Optimized model analysis of blockchain PoW procotol under long delay attack
Abstract
References
Index Terms
- Optimized model analysis of blockchain PoW procotol under long delay attack
Recommendations
Security of the Blockchain Against Long Delay Attack
Advances in Cryptology – ASIACRYPT 2018AbstractThe consensus protocol underlying Bitcoin (the blockchain) works remarkably well in practice. However proving its security in a formal setting has been an elusive goal. A recent analytical result by Pass, Seeman and shelat indicates that an ...
Attack and Vulnerability Simulation Framework for Bitcoin-like Blockchain Technologies
Middleware '18: Proceedings of the 19th International Middleware Conference (Posters)Despite the very high volatility of the cryptocurrency markets, the interest in the development and adaptation of existing cryptocurrencies such as Bitcoin as well as new distributed ledger technologies is increasing. Therefore, understanding the ...
BDoS: Blockchain Denial-of-Service
CCS '20: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications SecurityProof-of-work (PoW) cryptocurrency blockchains like Bitcoin secure vast amounts of money. Their operators, called miners, expend resources to generate blocks and receive monetary rewards for their effort. Blockchains are, in principle, attractive ...
Comments
Information & Contributors
Information
Published In
![cover image ACM Other conferences](/cms/asset/7e3fffed-f6ff-4fe4-91cd-675444aff9c3/3590003.cover.jpg)
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Funding Sources
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 26Total Downloads
- Downloads (Last 12 months)22
- Downloads (Last 6 weeks)0
Other Metrics
Citations
Cited By
View allView Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format