|
|
|
|
LEADER |
01000naa a22002652 4500 |
001 |
OLC2144596239 |
003 |
DE-627 |
005 |
20240118095859.0 |
007 |
cr uuu---uuuuu |
008 |
240118s2023 xx |||||o 00| ||eng c |
024 |
7 |
|
|a 10.1007/s00500-023-08753-1
|2 doi
|
035 |
|
|
|a (DE-627)OLC2144596239
|
035 |
|
|
|a (DE-He213)s00500-023-08753-1-e
|
040 |
|
|
|a DE-627
|b ger
|c DE-627
|e rakwb
|
041 |
|
|
|a eng
|
082 |
0 |
4 |
|a 004
|q VZ
|
082 |
0 |
4 |
|a 004
|q VZ
|
084 |
|
|
|a ELIB23
|q VZ
|2 rvk
|
084 |
|
|
|a ELIB45
|q VZ
|2 rvk
|
084 |
|
|
|a ELIB20
|q VZ
|2 rvk
|
084 |
|
|
|a ELIB41
|q VZ
|2 rvk
|
084 |
|
|
|a 54.72$jKünstliche Intelligenz
|2 bkl
|
084 |
|
|
|a 54.76$jComputersimulation
|2 bkl
|
084 |
|
|
|a 54.51$jProgrammiermethodik
|2 bkl
|
100 |
1 |
|
|a Zeng, Gongxian
|e verfasserin
|4 aut
|
245 |
1 |
0 |
|a Strongly nonoutsourceable scratch-off puzzles in blockchain
|
264 |
|
1 |
|c 2023
|
336 |
|
|
|a Text
|b txt
|2 rdacontent
|
337 |
|
|
|a Computermedien
|b c
|2 rdamedia
|
338 |
|
|
|a Online-Ressource
|b cr
|2 rdacarrier
|
500 |
|
|
|a © The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature 2023. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
|
520 |
|
|
|a Abstract Blockchain and its most selling point decentralization have attracted lots of attentions. However, the problem of centralized mining pools (also called outsourcing problem) is a serious threat to the fundamental security of Bitcoin and other blockchains that also use a scratch-off puzzle (Miller et al. in Proceedings of the 22nd ACM SIGSAC conference on computer and communications security, 2015). Although there are some solutions proposing “nonoutsourceable puzzles” to stop the pool operators in the centralized mining pools from outsourcing their mining work to others, we find that none of them can be adopted in real world to support strong nonoutsourceability. In other words, through some special means, e.g., legal prosecution or a tainted public reputation, the pool operator still can outsource his mining work. In this paper, we study the formal definition of strong nonoutsourceability and present constructions that support strong nonoutsourceability. The experimental results also show that our concrete construction is practical.
|
650 |
|
4 |
|a Blockchain
|
650 |
|
4 |
|a Strong nonoutsourceability
|
650 |
|
4 |
|a Scratch-off puzzle
|
650 |
|
4 |
|a Centralized mining pool
|
650 |
|
4 |
|a Outsourcing problem
|
700 |
1 |
|
|a Huang, Zhengan
|4 aut
|
700 |
1 |
|
|a Wang, Yu
|4 aut
|
700 |
1 |
|
|a Mu, Xin
|4 aut
|
700 |
1 |
|
|a Zhang, Cheng
|4 aut
|
773 |
0 |
8 |
|i Enthalten in
|t Soft computing
|d Springer Berlin Heidelberg, 1997
|g 27(2023), 17 vom: 04. Juli, Seite 11941-11960
|h Online-Ressource
|w (DE-627)270128530
|w (DE-600)1476598-6
|w (DE-576)078129389
|x 1433-7479
|7 nnns
|
773 |
1 |
8 |
|g volume:27
|g year:2023
|g number:17
|g day:04
|g month:07
|g pages:11941-11960
|
856 |
4 |
0 |
|u https://dx.doi.org/10.1007/s00500-023-08753-1
|z lizenzpflichtig
|3 Volltext
|
912 |
|
|
|a GBV_USEFLAG_A
|
912 |
|
|
|a SYSFLAG_A
|
912 |
|
|
|a GBV_OLC
|
912 |
|
|
|a GBV_ILN_11
|
912 |
|
|
|a GBV_ILN_20
|
912 |
|
|
|a GBV_ILN_22
|
912 |
|
|
|a GBV_ILN_23
|
912 |
|
|
|a GBV_ILN_24
|
912 |
|
|
|a GBV_ILN_31
|
912 |
|
|
|a GBV_ILN_32
|
912 |
|
|
|a GBV_ILN_39
|
912 |
|
|
|a GBV_ILN_40
|
912 |
|
|
|a GBV_ILN_60
|
912 |
|
|
|a GBV_ILN_62
|
912 |
|
|
|a GBV_ILN_63
|
912 |
|
|
|a GBV_ILN_69
|
912 |
|
|
|a GBV_ILN_70
|
912 |
|
|
|a GBV_ILN_73
|
912 |
|
|
|a GBV_ILN_74
|
912 |
|
|
|a GBV_ILN_90
|
912 |
|
|
|a GBV_ILN_95
|
912 |
|
|
|a GBV_ILN_100
|
912 |
|
|
|a GBV_ILN_101
|
912 |
|
|
|a GBV_ILN_105
|
912 |
|
|
|a GBV_ILN_110
|
912 |
|
|
|a GBV_ILN_120
|
912 |
|
|
|a GBV_ILN_138
|
912 |
|
|
|a GBV_ILN_150
|
912 |
|
|
|a GBV_ILN_151
|
912 |
|
|
|a GBV_ILN_152
|
912 |
|
|
|a GBV_ILN_161
|
912 |
|
|
|a GBV_ILN_170
|
912 |
|
|
|a GBV_ILN_171
|
912 |
|
|
|a GBV_ILN_187
|
912 |
|
|
|a GBV_ILN_213
|
912 |
|
|
|a GBV_ILN_224
|
912 |
|
|
|a GBV_ILN_230
|
912 |
|
|
|a GBV_ILN_250
|
912 |
|
|
|a GBV_ILN_267
|
912 |
|
|
|a GBV_ILN_281
|
912 |
|
|
|a GBV_ILN_285
|
912 |
|
|
|a GBV_ILN_293
|
912 |
|
|
|a GBV_ILN_370
|
912 |
|
|
|a GBV_ILN_602
|
912 |
|
|
|a GBV_ILN_636
|
912 |
|
|
|a GBV_ILN_702
|
912 |
|
|
|a GBV_ILN_2001
|
912 |
|
|
|a GBV_ILN_2003
|
912 |
|
|
|a GBV_ILN_2004
|
912 |
|
|
|a GBV_ILN_2005
|
912 |
|
|
|a GBV_ILN_2006
|
912 |
|
|
|a GBV_ILN_2007
|
912 |
|
|
|a GBV_ILN_2008
|
912 |
|
|
|a GBV_ILN_2009
|
912 |
|
|
|a GBV_ILN_2010
|
912 |
|
|
|a GBV_ILN_2011
|
912 |
|
|
|a GBV_ILN_2014
|
912 |
|
|
|a GBV_ILN_2015
|
912 |
|
|
|a GBV_ILN_2020
|
912 |
|
|
|a GBV_ILN_2021
|
912 |
|
|
|a GBV_ILN_2025
|
912 |
|
|
|a GBV_ILN_2026
|
912 |
|
|
|a GBV_ILN_2027
|
912 |
|
|
|a GBV_ILN_2031
|
912 |
|
|
|a GBV_ILN_2034
|
912 |
|
|
|a GBV_ILN_2037
|
912 |
|
|
|a GBV_ILN_2038
|
912 |
|
|
|a GBV_ILN_2039
|
912 |
|
|
|a GBV_ILN_2044
|
912 |
|
|
|a GBV_ILN_2048
|
912 |
|
|
|a GBV_ILN_2049
|
912 |
|
|
|a GBV_ILN_2055
|
912 |
|
|
|a GBV_ILN_2057
|
912 |
|
|
|a GBV_ILN_2059
|
912 |
|
|
|a GBV_ILN_2061
|
912 |
|
|
|a GBV_ILN_2064
|
912 |
|
|
|a GBV_ILN_2065
|
912 |
|
|
|a GBV_ILN_2068
|
912 |
|
|
|a GBV_ILN_2088
|
912 |
|
|
|a GBV_ILN_2093
|
912 |
|
|
|a GBV_ILN_2106
|
912 |
|
|
|a GBV_ILN_2107
|
912 |
|
|
|a GBV_ILN_2108
|
912 |
|
|
|a GBV_ILN_2110
|
912 |
|
|
|a GBV_ILN_2111
|
912 |
|
|
|a GBV_ILN_2112
|
912 |
|
|
|a GBV_ILN_2113
|
912 |
|
|
|a GBV_ILN_2118
|
912 |
|
|
|a GBV_ILN_2129
|
912 |
|
|
|a GBV_ILN_2143
|
912 |
|
|
|a GBV_ILN_2144
|
912 |
|
|
|a GBV_ILN_2147
|
912 |
|
|
|a GBV_ILN_2148
|
912 |
|
|
|a GBV_ILN_2152
|
912 |
|
|
|a GBV_ILN_2153
|
912 |
|
|
|a GBV_ILN_2188
|
912 |
|
|
|a GBV_ILN_2190
|
912 |
|
|
|a GBV_ILN_2232
|
912 |
|
|
|a GBV_ILN_2336
|
912 |
|
|
|a GBV_ILN_2433
|
912 |
|
|
|a GBV_ILN_2446
|
912 |
|
|
|a GBV_ILN_2470
|
912 |
|
|
|a GBV_ILN_2474
|
912 |
|
|
|a GBV_ILN_2507
|
912 |
|
|
|a GBV_ILN_2522
|
912 |
|
|
|a GBV_ILN_2548
|
912 |
|
|
|a GBV_ILN_4035
|
912 |
|
|
|a GBV_ILN_4037
|
912 |
|
|
|a GBV_ILN_4046
|
912 |
|
|
|a GBV_ILN_4112
|
912 |
|
|
|a GBV_ILN_4125
|
912 |
|
|
|a GBV_ILN_4126
|
912 |
|
|
|a GBV_ILN_4242
|
912 |
|
|
|a GBV_ILN_4246
|
912 |
|
|
|a GBV_ILN_4249
|
912 |
|
|
|a GBV_ILN_4251
|
912 |
|
|
|a GBV_ILN_4305
|
912 |
|
|
|a GBV_ILN_4306
|
912 |
|
|
|a GBV_ILN_4307
|
912 |
|
|
|a GBV_ILN_4313
|
912 |
|
|
|a GBV_ILN_4322
|
912 |
|
|
|a GBV_ILN_4323
|
912 |
|
|
|a GBV_ILN_4324
|
912 |
|
|
|a GBV_ILN_4325
|
912 |
|
|
|a GBV_ILN_4326
|
912 |
|
|
|a GBV_ILN_4328
|
912 |
|
|
|a GBV_ILN_4333
|
912 |
|
|
|a GBV_ILN_4334
|
912 |
|
|
|a GBV_ILN_4335
|
912 |
|
|
|a GBV_ILN_4336
|
912 |
|
|
|a GBV_ILN_4338
|
912 |
|
|
|a GBV_ILN_4393
|
912 |
|
|
|a GBV_ILN_4700
|
936 |
r |
v |
|a ELIB23
|
936 |
r |
v |
|a ELIB45
|
936 |
r |
v |
|a ELIB20
|
936 |
r |
v |
|a ELIB41
|
936 |
b |
k |
|a 54.72$jKünstliche Intelligenz
|q VZ
|0 10641240X
|0 (DE-625)10641240X
|
936 |
b |
k |
|a 54.76$jComputersimulation
|q VZ
|0 106423339
|0 (DE-625)106423339
|
936 |
b |
k |
|a 54.51$jProgrammiermethodik
|q VZ
|0 106418122
|0 (DE-625)106418122
|
951 |
|
|
|a AR
|
952 |
|
|
|d 27
|j 2023
|e 17
|b 04
|c 07
|h 11941-11960
|