Fraud and Data Availability Proofs: Detecting Invalid Blocks in Light Clients
- 23 October 2021
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC
Abstract
No abstract availableKeywords
This publication has 20 references indexed in Scilit:
- A Secure Sharding Protocol For Open BlockchainsPublished by Association for Computing Machinery (ACM) ,2016
- Efficient Sparse Merkle TreesPublished by Springer Science and Business Media LLC ,2016
- Novel Polynomial Basis and Its Application to Reed-Solomon Erasure CodesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2014
- Asymptotic Enumeration Methods for Analyzing LDPC CodesIEEE Transactions on Information Theory, 2004
- Multidimensional CodesPublished by Wiley ,2003
- Algebraic-geometric codes and multidimensional cyclic codes: a unified theory and algorithms for decoding using Grobner basesIEEE Transactions on Information Theory, 1995
- New multilevel codes over GF(q)IEEE Transactions on Information Theory, 1992
- Impossibility of distributed consensus with one faulty processJournal of the ACM, 1985
- Untraceable electronic mail, return addresses, and digital pseudonymsCommunications of the ACM, 1981
- The fast decoding of Reed-Solomon codes using Fermat theoretic transforms and continued fractionsIEEE Transactions on Information Theory, 1978