Login / Signup

Private attacks in longest chain proof-of-stake protocols with single secret leader elections.

Sarah AzouviDaniele Cappelletti
Published in: AFT (2021)
Keyphrases
  • security protocols
  • privacy preserving
  • countermeasures
  • computational complexity
  • special case
  • upper bound
  • anomaly detection
  • theorem proving