2021
DOI: 10.1007/978-3-030-78086-9_9
|View full text |Cite
|
Sign up to set email alerts
|

Tortoise and Hares Consensus: The Meshcash Framework for Incentive-Compatible, Scalable Cryptocurrencies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
17
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(23 citation statements)
references
References 17 publications
0
17
0
Order By: Relevance
“…Different aspects of incentives in Bitcoin were studied in [10,12,17,22,24,34,38,45,48] and incentive compatibility for blockchain protocols was studied in the context of a few protocols, see e.g., [6,14,53]. With respect to studying the participation in the core blockchain protocol, Kroll et al in [34] show that a certain modeling of the Bitcoin protocol is a Nash equilibrium, while Eyal and Sirer in [24] show that Bitcoin is not incentive compatible because of a type of attack called selfish mining that works for any level of computational power (for Nash equilibrium and incentive compatibility definition see related work Section 1.2).…”
Section: Introductionmentioning
confidence: 99%
“…Different aspects of incentives in Bitcoin were studied in [10,12,17,22,24,34,38,45,48] and incentive compatibility for blockchain protocols was studied in the context of a few protocols, see e.g., [6,14,53]. With respect to studying the participation in the core blockchain protocol, Kroll et al in [34] show that a certain modeling of the Bitcoin protocol is a Nash equilibrium, while Eyal and Sirer in [24] show that Bitcoin is not incentive compatible because of a type of attack called selfish mining that works for any level of computational power (for Nash equilibrium and incentive compatibility definition see related work Section 1.2).…”
Section: Introductionmentioning
confidence: 99%
“…In an attempt to increase throughput, some recent DLT's have replaced the blockchain with a DAG, a directed acyclic graph. This approach is used in IOTA [12] and other new protocols; see [13], [14], [15], [16], [17], [18], [19], [20]. DAG based protocols reach consensus on a partially ordered log of transactions, which in turn, allow the log to have "width" and increase the throughput of the system.…”
Section: Introductionmentioning
confidence: 99%
“…DAG. Since the common data-structure in any blockchain application is the ledger, several systems incorporated a directedacyclic graph to record the client transactions [3,6,37,54,55]. As a blockchain application expects a single order for all the transactions across all the replicas, so a DAG-based design allows replicas working on non-conflicting transactions to simultaneously record multiple transactions.…”
Section: Alternative Blockchain Architecturesmentioning
confidence: 99%