ASBK is a recent blockchain protocol tackling data availability attacks against light nodes; it employs twodimensional Reed-Solomon codes to encode the list of transactions and a random sampling phase where adversaries are forced to reveal information. In its original formulation, only codes with rate 1/4 are considered, and a theoretical analysis requiring computationally demanding formulas is provided. This makes ASBK difficult to optimize in situations of practical interest. In this paper, we introduce a much simpler model for such a protocol, which additionally supports the use of codes with arbitrary rate. This makes blockchains implementing ASBK much easier to design and optimize. Furthermore, disposing of a clearer view o...
The decoding of random linear codes is one of the most fundamental problems in both computational co...
Bitcoin also known as the first-generation blockchain protocol, has suffered from scalability barrie...
The generation of random numbers by a trusted third-party is essential to many cryptographic protoco...
ASBK is a recent blockchain protocol tackling data availability attacks against light nodes; it emp...
Light nodes are clients in blockchain systems that only store a small portion of the blockchain ledg...
In a blockchain Data Availability Attack (DAA), a malicious node publishes a block header but withho...
Blockchain, with its characteristics of non-tamperability and decentralization, has had a profound i...
A popular method in practice offloads computation and storage in blockchains by relying on committin...
Light nodes in blockchain systems are known to be vulnerable to data availability (DA) attacks where...
Layer 2 systems have received increasing attention due to their potential to scale the throughput of...
Abstract. Distributed cryptographic protocols such as Bitcoin and Ethereum use a data structure know...
Since the advent of Bitcoin, scientific interest in its underlying core technology Blockchain has be...
Blockchain technology aims to replace traditional banking systems and manage the world's economic da...
Decoding of random linear block codes has been long exploited as a computationally hard problem on w...
Blockchains are simple data structures, containing transactions organized into blocks, in which each...
The decoding of random linear codes is one of the most fundamental problems in both computational co...
Bitcoin also known as the first-generation blockchain protocol, has suffered from scalability barrie...
The generation of random numbers by a trusted third-party is essential to many cryptographic protoco...
ASBK is a recent blockchain protocol tackling data availability attacks against light nodes; it emp...
Light nodes are clients in blockchain systems that only store a small portion of the blockchain ledg...
In a blockchain Data Availability Attack (DAA), a malicious node publishes a block header but withho...
Blockchain, with its characteristics of non-tamperability and decentralization, has had a profound i...
A popular method in practice offloads computation and storage in blockchains by relying on committin...
Light nodes in blockchain systems are known to be vulnerable to data availability (DA) attacks where...
Layer 2 systems have received increasing attention due to their potential to scale the throughput of...
Abstract. Distributed cryptographic protocols such as Bitcoin and Ethereum use a data structure know...
Since the advent of Bitcoin, scientific interest in its underlying core technology Blockchain has be...
Blockchain technology aims to replace traditional banking systems and manage the world's economic da...
Decoding of random linear block codes has been long exploited as a computationally hard problem on w...
Blockchains are simple data structures, containing transactions organized into blocks, in which each...
The decoding of random linear codes is one of the most fundamental problems in both computational co...
Bitcoin also known as the first-generation blockchain protocol, has suffered from scalability barrie...
The generation of random numbers by a trusted third-party is essential to many cryptographic protoco...