Proof-of-Stake Longest Chain Protocols: Security vs Predictability.
Vivek Kumar BagariaAmir DemboSreeram KannanSewoong OhDavid TsePramod ViswanathXuechao WangOfer ZeitouniPublished in: ConsensusDay@CCS (2022)
Keyphrases
- security protocols
- security services
- key agreement protocol
- communication protocols
- cryptographic protocols
- security properties
- authentication protocol
- key establishment
- intrusion detection
- secure multiparty computation
- information security
- access control
- key exchange
- key distribution
- security mechanisms
- security threats
- network security
- statistical databases
- theorem prover
- application level
- security issues
- communication protocol
- mutual authentication
- security policies
- computer security
- key management
- security level
- upper bound
- sensor networks
- messages exchanged
- wireless sensor networks
- trusted third party
- linear logic
- security systems
- security analysis
- sensitive data
- security requirements