How to Use Bitcoin to Design Fair Protocols
From MaRDI portal
Publication:2874551
DOI10.1007/978-3-662-44381-1_24zbMath1335.94032OpenAlexW111114747MaRDI QIDQ2874551
Publication date: 7 August 2014
Published in: Advances in Cryptology – CRYPTO 2014 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-44381-1_24
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Network protocols (68M12)
Related Items (33)
Game-theoretic fairness meets multi-party protocols: the case of leader election ⋮ A blockchain-based creditable and distributed incentive mechanism for participant mobile crowdsensing in edge computing ⋮ Incentive-driven attacker for corrupting two-party protocols ⋮ Game theoretic notions of fairness in multi-party coin toss ⋮ Shielded computations in smart contracts overcoming forks ⋮ A formal model of Algorand smart contracts ⋮ Designing Proof of Human-Work Puzzles for Cryptocurrency and Beyond ⋮ SoK: communication across distributed ledgers ⋮ A complete characterization of game-theoretically fair, multi-party coin toss ⋮ Constant-round linear-broadcast secure computation with penalties ⋮ CRAFT: \underline{C}omposable \underline{R}andomness beacons and output-independent \underline{A}bort MPC \underline{F}rom \underline{T}ime ⋮ A denial of service attack against fair computations using bitcoin deposits ⋮ \(\log^\ast\)-round game-theoretically-fair leader election ⋮ Fully-secure MPC with minimal trust ⋮ Generalized channels from limited blockchain scripts and adaptor signatures ⋮ Financially backed covert security ⋮ (Public) verifiability for composable protocols without adaptivity or zero-knowledge ⋮ The impact of network delay on Nakamoto consensus mechanism ⋮ Unnamed Item ⋮ What security can we achieve within 4 rounds? ⋮ Blockchain-based two-party fair contract signing scheme ⋮ Rational Sumchecks ⋮ Fair hierarchical secret sharing scheme based on smart contract ⋮ TARDIS: a foundation of time-lock puzzles in UC ⋮ Abuse resistant law enforcement access systems ⋮ Publicly verifiable zero knowledge from (collapsing) blockchains ⋮ What Security Can We Achieve Within 4 Rounds? ⋮ Escrow Protocols for Cryptocurrencies: How to Buy Physical Goods Using Bitcoin ⋮ FAST: fair auctions via secret transactions ⋮ Analysis of the Blockchain Protocol in Asynchronous Networks ⋮ Blind polynomial evaluation and data trading ⋮ Coin-based multi-party fair exchange ⋮ P2DEX: privacy-preserving decentralized cryptocurrency exchange
This page was built for publication: How to Use Bitcoin to Design Fair Protocols