publication . Conference object . Other literature type . Preprint . 2017

Transaction Propagation on Permissionless Blockchains: Incentive and Routing Mechanisms

Zekeriya Erkin;
Open Access
  • Published: 20 Dec 2017
  • Publisher: IEEE
Abstract
Comment: 2018 Crypto Valley Conference on Blockchain Technology
Subjects
free text keywords: Computer Science - Cryptography and Security
41 references, page 1 of 3

[1] Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system. 2008.

[2] Gavin Wood. Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper, 151, 2014.

[3] Leslie Lamport, Robert Shostak, and Marshall Pease. The Byzantine generals problem. ACM Trans. Program. Lang. Syst., 4(3):382{401, July 1982.

[4] Gareth W Peters and Efstathios Panayi. Understanding modern banking ledgers through blockchain technologies: Future of transaction processing and smart contracts on the internet of money. In Banking Beyond Banks and Money, pages 239{278. Springer, 2016. [OpenAIRE]

[5] Sunny King and Scott Nadal. Ppcoin: Peer-to-peer crypto-currency with proof-of-stake. self-published paper, August, 19, 2012.

[6] Stefan Dziembowski, Sebastian Faust, Vladimir Kolmogorov, and Krzysztof Pietrzak. Proofs of space. In Annual Cryptology Conference, pages 585{605. Springer, 2015.

[7] Dov Monderer and Moshe Tennenholtz. Distributed games: From mechanisms to protocols. In In Proc. 16th National Conference on Arti cial Intelligence (AAAI-99. Citeseer, 1999.

[8] Eytan Adar and Bernardo A Huberman. Free riding on gnutella. First monday, 5(10), 2000.

[9] Bernardo A Huberman and Rajan M Lukose. Social dilemmas and internet congestion. Science, 277(5325):535{537, 1997. [OpenAIRE]

[10] Je rey Shneidman and David C. Parkes. Rationality and Self-Interest in Peer to Peer Networks, pages 139{148. Springer Berlin Heidelberg, Berlin, Heidelberg, 2003.

[11] Ittay Eyal and Emin Gun Sirer. Majority is not enough: Bitcoin mining is vulnerable. In International conference on nancial cryptography and data security, pages 436{454. Springer, 2014. [OpenAIRE]

[12] Kerem Kaskaloglu. Near zero bitcoin transaction fees cannot last forever. In The International Conference on Digital Security and Forensics (DigitalSec2014), pages 91{99. The Society of Digital Information and Wireless Communication, 2014.

[13] Joshua A Kroll, Ian C Davey, and Edward W Felten. The economics of bitcoin mining, or bitcoin in the presence of adversaries. In Proceedings of WEIS, volume 2013, 2013.

[14] Emin Gun Sirer. Bitcoin runs on altruism, http://hackingdistributed.com/ 2015/12/22/bitcoin-runs-on-altruism/, 2015.

[15] Thomas J Housel, Wolfgang Baer, and Johnathan Mun. 2 a new theory of value. Intellectual Capital in Organizations: Non-Financial Reports and Accounts, 1:16, 2014.

41 references, page 1 of 3
Abstract
Comment: 2018 Crypto Valley Conference on Blockchain Technology
Subjects
free text keywords: Computer Science - Cryptography and Security
41 references, page 1 of 3

[1] Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system. 2008.

[2] Gavin Wood. Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper, 151, 2014.

[3] Leslie Lamport, Robert Shostak, and Marshall Pease. The Byzantine generals problem. ACM Trans. Program. Lang. Syst., 4(3):382{401, July 1982.

[4] Gareth W Peters and Efstathios Panayi. Understanding modern banking ledgers through blockchain technologies: Future of transaction processing and smart contracts on the internet of money. In Banking Beyond Banks and Money, pages 239{278. Springer, 2016. [OpenAIRE]

[5] Sunny King and Scott Nadal. Ppcoin: Peer-to-peer crypto-currency with proof-of-stake. self-published paper, August, 19, 2012.

[6] Stefan Dziembowski, Sebastian Faust, Vladimir Kolmogorov, and Krzysztof Pietrzak. Proofs of space. In Annual Cryptology Conference, pages 585{605. Springer, 2015.

[7] Dov Monderer and Moshe Tennenholtz. Distributed games: From mechanisms to protocols. In In Proc. 16th National Conference on Arti cial Intelligence (AAAI-99. Citeseer, 1999.

[8] Eytan Adar and Bernardo A Huberman. Free riding on gnutella. First monday, 5(10), 2000.

[9] Bernardo A Huberman and Rajan M Lukose. Social dilemmas and internet congestion. Science, 277(5325):535{537, 1997. [OpenAIRE]

[10] Je rey Shneidman and David C. Parkes. Rationality and Self-Interest in Peer to Peer Networks, pages 139{148. Springer Berlin Heidelberg, Berlin, Heidelberg, 2003.

[11] Ittay Eyal and Emin Gun Sirer. Majority is not enough: Bitcoin mining is vulnerable. In International conference on nancial cryptography and data security, pages 436{454. Springer, 2014. [OpenAIRE]

[12] Kerem Kaskaloglu. Near zero bitcoin transaction fees cannot last forever. In The International Conference on Digital Security and Forensics (DigitalSec2014), pages 91{99. The Society of Digital Information and Wireless Communication, 2014.

[13] Joshua A Kroll, Ian C Davey, and Edward W Felten. The economics of bitcoin mining, or bitcoin in the presence of adversaries. In Proceedings of WEIS, volume 2013, 2013.

[14] Emin Gun Sirer. Bitcoin runs on altruism, http://hackingdistributed.com/ 2015/12/22/bitcoin-runs-on-altruism/, 2015.

[15] Thomas J Housel, Wolfgang Baer, and Johnathan Mun. 2 a new theory of value. Intellectual Capital in Organizations: Non-Financial Reports and Accounts, 1:16, 2014.

41 references, page 1 of 3
Powered by OpenAIRE Research Graph
Any information missing or wrong?Report an Issue