搜索结果: 1-15 共查到“军队指挥学 Bitcoin”相关记录76条 . 查询时间(0.09 秒)
Utreexo: A dynamic hash-based accumulator optimized for the Bitcoin UTXO set
accumulators bitcoin merkle proofs
2019/6/4
In the Bitcoin consensus network, all nodes come to agreement on the set of Unspent Transaction Outputs (The “UTXO” set). The size of this shared state is a scalability constraint for the network, as ...
Atomic Multi-Channel Updates with Constant Collateral in Bitcoin-Compatible Payment-Channel Networks
payment channel networks collateral scalability
2019/5/31
Current cryptocurrencies provide a heavily limited transaction throughput that is clearly insufficient to cater to their growing adoption. Payment-channel networks (PCNs) have emerged as an interestin...
How many transactions per second can bitcoin really handle ? Theoretically.
maximal throughput bitcoin protocol blockchain
2019/4/25
Transactions are arguably the most important part in the bitcoin mechanism, with everything else facilitating the proper creation, propagation and validation; culminating with their addition to the pu...
Smart contracts are envisioned to be one of the killer applications of decentralized cryptocurrencies. They enable self-enforcing payments between users depending on complex program logic. Unfortunate...
A landmark security property of smart contracts is liquidity: in a non-liquid contract, it may happen that some funds remain frozen. The relevance of this issue is witnessed by a recent liquidity atta...
Decentralized blockchains offer attractive advantages over traditional payments such as the ability to operate without a trusted authority and increased user privacy. However, the verification of bloc...
A New Blind ECDSA Scheme for Bitcoin Transaction Anonymity
Blind signature ECDSA Paillier cryptosystem
2018/7/9
In this paper, we consider a scenario where a bitcoin liquidity provider sells bitcoins to clients. When a client pays for a bitcoin online, the provider is able to link the client's payment informati...
Aggregate signature allows non-interactively condensing multiple individual signatures into a compact one. Besides the faster verification, it is useful to reduce storage and bandwidth, and is especia...
Besides simple transfers of currency, Bitcoin also enables various forms of smart contracts, i.e. protocols where users interact within pre-agreed rules, which determine (possibly depending on the act...
Mounting deanonymization attacks on the unreachable Bitcoin nodes -- these nodes do not accept incoming connections -- residing behind the NAT is a challenging task. Such an attack was first given by ...
Albeit the primary usage of Bitcoin is to exchange currency, its blockchain and consensus mechanism can also be exploited to securely execute some forms of smart contracts. These are agreements among ...
Committing to Quantum Resistance: A Slow Defence for Bitcoin against a Fast Quantum Computing Attack
Bitcoin blockchain quantum computing
2018/3/5
Quantum computers are expected to have a dramatic impact on numerous fields, due to their anticipated ability to solve classes of mathematical problems much more efficiently than their classical count...
But Why does it Work? A Rational Protocol Design Treatment of Bitcoin
Blockchain Protocols Rational Protocol Design Bitcoin
2018/2/8
An exciting recent line of work has focused on formally investigating the core cryptographic assumptions underlying the security of Bitcoin. In a nutshell, these works conclude that Bitcoin is secure ...
BitML: a calculus for Bitcoin smart contracts
Bitcoin smart contracts computational attacks
2018/2/1
We propose a domain-specific language for smart contracts, which allows participants to transfer cryptocurrency according to agreed contract terms. We define a symbolic and a computational model for r...
Simple Schnorr Multi-Signatures with Applications to Bitcoin
multi-signatures Schnorr signatures one-more discrete logarithm problem
2018/1/19
We describe a new Schnorr-based multi-signature scheme (i.e., a protocol which allows a group of signers to produce a short, joint signature on a common message), provably secure in the plain public-k...