[PDF][PDF] Chainlink 2.0: Next steps in the evolution of decentralized oracle networks
L Breidenbach, C Cachin, B Chan, A Coventry, S Ellis… - Chainlink Labs, 2021 - naorib.ir
In this whitepaper, we articulate a vision for the evolution of Chainlink beyond its initial
conception in the original Chainlink whitepaper. We foresee an increasingly expansive role …
conception in the original Chainlink whitepaper. We foresee an increasingly expansive role …
Candid: Can-do decentralized identity with legacy compatibility, sybil-resistance, and accountability
We present CanDID, a platform for practical, user-friendly realization of decentralized
identity, the idea of empowering end users with management of their own credentials. While …
identity, the idea of empowering end users with management of their own credentials. While …
FIN: practical signature-free asynchronous common subset in constant time
Asynchronous common subset (ACS) is a powerful paradigm enabling applications such as
Byzantine fault-tolerance (BFT) and multi-party computation (MPC). The most efficient ACS …
Byzantine fault-tolerance (BFT) and multi-party computation (MPC). The most efficient ACS …
Asynchronous data dissemination and its applications
In this paper, we introduce the problem of Asynchronous Data Dissemination (ADD).
Intuitively, an ADD protocol disseminates a message to all honest nodes in an …
Intuitively, an ADD protocol disseminates a message to all honest nodes in an …
Pace: Fully parallelizable bft from reproposable byzantine agreement
H Zhang, S Duan - Proceedings of the 2022 ACM SIGSAC Conference …, 2022 - dl.acm.org
The classic asynchronous Byzantine fault tolerance (BFT) framework of Ben-Or, Kemler, and
Rabin (BKR) and its descendants rely on reliable broadcast (RBC) and asynchronous binary …
Rabin (BKR) and its descendants rely on reliable broadcast (RBC) and asynchronous binary …
Practical asynchronous high-threshold distributed key generation and distributed polynomial sampling
Distributed Key Generation (DKG) is a technique to bootstrap threshold cryptosystems
without a trusted party. DKG is an essential building block to many decentralized protocols …
without a trusted party. DKG is an essential building block to many decentralized protocols …
Long live the honey badger: Robust asynchronous {DPSS} and its applications
Secret sharing is an essential tool for many distributed applications, including distributed key
generation and multiparty computation. For many practical applications, we would like to …
generation and multiparty computation. For many practical applications, we would like to …
Sok: data sovereignty
Society appears to be on the verge of recognizing the need for control over sensitive data in
modern web applications. Recently, many systems claim to give control to individuals …
modern web applications. Recently, many systems claim to give control to individuals …
Clarion: Anonymous communication from multiparty shuffling protocols
S Eskandarian, D Boneh - Cryptology ePrint Archive, 2021 - eprint.iacr.org
This paper studies the role of multiparty shuffling protocols in enabling more efficient
metadata-hiding communication. We show that the process of shuffling messages can be …
metadata-hiding communication. We show that the process of shuffling messages can be …
Sok: Mitigation of front-running in decentralized finance
Front-running is the malicious, and often illegal, act of both manipulating the order of
pending trades and injecting additional trades to make a profit at the cost of other users. In …
pending trades and injecting additional trades to make a profit at the cost of other users. In …