Proceedings of the 11th ACM International Systems and Storage Conference 2018
DOI: 10.1145/3211890.3211904
|View full text |Cite
|
Sign up to set email alerts
|

Teechain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 34 publications
(7 citation statements)
references
References 1 publication
0
6
0
Order By: Relevance
“…TEE provides a promising hardware-based alternative for achieving secure computation with a CPUlevel performance, and thus bridges the gap between academic research and industrial adoption of secure computation. Trusted hardware provides a powerful abstraction for building secure systems and can be applied to many potential applications, such as machine learning algorithms [81,97,98,102,106,142], cloud computing [15,33,94,122,126,141], blockchain [18,22,87,159], network traffic analysis [47], scientific computation [130], data analytics [41,75,118,164,165], and privacy-preserving COVID-19 contact tracing [73].…”
Section: Our Contributionsmentioning
confidence: 99%
“…TEE provides a promising hardware-based alternative for achieving secure computation with a CPUlevel performance, and thus bridges the gap between academic research and industrial adoption of secure computation. Trusted hardware provides a powerful abstraction for building secure systems and can be applied to many potential applications, such as machine learning algorithms [81,97,98,102,106,142], cloud computing [15,33,94,122,126,141], blockchain [18,22,87,159], network traffic analysis [47], scientific computation [130], data analytics [41,75,118,164,165], and privacy-preserving COVID-19 contact tracing [73].…”
Section: Our Contributionsmentioning
confidence: 99%
“…Lind et al [17] relax the synchrony assumption but require a trusted execution environment (TEE). Such a solution cannot be used to solve our problem as it would require trusting a third-party, often represented as the manufacturer of this TEE.…”
Section: Other Cross-chain Technologiesmentioning
confidence: 99%
“…Thereby, 12,24–26 are proposed successively. Since then, Decker et al proposed the concept of bidirectional payment channel, 27 to improve the transaction execution efficiency of PCN and keep the network in a state of dynamic balance, PCN improvement is expanded from the one‐way payment channel 28,29 to the bidirectional payment channel 1,6,25 . These PCN routing methods that exist in different payment scenarios continue to make breakthroughs in throughput, 1,21 transaction execution efficiency, 6,30,31 channel capacity balance 1,32,33 and transaction security 14,15,34,35 …”
Section: Related Workmentioning
confidence: 99%