Survey on blockchain networking: Context, state-of-the-art, challenges

M Dotan, YA Pignolet, S Schmid, S Tochner… - ACM Computing …, 2021 - dl.acm.org
Blockchains, in general, and cryptocurrencies such as Bitcoin, in particular, are realized
using distributed systems and hence critically rely on the performance and security of the …

Resource burning for permissionless systems

D Gupta, J Saia, M Young - International Colloquium on Structural …, 2020 - Springer
Proof-of-work puzzles and CAPTCHAS consume enormous amounts of energy and time.
These techniques are examples of resource burning: verifiable consumption of resources …

OverChain: Building a robust overlay with a blockchain

V Aradhya, S Gilbert, A Hobor - arXiv preprint arXiv:2201.12809, 2022 - arxiv.org
Blockchains use peer-to-peer networks for disseminating information among peers, but
these networks currently do not have any provable guarantees for desirable properties such …

Bankrupting Sybil despite churn

D Gupta, J Saia, M Young - Journal of Computer and System Sciences, 2023 - Elsevier
A Sybil attack occurs when an adversary controls multiple system identifiers (IDs). Limiting
the number of Sybil (bad) IDs to a minority is critical for tolerating malicious behavior. A …

Survey on cryptocurrency networking: Context, state-of-the-art, challenges

M Dotan, YA Pignolet, S Schmid, S Tochner… - arXiv preprint arXiv …, 2020 - arxiv.org
Cryptocurrencies such as Bitcoin are realized using distributed systems and hence critically
rely on the performance and security of the interconnecting network. The requirements on …

TontineCoin: Survivor-based Proof-of-Stake

C Pollett, TH Austin, K Potika, J Rietz… - Peer-to-Peer Networking …, 2022 - Springer
Proof-of-Stake cryptocurrencies avoid many of the computational and environmental costs
associated with Proof-of-Work protocols. However, they must address the nothing-at-stake …

Robust Overlays Meet Blockchains: On Handling High Churn and Catastrophic Failures

V Aradhya, S Gilbert, A Hobor - … on Stabilizing, Safety, and Security of …, 2023 - Springer
Blockchains have become ubiquitous in the world of robust decentralized applications. A
crucial requirement for implementing a blockchain is a reliable “overlay network” providing …

Tontinecoin: Murder-based proof-of-stake

C Pollett, TH Austin, K Potika… - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
Proof-of-stake cryptocurrencies avoid many of the computational and environmental costs
associated with proof-of-work protocols. However, they must address the nothing-at-stake …

Fast Data Dissemination in Blockchain Networks

R Wang - 2024 - search.proquest.com
Fast data dissemination in blockchain networks refers to the efficient and timely data
propagation across nodes. Each node stores a copy of the blockchain ledger and uses …

Sybil defense using efficient resource burning

D Gupta - 2020 - search.proquest.com
Abstract In 1993, Dwork and Naor proposed using computational puzzles, a resource
burning mechanism, to combat spam email. In the ensuing three decades, resource burning …