Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
How to Use Bitcoin to Design Fair Protocols - MaRDI portal

How to Use Bitcoin to Design Fair Protocols

From MaRDI portal
Publication:2874551

DOI10.1007/978-3-662-44381-1_24zbMath1335.94032OpenAlexW111114747MaRDI QIDQ2874551

Iddo Bentov, Ranjit Kumaresan

Publication date: 7 August 2014

Published in: Advances in Cryptology – CRYPTO 2014 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-44381-1_24




Related Items (33)

Game-theoretic fairness meets multi-party protocols: the case of leader electionA blockchain-based creditable and distributed incentive mechanism for participant mobile crowdsensing in edge computingIncentive-driven attacker for corrupting two-party protocolsGame theoretic notions of fairness in multi-party coin tossShielded computations in smart contracts overcoming forksA formal model of Algorand smart contractsDesigning Proof of Human-Work Puzzles for Cryptocurrency and BeyondSoK: communication across distributed ledgersA complete characterization of game-theoretically fair, multi-party coin tossConstant-round linear-broadcast secure computation with penaltiesCRAFT: \underline{C}omposable \underline{R}andomness beacons and output-independent \underline{A}bort MPC \underline{F}rom \underline{T}imeA denial of service attack against fair computations using bitcoin deposits\(\log^\ast\)-round game-theoretically-fair leader electionFully-secure MPC with minimal trustGeneralized channels from limited blockchain scripts and adaptor signaturesFinancially backed covert security(Public) verifiability for composable protocols without adaptivity or zero-knowledgeThe impact of network delay on Nakamoto consensus mechanismUnnamed ItemWhat security can we achieve within 4 rounds?Blockchain-based two-party fair contract signing schemeRational SumchecksFair hierarchical secret sharing scheme based on smart contractTARDIS: a foundation of time-lock puzzles in UCAbuse resistant law enforcement access systemsPublicly verifiable zero knowledge from (collapsing) blockchainsWhat Security Can We Achieve Within 4 Rounds?Escrow Protocols for Cryptocurrencies: How to Buy Physical Goods Using BitcoinFAST: fair auctions via secret transactionsAnalysis of the Blockchain Protocol in Asynchronous NetworksBlind polynomial evaluation and data tradingCoin-based multi-party fair exchangeP2DEX: privacy-preserving decentralized cryptocurrency exchange




This page was built for publication: How to Use Bitcoin to Design Fair Protocols