Zoran Skoda
blockchain security

See also computer security, cryptography and blockchain.

Security of blockchain

  • Ittay Eyal, Emin Gün Sirer, Majority is not enough: Bitcoin mining is vulnerable, in: Financial Cryptography and Data Security 436–454, Springer 2014 pdf
  • A. Sapirshtein, Y. Sompolinsky, A. Zohar, Optimal selfish mining strategies in bitcoin, arxiv/1507.06183
  • Zhu et al. Research on the security of blockchain data: A survey, arxiv/1812.02009
  • C. Natoli, V. Gramoli, The balance attack against proof-of-work blockchains: the R3 testbed as an example, arxiv/1612.09426
  • ARPA whitepaper (secure computation solution for blockchain networks) arxiv/1812.05820
  • Kudelsky blockchain security report 2016 pdf

Security of smart contracts

  • Oraclize, Encrypted queries: private data on a public blockchain, 2016 medium blog
  • Andrea Coladangelo, Smart contracts meet quantum cryptography, arxiv/1902.05214
  • A. Kosba et al. Hawk: the blockchain model of cryptography and privacy-preserving smart contracts, 2016 IEEE Symposium on Security and Privacy 839–858 doi

Security of off chain wallets

  • V. Buterin, Blockchain and Ethereum security on the higher level, youtube 1:21h

Zero knowledge proofs

Post-quantum cryptography

Postquantum cryptography and blockchain

  • K. Chalkias et al. Blockchained post-quantum signatures (and related BPQS library, Cryptology ePrint Archive 2018/65 pdf github
  • I. Stewart, D. Ilie, A. Zamyatin, S. Werner, M. F. Torshizi, W. J. Knottenbelt, Committing to quantum resistance: a slow defence for Bitcoin against a fast quantum computing attack, Royal Society Open Science, Special Collection on Blockchain Technology, doi
  • K.K.A. Thissen, Klepto for post-quantum signatures, B.S. thesis, Eindhoven University 2016 pdf and related Tanja Lang, Lattice klepto pdf

Formal methods for blockchain security

See also distributed consensus.

Cardano introduced the first Proof of Stake algorithm with formally verified security, see

  • Aggelos Kiayias et al. Ouroboros: A provably secure Proof-of-Stake blockchain protocol, IACR preprint 2016/889 pdf

  • Yoichi Hirai, Formal methods on some PoS stuff wbm

  • Henri Debrat, Stephan Merz, Verifying fault-tolerant distributed algorithms in the heard-of model, pdf (uses Isabelle/HOL)

Encrypted compilation and program execution

  • C, Fletcher et al. Compilation techniques for efficient encrypted computation, 2012 pdf

  • I. Gerhardt, T. Hanke, Homomorphic payment addresses and the pay-to-contract protocol arxiv/1212.3257

  • B. Curran, What are bulletproofs? Guide to confidential cryptocurrency transactions blockonomi

Last revised on June 7, 2019 at 11:11:10. See the history of this page for a list of all contributions to it.