The bitcoin backbone protocol: Analysis and applications

J Garay, A Kiayias, N Leonardos - Journal of the ACM, 2024 - dl.acm.org
Bitcoin is the first and most popular decentralized cryptocurrency to date. In this work, we
extract and analyze the core of the Bitcoin protocol, which we term the Bitcoin backbone …

Ouroboros genesis: Composable proof-of-stake blockchains with dynamic availability

C Badertscher, P Gaži, A Kiayias, A Russell… - Proceedings of the 2018 …, 2018 - dl.acm.org
We present a novel Proof-of-Stake (PoS) protocol, Ouroboros Genesis, that enables parties
to safely join (or rejoin) the protocol execution using only the genesis block information. Prior …

Sok: A consensus taxonomy in the blockchain era

J Garay, A Kiayias - Topics in Cryptology–CT-RSA 2020: The …, 2020 - Springer
Consensus is arguably one of the most fundamental problems in distributed computing,
playing also an important role in the area of cryptographic protocols as the enabler of a …

Communication complexity of byzantine agreement, revisited

I Abraham, THH Chan, D Dolev, K Nayak… - Proceedings of the …, 2019 - dl.acm.org
As Byzantine Agreement (BA) protocols find application in large-scale decentralized
cryptocurrencies, an increasingly important problem is to design BA protocols with improved …

Universally composable synchronous computation

J Katz, U Maurer, B Tackmann, V Zikas - Theory of Cryptography …, 2013 - Springer
In synchronous networks, protocols can achieve security guarantees that are not possible in
an asynchronous world: they can simultaneously achieve input completeness (all honest …

Efficient and adaptively secure asynchronous binary agreement via binding crusader agreement

I Abraham, N Ben-David, S Yandamuri - … of the 2022 ACM Symposium on …, 2022 - dl.acm.org
We present a new abstraction based on crusader agreement called Binding Crusader
Agreement (BCA) for solving binary consensus in the asynchronous setting against an …

Rational protocol design: Cryptography against incentive-driven adversaries

J Garay, J Katz, U Maurer… - 2013 IEEE 54th …, 2013 - ieeexplore.ieee.org
Existing work on" rational cryptographic protocols" treats each party (or coalition of parties)
running the protocol as a selfish agent trying to maximize its utility. In this work we propose a …

Communication lower bounds for cryptographic broadcast protocols

E Blum, E Boyle, R Cohen, CD Liu-Zhang - Distributed Computing, 2025 - Springer
Broadcast protocols enable a set of n parties to agree on the input of a designated sender,
even facing attacks by malicious parties. In the honest-majority setting, randomization and …

Expected constant round byzantine broadcast under dishonest majority

J Wan, H Xiao, E Shi, S Devadas - … 2020, Durham, NC, USA, November 16 …, 2020 - Springer
Byzantine Broadcast (BB) is a central question in distributed systems, and an important
challenge is to understand its round complexity. Under the honest majority setting, it is long …

General adversary structures in byzantine agreement and multi-party computation with active and omission corruption

K Brazitikos, V Zikas - Theory of Cryptography Conference, 2025 - Springer
Typical results in multi-party computation (in short, MPC) capture faulty parties by assuming
a threshold adversary corrupting parties actively and/or fail-corrupting. These corruption …