With the rapid advancement and wide application of blockchain technology, blockchain consensus protocols, which are the core part of blockchain systems, along with the privacy issues, have drawn much attention from researchers. A key aspect of privacy in the blockchain is the sensitive content of transactions in the permissionless blockchain. Meanwhile, some blockchain applications, such as cryptocurrencies, are based on low-efficiency and high-cost consensus protocols, which may not be practical and feasible for other blockchain applications. In this paper, we propose an efficient and privacy-preserving consensus protocol, called Delegated Proof of Secret Sharing (DPoSS), which is inspired by secure multiparty computation. Specifically, DP...
The rapid development of blockchain technology and their numerous emerging applications has received...
International audiencePrivate permissioned blockchains are becoming gradually more sought-after. Suc...
Blockchain networks are based on cryptographic notions that include asymmetric-key encryption, hash ...
Security and a decentralized system are identical unique features of Blockchain. In recent times, bl...
The paper introduces a novel consensus algorithm named MRPBFT, which is derived from the HotStuff co...
In blockchain technology, consensus protocols serve as mechanisms to reach agreements among a distri...
Blockchains combine other technologies, such as cryptography, networking, and incentive mechanisms, ...
Atomic swap facilitates fair exchange of cryptocurrencies without the need for a trusted authority. ...
The concept of blockchain, widely known as virtual currencies, saw a massive surge in popularity in ...
Blockchain technology considers the central technology that is used within many applications used fr...
Blockchain is an evolving technology with the potential to reshape various industries. It is an imm...
Blockchain is a public ledger technology to which everyone has access without a central authority ha...
Thesis: S.M., Massachusetts Institute of Technology, School of Architecture and Planning, Program in...
Blockchain technology is one of the latest innovations that provides a secured decentralized, distri...
Reaching consensus on the global state of a ledger among distributed participants is an important ch...
The rapid development of blockchain technology and their numerous emerging applications has received...
International audiencePrivate permissioned blockchains are becoming gradually more sought-after. Suc...
Blockchain networks are based on cryptographic notions that include asymmetric-key encryption, hash ...
Security and a decentralized system are identical unique features of Blockchain. In recent times, bl...
The paper introduces a novel consensus algorithm named MRPBFT, which is derived from the HotStuff co...
In blockchain technology, consensus protocols serve as mechanisms to reach agreements among a distri...
Blockchains combine other technologies, such as cryptography, networking, and incentive mechanisms, ...
Atomic swap facilitates fair exchange of cryptocurrencies without the need for a trusted authority. ...
The concept of blockchain, widely known as virtual currencies, saw a massive surge in popularity in ...
Blockchain technology considers the central technology that is used within many applications used fr...
Blockchain is an evolving technology with the potential to reshape various industries. It is an imm...
Blockchain is a public ledger technology to which everyone has access without a central authority ha...
Thesis: S.M., Massachusetts Institute of Technology, School of Architecture and Planning, Program in...
Blockchain technology is one of the latest innovations that provides a secured decentralized, distri...
Reaching consensus on the global state of a ledger among distributed participants is an important ch...
The rapid development of blockchain technology and their numerous emerging applications has received...
International audiencePrivate permissioned blockchains are becoming gradually more sought-after. Suc...
Blockchain networks are based on cryptographic notions that include asymmetric-key encryption, hash ...