Sharding is a prominent technique for scaling blockchains. By dividing t...
Oracle networks feeding off-chain information to a blockchain are requir...
Modern Byzantine Fault-Tolerant State Machine Replication (BFT-SMR) solu...
We explore combining batch order-fair atomic broadcast (of-ABC) and freq...
While much research focuses on different methods to secure blockchain,
i...
Unlike suggested during their early years of existence, Bitcoin and simi...
For distributed protocols involving many servers, assuming that they do ...
Cryptographic techniques have the potential to enable distrusting partie...
There is a growing concern and awareness about the right-to-be-forgotten...
A fixed block reward and voluntary transaction fees are two sources of
e...
Over-sharing poorly-worded thoughts and personal information is prevalen...
Although blockchains aim for immutability as their core feature, several...
Permissionless blockchains protocols such as Bitcoin are inherently limi...
The Bitcoin network has offered a new way of securely performing financi...
In this work we present hbAVSS, the Honey Badger of Asynchronous Verifia...
For fear of retribution, the victim of a crime may be willing to report ...
Most people are susceptible to oversharing their personal information
pu...