Cryptology ePrint Archive: Report 2016/716

Available versions in chronological order


Securing Bitcoin-like Backbone Protocols in the Presence of a Malicious Computational Majority
Tuyet Duong and Lei Fan and Thomas Veale and Hong-Sheng Zhou

Securing Bitcoin-like Backbone Protocols against a Malicious Majority of Computing Power
Tuyet Duong and Lei Fan and Thomas Veale and Hong-Sheng Zhou

Securing Bitcoin-like Backbone Protocols against a Malicious Majority of Computing Power
Tuyet Duong and Lei Fan and Thomas Veale and Hong-Sheng Zhou

2-hop Blockchain: Combining Proof-of-Work and Proof-of-Stake Securely
Tuyet Duong and Lei Fan and Hong-Sheng Zhou

2-hop Blockchain: Combining Proof-of-Work and Proof-of-Stake Securely
Tuyet Duong and Lei Fan and Hong-Sheng Zhou


[ Cryptology ePrint archive ]