Author:
Meneghetti Alessio,Sala Massimiliano,Taufer Daniele
Abstract
We provide a historical overview of proof-of-work techniques and the fields in which it plunges its roots. We are interested in PoW-techniques applied to blockchain technology and therefore we survey the state-of-the-art protocols employing these methods for consensus algorithms, emphasizing the differences between the efficient hashcash systems and the promising bread pudding protocols. Afterwards, the consensus mechanisms are discussed and some interesting known attacks to these algorithms are collected and classified according to their underlying ideas.
Publisher
International Association for Educators and Researchers (IAER)
Subject
Electrical and Electronic Engineering,General Computer Science
Reference69 articles.
1. M. Jakobsson, A. Juels, "Proofs of Work and Bread Pudding Protocols (Extended Abstract)", Secure Information Networks, 1999, Available: https://doi.org/10.1007/978-0-387-35568-9_18
2. C. Dwork, M. Naor, "Pricing via Processing or Combatting Junk Mail", Annual International Cryptology Conference, 1992, Available: https://doi.org/10.1007/3-540-48071-4_10
3. J. Cai, R. J. Lipton, R. Sedgewick, A. C. Yao, "Towards uncheatable benchmarks", IEEE, 1993, Available: https://doi.org/10.1109/SCT.1993.336546
4. S. Ar, J. Cai, "Reliable benchmarks Using Numerical Instability", Proceeding SODA ‘94, 1994, Available: https://dl.acm.org/citation.cfm?id=314476
5. M. K. Franklin, D. Malkhi, "Auditable Metering with Lightweight Security", Financial Cryptography, 1997, Available: https://doi.org/10.1007/3-540-63594-7_75
Cited by
29 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献