Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey of blockchain consensus protocols
Blockchain consensus protocols have been a focus of attention since the advent of Bitcoin.
Although classic distributed consensus algorithms made significant contributions to the …
Although classic distributed consensus algorithms made significant contributions to the …
Blockchain censorship
A Wahrstätter, J Ernstberger, A Yaish, L Zhou… - Proceedings of the …, 2024 - dl.acm.org
Permissionless blockchains promise resilience against censorship by a single entity. This
suggests that deterministic rules, not third-party actors, decide whether a transaction is …
suggests that deterministic rules, not third-party actors, decide whether a transaction is …
Ebb-and-flow protocols: A resolution of the availability-finality dilemma
The CAP theorem says that no blockchain can be live under dynamic participation and safe
under temporary network partitions. To resolve this availability-finality dilemma, we formulate …
under temporary network partitions. To resolve this availability-finality dilemma, we formulate …
The economic limits of permissionless consensus
E Budish, A Lewis-Pye, T Roughgarden - Proceedings of the 25th ACM …, 2024 - dl.acm.org
An ideal permissionless consensus protocol would, in addition to satisfying standard
consistency and liveness guarantees, render consistency violations prohibitively expensive …
consistency and liveness guarantees, render consistency violations prohibitively expensive …
Polygraph: Accountable byzantine agreement
In this paper, we introduce Polygraph, the first accountable Byzantine consensus algorithm.
If among n users t<n/3 are malicious then it ensures consensus; otherwise (if t≧n/3), it …
If among n users t<n/3 are malicious then it ensures consensus; otherwise (if t≧n/3), it …
Permissionless consensus
A Lewis-Pye, T Roughgarden - arxiv preprint arxiv:2304.14701, 2023 - arxiv.org
Blockchain protocols typically aspire to run in the permissionless setting, in which nodes are
owned and operated by a large number of diverse and unknown entities, with each node …
owned and operated by a large number of diverse and unknown entities, with each node …
[PDF][PDF] No more attacks on proof-of-stake ethereum
The latest message driven (LMD) greedy heaviest observed sub-tree (GHOST) consensus
protocol is a critical component of future proof-of-stake (PoS) Ethereum. In its current form …
protocol is a critical component of future proof-of-stake (PoS) Ethereum. In its current form …
The availability-accountability dilemma and its resolution via accountability gadgets
For applications of Byzantine fault tolerant (BFT) consensus protocols where the participants
are economic agents, recent works highlighted the importance of accountability: the ability to …
are economic agents, recent works highlighted the importance of accountability: the ability to …
Bitcoin-enhanced proof-of-stake security: Possibilities and impossibilities
Bitcoin is the most secure blockchain in the world, supported by the immense hash power of
its Proof-of-Work miners. Proof-of-Stake chains are energy-efficient, have fast finality but face …
its Proof-of-Work miners. Proof-of-Stake chains are energy-efficient, have fast finality but face …
{IA-CCF}: Individual accountability for permissioned ledgers
A Shamis, P Pietzuch, B Canakci, M Castro… - … USENIX Symposium on …, 2022 - usenix.org
Permissioned ledger systems allow a consortium of members that do not trust one another to
execute transactions safely on a set of replicas. Such systems typically use Byzantine fault …
execute transactions safely on a set of replicas. Such systems typically use Byzantine fault …