile/Alex_Norta/publication/308986556_Designing_a_Smart-Contract_Application_Layer_for_Transacting_Decentralized_Autonomous_Organizations/links/57fcddf608aeb857afa0943d/Designing-a-Smart-Contract-Application-Layer-for-Transacting-Decentralized-Autonomous-Organizations.pdf}, }
@misc{ateniese2016redactable, author = {Giuseppe Ateniese and Bernardo Magri and Daniele Venturi and Ewerton Andrade}, title = {Redactable Blockchain--or--Rewriting History in Bitcoin and Friends}, year = {2016}, institution = {IACR Cryptology ePrint Archive}, note = {Accessed: 2017-03-23}, url = {http://eprint.iacr.org/2016/757.pdf}, }
@misc{apostolaki2016, author = {Maria Apostolaki and Aviv Zohar and Laurent Vanbever}, title = {Hijacking Bitcoin: Large-scale Network Attacks on Cryptocurrencies}, journal = {CoRR}, volume = {abs/1605.07524}, year = {2016}, note = {Accessed: 2017-03-28}, url = {https://arxiv.org/pdf/1605.07524.pdf}, }
@misc{ozisik2016secure, author = {A Pinar Ozisik and Gavin Andresen and George Bissias and Amir Houmansadr and Brian N Levine}, title = {A Secure, Efficient, and Transparent Network Architecture for Bitcoin}, year = {2016}, institution = {UMass Amherst, Tech. Rep. UM-CS-2016-006, 2016}, note = {Accessed: 2017-04-24}, url = {https://people.cs.umass.edu/~gbiss/bitcoin_architecture.pdf}, }
@misc{reijers2016governance, author = {Wessel Reijers and Fiachra O'Brolch{\'a}in and Paul Haynes}, title = {Governance in Blockchain Technologies \& Social Contract Theories}, journal = {Ledger}, volume = {1}, pages = {134--151}, year = {2016}, note = {Accessed: 2017-05-09}, url = {http://ledger.pitt.edu/ojs/index.php/ledger/article/download/62/51}, }
@misc{noyes2016bitav, author = {Charles Noyes}, title = {BitAV: Fast Anti-Malware by Distributed Blockchain Consensus and Feedforward Scanning}, journal = {arXiv preprint arXiv:1601.01405}, year = {2016}, note = {Accessed: 2017-05-09}, url = {https://arxiv.org/pdf/1601.01405.pdf}, }
@misc{vitalik2016chain, author = {Vitalik Buterin}, title = {Chain Interoperability}, year = {2016}, note = {Accessed: 2017-03-25}, url = {https://static1.squarespace.com/static/55f73743e4b051cfcc0b02cf/t/5886800ecd0f68de303349b1/1485209617040/Chain+Interoperability.pdf}, }
@misc{malavolta2016silentwhispers, author = {Giulio Malavolta and Pedro Moreno-Sanchez and Aniket Kate and Matteo Maffei}, title = {SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks}, howpublished = {Cryptology ePrint Archive, Report 2016/1054}, year = {2016}, note = {Accessed: 2017-06-29}, url = {https://eprint.iacr.org/2016/1054.pdf}, }
@misc{green2016bolt, author = {Matthew Green and Ian Miers}, title = {Bolt: Anonymous Payment Channels for Decentralized Currencies}, howpublished = {Cryptology ePrint Archive, Report 2016/701}, year = {2016}, note = {Accessed: 2017-08-07}, url = {http://eprint.iacr.org/2016/701}, }
@misc{siamak2016, author = {Siamak Solat and Maria Potop-Butucaru}, Title = {ZeroBlock: Timestamp-Free Prevention of Block-Withholding Attack in Bitcoin}, Year = {2016}, note = {Accessed: 2017-08-03}, url = {https://arxiv.org/pdf/1605.02435.pdf}, }
@misc{heilman2016tumblebit, author = {Ethan Heilman and Leen Alshenibr and Foteini Baldimtsi and Alessandra Scafuro and Sharon Goldberg}, title = {TumbleBit: An untrusted Bitcoin-compatible anonymous payment hub}, journal = {Cryptology ePrint Archive, Report 2016/575, Tech. Rep.}, year = {2016}, note = {Accessed: 2017-09-29}, url = {https://eprint.iacr.org/2016/575.pdf}, }
@misc{heilman2016blindly, author = {Ethan Heilman and Foteini Baldimtsi and Sharon Goldberg}, title = {Blindly Signed Contracts: Anonymous On-Blockchain and Off-Blockchain Bitcoin Transactions}, howpublished = {Cryptology ePrint Archive, Report 2016/056}, year = {2016}, note = {Accessed: 2017-10-03}, url = {https://eprint.iacr.org/2016/056.pdf}, }
@article{egbertsen2016replacing, author = {Wesley Egbertsen and Gerdinand Hardeman and Maarten Hoven and Gert Kolk and Arthur Rijsewijk}, title = {Replacing Paper Contracts With Ethereum Smart Contracts}, year = {2016}, url = {https://wesleyegbertsen.nl/wp-content/uploads/2016/07/replacing-paper-contracts.pdf}, note = {Accessed: 2017-10-24}, }
@article{rizun2016subchains, author = {Peter R Rizun}, title = {Subchains: A Technique to Scale Bitcoin and Improve the User Experience}, journal = {Ledger}, volume = {1}, pages = {38--52}, year = {2016}, url = {https://www.bitcoinunlimited.info/resources/subchains.pdf}, }
@article{gobel2016bitcoin, author = {Johannes G{\"o}bel and Holger Paul Keeler and Anthony E Krzesinski and Peter G Taylor}, title = {Bitcoin blockchain dynamics: The selfish-mine strategy in the presence of propagation delay}, journal = {Performance Evaluation}, volume = {104}, pages = {23--41}, year = {2016}, publisher = {Elsevier}, url = {http://arxiv.org/pdf/1505.05343.pdf}, }
@misc{bentov2017instantaneous, author = {Iddo Bentov and Ranjit Kumaresan and Andrew Miller}, title = {Instantaneous Decentralized Poker}, journal = {CoRR}, volume = {abs/1701.06726}, year = {2017}, note = {Accessed: 2017-02-16}, url = {https://arxiv.org/pdf/1701.06726.pdf}, }
@inproceedings{kiayias2017trees, author = {Aggelos Kiayias and Georgios Panagiotakos}, title = {On Trees, Chains and Fast Transactions in the Blockchain}, year = {2017}, month = {8}, day = {10}, booktitle = {Latincrypt 2017, the Fifth International Conference on Cryptology and Information Security in Latin America}, url = {https://www.research.ed.ac.uk/portal/files/44941465/gBackbone_1.pdf}, }
@inproceedings{bartoletti2017analysis, author = {Massimo Bartoletti and Livio Pompianu}, title = {An analysis of Bitcoin OP\_RETURN metadata}, booktitle = {International Conference on Financial Cryptography and Data Security}, pages = {218--230}, year = {2017}, organization = {Springer}, url = {https://arxiv.org/pdf/1702.01024.pdf}, }
@misc{dickerson2017adding, author = {Thomas Dickerson and Paul Gazzillo and Maurice Herlihy and Eric Koskinen}, title = {Adding Concurrency to Smart Contracts}, journal = {arXiv preprint arXiv:1702.04467}, year = {2017}, note = {Accessed: 2017-03-16}, url = {https://arxiv.org/pdf/1702.04467.pdf}, }
@misc{sergey2017concurrent, author = {Ilya Sergey and Aquinas Hobor}, title = {A Concurrent Perspective on Smart Contracts}, journal = {arXiv preprint arXiv:1702.05511}, year = {2017}, note = {Accessed: 2017-03-16}, url = {https://arxiv.org/pdf/1702.05511.pdf}, }
@misc{luu2017smart, author = {Loi Luu and Yaron Velner and Jason Teutsch and Prateek Saxena}, title = {SMART POOL : Practical Decentralized Pooled Mining}, journal = {Cryptology ePrint Archive, Report 2017/019}, year = {2017}, note = {Accessed: 2017-03-22}, url = {http://eprint.iacr.org/2017/019.pdf}, }
@misc{dinh2017blockbench, author = {Tien Tuan Anh Dinh and Ji Wang and Gang Chen and Rui Liu and Beng Chin Ooi and Kian-Lee Tan}, title = {BLOCKBENCH: A Framework for Analyzing Private Blockchains}, journal = {arXiv preprint arXiv:1703.04057}, year = {2017}, note = {Accessed: 2017-03-22}, url = {https://arxiv.org/pdf/1703.04057.pdf}, }
@misc{crain2017leader, author = {Tyler Crain and Vincent Gramoli and Mikel Larrea and Michel Raynal}, title = {(Leader/Randomization/Signature)-free Byzantine Consensus for Consortium Blockchains}, journal = {arXiv preprint arXiv:1702.03068}, year = {2017}, note = {Accessed: 2017-03-22}, url = {https://arxiv.org/pdf/1702.03068.pdf}, }
@inproceedings{pass2017analysis, author = {Rafael Pass and Lior Seeman and Abhi Shelat}, title = {Analysis of the blockchain protocol in asynchronous networks}, booktitle = {Annual International Conference on the Theory and Applications of Cryptographic Techniques}, pages = {643--673}, year = {2017}, organization = {Springer}, url = {https://eprint.iacr.org/2016/454.pdf}, }
@misc{di2017smart, author = {Emanuele Di Pascale and Jasmina McMenamy and Irene Macaluso and Linda Doyle}, title = {Smart Contract SLAs for Dense Small-Cell-as-a-Service}, journal = {arXiv preprint arXiv:1703.04502}, year = {2017}, note = {Accessed: 2017-03-22}, url = {https://arxiv.org/pdf/1703.04502.pdf}, }
@misc{chen2017under, author = {Ting Chen and Xiaoqi Li and Xiapu Luo and Xiaosong Zhang}, title = {Under-Optimized Smart Contracts Devour Your Money}, journal = {arXiv preprint arXiv:1703.03994}, year = {2017}, note = {Accessed: 2017-03-22}, url = {https://arxiv.org/pdf/1703.03994.pdf}, }
@misc{bartoletti2017dissecting, author = {Massimo Bartoletti and Salvatore Carta and Tiziana Cimoli and Roberto Saia}, title = {Dissecting Ponzi schemes on Ethereum: identification, analysis, and impact}, journal = {arXiv preprint arXiv:1703.03779}, year = {2017}, note = {Accessed: 2017-03-22}, url = {https://arxiv.org/pdf/17@misc{1605.02435, Author = {Siamak Solat and Maria Potop-Butucaru}, Title = {ZeroBlock: Timestamp-Free Prevention of Block-Withholding Attack in Bitcoin}, Year = {2016}, Eprint = {arXiv:1605.02435}, }03.03779.pdf}, }
@misc{miller2017sprites, author = {Andrew Miller and Iddo Bentov and Ranjit Kumaresan and Patrick McCorry}, title = {Sprites: Payment Channels that Go Faster than Lightning}, journal = {arXiv preprint arXiv:1702.05812}, year = {2017}, note = {Accessed: 2017-03-22}, url = {https://arxiv.org/pdf/1702.05812.pdf}, }
@misc{boyd2017key, author = {Colin Boyd and Xavier Boyen and Christopher Carr and Thomas Haines}, title = {Key Recovery: Inert and Public}, journal = {Cryptology ePrint Archive, Report 2017/243}, year = {2017}, note = {Accessed: 2017-03-22}, url = {http://eprint.iacr.org/2017/243.pdf}, }
@misc{kaptchuk2017managing, author = {Gabriel Kaptchuk and Ian Miers and Matthew Green}, title = {Managing Secrets with Consensus Networks: Fairness, Ransomware and Access Control}, journal = {Cryptology ePrint Archive, Report 2017/201}, year = {2017}, note = {Accessed: 2017-03-22}, url = {http://eprint.iacr.org/2017/201.pdf}, }
@misc{puddu2017muchain, author = {Srdjan Capkun Ivan Puddu}, title = {$\mu$chain: How to Forget without Hard Forks}, journal = {Cryptology ePrint Archive, Report 2017/106}, year = {2017}, note = {Accessed: 2017-03-22}, url = {http://eprint.iacr.org/2017/106.pdf}, }
@misc{ruffing2017mixing, author = {Tim Ruffing and Pedro Moreno-Sanchez}, title = {Mixing Confidential Transactions: Comprehensive Transaction Privacy for Bitcoin}, journal = {Cryptology ePrint Archive, Report 2017/238}, year = {2017}, note = {Accessed: 2017-03-22}, url = {http://eprint.iacr.org/2017/238.pdf}, }
@misc{ruffing2017switch, author = {Tim Ruffing and Giulio Malavolta}, title = {Switch Commitments: A Safety Switch for Confidential Transactions}, journal = {Cryptology ePrint Archive, Report 2017/237}, year = {2017}, note = {Accessed: 2017-03-22}, url = {http://eprint.iacr.org/2017/237.pdf}, }
@misc{chepurnoy2017twinscoin, author = {Alexander Chepurnoy and Tuyet Duong and Lei Fan and Hong-Sheng Zhou}, title = {TwinsCoin: A Cryptocurrency via Proof-of-Work and Proof-of-Stake}, journal = {Cryptology ePrint Archive, Report 2017/232}, year = {2017}, note = {Accessed: 2017-03-22}, url = {http://eprint.iacr.org/2017/232.pdf}, }
@misc{zhang2017rem, author = {Fan Zhang and Ittay Eyal and Robert Escriva and Ari Juels and Robbert Renesse}, title = {REM: Resource-Efficient Mining for Blockchains}, journal = {Cryptology ePrint Archive, Report 2017/179}, year = {2017}, note = {Accessed: 2017-03-24}, url = {http://eprint.iacr.org/2017/179.pdf}, }
@misc{cascudo2017scrape, author = {Ignacio Cascudo and Bernardo David}, title = {SCRAPE: Scalable Randomness Attested by Public Entities}, journal = {Cryptology ePrint Archive, Report 2017/216}, year = {2017}, note = {Accessed: 2017-03-24}, url = {http://eprint.iacr.org/2017/216.pdf}, }
@misc{miller2017empirical, author = {Andrew Miller and Malte Moeser and Kevin Lee and Arvind Narayanan}, title = {An Empirical Analysis of Linkability in the Monero Blockchain}, journal = {arXiv preprint arXiv:1704.04299}, year = {2017}, note = {Accessed: 2017-04-24}, url = {https://arxiv.org/pdf/1704.04299.pdf}, }
@misc{dorri2017blockchaindistributed, author = {Ali Dorri and Marco Steger and Salil S Kanhere and Raja Jurdak}, title = {BlockChain: A distributed solution to automotive security and privacy}, journal = {arXiv preprint arXiv:1704.00073}, year = {2017}, note = {Accessed: 2017-04-24}, url = {https://arxiv.org/pdf/1704.00073.pdf}, }
@misc{pappalardo2017blockchain, author = {Giuseppe Pappalardo and T Di Matteo and Guido Caldarelli and Tomaso Aste}, title = {Blockchain Inefficiency in the Bitcoin Peers Network}, journal = {arXiv preprint arXiv:1704.01414}, year = {2017}, note = {Accessed: 2017-04-24}, url = {https://arxiv.org/pdf/1704.01414.pdf}, }
@misc{rowan2017securing, author = {Sean Rowan and Michael Clear and Mario Gerla and Meriel Huggard and Ciar{\'a}n Mc Goldrick}, title = {Securing Vehicle to Vehicle Communications using Blockchain through Visible Light and Acoustic Side-Channels}, journal = {arXiv preprint arXiv:1704.02553}, year = {2017}, note = {Accessed: 2017-04-24}, url = {https://arxiv.org/pdf/1704.02553.pdf}, }
@misc{danzi2017distributed, author = {Pietro Danzi and Marko Angjelichinoski and {\v{C}}edomir Stefanovi{\'c} and Petar Popovski}, title = {Distributed Proportional-Fairness Control in MicroGrids via Blockchain Smart Contracts}, journal = {arXiv preprint arXiv:1705.01453}, year = {2017}, note = {Accessed: 2017-04-24}, url = {https://arxiv.org/pdf/1705.01453.pdf}, }
@misc{english2017conditions, author = {S Matthew English and Ehsan Nezhadian}, title = {Conditions of Full Disclosure: The Blockchain Remuneration Model}, journal = {arXiv preprint arXiv:1703.04196}, year = {2017}, note = {Accessed: 2017-04-24}, url = {https://arxiv.org/pdf/1703.04196.pdf}, }
@misc{porru2017blockchain, author = {Simone Porru and Andrea Pinna and Michele Marchesi and Roberto Tonelli}, title = {Blockchain-oriented Software Engineering: Challenges and New Directions}, journal = {arXiv preprint arXiv:1702.05146}, year = {2017}, note = {Accessed: 2017-04-24}, url = {https://arxiv.org/pdf/1702.05146.pdf}, }
@misc{malavolta2017concurrency, author = {Giulio Malavolta and Pedro Moreno-Sanchez and Aniket Kate and Matteo Maffei and Srivatsan Ravi}, title = {Concurrency and Privacy with Payment-Channel Networks}, year = {2017}, note = {Accessed: 2017-06-29}, url = {https://www.cs.purdue.edu/homes/pmorenos/public/paychannels.pdf}, }
@misc{tarasov2017internet, author = {Pavel Tarasov and Hitesh Tewari}, title = {Internet Voting Using Zcash}, howpublished = {Cryptology ePrint Archive, Report 2017/585}, year = {2017}, note = {Accessed: 2017-06-29}, url = {http://eprint.iacr.org/2017/585.pdf}, }
@misc{david2017ouroboros, author = {Bernardo David and Peter Ga{\v{z}}i and Aggelos Kiayias and Alexander Russell}, title = {Ouroboros Praos: An adaptively-secure, semi-synchronous proof-of-stake protocol}, howpublished = {Cryptology ePrint Archive, Report 2017/573}, year = {2017}, note = {Accessed: 2017-06-29}, url = {http://eprint.iacr.org/2017/573.pdf}, }
@misc{campanelli2017zero, author = {Matteo Campanelli and Rosario Gennaro and Steven Goldfeder and Luca Nizzardo}, title = {Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services}, howpublished = {Cryptology ePrint Archive, Report 2017/566}, year = {2017}, note = {Accessed: 2017-06-29}, url = {http://eprint.iacr.org/2017/566.pdf}, }
@misc{altawy2017lelantos, author = {Riham AlTawy and Muhammad ElSheikh and Amr M. Youssef and Guang Gong}, title = {Lelantos: A Blockchain-based Anonymous Physical Delivery System}, howpublished = {Cryptology ePrint Archive, Report 2017/465}, year = {2017}, note = {Accessed: 2017-06-29}, url = {http://eprint.iacr.org/2017/465.pdf}, }
@misc{gilad2017algorand, author = {Yossi Gilad and Rotem Hemo and Silvio Micali and Georgios Vlachos and Nickolai Zeldovich}, title = {Algorand: Scaling Byzantine Agreements for Cryptocurrencies}, howpublished = {Cryptology ePrint Archive, Report 2017/454}, year = {2017}, note = {Accessed: 2017-06-29}, url = {http://eprint.iacr.org/2017/454.pdf}, }
@misc{li2017block, author = {Huige Li and Haibo Tian and Fangguo Zhang}, title = {Block Chain based Searchable Symmetric Encryption}, howpublished = {Cryptology ePrint Archive, Report 2017/447}, year = {2017}, note = {Accessed: 2017-06-29}, url = {http://eprint.iacr.org/2017/447.pdf}, }
@misc{li2017crowdbc, author = {Ming Li and Jian Weng and Anjia Yang and Wei Lu}, title = {CrowdBC: A Blockchain-based Decentralized Framework for Crowdsourcing}, howpublished = {Cryptology ePrint Archive, Report 2017/444}, year = {2017}, note = {Accessed: 2017-06-29}, url = {http://eprint.iacr.org/2017/444.pdf}, }
@misc{kokoris2017omniledger, author = {Eleftherios Kokoris-Kogias and Philipp Jovanovic and Linus Gasser and Nicolas Gailly and Bryan Ford}, title = {OmniLedger: A Secure, Scale-Out, Decentralized Ledger}, howpublished = {Cryptology ePrint Archive, Report 2017/406}, year = {2017}, note = {Accessed: 2017-06-29}, url = {http://eprint.iacr.org/2017/406.pdf}, }
@misc{perez2017double, author = {Cristina P{\' e}rez-Sol{\` a} and Sergi Delgado-Segura and Guillermo Navarro-Arribas and Jordi Herrera-Joancomart{\' i}}, title = {Double-spending Prevention for Bitcoin zero-confirmation transactions}, howpublished = {Cryptology ePrint Archive, Report 2017/394}, year = {2017}, note = {Accessed: 2017-06-29}, url = {http://eprint.iacr.org/2017/394.pdf}, }
@misc{wust2017do, author = {Karl W{\" u}st and Arthur Gervais}, title = {Do you need a Blockchain?}, howpublished = {Cryptology ePrint Archive, Report 2017/375}, year = {2017}, note = {Accessed: 2017-06-29}, url = {http://eprint.iacr.org/2017/375.pdf}, }
@misc{kumar2017traceability, author = {Amrit Kumar and Cl\'{e}ment Fischer and Shruti Tople and Prateek Saxena}, title = {A Traceability Analysis of Monero's Blockchain}, howpublished = {Cryptology ePrint Archive, Report 2017/338}, year = {2017}, note = {Accessed: 2017-06-29}, url = {http://eprint.iacr.org/2017/338.pdf}, }
@misc{cecchetti2017solidus, author = {Ethan Cecchetti and Fan Zhang and Yan Ji and Ahmed Kosba and Ari Juels and Elaine Shi}, title = {Solidus: Confidential Distributed Ledger Transactions via PVORM}, howpublished = {Cryptology ePrint Archive, Report 2017/317}, year = {2017}, note = {Accessed: 2017-06-29}, url = {http://eprint.iacr.org/2017/317.pdf}, }
@misc{bentov2017tortoise, author = {Iddo Bentov and Pavel Hub\'{a}\v{c}ek and Tal Moran and Asaf Nadler}, title = {Tortoise and Hares Consensus: the Meshcash Framework for Incentive-Compatible, Scalable Cryptocurrencies}, howpublished = {Cryptology ePrint Archive, Report 2017/300}, year = {2017}, note = {Accessed: 2017-06-29}, url = {http://eprint.iacr.org/2017/300.pdf}, }
@misc{narayanan2017obfuscation, author = {Arvind Narayanan and Malte M{\" o}ser}, Title = {Obfuscation in Bitcoin: Techniques and Politics}, Year = {2017}, note = {Accessed: 2017-06-29}, url = {https://arxiv.org/pdf/1706.05432.pdf}, }
@misc{recabarren2017hardening, author = {Ruben Recabarren and Bogdan Carbunar}, Title = {Hardening Stratum, the Bitcoin Pool Mining Protocol}, Year = {2017}, howpublished = {arXiv:1703.06545}, note = {Accessed: 2017-06-29}, url = {https://arxiv.org/pdf/1703.06545.pdf}, }
@misc{fanti2017anonymity, author = {Giulia Fanti and Pramod Viswanath}, Title = {Anonymity Properties of the Bitcoin P2P Network}, Year = {2017}, howpublished = {arXiv:1703.08761}, note = {Accessed: 2017-06-29}, url = {https://arxiv.org/pdf/1703.08761.pdf}, }
@misc{ren2017practical, author = {Ling Ren and Kartik Nayak and Ittai Abraham and Srinivas Devadas}, Title = {Practical Synchronous Byzantine Consensus}, Year = {2017}, howpublished = {arXiv:1704.02397}, note = {Accessed: 2017-06-29}, url = {https://arxiv.org/pdf/1704.02397.pdf}, }
@misc{riemann2017distributed, author = {Robert Riemann and St{\' e}phane Grumbach}, Title = {Distributed Protocols at the Rescue for Trustworthy Online Voting}, Year = {2017}, howpublished = {arXiv:1705.04480}, Doi = {10.5220/0006228504990505}, note = {Accessed: 2017-06-29}, url = {https://arxiv.org/pdf/1705.04480.pdf}, }
@misc{kiktenko2017quantum, author = {E. O. Kiktenko and N. O. Pozhar and M. N. Anufriev and A. S. Trushechkin and R. R. Yunusov and Y. V. Kurochkin and A. I. Lvovsky and A. K. Fedorov}, Title = {Quantum-secured blockchain}, Year = {2017}, howpublished = {arXiv:1705.09258}, note = {Accessed: 2017-06-29}, url = {https://arxiv.org/pdf/1705.09258.pdf}, }
@misc{jaiyeola2017good, author = {Mercy O. Jaiyeola and Kyle Patron and Jared Saia and Maxwell Young and Qian M. Zhou}, Title = {Good Things Come in LogLog(n)-Sized Packages: Robustness with Small Quorums}, Year = {2017}, howpublished = {arXiv:1705.10387}, note = {Accessed: 2017-06-29}, url = {https://arxiv.org/pdf/1705.10387.pdf}, }
@misc{ren2017implicit, author = {Zhijie Ren and Kelong Cong and Johan Pouwelse and Zekeriya Erkin}, Title = {Implicit Consensus: Blockchain with Unbounded Throughput}, Year = {2017}, howpublished = {arXiv:1705.11046}, note = {Accessed: 2017-06-29}, url = {https://arxiv.org/pdf/1705.11046.pdf}, }
@misc{conti2017survey, author = {Mauro Conti and Sandeep Kumar E and Chhagan Lal and Sushmita Ruj}, Title = {A Survey on Security and Privacy Issues of Bitcoin}, Year = {2017}, howpublished = {arXiv:1706.00916}, note = {Accessed: 2017-06-29}, url = {https://arxiv.org/pdf/1706.00916.pdf}, }
@misc{moinet2017blockchain, author = {Axel Moinet and Beno{\^ i}t Darties and Jean-Luc Baril}, Title = {Blockchain based trust {\&} authentication for decentralized sensor networks}, Year = {2017}, howpublished = {arXiv:1706.01730}, note = {Accessed: 2017-06-29}, url = {https://arxiv.org/pdf/1706.01730.pdf}, }
@misc{moreno2017mind, author = {Pedro Moreno-Sanchez and Navin Modi and Raghuvir Songhela and Aniket Kate and Sonia Fahmy}, Title = {Mind Your Credit: Assessing the Health of the Ripple Credit Network}, Year = {2017}, howpublished = {arXiv:1706.02358}, note = {Accessed: 2017-06-29}, url = {https://arxiv.org/pdf/1706.02358.pdf}, }
@misc{neisse2017blockchain, author = {Ricardo Neisse and Gary Steri and Igor Nai-Fovino}, Title = {A Blockchain-based Approach for Data Accountability and Provenance Tracking}, Year = {2017}, howpublised = {arXiv:1706.04507}, note = {Accessed: 2017-06-29}, url = {https://arxiv.org/pdf/1706.04507.pdf}, }
@misc{ball2017proofs, author = {Marshall Ball and Alon Rosen and Manuel Sabin and Prashant Nalini Vasudevan}, title = {Proofs of Useful Work}, journal = {IACR Cryptology ePrint Archive}, volume = {2017}, pages = {203}, year = {2017}, note = {Accessed: 2017-06-29}, url = {http://eprint.iacr.org/2017/203.pdf}, }
@misc{zhang2017necessity, author = {Ren Zhang and Bart Preneel}, title = {On the Necessity of a Prescribed Block Validity Consensus: Analyzing Bitcoin Unlimited Mining Protocol}, year = {2017}, note = {Accessed: 2017-07-20}, url = {http://eprint.iacr.org/2017/686.pdf}, }
@misc{meshkov2017revisiting, author = {Dmitry Meshkov and Alexander Chepurnoy and Marc Jansen}, title = {Revisiting Difficulty Control for Blockchain Systems}, howpublished = {Cryptology ePrint Archive, Report 2017/731}, year = {2017}, note = {Accessed: 2017-08-03}, url = {http://eprint.iacr.org/2017/731.pdf}, }
@misc{zhang2017anonymous, author = {Huang Zhang and Fangguo Zhang and Haibo Tian and Man Ho Au}, title = {Anonymous Post-Quantum Cryptocash}, howpublished = {Cryptology ePrint Archive, Report 2017/716}, year = {2017}, note = {Accessed: 2017-08-03}, url = {http://eprint.iacr.org/2017/716.pdf}, }
@misc{poon2017plasma, author = {Joseph Poon and Vitalik Buterin}, title = {Plasma: Scalable Autonomous Smart Contracts}, year = {2017}, month = {Aug}, note = {Accessed: 2017-08-10}, url = {https://plasma.io/plasma.pdf}, }
@misc{tang2017improved, author = {Shuyang Tang and Zhiqiang Liu and Zhen Liu and Yu Long and Shengli Liu}, title = {Improved Hybrid Consensus Scheme with Privacy-preserving Property.}, howpublished = {IACR Cryptology ePrint Archive}, pages = {192}, year = {2017}, note = {Accessed: 2017-08-11}, url = {https://eprint.iacr.org/eprint-bin/getfile.pl?entry=2017/192&version=20170228:193152&file=192.pdf}, }
@misc{beccuti2017bitcoin, author = {Juan Beccuti and Christian Jaag and others}, title = {The Bitcoin Mining Game: On the Optimality of Honesty in Proof-of-work Consensus Mechanism}, year = {2017}, note = {Accessed: 2017-08-11}, url = {http://www.swiss-economics.ch/RePEc/files/0060JaagBeccuti.pdf}, }
@misc{setty2017enabling, author = {Srinath Setty and Soumya Basu and Lidong Zhou and Michael Lowell Roberts and Ramarathnam Venkatesan}, title = {Enabling secure and resource-efficient blockchain networks with VOLT}, year = {2017}, month = {August}, note = {Accessed: 2017-08-21}, url = {https://www.microsoft.com/en-us/research/wp-content/uploads/2017/08/volt.pdf}, }
@misc{garay2017proofs, author = {Juan A. Garay and Aggelos Kiayias and Giorgos Panagiotakos}, title = {Proofs of Work for Blockchain Protocols}, howpublished = {Cryptology ePrint Archive, Report 2017/775}, year = {2017}, url = {https://eprint.iacr.org/2017/775.pdf}, }
@misc{dinh2017untangling, author = {Tien Tuan Anh Dinh and Rui Liu and Meihui Zhang and Gang Chen and Beng Chin Ooi and Ji Wang}, title = {Untangling Blockchain: A Data Processing View of Blockchain Systems}, howpublished = {arXiv preprint arXiv:1708.05665}, year = {2017}, note = {Accessed: 2017-08-26}, url = {https://arxiv.org/pdf/1708.05665.pdf}, }
@misc{ozisik2017estimation, author = {A. Pinar Ozisik and George Bissias and Brian Levine}, Title = {Estimation of Miner Hash Rates and Consensus on Blockchains}, Year = {2017}, howpublished = {arXiv preprint arXiv:1707.00082}, note = {Accessed:2017-09-25}, url = {https://arxiv.org/pdf/1707.00082.pdf}, }
@misc{bartoletti2017general, author = {Massimo Bartoletti and Andrea Bracciali and Stefano Lande and Livio Pompianu}, Title = {A general framework for Bitcoin analytics}, Year = {2017}, howpublished = {arXiv:1707.01021}, note = {Accessed:2017-09-25}, url = {https://arxiv.org/pdf/1707.01021.pdf}, }
@misc{bruennler2017logic, author = {Kai Br{\" u}nnler and Dandolo Flumini and Thomas Studer}, Title = {A Logic of Blockchain Updates}, Year = {2017}, howpublished = {arXiv:1707.01766}, note = {Accessed:2017-09-25}, url = {https://arxiv.org/pdf/1707.01766.pdf}, }
@misc{dong2017betrayal, author = {Changyu Dong and Yilei Wang and Amjad Aldweesh and Patrick McCorry and Aad Moorsel}, Title = {Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing}, Year = {2017}, howpublished = {arXiv:1708.01171}, note = {Accessed:2017-09-25}, url = {https://arxiv.org/pdf/1708.01171.pdf}, }
@misc{1708.03468, author = {Thanh Bui and Tuomas Aura}, Title = {Key exchange with the help of a public ledger}, Year = {2017}, howpublished = {arXiv:1708.03468}, note = {Accessed:2017-09-25}, url = {https://arxiv.org/pdf/1708.03468.pdf}, }
@misc{albassam2017chainspace, author = {Mustafa Al-Bassam and Alberto Sonnino and Shehar Bano and Dave Hrycyszyn and George Danezis}, Title = {Chainspace: A Sharded Smart Contracts Platform}, Year = {2017}, howpublished = {arXiv:1708.03778}, note = {Accessed:2017-09-25}, url = {https://arxiv.org/pdf/1708.03778.pdf}, }
@misc{goldfeder2017when, author = {Steven Goldfeder and Harry Kalodner and Dillon Reisman and Arvind Narayanan}, Title = {When the cookie meets the blockchain: Privacy risks of web payments via cryptocurrencies}, Year = {2017}, howpublished = {arXiv:1708.04748}, note = {Accessed:2017-09-25}, url = {https://arxiv.org/pdf/1708.04748.pdf}, }
@misc{tasca2017ontology, author = {Paolo Tasca and Thayabaran Thanabalasingham and Claudio J. Tessone}, Title = {Ontology of Blockchain Technologies. Principles of Identification and Classification}, Year = {2017}, howpublished = {arXiv:1708.04872}, note = {Accessed:2017-09-25}, url = {https://arxiv.org/pdf/1708.04872.pdf}, }
@misc{rosenfeld2017predicting, author = {Meni Rosenfeld}, Title = {Predicting Block Halving Party Times}, Year = {2017}, howpublished = {arXiv:1708.05185}, note = {Accessed:2017-09-25}, url = {https://arxiv.org/pdf/1708.05185.pdf}, }
@misc{chatzopoulos2017localcoin, author = {Dimitris Chatzopoulos and Sujit Gujar and Boi Faltings and Pan Hui}, Title = {LocalCoin: An Ad-hoc Payment Scheme for Areas with High Connectivity}, Year = {2017}, howpublished = {arXiv:1708.08086}, note = {Accessed:2017-09-25}, url = {https://arxiv.org/pdf/1708.08086.pdf}, }
@misc{oliver2017proposal, author = {Carlos G. Oliver and Alessandro Ricottone and Pericles Philippopoulos}, Title = {Proposal for a fully decentralized blockchain and proof-of-work algorithm for solving NP-complete problems}, Year = {2017}, howpublished = {arXiv:1708.09419}, note = {Accessed:2017-09-25}, url = {https://arxiv.org/pdf/1708.09419.pdf}, }
@misc{kwon2017selfish, author = {Yujin Kwon and Dohyun Kim and Yunmok Son and Eugene Vasserman and Yongdae Kim}, Title = {Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin}, Year = {2017}, howpublished = {arXiv:1708.09790}, note = {Accessed:2017-09-25}, url = {https://arxiv.org/pdf/1708.09790.pdf}, }
@misc{kalodner2017blocksci, author = {Harry Kalodner and Steven Goldfeder and Alishah Chator and Malte M{\" o}ser and Arvind Narayanan}, Title = {BlockSci: Design and applications of a blockchain analysis platform}, Year = {2017}, howpublished = {arXiv:1709.02489}, note = {Accessed:2017-09-25}, url = {https://arxiv.org/pdf/1709.02489.pdf}, }
@misc{roos2017settling, author = {Stefanie Roos and Pedro Moreno-Sanchez and Aniket Kate and Ian Goldberg}, Title = {Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions}, Year = {2017}, howpublished = {arXiv:1709.05748}, note = {Accessed:2017-09-25}, url = {https://arxiv.org/pdf/1709.05748.pdf}, }
@misc{dubovitskaya2017secure, author = {Alevtina Dubovitskaya and Zhigang Xu and Samuel Ryu and Michael Schumacher and Fusheng Wang}, Title = {Secure and Trustable Electronic Medical Records Sharing using Blockchain}, Year = {2017}, howpublished = {arXiv:1709.06528}, note = {Accessed:2017-09-25}, url = {https://arxiv.org/pdf/1709.06528.pdf}, }
@misc{wang2017towards, author = {Liang Wang and Ivan Pustogarov}, Title = {Towards Better Understanding of Bitcoin Unreachable Peers}, Year = {2017}, howpublished = {arXiv:1709.06837}, note = {Accessed:2017-09-25}, url = {https://arxiv.org/pdf/1709.06837.pdf}, }
@misc{sousa2017byzantine, author = {Jo{\~ a}o Sousa and Alysson Bessani and Marko Vukoli{\' c}}, Title = {A Byzantine Fault-Tolerant Ordering Service for the Hyperledger Fabric Blockchain Platform}, Year = {2017}, howpublished = {arXiv:1709.06921}, note = {Accessed:2017-09-25}, url = {https://arxiv.org/pdf/1709.06921.pdf}, }
@misc{pinna2017petri, author = {Andrea Pinna and Roberto Tonelli and Matteo Orr{\' u} and Michele Marchesi}, Title = {A Petri Nets Model for Blockchain Analysis}, Year = {2017}, howpublished = {arXiv:1709.07790}, note = {Accessed:2017-09-25}, url = {https://arxiv.org/pdf/1709.07790.pdf}, }
@misc{badertscher2017bitcoin, author = {Christian Badertscher and Ueli Maurer and Daniel Tschudi and Vassilis Zikas}, title = {Bitcoin as a Transaction Ledger: A Composable Treatment}, howpublished = {Cryptology ePrint Archive, Report 2017/149}, year = {2017}, note = {Accessed:2017-09-26}, url = {https://eprint.iacr.org/2017/149.pdf}, }
@misc{liu2017fork, author = {Zhiqiang Liu and Shuyang Tang and Sherman S.M. Chow and Zhen Liu and Yu Long}, title = {Fork-Free Hybrid Consensus with Flexible Proof-of-Activity}, howpublished = {Cryptology ePrint Archive, Report 2017/367}, year = {2017}, note = {Accessed:2017-09-26}, url = {http://eprint.iacr.org/2017/367.pdf}, }
@misc{zhang2017zchannel, author = {Yuncong Zhang and Yu Long and Zhen Liu and Zhiqiang Liu and Dawu Gu}, title = {Z-Channel: Scalable and Efficient Scheme in Zerocash}, howpublished = {Cryptology ePrint Archive, Report 2017/684}, year = {2017}, note = {Accessed:2017-09-26}, url = {http://eprint.iacr.org/2017/684.pdf}, }
@misc{khalil2017revive, author = {Rami Khalil and Arthur Gervais}, title = {Revive: Rebalancing Off-Blockchain Payment Networks}, howpublished = {Cryptology ePrint Archive, Report 2017/823}, year = {2017}, note = {Accessed:2017-09-26}, url = {http://eprint.iacr.org/2017/823.pdf}, }
@misc{sanchez2017raziel, author = {David Cerezo S{\' a}nchez}, title = {Raziel: Private and Verifiable Smart Contracts on Blockchains}, howpublished = {Cryptology ePrint Archive, Report 2017/878}, year = {2017}, note = {Accessed:2017-09-26}, url = {http://eprint.iacr.org/2017/878.pdf}, }
@misc{meiklejohn2017moebius, author = {Sarah Meiklejohn and Rebekah Mercer}, title = {M{\"o}bius: Trustless Tumbling for Transaction Privacy}, howpublished = {Cryptology ePrint Archive, Report 2017/881}, year = {2017}, note = {Accessed:2017-09-26}, url = {http://eprint.iacr.org/2017/881.pdf}, }
@misc{david2017kaleidoscope, author = {Bernardo David and Rafael Dowsley and Mario Larangeira}, title = {Kaleidoscope: An Efficient Poker Protocol with Payment Distribution and Penalty Enforcement}, howpublished = {Cryptology ePrint Archive, Report 2017/899}, year = {2017}, note = {Accessed:2017-09-26}, url = {http://eprint.iacr.org/2017/899.pdf}, }
@misc{pass2017thunderella, author = {Rafael Pass and Elaine Shi}, title = {Thunderella: Blockchains with Optimistic Instant Confirmation}, howpublished = {Cryptology ePrint Archive, Report 2017/913}, year = {2017}, note = {Accessed:2017-09-26}, url = {http://eprint.iacr.org/2017/913.pdf}, }
@misc{eckey2017efficient, author = {Lisa Eckey and Sebastian Faust and Julian Loss}, title = {Efficient Algorithms for Broadcast and Consensus Based on Proofs of Work}, howpublished = {Cryptology ePrint Archive, Report 2017/915}, year = {2017}, note = {Accessed:2017-09-26}, url = {http://eprint.iacr.org/2017/915.pdf}, }
@misc{sun2017ringct, author = {Shi-Feng Sun and Man Ho Au and Joseph K. Liu and Tsz Hon Yuen and Dawu Gu}, title = {RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero}, howpublished = {Cryptology ePrint Archive, Report 2017/921}, year = {2017}, note = {Accessed:2017-09-26}, url = {http://eprint.iacr.org/2017/921.pdf}, }
@misc{goyal2017overcoming, author = {Rishab Goyal and Vipul Goyal}, title = {Overcoming Cryptographic Impossibility Results using Blockchains}, howpublished = {Cryptology ePrint Archive, Report 2017/935}, year = {2017}, note = {Accessed:2017-09-26}, url = {http://eprint.iacr.org/2017/935.pdf}, }
@misc{cachin2017blockchain, author = {Christian Cachin and Marko Vukoli{\'c}}, Title = {Blockchain Consensus Protocols in the Wild}, Year = {2017}, howpublished = {arXiv:1707.01873}, note = {Accessed:2017-09-26}, url = {https://arxiv.org/pdf/1707.01873.pdf}, }
@misc{kiayias2017noninteractive, author = {Aggelos Kiayias and Andrew Miller and Dionysis Zindros}, title = {Non-interactive proofs of proof-of-work}, howpublished = {Cryptology ePrint Archive, Report 2017/963}, year = {2017}, note = {Accessed:2017-10-03}, url = {https://eprint.iacr.org/2017/963.pdf}, }
@misc{fisch2017socially, author = {Ben A Fisch and Rafael Pass and Abhi Shelat}, title = {Socially Optimal Mining Pools}, howpublished = {arXiv preprint arXiv:1703.03846}, year = {2017}, note = {Accessed:2017-10-05}, url = {https://arxiv.org/pdf/1703.03846.pdf}, }
@misc{teutsch2017scalable, author = {Jason Teutsch and Christian Reitwie{\ss}ner}, title = {A scalable verification solution for blockchains}, year = {2017}, month = {March}, note = {Accessed:2017-10-06}, url = {https://people.cs.uchicago.edu/~teutsch/papers/truebit.pdf}, }
@misc{tran2017obscuro, author = {Muoi Tran and Loi Luu and Min Suk Kang and Iddo Bentov and Prateek Saxena}, title = {Obscuro: A Bitcoin Mixer using Trusted Execution Environments}, howpublished = {Cryptology ePrint Archive, Report 2017/974}, year = {2017}, note = {Accessed:2017-10-06}, url = {http://eprint.iacr.org/2017/974.pdf}, }
@misc{alwen2017moderately, author = {Jo{\" e}l Alwen and Bj{\" o}rn Tackmann}, title = {Moderately Hard Functions: Definition, Instantiations, and Applications}, howpublished = {Cryptology ePrint Archive, Report 2017/945}, year = {2017}, note = {Accessed:2017-10-06}, url = {http://eprint.iacr.org/2017/945.pdf}, }
@misc{alharby2017blockchain, author = {Maher Alharby and Aad Moorsel}, Title = {Blockchain-based Smart Contracts: A Systematic Mapping Study}, Year = {2017}, Howpublished = {Fourth International Conference on Computer Science and Information Technology (CSIT-2017)}, note = {Accessed:2017-10-20}, url = {https://arxiv.org/pdf/1710.06372.pdf}, }
@misc{ali2017nuts, author = {Syed Taha Ali and Dylan Clarke and Patrick McCorry}, Title = {The Nuts and Bolts of Micropayments: A Survey}, Year = {2017}, howpublished = {arXiv:1710.02964}, note = {Accessed:2017-10-20}, url = {https://arxiv.org/pdf/1710.02964.pdf}, }
@misc{augot2017transforming, author = {Daniel Augot and Herv{\' e} Chabanne and Olivier Cl{\' e}mot and William George}, Title = {Transforming face-to-face identity proofing into anonymous digital identity using the Bitcoin blockchain}, Year = {2017}, howpublished = {arXiv:1710.02951}, note = {Accessed:2017-10-20}, url = {https://arxiv.org/pdf/1710.02951.pdf}, }
@misc{aggarwal2017quantum, author = {Divesh Aggarwal and Gavin K. Brennen and Troy Lee and Miklos Santha and Marco Tomamichel}, Title = {Quantum attacks on Bitcoin, and how to protect against them}, Year = {2017}, howpublished = {arXiv:1710.10377}, note = {Accessed:2017-11-06}, url = {https://arxiv.org/pdf/1710.10377.pdf}, }
@misc{buterin2017casper, author = {Vitalik Buterin and Virgil Griffith}, Title = {Casper the Friendly Finality Gadget}, Year = {2017}, howpublished = {arXiv:1710.09437}, note = {Accessed:2017-11-06}, url = {https://arxiv.org/pdf/1710.09437.pdf}, }
@misc{blass2017strain, author = {Erik-Oliver Blass and Florian Kerschbaum}, title = {Strain: A Secure Auction for Blockchains}, howpublished = {Cryptology ePrint Archive, Report 2017/1044}, year = {2017}, note = {Accessed:2017-11-06}, url = {http://eprint.iacr.org/2017/1044.pdf}, }
@misc{eze2017triplicate, author = {Peter Eze and Tochukwu Eziokwu and Chinedu Okpara}, title = {A Triplicate Smart Contract Model using Blockchain Technology}, year = {2017}, note = {Accessed:2017-11-06}, url = {https://www.researchgate.net/profile/Peter_Eze7/publication/317349621_A_Triplicate_Smart_Contract_Model_using_Blockchain_Technology/links/5937782c4585158f6464595f/A-Triplicate-Smart-Contract-Model-using-Blockchain-Technology.pdf}, }
@misc{chepurnoy2017space, author = {Alexander Chepurnoy and Dmitry Meshkov}, title = {On Space-Scarce Economy In Blockchain Systems}, howpublished = {Cryptology ePrint Archive, Report 2017/644}, year = {2017}, note = {Accessed:2017-11-06}, url = {http://eprint.iacr.org/2017/644.pdf}, }
@misc{bissias2017bobtail, author = {George Bissias and Brian Neil Levine}, Title = {Bobtail: A Proof-of-Work Target that Minimizes Blockchain Mining Variance}, Year = {2017}, howpublished = {arXiv:1709.08750}, note = {Accessed:2017-11-10}, url = {https://arxiv.org/pdf/1709.08750.pdf}, }
@misc{buenz2017efficient, author = {Benedikt B{\" u}nz and Jonathan Bootle and Dan Boneh and Andrew Poelstra and Pieter Wuille and Greg Maxwell}, Title = {Bulletproofs: Efficient Range Proofs for Confidential Transactions}, Year = {2017}, note = {Accessed:2017-11-10}, url = {http://web.stanford.edu/~buenz/pubs/bulletproofs.pdf}, }
@misc{espel2017proposal, author = {Thomas Espel and Laurent Katz and Guillaume Robin}, title = {Proposal for Protocol on a Quorum Blockchain with Zero Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2017/1093}, year = {2017}, note = {Accessed:2017-11-14}, url = {https://eprint.iacr.org/2017/1093.pdf}, }
@misc{dziembowski2017perun, author = {Stefan Dziembowski and Lisa Eckey and Sebastian Faust and Daniel Malinowski}, title = {PERUN: Virtual Payment Channels over Cryptographic Currencies}, howpublished = {Cryptology ePrint Archive, Report 2017/635}, year = {2017}, note = {Accessed:2017-11-20}, url = {https://eprint.iacr.org/2017/635.pdf}, }
@misc{atzei2017formal, author = {Nicola Atzei and Massimo Bartoletti and Stefano Lande and Roberto Zunino}, title = {A formal model of Bitcoin transactions}, howpublished = {Cryptology ePrint Archive, Report 2017/1124}, year = {2017}, note = {Accessed:2017-12-04}, url = {https://eprint.iacr.org/2017/1124.pdf}, }
@misc{bentov2017tesseract, author = {Iddo Bentov and Yan Ji and Fan Zhang and Yunqi Li and Xueyuan Zhao and Lorenz Breidenbach and Philip Daian and Ari Juels}, title = {Tesseract: Real-Time Cryptocurrency Exchange using Trusted Hardware}, howpublished = {Cryptology ePrint Archive, Report 2017/1153}, year = {2017}, note = {Accessed:2017-12-04}, url = {https://eprint.iacr.org/2017/1153.pdf}, }
@misc{mavridou2017designing, author = {Anastasia Mavridou and Aron Laszka}, Title = {Designing Secure Ethereum Smart Contracts: A Finite State Machine Based Approach}, Year = {2017}, note = {Accessed:2017-12-04}, howpublished = {arXiv:1711.09327}, url = {https://arxiv.org/pdf/1711.09327.pdf}, }
@misc{kiran2017dynamic, author = {Ravi Kiran Raman and Lav R. Varshney}, Title = {Dynamic Distributed Storage for Scaling Blockchains}, Year = {2017}, note = {Accessed:2017-12-04}, Eprint = {arXiv:1711.07617}, url = {https://arxiv.org/pdf/1711.07617.pdf}, }
@misc{quesnelle2017linkability, author = {Jeffrey Quesnelle}, Title = {On the linkability of Zcash transactions}, Year = {2017}, howpublished = {arXiv:1712.01210}, note = {Accessed:2017-12-11}, url = {https://arxiv.org/pdf/1712.01210.pdf}, }
@misc{bano2017consensus, author = {Shehar Bano and Alberto Sonnino and Mustafa Al-Bassam and Sarah Azouvi and Patrick McCorry and Sarah Meiklejohn and George Danezis}, Title = {Consensus in the Age of Blockchains}, Year = {2017}, howpublished = {arXiv:1711.03936}, note = {Accessed:2017-12-11}, url = {https://arxiv.org/pdf/1711.03936.pdf}, }
@misc{engelmann2017towards, author = {Felix Engelmann and Florian Glaser and Henning Kopp and Frank Kargl and Christof Weinhardt}, Title = {Towards an Economic Analysis of Routing in Payment Channel Networks}, Year = {2017}, howpublished = {arXiv:1711.02597}, Doi = {10.1145/3152824.3152826}, note = {Accessed:2017-12-11}, url = {https://arxiv.org/pdf/1711.02597.pdf}, }
@misc{norvill2017automated, author = {R Norvill and Irfan U Awan and BBF Pontiveros and Andrea J Cullen and others}, title = {Automated labeling of unknown contracts in Ethereum}, year = {2017}, note = {Accessed:2017-12-11}, url = {https://bradscholars.brad.ac.uk/bitstream/handle/10454/12220/automated-labeling-unknown(5).pdf}, }
@misc{liu2017strategy, author = {Hanqing Liu and Na Ruan and Rongtian Du and Weijia Jia}, title = {On the Strategy and Behavior of Bitcoin Mining with N-attackers}, howpublished = {Cryptology ePrint Archive, Report 2017/1255}, year = {2017}, note = {Accessed:2018-01-03}, url = {https://eprint.iacr.org/2017/1255.pdf}, }
@misc{branzei2017how, author = {Simina Br{\^ a}nzei and Erel Segal-Halevi and Aviv Zohar}, Title = {How to Charge Lightning}, Year = {2017}, howpublished = {arXiv:1712.10222}, note = {Accessed:2018-01-03}, url = {https://arxiv.org/pdf/1712.10222.pdf}, }
@misc{ersoy2017information, author = {Oguzhan Ersoy and Zhijie Ren and Zekeriya Erkin and Reginald L. Lagendijk}, Title = {Information Propagation on Permissionless Blockchains}, Year = {2017}, howpublished = {arXiv:1712.07564}, note = {Accessed:2018-01-03}, url = {https://arxiv.org/pdf/1712.07564.pdf}, }
@misc{albassam2017contour, author = {Mustafa Al-Bassam and Sarah Meiklejohn}, Title = {Contour: A Practical System for Binary Transparency}, Year = {2017}, howpublished = {arXiv:1712.08427}, note = {Accessed:2018-01-03}, url = {https://arxiv.org/pdf/1712.08427.pdf}, }
@misc{tikhomirov2017ethereum, author = {Sergei Tikhomirov}, title = {Ethereum: state of knowledge and research perspectives}, year = {2017}, note = {Accessed:2018-01-05}, url = {http://orbilu.uni.lu/bitstream/10993/32468/1/ethereum-sok.pdf}, }
@misc{abraham2017efficient, author = {Ittai Abraham and Srinivas Devadas and Danny Dolev and Kartik Nayak and Ling Ren}, title = {Efficient Synchronous Byzantine Consensus}, howpublished = {Cryptology ePrint Archive, Report 2017/307}, year = {2017}, url = {https://eprint.iacr.org/2017/307.pdf}, note = {Accessed:2018-02-07}, }
@misc{micali2017byzantine, author = {Silvio Micali}, title = {Byzantine Agreement, Made Trivial}, year = {2017}, month = {Apr}, note = {Accessed:2018-02-21}, }
@misc{garay2017blockchain, author = {Juan A. Garay and Aggelos Kiayias and Giorgos Panagiotakos}, title = {Blockchain and Consensus from Proofs of Work without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2017/775}, year = {2017}, url = {https://eprint.iacr.org/2017/775.pdf}, }
@misc{crain2017dbft, author = {Tyler Crain and Vincent Gramoli and Mikel Larrea and Michel Raynal}, Title = {DBFT: Efficient Byzantine Consensus with a Weak Coordinator and its Application to Consortium Blockchains}, Year = {2017}, url = {https://arxiv.org/pdf/1702.03068.pdf}, }
@misc{bentov2018tesseract, author = {Iddo Bentov and Yan Ji and Fan Zhang and Yunqi Li and Xueyuan Zhao and Lorenz Breidenbach and Philip Daian and Ari Juels}, title = {Tesseract: Real-Time Cryptocurrency Exchange using Trusted Hardware}, howpublished = {Cryptology ePrint Archive, Report 2017/1153}, year = {2017}, url = {https://eprint.iacr.org/2017/1153.pdf}, }
@misc{li2018designing, author = {Taotao Li and Parhat Abla and Mingsheng Wang and Qianwen Wei}, title = {Designing Proof of Transaction Puzzles for Cryptocurrency}, howpublished = {Cryptology ePrint Archive, Report 2017/1242}, year = {2017}, url = {https://eprint.iacr.org/2017/1242.pdf}, }
@misc{sergey2018scilla, author = {Ilya Sergey and Amrit Kumar and Aquinas Hobor}, Title = {Scilla: a Smart Contract Intermediate-Level LAnguage}, Year = {2018}, howpublished = {arXiv:1801.00687}, note = {Accessed:2018-01-08}, url = {https://arxiv.org/pdf/1801.00687.pdf}, }
@misc{grossman2018online, author = {Shelly Grossman and Ittai Abraham and Guy Golan-Gueta and Yan Michalevsky and Noam Rinetzky and Mooly Sagiv and Yoni Zohar}, Title = {Online Detection of Effectively Callback Free Objects with Applications to Smart Contracts}, Year = {2018}, howpublished = {arXiv:1801.04032}, note = {Accessed:2018-01-17}, url = {https://arxiv.org/pdf/1801.04032.pdf}, }
@misc{chatterjee2018quantitative, author = {Krishnendu Chatterjee and Amir Kafshdar Goharshady and Yaron Velner}, Title = {Quantitative Analysis of Smart Contracts}, Year = {2018}, howpublished = {arXiv:1801.03367}, note = {Accessed:2018-01-17}, url = {https://arxiv.org/pdf/1801.03367.pdf}, }
@misc{dunphy2018first, author = {Paul Dunphy and Fabien A. P. Petitcolas}, Title = {A First Look at Identity Management Schemes on the Blockchain}, Year = {2018}, howpublished = {arXiv:1801.03294}, note = {Accessed:2018-01-17}, url = {https://arxiv.org/pdf/1801.03294.pdf}, }
@misc{singh2018violable, author = {Munindar P. Singh and Amit K. Chopra}, Title = {Violable Contracts and Governance for Blockchain Applications}, Year = {2018}, howpublished = {arXiv:1801.02672}, note = {Accessed:2018-01-17}, url = {https://arxiv.org/pdf/1801.02672.pdf}, }
@misc{chen2018towards, author = {Yize Chen and Quanlai Li and Hao Wang}, Title = {Towards Trusted Social Networks with Blockchain Technology}, Year = {2018}, howpublished = {arXiv:1801.02796}, note = {Accessed:2018-01-17}, url = {https://arxiv.org/pdf/1801.02796.pdf}, }
@misc{shudo2018towards, author = {Kazuyuki Shudo and Kenji Saito}, Title = {Towards Application Portability on Blockchains}, Year = {2018}, howpublished = {arXiv:1801.01421}, note = {Accessed:2018-01-17}, url = {https://arxiv.org/pdf/1801.01421.pdf}, }
@misc{ren2018scaleout, author = {Zhijie Ren and Zekeriya Erkin}, Title = {A Scale-out Blockchain for Value Transfer with Spontaneous Sharding}, Year = {2018}, howpublished = {arXiv:1801.02531}, note = {Accessed:2018-01-17}, url = {https://arxiv.org/pdf/1801.02531.pdf}, }
@misc{aggarwal2018simple, author = {Abhinav Aggarwal and Yue Guo}, title = {A Simple Reduction from State Machine Replication to Binary Agreement in Partially Synchronous or Asynchronous Networks}, howpublished = {Cryptology ePrint Archive, Report 2018/060}, year = {2018}, note = {Accessed:2018-01-17}, url = {https://eprint.iacr.org/2018/060.pdf}, }
@misc{maxwell2018simple, author = {Gregory Maxwell and Andrew Poelstra and Yannick Seurin and Pieter Wuille}, title = {Simple Schnorr Multi-Signatures with Applications to Bitcoin}, howpublished = {Cryptology ePrint Archive, Report 2018/068}, year = {2018}, note = {Accessed:2018-01-22}, url = {https://eprint.iacr.org/2018/068.pdf}, }
@misc{krafft2018experimental, author = {Peter M Krafft and Nicol{\' a}s Della Penna and Alex Pentland}, title = {{A}n {E}xperimental {S}tudy of {C}ryptocurrency {M}arket {D}ynamics}, year = {2018}, eprint = {1801.05831}, howpublished = {Peter Krafft, Nicol\'as Della Penna, Alex Pentland. (2018). An Experimental Study of Cryptocurrency Market Dynamics. ACM CHI Conference on Human Factors in Computing Systems (CHI)}, doi = {10.1145/3173574.3174179}, note = {Accessed:2018-01-22}, url = {http://arxiv.org/pdf/1801.05831.pdf}, }
@misc{sompolinsky2018phantom, author = {Yonatan Sompolinsky and Aviv Zohar}, title = {PHANTOM: A Scalable BlockDAG Protocol}, howpublished = {Cryptology ePrint Archive, Report 2018/104}, year = {2018}, note = {Accessed:2018-01-31}, url = {https://eprint.iacr.org/2018/104.pdf}, }
@misc{herlihy2018atomic, author = {Maurice Herlihy}, Title = {Atomic Cross-Chain Swaps}, Year = {2018}, howpublished = {arXiv:1801.09515}, note = {Accessed:2018-01-31}, url = {https://arxiv.org/pdf/1801.09515.pdf}, }
@misc{harz2018scalability, author = {Dominik Harz and Magnus Boman}, Title = {The Scalability of Trustless Trust}, Year = {2018}, howpublished = {arXiv:1801.09535}, note = {Accessed:2018-01-31}, url = {https://arxiv.org/pdf/1801.09535.pdf}, }
@misc{zhang2018smart, author = {Yuanyu Zhang and Shoji Kasahara and Yulong Shen and Xiaohong Jiang and Jianxiong Wan}, Title = {Smart Contract-Based Access Control for the Internet of Things}, Year = {2018}, howpublished = {arXiv:1802.04410}, note = {Accessed:2018-02-16}, url = {https://arxiv.org/pdf/1802.04410.pdf}, }
@misc{cohen2018simple, author = {Bram Cohen and Krzysztof Pietrzak}, title = {Simple Proofs of Sequential Work}, howpublished = {Cryptology ePrint Archive, Report 2018/183}, year = {2018}, note = {Accessed:2018-02-16}, url = {https://eprint.iacr.org/2018/183.pdf}, }
@misc{badertscher2018but, author = {Christian Badertscher and Juan Garay and Ueli Maurer and Daniel Tschudi and Vassilis Zikas}, title = {But Why does it Work? A Rational Protocol Design Treatment of Bitcoin}, howpublished = {Cryptology ePrint Archive, Report 2018/138}, year = {2018}, note = {Accessed:2018-02-16}, url = {https://eprint.iacr.org/2018/138.pdf}, }
@misc{matzutt2018thwarting, author = {Roman Matzutt and Martin Henze and Jan Henrik Ziegeldorf and Jens Hiller and Klaus Wehrle}, title = {Thwarting Unwanted Blockchain Content Insertion}, year = {2018}, note = {Accessed:2018-02-28}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-matzutt-blockchain-contents-countermeasures.pdf}, }
@misc{atzei2018sok, author = {Nicola Atzei and Massimo Bartoletti and Tiziana Cimoli and Stefano Lande and Roberto Zunino}, title = {SoK: unraveling Bitcoin smart contracts}, year = {2018}, note = {Accessed:2018-03-01}, url = {https://eprint.iacr.org/2018/192.pdf}, }
@misc{gazi2018stake, author = {Peter Ga\v{z}i and Aggelos Kiayias and Alexander Russell}, title = {Stake-Bleeding Attacks on Proof-of-Stake Blockchains}, howpublished = {Cryptology ePrint Archive, Report 2018/248}, year = {2018}, note = {Accessed:2018-03-12}, url = {https://eprint.iacr.org/2018/248.pdf}, }
@misc{wang2018limit, author = {Yongge Wang and Qutaibah Malluhi}, title = {The Limit of Blockchains: Infeasibility of a Smart Obama-Trump Contract}, howpublished = {Cryptology ePrint Archive, Report 2018/252}, year = {2018}, note = {Accessed:2018-03-12}, url = {https://eprint.iacr.org/2018/252.pdf}, }
@misc{eskandari2018first, author = {Shayan Eskandari and Andreas Leoutsarakos and Troy Mursch and Jeremy Clark}, Title = {A first look at browser-based Cryptojacking}, Year = {2018}, howpublished = {arXiv:1803.02887}, note = {Accessed:2018-03-12}, url = {https://arxiv.org/pdf/1803.02887.pdf}, }
@misc{fernandez2018formalizing, author = {Antonio Fern\'{a}ndez Anta and Chryssis Georgiou and Kishori Konwar and Nicolas Nicolaou}, Title = {Formalizing and Implementing Distributed Ledger Objects}, Year = {2018}, howpublished = {arXiv:1802.07817}, note = {Accessed:2018-03-12}, url = {https://arxiv.org/pdf/1802.07817.pdf}, }
@misc{grishchenko2018semantic, author = {Ilya Grishchenko and Matteo Maffei and Clara Schneidewind}, Title = {A Semantic Framework for the Security Analysis of Ethereum smart contracts}, Year = {2018}, howpublished = {arXiv:1802.08660}, note = {Accessed:2018-03-12}, url = {https://arxiv.org/pdf/1802.08660.pdf}, }
@misc{bartoletti2018data, author = {Massimo Bartoletti and Barbara Pes and Sergio Serusi}, Title = {Data mining for detecting Bitcoin Ponzi schemes}, Year = {2018}, howpublished = {arXiv:1803.006}, note = {Accessed:2018-03-12}, url = {https://arxiv.org/pdf/1803.00646.pdf}, }
@misc{martens2018reviewchain, author = {Daniel Martens and Walid Maalej}, Title = {ReviewChain: Untampered Product Reviews on the Blockchain}, Year = {2018}, howpublished = {arXiv:1803.01661}, note = {Accessed:2018-03-12}, url = {https://arxiv.org/pdf/1803.01661.pdf}, }
@misc{li2018survey, author = {Xiaoqi Li and Peng Jiang and Ting Chen and Xiapu Luo and Qiaoyan Wen}, Title = {A Survey on the Security of Blockchain Systems}, Year = {2018}, Howpublished = {Li X, Jiang P, Chen T, Luo X, Wen Q. A survey on the security of blockchain systems, Future Generation Computer Systems (2017)}, note = {Accessed:2018-03-12}, url = {https://arxiv.org/pdf/1802.06993.pdf}, }
@misc{macbrough2018cobalt, author = {Ethan MacBrough}, Title = {Cobalt: BFT Governance in Open Networks}, Year = {2018}, howpublished = {arXiv:1802.07240}, note = {Accessed:2018-03-12}, url = {https://arxiv.org/pdf/1802.07240.pdf}, }
@misc{chase2018analysis, author = {Brad Chase and Ethan MacBrough}, Title = {Analysis of the XRP Ledger Consensus Protocol}, Year = {2018}, howpublished = {arXiv:1802.07242}, note = {Accessed:2018-03-12}, url = {https://arxiv.org/pdf/1802.07242.pdf}, }
@misc{covaci2018nectar, author = {Alexandra Covaci and Simone Madeo and Patrick Motylinski and St{\'e}phane Vincent}, Title = {NECTAR: Non-Interactive Smart Contract Protocol using Blockchain Technology}, Year = {2018}, howpublished = {arXiv:1803.04860}, Doi = {10.1145/3194113.3194116}, url = {https://arxiv.org/pdf/1803.04860.pdf}, }
@misc{abraham2018hotstuff, author = {Ittai Abraham and Guy Gueta and Dahlia Malkhi}, Title = {Hot-Stuff the Linear, Optimal-Resilience, One-Message BFT Devil}, Year = {2018}, howpublished = {arXiv:1803.05069}, url = {https://arxiv.org/pdf/1803.05069.pdf}, }
@misc{cohen2018database, author = {Sara Cohen and Aviv Zohar}, Title = {Database Perspectives on Blockchains}, Year = {2018}, howpublished = {arXiv:1803.06015}, url = {https://arxiv.org/pdf/1803.06015.pdf}, }
@misc{hanke2018dfinity, author = {Time Hanke and Mahnush Movahedi and Dominic Williams}, Title = {DFINITY Technology Overview Series Consensus System}, Year = {2018}, note = {Rev. 1}, url = {https://dfinity.org/pdf-viewer/library/dfinity-consensus.pdf}, }
@misc{stewart2018committing, author = {I Stewart and D Ilie and A Zamyatin and S Werner and MF Torshizi and WJ Knottenbelt}, title = {Committing to Quantum Resistance: A Slow Defence for Bitcoin against a Fast Quantum Computing Attack}, howpublished = {Cryptology ePrint Archive, Report 2018/213}, year = {2018}, url = {https://eprint.iacr.org/2018/213.pdf}, }
@article{bartoletti2018bitcoinponzi, author = {Massimo Bartoletti and Barbara Pes and Sergio Serusi}, title = {Data mining for detecting Bitcoin Ponzi schemes}, journal = {CoRR}, volume = {abs/1803.00646}, year = {2018}, url = {http://arxiv.org/abs/1803.00646}, archivePrefix = {arXiv}, eprint = {1803.00646}, timestamp = {Tue, 10 Apr 2018 20:50:05 +0200}, biburl = {https://dblp.org/rec/bib/journals/corr/abs-1803-00646}, bibsource = {dblp computer science bibliography, https://dblp.org}, }
@misc{schindler2018hydrand, author = {Philipp Schindler and Aljosha Judmayer and Nicholas Stifter and Edgar Weippl}, title = {HydRand: Practical Continuous Distributed Randomness}, howpublished = {Cryptology ePrint Archive, Report 2018/319}, year = {2018}, url = {https://eprint.iacr.org/2018/319.pdf}, }
@misc{stifter2018agreement, author = {Nicholas Stifter and Aljosha Judmayer and Philipp Schindler and Alexei Zamyatin and Edgar Weippl}, title = {Agreement with Satoshi - On the Formalization of Nakamoto Consensus}, howpublished = {Cryptology ePrint Archive, Report 2018/400}, year = {2018}, url = {https://eprint.iacr.org/2018/400.pdf}, }
@misc{wan2018goshawk, author = {Cencen Wan and Shuyang Tang and Yuncong Zhang and Chen Pan and Zhiqiang Liu and Yu Long and Zhen Liu and Yu Yu}, title = {Goshawk: A Novel Efficient, Robust and Flexible Blockchain Protocol}, howpublished = {Cryptology ePrint Archive, Report 2018/407}, year = {2018}, url = {https://eprint.iacr.org/2018/407.pdf}, }
@misc{yu2018repucoin, author = {Jiangshan Yu and David Kozhaya and Jeremie Decouchant and Paulo Esteves-Verissimo}, title = {RepuCoin: Your Reputation is Your Power}, howpublished = {Cryptology ePrint Archive, Report 2018/239}, year = {2018}, url = {https://eprint.iacr.org/2018/239.pdf}, }
@misc{zamani2018rapidchain, author = {Mahdi Zamani and Mahnush Movahedi and Mariana Raykova}, title = {RapidChain: A Fast Blockchain Protocol via Full Sharding}, howpublished = {Cryptology ePrint Archive, Report 2018/460}, year = {2018}, url = {https://eprint.iacr.org/2018/460.pdf}, }
@misc{boneh2018compact, author = {Dan Boneh and Manu Drijvers and Gregory Neven}, title = {Compact Multi-Signatures for Smaller Blockchains}, howpublished = {Cryptology ePrint Archive, Report 2018/483}, year = {2018}, url = {https://eprint.iacr.org/2018/483.pdf}, }
@misc{zhang2018treasury, author = {Bingsheng Zhang and Roman Oliynykov and Hamed Balogun}, title = {A Treasury System for Cryptocurrencies: Enabling Better Collaborative Intelligence}, howpublished = {Cryptology ePrint Archive, Report 2018/435}, year = {2018}, url = {https://eprint.iacr.org/2018/435.pdf}, }
@misc{yu2018platform, author = {Bin Yu and Joseph Liu and Amin Sakzad and Surya Nepal and Paul Rimba and Ron Steinfeld and Man Ho Au}, title = {Platform-independent Secure Blockchain-Based Voting System}, howpublished = {Cryptology ePrint Archive, Report 2018/657}, year = {2018}, url = {https://eprint.iacr.org/2018/657.pdf}, }
@misc{zhou2018loamit, author = {Lijing Zhou and Licheng Wang and Yiru Sun and Pin Lv}, title = {Loamit: A Blockchain-based Residual Loanable-limit Query System}, howpublished = {Cryptology ePrint Archive, Report 2018/655}, year = {2018}, url = {https://eprint.iacr.org/2018/655.pdf}, }
@misc{chalkias2018blockchained, author = {Konstantinos Chalkias and James Brown and Mike Hearn and Tommy Lillehagen and Igor Nitto and Thomas Schroeter}, title = {Blockchained Post-Quantum Signatures}, howpublished = {Cryptology ePrint Archive, Report 2018/658}, year = {2018}, url = {https://eprint.iacr.org/2018/658.pdf}, }
@misc{yi2018new, author = {Xun Yi and Kwok-Yan Lam and Dieter Gollmann}, title = {A New Blind ECDSA Scheme for Bitcoin Transaction Anonymity}, howpublished = {Cryptology ePrint Archive, Report 2018/660}, year = {2018}, url = {https://eprint.iacr.org/2018/660.pdf}, }
@misc{boneh2018verifiable, author = {Dan Boneh and Joseph Bonneau and Benedikt B\"unz and Ben Fisch}, title = {Verifiable Delay Functions}, howpublished = {Cryptology ePrint Archive, Report 2018/601}, year = {2018}, url = {https://eprint.iacr.org/2018/601.pdf}, }
@misc{ruffing2018burning, author = {Tim Ruffing and Sri Aravinda Thyagarajan and Viktoria Ronge and Dominique Schr\"oder}, title = {Burning Zerocoins for Fun and for Profit: A Cryptographic Denial-of-Spending Attack on the Zerocoin Protocol}, howpublished = {Cryptology ePrint Archive, Report 2018/612}, year = {2018}, url = {https://eprint.iacr.org/2018/612.pdf}, }
@misc{pietrzak2018simple, author = {Krzysztof Pietrzak}, title = {Simple Verifiable Delay Functions}, howpublished = {Cryptology ePrint Archive, Report 2018/627}, year = {2018}, url = {https://eprint.iacr.org/2018/627.pdf}, }
@inproceedings{pease1980reaching, author = {Marshall Pease and Robert Shostak and Leslie Lamport}, title = {Reaching agreement in the presence of faults}, journal = {Journal of the ACM (JACM)}, volume = {27}, number = {2}, pages = {228--234}, year = {1980}, publisher = {ACM}, url = {https://www.microsoft.com/en-us/research/uploads/prod/2016/12/Reaching-Agreement-in-the-Presence-of-Faults.pdf}, }
@inproceedings{dolev1981unanimity, author = {Danny Dolev}, title = {Unanimity in an unknown and unreliable environment}, booktitle = {Foundations of Computer Science, 1981. SFCS'81. 22nd Annual Symposium on}, pages = {159--168}, year = {1981}, organization = {IEEE}, url = {http://w3.cs.huji.ac.il/~dolev/pubs/unanimity-1981.pdf}, }
@inproceedings{lamport1982byzantine, author = {Leslie Lamport and Robert Shostak and Marshall Pease}, title = {The Byzantine generals problem}, journal = {ACM Transactions on Programming Languages and Systems (TOPLAS)}, volume = {4}, number = {3}, pages = {382--401}, year = {1982}, publisher = {ACM}, url = {http://people.cs.uchicago.edu/~shanlu/teaching/33100_wi15/papers/byz.pdf}, }
@inproceedings{dolev1982polynomial, author = {Danny Dolev and H Raymond Strong}, title = {Polynomial algorithms for multiple processor agreement}, booktitle = {Proceedings of the fourteenth annual ACM symposium on Theory of computing}, pages = {401--407}, year = {1982}, organization = {ACM}, url = {http://www.cse.huji.ac.il/~dolev/pubs/p401-dolev.pdf}, }
@inproceedings{fischer1982lower, author = {Michael J FISCHER and Nancy A LYNCH}, title = {A LOWER BOUND FOR THE TIME TO ASSURE INTERACTIVE CONSISTENCY}, journal = {INFORMATION PROCESSING LETTERS}, volume = {14}, number = {4}, year = {1982}, month = {Jun}, url = {http://groups.csail.mit.edu/tds/papers/Lynch/ipl82.pdf}, }
@inproceedings{dolev1982efficient, author = {Danny Dolev and Michael J Fischer and Rob Fowler and Nancy A Lynch and H Raymond Strong}, title = {An Efficient Algorithm for Byzantine Agreement without Authentication}, journal = {Information and Control}, volume = {52}, number = {3}, pages = {257--274}, year = {1982}, url = {http://groups.csail.mit.edu/tds/papers/Lynch/dffls-ic.pdf}, }
@inproceedings{lamport1983weak, author = {Leslie Lamport}, title = {The weak Byzantine generals problem}, journal = {Journal of the ACM (JACM)}, volume = {30}, number = {3}, pages = {668--676}, year = {1983}, publisher = {ACM}, url = {http://131.107.65.14/en-us/um/people/lamport/pubs/weak-byz.pdf}, }
@inproceedings{fischer1983consensus, author = {Michael J Fischer}, title = {The consensus problem in unreliable distributed systems (a brief survey)}, booktitle = {International Conference on Fundamentals of Computation Theory}, pages = {127--140}, year = {1983}, publisher = {Springer}, url = {http://courses.csail.mit.edu/6.897/fall04/papers/Fischer/fischer-survey.ps}, }
@inproceedings{chaum1983blind, author = {David Chaum}, title = {Blind signatures for untraceable payments}, booktitle = {Advances in cryptology}, pages = {199--203}, year = {1983}, organization = {Springer}, url = {http://blog.koehntopp.de/uploads/Chaum.BlindSigForPayment.1982.PDF}, }
@inproceedings{ben1983another, author = {Michael Ben-Or}, title = {Another advantage of free choice (extended abstract): Completely asynchronous agreement protocols}, booktitle = {Proceedings of the second annual ACM symposium on Principles of distributed computing}, pages = {27--30}, year = {1983}, organization = {ACM}, url = {http://homepage.cs.uiowa.edu/~ghosh/BenOr.pdf}, }
@inproceedings{rabin1983randomized, author = {Michael O Rabin}, title = {Randomized byzantine generals}, booktitle = {Foundations of Computer Science, 1983., 24th Annual Symposium on}, pages = {403--409}, year = {1983}, organization = {IEEE}, url = {https://www.cs.princeton.edu/courses/archive/fall05/cos521/byzantin.pdf}, }
@inproceedings{dolev1983authenticated, author = {Danny Dolev and H. Raymond Strong}, title = {Authenticated algorithms for Byzantine agreement}, journal = {SIAM Journal on Computing}, volume = {12}, number = {4}, pages = {656--666}, year = {1983}, publisher = {SIAM}, url = {http://www.cse.huji.ac.il/~dolev/pubs/authenticated.pdf}, }
@inproceedings{toueg1984randomized, author = {Sam Toueg}, title = {Randomized Asynchronous Byzantine Agreements}, booktitle = {Proceedings of the third annual ACM symposium on Principles of distributed computing}, pages = {163--178}, year = {1984}, publisher = {ACM}, url = {https://ecommons.cornell.edu/bitstream/handle/1813/6426/83-587.ps}, }
@inproceedings{lamport1984using, author = {Leslie Lamport}, title = {Using Time Instead of Timeout for Fault-Tolerant Distributed Systems.}, journal = {ACM Transactions on Programming Languages and Systems (TOPLAS)}, volume = {6}, number = {2}, pages = {254--280}, year = {1984}, publisher = {ACM}, url = {http://131.107.65.14/en-us/um/people/lamport/pubs/using-time.pdf}, }
@inproceedings{chaum1985security, author = {David Chaum}, title = {Security without identification: Transaction systems to make big brother obsolete}, journal = {Communications of the ACM}, volume = {28}, number = {10}, pages = {1030--1044}, year = {1985}, publisher = {ACM}, url = {https://cosic.esat.kuleuven.be/apes/papers/p1030-chaum.pdf.gz}, }
@inproceedings{fischer1985impossibility, author = {Michael J Fischer and Nancy A Lynch and Michael S Paterson}, title = {Impossibility of distributed consensus with one faulty process}, journal = {Journal of the ACM (JACM)}, volume = {32}, number = {2}, pages = {374--382}, year = {1985}, publisher = {ACM}, url = {http://macs.citadel.edu/rudolphg/csci604/ImpossibilityofConsensus.pdf}, }
@inproceedings{bracha1985asynchronous, author = {Gabriel Bracha and Sam Toueg}, title = {Asynchronous Consensus and Broadcast Protocols}, journal = {Journal of the Association for Computing Machinery}, volume = {32}, number = {4}, pages = {824--840}, year = {1985}, publisher = {Citeseer}, url = {https://zoo.cs.yale.edu/classes/cs426/2017/bib/bracha85asynchronous.pdf}, }
@inproceedings{chor1985simple, author = {Benny Chor and Brian A Coan}, title = {A Simple and Efficient Randomized Byzantine Agreement Algorithm}, journal = {IEEE Transactions on Software Engineering}, number = {6}, pages = {531--539}, year = {1985}, publisher = {IEEE}, url = {http://users.ece.utexas.edu/~garg/sp11/382n/resources/randomizedByzantine.pdf}, }
@inproceedings{dolev1986reaching, author = {Danny Dolev and Nancy A Lynch and Shlomit S Pinter and Eugene W Stark and William E Weihl}, title = {Reaching approximate agreement in the presence of faults}, journal = {Journal of the ACM (JACM)}, volume = {33}, number = {3}, pages = {499--516}, year = {1986}, publisher = {ACM}, url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.19.1605&rep=rep1&type=pdf}, }
@inproceedings{dolev1987minimal, author = {Danny Dolev and Cynthia Dwork and Larry Stockmeyer}, title = {On the minimal synchronism needed for distributed consensus}, journal = {Journal of the ACM (JACM)}, volume = {34}, number = {1}, pages = {77--97}, year = {1987}, publisher = {ACM}, url = {http://www.oocities.org/stockmeyer@sbcglobal.net/dds.pdf}, }
@inproceedings{dwork1988consensus, author = {Cynthia Dwork and Nancy Lynch and Larry Stockmeyer}, title = {Consensus in the presence of partial synchrony}, journal = {Journal of the ACM (JACM)}, volume = {35}, number = {2}, pages = {288--323}, year = {1988}, publisher = {ACM}, url = {http://www-usr.inf.ufsm.br/~ceretta/papers/MITLCSTM270.pdf}, }
@inproceedings{feldman1988optimal, author = {Paul Feldman and Silvio Micali}, title = {Optimal algorithms for Byzantine agreement}, booktitle = {Proceedings of the twentieth annual ACM symposium on Theory of computing}, pages = {148--161}, year = {1988}, organization = {ACM}, url = {https://dspace.mit.edu/bitstream/handle/1721.1/14368/20051076-MIT.pdf}, }
@inproceedings{herlihy1988impossibility, author = {Maurice P Herlihy}, title = {Impossibility and universality results for wait-free synchronization}, booktitle = {Proceedings of the seventh annual ACM Symposium on Principles of distributed computing}, pages = {276--290}, year = {1988}, organization = {ACM}, url = {https://www.researchgate.net/profile/Maurice_Herlihy/publication/221343511_Impossibility_and_Universality_Results_for_Wait-Free_Synchronization/links/00b4952ce7370656ff000000/Impossibility-and-Universality-Results-for-Wait-Free-Synchronization.pdf}, }
@inproceedings{goldwasser1989knowledge, author = {Shafi Goldwasser and Silvio Micali and Charles Rackoff}, title = {The knowledge complexity of interactive proof systems}, journal = {SIAM Journal on computing}, volume = {18}, number = {1}, pages = {186--208}, year = {1989}, publisher = {SIAM}, url = {http://crypto.cs.mcgill.ca/~crepeau/COMP647/2007/TOPIC02/GMR89.pdf}, }
@inproceedings{schneider1990implementing, author = {Fred B Schneider}, title = {Implementing fault-tolerant services using the state machine approach: A tutorial}, journal = {ACM Computing Surveys (CSUR)}, volume = {22}, number = {4}, pages = {299--319}, year = {1990}, publisher = {ACM}, url = {http://www-users.cselabs.umn.edu/classes/Spring-2014/csci8980-sds/Papers/ProcessReplication/p299-schneider.pdf}, }
@inproceedings{chaum1990untraceable, author = {David Chaum and Amos Fiat and Moni Naor}, title = {Untraceable electronic cash}, booktitle = {Proceedings on Advances in cryptology}, pages = {319--327}, year = {1990}, organization = {Springer-Verlag New York, Inc.}, url = {http://people.dsv.su.se/~matei/courses/IK2001_SJE/Chaum90.pdf}, }
@article{herlihy1991wait, author = {Maurice Herlihy}, title = {Wait-free synchronization}, journal = {ACM Transactions on Programming Languages and Systems (TOPLAS)}, volume = {13}, number = {1}, pages = {124--149}, year = {1991}, publisher = {ACM}, url = {https://cs.brown.edu/~mph/Herlihy91/p124-herlihy.pdf}, }
@inproceedings{dwork1992pricing, author = {Cynthia Dwork and Moni Naor}, title = {Pricing via processing or combatting junk mail}, booktitle = {Annual International Cryptology Conference}, pages = {139--147}, year = {1992}, organization = {Springer}, url = {https://web.cs.dal.ca/~abrodsky/7301/readings/DwNa93.pdf}, }
@inproceedings{barborak1993consensus, author = {Michael Barborak and Anton Dahbura and Miroslaw Malek}, title = {The consensus problem in fault-tolerant computing}, journal = {aCM Computing Surveys (CSur)}, volume = {25}, number = {2}, pages = {171--220}, year = {1993}, publisher = {ACM}, url = {ftp://ftp.cs.utexas.edu/pub/techreports/tr91-40.pdf}, }
@inproceedings{chandra1996unreliable, author = {Tushar Deepak Chandra and Sam Toueg}, title = {Unreliable failure detectors for reliable distributed systems}, journal = {Journal of the ACM (JACM)}, volume = {43}, number = {2}, pages = {225--267}, year = {1996}, publisher = {ACM}, url = {https://ecommons.cornell.edu/bitstream/handle/1813/7192/95-1535.pdf?sequence=1}, }
@inproceedings{law1996make, author = {Laurie Law and Susan Sabett and Jerry Solinas}, title = {How to make a mint: the cryptography of anonymous electronic cash}, journal = {Am. UL Rev.}, volume = {46}, pages = {1131}, year = {1996}, publisher = {HeinOnline}, url = {http://www.aulawreview.org/pdfs/46/46-4/law.pdf}, }
@inproceedings{jarecki1997efficient, author = {Stanis{\l}aw Jarecki and Andrew Odlyzko}, title = {An efficient micropayment system based on probabilistic polling}, booktitle = {Financial Cryptography}, pages = {173--191}, year = {1997}, organization = {Springer}, url = {https://www.researchgate.net/profile/Stanislaw_Jarecki/publication/220797099_An_Efficient_Micropayment_System_Based_on_Probabilistic_Polling/links/0f31753c7f02552a9d000000.pdf}, }
@inproceedings{lamport1998part, author = {Leslie Lamport}, title = {The part-time parliament}, journal = {ACM Transactions on Computer Systems (TOCS)}, volume = {16}, number = {2}, pages = {133--169}, year = {1998}, publisher = {ACM}, url = {https://www.microsoft.com/en-us/research/uploads/prod/2016/12/The-Part-Time-Parliament.pdf}, }
@inproceedings{castro1999practical, author = {Miguel Castro and Barbara Liskov and others}, title = {Practical Byzantine fault tolerance}, booktitle = {OSDI}, volume = {99}, pages = {173--186}, year = {1999}, url = {http://pmg.csail.mit.edu/papers/osdi99.pdf}, }
@inproceedings{jakobsson1999proofs, author = {Markus Jakobsson and Ari Juels}, title = {Proofs of work and bread pudding protocols}, booktitle = {Secure Information Networks}, pages = {258--272}, year = {1999}, publisher = {Springer}, url = {https://link.springer.com/content/pdf/10.1007/978-0-387-35568-9_18.pdf}, }
@inproceedings{miller2000capability, author = {Mark S Miller and Chip Morningstar and Bill Frantz}, title = {Capability-based financial instruments}, booktitle = {International Conference on Financial Cryptography}, pages = {349--378}, year = {2000}, organization = {Springer}, url = {http://www.erights.org/elib/capability/ode/ode.pdf}, }
@inproceedings{cachin2000random, author = {Christian Cachin and Klaus Kursawe and Victor Shoup}, title = {Random oracles in Constantinople: Practical Asynchronous Byzantine Agreement using Cryptography}, booktitle = {Proceedings of the nineteenth annual ACM symposium on Principles of distributed computing}, pages = {123--132}, year = {2000}, organization = {ACM}, url = {https://www.zurich.ibm.com/~cca/papers/abba.pdf}, }
@inproceedings{cachin2001secure, author = {Christian Cachin and Klaus Kursawe and Frank Petzold and Victor Shoup}, title = {Secure and efficient asynchronous broadcast protocols}, booktitle = {Annual International Cryptology Conference}, pages = {524--541}, year = {2001}, organization = {Springer}, url = {https://www.zurich.ibm.com/~cca/papers/abc.pdf}, }
@inproceedings{douceur2002sybil, author = {John R Douceur}, title = {The sybil attack}, booktitle = {International Workshop on Peer-to-Peer Systems}, pages = {251--260}, year = {2002}, organization = {Springer}, url = {http://www.cs.cornell.edu/people/egs/cs6460-spring10/sybil.pdf}, }
@inproceedings{gilbert2002brewer, author = {Seth Gilbert and Nancy Lynch}, title = {Brewer's conjecture and the feasibility of consistent, available, partition-tolerant web services}, journal = {Acm Sigact News}, volume = {33}, number = {2}, pages = {51--59}, year = {2002}, publisher = {ACM}, url = {https://www.glassbeam.com/sites/all/themes/glassbeam/images/blog/10.1.1.67.6951.pdf}, }
@inproceedings{aspnes2003randomized, author = {James Aspnes}, title = {Randomized protocols for asynchronous consensus}, journal = {Distributed Computing}, volume = {16}, number = {2-3}, pages = {165--175}, year = {2003}, publisher = {Springer}, url = {http://arxiv.org/pdf/cs/0209014}, }
@inproceedings{baldoni2003consensus, author = {Roberto Baldoni and Jean-Michel H{\'e}lary and Michel Raynal and Lenaik Tangui}, title = {Consensus in Byzantine asynchronous systems}, journal = {Journal of Discrete Algorithms}, volume = {1}, number = {2}, pages = {185--210}, year = {2003}, publisher = {Elsevier}, url = {http://ac.els-cdn.com/S157086670300025X/1-s2.0-S157086670300025X-main.pdf?_tid=0ce850b4-a744-11e6-a9cb-00000aab0f02&acdnat=1478782320_1c5fb3de333bc22d255442881f330e25}, }
@inproceedings{malkhi2003objects, author = {Dahlia Malkhi and Michael Merritt and Michael K Reiter and Gadi Taubenfeld}, title = {Objects shared by Byzantine processes}, journal = {Distributed Computing}, volume = {16}, number = {1}, pages = {37--48}, year = {2003}, publisher = {Springer}, url = {ftp://194.153.101.9/Faculty/gadi/MyPapers/2003MMRT-byz1.pdf}, }
@inproceedings{cavin2004consensus, author = {David Cavin and Yoav Sasson and Andr{\'e} Schiper}, title = {Consensus with unknown participants or fundamental self-organization}, booktitle = {International Conference on Ad-Hoc Networks and Wireless}, pages = {135--148}, year = {2004}, organization = {Springer}, url = {http://infoscience.epfl.ch/record/49887/files/CSS04.pdf}, }
@inproceedings{correia2004tolerate, author = {Miguel Correia and Nuno Ferreira Neves and Paulo Verissimo}, title = {How to tolerate half less one Byzantine nodes in practical distributed systems}, booktitle = {Reliable Distributed Systems, 2004. Proceedings of the 23rd IEEE International Symposium on}, pages = {174--183}, year = {2004}, organization = {IEEE}, url = {http://www.navigators.di.fc.ul.pt/archive/correia_m_sma.pdf}, }
@article{aspnes2005exposing, author = {James Aspnes and Collin Jackson and Arvind Krishnamurthy}, title = {Exposing computationally-challenged Byzantine impostors}, journal = {Department of Computer Science, Yale University, New Haven, CT, Tech. Rep}, year = {2005}, url = {http://www.cs.yale.edu/homes/aspnes/papers/tr1332.pdf}, }
@inproceedings{aiyer2005bar, author = {Amitanand S Aiyer and Lorenzo Alvisi and Allen Clement and Mike Dahlin and Jean-Philippe Martin and Carl Porth}, title = {BAR fault tolerance for cooperative services}, booktitle = {ACM SIGOPS operating systems review}, volume = {39}, number = {5}, pages = {45--58}, year = {2005}, organization = {ACM}, url = {http://www.dcc.fc.up.pt/~Ines/aulas/1314/SDM/papers/BAR%20Fault%20Tolerance%20for%20Cooperative%20Services%20-%20UIUC.pdf}, }
@inproceedings{angluin2006stabilizing, author = {Dana Angluin and Michael J Fischer and Hong Jiang}, title = {Stabilizing consensus in mobile networks}, booktitle = {Distributed Computing in Sensor Systems}, pages = {37--50}, year = {2006}, publisher = {Springer}, url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.60.1040&rep=rep1&type=pdf}, }
@article{levine2006survey, author = {Brian Neil Levine and Clay Shields and N Boris Margolin}, title = {A survey of solutions to the sybil attack}, journal = {University of Massachusetts Amherst, Amherst, MA}, volume = {7}, year = {2006}, url = {http://forensics.umass.edu/pubs/levine.sybil.tr.2006.pdf}, }
@inproceedings{aspnes2006relationships, author = {James Aspnes and Faith Ellen Fich and Eric Ruppert}, title = {Relationships between broadcast and shared memory in reliable anonymous distributed systems}, journal = {Distributed Computing}, volume = {18}, number = {3}, pages = {209--219}, year = {2006}, publisher = {Springer}, url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.6.2802&rep=rep1&type=pdf}, }
@inproceedings{beerliova2007efficient, author = {Zuzana Beerliov{\'a}-Trub{\'\i}niov{\'a} and Martin Hirt and Micha Riser}, title = {Efficient Byzantine agreement with faulty minority}, booktitle = {Proceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security}, pages = {393--409}, year = {2007}, organization = {Springer-Verlag}, url = {http://www.crypto.ethz.ch/alumni/trubini/BeHiRi07.pdf}, }
@inproceedings{li2006bar, author = {Harry C Li and Allen Clement and Edmund L Wong and Jeff Napper and Indrajit Roy and Lorenzo Alvisi and Michael Dahlin}, title = {BAR gossip}, booktitle = {Proceedings of the 7th symposium on Operating systems design and implementation}, pages = {191--204}, year = {2006}, organization = {USENIX Association}, url = {http://www.cs.utexas.edu/users/dahlin/papers/bar-gossip-apr-2006.pdf}, }
@inproceedings{chun2007attested, author = {Byung-Gon Chun and Petros Maniatis and Scott Shenker and John Kubiatowicz}, title = {Attested append-only memory: Making adversaries stick to their word}, booktitle = {ACM SIGOPS Operating Systems Review}, volume = {41}, number = {6}, pages = {189--204}, year = {2007}, organization = {ACM}, url = {http://news.cs.nyu.edu/~jinyang/fa08/papers/a2m.pdf}, }
@inproceedings{hoepman2007distributed, author = {Jaap-Henk Hoepman}, title = {Distributed Double Spending Prevention.}, booktitle = {Security Protocols Workshop}, pages = {152--165}, year = {2007}, organization = {Springer}, url = {http://www.cs.kun.nl/~jhh/publications/double-spending.pdf}, }
@inproceedings{nagy2008openpgp, author = {Daniel A Nagy and Nadzeya V Shakel}, title = {OpenPGP-Based Financial Instruments and Dispute Arbitration}, booktitle = {International Conference on Financial Cryptography and Data Security}, pages = {267--271}, year = {2008}, organization = {Springer}, url = {http://www.epointsystem.org/~nagydani/fc2008.pdf}, }
@inproceedings{alchieri2008byzantine, author = {Eduardo A Alchieri and Alysson Neves Bessani and Joni Silva Fraga and Fab{\'\i}ola Greve}, title = {Byzantine Consensus with Unknown Participants}, booktitle = {Proceedings of the 12th International Conference on Principles of Distributed Systems}, pages = {22--40}, year = {2008}, organization = {Springer-Verlag}, url = {http://www.di.fc.ul.pt/~bessani/publications/opodis08-bftcup.pdf}, }
@inproceedings{kapron2008fast, author = {Bruce Kapron and David Kempe and Valerie King and Jared Saia and Vishal Sanwalani}, title = {Fast Asynchronous Byzantine Agreement and Leader Election with Full Information}, booktitle = {Proceedings of the nineteenth annual ACM-SIAM symposium on Discrete algorithms}, pages = {1038--1047}, year = {2008}, organization = {Society for Industrial and Applied Mathematics}, url = {https://www.researchgate.net/profile/Bruce_Kapron/publication/220390388_Fast_asynchronous_Byzantine_agreement_and_leader_election_with_full_information/links/0912f5109e74191137000000.pdf}, }
@inproceedings{ishii2008vegas, author = {Hideaki Ishii and Roberto Tempo}, title = {Las Vegas randomized algorithms in distributed consensus problems}, booktitle = {2008 American Control Conference}, pages = {2579--2584}, year = {2008}, organization = {IEEE}, url = {http://www.nt.ntnu.no/users/skoge/prost/proceedings/acc08/data/papers/0446.pdf}, }
@inproceedings{okun2008efficient, author = {Michael Okun and Amnon Barak}, title = {Efficient algorithms for anonymous Byzantine agreement}, journal = {Theory of Computing Systems}, volume = {42}, number = {2}, pages = {222--238}, year = {2008}, publisher = {Springer}, url = {https://www.researchgate.net/profile/Michael_Okun2/publication/220544414_Efficient_Algorithms_for_Anonymous_Byzantine_Agreement/links/5400c7eb0cf23d9765a48890.pdf}, }
@inproceedings{clement2009making, author = {Allen Clement and Edmund L Wong and Lorenzo Alvisi and Michael Dahlin and Mirco Marchetti}, title = {Making Byzantine Fault Tolerant Systems Tolerate Byzantine Faults.}, booktitle = {NSDI}, volume = {9}, pages = {153--168}, year = {2009}, url = {http://static.usenix.org/events/nsdi09/tech/full_papers/clement/clement.pdf}, }
@article{delporte2008consensus, author = {Carole Delporte-Gallet and St{\'e}phane Devismes and Hugues Fauconnier and Franck Petit and Sam Toueg}, title = {Consensus is Easier Than Reliable Broadcast}, year = {2008}, month = {Sep}, url = {https://hal.inria.fr/hal-00325470/PDF/reliable.pdf}, }
@inproceedings{chen2009security, author = {Liqun Chen and Paul Morrissey and Nigel P Smart and Bogdan Warinschi}, title = {Security notions and generic constructions for client puzzles}, booktitle = {International Conference on the Theory and Application of Cryptology and Information Security}, pages = {505--523}, year = {2009}, organization = {Springer}, url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.215.7179&rep=rep1&type=pdf}, }
@inproceedings{singh2009zeno, author = {Atul Singh and Pedro Fonseca and Petr Kuznetsov and Rodrigo Rodrigues and Petros Maniatis and others}, title = {Zeno: Eventually Consistent Byzantine-Fault Tolerance.}, booktitle = {NSDI}, volume = {9}, pages = {169--184}, year = {2009}, url = {http://www.academia.edu/download/39803261/singh.pdf}, }
@inproceedings{white2010overcoming, author = {Andrew White and Alan Tickle and Andrew Clark}, title = {Overcoming reputation and proof-of-work systems in botnets}, booktitle = {Network and System Security (NSS), 2010 4th International Conference on}, pages = {120--127}, year = {2010}, organization = {IEEE}, url = {http://eprints.qut.edu.au/35657/1/c35657.pdf}, }
@inproceedings{guerraoui2010next, author = {Rachid Guerraoui and Nikola Kne{\v{z}}evi{\'c} and Vivien Qu{\'e}ma and Marko Vukoli{\'c}}, title = {The next 700 BFT protocols}, booktitle = {Proceedings of the 5th European conference on Computer systems}, pages = {363--376}, year = {2010}, organization = {ACM}, url = {https://infoscience.epfl.ch/record/121590/files/TR-700-2009.pdf}, }
@inproceedings{abraham2010fast, author = {Ittai Abraham and Marcos K Aguilera and Dahlia Malkhi}, title = {Fast Asynchronous Consensus with Optimal Resilience}, booktitle = {International Symposium on Distributed Computing}, pages = {4--19}, year = {2010}, organization = {Springer}, url = {https://www.microsoft.com/en-us/research/wp-content/uploads/2010/09/disc-camera-ready.pdf}, }
@inproceedings{correia2010asynchronous, author = {Miguel Correia and Giuliana S Veronese and Lau Cheuk Lung}, title = {Asynchronous Byzantine consensus with 2f+ 1 processes}, booktitle = {Proceedings of the 2010 ACM symposium on applied computing}, pages = {475--480}, year = {2010}, organization = {ACM}, url = {http://www.navigators.di.fc.ul.pt/archive/papers/consensus2f11.pdf}, }
@inproceedings{delporte2010brief, author = {Carole Delporte-Gallet and Hugues Fauconnier and Rachid Guerraoui and Anne-Marie Kermarrec}, title = {Brief announcement: Byzantine agreement with homonyms}, booktitle = {Proceedings of the twenty-second annual ACM symposium on Parallelism in algorithms and architectures}, pages = {74--75}, year = {2010}, organization = {ACM}, url = {https://pdfs.semanticscholar.org/247d/860edb68c0673a48f90bc5e108455cc11b1c.pdf}, }
@inproceedings{reid2011anonymity, author = {M. Harrigan F. Reid}, title = {An Analysis of Anonymity in the Bitcoin System}, booktitle = {2011 IEEE International Conference on Privacy, Security, Risk, and Trust, and IEEE International Conference on Social Computing}, year = {2011}, url = {http://arxiv.org/pdf/1107.4524}, }
@inproceedings{lamport2011brief, author = {Leslie Lamport}, title = {Leaderless Byzantine Paxos}, note = {Previous title was: Brief announcement: leaderless byzantine paxos}, booktitle = {International Symposium on Distributed Computing}, pages = {141--142}, year = {2011}, organization = {Springer}, url = {https://www.microsoft.com/en-us/research/uploads/prod/2016/12/Leaderless-Byzantine-Paxos.pdf}, }
@inproceedings{stebila2011stronger, author = {Douglas Stebila and Lakshmi Kuppusamy and Jothi Rangasamy and Colin Boyd and Juan Gonzalez Nieto}, title = {Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols}, booktitle = {Cryptographers Track at the RSA Conference}, pages = {284--301}, year = {2011}, organization = {Springer}, url = {http://eprints.qut.edu.au/40036/6/40036-full-revised.pdf}, }
@inproceedings{delporte2011byzantine, author = {Carole Delporte-Gallet and Hugues Fauconnier and Rachid Guerraoui and Anne-Marie Kermarrec and Eric Ruppert and others}, title = {Byzantine agreement with homonyms}, booktitle = {Proceedings of the 30th annual ACM SIGACT-SIGOPS symposium on Principles of distributed computing}, pages = {21--30}, year = {2011}, organization = {ACM}, url = {https://hal-univ-diderot.archives-ouvertes.fr/docs/00/58/01/33/PDF/main.pdf}, }
@inproceedings{correia2011byzantine, author = {Miguel Correia and Giuliana Santos Veronese and Nuno Ferreira Neves and Paulo Verissimo}, title = {Byzantine consensus in asynchronous message-passing systems: a survey}, journal = {International Journal of Critical Computer-Based Systems}, volume = {2}, number = {2}, pages = {141--161}, year = {2011}, publisher = {Inderscience Publishers}, url = {http://homepages.di.fc.ul.pt/~nuno/PAPERS/IJCCBS11.pdf}, }
@misc{mahmoody2011publicly, author = {Mohammad Mahmoody and Tal Moran and Salil Vadhan}, title = {Publicly Verifiable Proofs of Sequential Work}, howpublished = {Cryptology ePrint Archive, Report 2011/553}, year = {2011}, note = {\url{https://eprint.iacr.org/2011/553}}, url = {https://eprint.iacr.org/2011/553.pdf}, }
@inproceedings{ron2013quantitative, author = {Dorit Ron and Adi Shamir}, title = {Quantitative analysis of the full bitcoin transaction graph}, booktitle = {Financial Cryptography and Data Security}, pages = {6--24}, year = {2013}, publisher = {Springer}, url = {https://eprint.iacr.org/2012/584.pdf}, }
@inproceedings{barber2012bitter, author = {Simon Barber and Xavier Boyen and Elaine Shi and Ersin Uzun}, title = {Bitter to better - how to make bitcoin a better currency}, booktitle = {Financial cryptography and data security}, pages = {399--414}, year = {2012}, publisher = {Springer}, url = {http://eprints.qut.edu.au/69169/1/Boyen_accepted_draft.pdf}, }
@inproceedings{babaioff2012red, author = {Moshe Babaioff and Shahar Dobzinski and Sigal Oren and Aviv Zohar}, title = {On bitcoin and red balloons}, booktitle = {Proceedings of the 13th ACM conference on electronic commerce}, pages = {56--73}, year = {2012}, organization = {ACM}, url = {http://arxiv.org/pdf/1111.2626.pdf}, }
@inproceedings{clark2012commitcoin, author = {Jeremy Clark and Aleksander Essex}, title = {Commitcoin: Carbon dating commitments with bitcoin}, booktitle = {Financial Cryptography and Data Security}, pages = {390--398}, year = {2012}, publisher = {Springer}, url = {http://users.encs.concordia.ca/~clark/papers/2012_fc.pdf}, }
@inproceedings{jaffe2012price, author = {Alexander Jaffe and Thomas Moscibroda and Siddhartha Sen}, title = {On the Price of Equivocation in Byzantine Agreement}, booktitle = {Proceedings of the 2012 ACM symposium on Principles of distributed computing}, pages = {309--318}, year = {2012}, organization = {ACM}, url = {http://sns.cs.princeton.edu/docs/hypergraph-podc12.pdf}, }
@inproceedings{delporte2012homonyms, author = {Carole Delporte-Gallet and Hugues Fauconnier and others}, title = {Homonyms with forgeable identifiers}, booktitle = {International Colloquium on Structural Information and Communication Complexity}, pages = {171--182}, year = {2012}, organization = {Springer}, url = {https://hal.archives-ouvertes.fr/hal-00687836/document}, }
@inproceedings{groce2012byzantine, author = {Adam Groce and Jonathan Katz and Aishwarya Thiruvengadam and Vassilis Zikas}, title = {Byzantine agreement with a rational adversary}, journal = {Automata, languages, and programming}, pages = {561--572}, year = {2012}, publisher = {Springer}, url = {http://cs.ucla.edu/~vzikas/pubs/GKTZ12.pdf}, }
@inproceedings{becker2013can, author = {J{\"o}rg Becker and Dominic Breuker and Tobias Heide and Justus Holler and Hans Peter Rauer and Rainer B{\"o}hme}, title = {Can we afford integrity by proof-of-work? Scenarios inspired by the Bitcoin currency}, booktitle = {WEIS}, year = {2012}, publisher = {Springer}, url = {http://users.encs.concordia.ca/~clark/biblio/bitcoin/Becker%202012.pdf}, }
@inproceedings{veronese2013efficient, author = {Giuliana Santos Veronese and Miguel Correia and Alysson Neves Bessani and Lau Cheuk Lung and Paulo Verissimo}, title = {Efficient byzantine fault-tolerance}, journal = {IEEE Transactions on Computers}, volume = {62}, number = {1}, pages = {16--30}, year = {2013}, publisher = {IEEE}, url = {https://www.researchgate.net/profile/Miguel_Correia3/publication/260585535_Efficient_Byzantine_Fault-Tolerance/links/5419615d0cf25ebee9885215.pdf}, }
@inproceedings{androulaki2012two, author = {Eli Androulaki and Srdjan Capkun and Ghassan O Karame}, title = {Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin}, booktitle = {CCS}, year = {2012}, url = {http://eprint.iacr.org/2012/248.pdf}, }
@inproceedings{aguilera2012correctness, author = {Marcos K Aguilera and Sam Toueg}, title = {The correctness proof of Ben-Or's randomized consensus algorithm}, journal = {Distributed Computing}, volume = {25}, number = {5}, pages = {371--381}, year = {2012}, publisher = {Springer}, url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.261.481&rep=rep1&type=pdf}, }
@inproceedings{cap2012structural, author = {Clemens H Cap}, title = {A Structural Analysis of Bitcoin}, booktitle = {Annual Meeting of the German Computer Scoiety GI. Braunschweig}, year = {2012}, url = {http://cs.emis.de/LNI/Proceedings/Proceedings208/51.pdf}, }
@inproceedings{kroll2013economics, author = {Joshua A Kroll and Ian C Davey and Edward W Felten}, title = {The economics of Bitcoin mining, or Bitcoin in the presence of adversaries}, booktitle = {Proceedings of WEIS}, volume = {2013}, pages = {11}, year = {2013}, url = {https://pdfs.semanticscholar.org/c55a/6c95b869938b817ed3fe3ea482bc65a7206b.pdf}, }
@inproceedings{christin2013traveling, author = {Nicolas Christin}, title = {Traveling the {Silk Road}: A measurement analysis of a large anonymous online marketplace}, booktitle = {Proceedings of the {22nd World Wide Web Conference (WWW'13)}}, year = {2013}, month = {May}, address = {Rio de Janeiro, Brazil}, pages = {213--224}, url = {https://www.andrew.cmu.edu/user/nicolasc/publications/Christin-WWW13.pdf}, }
@inproceedings{christin2013beware, author = {Tyler Moore and Nicolas Christin}, title = {Beware the Middleman: Empirical Analysis of {Bitcoin}-Exchange Risk}, booktitle = {Proceedings of IFCA Financial Cryptography'13}, month = {April}, year = {2013}, address = {Okinawa, Japan}, url = {https://www.andrew.cmu.edu/user/nicolasc/publications/MC-FC13.pdf}, }
@inproceedings{mahmoody2013publicly, author = {Mohammad Mahmoody and Tal Moran and Salil Vadhan}, title = {Publicly verifiable proofs of sequential work}, booktitle = {Proceedings of the 4th conference on Innovations in Theoretical Computer Science}, pages = {373--388}, year = {2013}, organization = {ACM}, url = {http://www.cs.cornell.edu/~mohammad/files/papers/15%20TimeStamp.pdf}, }
@inproceedings{taylor2013bitcoin, author = {Michael Bedford Taylor}, title = {Bitcoin and the age of bespoke silicon}, booktitle = {Proceedings of the 2013 International Conference on Compilers, Architectures and Synthesis for Embedded Systems}, pages = {16}, year = {2013}, organization = {IEEE Press}, url = {https://cseweb.ucsd.edu/~mbtaylor/papers/bitcoin_taylor_cases_2013.pdf}, }
@inproceedings{miers2013zerocoin, author = {Ian Miers and Christina Garman and Matthew Green and Aviel D Rubin}, title = {Zerocoin: Anonymous distributed e-cash from bitcoin}, booktitle = {Security and Privacy (SP), 2013 IEEE Symposium on}, pages = {397--411}, year = {2013}, organization = {IEEE}, url = {https://isi.jhu.edu/~mgreen/ZerocoinOakland.pdf}, }
@inproceedings{bamert2013have, author = {Tobias Bamert and Christian Decker and Lennart Elsen and Roger Wattenhofer and Samuel Welten}, title = {Have a snack, pay with bitcoins}, booktitle = {Peer-to-Peer Computing (P2P), 2013 IEEE Thirteenth International Conference on}, pages = {1--5}, year = {2013}, organization = {IEEE}, url = {http://www.bheesty.com/cracker/1450709524_17035424cb/p2p2013_093.pdf}, }
@inproceedings{decker2013information, author = {Christian Decker and Roger Wattenhofer}, title = {Information propagation in the bitcoin network}, booktitle = {Peer-to-Peer Computing (P2P), 2013 IEEE Thirteenth International Conference on}, pages = {1--10}, year = {2013}, organization = {IEEE}, url = {http://diyhpl.us/~bryan/papers2/bitcoin/Information%20propagation%20in%20the%20Bitcoin%20network.pdf}, }
@inproceedings{meiklejohn2013fistful, author = {Sarah Meiklejohn and Marjori Pomarole and Grant Jordan and Kirill Levchenko and Damon McCoy and Geoffrey M Voelker and Stefan Savage}, title = {A fistful of bitcoins: characterizing payments among men with no names}, booktitle = {Proceedings of the 2013 conference on Internet measurement conference}, pages = {127--140}, year = {2013}, organization = {ACM}, url = {https://cseweb.ucsd.edu/~smeiklejohn/files/imc13.pdf}, }
@inproceedings{androulaki2013evaluating, author = {Elli Androulaki and Ghassan O Karame and Marc Roeschlin and Tobias Scherer and Srdjan Capkun}, title = {Evaluating user privacy in bitcoin}, booktitle = {Financial Cryptography and Data Security}, pages = {34--51}, year = {2013}, publisher = {Springer}, url = {http://book.itep.ru/depository/bitcoin/User_privacy_in_bitcoin.pdf}, }
@inproceedings{ben2014zerocash, author = {Eli Ben Sasson and Alessandro Chiesa and Christina Garman and Matthew Green and Ian Miers and Eran Tromer and Madars Virza}, title = {Zerocash: Decentralized anonymous payments from bitcoin}, booktitle = {Security and Privacy (SP), 2014 IEEE Symposium on}, pages = {459--474}, year = {2014}, organization = {IEEE}, url = {http://zerocash-project.org/media/pdf/zerocash-extended-20140518.pdf}, }
@inproceedings{donet2014bitcoin, author = {Joan Antoni Donet Donet and Cristina P{\'e}rez-Sola and Jordi Herrera-Joancomart{\'\i}}, title = {The bitcoin p2p network}, booktitle = {Financial Cryptography and Data Security}, pages = {87--102}, year = {2014}, publisher = {Springer}, url = {http://fc14.ifca.ai/bitcoin/papers/bitcoin14_submission_3.pdf}, }
@inproceedings{clark2014decentralizing, author = {Jeremy Clark and Joseph Bonneau and Edward W Felten and Joshua A Kroll and Andrew Miller and Arvind Narayanan}, title = {On Decentralizing Prediction Markets and Order Books}, booktitle = {WEIS}, year = {2014}, url = {http://users.encs.concordia.ca/~clark/papers/2014_weis.pdf}, }
@inproceedings{biryukov2014deanonymisation, author = {Alex Biryukov and Dmitry Khovratovich and Ivan Pustogarov}, title = {Deanonymisation of clients in Bitcoin P2P network}, booktitle = {Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security}, pages = {15--29}, year = {2014}, organization = {ACM}, url = {http://arxiv.org/pdf/1405.7418.pdf}, }
@inproceedings{eyal2014majority, author = {Ittay Eyal and Emin G{\"u}n Sirer}, title = {Majority is not enough: Bitcoin mining is vulnerable}, booktitle = {Financial Cryptography and Data Security}, pages = {436--454}, year = {2014}, publisher = {Springer}, url = {http://arxiv.org/pdf/1311.0243}, }
@inproceedings{ruffing2014coinshuffle, author = {Tim Ruffing and Pedro Moreno-Sanchez and Aniket Kate}, title = {CoinShuffle: Practical decentralized coin mixing for Bitcoin}, booktitle = {Computer Security-ESORICS 2014}, pages = {345--364}, year = {2014}, publisher = {Springer}, url = {http://crypsys.mmci.uni-saarland.de/projects/CoinShuffle/coinshuffle.pdf}, }
@inproceedings{huang2014botcoin, author = {Danny Yuxing Huang and Hitesh Dharmdasani and Sarah Meiklejohn and Vacha Dave and Chris Grier and Damon McCoy and Stefan Savage and Nicholas Weaver and Alex C Snoeren and Kirill Levchenko}, title = {Botcoin: Monetizing Stolen Cycles.}, booktitle = {NDSS}, year = {2014}, url = {https://www.cs.gmu.edu/~mccoy/papers/botcoin-ndss14.pdf}, }
@inproceedings{mostefaoui2014signature, author = {Achour Mostefaoui and Hamouma Moumen and Michel Raynal}, title = {Signature-free asynchronous Byzantine consensus with t< n/3 and O (n 2) messages}, booktitle = {Proceedings of the 2014 ACM symposium on Principles of distributed computing}, pages = {2--9}, year = {2014}, organization = {ACM}, url = {https://hal.inria.fr/file/index/docid/944816/filename/RR-2016-Consensus-optimal-V5.pdf}, }
@inproceedings{garman2013decentralized, author = {Christina Garman and Matthew Green and Ian Miers}, title = {Decentralized Anonymous Credentials.}, booktitle = {NDSS}, year = {2014}, url = {http://www.internetsociety.org/sites/default/files/07_3_1.pdf}, }
@inproceedings{biryukov2015bitcoin, author = {Alex Biryukov and Ivan Pustogarov}, title = {Bitcoin over Tor isn't a good idea}, booktitle = {Security and Privacy (SP), 2015 IEEE Symposium on}, pages = {122--134}, year = {2015}, organization = {IEEE}, url = {http://arxiv.org/pdf/1410.6079}, }
@inproceedings{saxena2014increasing, author = {Amitabh Saxena and Janardan Misra and Aritra Dhar}, title = {Increasing Anonymity in Bitcoin}, Booktitle = {Financial Cryptography and Data Security}, Pages = {122--139}, Publisher = {Springer}, Year = {2014}, url = {http://fc14.ifca.ai/bitcoin/papers/bitcoin14_submission_19.pdf}, }
@inproceedings{miller2014permacoin, author = {Andrew Miller and Ari Juels and Elaine Shi and Bryan Parno and Jonathan Katz}, title = {Permacoin: Repurposing bitcoin work for data preservation}, booktitle = {Security and Privacy (SP), 2014 IEEE Symposium on}, pages = {475--490}, year = {2014}, organization = {IEEE}, url = {http://cs.umd.edu/~amiller/permacoin.pdf}, }
@inproceedings{bonneau2014fawkescoin, author = {Joseph Bonneau and Andrew Miller}, title = {Fawkescoin: Bitcoin without public-key crypto}, booktitle = {Security Protocols XXII}, pages = {350--358}, year = {2014}, publisher = {Springer}, url = {http://www.jbonneau.com/doc/BM14-SPW-fawkescoin.pdf}, }
@inproceedings{bonneau2014mixcoin, author = {Joseph Bonneau and Arvind Narayanan and Andrew Miller and Jeremy Clark and Joshua A Kroll and Edward W Felten}, title = {Mixcoin: Anonymity for Bitcoin with accountable mixes}, booktitle = {Financial Cryptography and Data Security}, pages = {486--504}, year = {2014}, publisher = {Springer}, url = {http://eprint.iacr.org/2014/077.pdf}, }
@inproceedings{jansen2014onions, author = {Rob Jansen and Andrew Miller and Paul Syverson and Bryan Ford}, title = {From onions to shallots: Rewarding Tor relays with TEARS}, booktitle = {HotPETs}, year = {2014}, url = {http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA623492}, }
@inproceedings{gervais2014privacy, author = {Arthur Gervais and Srdjan Capkun and Ghassan O Karame and Damian Gruber}, title = {On the privacy provisions of bloom filters in lightweight bitcoin clients}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference}, pages = {326--335}, year = {2014}, organization = {ACM}, url = {http://eprint.iacr.org/2014/763.pdf}, }
@inproceedings{gervais2014bitcoin, author = {Arthur Gervais and Ghassan Karame and Srdjan Capkun and Vedran Capkun}, title = {Is Bitcoin a decentralized currency?}, journal = {IEEE security \& privacy}, volume = {12}, number = {3}, pages = {54--60}, year = {2014}, url = {https://eprint.iacr.org/2013/829.pdf}, }
@inproceedings{kumaresan2014use, author = {Ranjit Kumaresan and Iddo Bentov}, title = {How to use bitcoin to incentivize correct computations}, booktitle = {Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security}, pages = {30--41}, year = {2014}, organization = {ACM}, url = {http://www.cs.technion.ac.il/~idddo/incentivesBitcoin.pdf}, }
@inproceedings{van2014versum, author = {Jelle Hooff and M Frans Kaashoek and Nickolai Zeldovich}, title = {Versum: Verifiable computations over large public logs}, booktitle = {Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security}, pages = {1304--1316}, year = {2014}, organization = {ACM}, url = {http://people.csail.mit.edu/nickolai/papers/vandenhooff-versum.pdf}, }
@inproceedings{andrychowicz2014modeling, author = {Marcin Andrychowicz and Stefan Dziembowski and Daniel Malinowski and {\L}ukasz Mazurek}, title = {Modeling bitcoin contracts by timed automata}, booktitle = {Formal Modeling and Analysis of Timed Systems}, pages = {7--22}, year = {2014}, publisher = {Springer}, url = {http://arxiv.org/pdf/1405.1861}, }
@inproceedings{decker2014bitcoin, author = {Christian Decker and Roger Wattenhofer}, title = {Bitcoin transaction malleability and MtGox}, booktitle = {Computer Security-ESORICS 2014}, pages = {313--326}, year = {2014}, publisher = {Springer}, url = {http://www.tik.ee.ethz.ch/file/7e4a7f3f2991784786037285f4876f5c/malleability.pdf}, }
@inproceedings{bentov2014use, author = {Iddo Bentov and Ranjit Kumaresan}, title = {How to use bitcoin to design fair protocols}, booktitle = {Advances in Cryptology--CRYPTO 2014}, pages = {421--439}, year = {2014}, publisher = {Springer}, url = {http://eprint.iacr.org/2014/129.pdf}, }
@article{ghosh2014torpath, author = {Mainak Ghosh and B Ford and M Richardson}, title = {A TorPath to TorCoin: Proofof-bandwidth altcoins for compensating relays}, year = {2014}, booktitle = {HotPETs}, url = {https://petsymposium.org/2014/papers/Ghosh.pdf}, }
@inproceedings{andrychowicz2014secure, author = {Marcin Andrychowicz and Stefan Dziembowski and Daniel Malinowski and Lukasz Mazurek}, title = {Secure multiparty computations on bitcoin}, booktitle = {Security and Privacy (SP), 2014 IEEE Symposium on}, pages = {443--458}, year = {2014}, organization = {IEEE}, url = {https://eprint.iacr.org/2013/784.pdf}, }
@inproceedings{ongaro2014search, author = {Diego Ongaro and John Ousterhout}, title = {In search of an understandable consensus algorithm}, booktitle = {2014 USENIX Annual Technical Conference (USENIX ATC 14)}, pages = {305--319}, year = {2014}, url = {https://www.usenix.org/system/files/conference/atc14/atc14-paper-ongaro.pdf}, }
@article{bentov2014proof, author = {Iddo Bentov and Charles Lee and Alex Mizrahi and Meni Rosenfeld}, title = {Proof of Activity: Extending Bitcoin's Proof of Work via Proof of Stake [Extended Abstract] y}, journal = {ACM SIGMETRICS Performance Evaluation Review}, volume = {42}, number = {3}, pages = {34--37}, year = {2014}, publisher = {ACM}, url = {http://eprint.iacr.org/2014/452.pdf}, }
@inproceedings{johnson2014game, author = {Benjamin Johnson and Aron Laszka and Jens Grossklags and Marie Vasek and Tyler Moore}, title = {Game-theoretic analysis of DDoS attacks against Bitcoin mining pools}, booktitle = {International Conference on Financial Cryptography and Data Security}, pages = {72--86}, year = {2014}, organization = {Springer}, url = {http://photon.hu/~laszka/papers/johnson2014game.pdf}, }
@inproceedings{vasek2014empirical, author = {Marie Vasek and Micah Thornton and Tyler Moore}, title = {Empirical analysis of denial-of-service attacks in the Bitcoin ecosystem}, booktitle = {International Conference on Financial Cryptography and Data Security}, pages = {57--71}, year = {2014}, organization = {Springer}, url = {http://secon.utulsa.edu/vasek/vasekbtc14.pdf}, }
@article{groza2014cryptographic, author = {Bogdan Groza and Bogdan Warinschi}, title = {Cryptographic puzzles and dos resilience, revisited}, journal = {Designs, Codes and Cryptography}, volume = {73}, number = {1}, pages = {177--207}, year = {2014}, publisher = {Springer}, url = {https://pdfs.semanticscholar.org/b823/a21ffc69e02d2913d112c8ab733629639577.pdf}, }
@inproceedings{courtois2014could, author = {Nicolas T Courtois and Pinar Emirdag and Daniel A Nagy}, title = {Could bitcoin transactions be 100x faster?}, booktitle = {Security and Cryptography (SECRYPT), 2014 11th International Conference on}, pages = {1--6}, year = {2014}, organization = {IEEE}, url = {http://www.nicolascourtois.com/bitcoin/POSTER_100x_Secrypt2014_v1.0.pdf}, }
@article{yelowitz2015characteristics, author = {Aaron Yelowitz and Matthew Wilson}, title = {Characteristics of Bitcoin users: an analysis of Google search data}, journal = {Applied Economics Letters}, volume = {22}, number = {13}, pages = {1030--1036}, year = {2015}, publisher = {Taylor \& Francis}, url = {http://www.yelowitz.com/Yelowitz_Wilson_AEL_2015.pdf}, }
@inproceedings{miller2015shadow, author = {Andrew Miller and Rob Jansen}, title = {Shadow-Bitcoin: scalable simulation via direct execution of multi-threaded applications}, booktitle = {8th Workshop on Cyber Security Experimentation and Test (CSET 15)}, year = {2015}, url = {https://www.usenix.org/system/files/conference/cset15/cset15-miller.pdf}, }
@inproceedings{garay2015bitcoin, author = {Juan Garay and Aggelos Kiayias and Nikos Leonardos}, title = {The bitcoin backbone protocol: Analysis and applications}, booktitle = {Advances in Cryptology-EUROCRYPT 2015}, pages = {281--310}, year = {2015}, publisher = {Springer}, url = {http://courses.cs.washington.edu/courses/cse454/15wi/papers/bitcoin-765.pdf}, }
@inproceedings{lewenberg2015inclusive, author = {Yoad Lewenberg and Yonatan Sompolinsky and Aviv Zohar}, title = {Inclusive block chain protocols}, booktitle = {Financial Cryptography and Data Security}, pages = {528--547}, year = {2015}, publisher = {Springer}, url = {http://www.cs.huji.ac.il/~avivz/pubs/15/inclusive_btc_full.pdf}, }
@inproceedings{bonneau2015research, author = {Joseph Bonneau and Andrew Miller and Jeremy Clark and Arvind Narayanan and Joshua A Kroll and Edward W Felten}, title = {SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies}, booktitle = {IEEE Symposium on Security and Privacy}, year = {2015}, url = {http://www.ieee-security.org/TC/SP2015/papers-archived/6949a104.pdf}, }
@inproceedings{tschorsch2015bitcoin, author = {Florian Tschorsch and Bj{\"o}rn Scheuermann}, title = {Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies}, booktitle = {IEEE Communications Surveys Tutorials}, year = {2016}, volume = {PP}, number = {99}, pages = {1-1}, keywords = {Contracts;Cryptography;Internet;Online banking;Protocols;Space exploration;Tutorials}, doi = {10.1109/COMST.2016.2535718}, ISSN = {1553-877X}, url = {https://eprint.iacr.org/2015/464.pdf}, }
@inproceedings{mann2015two, author = {Christopher Mann and Daniel Loebenberger}, title = {Two-factor authentication for the Bitcoin protocol}, booktitle = {Security and Trust Management}, pages = {155--171}, year = {2015}, publisher = {Springer}, url = {https://eprint.iacr.org/2014/629.pdf}, }
@inproceedings{melara2015keytransparency, author = {Marcela S. Melara and Aaron Blankstein and Joseph Bonneau and Edward W. Felten and Michael J. Freedman}, title = {Bringing Deployable Key Transparency to End Users}, booktitle = {24th USENIX Security Symposium (USENIX Security 15)}, year = {2015}, month = {Aug}, address = {Washington, D.C.}, publisher = {USENIX Association}, url = {https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-melara.pdf}, }
@inproceedings{kalodner2015namecoinempirical, author = {Harry Kalodner and Miles Carlsten and Paul Ellenbogen and Joseph Bonneau and Arvind Narayanan}, title = {An empirical study of Namecoin and lessons for decentralized namespace design}, year = {2015}, booktitle = {WEIS}, url = {http://randomwalker.info/publications/namespaces.pdf}, }
@inproceedings{eskandari2015usability, author = {Shayan Eskandari and David Barrera and Elizabeth Stobert and Jeremy Clark}, title = {A first look at the usability of bitcoin key management}, booktitle = {Workshop on Usable Security (USEC)}, year = {2015}, url = {http://users.encs.concordia.ca/~clark/papers/2015_usec_full.pdf}, }
@inproceedings{zyskind2015decentralizing, author = {Guy Zyskind and Oz Nathan and Alex'Sandy' Pentland}, title = {Decentralizing Privacy: Using Blockchain to Protect Personal Data}, booktitle = {Security and Privacy Workshops (SPW), 2015 IEEE}, pages = {180--184}, year = {2015}, organization = {IEEE}, url = {http://web.media.mit.edu/~guyzys/data/ZNP15.pdf}, }
@inproceedings{mcreynolds2015cryptographic, author = {Emily McReynolds and Adam Lerner and Will Scott and Franziska Roesner and Tadayoshi Kohno}, title = {Cryptographic Currencies from a Tech-Policy Perspective: Policy Issues and Technical Directions}, booktitle = {Financial Cryptography and Data Security}, pages = {94--111}, year = {2015}, publisher = {Springer}, url = {http://fc15.ifca.ai/preproceedings/bitcoin/paper_16.pdf}, }
@inproceedings{ali2015zombiecoin, author = {Syed Taha Ali and Patrick McCorry and Peter Hyun-Jeen Lee and Feng Hao}, title = {ZombieCoin: powering next-generation botnets with bitcoin}, booktitle = {Financial Cryptography and Data Security}, pages = {34--48}, year = {2015}, publisher = {Springer}, url = {http://homepages.cs.ncl.ac.uk/feng.hao/files/zcoin-camera-ready.pdf}, }
@inproceedings{karame2015misbehavior, author = {Ghassan O Karame and Elli Androulaki and Marc Roeschlin and Arthur Gervais and Srdjan {\v{C}}apkun}, title = {Misbehavior in Bitcoin: A Study of Double-Spending and Accountability}, journal = {ACM Transactions on Information and System Security (TISSEC)}, volume = {18}, number = {1}, pages = {2}, year = {2015}, publisher = {ACM}, url = {http://www.syssec.ethz.ch/content/dam/ethz/special-interest/infk/inst-infsec/system-security-group-dam/research/publications/pub2015/tissec15_karame.pdf}, }
@inproceedings{dagher2015provisions, author = {Gaby G Dagher and Benedikt B{\"u}nz and Joseph Bonneau and Jeremy Clark and Dan Boneh}, title = {Provisions: Privacy-preserving proofs of solvency for Bitcoin exchanges}, booktitle = {Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security}, pages = {720--731}, year = {2015}, organization = {ACM}, url = {http://users.encs.concordia.ca/~clark/papers/2015_ccs.pdf}, }
@inproceedings{ruffing2015liar, author = {Tim Ruffing and Aniket Kate and Dominique Schr{\"o}der}, title = {Liar, Liar, Coins on Fire!: Penalizing Equivocation By Loss of Bitcoins}, booktitle = {Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security}, pages = {219--230}, year = {2015}, organization = {ACM}, url = {https://crypsys.mmci.uni-saarland.de/projects/PenalizingEquivocation/penalizing.pdf}, }
@inproceedings{kumaresan2015poker, author = {Ranjit Kumaresan and Tal Moran and Iddo Bentov}, title = {How to Use Bitcoin to Play Decentralized Poker}, booktitle = {Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security}, pages = {195--206}, year = {2015}, organization = {ACM}, url = {http://people.csail.mit.edu/ranjit/papers/poker.pdf}, }
@inproceedings{pass2015micropayments, author = {Rafael Pass and others}, title = {Micropayments for Decentralized Currencies}, booktitle = {Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security}, pages = {207--218}, year = {2015}, organization = {ACM}, url = {http://www.initc3.org/files/micropay2.pdf}, }
@inproceedings{miller2015nonoutsourceable, author = {Andrew Miller and Ahmed Kosba and Jonathan Katz and Elaine Shi}, title = {Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions}, booktitle = {Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security}, pages = {680--691}, year = {2015}, organization = {ACM}, url = {https://cs.umd.edu/~amiller/nonoutsourceable_full.pdf}, }
@inproceedings{gervais2015tampering, author = {Arthur Gervais and Hubert Ritzdorf and Ghassan O Karame and Srdjan Capkun}, title = {Tampering with the Delivery of Blocks and Transactions in Bitcoin}, booktitle = {Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security}, pages = {692--705}, year = {2015}, organization = {ACM}, url = {https://eprint.iacr.org/2015/578.pdf}, }
@inproceedings{decker2015making, author = {Christian Decker and James Guthrie and Jochen Seidel and Roger Wattenhofer}, title = {Making Bitcoin Exchanges Transparent}, booktitle = {Computer Security--ESORICS 2015}, pages = {561--576}, year = {2015}, publisher = {Springer}, url = {http://www.tik.ee.ethz.ch/file/b89cb24ad2fa4e7ef01426d318c9b98b/decker2015making.pdf}, }
@inproceedings{andrychowicz2015pow, author = {Marcin Andrychowicz and Stefan Dziembowski}, title = {PoW-Based Distributed Cryptography with No Trusted Setup}, booktitle = {Advances in Cryptology--CRYPTO 2015}, pages = {379--399}, year = {2015}, publisher = {Springer}, url = {http://eprint.iacr.org/2014/796.pdf}, }
@inproceedings{zohar2015bitcoin, author = {Aviv Zohar}, title = {Bitcoin: under the hood}, journal = {Communications of the ACM}, volume = {58}, number = {9}, pages = {104--113}, year = {2015}, publisher = {ACM}, url = {http://users.encs.concordia.ca/~clark/biblio/bitcoin/Zohar%202015.pdf}, }
@inproceedings{gutoski2015hierarchical, author = {Gus Gutoski and Douglas Stebila}, title = {Hierarchical deterministic Bitcoin wallets that tolerate key leakage (short paper)}, booktitle = {Proceedings of the 19th International Conference on Financial Cryptography and Data Security (FC 2015)}, year = {2015}, organization = {Springer}, url = {http://fc15.ifca.ai/preproceedings/paper_15.pdf}, }
@inproceedings{wilson2015pretty, author = {Duane Wilson and Giuseppe Ateniese}, title = {From Pretty Good to Great: Enhancing PGP Using Bitcoin and the Blockchain}, booktitle = {Network and System Security}, pages = {368--375}, year = {2015}, publisher = {Springer}, url = {http://arxiv.org/pdf/1508.04868}, }
@inproceedings{soska2015measuring, author = {Kyle Soska and Nicolas Christin}, title = {Measuring the longitudinal evolution of the online anonymous marketplace ecosystem}, booktitle = {24th USENIX Security Symposium (USENIX Security 15)}, pages = {33--48}, year = {2015}, url = {https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-soska.pdf}, }
@inproceedings{heilman2015eclipse, author = {Ethan Heilman and Alison Kendler and Aviv Zohar and Sharon Goldberg}, title = {Eclipse Attacks on Bitcoin's Peer-to-Peer Network}, booktitle = {24th USENIX Security Symposium (USENIX Security 15)}, pages = {129--144}, year = {2015}, url = {https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-heilman.pdf}, }
@inproceedings{eyal2015miner, author = {Ittay Eyal}, title = {The miner's dilemma}, booktitle = {Security and Privacy (SP), 2015 IEEE Symposium on}, pages = {89--103}, year = {2015}, organization = {IEEE}, url = {http://arxiv.org/pdf/1411.7099}, }
@inproceedings{vasek2015there, author = {Marie Vasek and Tyler Moore}, title = {There's No Free Lunch, Even Using Bitcoin: Tracking the Popularity and Profits of Virtual Currency Scams}, booktitle = {Financial Cryptography and Data Security}, pages = {44--61}, year = {2015}, publisher = {Springer}, url = {http://secon.utulsa.edu/vasek/vasekfc15.pdf}, }
@inproceedings{sompolinsky2015secure, author = {Yonatan Sompolinsky and Aviv Zohar}, title = {Secure high-rate transaction processing in Bitcoin}, booktitle = {Financial Cryptography and Data Security}, pages = {507--527}, year = {2015}, publisher = {Springer}, url = {http://www.cs.huji.ac.il/~avivz/pubs/15/btc_ghost_full.pdf}, }
@inproceedings{lewenberg2015bitcoin, author = {Yoad Lewenberg and Yoram Bachrach and Yonatan Sompolinsky and Aviv Zohar and Jeffrey S Rosenschein}, title = {Bitcoin mining pools: A cooperative game theoretic analysis}, booktitle = {Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems}, pages = {919--927}, year = {2015}, organization = {International Foundation for Autonomous Agents and Multiagent Systems}, url = {http://www.cs.huji.ac.il/~avivz/pubs/15/fp245-lewenbergA.pdf}, }
@inproceedings{vukolic2015quest, author = {Marko Vukoli{\'c}}, title = {The quest for scalable blockchain fabric: Proof-of-work vs. BFT replication}, booktitle = {International Workshop on Open Problems in Network Security}, pages = {112--125}, year = {2015}, organization = {Springer}, url = {http://vukolic.com/iNetSec_2015.pdf}, }
@inproceedings{luu2015demystifying, author = {Loi Luu and Jason Teutsch and Raghav Kulkarni and Prateek Saxena}, title = {Demystifying incentives in the coluu2016securensensus computer}, booktitle = {Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security}, pages = {706--719}, year = {2015}, organization = {ACM}, url = {http://www.comp.nus.edu.sg/~prateeks/papers/VeriEther.pdf}, }
@article{jimenez2015eventual, author = {Ernesto Jim{\'e}nez and Sergio Ar{\'e}valo and Carlos Herrera and Jian Tang}, title = {Eventual election of multiple leaders for solving consensus in anonymous systems}, journal = {The Journal of Supercomputing}, volume = {71}, number = {10}, pages = {3726--3743}, year = {2015}, publisher = {Springer}, url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.697.3557&rep=rep1&type=pdf}, }
@article{arevalo2015failure, author = {Sergio Ar{\'e}valo and Antonio Fern{\'a}ndez Anta and Damien Imbs and Ernesto Jim{\'e}nez and Michel Raynal}, title = {Failure detectors in homonymous distributed systems (with an application to consensus)}, journal = {Journal of Parallel and Distributed Computing}, volume = {83}, pages = {83--95}, year = {2015}, publisher = {Elsevier}, url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.697.1050&rep=rep1&type=pdf}, }
@article{herrera2015research, author = {Jordi Herrera-Joancomart{\'\i}}, title = {Research and challenges on bitcoin anonymity}, booktitle = {Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance}, pages = {3--16}, year = {2015}, publisher = {Springer}, url = {https://www.researchgate.net/profile/Jordi_Herrera-Joancomarti/publication/281773799_Research_and_Challenges_on_Bitcoin_Anonymity/links/55f7c7d408ae07629dcbc471.pdf}, }
@inproceedings{moser2015trends, author = {Malte M{\"o}ser and Rainer B{\"o}hme}, title = {Trends, tips, tolls: A longitudinal study of Bitcoin transaction fees}, booktitle = {International Conference on Financial Cryptography and Data Security}, pages = {19--33}, year = {2015}, organization = {Springer}, url = {http://fc15.ifca.ai/preproceedings/bitcoin/paper_8.pdf}, }
@inproceedings{danezis2015centrally, author = {George Danezis and Sarah Meiklejohn}, title = {Centrally Banked Cryptocurrencies}, booktitle = {Network and Distributed System Security}, publisher = {The Internet Society}, year = {2016}, url = {http://arxiv.org/pdf/1505.06895}, }
@inproceedings{bonneau2016buy, author = {Joseph Bonneau}, title = {Why buy when you can rent? Bribery attacks on Bitcoin consensus}, booktitle = {BITCOIN '16: Proceedings of the 3rd Workshop on Bitcoin and Blockchain Research}, month = {February}, year = {2016}, url = {http://fc16.ifca.ai/bitcoin/papers/Bon16b.pdf}, }
@inproceedings{krombholz2016other, author = {Katharina Krombholz and Aljosha Judmayer and Matthias Gusenbauer and {Edgar R.} Weippl}, title = {The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy}, booktitle = {International Conference on Financial Cryptography and Data Security (FC)}, year = {2016}, month = {2}, url = {https://www.sba-research.org/wp-content/uploads/publications/TheOtherSideOfTheCoin_FC16preConf.pdf}, }
@inproceedings{kosba2016hawk, author = {Ahmed Kosba and Andrew Miller and Elaine Shi and Zikai Wen and Charalampos Papamanthou}, title = {Hawk: The blockchain model of cryptography and privacy-preserving smart contracts}, booktitle = {Symposium on Security \& Privacy}, publisher = {IEEE}, year = {2016}, url = {http://eprint.iacr.org/2015/675.pdf}, }
@inproceedings{croman2016scaling, author = {Kyle Croman and Christian Decker and Ittay Eyal and Adem Efe Gencer and Ari Juels and Ahmed Kosba and Andrew Miller and Prateek Saxena and Elaine Shi and Emin G{\"u}n}, title = {On Scaling Decentralized Blockchains}, booktitle = {3rd Workshop on Bitcoin and Blockchain Research, Financial Cryptography 16}, year = {2016}, url = {http://www.tik.ee.ethz.ch/file/74bc987e6ab4a8478c04950616612f69/main.pdf}, }
@inproceedings{bonneau2016ethiks, author = {Joseph Bonneau}, title = {EthIKS: Using Ethereum to audit a CONIKS key transparency log}, booktitle = {3rd Workshop on Bitcoin and Blockchain Research, Financial Cryptography 16}, year = {2016}, url = {http://fc16.ifca.ai/bitcoin/papers/Bon16a.pdf}, }
@inproceedings{vasek2016bitcoin, author = {Marie Vasek and Joseph Bonneau and Ryan Castellucci and Cameron Keith and Tyler Moore}, title = {The Bitcoin Brain Drain: Examining the Use and Abuse of Bitcoin Brain Wallets}, booktitle = {FC '16: Proceedings of the the 20th International Conference on Financial Cryptography}, month = {February}, year = {2016}, url = {http://www.jbonneau.com/doc/VBCKM16-FC-bitcoin_brain_wallets.pdf}, }
@inproceedings{moeser2016bitcoin, author = {Malte M{\"o}ser and Ittay Eyal and Emin G{\"u}n Sirer}, title = {Bitcoin Covenants}, booktitle = {FC '16: Proceedings of the the 20th International Conference on Financial Cryptography}, month = {February}, year = {2016}, url = {http://fc16.ifca.ai/bitcoin/papers/MES16.pdf}, }
@inproceedings{schrijvers2016incentive, author = {Okke Schrijvers and Joseph Bonneau and Dan Boneh and Tim Roughgarden}, title = {Incentive Compatibility of Bitcoin Mining Pool Reward Functions}, booktitle = {FC '16: Proceedings of the the 20th International Conference on Financial Cryptography}, month = {February}, year = {2016}, url = {http://www.jbonneau.com/doc/SBBR16-FC-mining_pool_reward_incentive_compatibility.pdf}, }
@inproceedings{nayak2015stubborn, author = {Kartik Nayak and Srijan Kumar and Andrew Miller and Elaine Shi}, title = {Stubborn mining: Generalizing selfish mining and combining with an eclipse attack}, booktitle = {1st IEEE European Symposium on Security and Privacy, 2016}, year = {2016}, publisher = {IEEE}, url = {http://eprint.iacr.org/2015/796.pdf}, }
@inproceedings{eyal2016bitcoinng, author = {Ittay Eyal and Adem Efe Gencer and Emin Gun Sirer and Robbert Renesse}, title = {Bitcoin-NG: A Scalable Blockchain Protocol}, booktitle = {13th USENIX Security Symposium on Networked Systems Design and Implementation (NSDI'16)}, year = {2016}, month = {Mar}, publisher = {USENIX Association}, url = {http://www.usenix.org/system/files/conference/nsdi16/nsdi16-paper-eyal.pdf}, }
@inproceedings{kokoris2016enhancing, author = {Eleftherios Kokoris Kogias and Philipp Jovanovic and Nicolas Gailly and Ismail Khoffi and Linus Gasser and Bryan Ford}, title = {Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing}, booktitle = {25th USENIX Security Symposium (USENIX Security 16)}, year = {2016}, month = {August}, address = {Austin, TX}, url = {http://arxiv.org/pdf/1602.06997.pdf}, publisher = {USENIX Association}, }
@inproceedings{kraft2016difficulty, author = {Daniel Kraft}, title = {Difficulty Control for Blockchain-Based Consensus Systems}, booktitle = {Peer-to-Peer Networking and Applications}, volume = {9}, number = {2}, pages = {397--413}, year = {2016}, doi = {10.1007/s12083-015-0347-x}, url = {https://www.domob.eu/research/DifficultyControl.pdf}, }
@inproceedings{luu2016making, author = {Loi Luu and Duc-Hiep Chu and Hrishi Olickel and Prateek Saxena and Aquinas Hobor}, title = {Making Smart Contracts Smarter}, booktitle = {23rd ACM Conference on Computer and Communications Security (ACM CCS 2016)}, year = {2016}, month = {Oct}, url = {https://eprint.iacr.org/2016/633.pdf}, }
@inproceedings{idelberger2016evaluation, author = {Florian Idelberger and Guido Governatori and R{\'e}gis Riveret and Giovanni Sartor}, title = {Evaluation of Logic-Based Smart Contracts for Blockchain Systems}, booktitle = {International Symposium on Rules and Rule Markup Languages for the Semantic Web}, pages = {167--183}, year = {2016}, organization = {Springer}, url = {https://regisriveretdotorg.files.wordpress.com/2015/11/smart_ruleml.pdf}, }
@inproceedings{kiayias2016fair, author = {Aggelos Kiayias and Hong-Sheng Zhou and Vassilis Zikas}, title = {Fair and robust multi-party computation using a global transaction ledger}, booktitle = {Annual International Conference on the Theory and Applications of Cryptographic Techniques}, pages = {705--734}, year = {2016}, organization = {Springer}, url = {https://eprint.iacr.org/2015/574.pdf}, }
@inproceedings{marino2016setting, author = {Bill Marino and Ari Juels}, title = {Setting Standards for Altering and Undoing Smart Contracts}, booktitle = {International Symposium on Rules and Rule Markup Languages for the Semantic Web}, pages = {151--166}, year = {2016}, organization = {Springer}, url = {http://www.arijuels.com/wp-content/uploads/2016/06/Setting-Standards-for-Altering-and-Undoing-Smart-Contracts.docx}, }
@inproceedings{rasmussen2016bitcoin, author = {Ilias Giechaskiel and Cas Cremers and Kasper B. Rasmussen}, title = {On Bitcoin Security in the Presence of Broken Cryptographic Primitives}, year = {2016}, booktitle = {European Symposium on Research in Computer Security ({ESORICS})}, month = {September}, url = {http://eprint.iacr.org/2016/167.pdf}, }
@inproceedings{tseng2016recent, author = {Lewis Tseng}, title = {Recent results on fault-tolerant consensus in message-passing networks}, booktitle = {International Colloquium on Structural Information and Communication Complexity}, pages = {92--108}, year = {2016}, organization = {Springer}, url = {https://arxiv.org/pdf/1608.07923.pdf}, }
@inproceedings{zhang2016secure, author = {Jie Zhang and Nian Xue and Xin Huang}, title = {A Secure System For Pervasive Social Network-based Healthcare}, booktitle = {IEEE Access}, year = {2016}, month = {Dec}, organization = {IEEE}, url = {https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=7801940}, }
@inproceedings{abeyratne2016blockchain, author = {Saveen A. Abeyratne and Radmehr P. Monfared}, title = {Blockchain ready manufacturing supply chain using distributed ledger}, volume = {5}, number = {09}, pages = {1--10}, year = {2016}, publisher = {eSAT}, url = {http://esatjournals.net/ijret/2016v05/i09/IJRET20160509001.pdf}, }
@inproceedings{anceaume2016safety, author = {Emmanuelle Anceaume and Thibaut Lajoie-Mazenc and Romaric Ludinard and Bruno Sericola}, title = {Safety analysis of Bitcoin improvement proposals}, booktitle = {Network Computing and Applications (NCA), 2016 IEEE 15th International Symposium on}, pages = {318--325}, year = {2016}, organization = {IEEE}, url = {http://www.irisa.fr/dionysos/pages_perso/sericola/PAPIERS/NCA16c.pdf}, }
@inproceedings{teutsch2016cryptocurrencies, author = {Jason Teutsch and Sanjay Jain and Prateek Saxena}, title = {When cryptocurrencies mine their own business}, booktitle = {Financial Cryptography and Data Security (FC 2016)}, year = {2016}, month = {Feb}, url = {https://www.comp.nus.edu.sg/~prateeks/papers/38Attack.pdf}, }
@inproceedings{luu2016secure, author = {Loi Luu and Viswesh Narayanan and Chaodong Zheng and Kunal Baweja and Seth Gilbert and Prateek Saxena}, title = {A secure sharding protocol for open blockchains}, booktitle = {Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security}, pages = {17--30}, year = {2016}, organization = {ACM}, url = {https://www.comp.nus.edu.sg/~prateeks/papers/Elastico.pdf}, }
@inproceedings{bouzid2016anonymity, author = {Zohir Bouzid and Corentin Travers}, title = {Anonymity-Preserving Failure Detectors}, booktitle = {International Symposium on Distributed Computing}, pages = {173--186}, year = {2016}, organization = {Springer}, url = {https://hal.archives-ouvertes.fr/hal-01344446/document}, }
@inproceedings{peters2016understanding, author = {Gareth W Peters and Efstathios Panayi}, title = {Understanding Modern Banking Ledgers through Blockchain Technologies: Future of Transaction Processing and Smart Contracts on the Internet of Money}, booktitle = {Banking Beyond Banks and Money}, pages = {239--278}, year = {2016}, publisher = {Springer}, url = {https://pdfs.semanticscholar.org/0a84/a077ada2acb6918e7764fafcd28f667dae28.pdf}, }
@phdthesis{gupta2016non, author = {Saurabh Gupta}, title = {A Non-Consensus Based Decentralized Financial Transaction Processing Model with Support for Efficient Auditing}, year = {2016}, school = {Arizona State University}, url = {https://repository.asu.edu/attachments/172765/content/Gupta_asu_0010N_16201.pdf}, }
@inproceedings{milutinovic2016proof, author = {Mitar Milutinovic and Warren He and Howard Wu and Maxinder Kanwal}, title = {Proof of Luck: An Efficient Blockchain Consensus Protocol}, booktitle = {SysTEX '16 Proceedings of the 1st Workshop on System Software for Trusted Execution}, year = {2016}, location = {Trento, Italy}, pages = {2:1--2:6}, publisher = {ACM}, url = {http://eprint.iacr.org/2017/249.pdf}, }
@phdthesis{oja2016calculating, author = {Rauno Oja and others}, title = {Calculating the return on security investment of recording X-Road and Estonian electronic identity software into blockchain}, year = {2016}, school = {Tartu {\"U}likool}, url = {http://dspace.ut.ee/bitstream/handle/10062/52269/oja_rauno.pdf}, }
@inproceedings{yli2016current, author = {Jesse Yli-Huumo and Deokyoon Ko and Sujin Choi and Sooyong Park and Kari Smolander}, title = {Where Is Current Research on Blockchain Technology? -- A Systematic Review}, journal = {PloS one}, volume = {11}, number = {10}, pages = {e0163477}, year = {2016}, publisher = {Public Library of Science}, url = {https://www.researchgate.net/profile/Jesse_Yli-Huumo/publication/308877750_Where_Is_Current_Research_on_Blockchain_Technology-A_Systematic_Review/links/57f4a87208ae91deaa5ae601/Where-Is-Current-Research-on-Blockchain-Technology-A-Systematic-Review.pdf}, }
@inproceedings{burdges2016enabling, author = {Jeffrey Burdges and Florian Dold and Christian Grothoff and Marcello Stanisci}, title = {Enabling Secure Web Payments with GNU Taler}, booktitle = {International Conference on Security, Privacy, and Applied Cryptography Engineering}, pages = {251--270}, year = {2016}, organization = {Springer}, url = {https://taler.net/papers/taler2016space.pdf}, }
@inproceedings{zhang2016town, author = {Fan Zhang and Ethan Cecchetti and Kyle Croman and Ari Juels and Elaine Shi}, title = {Town Crier: An Authenticated Data Feed for Smart Contracts}, booktitle = {Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security}, pages = {270--282}, year = {2016}, organization = {ACM}, url = {https://eprint.iacr.org/2016/168.pdf}, }
@inproceedings{carlsten2016instability, author = {Miles Carlsten and Harry Kalodner and S Matthew Weinberg and Arvind Narayanan}, title = {On the instability of bitcoin without the block reward}, booktitle = {Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security}, pages = {154--167}, year = {2016}, organization = {ACM}, }
@inproceedings{natoli2016blockchain, author = {Christopher Natoli and Vincent Gramoli}, title = {The blockchain anomaly}, booktitle = {Network Computing and Applications (NCA), 2016 IEEE 15th International Symposium on}, pages = {310--317}, year = {2016}, organization = {IEEE}, url = {https://arxiv.org/pdf/1605.05438.pdf}, }
@inproceedings{gervais2016security, author = {Arthur Gervais and Ghassan O Karame and Karl W{\"u}st and Vasileios Glykantzis and Hubert Ritzdo rf and Srdjan Capkun}, title = {On the security and performance of proof of work blockchains}, booktitle = {Proceedings of the 2016 ACM SIGSAC}, pages = {3--16}, year = {2016}, organization = {ACM}, }
@inproceedings{ohara2017smart, author = {Kieron O'Hara}, title = {Smart Contracts-Dumb Idea}, booktitle = {IEEE Internet Computing}, volume = {21}, number = {2}, pages = {97--101}, year = {2017}, publisher = {IEEE}, url = {https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=7867719}, }
@inproceedings{levy2017book, author = {Karen EC Levy}, title = {Book-Smart, Not Street-Smart: Blockchain-Based Smart Contracts and The Social Workings of Law}, booktitle = {Engaging Science, Technology, and Society}, volume = {3}, pages = {1--15}, year = {2017}, url = {http://estsjournal.org/article/download/107/61.pdf}, }
@inproceedings{ruffing2017p2p, author = {Tim Ruffing and Pedro Moreno-Sanchez and Aniket Kate}, booktitle = {NDSS'17}, title = {P2P Mixing and Unlinkable Bitcoin Transactions}, year = {2017}, url = {https://crypsys.mmci.uni-saarland.de/projects/FastDC/paper.pdf}, }
@phdthesis{stoffers2017trustworthy, author = {Martin Stoffers}, title = {Trustworthy Provenance Recording using a blockchain-like database}, year = {2017}, school = {Leipzig University}, url = {http://elib.dlr.de/111772/1/thesis.pdf}, }
@inproceedings{dorri2017blockchain, author = {Ali Dorri and Salil S Kanhere and Raja Jurdak and Praveen Gauravaram}, title = {Blockchain for IoT security and privacy: The case study of a smart home}, booktitle = {Pervasive Computing and Communications Workshops (PerCom Workshops), 2017 IEEE International Conference on}, pages = {618--623}, year = {2017}, organization = {IEEE}, url = {https://www.researchgate.net/profile/Ali_Dorri5/publication/312218574_Blockchain_for_IoT_Security_and_Privacy_The_Case_Study_of_a_Smart_Home/links/5877309508ae329d6226e96f/Blockchain-for-IoT-Security-and-Privacy-The-Case-Study-of-a-Smart-Home.pdf}, }
@inproceedings{gaetani2017blockchain, author = {Edoardo Gaetani and Leonardo Aniello and Roberto Baldoni and Federico Lombardi and Andrea Margheri and Vladimiro Sassone}, title = {Blockchain-based database to ensure data integrity in cloud computing environments}, journal = {ITA-SEC. CEUR-WS. org, To Appear}, year = {2017}, url = {http://ceur-ws.org/Vol-1816/paper-15.pdf}, }
@inproceedings{sikorski2017blockchain, author = {Janusz J Sikorski and Joy Haughton and Markus Kraft}, title = {Blockchain technology in the chemical industry: machine-to-machine electricity market}, booktitle = {Applied Energy}, volume = {195}, pages = {234--246}, year = {2017}, publisher = {Elsevier}, url = {https://como.cheng.cam.ac.uk/preprints/c4e-Preprint-178.pdf}, }
@inproceedings{verma2017blockchain, author = {Dinesh Verma and Nirmit Desai and Alun Preece and Ian Taylor}, title = {A blockchain based architecture for asset management in coalition operations}, booktitle = {SPIE Defense+ Security}, pages = {101900Y--101900Y}, year = {2017}, organization = {International Society for Optics and Photonics}, url = {http://orca.cf.ac.uk/99880/1/Block-Chain-Coalitions-v03.pdf}, }
@inproceedings{crain2017blockchain, author = {Tyler Crain and Vincent Gramoli and Mikel Larrea and Michel Raynal}, title = {Blockchain Consensus}, booktitle = {ALGOTEL 2017-19{\`e}mes Rencontres Francophones sur les Aspects Algorithmiques des T{\'e}l{\'e}communications}, year = {2017}, url = {https://hal.inria.fr/hal-01518743/document}, }
@inproceedings{liang2017provchain, author = {Xueping Liang and Sachin Shetty and Deepak Tosh and Charles Kamhoua and Kevin Kwiat and Laurent Njilla}, title = {ProvChain: A Blockchain-based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability}, booktitle = {International Symposium on Cluster, Cloud and Grid Computing, IEEE/ACM}, year = {2017}, url = {https://www.cse.unr.edu/~toshd/assets/provchain.pdf}, }
@inproceedings{lindman2017opportunities, author = {Juho Lindman and Virpi Kristiina Tuunainen and Matti Rossi}, title = {Opportunities and Risks of Blockchain Technologies--A Research Agenda}, booktitle = {Proceedings of the 50th Hawaii International Conference on System Sciences}, year = {2017}, url = {http://scholarspace.manoa.hawaii.edu/bitstream/10125/41338/1/paper0189.pdf}, }
@inproceedings{kothapalli2017smartcast, author = {Abhiram Kothapalli and Andrew Miller and Nikita Borisov}, title = {SmartCast: An Incentive Compatible Consensus Protocol Using Smart Contracts}, booktitle = {Financial Cryptography and Data Security}, year = {2017}, month = {Apr}, url = {http://fc17.ifca.ai/wtsc/SmartCast%20-%20An%20Incentive%20Compatible%20Consensus%20Protocol%20Using%20Smart%20Contracts.pdf}, }
@inproceedings{gipp2017cryptsubmit, author = {Bela Gipp and Corinna Breitinger and Norman Meuschke and Joeran Beel}, title = {CryptSubmit: Introducing Securely Timestamped Manuscript Submission and Peer Review Feedback using the Blockchain}, booktitle = {JVDL}, year = {2017}, url = {https://www.gipp.com/wp-content/papercite-data/pdf/gipp2017b.pdf}, }
@inproceedings{zhang2017publish, author = {Ren Zhang and Bart Preneel}, title = {Publish or Perish: A Backward-Compatible Defense against Selfish Mining in Bitcoin}, booktitle = {Cryptographers' Track at the RSA Conference}, pages = {277--292}, year = {2017}, organization = {Springer}, url = {https://securewww.esat.kuleuven.be/cosic/publications/article-2746.pdf}, }
@inproceedings{rohrer17paymentchannels, author = {Elias Rohrer and Jann-Frederik La{\ss} and Florian Tschorsch}, Title = {Towards a Concurrent and Distributed Route Selection for Payment Channel Networks}, booktitle = {CBT'17: Proceedings of the International Workshop on Cryptocurrencies and Blockchain Technology}, year = {2017}, month = {Sep}, url = {https://arxiv.org/pdf/1708.02419.pdf}, }
@inproceedings{judmayer2017merged, author = {Aljosha Judmayer and Alexei Zamyatin and Nicholas Stifter and Artemios G. Voyiatzis and Edgar Weippl}, title = {Merged Mining: Curse or Cure?}, booktitle = {CBT'17: Proceedings of the International Workshop on Cryptocurrencies and Blockchain Technology}, year = {2017}, month = {Sep}, url = {https://eprint.iacr.org/2017/791.pdf}, }
@inproceedings{mccorry2017atomically, author = {Patrick McCorry and Ethan Heilman and Andrew Miller}, title = {Atomically Trading with Roger: Gambling on the success of a hardfork}, booktitle = {CBT'17: Proceedings of the International Workshop on Cryptocurrencies and Blockchain Technology}, year = {2017}, month = {Sep}, url = {http://homepages.cs.ncl.ac.uk/patrick.mc-corry/atomically-trading-roger.pdf}, }
@inproceedings{halpern2017knowledge, author = {Joseph Y. Halpern and Rafael Pass}, Title = {A Knowledge-Based Analysis of the Blockchain Protocol}, Year = {2017}, booktitle = {Proceedings Sixteenth Conference on Theoretical Aspects of Rationality and Knowledge, {TARK} 2017, Liverpool, UK, 24-26 July 2017.}, pages = {324--335}, url = {https://arxiv.org/pdf/1707.08751.pdf}, }
@inproceedings{grumbach2017distributed, author = {St{\' e}phane Grumbach and Robert Riemann}, Title = {Distributed Random Process for a Large-Scale Peer-to-Peer Lottery}, Year = {2017}, month = {Sep}, booktitle = {Proc. of 17th IFIP Distributed Applications and Interoperable Systems, Jun 2017, Neuch{\^a}tel, Switzerland. Springer, 10320, pp.34-48, 2017, LNCS - Lecture Notes in Computer Science}, url = {https://arxiv.org/pdf/1709.05122.pdf}, }
@inproceedings{eberhardt2017on, author = {Jacob Eberhardt and Stefan Tai}, title = {On or Off the Blockchain? Insights on Off-Chaining Computation and Data}, booktitle = {European Conference on Service-Oriented and Cloud Computing}, pages = {3--15}, year = {2017}, organization = {Springer}, url = {http://www.ise.tu-berlin.de/fileadmin/fg308/publications/2017/2017-eberhardt-tai-offchaining-patterns.pdf}, }
@inproceedings{troncoso2017systematizing, author = {Carmela Troncoso and George Danezis and Marios Isaakidis and Harry Halpin}, title = {Systematizing Decentralization and Privacy: Lessons from 15 years of research and deployments}, booktitle = {Proceedings on Privacy Enhancing Technologies}, year = {2017}, pages = {307--329}, url = {https://petsymposium.org/2017/papers/issue4/paper87-2017-4-source.pdf}, }
@inproceedings{moreno2017pathshuffle, author = {Pedro Moreno-Sanchez and Tim Ruffing and Aniket Kate}, title = {PathShuffle: Credit Mixing and Anonymous Payments for Ripple}, journal = {Proceedings on Privacy Enhancing Technologies}, volume = {1}, pages = {20}, year = {2017}, url = {https://petsymposium.org/2017/papers/issue3/paper21-2017-3-source.pdf}, }
@inproceedings{xu2017taxonomy, author = {Xiwei Xu and Ingo Weber and Mark Staples and Liming Zhu and Jan Bosch and Len Bass and Cesare Pautasso and Paul Rimba}, title = {A Taxonomy of Blockchain-Based Systems for Architecture Design}, booktitle = {Software Architecture (ICSA), 2017 IEEE International Conference on}, pages = {243--252}, year = {2017}, organization = {IEEE}, url = {http://design.inf.usi.ch/sites/default/files/biblio/icsa2017-blockchain.pdf}, }
@article{neiger1994distributed, author = {Gil Neiger}, title = {Distributed consensus revisited}, journal = {Information processing letters}, volume = {49}, number = {4}, pages = {195--201}, year = {1994}, publisher = {Elsevier}, url = {https://smartech.gatech.edu/bitstream/handle/1853/6776/GIT-CC-93-45.pdf}, }
@inproceedings{frowis2017code, author = {Michael Fr{\"o}wis and Rainer B{\"o}hme}, title = {In Code We Trust?}, booktitle = {Data Privacy Management, Cryptocurrencies and Blockchain Technology}, pages = {357--372}, year = {2017}, publisher = {Springer}, url = {http://informationsecurity.uibk.ac.at/pdfs/FB2017-Ethereum-CallGraph-CBT.pdf}, }
@inproceedings{delgado2017fair, author = {Sergi Delgado-Segura and Cristina P{\'e}rez-Sol{\`a} and Guillermo Navarro-Arribas and Jordi Herrera-Joancomart{\'\i}}, title = {A fair protocol for data trading based on Bitcoin transactions}, journal = {Future Generation Computer Systems}, year = {2017}, publisher = {Elsevier}, url = {https://eprint.iacr.org/2017/1018.pdf}, }
@inproceedings{narayanan2017bitcoin, author = {Arvind Narayanan and Jeremy Clark}, title = {Bitcoin's Academic Pedigree}, journal = {Queue}, volume = {15}, number = {4}, month = {aug}, year = {2017}, issn = {1542-7730}, pages = {20:20--20:49}, numpages = {30}, url = {http://doi.acm.org/10.1145/3134434.3136559}, doi = {10.1145/3134434.3136559}, publisher = {ACM}, address = {New York, NY, USA}, }
@inproceedings{buenz2017proofs, author = {Benedikt B{\" u}nz and Steven Goldfeder and Joseph Bonneau}, title = {Proofs-of-delay and randomness beacons in Ethereum}, journal = {IEEE Security \& Privacy on the Blockchain (IEEE S\&B)}, year = {2017}, }
@inproceedings{oconnor2017simplicity, author = {Russell O'Connor}, Title = {Simplicity: A New Language for Blockchains}, Year = {2017}, journal = {Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security. ACM, New York, NY, USA}, Doi = {10.1145/3139337.3139340}, url = {https://arxiv.org/pdf/1711.03028.pdf}, }
@inproceedings{juels2016ring, author = {Ari Juels and Ahmed Kosba and Elaine Shi}, title = {The ring of Gyges: Investigating the future of criminal smart contracts}, booktitle = {Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security}, pages = {283--295}, year = {2016}, organization = {ACM}, url = {http://www.arijuels.com/wp-content/uploads/2013/09/Gyges.pdf}, }
@inproceedings{abraham2017blockchain, author = {Ittai Abraham and Dahlia Malkhi and others}, title = {The Blockchain Consensus Layer and BFT}, journal = {Bulletin of EATCS}, volume = {3}, number = {123}, year = {2017}, url = {http://bulletin.eatcs.org/index.php/beatcs/article/download/506/495.pdf}, }
@inproceedings{ermilov2017clustering, author = {D. Ermilov and M. Panov and Y. Yanovich}, booktitle = {2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA)}, title = {Automatic Bitcoin Address Clustering}, year = {2017}, pages = {461-466}, doi = {10.1109/ICMLA.2017.0-118}, month = {Dec}, url = {http://bitfury.com/content/5-white-papers-research/clustering_whitepaper.pdf}, }
@inproceedings{liao2017incentivizing, author = {Kevin Liao and Jonathan Katz}, title = {Incentivizing blockchain forks via whale transactions}, booktitle = {International Conference on Financial Cryptography and Data Security}, pages = {264--279}, year = {2017}, organization = {Springer}, url = {http://www.cs.umd.edu/~jkatz/papers/whale-txs.pdf}, }
@inproceedings{velner2017smart, author = {Yaron Velner and Jason Teutsch and Loi Luu}, title = {Smart contracts make Bitcoin mining pools vulnerable}, booktitle = {International Conference on Financial Cryptography and Data Security}, pages = {298--316}, year = {2017}, organization = {Springer}, }
@inproceedings{pirlea2018mechanising, author = {George P{\^ i}rlea and Ilya Sergey}, title = {Mechanising Blockchain Consensus}, journal = {Proceedings of the 7th ACM SIGPLAN International Conference on Certified Programs and Proofs}, series = {CPP 2018}, year = {2018}, pages = {78--90}, url = {http://ilyasergey.net/papers/toychain-cpp18.pdf}, }
@inproceedings{golomb2018ciota, author = {Tomer Golomb and Yisroel Mirsky and Yuval Elovici}, Title = {CIoTA: Collaborative IoT Anomaly Detection via Blockchain}, Year = {2018}, journal = {Workshop on Decentralized IoT Security and Standards (DISS)}, url = {https://arxiv.org/pdf/1803.03807.pdf}, }
@inproceedings{zamyatin2018wild, author = {Alexei Zamyatin and Nicholas Stifter and Aljosha Judmayer and Philipp Schindler and Edgar Weippl and William J. Knottebelt}, title = {{(Short Paper) A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice}}, booktitle = {5th Workshop on Bitcoin and Blockchain Research, Financial Cryptography and Data Security 18 (FC). Springer}, year = {2018}, url = {https://eprint.iacr.org/2018/087.pdf}, }
@inproceedings{gencer2018decentralization, author = {Adem Efe Gencer and Soumya Basu and Ittay Eyal and Robbert Renesse and Emin G{\"u}n Sirer}, title = {Decentralization in Bitcoin and Ethereum Networks}, booktitle = {Proceedings of the 22nd International Conference on Financial Cryptography and Data Security (FC). Springer}, year = {2018}, url = {http://fc18.ifca.ai/preproceedings/75.pdf}, }
@inproceedings{huang2018estimating, author = {Danny Yuxing Huang and Kirill Levchenko and Alex C Snoeren}, title = {Short Paper: Estimating Profitability of Alternative Cryptocurrencies}, booktitle = {Proceedings of the 22nd International Conference on Financial Cryptography and Data Security (FC). Springer}, year = {2018}, url = {http://fc18.ifca.ai/preproceedings/12.pdf}, }
@inproceedings{matzutt2018quantitative, author = {Roman Matzutt and Jens Hiller and Martin Henze and Jan Henrik Ziegeldorf and Dirk M{\"u}llmann and Oliver Hohlfeld and Klaus Wehrle}, title = {A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin}, booktitle = {Proceedings of the 22nd International Conference on Financial Cryptography and Data Security (FC). Springer}, year = {2018}, url = {http://fc18.ifca.ai/preproceedings/6.pdf}, }
@inproceedings{zhang2018anonymous, author = {Huang Zhang and Fangguo Zhang and Haibo Tian and Man Ho Au}, title = {Anonymous Post-Quantum Cryptocash}, booktitle = {Proceedings of the 22nd International Conference on Financial Cryptography and Data Security (FC). Springer}, year = {2018}, url = {http://fc18.ifca.ai/preproceedings/16.pdf}, }
@inproceedings{park2018spacemint, author = {Sunoo Park and Alber Kwon and Georg Fuchbauer and Peter Gazi and J{\"o}el Alwen and Krzysztof Pietrzak}, title = {SpaceMint: A Cryptocurrency Based on Proofs of Space}, booktitle = {Proceedings of the 22nd International Conference on Financial Cryptography and Data Security (FC). Springer}, year = {2018}, url = {http://fc18.ifca.ai/preproceedings/78.pdf}, }
@inproceedings{david2018kaleidoscope, author = {Bernardo David and Rafael Dowsley and Mario Larangeira}, title = {Kaleidoscope: An Efficient Poker Protocol with Payment Distribution and Penalty Enforcement}, booktitle = {Proceedings of the 22nd International Conference on Financial Cryptography and Data Security (FC). Springer}, year = {2018}, url = {http://fc18.ifca.ai/preproceedings/19.pdf}, }
@inproceedings{mavridou2018designing, author = {Anastasia Mavridou and Aron Laszka}, title = {Designing Secure Ethereum Smart Contracts: A Finite State Machine Based Approach}, booktitle = {Proceedings of the 22nd International Conference on Financial Cryptography and Data Security (FC). Springer}, year = {2018}, url = {http://fc18.ifca.ai/preproceedings/101.pdf}, }
@inproceedings{atzei2018formal, author = {Nicola Atzei and Massimo Bartoletti and Stefano Lande and Roberto Zunino}, title = {A formal model of Bitcoin transactions}, booktitle = {Proceedings of the 22nd International Conference on Financial Cryptography and Data Security (FC). Springer}, year = {2018}, url = {http://fc18.ifca.ai/preproceedings/92.pdf}, }
@inproceedings{mccorry2018smart, author = {Patrick McCorry and Alexander Hicks and Sarah Meiklejohn}, title = {Smart Contracts for Bribing Miners}, booktitle = {5th Workshop on Bitcoin and Blockchain Research, Financial Cryptography and Data Security 18 (FC). Springer}, year = {2018}, url = {http://fc18.ifca.ai/bitcoin/papers/bitcoin18-final14.pdf}, }
@inproceedings{bowe2018multi, author = {Sean Bowe and Ariel Gabizon and Matthew D Green}, title = {A multi-party protocol for constructing the public parameters of the Pinocchio zk-SNARK}, booktitle = {5th Workshop on Bitcoin and Blockchain Research, Financial Cryptography and Data Security 18 (FC). Springer}, year = {2018}, url = {http://fc18.ifca.ai/bitcoin/papers/bitcoin18-full1.pdf}, }
@inproceedings{zhang2018paralysis, author = {Fan Zhang and Philip Daian and Iddo Bentov and Ari Juels}, title = {Paralysis Proofs: Safe Access-Structure Updates for Cryptocurrencies and More}, booktitle = {5th Workshop on Bitcoin and Blockchain Research, Financial Cryptography and Data Security 18 (FC). Springer}, year = {2018}, url = {http://fc18.ifca.ai/bitcoin/papers/bitcoin18-final20.pdf}, }
@inproceedings{vasek2018analyzing, author = {Marie Vasek and Tyler Moore}, title = {Analyzing the Bitcoin Ponzi Scheme Ecosystem}, booktitle = {5th Workshop on Bitcoin and Blockchain Research, Financial Cryptography and Data Security 18 (FC). Springer}, year = {2018}, url = {http://fc18.ifca.ai/bitcoin/papers/bitcoin18-final11.pdf}, }
@inproceedings{chepurnoy2018systematic, author = {Alexander Chepurnoy and Vasily Kharin and Dmitry Meshkov}, title = {A Systematic Approach To Cryptocurrency Fees}, booktitle = {5th Workshop on Bitcoin and Blockchain Research, Financial Cryptography and Data Security 18 (FC). Springer}, year = {2018}, url = {http://fc18.ifca.ai/bitcoin/papers/bitcoin18-final18.pdf}, }
@inproceedings{azouvi2018egalitarian, author = {Sarah Azouvi and Mary Maller and Sarah Meiklejohn}, title = {Egalitarian Society or Benevolent Dictatorship: The State of Cryptocurrency Governance}, booktitle = {5th Workshop on Bitcoin and Blockchain Research, Financial Cryptography and Data Security 18 (FC). Springer}, year = {2018}, url = {http://fc18.ifca.ai/bitcoin/papers/bitcoin18-final13.pdf}, }
@inproceedings{bonneau2018hostile, author = {Joseph Bonneau}, title = {Hostile blockchain takeovers (short paper)}, booktitle = {5th Workshop on Bitcoin and Blockchain Research, Financial Cryptography and Data Security 18 (FC). Springer}, year = {2018}, url = {http://fc18.ifca.ai/bitcoin/papers/bitcoin18-final17.pdf}, }
@inproceedings{delgado2018analysis, author = {Sergi Delgado-Segura and Cristina P{\'e}rez-Sola and Guillermo Navarro-Arribas and Jordi Herrera-Joancomart{\i}}, title = {Analysis of the Bitcoin UTXO set}, booktitle = {5th Workshop on Bitcoin and Blockchain Research, Financial Cryptography and Data Security 18 (FC). Springer}, year = {2018}, url = {http://fc18.ifca.ai/bitcoin/papers/bitcoin18-final6.pdf}, }
@inproceedings{grundmann2018exploiting, author = {Matthias Grundmann and Till Neudecker and Hannes Hartenstein}, title = {Exploiting Transaction Accumulation and Double Spends for Topology Inference in Bitcoin}, booktitle = {5th Workshop on Bitcoin and Blockchain Research, Financial Cryptography and Data Security 18 (FC). Springer}, year = {2018}, url = {http://fc18.ifca.ai/bitcoin/papers/bitcoin18-final10.pdf}, }
@inproceedings{anderson2018redux, author = {Ross Anderson and Ilia Shumailov and Mansoor Ahmed and Alessandro Rietmann}, title = {Bitcoin Redux}, booktitle = {17th Annual Workshop on the Economics of Information Security}, year = {2018}, location = {Innsbruck, Austria}, url = {https://weis2018.econinfosec.org/wp-content/uploads/sites/5/2018/05/WEIS_2018_paper_38.pdf}, }
@inproceedings{judmayer2018pitchfork, author = {Aljosha Judmayer and Nicholas Stifter and Philipp Schindler and Edgar Weippl}, title = {Pitchforks in Cryptocurrencies: Enforcing rule changes through offensive forking- and consensus techniques (Short Paper)}, booktitle = {CBT'18: Proceedings of the International Workshop on Cryptocurrencies and Blockchain Technology}, year = {2018}, month = {Sep}, url = {https://www.sba-research.org/wp-content/uploads/2018/09/judmayer2018pitchfork_2018-09-05.pdf}, }
@inproceedings{ullrich2018proof, author = {Johanna Ullrich and Nicholas Stifter and Aljosha Judmayer and Adrian Dabrowski and Edgar Weippl}, title = {Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids}, booktitle = {International Symposium on Research in Attacks, Intrusions, and Defenses}, pages = {184--203}, year = {2018}, organization = {Springer}, url = {https://sqi.at/resources/RAID2018.pdf}, }
@inproceedings{moser2018empirical, author = {Malte M{\"o}ser and Kyle Soska and Ethan Heilman and Kevin Lee and Henry Heffan and Shashvat Srivastava and Kyle Hogan and Jason Hennessey and Andrew Miller and Arvind Narayanan and others}, title = {An empirical analysis of traceability in the monero blockchain}, journal = {Proceedings on Privacy Enhancing Technologies}, volume = {2018}, number = {3}, pages = {143--163}, year = {2018}, publisher = {De Gruyter Open}, url = {https://www.degruyter.com/downloadpdf/j/popets.2018.2018.issue-3/popets-2018-0025/popets-2018-0025.pdf}, }
@article{hinteregger2018empirical, author = {Abraham Hinteregger and Bernhard Haslhofer}, title = {An Empirical Analysis of Monero Cross-Chain Traceability}, journal = {arXiv preprint arXiv:1812.02808}, year = {2018}, url = {https://arxiv.org/pdf/1812.02808.pdf}, }
@misc{garay2018consensus, author = {Juan Garay and Aggelos Kiayias}, title = {SoK: A Consensus Taxonomy in the Blockchain Era}, howpublished = {Cryptology ePrint Archive, Report 2018/754}, year = {2018}, url = {https://eprint.iacr.org/2018/754.pdf}, }
@inproceedings{nikolic2018finding, author = {Ivica Nikoli{\'c} and Aashish Kolluri and Ilya Sergey and Prateek Saxena and Aquinas Hobor}, title = {Finding the greedy, prodigal, and suicidal contracts at scale}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference}, pages = {653--663}, year = {2018}, organization = {ACM}, url = {https://ilyasergey.net/papers/maian-acsac18.pdf}, }
@misc{rodler2018sereum, author = {Michael Rodler and Wenting Li and Ghassan O. Karame and Lucas Davi}, Title = {Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks}, Year = {2018}, howpublished = {arXiv:1812.05934}, url = {https://arxiv.org/pdf/1812.05934.pdf}, }
@misc{li2018detecting, author = {Ao Li and Fan Long}, Title = {Detecting Standard Violation Errors in Smart Contracts}, Year = {2018}, howpublished = {arXiv:1812.07702}, url = {https://arxiv.org/pdf/1812.07702.pdf}, }
@misc{fullmer2018analysis, author = {Daniel Fullmer and A. S. Morse}, Title = {Analysis of Difficulty Control in Bitcoin and Proof-of-Work Blockchains}, Year = {2018}, howpublished = {arXiv:1812.10792}, url = {https://arxiv.org/pdf/1812.10792.pdf}, }
@misc{crain2018evaluating, author = {Tyler Crain and Christopher Natoli and Vincent Gramoli}, Title = {Evaluating the Red Belly Blockchain}, Year = {2018}, howpublished = {arXiv:1812.11747}, url = {https://arxiv.org/pdf/1812.11747.pdf}, }
@misc{zamyatin2018xclaim, author = {Alexei Zamyatin and Dominik Harz and Joshua Lind and Panayiotis Panayiotou and Arthur Gervais and William J. Knottenbelt}, title = {XCLAIM: Trustless, Interoperable Cryptocurrency-Backed Assets}, howpublished = {Cryptology ePrint Archive, Report 2018/643}, year = {2018}, note = {\url{https://eprint.iacr.org/2018/643}}, url = {https://eprint.iacr.org/2018/643.pdf}, }
@misc{kolluri2018exploiting, author = {Aashish Kolluri and Ivica Nikolic and Ilya Sergey and Aquinas Hobor and Prateek Saxena}, Title = {Exploiting The Laws of Order in Smart Contracts}, Year = {2018}, howpublished = {arXiv:1810.11605}, url = {https://arxiv.org/pdf/1810.11605.pdf}, }
@inproceedings{tsabary2018gap, author = {Itay Tsabary and Ittay Eyal}, title = {The gap game}, booktitle = {Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security}, pages = {713--728}, year = {2018}, organization = {ACM}, url = {https://arxiv.org/pdf/1805.05288.pdf}, }
@inproceedings{manshaei2018game, author = {Mohammad Hossein Manshaei and Murtuza Jadliwala and Anindya Maiti and Mahdi Fooladgar}, title = {A game-theoretic analysis of shard-based permissionless blockchains}, journal = {IEEE Access}, volume = {6}, pages = {78100--78112}, year = {2018}, publisher = {IEEE}, url = {https://ieeexplore.ieee.org/ielx7/6287639/8274985/08558531.pdf}, }
@inproceedings{stifter2019echoes, author = {Nicholas Stifter and Philipp Schindler and Aljosha Judmayer and Alexei Zamyatin and Andreas Kern and Edgar Weippl}, title = {Echoes of the Past: Recovering Blockchain Metrics From Merged Mining}, booktitle = {Proceedings of the 23nd International Conference on Financial Cryptography and Data Security (FC)}, year = {2019}, organization = {Springer}, url = {https://fc19.ifca.ai/preproceedings/41-preproceedings.pdf}, }
@inproceedings{schindler2019distributed, author = {Philipp Schindler and Aljosha Judmayer and Nicholas Stifter and Edgar Weippl}, title = {Distributed Key Generation with Ethereum Smart Contracts}, booktitle = {First Cryptocurrency Implementers' Workshop (CIW'19), Financial Cryptography and Data Security 2019 (FC). Springer}, year = {2019}, url = {https://raw.githubusercontent.com/PhilippSchindler/ethdkg/master/paper/Distributed%20Key%20Generation%20with%20Ethereum%20Smart%20Contracts.pdf}, }
@inproceedings{eskandari2019sok, author = {Shayan Eskandari and Seyedehmahsa Moosavi and Jeremy Clark}, title = {SoK: Transparent Dishonesty: front-running attacks on Blockchain}, journal = {arXiv preprint arXiv:1902.05164}, url = {https://arxiv.org/pdf/1902.05164.pdf}, year = {2019}, }
@inproceedings{sergey2018temporal, author = {Ilya Sergey and Amrit Kumar and Aquinas Hobor}, title = {Temporal Properties of Smart Contracts}, booktitle = {Leveraging Applications of Formal Methods, Verification and Validation. Industrial Practice - 8th International Symposium, ISoLA 2018, Limassol, Cyprus, November 5-9, 2018, Proceedings, Part {IV}}, pages = {323--338}, year = {2018}, url = {https://ilyasergey.net/papers/temporal-isola18.pdf}, }
@inproceedings{jourdan2018characterizing, author = {Marc Jourdan and Sebastien Blandin and Laura Wynter and Pralhad Deshpande}, title = {Characterizing entities in the bitcoin blockchain}, booktitle = {2018 IEEE International Conference on Data Mining Workshops (ICDMW)}, pages = {55--62}, year = {2018}, organization = {IEEE}, url = {https://arxiv.org/pdf/1810.11956.pdf}, }
@inproceedings{ponti2019sluggish, author = {Beltr{\'a}n Borja Fiz Pontiveros and Christof Ferreira Torres and Radu State}, title = {Sluggish Mining: Profiting from the Verifier's Dilemma}, year = {2019}, howpublished = {WTSC'19: 3rd Workshop on Trusted Smart Contracts}, url = {https://fc19.ifca.ai/wtsc/SluggishMining.pdf}, }
@misc{mavridou2019verisolid, author = {Anastasia Mavridou and Aron Laszka and Emmanouela Stachtiari and Abhishek Dubey}, Title = {VeriSolid: Correct-by-Design Smart Contracts for Ethereum}, Year = {2019}, howpublished = {arXiv:1901.01292}, url = {https://arxiv.org/pdf/1901.01292.pdf}, }
@misc{saraph2019empirical, author = {Vikram Saraph and Maurice Herlihy}, Title = {An Empirical Study of Speculative Concurrency in Ethereum Smart Contracts}, Year = {2019}, howpublished = {arXiv:1901.01376}, url = {https://arxiv.org/pdf/1901.01376.pdf}, }
@article{deuber2019redactable, author = {Dominic Deuber and Bernardo Magri and Sri Aravinda Krishnan Thyagarajan}, Title = {Redactable Blockchain in the Permissionless Setting}, Year = {2019}, howpublished = {arXiv:1901.03206}, Doi = {10.1109/SP.2019.00039}, url = {https://arxiv.org/pdf/1901.03206.pdf}, }
@misc{paillisse2019distributed, author = {Jordi Paillisse and Jordi Subira and Albert Lopez and Alberto Rodriguez-Natal and Vina Ermagan and Fabio Maino and Albert Cabellos}, Title = {Distributed Access Control with Blockchain}, Year = {2019}, howpublished = {arXiv:1901.03568}, url = {https://arxiv.org/pdf/1901.03568.pdf}, }
@misc{seres2019topological, author = {Istv{\'a}n Andr{\'a}s Seres and L{\'a}szl{\'o} Guly{\'a}s and D{\'a}niel A. Nagy and P{\'e}ter Burcsi}, Title = {Topological Analysis of Bitcoin's Lightning Network}, Year = {2019}, howpublished = {arXiv:1901.04972}, url = {https://arxiv.org/pdf/1901.04972.pdf}, }
@misc{aoki2019simblock, author = {Yusuke Aoki and Kai Otsuki and Takeshi Kaneko and Ryohei Banno and Kazuyuki Shudo}, Title = {SimBlock: A Blockchain Network Simulator}, Year = {2019}, howpublished = {arXiv:1901.09777}, url = {https://arxiv.org/pdf/1901.09777.pdf}, }
@article{rouhani2019physical, author = {Sara Rouhani and Vahid Pourheidari and Ralph Deters}, Title = {Physical Access Control Management System Based on Permissioned Blockchain}, Year = {2019}, howpublished = {arXiv:1901.09873}, Doi = {10.1109/Cybermatics_2018.2018.00198}, url = {https://arxiv.org/pdf/1901.09873.pdf}, }
@misc{patsonakis2019practicality, author = {Christos Patsonakis and Katerina Samari and Aggelos Kiayias and Mema Roussopoulos}, Title = {On the Practicality of Smart Contract PKI}, Year = {2019}, howpublished = {arXiv:1902.00878}, url = {https://arxiv.org/pdf/1902.00878.pdf}, }
@misc{meneghetti2019twotier, author = {Alessio Meneghetti and Armanda Ottaviano Quintavalle and Massimiliano Sala and Alessandro Tomasi}, Title = {Two-tier blockchain timestamped notarization with incremental security}, Year = {2019}, howpublished = {arXiv:1902.03136}, url = {https://arxiv.org/pdf/1902.03136.pdf}, }
@misc{westerkamp2019verifiable, author = {Martin Westerkamp}, Title = {Verifiable Smart Contract Portability}, Year = {2019}, howpublished = {arXiv:1902.03868}, url = {https://arxiv.org/pdf/1902.03868.pdf}, }
@misc{wu2019empirical, author = {Kaidong Wu}, Title = {An Empirical Study of Blockchain-based Decentralized Applications}, Year = {2019}, howpublished = {arXiv:1902.04969}, url = {https://arxiv.org/pdf/1902.04969.pdf}, }
@misc{li2019decentralized, author = {Chao Li and Balaji Palanisamy}, Title = {Decentralized Release of Self-emerging Data using Smart Contracts}, Year = {2019}, howpublished = {arXiv:1902.05623}, url = {https://arxiv.org/pdf/1902.05623.pdf}, }
@misc{li2019decentralized2, author = {Chao Li and Balaji Palanisamy}, Title = {Decentralized Privacy-preserving Timed Execution in Blockchain-based Smart Contract Platforms}, Year = {2019}, howpublished = {arXiv:1902.05613}, url = {https://arxiv.org/pdf/1902.05613.pdf}, }
@misc{feng2019precise, author = {Yu Feng and Emina Torlak and Rastislav Bodik}, Title = {Precise Attack Synthesis for Smart Contracts}, Year = {2019}, howpublished = {arXiv:1902.06067}, url = {https://arxiv.org/pdf/1902.06067.pdf}, }
@misc{li2019scalable, author = {Chao Li and Balaji Palanisamy and Runhua Xu}, Title = {Scalable and Privacy-preserving Design of On/Off-chain Smart Contracts}, Year = {2019}, howpublished = {arXiv:1902.06359}, url = {https://arxiv.org/pdf/1902.06359.pdf}, }
@misc{perez2019smart, author = {Daniel Perez and Benjamin Livshits}, Title = {Smart Contract Vulnerabilities: Does Anyone Care?}, Year = {2019}, howpublished = {arXiv:1902.06710}, url = {https://arxiv.org/pdf/1902.06710.pdf}, }
@misc{ferreira2019art, author = {Christof Ferreira Torres and Mathis Steichen}, Title = {The Art of The Scam: Demystifying Honeypots in Ethereum Smart Contracts}, Year = {2019}, Eprint = {arXiv:1902.06976}, url = {https://arxiv.org/pdf/1902.06976.pdf}, }
@misc{wang2019measurement, author = {Canhui Wang and Xiaowen Chu and Qin Yang}, Title = {Measurement and Analysis of the Bitcoin Networks: A View from Mining Pools}, Year = {2019}, howpublished = {arXiv:1902.07549}, url = {https://arxiv.org/pdf/1902.07549.pdf}, }
@misc{amoussouguenou2019rationals, author = {Yackolley Amoussou-Guenou and Bruno Biais and Maria Potop-Butucaru and Sara Tucci-Piergiovanni}, Title = {Rationals vs Byzantines in Consensus-based Blockchains}, Year = {2019}, howpublished = {arXiv:1902.07895}, url = {https://arxiv.org/pdf/1902.07895.pdf}, }
@misc{chatterjee2019probabilistic, author = {Krishnendu Chatterjee and Amir Kafshdar Goharshady and Arash Pourdamghani}, Title = {Probabilistic Smart Contracts: Secure Randomness on the Blockchain}, Year = {2019}, howpublished = {arXiv:1902.07986}, url = {https://arxiv.org/pdf/1902.07986.pdf}, }
@inproceedings{fraga2019review, author = {Paula Fraga-Lamas and Tiago M Fern{\'a}ndez-Caram{\'e}s}, title = {A Review on Blockchain Technologies for an Advanced and Cyber-Resilient Automotive Industry}, journal = {IEEE Access}, volume = {7}, pages = {17578--17598}, year = {2019}, publisher = {IEEE}, url = {https://ieeexplore.ieee.org/iel7/6287639/6514899/08626103.pdf}, }
@misc{kwon2019bitcoin, author = {Yujin Kwon and Hyoungshick Kim and Jinwoo Shin and Yongdae Kim}, Title = {Bitcoin vs. Bitcoin Cash: Coexistence or Downfall of Bitcoin Cash?}, Year = {2019}, howpublished = {arXiv:1902.11064}, url = {https://arxiv.org/pdf/1902.11064.pdf}, }
@misc{robinson2019anonymous, author = {Peter Robinson and John Brainard}, Title = {Anonymous State Pinning for Private Blockchains}, Year = {2019}, howpublished = {arXiv:1903.02752}, url = {https://arxiv.org/pdf/1903.02752.pdf}, }
@misc{xiong2019anonymous, author = {Jie Xiong and Qi Wang}, Title = {Anonymous Auction Protocol Based on Time-Released Encryption atop Consortium Blockchain}, Year = {2019}, howpublished = {arXiv:1903.03285}, url = {https://arxiv.org/pdf/1903.03285.pdf}, }
@misc{jalalzai2019proteus, author = {Mohammad M. Jalalzai and Costas Busch and Golden Richard III}, Title = {Proteus: A Scalable BFT Consesus Protocol for Blockchains}, Year = {2019}, howpublished = {arXiv:1903.04134}, url = {https://arxiv.org/pdf/1903.04134.pdf}, }
@misc{leonardos2019weighted, author = {Stefanos Leonardos and Daniel Reijsbergen and Georgios Piliouras}, Title = {Weighted Voting on the Blockchain: Improving Consensus in Proof of Stake Protocols}, Year = {2019}, howpublished = {arXiv:1903.04213}, url = {https://arxiv.org/pdf/1903.04213.pdf}, }
@misc{hardjono2019verifiable, author = {Thomas Hardjono and Alex Pentland}, Title = {Verifiable Anonymous Identities and Access Control in Permissioned Blockchains}, Year = {2019}, howpublished = {arXiv:1903.04584}, url = {https://arxiv.org/pdf/1903.04584.pdf}, }
@article{kolokotronis2019blockchain, author = {Nicholas Kolokotronis and Konstantinos Limniotis and Stavros Shiaeles and Romain Griffiths}, Title = {Blockchain Technologies for Enhanced Security and Privacy in the Internet of Things}, Year = {2019}, Eprint = {arXiv:1903.04794}, Howpublished = {IEEE Consumer Electronics Magazine, 2019}, Doi = {10.1109/MCE.2019.2892221}, url = {https://arxiv.org/pdf/1903.04794.pdf}, }
@article{delgadomohatar2019blockchain, author = {Oscar Delgado-Mohatar and Julian Fierrez and Ruben Tolosana and Ruben Vera-Rodriguez}, Title = {Blockchain and Biometrics: A First Look into Opportunities and Challenges}, Year = {2019}, Eprint = {arXiv:1903.05496}, Howpublished = {Blockchain and Applications, 2019 Intl. Congress on}, url = {https://arxiv.org/pdf/1903.05496.pdf}, }
@misc{guo2019multiauthority, author = {Hao Guo and Ehsan Meamari and Chien-Chung Shen}, Title = {Multi-Authority Attribute-Based Access Control with Smart Contract}, Year = {2019}, howpublished = {arXiv:1903.07009}, url = {https://arxiv.org/pdf/1903.07009.pdf}, }
@misc{restuccia2019blockchain, author = {Francesco Restuccia and Salvatore D'Oro S. Kanhere and Tommaso Melodia and Sajal K. Das}, Title = {Blockchain for the Internet of Things: Present and Future}, Year = {2019}, howpublished = {arXiv:1903.07448}, url = {https://arxiv.org/pdf/1903.07448.pdf}, }
@misc{zhang2019security, author = {Rui Zhang and Rui Xue and Ling Liu}, Title = {Security and Privacy on Blockchain}, Year = {2019}, howpublished = {arXiv:1903.07602}, url = {https://arxiv.org/pdf/1903.07602.pdf}, }
@misc{lin2019evaluation, author = {Yu-Jing Lin and Po-Wei Wu and Cheng-Han Hsu and I-Ping Tu and Shih-wei Liao}, Title = {An Evaluation of Bitcoin Address Classification based on Transaction History Summarization}, Year = {2019}, howpublished = {arXiv:1903.07994}, url = {https://arxiv.org/pdf/1903.07994.pdf}, }
@misc{dong2019proofware, author = {Zhongli Dong and Young Choon Lee and Albert Y. Zomaya}, Title = {Proofware: Proof of Useful Work Blockchain Consensus Protocol for Decentralized Applications}, Year = {2019}, howpublished = {arXiv:1903.09276}, url = {https://arxiv.org/pdf/1903.09276.pdf}, }
@article{bessa2019blockchain, author = {Emanuel E. Bessa and Joberto S. B. Martins}, Title = {A Blockchain-based Educational Record Repository}, Year = {2019}, howpublished = {arXiv:1904.00315}, Doi = {10.5281/zenodo.2567524}, url = {https://arxiv.org/pdf/1904.00315.pdf}, }
@misc{anjana2019achieving, author = {Parwat Singh Anjana and Sweta Kumari and Sathya Peri and Archit Somani}, Title = {Achieving Greater Concurrency in Execution of Smart Contracts using Object Semantics}, Year = {2019}, howpublished = {arXiv:1904.00358}, url = {https://arxiv.org/pdf/1904.00358.pdf}, }
@misc{meneghetti2019survey, author = {Alessio Meneghetti and Tommaso Parise and Massimiliano Sala and Daniele Taufer}, Title = {A survey on efficient parallelization of blockchain-based smart contracts}, Year = {2019}, howpublished = {arXiv:1904.00731}, url = {https://arxiv.org/pdf/1904.00731.pdf}, }
@misc{garg2019efficient, author = {Sahil Garg and Kuljeet Kaur and Georges Kaddoum and Fran\c{c}ois Gagnon and Joel J. P. C. Rodrigues}, Title = {An Efficient Blockchain-based Hierarchical Authentication Mechanism for Energy Trading in V2G Environment}, Year = {2019}, howpublished = {arXiv:1904.01171}, url = {https://arxiv.org/pdf/1904.01171.pdf}, }
@misc{leonardos2019oceanic, author = {Nikos Leonardos and Stefanos Leonardos and Georgios Piliouras}, Title = {Oceanic Games: Centralization Risks and Incentives in Blockchain Mining}, Year = {2019}, howpublished = {arXiv:1904.02368}, url = {https://arxiv.org/pdf/1904.02368.pdf}, }
@misc{truong2019gdprcompliant, author = {Nguyen Binh Truong and Kai Sun and Gyu Myoung Lee and Yike Guo}, Title = {GDPR-Compliant Personal Data Management: A Blockchain-based Solution}, Year = {2019}, howpublished = {arXiv:1904.03038}, url = {https://arxiv.org/pdf/1904.03038.pdf}, }
@misc{saad2019exploring, author = {Muhammad Saad and Jeffrey Spaulding and Laurent Njilla and Charles Kamhoua and Sachin Shetty and DaeHun Nyang and Aziz Mohaisen}, Title = {Exploring the Attack Surface of Blockchain: A Systematic Overview}, Year = {2019}, howpublished = {arXiv:1904.03487}, url = {https://arxiv.org/pdf/1904.03487.pdf}, }
@misc{xiao2019survey, author = {Yang Xiao and Ning Zhang and Wenjing Lou and Y. Thomas Hou}, Title = {A Survey of Distributed Consensus Protocols for Blockchain Networks}, Year = {2019}, howpublished = {arXiv:1904.04098}, url = {https://arxiv.org/pdf/1904.04098.pdf}, }
@article{purheidari2019case, author = {Vahid Pourheidari and Sara Rouhani and Ralph deters}, Title = {A Case Study of Execution of Untrusted Business Process on Permissioned Blockchain}, Year = {2019}, Eprint = {arXiv:1904.05710}, Howpublished = {IEEE Blockchain 2018}, Doi = {10.1109/Cybermatics_2018.2018.00266}, url = {https://arxiv.org/pdf/1904.05710.pdf}, }
@misc{nazarabadi2019lightchain, author = {Yahya Hassanzadeh-Nazarabadi and Alptekin K{\"u}p{\"u} and {\"O}zkasap}, title = {LightChain: A DHT-based Blockchain for Resource Constrained Environments}, howpublished = {Cryptology ePrint Archive, Report 2019/342}, year = {2019}, note = {\url{https://eprint.iacr.org/2019/342}}, url = {https://eprint.iacr.org/2019/342.pdf}, }
@misc{das2019fastkitten, author = {Poulami Das and Lisa Eckey and Tommaso Frassetto and David Gens and Kristina Host{\'a}kov{\'a} and Patrick Jauernig and Sebastian Faust and Ahmad-Reza Sadeghi}, title = {FastKitten: Practical Smart Contracts on Bitcoin}, howpublished = {Cryptology ePrint Archive, Report 2019/154}, year = {2019}, note = {\url{https://eprint.iacr.org/2019/154}}, url = {https://eprint.iacr.org/2019/154.pdf}, }
@misc{garay2017consensus, author = {Juan A. Garay and Aggelos Kiayias and Giorgos Panagiotakos}, title = {Consensus from Signatures of Work}, howpublished = {Cryptology ePrint Archive, Report 2017/775}, year = {2017}, note = {\url{https://eprint.iacr.org/2017/775}}, url = {https://eprint.iacr.org/2017/775.pdf}, }
@misc{weng2018deepchain, author = {Jiasi Weng and Jian Weng and Jilian Zhang and Ming Li and Yue Zhang and Weiqi Luo}, title = {DeepChain: Auditable and Privacy-Preserving Deep Learning with Blockchain-based Incentive}, howpublished = {Cryptology ePrint Archive, Report 2018/679}, year = {2018}, note = {\url{https://eprint.iacr.org/2018/679}}, url = {https://eprint.iacr.org/2018/679.pdf}, }
@misc{zhang2018improvements, author = {Qingzhao Zhang and Yijun Leng and Lei Fan}, title = {Improvements of Blockchain's Block Broadcasting:An Incentive Approach}, howpublished = {Cryptology ePrint Archive, Report 2018/1152}, year = {2018}, note = {\url{https://eprint.iacr.org/2018/1152}}, url = {https://eprint.iacr.org/2018/1152.pdf}, }
@misc{ganesh2018proof, author = {Chaya Ganesh and Claudio Orlandi and Daniel Tschudi}, title = {Proof-of-Stake Protocols for Privacy-Aware Blockchains}, howpublished = {Cryptology ePrint Archive, Report 2018/1105}, year = {2018}, note = {\url{https://eprint.iacr.org/2018/1105}}, url = {https://eprint.iacr.org/2018/1105.pdf}, }
@misc{boneh2018batching, author = {Dan Boneh and Benedikt B{\"u}nz and Ben Fisch}, title = {Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains}, howpublished = {Cryptology ePrint Archive, Report 2018/1188}, year = {2018}, note = {\url{https://eprint.iacr.org/2018/1188}}, url = {https://eprint.iacr.org/2018/1188.pdf}, }
@misc{abraham2019sync, author = {Ittai Abraham and Dahlia Malkhi and Kartik Nayak and Ling Ren and Maofan Yin}, title = {Sync HotStuff: Synchronous SMR with 2{{$\Delta$}} Latency and Optimistic Responsiveness}, howpublished = {Cryptology ePrint Archive, Report 2019/270}, year = {2019}, note = {\url{https://eprint.iacr.org/2019/270}}, url = {https://eprint.iacr.org/2019/270.pdf}, }
@misc{joancomarti2019difficulty, author = {Jordi Herrera-Joancomart{\'i} and Guillermo Navarro-Arribas and Alejandro Ranchal-Pedrosa and Cristina P{\'e}rez-Sol{\`a} and Joaquin Garcia-Alfaro}, title = {On the Difficulty of Hiding the Balance of Lightning Network Channels}, howpublished = {Cryptology ePrint Archive, Report 2019/328}, year = {2019}, note = {\url{https://eprint.iacr.org/2019/328}}, url = {https://eprint.iacr.org/2019/328.pdf}, }
@misc{jivanyan2019lelantus, author = {Aram Jivanyan}, title = {Lelantus: Towards Confidentiality and Anonymity of Blockchain Transactions from Standard Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2019/373}, year = {2019}, note = {\url{https://eprint.iacr.org/2019/373}}, url = {https://eprint.iacr.org/2019/373.pdf}, }
@misc{jourenko2019sok, author = {Maxim Jourenko and Kanta Kurazumi and Mario Larangeira and Keisuke Tanaka}, title = {SoK: A Taxonomy for Layer-2 Scalability Related Protocols for Cryptocurrencies}, howpublished = {Cryptology ePrint Archive, Report 2019/352}, year = {2019}, note = {\url{https://eprint.iacr.org/2019/352}}, url = {https://eprint.iacr.org/2019/352.pdf}, }
@misc{gudgeon2019sok, author = {Lewis Gudgeon and Pedro Moreno-Sanchez and Stefanie Roos and Patrick McCorry and Arthur Gervais}, title = {SoK: Off The Chain Transactions}, howpublished = {Cryptology ePrint Archive, Report 2019/360}, year = {2019}, note = {\url{https://eprint.iacr.org/2019/360}}, url = {https://eprint.iacr.org/2019/360.pdf}, }
@misc{schrans2019flint, author = {Franklin Schrans and Daniel Hails and Alexander Harkness and Sophia Drossopoulou and Susan Eisenbach}, Title = {Flint for Safer Smart Contracts}, Year = {2019}, Howpublished = {arXiv:1904.06534}, url = {https://arxiv.org/pdf/1904.06534.pdf}, }
@misc{li2019incentivized, author = {Chao Li and Balaji Palanisamy}, Title = {Incentivized Blockchain-based Social Media Platforms: A Case Study of Steemit}, Year = {2019}, Eprint = {arXiv:1904.07310}, url = {https://arxiv.org/pdf/1904.07310.pdf}, }
@misc{grunspan2019selfish, author = {Cyril Grunspan and Ricardo P{\'e}rez-Marco}, Title = {Selfish Mining and Dyck Words in Bitcoin and Ethereum Networks}, Year = {2019}, Eprint = {arXiv:1904.07675}, url = {https://arxiv.org/pdf/1904.07675.pdf}, }
@misc{florian2019erasing, author = {Martin Florian and Sophie Beaucamp and Sebastian Henningsen and Bj{\"o}rn Scheuermann}, Title = {Erasing Data from Blockchain Nodes}, Year = {2019}, Eprint = {arXiv:1904.08901}, url = {https://arxiv.org/pdf/1904.08901.pdf}, }
@misc{cao2019exploring, author = {Tong Cao and Jiangshan Yu and J{\'e}r{\'e}mie Decouchant and Xiapu Luo and Paulo Verissimo}, title = {Exploring the Monero Peer-to-Peer Network}, howpublished = {Cryptology ePrint Archive, Report 2019/411}, year = {2019}, note = {\url{https://eprint.iacr.org/2019/411}}, url = {https://eprint.iacr.org/2019/411.pdf}, }
@misc{he2019characterizing, author = {Ningyu He and Lei Wu and Haoyu Wang and Yao Guo and Xuxian Jiang}, Title = {Characterizing Code Clones in the Ethereum Smart Contract Ecosystem}, Year = {2019}, howpublished = {arXiv:1905.00272}, url = {https://arxiv.org/pdf/1905.00272.pdf}, }
@article{mohatar2019biometric, author = {Oscar Delgado-Mohatar and Julian Fierrez and Ruben Tolosana and Ruben Vera-Rodriguez}, Title = {Biometric Template Storage with Blockchain: A First Look into Cost and Performance Tradeoffs}, Year = {2019}, Eprint = {arXiv:1904.13128}, Howpublished = {Proc. Conference on Computer Vision and Pattern Recognition Workshops, CVPRw, 2019}, url = {https://arxiv.org/pdf/1904.13128.pdf}, }
@misc{lopez2019please, author = {Pedro Garcia Lopez and Alberto Montresor and Anwitaman Datta}, Title = {Please, do not decentralize the Internet with (permissionless) blockchains!}, Year = {2019}, howpublished = {arXiv:1904.13093}, url = {https://arxiv.org/pdf/1904.13093.pdf}, }
@misc{chitra2019agent, author = {Tarun Chitra and Monica Quaintance and Stuart Haber and Will Martino}, Title = {Agent-Based Simulations of Blockchain protocols illustrated via Kadena's Chainweb}, Year = {2019}, howpublished = {arXiv:1904.12924}, url = {https://arxiv.org/pdf/1904.12924.pdf}, }
@misc{bokkem2019, author = {Dirk Bokkem and Rico Hageman and Gijs Koning and Luat Nguyen and Naqib Zarin}, Title = {Self-Sovereign Identity Solutions: The Necessity of Blockchain Technology}, Year = {2019}, howpublished = {arXiv:1904.12816}, url = {https://arxiv.org/pdf/1904.12816.pdf}, }
@misc{bui2019archangel, author = {Tu Bui and Daniel Cooper and John Collomosse and Mark Bell and Alex Green and John Sheridan and Jez Higgins and Arindra Das and Jared Keller and Olivier Thereaux and Alan Brown}, Title = {ARCHANGEL: Tamper-proofing Video Archives using Temporal Content Hashes on the Blockchain}, Year = {2019}, howpublished = {arXiv:1904.12059}, url = {https://arxiv.org/pdf/1904.12059.pdf}, }
@misc{nehai2019deductive, author = {Zeinab Nehai and Fran\c{c}ois Bobot}, Title = {Deductive Proof of Ethereum Smart Contracts Using Why3}, Year = {2019}, howpublished = {arXiv:1904.11281}, url = {https://arxiv.org/pdf/1904.11281.pdf}, }
@article{li2019blockchain, author = {Chunmiao Li and Yang Cao and Zhenjiang Hu and Masatoshi Yoshikawa}, Title = {Blockchain-based Bidirectional Updates on Fine-grained Medical Data}, Year = {2019}, howpublished = {arXiv:1904.10606}, Doi = {10.1109/ICDEW.2019.00010}, url = {https://arxiv.org/pdf/1904.10606.pdf}, }
@misc{khalil2019tex, author = {Rami Khalil and Arthur Gervais and Guillaume Felley}, title = {TEX - A Securely Scalable Trustless Exchange}, howpublished = {Cryptology ePrint Archive, Report 2019/265}, year = {2019}, note = {\url{https://eprint.iacr.org/2019/265}}, url = {https://eprint.iacr.org/2019/265.pdf}, }
@misc{daian2019flash, author = {Philip Daian and Steven Goldfeder and Tyler Kell and Yunqi Li and Xueyuan Zhao and Iddo Bentov and Lorenz Breidenbach and Ari Juels}, title = {Flash Boys 2.0: Frontrunning, Transaction Reordering, and Consensus Instability in Decentralized Exchanges}, howpublished = {arXiv preprint arXiv:1904.05234}, year = {2019}, url = {https://arxiv.org/pdf/1904.05234.pdf}, }
@inproceedings{avarikioti2019bitcoin, author = {Georgia Avarikioti and Lukas K{\"a}ppeli and Yuyi Wang and Roger Wattenhofer}, title = {Bitcoin Security under Temporary Dishonest Majority}, booktitle = {23rd Financial Cryptography and Data Security (FC)}, year = {2019}, url = {https://www.tik.ee.ethz.ch/file/ab83461dc5ca3b739c079a27f3757e94/bitcoin%20security%20under%20temporary%20dishonest%20majority.pdf}, }
@misc{lee2019detective, author = {Suhyeon Lee and Seungjoo Kim}, title = {Detective Mining: Selfish Mining Becomes Unrealistic under Mining Pool Environment}, howpublished = {Cryptology ePrint Archive, Report 2019/486}, year = {2019}, note = {\url{https://eprint.iacr.org/2019/486}}, url = {https://eprint.iacr.org/2019/486.pdf}, }
@misc{ni2019uniquechain, author = {Peifang Ni and Hongda Li and Xianning Meng and Dongxue Pan}, title = {UniqueChain: A Fast, Provably Secure Proof-of-Stake Based Blockchain Protocol in the Open Setting}, howpublished = {Cryptology ePrint Archive, Report 2019/456}, year = {2019}, note = {\url{https://eprint.iacr.org/2019/456}}, url = {https://eprint.iacr.org/2019/456.pdf}, }
@misc{otavio2019floodxmr, author = {Jo{\~a}o Ot{\'a}vio Massari Chervinski and Diego Kreutz and Jiangshan Yu}, title = {FloodXMR: Low-cost transaction flooding attack with Monero's bulletproof protocol}, howpublished = {Cryptology ePrint Archive, Report 2019/455}, year = {2019}, note = {\url{https://eprint.iacr.org/2019/455}}, url = {https://eprint.iacr.org/2019/455.pdf}, }
@misc{omolola2019revisiting, author = {Olamide Omolola and Paul Plessing}, title = {Revisiting Privacy-aware Blockchain Public Key Infrastructure}, howpublished = {Cryptology ePrint Archive, Report 2019/527}, year = {2019}, note = {\url{https://eprint.iacr.org/2019/527}}, url = {https://eprint.iacr.org/2019/527.pdf}, }
@misc{drijvers2019pixel, author = {Manu Drijvers and Sergey Gorbunov and Gregory Neven and Hoeteck Wee}, title = {Pixel: Multi-signatures for Consensus}, howpublished = {Cryptology ePrint Archive, Report 2019/514}, year = {2019}, note = {\url{https://eprint.iacr.org/2019/514}}, url = {https://eprint.iacr.org/2019/514.pdf}, }
@misc{gorbunov2019digital, author = {Sergey Gorbunov and Hoeteck Wee}, title = {Digital Signatures for Consensus}, howpublished = {Cryptology ePrint Archive, Report 2019/269}, year = {2019}, note = {\url{https://eprint.iacr.org/2019/269}}, url = {https://eprint.iacr.org/2019/269.pdf}, }
@misc{yuen2019ringct, author = {Tsz Hon Yuen and Shi-feng Sun and Joseph K. Liu and Man Ho Au and Muhammed F. Esgin and Qingzhao Zhang and Dawu Gu}, title = {RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security}, howpublished = {Cryptology ePrint Archive, Report 2019/508}, year = {2019}, note = {\url{https://eprint.iacr.org/2019/508}}, url = {https://eprint.iacr.org/2019/508.pdf}, }
@misc{magri2019afgjort, author = {Bernardo Magri and Christian Matt and Jesper Buus Nielsen and Daniel Tschudi}, title = {Afgjort -- A Semi-Synchronous Finality Layer for Blockchains}, howpublished = {Cryptology ePrint Archive, Report 2019/504}, year = {2019}, note = {\url{https://eprint.iacr.org/2019/504}}, url = {https://eprint.iacr.org/2019/504.pdf}, }
@misc{borkowski2019dextt, author = {Michael Borkowski and Marten Sigwart and Philipp Frauenthaler and Taneli Hukkinen and Stefan Schulte}, Title = {DeXTT: Deterministic Cross-Blockchain Token Transfers}, Year = {2019}, Eprint = {arXiv:1905.06204}, url = {https://arxiv.org/pdf/1905.06204.pdf}, }
@misc{yang2019tapestry, author = {Yifan Yang and Daniel Cooper and John Collomosse and Constantin C. Dr{\va}gan and Mark Manulis and Jamie Steane and Arthi Manohar and Jo Briggs and Helen Jones and Wendy Moncur}, Title = {TAPESTRY: A Blockchain based Service for Trusted Interaction Online}, Year = {2019}, Eprint = {arXiv:1905.06186}, url = {https://arxiv.org/pdf/1905.06186.pdf}, }
@misc{cao2019when, author = {Bin Cao and Yixin Li and Lei Zhang and Long Zhang and Shahid Mumtaz and Zhenyu Zhou and Mugen Peng}, Title = {When Internet of Things Meets Blockchain: Challenges in Distributed Consensus}, Year = {2019}, Eprint = {arXiv:1905.06022}, url = {https://arxiv.org/pdf/1905.06022.pdf}, }
@misc{romiti2019deep, author = {Matteo Romiti and Aljosha Judmayer and Alexei Zamyatin and Bernhard Haslhofer}, Title = {A Deep Dive into Bitcoin Mining Pools: An Empirical Analysis of Mining Shares}, Year = {2019}, Eprint = {arXiv:1905.05999}, url = {https://arxiv.org/pdf/1905.05999.pdf}, }
@misc{zichichi2019likestarter, author = {Mirko Zichichi and Michele Contu and Stefano Ferretti and Gabriele D'Angelo}, Title = {LikeStarter: a Smart-contract based Social DAO for Crowdfunding}, Year = {2019}, Eprint = {arXiv:1905.05560}, url = {https://arxiv.org/pdf/1905.05560.pdf}, }
@misc{kwon2019impossibility, author = {Yujin Kwon and Jian Liu and Minjeong Kim and Dawn Song and Yongdae Kim}, Title = {Impossibility of Full Decentralization in Permissionless Blockchains}, Year = {2019}, Eprint = {arXiv:1905.05158}, url = {https://arxiv.org/pdf/1905.05158.pdf}, }
@misc{ketsdever2019incentives, author = {Shea Ketsdever and Michael J. Fischer}, Title = {Incentives Don't Solve Blockchain's Problems}, Year = {2019}, Eprint = {arXiv:1905.04792}, url = {https://arxiv.org/pdf/1905.04792.pdf}, }
@misc{hardjono2019decentralized, author = {Thomas Hardjono and Ned Smith}, Title = {Decentralized Trusted Computing Base for Blockchain Infrastructure Security}, Year = {2019}, Eprint = {arXiv:1905.04412}, url = {https://arxiv.org/pdf/1905.04412.pdf}, }
@misc{bartoletti2019true, author = {Massimo Bartoletti and Letterio Galletta and Maurizio Murgia}, Title = {A true concurrent model of smart contracts executions}, Year = {2019}, Eprint = {arXiv:1905.04366}, url = {https://arxiv.org/pdf/1905.04366.pdf}, }
@misc{yazdinejad2019blockchain, author = {Abbas Yazdinejad and Reza M. Parizi and Ali Dehghantanha and Kim-Kwang Raymond Choo}, Title = {Blockchain-enabled Authentication Handover with Efficient Privacy Protection in SDN-based 5G Networks}, Year = {2019}, Eprint = {arXiv:1905.03193}, url = {https://arxiv.org/pdf/1905.03193.pdf}, }
@misc{zakhary2019atomic, author = {Victor Zakhary and Divyakant Agrawal and Amr El Abbadi}, Title = {Atomic Commitment Across Blockchains}, Year = {2019}, Eprint = {arXiv:1905.02847}, url = {https://arxiv.org/pdf/1905.02847.pdf}, }
@misc{wang2019blocklite, author = {Xinying Wang and Abdullah Al-Mamun and Feng Yan and Mohammad Sadoghi and Dongfang Zhao}, Title = {BlockLite: A Lightweight Emulator for Public Blockchains}, Year = {2019}, Eprint = {arXiv:1905.02157}, url = {https://arxiv.org/pdf/1905.02157.pdf}, }
@misc{siris2019interledger, author = {Vasilios A. Siris and Dimitrios Dimopoulos and Nikos Fotiou and Spyros Voulgaris and George C. Polyzos}, Title = {Interledger Smart Contracts for Decentralized Authorization to Constrained Things}, Year = {2019}, Eprint = {arXiv:1905.01671}, url = {https://arxiv.org/pdf/1905.01671.pdf}, }
@misc{siris2019oauth, author = {Vasilios A. Siris and Dimitrios Dimopoulos and Nikos Fotiou and Spyros Voulgaris and George C. Polyzos}, Title = {OAuth 2.0 meets Blockchain for Authorization in Constrained IoT Environments}, Year = {2019}, Eprint = {arXiv:1905.01665}, url = {https://arxiv.org/pdf/1905.01665.pdf}, }
@misc{chen2019domain, author = {Jiachi Chen and Xin Xia and David Lo and John Grundy and Daniel Xiapu Luo and Ting Chen}, Title = {Domain Specific Code Smells in Smart Contracts}, Year = {2019}, Eprint = {arXiv:1905.01467}, url = {https://arxiv.org/pdf/1905.01467.pdf}, }
@misc{feng2019bug, author = {Xiaotao Feng and Qin Wang and Xiaogang Zhu and Sheng Wen}, Title = {Bug Searching in Smart Contract}, Year = {2019}, Eprint = {arXiv:1905.00799}, url = {https://arxiv.org/pdf/1905.00799.pdf}, }
@misc{zakhary2019towards, author = {Victor Zakhary and Mohammad Javad Amiri and Sujaya Maiyya and Divyakant Agrawal and Amr El Abbadi}, Title = {Towards Global Asset Management in Blockchain Systems}, Year = {2019}, Eprint = {arXiv:1905.09359}, url = {https://arxiv.org/pdf/1905.09359.pdf}, }
@misc{albassam2019lazyledger, author = {Mustafa Al-Bassam}, Title = {LazyLedger: A Distributed Data Availability Ledger With Client-Side Smart Contracts}, Year = {2019}, Eprint = {arXiv:1905.09274}, url = {https://arxiv.org/pdf/1905.09274.pdf}, }
@misc{sanchez2019zero, author = {David Cerezo S{\'a}nchez}, Title = {Zero-Knowledge Proof-of-Identity: Sybil-Resistant, Anonymous Authentication on Permissionless Blockchains and Incentive Compatible, Strictly Dominant Cryptocurrencies}, Year = {2019}, Eprint = {arXiv:1905.09093}, url = {https://arxiv.org/pdf/1905.09093.pdf}, }
@misc{ayman2019smart, author = {Afiya Ayman and Amna Aziz and Amin Alipour and Aron Laszka}, Title = {Smart Contract Development in Practice: Trends, Issues, and Discussions on Stack Overflow}, Year = {2019}, Eprint = {arXiv:1905.08833}, url = {https://arxiv.org/pdf/1905.08833.pdf}, }
@misc{datta2019blockchain, author = {Anwitaman Datta}, Title = {Blockchain in the Government Technology Fabric}, Year = {2019}, Eprint = {arXiv:1905.08517}, url = {https://arxiv.org/pdf/1905.08517.pdf}, }
@misc{brenzikofer2019privacy, author = {Alain Brenzikofer and Noa Melchior}, Title = {Privacy-Preserving P2P Energy Market on the Blockchain}, Year = {2019}, Eprint = {arXiv:1905.07940}, url = {https://arxiv.org/pdf/1905.07940.pdf}, }
@misc{atzei2019developing, author = {Nicola Atzei and Massimo Bartoletti and Stefano Lande and Nobuko Yoshida and Roberto Zunino}, Title = {Developing secure Bitcoin contracts with BitML}, Year = {2019}, Eprint = {arXiv:1905.07639}, url = {https://arxiv.org/pdf/1905.07639.pdf}, }
@article{koutsoupias2019blockchain, author = {Elias Koutsoupias and Philip Lazos and Paolo Serafino and Foluso Ogunlana}, Title = {Blockchain Mining Games with Pay Forward}, Year = {2019}, Eprint = {arXiv:1905.07397}, Doi = {10.1145/3308558.3313740}, url = {https://arxiv.org/pdf/1905.07397.pdf}, }
@misc{pang2019concurrency, author = {Shuaifeng Pang and Xiaodong Qi and Zhao Zhang and Cheqing Jin and Aoying Zhou}, Title = {Concurrency Protocol Aiming at High Performance of Execution and Replay for Smart Contracts}, Year = {2019}, Eprint = {arXiv:1905.07169}, url = {https://arxiv.org/pdf/1905.07169.pdf}, }
@misc{frauenthaler2019framework, author = {Philipp Frauenthaler and Michael Borkowski and Stefan Schulte}, Title = {A Framework for Blockchain Interoperability and Runtime Selection}, Year = {2019}, Eprint = {arXiv:1905.07014}, url = {https://arxiv.org/pdf/1905.07014.pdf}, }
@misc{wuestholz2019harvey, author = {Valentin W{\"u}stholz and Maria Christakis}, Title = {Harvey: A Greybox Fuzzer for Smart Contracts}, Year = {2019}, Eprint = {arXiv:1905.06944}, url = {https://arxiv.org/pdf/1905.06944.pdf}, }
@misc{leelavimolsilp2019empirical, author = {Tin Leelavimolsilp and Long Tran-Thanh and Sebastian Stein and Viet Hung Nguyen}, Title = {An Empirical Evaluation of Selfish Mining and Strategic Mining in Proof-of-Work Blockchain with Multiple Miners}, Year = {2019}, Eprint = {arXiv:1905.06853}, url = {https://arxiv.org/pdf/1905.06853.pdf}, }
@misc{sigwart2019blockchain, author = {Marten Sigwart and Michael Borkowski and Marco Peise and Stefan Schulte and Stefan Tai}, Title = {Blockchain-based Data Provenance for the Internet of Things}, Year = {2019}, Eprint = {arXiv:1905.06852}, url = {https://arxiv.org/pdf/1905.06852.pdf}, }
@misc{loghin2019blockchain, author = {Dumitrel Loghin and Gang Chen and Tien Tuan Anh Dinh and Beng Chin Ooi and Yong Meng Teo}, Title = {Blockchain Goes Green? An Analysis of Blockchain on Low-Power Nodes}, Year = {2019}, Eprint = {arXiv:1905.06520}, url = {https://arxiv.org/pdf/1905.06520.pdf}, }
@misc{azouvi2019sok, author = {Sarah Azouvi and Alexander Hicks}, title = {SoK: Tools for Game Theoretic Models of Security for Cryptocurrencies}, journal = {arXiv preprint arXiv:1905.08595}, year = {2019}, url = {https://arxiv.org/pdf/1905.08595.pdf}, }
@misc{naumenko2019bandwidth, author = {Gleb Naumenko and Gregory Maxwell and Pieter Wuille and Sasha Fedorova and Ivan Beschastnikh}, title = {Bandwidth-Efficient Transaction Relay for Bitcoin}, journal = {arXiv preprint arXiv:1905.10518}, year = {2019}, url = {https://arxiv.org/pdf/1905.10518.pdf}, }
@misc{chatzigiannis2019diversification, author = {Panagiotis Chatzigiannis and Foteini Baldimtsi and Igor Griva and Jiasun Li}, title = {Diversification Across Mining Pools: Optimal Mining Strategies under PoW}, journal = {arXiv preprint arXiv:1905.04624}, year = {2019}, url = {https://arxiv.org/pdf/1905.04624.pdf}, }
@misc{sheff2019charlotte, author = {Isaac Sheff and Xinwen Wang and Haobin Ni and Robbert Renesse and Andrew C Myers}, title = {Charlotte: Composable Authenticated Distributed Data Structures, Technical Report}, journal = {arXiv preprint arXiv:1905.03888}, year = {2019}, url = {https://arxiv.org/pdf/1905.03888.pdf}, }
@misc{yang2019empirically, author = {Renlord Yang and Toby Murray and Paul Rimba and Udaya Parampalli}, title = {Empirically Analyzing Ethereum's Gas Mechanism}, journal = {arXiv preprint arXiv:1905.00553}, year = {2019}, url = {https://arxiv.org/pdf/1905.00553.pdf}, }
@misc{rohrer2019discharged, author = {Elias Rohrer and Julian Malliaris and Florian Tschorsch}, title = {Discharged Payment Channels: Quantifying the Lightning Network's Resilience to Topology-Based Attacks}, journal = {arXiv preprint arXiv:1904.10253}, year = {2019}, url = {https://arxiv.org/pdf/1904.10253.pdf}, }
@inproceedings{liu2019survey, author = {Ziyao Liu and Nguyen Cong Luong and Wenbo Wang and Dusit Niyato and Ping Wang and Ying-Chang Liang and Dong In Kim}, title = {A Survey on Blockchain: A Game Theoretical Perspective}, journal = {IEEE Access}, volume = {7}, pages = {47615--47643}, year = {2019}, publisher = {IEEE}, url = {https://ieeexplore.ieee.org/iel7/6287639/8600701/08684838.pdf}, }
@misc{kokoris2018verifiable, author = {Eleftherios Kokoris-Kogias and Enis Ceyhun Alp and Sandra Deepthy Siby and Nicolas Gailly and Linus Gasser and Philipp Jovanovic and Ewa Syta and Bryan Ford}, title = {Verifiable Management of Private Data under Byzantine Failures}, howpublished = {Cryptology ePrint Archive, Report 2018/209}, year = {2018}, note = {\url{https://eprint.iacr.org/2018/209}}, url = {https://eprint.iacr.org/2018/209.pdf}, }
@misc{dryja2019utreexo, author = {Thaddeus Dryja}, title = {Utreexo: A dynamic hash-based accumulator optimized for the Bitcoin UTXO set}, howpublished = {Cryptology ePrint Archive, Report 2019/611}, year = {2019}, note = {\url{https://eprint.iacr.org/2019/611}}, url = {https://eprint.iacr.org/2019/611.pdf}, }
@misc{mahmoody2019note, author = {Mohammad Mahmoody and Caleb Smith and David J. Wu}, title = {A Note on the (Im)possibility of Verifiable Delay Functions in the Random Oracle Model}, howpublished = {Cryptology ePrint Archive, Report 2019/663}, year = {2019}, note = {\url{https://eprint.iacr.org/2019/663}}, url = {https://eprint.iacr.org/2019/663.pdf}, }