搜索结果: 1-15 共查到“密码学 mining”相关记录20条 . 查询时间(0.103 秒)
Detective Mining: Selfish Mining Becomes Unrealistic under Mining Pool Environment
blockchain Bitcoin, security
2019/5/21
One of Bitcoin’s core security guarantees is that, for an attacker to be able to successfully interfere with the Bitcoin network and reverse transactions, they need to control 51% of total hash power....
Uncle Traps: Harvesting Rewards in a Queue-based Ethereum Mining Pool
queue-based mining pools ethereum uncle blocks
2019/1/26
Mining pools in Proof-of-Work cryptocurrencies allow miners to pool their computational resources as a means of reducing payout variance. In Ethereum, uncle blocks are valid Proof-of-Work solutions wh...
Bitcoin, the first successful cryptocurrency, uses the blockchain structure and PoW mechanism to generate blocks. PoW makes an adversary difficult to control the network until she retains over 50\% of...
Echoes of the Past: Recovering Blockchain Metrics From Merged Mining
Bitcoin Blockchain Merged Mining
2018/11/29
So far, the topic of merged mining has mainly been considered in a security context, covering issues such as mining power centralization or crosschain attack scenarios. In this work we show that key i...
This paper studies a fundamental problem regarding the security of blockchain on how the existence of multiple misbehaving pools influences the profitability of selfish mining. Each selfish miner main...
Green Mining: toward a less energetic impact of cryptocurrencies
BlockChain gain popularity
2018/3/5
While cryptocurrencies continue to gain popularity, their energy cost is increasingly becoming unsustainable. In this paper, we present an innovative scheme which eliminates the burden of the proof of...
On the Strategy and Behavior of Bitcoin Mining with N-attackers
Bitcoin Mining Selfish mining
2018/1/2
Selfish mining is a well-known mining attack strategy discovered by Eyal and Sirer in 2014. After that, the attackers' strategy space has been extended by many works. These works only analyze the stra...
Privacy Notions for Privacy-Preserving Distributed Data Mining: Foundations and Privacy Games
privacy privacy games privacy notions
2017/11/27
It is well understood that the huge volumes of data captured in recent years have the potential to underpin significant research developments in many fields. But, to realise these benefits, all releva...
Merged mining refers to the concept of mining more than one cryptocurrency without necessitating additional proof-of-work effort. Although merged mining has been adopted by a number of cryptocurrencie...
On the Necessity of a Prescribed Block Validity Consensus: Analyzing Bitcoin Unlimited Mining Protocol
Markov Decision Process Bitcoin game theory
2017/7/19
Bitcoin has not only attracted many users but also been considered as a technical breakthrough by academia. However, the expanding potential of Bitcoin is largely untapped due to its limited throughpu...
Smart Contracts Make Bitcoin Mining Pools Vulnerable
Smart Contracts Bitcoin Mining Pools Vulnerable
2017/3/9
Despite their incentive structure flaws, mining pools account for more than 95% of Bitcoin's computation power. This paper introduces an attack against mining pools in which a malicious party pays poo...
Blockchains show promise as potential infrastructure for financial transaction systems. The security of blockchains today, however, relies critically on Proof-of-Work (PoW), which forces participants ...
SMART POOL : Practical Decentralized Pooled Mining
blockchains pooled mining smart contracts
2017/2/20
Many blockchain-based cryptocurrencies such as Bitcoin and Ethereum use Nakamoto consensus protocol to reach agreement on the blockchain state between a network of participant nodes. The Nakamoto cons...
Beyond Bitcoin -- Part II: Blockchain-based systems without mining
blockchain technology dependable distributed computing systems
2016/12/12
Nowadays the decentralized transaction ledger functionality implemented through the blockchain technology is at the highest international interest because of the prospects both on opportunities and ri...
Bit Coincidence Mining Algorithm II
Elliptic Curve Discrete Logarithm Problem Elliptic Curve Cryptology
2016/12/8
In the former part of this manuscript, the author states the algorithm for the construction of equations system that ECDLP is reduced and in the latter part of this manuscript, the author state the id...