A survey on consensus mechanisms and mining strategy management in blockchain networks
The past decade has witnessed the rapid evolution in blockchain technologies, which has
attracted tremendous interests from both the research communities and industries. The …
attracted tremendous interests from both the research communities and industries. The …
Privacy-preserving solutions for blockchain: Review and challenges
JB Bernabe, JL Canovas, JL Hernandez-Ramos… - Ieee …, 2019 - ieeexplore.ieee.org
Blockchains offer a decentralized, immutable and verifiable ledger that can record
transactions of digital assets, provoking a radical change in several innovative scenarios …
transactions of digital assets, provoking a radical change in several innovative scenarios …
[PDF][PDF] 区块链技术: 架构及进展
邵奇峰, 金澈清, 张召, 钱卫宁, 周傲英 - 计算机学报, 2018 - cjc.ict.ac.cn
摘要传统的数据库管理系统主要由单一机构管理和维护, 在多方参与者协作的场景中,
因无法完全信任数据库中的数据, 每方都需要单独构建一套承载自己业务数据的数据库 …
因无法完全信任数据库中的数据, 每方都需要单独构建一套承载自己业务数据的数据库 …
Bulletproofs: Short proofs for confidential transactions and more
We propose Bulletproofs, a new non-interactive zero-knowledge proof protocol with very
short proofs and without a trusted setup; the proof size is only logarithmic in the witness size …
short proofs and without a trusted setup; the proof size is only logarithmic in the witness size …
A survey of IoT applications in blockchain systems: Architecture, consensus, and traffic modeling
Blockchain technology can be extensively applied in diverse services, including online
micro-payments, supply chain tracking, digital forensics, health-care record sharing, and …
micro-payments, supply chain tracking, digital forensics, health-care record sharing, and …
Verifiable delay functions
We study the problem of building a verifiable delay function (VDF). A VDF VDF requires a
specified number of sequential steps to evaluate, yet produces a unique output that can be …
specified number of sequential steps to evaluate, yet produces a unique output that can be …
Sonic: Zero-knowledge SNARKs from linear-size universal and updatable structured reference strings
M Maller, S Bowe, M Kohlweiss… - Proceedings of the 2019 …, 2019 - dl.acm.org
Ever since their introduction, zero-knowledge proofs have become an important tool for
addressing privacy and scalability concerns in a variety of applications. In many systems …
addressing privacy and scalability concerns in a variety of applications. In many systems …
Scalable, transparent, and post-quantum secure computational integrity
E Ben-Sasson, I Bentov, Y Horesh… - Cryptology ePrint …, 2018 - eprint.iacr.org
Human dignity demands that personal information, like medical and forensic data, be hidden
from the public. But veils of secrecy designed to preserve privacy may also be abused to …
from the public. But veils of secrecy designed to preserve privacy may also be abused to …
Transparent SNARKs from DARK compilers
B Bünz, B Fisch, A Szepieniec - … on the Theory and Applications of …, 2020 - Springer
We construct a new polynomial commitment scheme for univariate and multivariate
polynomials over finite fields, with logarithmic size evaluation proofs and verification time …
polynomials over finite fields, with logarithmic size evaluation proofs and verification time …
Aurora: Transparent succinct arguments for R1CS
E Ben-Sasson, A Chiesa, M Riabzev… - Advances in Cryptology …, 2019 - Springer
We design, implement, and evaluate a zero knowledge succinct non-interactive argument
(SNARG) for Rank-1 Constraint Satisfaction (R1CS), a widely-deployed NP language …
(SNARG) for Rank-1 Constraint Satisfaction (R1CS), a widely-deployed NP language …