The Bitcoin Backbone Protocol with Chains of Variable Difficulty (English)
- New search for: Garay, Juan
- New search for: Kiayias, Aggelos
- New search for: Leonardos, Nikos
- New search for: Katz, Jonathan
- New search for: Shacham, Hovav
- New search for: Garay, Juan
- New search for: Kiayias, Aggelos
- New search for: Leonardos, Nikos
In:
Advances in Cryptology – CRYPTO 2017
: 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20–24, 2017, Proceedings, Part I
;
Chapter: 10
;
291-323
;
2017
- Article/Chapter (Book) / Electronic Resource
-
Title:The Bitcoin Backbone Protocol with Chains of Variable Difficulty
-
Additional title:Lect.Notes Computer
-
Contributors:Katz, Jonathan ( editor ) / Shacham, Hovav ( editor ) / Garay, Juan ( author ) / Kiayias, Aggelos ( author ) / Leonardos, Nikos ( author )
-
Conference:Annual International Cryptology Conference ; 2017 ; Santa Barbara, USA
-
Published in:Advances in Cryptology – CRYPTO 2017 : 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20–24, 2017, Proceedings, Part I ; Chapter: 10 ; 291-323Lecture Notes in Computer Science ; 10401 ; 291-323Security and Cryptology ; 291-323
-
Publisher:
- New search for: Springer International Publishing
-
Place of publication:Cham
-
Publication date:2017-07-29
-
Size:33 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Stronger Security for Reusable Garbled Circuits, General Definitions and AttacksAgrawal, Shweta et al. | 2017
- 2
-
Generic Transformations of Predicate Encodings: Constructions and ApplicationsAmbrona, Miguel / Barthe, Gilles / Schmidt, Benedikt et al. | 2017
- 3
-
Practical Functional Encryption for Quadratic Functions with Applications to Predicate EncryptionBaltico, Carmen Elisabetta Zaira / Catalano, Dario / Fiore, Dario / Gay, Romain et al. | 2017
- 4
-
Memory-Tight ReductionsAuerbach, Benedikt / Cash, David / Fersch, Manuel / Kiltz, Eike et al. | 2017
- 5
-
Be Adaptive, Avoid OvercommittingJafargholi, Zahra / Kamath, Chethan / Klein, Karen / Komargodski, Ilan / Pietrzak, Krzysztof / Wichs, Daniel et al. | 2017
- 6
-
The TinyTable Protocol for 2-Party Secure Computation, or: Gate-Scrambling RevisitedDamgård, Ivan / Nielsen, Jesper Buus / Nielsen, Michael / Ranellucci, Samuel et al. | 2017
- 7
-
Privacy-Free Garbled Circuits for Formulas: Size Zero and Information-TheoreticKondi, Yashvanth / Patra, Arpita et al. | 2017
- 8
-
Secure Arithmetic Computation with Constant Computational OverheadApplebaum, Benny / Damgård, Ivan / Ishai, Yuval / Nielsen, Michael / Zichron, Lior et al. | 2017
- 9
-
Encryption Switching Protocols Revisited: Switching Modulo pCastagnos, Guilhem / Imbert, Laurent / Laguillaumie, Fabien et al. | 2017
- 10
-
The Bitcoin Backbone Protocol with Chains of Variable DifficultyGaray, Juan / Kiayias, Aggelos / Leonardos, Nikos et al. | 2017
- 11
-
Bitcoin as a Transaction Ledger: A Composable TreatmentBadertscher, Christian / Maurer, Ueli / Tschudi, Daniel / Zikas, Vassilis et al. | 2017
- 12
-
Ouroboros: A Provably Secure Proof-of-Stake Blockchain ProtocolKiayias, Aggelos / Russell, Alexander / David, Bernardo / Oliynykov, Roman et al. | 2017
- 13
-
Robust Non-interactive Multiparty Computation Against Constant-Size CollusionBenhamouda, Fabrice / Krawczyk, Hugo / Rabin, Tal et al. | 2017
- 14
-
The Price of Low Communication in Secure Multi-party ComputationGaray, Juan / Ishai, Yuval / Ostrovsky, Rafail / Zikas, Vassilis et al. | 2017
- 15
-
Topology-Hiding Computation on All GraphsAkavia, Adi / LaVigne, Rio / Moran, Tal et al. | 2017
- 16
-
A New Approach to Round-Optimal Secure Multiparty ComputationAnanth, Prabhanjan / Choudhuri, Arka Rai / Jain, Abhishek et al. | 2017
- 17
-
Watermarking Cryptographic Functionalities from Standard Lattice AssumptionsKim, Sam / Wu, David J. et al. | 2017
- 18
-
Identity-Based Encryption from the Diffie-Hellman AssumptionDöttling, Nico / Garg, Sanjam et al. | 2017
- 19
-
The First Collision for Full SHA-1Stevens, Marc / Bursztein, Elie / Karpman, Pierre / Albertini, Ange / Markov, Yarik et al. | 2017
- 20
-
Indistinguishability Obfuscation from SXDH on 5-Linear Maps and Locality-5 PRGsLin, Huijia et al. | 2017
- 21
-
Indistinguishability Obfuscation from Trilinear Maps and Block-Wise Local PRGsLin, Huijia / Tessaro, Stefano et al. | 2017
- 22
-
Lower Bounds on Obfuscation from All-or-Nothing Encryption PrimitivesGarg, Sanjam / Mahmoody, Mohammad / Mohammed, Ameer et al. | 2017
- 23
-
Structure vs. Hardness Through the Obfuscation LensBitansky, Nir / Degwekar, Akshay / Vaikuntanathan, Vinod et al. | 2017
- 24
-
Conditional Disclosure of Secrets: Amplification, Closure, Amortization, Lower-Bounds, and SeparationsApplebaum, Benny / Arkis, Barak / Raykov, Pavel / Vasudevan, Prashant Nalini et al. | 2017
- 25
-
Conditional Disclosure of Secrets via Non-linear ReconstructionLiu, Tianren / Vaikuntanathan, Vinod / Wee, Hoeteck et al. | 2017