Proceedings of the 15th International Workshop on Adaptive and Reflective Middleware 2016
DOI: 10.1145/3008167.3008170
|View full text |Cite
|
Sign up to set email alerts
|

Bringing secure Bitcoin transactions to your smartphone

Abstract: International audienceTo preserve the Bitcoin ledger’s integrity, a node that joins the system must download a full copy of the entire Bitcoin blockchain if it wants to verify newly created blocks.At the time of writing, the blockchain weights 79 GiB and takes hours of processing on high-end machines. Owners of low-resource devices (known as thin nodes), such as smartphones, avoid that cost by either opting for minimum verification or by depending on full nodes, which weakens their security model.In this work,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(13 citation statements)
references
References 3 publications
0
13
0
Order By: Relevance
“…There are also hybrid solutions, which combine certain aspects of the previously explained patterns. Hybrid solutions, for example, help to set up a two-way pegged sidechain although one of the DLT designs does not support an appropriate verification mechanism (e.g., Simple Payment Verification (SPV) [12]). In such situations, a notary scheme replaces the ability of the particular relay to recognize and validate included transactions and let trusted notaries provide this information [1].…”
Section: Hybrid Solutionsmentioning
confidence: 99%
See 1 more Smart Citation
“…There are also hybrid solutions, which combine certain aspects of the previously explained patterns. Hybrid solutions, for example, help to set up a two-way pegged sidechain although one of the DLT designs does not support an appropriate verification mechanism (e.g., Simple Payment Verification (SPV) [12]). In such situations, a notary scheme replaces the ability of the particular relay to recognize and validate included transactions and let trusted notaries provide this information [1].…”
Section: Hybrid Solutionsmentioning
confidence: 99%
“…Rather than moving assets, cross-chain oracles, in contrast, provide information from one distributed ledger to another [5]. Thus, cross-chain oracles can be employed to verify that certain events (e.g., a transaction) occurred on another distributed ledger (e.g., SPV [12]) enabling, for example, the migration of data from one distributed ledger to another or the interaction of distributed ledger in supply chain management (SCM). In SCM, one distributed ledger for payments could request the current state of a shipment on another distributed ledger for tracking to execute conditional payments.…”
Section: Use Cases For Cross-chain Technologymentioning
confidence: 99%
“…Ease of Node Adoption. The ease of preparing a new or failed device to be added to the DLT design in the role of a validating node or a consuming terminal device [44,56,57]. Ease of Use.…”
Section: Usabilitymentioning
confidence: 99%
“…Ease of Use. The ability to easily access and work with the DLT design [57,58]. Support for Constrained Devices.…”
Section: Usabilitymentioning
confidence: 99%
“…Frey et al introduced a protocol that enables LCs to verify if some transaction exists in a blockchain by using distributed hash tables (DHTs). Their idea is to split transaction information in shards and store them in a DHT managed by FNs as well as LCs.…”
Section: Related Workmentioning
confidence: 99%