A proposal for an Ethereum Classic treasury system
Đề xuất ngân quỹ cho Ethereum Classic
Đề xuất ngân quỹ cho Ethereum Classic
Bản thể luận cho hợp đồng thông minh
Generalized Proofs of Knowledge with Fully Dynamic Setup.
Proofs about Network Communication: For Humans and Machines.
Proportionality Guarantees in Elections with Interdependent Issues.
Securing Proof-of-Work Ledgers via Checkpointing.
Efficient Random Beacons with Adaptive Security for Ungrindable Blockchains.
Brick: Asynchronous Incentive-Compatible Payment Channels.
How to Compile Polynomial IOP into Simulation-Extractable SNARKs: A Modular Approach.
How to Prove Work: With Time or Memory (Extended Abstract).
Improved EFX Approximation Guarantees under Ordinal-based Assumptions.
GUC-Secure Commitments via Random Oracles: New Impossibility and Feasibility.
Coalition-Safe Equilibria with Virtual Payoffs.
Multi-instance Publicly Verifiable Time-lock Puzzle and its Applications.
Privacy-Preserving Blueprints.
Payment Trees: Low Collateral Payments for Payment Channel Networks.
Strategic Liquidity Provision in Uniswap v3.
Policy-Compliant Signatures.
Translation Certification for Smart Contracts.
Proof-of-Work-based Consensus in Expected-Constant Time.
Tiered Mechanisms for Blockchain Transaction Fees.
Foundations of Anonymous Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions.
The Velvet Path to Superlight Blockchain Clients.
Conclave: A Collective Stake Pool Protocol.
Blockchain Technologies: Probability of Double-Spend Attack on a Proof-of-Stake Consensus.
Differential Liquidity Provision in Uniswap v3 and Implications for Contract Design.
Multi-party Private Function Evaluation for RAM.
Reputation at Stake! A Trust Layer over Decentralized Ledger for Multiparty Computation and Reputation-Fair Lottery.
Djed: A Formally Verified Crypto-Backed Pegged Algorithmic Stablecoin.
Permissionless Clock Synchronization with Public Setup
Would Friedman burn your tokens?
Provably Secure Blockchain Protocols from Distributed Proof-of-Deep-Learning.
A Rational Protocol Treatment of 51% Attacks.
Practical Settlement Bounds for Proof-of-Work Blockchains.
Practical Settlement Bounds for Longest-Chain Consensus.
Danh sách tài liệu kỹ thuật Peer-Reviewed của nhóm IOG. Các tài liệu được trích dẫn từ nguồn thư viện tài liệu của IOHK
Another Look at Extraction and Randomization of Groth’s zk-SNARK.
Hydra: Kênh trạng thái đẳng cấu nhanh
Cải thiện từ điển được xác thực động, với các ứng dụng cho Crypto
Hai Head tốt hơn một
Kachina – Foundations of Private Smart Contracts.
Cardano Disaster Recovery Plan.
Turn-Based Communication Channels.
On the (Ir)Replaceability of Global Setups, or How (Not) to Use a Global Ledger.
Mining for Privacy: How to Bootstrap a Snarky Blockchain.
Mining in Logarithmic Space.
Impossibility on Tamper-Resilient Cryptography with Uniqueness Properties.
Incentives Against Power Grabs or How to Engineer the Revolution in a Pooled Proof of Stake System.
Filling the Tax Gap via Programmable Money.
Fait Accompli Committee Selection: Improving the Size-Security Tradeoff of Stake-Based Committees.
Algebraic Reasoning About Timeliness.
Maravedí: A Secure and Practical Protocol to Trade Risk for Instantaneous Finality.
Agile Cryptography: A Universally Composable Approach.
State Machines across Isomorphic Layer 2 Ledgers.
Minotaur: Multi-Resource Blockchain Consensus.
Mithril: Stake-based Threshold Multisignatures.
Models for Generation of Proof Forest in zk-SNARK Based Sidechains.
Probability Models of Distributed Proof Generation for zk-SNARK-Based Blockchains.
On UC-Secure Range Extension and Batch Verification for ECVRF.
Threshold Structure-Preserving Signatures.
Ofelimos: Tối ưu hóa Tổ hợp thông qua Bằng chứng Công việc Hữu ích. Một giao thức Blockchain an toàn đáng tin cậy
Giao thức Blockchain bằng chứng cổ phần an toàn có thể chứng minh
Ouroboros Chronos: Permissionless Clock Synchronization via Proof-of-Stake.
Ouroboros Leios: Mục tiêu và ý tưởng thiết kế
PEReDi: Privacy-Enhanced, Regulated and Distributed Central Bank Digital Currencies.
Decentralization Analysis of Pooling Behavior in Cardano Proof of Stake.
Efficient State Management in Distributed Ledgers.
Round-Robin Beyond Additive Agents: Existence and Fairness of Approximate Equilibria.
RPPLNS: Pay-per-last-N-shares with a Randomised Twist.
Tính ngẫu nhiên có thể mở rộng được chứng thực bởi các thực thể công khai
Viết các hợp đồng thông minh cho công nghệ sổ cái phân tán
The Generals’ Scuttlebutt: Byzantine-Resilient Gossip Protocols.
SecureCyclon: Dependable Peer Sampling.
SNACKs: Leveraging Proofs of Sequential Work for Blockchain Light Clients.
SoK: A Stratified Approach to Blockchain Decentralization.
SoK: Communication Across Distributed Ledgers.
SoK: Algorithmic Incentive Manipulation Attacks
Steel: Composable Hardware-based Stateful and Randomised Functional Encryption.
Composition with Knowledge Assumptions.
Giao thức Bitcoin Backbone với các chuỗi có độ khó thay đổi
A type- and scope-safe universe of syntaxes with binding: their semantics and proofs.
A Decentralized Information Marketplace Preserving Input and Output Privacy.
Modular Design of Secure Group Messaging Protocols and the Security of MLS.
Ordering Transactions with Bounded Unfairness: Definitions, Complexity and Constructions.
A Polynomial-Time Algorithm for 1/2-Well-Supported Nash Equilibria in Bimatrix Games.
Standardized crypto-loans on the Cardano blockchain.
Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin’s Post-Quantum Security.
Correctness of Broadcast via Multicast: Graphically and Formally.
Consistency for Functional Encryption.
Hướng tới cơ sở hạ tầng khóa công khai, phi tập trung, dựa trên hợp đồng thông minh
Pay To Win: Cheap, Crowdfundable, Cross-chain Algorithmic Incentive Manipulation Attacks on PoW Cryptocurrencies.
Blockchain Participation Games.
From Polynomial IOP and Commitments to Non-malleable zkSNARKs.
W-OTS+ up my Sleeve! A Hidden Secure Fallback for Cryptocurrency Wallets.
WOTSwana: A Generalized Sleeve Construction for Multiple Proofs of Ownership.
Probability of double spend attack for network with non-zero synchronization time.
Probability of double spend attack for network with non-zero time delay.
Endemic Oblivious Transfer via Random Oracles, Revisited.