Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
16
views
14
references
Top references
cited by
0
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,509
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Financial Cryptography and Data Security. FC 2021 International Workshops : CoDecFin, DeFi, VOTING, and WTSC, Virtual Event, March 5, 2021, Revised Selected Papers
Merkle Trees Optimized for Stateless Clients in Bitcoin
other
Author(s):
Bolton Bailey
,
Suryanarayana Sankagiri
Publication date
(Online):
September 17 2021
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
ScienceOpen Research
Most cited references
14
Record
: found
Abstract
: not found
Book Chapter
: not found
One-Way Accumulators: A Decentralized Alternative to Digital Signatures
Josh Benaloh
,
Michael de Mare
(1994)
0
comments
Cited
52
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
A dichromatic framework for balanced trees
Leo J. Guibas
,
Robert Sedgewick
(1978)
0
comments
Cited
38
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials
Jan Camenisch
,
Anna Lysyanskaya
(2002)
0
comments
Cited
31
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2021
Publication date (Online):
September 17 2021
Pages
: 451-466
DOI:
10.1007/978-3-662-63958-0_35
SO-VID:
6e6336a1-d0cb-492e-9c0a-a51c3e4b97d0
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
Risk Framework for Bitcoin Custody Operation with the Revault Protocol
pp. 21
Regulatory Considerations on Centralized Aspects of DeFi Managed by DAOs
pp. 39
Collaborative Deanonymization
pp. 47
Re: FinCEN Docket Number FINCEN-2020-0020; RIN 1506-AB47; Requirements for Certain Transactions Involving Convertible Virtual Currency or Digital Assets
pp. 54
Analyzing FinCEN’s Proposed Regulation Relating to AML and KYC Laws
pp. 65
Optimal Fees for Geometric Mean Market Makers
pp. 80
Market Based Mechanisms for Incentivising Exchange Liquidity Provision
pp. 97
Understand Volatility of Algorithmic Stablecoin: Modeling, Verification and Empirical Analysis
pp. 109
Measuring Asset Composability as a Proxy for DeFi Integration
pp. 115
Demystifying Pythia: A Survey of ChainLink Oracles Usage on Ethereum
pp. 124
On Stablecoin Price Processes and Arbitrage
pp. 136
Red-Black Coins: Dai Without Liquidations
pp. 149
Formal Analysis of Composable DeFi Protocols
pp. 162
How to Exploit a DeFi Project
pp. 171
DeFi as an Information Aggregator
pp. 177
A Game-Theoretic Analysis of Cross-ledger Swaps with Packetized Payments
pp. 191
Wendy Grows Up: More Order Fairness
pp. 197
Measuring Illicit Activity in DeFi: The Case of Ethereum
pp. 207
Global Order Routing on Exchange Networks
pp. 227
Towards a Theory of Decentralized Finance
pp. 235
Auditing Hamiltonian Elections
pp. 251
Cast-as-Intended: A Formal Definition and Case Studies
pp. 263
Mobile Voting – Still Too Risky?
pp. 279
New Standards for E-Voting Systems: Reflections on Source Code Examinations
pp. 290
Post-quantum Online Voting Scheme
pp. 306
Short Paper: Ballot Secrecy for Liquid Democracy
pp. 315
Shorter Lattice-Based Zero-Knowledge Proofs for the Correctness of a Shuffle
pp. 333
On-Chain Smart Contract Verification over Tendermint
pp. 348
Publicly Verifiable and Secrecy Preserving Periodic Auctions
pp. 364
EthVer: Formal Verification of Randomized Ethereum Smart Contracts
pp. 381
Absentia: Secure Multiparty Computation on Ethereum
pp. 397
Empirical Analysis of On-chain Voting with Smart Contracts
pp. 415
Mirroring Public Key Infrastructures to Blockchains for On-Chain Authentication
pp. 431
Reactive Key-Loss Protection in Blockchains
pp. 451
Merkle Trees Optimized for Stateless Clients in Bitcoin
pp. 467
Soft Power: Upgrading Chain Macroeconomic Policy Through Soft Forks
pp. 482
Privacy-Preserving Resource Sharing Using Permissioned Blockchains
pp. 553
SoK: Lending Pools in Decentralized Finance
pp. 579
Standardized Crypto-Loans on the Cardano Blockchain
pp. 595
Fairness in ERC Token Markets: A Case Study of CryptoKitties
pp. 611
Coins, Covid, Keynes and K-Shaped Recovery
Similar content
2,509
Dynamic Fully Homomorphic encryption-based Merkle Tree for lightweight streaming authenticated data structures
Authors:
Laiwen Wei
,
Chong-zhi Gao
,
Jian Xu
…
Merkle-Damgård Revisited: How to Construct a Hash Function
Authors:
Jean-Sébastien Coron
,
Yevgeniy Dodis
,
Cécile Malinaud
…
A Design of Efficient Multi-Authentication Scheme Using a Merkle Hash Tree in the Smart Home Environments
Authors:
Mansik Kim
,
Won-Kyu Choi
,
Moon-Seog Jun
See all similar