A widespread security claim of the Bitcoin system, presented in the original Bitcoin white-paper, states that the security of the system is guaranteed as long as there is no attacker in possession of half or more of the total computational power used to maintain the system. This claim, however, is proved based on theoretically flawed assumptions. In the paper we analyze two kinds of attacks based on two theoretical flaws: the Block Discarding Attack and the Difficulty Raising Attack. We argue that the current theoretical limit of attacker's fraction of total computational power essential for the security of the system is in a sense no
Blockchains enable secure asset exchange in a distributed system, thereby facilitating innovative ap...
We introduce a formal quantitative notion of “bit security” for a general type of cryptographic game...
This paper presents an attack against common procedures for comparing the size-security tradeoffs of...
Given the increasing adoption of Bitcoin, the number of transac-tions and the block sizes within the...
Bitcoin is a distributed online payment system that facilitates anonymous transactions using a peer-...
Bitcoin is a distributed online payment system that organises transactions into blocks. The size of...
Given the increasing adoption of Bitcoin, the number of transactions and the block sizes within the ...
Decentralised cryptocurrencies such as Bitcoin offer a new paradigm of electronic payment systems th...
Proof of Work (PoW) powered blockchains currently account for more than 90% of the total market capi...
The Bitcoin cryptocurrency relies heavily on a variety of cryptographic functions and operations, wh...
Digital currencies like Bitcoin rely on cryptographic primitives to operate. However, past experienc...
The 51% attack is a technique which intends to fork a blockchain in order to conduct double-spending...
The applications that use blockchain are cryptocurrencies, decentralized finance applications, video...
We introduce a formal quantitative notion of ``bit security\u27\u27 for a general type of cryptograp...
Abstract—Several new services incentivize clients to compete in solving large computation tasks in e...
Blockchains enable secure asset exchange in a distributed system, thereby facilitating innovative ap...
We introduce a formal quantitative notion of “bit security” for a general type of cryptographic game...
This paper presents an attack against common procedures for comparing the size-security tradeoffs of...
Given the increasing adoption of Bitcoin, the number of transac-tions and the block sizes within the...
Bitcoin is a distributed online payment system that facilitates anonymous transactions using a peer-...
Bitcoin is a distributed online payment system that organises transactions into blocks. The size of...
Given the increasing adoption of Bitcoin, the number of transactions and the block sizes within the ...
Decentralised cryptocurrencies such as Bitcoin offer a new paradigm of electronic payment systems th...
Proof of Work (PoW) powered blockchains currently account for more than 90% of the total market capi...
The Bitcoin cryptocurrency relies heavily on a variety of cryptographic functions and operations, wh...
Digital currencies like Bitcoin rely on cryptographic primitives to operate. However, past experienc...
The 51% attack is a technique which intends to fork a blockchain in order to conduct double-spending...
The applications that use blockchain are cryptocurrencies, decentralized finance applications, video...
We introduce a formal quantitative notion of ``bit security\u27\u27 for a general type of cryptograp...
Abstract—Several new services incentivize clients to compete in solving large computation tasks in e...
Blockchains enable secure asset exchange in a distributed system, thereby facilitating innovative ap...
We introduce a formal quantitative notion of “bit security” for a general type of cryptographic game...
This paper presents an attack against common procedures for comparing the size-security tradeoffs of...