Fraud and data availability proofs: detecting invalid blocks in light clients
From MaRDI portal
Publication:2147248
DOI10.1007/978-3-662-64331-0_15zbMath1493.91148OpenAlexW3210283590MaRDI QIDQ2147248
Mustafa Al-Bassam, Vitalik Buterin, Ismail Khoffi, Alberto Sonnino
Publication date: 22 June 2022
Full work available at URL: https://doi.org/10.1007/978-3-662-64331-0_15
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Actuarial science and mathematical finance (91G99)
Uses Software
Cites Work
- Ouroboros: a provably secure proof-of-stake blockchain protocol
- Coded Merkle tree: solving data availability attacks in blockchains
- Asymptotic Enumeration Methods for Analyzing LDPC Codes
- Impossibility of distributed consensus with one faulty process
- New multilevel codes over GF(q)
- The fast decoding of Reed-Solomon codes using Fermat theoretic transforms and continued fractions
- Algebraic-geometric codes and multidimensional cyclic codes: a unified theory and algorithms for decoding using Grobner bases
- Analysis of the Blockchain Protocol in Asynchronous Networks
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Fraud and data availability proofs: detecting invalid blocks in light clients