2019
DOI: 10.48550/arxiv.1905.08595
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

SoK: Tools for Game Theoretic Models of Security for Cryptocurrencies

Abstract: Cryptocurrencies have garnered much attention in recent years, both from the academic community and industry. One interesting aspect of cryptocurrencies is their explicit consideration of incentives at the protocol level. Understanding how to incorporate this into the models used to design cryptocurrencies has motivated a large body of work, yet many open problems still exist and current systems rarely deal with incentive related problems well. This issue arises due to the gap between Cryptography and Distribu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 77 publications
0
7
0
Order By: Relevance
“…All the nodes in the network are rational [34], [35] 3 . Rational processes always seek to maximize their expected utility.…”
Section: System Assumptionmentioning
confidence: 99%
See 1 more Smart Citation
“…All the nodes in the network are rational [34], [35] 3 . Rational processes always seek to maximize their expected utility.…”
Section: System Assumptionmentioning
confidence: 99%
“…An attacker with budget B EX has the objective of disrupting the network by jamming the network [34] 4 . Given the budget, the attacker will be able to incentivize a certain number of nodes in the network to mount the griefing attack.…”
Section: Attacker Model and Assumptionsmentioning
confidence: 99%
“…Sections III and V. The paper features use cases of the Ethereum, Parity and Hyperledger blockchains and concludes that these systems are still far from large-scale adoption. Finally, a non-exhaustive list of related surveys with focal points ranging from smart contract execution to general blockchain applications and research perspectives includes [9], [10], [28], [39], [42], [53], [65], [80], [107], [167], [177], [186], [191].…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, ShoCard allows for the publishing of 3rd parties' certifications about user identities and their claims. 20 The Sovrin [359] identity network is an example of identity management in a public permissioned blockchain consisting of consensus nodes approved by Sovrin Foundation. Sovrin focuses on high throughput and low operational costs; however since it is a permissioned blockchain, there exists a chance that a request to join the network as a consensus node in censored.…”
Section: E Identity Managementmentioning
confidence: 99%
“…Research Focusing on a Particular Layer. Finally, there is a number of survey papers that explicitly focus on specific layers: the network layer is analyzed in [272], the RSM layer (in particular smart contacts [17], [175], [120]), protocols of the consensus layer [80], [25], [383], [228], [153], [332], incentives at the consensus layer [20], [191], and application layer from the general standpoint [88] or with a focus on the IoT domain [289], [9], [311], [144].…”
Section: Related Workmentioning
confidence: 99%