搜索结果: 1-6 共查到“军事学 trustless”相关记录6条 . 查询时间(0.044 秒)
Trustless, Censorship-Resilient and Scalable Votings in the Permission-based Blockchain Model
DAO voting functional encryption
2019/6/4
Voting systems are the tool of choice when it comes to settle an agreement of different opinions. We propose a solution for a trustless, censorship-resilient and scalable electronic voting platform. B...
MixEth: efficient, trustless coin mixing service for Ethereum
Cryptography Verifiable shuffle Anonymity
2019/4/3
Coin mixing is a prevalent privacy-enhancing technology for cryptocurrency users. In this paper, we present MixEth, which is a trustless coin mixing service for Turing-complete blockchains. MixEth doe...
Financial exchanges are typically built out of two trusted components: a trade matching and a trade settlement system. With the advent of decentralized ledgers, that perform transactions without a tru...
A threshold signature scheme enables distributed signing among nn players such that any subgroup of size t+1t+1 can sign, whereas any group with tt or fewer players cannot. While there exist previous ...
On a decentralized trustless pseudo-random number generation algorithm
public randomness collusion algorithm works w.h.p.
2016/3/2
We construct an algorithm that permits a large group of individuals
to reach consensus on a random number, without having to rely
on any third parties. The algorithm works with high probability if
...
Reputation systems are crucial for distributed applications
in which users have to be made accountable for their actions, such as ecommerce
websites. However, existing systems often disclose the ide...