2 Hits in 1.3 sec

Scaling Distributed Ledgers and Privacy-Preserving Applications [article]

Alberto Sonnino
2021 arXiv   pre-print
This thesis also introduces a family of replay attacks against sharded distributed ledgers targeting cross-shard consensus protocols; they allow an attacker, with network access only, to double-spend resources  ...  This thesis starts by presenting the design and implementation of Chainspace, a distributed ledger that supports user defined smart contracts and execute user-supplied transactions on their objects.  ...  SybilQuorum: Open Distributed Ledgers Through Trust Networks. arXiv preprint arXiv:1906.12237, 2019. [32] Alberto Sonnino.  ... 
arXiv:2102.12273v1 fatcat:3twoaysg7rcj7h4yogwsyyzd34

Zero-Knowledge Proof-of-Identity: Sybil-Resistant, Anonymous Authentication on Permissionless Blockchains and Incentive Compatible, Strictly Dominant Cryptocurrencies [article]

David Cerezo Sánchez
2020 arXiv   pre-print
Zero-Knowledge Proof-of-Identity from trusted public certificates (e.g., national identity cards and/or ePassports; eSIM) is introduced here to permissionless blockchains in order to remove the inefficiencies  ...  The proposed solution effectively limits the number of mining nodes a single individual would be able to run while keeping membership open to everyone, circumventing the impossibility of full decentralization  ...  SPARTA[BBF + 07] provides pseudonyms through a distributed third-party-based infrastructure; however, it requires non-anonymous pre-registration.  ... 
arXiv:1905.09093v2 fatcat:djetqb5mcvh3vo4hdsenyobiuu