区块链论文汇总(持续更新)

Bitcoin Whitepaper and the "Old Ideas"

Bitcoin: A Peer-to-Peer Electronic Cash System
Satoshi Nakamoto
whitepaper 2008

How to Time-Stamp a Digital Document
Stuart Haber, W. Scott Stornetta
Crypto 1990

Hashcash -- A Denial of Service Counter-Measure
Adam Back
2001

Pricing via Processing or Combatting Junk Mail
Cynthia Dwork, Moni Naor
Crypto 1992

Exposing Computationally-Challenged Byzantine Impostors
James Aspnes, Collin Jackson, and Arvind Krishnamurthy
2005

Blockchain Design and Analysis

2013
Majority is not Enough: Bitcoin Mining is Vulnerable
Ittay Eyal, Emin Gun Sirer
FC 2014
https://arxiv.org/abs/1311.0243

2014
The Bitcoin Backbone Protocol: Analysis and Applications
Juan Garay and Aggelos Kiayias and Nikos Leonardos
Eurocrypt 2015
http://eprint.iacr.org/2014/765

The Miner's Dilemma
Ittay Eyal
SP 2015
https://arxiv.org/abs/1411.7099

Permacoin: Repurposing Bitcoin Work for Long-Term Data Preservation
Andrew Miller, Ari Juels, Elaine Shi, Bryan Parno, Jonathan Katz
SP 2014

2015
Optimal Selfish Mining Strategies in Bitcoin
Ayelet Sapirstein, Yonatan Sompolinsky, and Aviv Zohar.
FC 2016
https://arxiv.org/abs/1507.06183

Bitcoin-NG: A Scalable Blockchain Protocol
Ittay Eyal, Adem Efe Gencer, Emin Gun Sirer, Robbert van Renesse
NSDI 2016 / Blog
https://arxiv.org/abs/1510.02037

SpaceMint: A Cryptocurrency Based on Proofs of Space
Sunoo Park and Krzysztof Pietrzak and Albert Kwon and Joël Alwen and Georg Fuchsbauer and Peter Gaži
https://eprint.iacr.org/2015/528
Non-outsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions
Andrew Miller, Elaine Shi, Ahmed Kosba, and Jonathan Katz
CCS 2015

Secure High-Rate Transaction Processing in Bitcoin
Yonatan Sompolinsky and Aviv Zohar
FC 2015

Inclusive Block Chain Protocols
Yoad Lewenberg, Yonatan Sompolinsky, Aviv Zohar
FC 2015

Demystifying incentives in the consensus computer
Loi Luu, Jason Teutsch, Raghav Kulkarni and Prateek Saxena
CCS 2015
https://eprint.iacr.org/2015/702

2016
Designing Proof of Human-work Puzzles for Cryptocurrency and Beyond
Jeremiah Blocki, Hong-Sheng Zhou
TCC 2016B
http://eprint.iacr.org/2016/145
Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing
Eleftherios Kokoris-Kogias, Philipp Jovanovic, Nicolas Gailly, Ismail Khoffi, Linus Gasser, Bryan Ford
USENIX Security 2016 / Blog
https://arxiv.org/abs/1602.06997

Analysis of the Blockchain Protocol in Asynchronous Networks
Rafael Pass and Lior Seeman and abhi shelat
Eurocrypt 2017
http://eprint.iacr.org/2016/454

On Trees, Chains and Fast Transactions in the Blockchain
Aggelos Kiayias and Giorgos Panagiotakos
http://eprint.iacr.org/2016/545
Algorand
Jing Chen, Silvio Micali
https://arxiv.org/abs/1607.01341

Blockchain Mining Games
Aggelos Kiayias, Elias Koutsoupias, Maria Kyropoulou, Yiannis Tselekounis
EC 2016
https://arxiv.org/abs/1607.02420
2-hop Blockchain: Combining Proof-of-Work and Proof-of-Stake Securely
Tuyet Duong, Lei Fan, Thomas Veale, Hong-Sheng Zhou
http://eprint.iacr.org/2016/716

Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol
Aggelos Kiayias and Alexander Russell and Bernardo David and Roman Oliynykov
Crypto 2017
https://eprint.iacr.org/2016/889

FruitChain: An Incentive Compatible Blockchain
Rafael Pass and Elaine Shi
PODC 2017
https://eprint.iacr.org/2016/916

Hybrid Consensus: Efficient Consensus in the Permissionless Model
Rafael Pass and Elaine Shi
https://eprint.iacr.org/2016/917

The Sleepy Model of Consensus
Rafael Pass and Elaine Shi
Asiacrypt 2017
https://eprint.iacr.org/2016/918

Snow White: Provably Secure Proofs of Stake
Phil Daian and Rafael Pass and Elaine Shi
https://eprint.iacr.org/2016/919

The Bitcoin Backbone Protocol with Chains of Variable Difficulty
Juan A. Garay and Aggelos Kiayias and Nikos Leonardos
Crypto 2017
https://eprint.iacr.org/2016/1048

SPECTRE: A Fast and Scalable Cryptocurrency Protocol
Yonatan Sompolinsky and Yoad Lewenberg and Aviv Zohar
https://eprint.iacr.org/2016/1159

2017
REM: Resource-Efficient Mining for Blockchains
Fan Zhang and Ittay Eyal and Robert Escriva and Ari Juels and Robbert van Renesse
USENIX Security
https://eprint.iacr.org/2017/179

TwinsCoin: A Cryptocurrency via Proof-of-Work and Proof-of-Stake
Alexander Chepurnoy and Tuyet Duong and Lei Fan and Hong-Sheng Zhou
https://eprint.iacr.org/2017/232

Algorand: Scaling Byzantine Agreements for Cryptocurrencies
Yossi Gilad and Rotem Hemo and Silvio Micali and Georgios Vlachos and Nickolai Zeldovich
https://eprint.iacr.org/2017/454

Ouroboros Praos: An adaptively-secure, semi-synchronous proof-of-stake protocol
Bernardo David and Peter Gaži and Aggelos Kiayias and Alexander Russell
https://eprint.iacr.org/2017/573

iChing: A Scalable Proof-of-Stake Blockchain in the Open Setting (or, How to Mimic Nakamoto's Design via Proof-of-Stake)
Lei Fan and Hong-Sheng Zhou
https://eprint.iacr.org/2017/656

Proofs of Work for Blockchain Protocols
Juan A. Garay and Aggelos Kiayias and Giorgos Panagiotakos
https://eprint.iacr.org/2017/775

Thunderella: Blockchains with Optimistic Instant Confirmation
Rafael Pass and Elaine Shi
https://eprint.iacr.org/2017/913

But Why Does it Work?A Rational Protocol Design Treatment of Bitcoin?
https://eprint.iacr.org/2018/138.pdf

Simple Proofs of Sequential Work
https://eprint.iacr.org/2018/183.pdf

Blockchain-based Cryptography (Applications)

2014
How to Use Bitcoin to Design Fair Protocols
Iddo Bentov and Ranjit Kumaresan
Crypto 2014
http://eprint.iacr.org/2014/129
How to Use Bitcoin to Incentivize Correct Computations
Iddo Bentov and Ranjit Kumaresan
CCS 2014

2015

Fair and Robust Multi-Party Computation using a Global Transaction Ledger
Aggelos Kiayias and Hong-Sheng Zhou and Vassilis Zikas
Eurocrypt 2016
http://eprint.iacr.org/2015/574

Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts
Ahmed Kosba and Andrew Miller and Elaine Shi and Zikai Wen and Charalampos Papamanthou
SP 2016
https://eprint.iacr.org/2015/675
How to Use Bitcoin to Play Decentralized Poker
Ranjit Kumaresan and Iddo Bentov and Tal Moran
CCS 2015
2016
2017
Overcoming Cryptographic Impossibility Results using Blockchains
Rishab Goyal and Vipul Goyal
TCC 2017
https://eprint.iacr.org/2017/935

Instantaneous Decentralized Poker
Iddo Bentov and Ranjit Kumaresan and Andrew Miller
Asiacrypt 2017
https://eprint.iacr.org/2017/875

Proof-of-Work-based Cryptography

Pseudonymous Secure Computation from Time-Lock Puzzles.
Jonathan Katz, Andrew Miller, and Elaine Shi.
https://eprint.iacr.org/2014/857

Distributed Cryptography Based on the Proofs of Work
Marcin Andrychowicz and Stefan Dziembowski
Crypto 2015
https://eprint.iacr.org/2014/796

最后编辑于
©著作权归作者所有,转载或内容合作请联系作者
  • 序言:七十年代末,一起剥皮案震惊了整个滨河市,随后出现的几起案子,更是在滨河造成了极大的恐慌,老刑警刘岩,带你破解...
    沈念sama阅读 159,117评论 4 362
  • 序言:滨河连续发生了三起死亡事件,死亡现场离奇诡异,居然都是意外死亡,警方通过查阅死者的电脑和手机,发现死者居然都...
    沈念sama阅读 67,328评论 1 293
  • 文/潘晓璐 我一进店门,熙熙楼的掌柜王于贵愁眉苦脸地迎上来,“玉大人,你说我怎么就摊上这事。” “怎么了?”我有些...
    开封第一讲书人阅读 108,839评论 0 243
  • 文/不坏的土叔 我叫张陵,是天一观的道长。 经常有香客问我,道长,这世上最难降的妖魔是什么? 我笑而不...
    开封第一讲书人阅读 44,007评论 0 206
  • 正文 为了忘掉前任,我火速办了婚礼,结果婚礼上,老公的妹妹穿的比我还像新娘。我一直安慰自己,他们只是感情好,可当我...
    茶点故事阅读 52,384评论 3 287
  • 文/花漫 我一把揭开白布。 她就那样静静地躺着,像睡着了一般。 火红的嫁衣衬着肌肤如雪。 梳的纹丝不乱的头发上,一...
    开封第一讲书人阅读 40,629评论 1 219
  • 那天,我揣着相机与录音,去河边找鬼。 笑死,一个胖子当着我的面吹牛,可吹牛的内容都是我干的。 我是一名探鬼主播,决...
    沈念sama阅读 31,880评论 2 313
  • 文/苍兰香墨 我猛地睁开眼,长吁一口气:“原来是场噩梦啊……” “哼!你这毒妇竟也来了?” 一声冷哼从身侧响起,我...
    开封第一讲书人阅读 30,593评论 0 198
  • 序言:老挝万荣一对情侣失踪,失踪者是张志新(化名)和其女友刘颖,没想到半个月后,有当地人在树林里发现了一具尸体,经...
    沈念sama阅读 34,313评论 1 243
  • 正文 独居荒郊野岭守林人离奇死亡,尸身上长有42处带血的脓包…… 初始之章·张勋 以下内容为张勋视角 年9月15日...
    茶点故事阅读 30,575评论 2 246
  • 正文 我和宋清朗相恋三年,在试婚纱的时候发现自己被绿了。 大学时的朋友给我发了我未婚夫和他白月光在一起吃饭的照片。...
    茶点故事阅读 32,066评论 1 260
  • 序言:一个原本活蹦乱跳的男人离奇死亡,死状恐怖,灵堂内的尸体忽然破棺而出,到底是诈尸还是另有隐情,我是刑警宁泽,带...
    沈念sama阅读 28,392评论 2 253
  • 正文 年R本政府宣布,位于F岛的核电站,受9级特大地震影响,放射性物质发生泄漏。R本人自食恶果不足惜,却给世界环境...
    茶点故事阅读 33,052评论 3 236
  • 文/蒙蒙 一、第九天 我趴在偏房一处隐蔽的房顶上张望。 院中可真热闹,春花似锦、人声如沸。这庄子的主人今日做“春日...
    开封第一讲书人阅读 26,082评论 0 8
  • 文/苍兰香墨 我抬头看了看天上的太阳。三九已至,却和暖如春,着一层夹袄步出监牢的瞬间,已是汗流浃背。 一阵脚步声响...
    开封第一讲书人阅读 26,844评论 0 195
  • 我被黑心中介骗来泰国打工, 没想到刚下飞机就差点儿被人妖公主榨干…… 1. 我叫王不留,地道东北人。 一个月前我还...
    沈念sama阅读 35,662评论 2 274
  • 正文 我出身青楼,却偏偏与公主长得像,于是被迫代替她去往敌国和亲。 传闻我的和亲对象是个残疾皇子,可洞房花烛夜当晚...
    茶点故事阅读 35,575评论 2 270

推荐阅读更多精彩内容

  • 致命问题 这是一个有关状态转换的问题。本作业(俄罗斯方块)存在的状态转换。这是有关暂停的一个函数。涉及到了状态(@...
    爱跑步的coder阅读 105评论 0 1
  • 不想说再见,因为不知什么时候会再见。 真的很想明天就是五年后的日子 从前的我们有多嫌弃这个学校,现在就有多舍不得它...
    ALOHA是家人啊阅读 219评论 0 0