2018 IEEE 26th International Conference on Network Protocols (ICNP) 2018
DOI: 10.1109/icnp.2018.00016
|View full text |Cite
|
Sign up to set email alerts
|

A Fair Consensus Protocol for Transaction Ordering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(21 citation statements)
references
References 8 publications
0
21
0
Order By: Relevance
“…Miller et al [69] and Asyag et al [70] introduce encrypted Byzantine consensus protocols relying on threshold signatures [71]- [73]. In an (l, n) threshold signature scheme, a single public key is used to encrypt messages, and l out of n committee member signatures combine to decrypt the message.…”
Section: G Off-chain Commit and Revealmentioning
confidence: 99%
“…Miller et al [69] and Asyag et al [70] introduce encrypted Byzantine consensus protocols relying on threshold signatures [71]- [73]. In an (l, n) threshold signature scheme, a single public key is used to encrypt messages, and l out of n committee member signatures combine to decrypt the message.…”
Section: G Off-chain Commit and Revealmentioning
confidence: 99%
“…A few recent papers proposed solutions to enforce that transaction ordering follows a certain norm, mostly based on statistical tests of potential deviations [3,42,52]. These work were, however, mostly of theoretical nature in that they did not contain empirical evidence of deviation by miners, but rather assumed that miners might deviate.…”
Section: Related Workmentioning
confidence: 99%
“…This model of operation results in different miners potentially having distinct, typically different, views of the state of the system (e.g., set of outstanding transactions). Given these differences, are there mechanisms (say, based on statistical tests [3,42,52]) that any third-party observer could use to verify that a miner adheres to the established norm(s)?…”
Section: The Case For Chain Neutralitymentioning
confidence: 99%
See 1 more Smart Citation
“…Hence, their contents become known only after the message order has been decided. For instance, the Helix protocol [2] implements this approach and additionally exploits in-protocol randomness for two additional goals: to elect the processes running the protocol from a larger group and to determine which messages among all available ones must be included by a process when proposing a block. This method provides resistance to censorship but still permits some order-manipulation attacks.…”
Section: Related Workmentioning
confidence: 99%