Security-Performance Tradeoff in DAG-based Proof-of-Work Blockchain Protocols.
Shichen WuPuwen WeiRen ZhangBowen JiangPublished in: IACR Cryptol. ePrint Arch. (2023)
Keyphrases
- security protocols
- security properties
- key agreement protocol
- communication protocols
- cryptographic protocols
- security services
- information security
- authentication protocol
- network security
- directed acyclic graph
- theorem prover
- key exchange
- key distribution
- security issues
- security requirements
- intrusion detection
- access control
- security mechanisms
- security level
- trade off
- high security
- mutual authentication
- security policies
- computational complexity
- statistical databases
- theorem proving
- key establishment
- homomorphic encryption
- secure multiparty computation