Pikachu: Securing PoS Blockchains from Long-Range Attacks by Checkpointing into Bitcoin PoW using Taproot.
Sarah AzouviMarko VukolicPublished in: CoRR (2022)
Keyphrases
- long range
- short range
- distributed databases
- main memory databases
- long range correlations
- credit card
- conditional random fields
- part of speech
- distributed systems
- n gram
- watermarking scheme
- long range interactions
- fractional brownian motion
- information security
- security protocols
- data mining
- rna structures
- trusted third party
- security mechanisms
- single image
- probabilistic model