Papers (145)

#Title
Citations
1.Bitcoin: A Peer-to-Peer Electronic Cash System Nakamoto, Satoshi. 2008  
11846
2.Decentralizing privacy: Using blockchain to protect personal data Zyskind, Guy and Nathan, Oz and others. 2015
1435
3.Mastering Bitcoin: unlocking digital cryptocurrencies Antonopoulos, Andreas M. 2014
1424
4.Bitcoin and cryptocurrency technologies: a comprehensive introduction Narayanan, Arvind and Bonneau, Joseph and Felten, Edward and Miller, Andrew and Goldfeder, Steven. 2016
1237
5.Zerocash: Decentralized anonymous payments from bitcoin Ben-Sasson, Eli and Chiesa, Alessandro and Garman, Christina and Green, Matthew and Miers, Ian and Tromer, Eran and Virza, Madars. 2014  
1078
6.A fistful of bitcoins: characterizing payments among men with no names Meiklejohn, Sarah and Pomarole, Marjori and Jordan, Grant and Levchenko, Kirill and McCoy, Damon and Voelker, Geoffrey M and Savage, Stefan. 2013  
969
7.Information propagation in the Bitcoin network Decker, Christian and Wattenhofer, Roger. 2013  
850
8.The quest for scalable blockchain fabric: Proof-of-work vs. BFT replication Vukolić, Marko. 2015
742
9.Bitter to better - How to make bitcoin a better currency Barber, Simon and Boyen, Xavier and Shi, Elaine and Uzun, Ersin. 2012
669
10.The bitcoin lightning network: Scalable off-chain instant payments Poon, Joseph and Dryja, Thaddeus. 2016  
565
11.Evaluating user privacy in bitcoin Androulaki, Elli and Karame, Ghassan O and Roeschlin, Marc and Scherer, Tobias and Capkun, Srdjan. 2013
554
12.The economics of Bitcoin mining, or Bitcoin in the presence of adversaries Kroll, Joshua A and Davey, Ian C and Felten, Edward W. 2013
508
13.Enhancing bitcoin security and performance with strong consistency via collective signing Kogias, Eleftherios Kokoris and Jovanovic, Philipp and Gailly, Nicolas and Khoffi, Ismail and Gasser, Linus and Ford, Bryan. 2016  
439
14.A survey on security and privacy issues of bitcoin Conti, Mauro and Kumar, E Sandeep and Lal, Chhagan and Ruj, Sushmita. 2018
408
15.Deanonymisation of clients in Bitcoin P2P network Biryukov, Alex and Khovratovich, Dmitry and Pustogarov, Ivan. 2014
356
16.Analysis of Hashrate-Based Double Spending Rosenfeld, Meni. 2014
319
17.On Bitcoin and red balloons Babaioff, Moshe and Dobzinski, Shahar and Oren, Sigal and Zohar, Aviv. 2011
276
18.Is bitcoin a decentralized currency? Gervais, Arthur and Karame, Ghassan O and Capkun, Vedran and Capkun, Srdjan. 2014
273
19.Hijacking bitcoin: Routing attacks on cryptocurrencies Apostolaki, Maria and Zohar, Aviv and Vanbever, Laurent. 2017
247
20.On the instability of bitcoin without the block reward Carlsten, Miles and Kalodner, Harry and Weinberg, S Matthew and Narayanan, Arvind. 2016
213
21.Decentralization in bitcoin and ethereum networks Gencer, Adem Efe and Basu, Soumya and Eyal, Ittay and Van Renesse, Robbert and Sirer, Emin G\"un. 2018
185
22.On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency Courtois, Nicolas T and Bahack, Lear. 2013
184
23.Difficulty control for blockchain-based consensus systems Kraft, Daniel. 2016
178
24.Game-theoretic analysis of DDoS attacks against Bitcoin mining pools Johnson, Benjamin and Laszka, Aron and Grossklags, Jens and Vasek, Marie and Moore, Tyler. 2014
161
25.Empirical analysis of denial-of-service attacks in the Bitcoin ecosystem Vasek, Marie and Thornton, Micah and Moore, Tyler. 2014
161
26.TumbleBit: An untrusted Bitcoin-compatible anonymous payment hub Heilman, Ethan and Alshenibr, Leen and Baldimtsi, Foteini and Scafuro, Alessandra and Goldberg, Sharon. 2017
157
27.Have a Snack, Pay with Bitcoins Bamert, Tobias and Decker, Christian and Elsen, Lennart and Wattenhofer, Roger and Welten, Samuel. 2013
147
28.The Bitcoin Backbone Protocol with Chains of Variable Difficulty Juan A. Garay and Aggelos Kiayias and Nikos Leonardos. 2016  
133
29.Blindly signed contracts: Anonymous on-blockchain and off-blockchain bitcoin transactions Heilman, Ethan and Baldimtsi, Foteini and Goldberg, Sharon. 2016
122
30.Incentive Compatibility of Bitcoin Mining Pool Reward Functions Schrijvers, Okke and Bonneau, Joseph and Boneh, Dan and Roughgarden, Tim. 2016
120
31.On Bitcoin as a public randomness source. Bonneau, Joseph and Clark, Jeremy and Goldfeder, Steven. 2015
116
32.On power splitting games in distributed computation: The case of bitcoin pooled mining Luu, Loi and Saha, Ratul and Parameshwaran, Inian and Saxena, Prateek and Hobor, Aquinas. 2015
115
33.Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security Gennaro, Rosario and Goldfeder, Steven and Narayanan, Arvind. 2016
111
34.Concurrency and privacy with payment-channel networks Malavolta, Giulio and Moreno-Sanchez, Pedro and Kate, Aniket and Maffei, Matteo and Ravi, Srivatsan. 2017
108
35.Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft) Lear Bahack. 2013
101
36.Nonoutsourceable scratch-off puzzles to discourage bitcoin mining coalitions Miller, Andrew and Kosba, Ahmed and Katz, Jonathan and Shi, Elaine. 2015
99
37.Bitcoin as a Transaction Ledger: A Composable Treatment Christian Badertscher and Ueli Maurer and Daniel Tschudi and Vassilis Zikas. 2017
94
38.How to use bitcoin to play decentralized poker Kumaresan, Ranjit and Moran, Tal and Bentov, Iddo. 2015
93
39.Trends, tips, tolls: A longitudinal study of Bitcoin transaction fees M\"oser, Malte and B\"ohme, Rainer. 2015
90
40.Simple schnorr multi-signatures with applications to bitcoin Maxwell, Gregory and Poelstra, Andrew and Seurin, Yannick and Wuille, Pieter. 2018
77
41.When bitcoin mining pools run dry Laszka, Aron and Johnson, Benjamin and Grossklags, Jens. 2015
73
42.P2P Mixing and Unlinkable Bitcoin Transactions. Ruffing, Tim and Moreno-Sanchez, Pedro and Kate, Aniket. 2017
66
43.On the Malleability of Bitcoin Transactions Marcin Andrychowicz and Stefan Dziembowski and Daniel Malinowski and Lukasz Mazurek. 2015
63
44.Bitcoin's security model revisited Sompolinsky, Yonatan and Zohar, Aviv. 2016
62
45.Validation of decentralised smart contracts through game theory and formal methods Bigi, Giancarlo and Bracciali, Andrea and Meacci, Giovanni and Tuosto, Emilio. 2015
60
46.Flare: An approach to routing in lightning network Prihodko, Pavel and Zhigulin, Slava and Sahno, Mykola and Ostrovskiy, Aleksei and Osuntokun, Olaoluwa. 2016
59
47.How did dread pirate roberts acquire and protect his bitcoin wealth? Ron, Dorit and Shamir, Adi. 2014
58
48.Towards bitcoin payment networks McCorry, Patrick and M\"oser, Malte and Shahandasti, Siamak F and Hao, Feng. 2016
58
49.Liar, liar, coins on fire!: Penalizing equivocation by loss of bitcoins Ruffing, Tim and Kate, Aniket and Schr\"oder, Dominique. 2015
53
50.Publish or Perish: A Backward-Compatible Defense against Selfish Mining in Bitcoin Zhang, Ren and Preneel, Bart. 2017
50
51.Incentivizing blockchain forks via whale transactions Liao, Kevin and Katz, Jonathan. 2017
47
52.Bitcoin covenants M\"oser, Malte and Eyal, Ittay and Sirer, Emin G\"un. 2016
43
53.When cryptocurrencies mine their own business Teutsch, Jason and Jain, Sanjay and Saxena, Prateek. 2016
40
54.Strong federations: An interoperable blockchain solution to centralized third-party risks Dilley, Johnny and Poelstra, Andrew and Wilkins, Jonathan and Piekarska, Marta and Gorlick, Ben and Friedenbach, Mark. 2016
40
55.Increasing anonymity in bitcoin Saxena, Amitabh and Misra, Janardan and Dhar, Aritra. 2014
38
56.Securing Bitcoin wallets via a new DSA/ECDSA threshold signature scheme Goldfeder, Steven and Gennaro, Rosario and Kalodner, Harry and Bonneau, Joseph and Kroll, Joshua A and Felten, Edward W and Narayanan, Arvind. 2015
37
57.Modeling bitcoin contracts by timed automata Andrychowicz, Marcin and Dziembowski, Stefan and Malinowski, Daniel and Mazurek, \Lukasz. 2014
36
58.Smart contracts make bitcoin mining pools vulnerable Velner, Yaron and Teutsch, Jason and Luu, Loi. 2017
36
59.Revisiting Difficulty Control for Blockchain Systems Meshkov, Dmitry and Chepurnoy, Alexander and Jansen, Marc. 2017
34
60.Hierarchical deterministic Bitcoin wallets that tolerate key leakage Gutoski, Gus and Stebila, Douglas. 2015
34
61.SoK: unraveling Bitcoin smart contracts Nicola Atzei and Massimo Bartoletti and Tiziana Cimoli and Stefano Lande and Roberto Zunino. 2018
33
62.Escrow protocols for cryptocurrencies: How to buy physical goods using Bitcoin Goldfeder, Steven and Bonneau, Joseph and Gennaro, Rosario and Narayanan, Arvind.. 2017
33
63.BitML: a calculus for Bitcoin smart contracts Massimo Bartoletti and Roberto Zunino. 2018
30
64.Confidential assets Poelstra, Andrew and Back, Adam and Friedenbach, Mark and Maxwell, Gregory and Wuille, Pieter. 2018
30
65.A user-centric system for verified identities on the bitcoin blockchain Augot, Daniel and Chabanne, Herv\'e and Chenevier, Thomas and George, William and Lambert, Laurent. 2017
29
66.Anonymous alone? measuring Bitcoin’s second-generation anonymization techniques M\"oser, Malte and B\"ohme, Rainer. 2017
29
67.Refund attacks on Bitcoin’s payment protocol McCorry, Patrick and Shahandashti, Siamak F and Hao, Feng. 2016
28
68.Constant-deposit multiparty lotteries on Bitcoin Bartoletti, Massimo and Zunino, Roberto. 2017
28
69.Why buy when you can rent? bribery attacks on bitcoin consensus Bonneau, Joseph and Felten, Edward W and Goldfeder, Steven and Kroll, Joshua A and Narayanan, Arvind. 2016
26
70.eltoo: A simple layer2 protocol for bitcoin Decker, Christian and Russell, Rusty and Osuntokun, Olaoluwa. 2018
25
71.TxProbe: Discovering Bitcoin's Network Topology Using Orphan Transactions Delgado-Segura, Sergi and Bakshi, Surya and P\'erez-Sol\`a, Cristina and Litton, James and Pachulski, Andrew and Miller, Andrew and Bhattacharjee, Bobby. 2018
24
72.Enhancing Bitcoin transactions with covenants O’Connor, Russell and Piekarska, Marta. 2017
19
73.Committing to quantum resistance: A slow defence for Bitcoin against a fast quantum computing attack Stewart, Iain and Ilie, D and Zamyatin, Alexei and Werner, Sam and Torshizi, MF and Knottenbelt, William J. 2018
19
74.Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management, Wallet and Cold Storage Solutions in Presence of Poor RNG Events. Courtois, Nicolas T and Valsorda, Filippo and Emirdag, Pinar. 2014
19
75.Atomic multi-channel updates with constant collateral in bitcoin-compatible payment-channel networks Egger, Christoph and Moreno-Sanchez, Pedro and Maffei, Matteo. 2019
18
76.SABRE: Protecting Bitcoin against Routing Attacks Apostolaki, Maria and Marti, Gian and M\"uller, Jan and Vanbever, Laurent. 2018
17
77.Making bitcoin exchanges transparent Decker, Christian and Guthrie, James and Seidel, Jochen and Wattenhofer, Roger. 2015
17
78.Biased Nonce Sense: Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies Breitner, Joachim and Heninger, Nadia. 2019  
17
79.FastKitten: Practical Smart Contracts on Bitcoin Das, Poulami and Eckey, Lisa and Frassetto, Tommaso and Gens, David and Host\'akov\'a, Kristina and Jauernig, Patrick and Faust, Sebastian and Sadeghi, Ahmad-Reza. 2019
17
80.On the Necessity of a Prescribed Block Validity Consensus: Analyzing Bitcoin Unlimited Mining Protocol Ren Zhang and Bart Preneel. 2017
16
81.Analysis of Nakamoto Consensus Ling Ren. 2019
16
82.A Proof-of-Stake protocol for consensus on Bitcoin subchains Bartoletti, Massimo and Lande, Stefano and Podda, Alessandro Sebastian. 2017
14
83.Using level-1 homomorphic encryption to improve threshold dsa signatures for bitcoin wallet security Boneh, Dan and Gennaro, Rosario and Goldfeder, Steven. 2017
14
84.Mimblewimble Poelstra, Andrew. 2016  
12
85.How to Charge Lightning Br\^anzei, Simina and Segal-Halevi, Erel and Zohar, Aviv. 2017
11
86.Mixing Confidential Transactions: Comprehensive Transaction Privacy for Bitcoin. Ruffing, Tim and Moreno-Sanchez, Pedro. 2017
11
87.Verifying liquidity of Bitcoin contracts Bartoletti, Massimo and Zunino, Roberto. 2018
11
88.Fun with Bitcoin smart contracts Massimo Bartoletti and Tiziana Cimoli and Roberto Zunino. 2018
10
89.Tracing Transactions Across Cryptocurrency Ledgers Yousaf, Haaroon and Kappos, George and Meiklejohn, Sarah. 2018
9
90.A Composable Security Treatment of the Lightning Network Aggelos Kiayias and Orfeas Stefanos Thyfronitis Litos. 2019
9
91.Rootstock: Bitcoin powered smart contracts Lerner, S Demian. 2015
9
92.Partitioning Attacks on Bitcoin: Colliding Space, Time and Logic Saad, Muhammad and Cook, Victor and Nguyen, Lan and Thai, My T and Mohaisen, Aziz. 2019
9
93.How perfect offline wallets can still leak bitcoin private keys Verb\"ucheln, Stephan. 2015
8
94.Developing secure Bitcoin contracts with BitML Atzei, Nicola and Bartoletti, Massimo and Lande, Stefano and Yoshida, Nobuko and Zunino, Roberto. 2019
8
95.Hijacking Routes in Payment Channel Networks: A Predictability Tradeoff Saar Tochner and Stefan Schmid and Aviv Zohar. 2019
7
96.LockDown: Balance Availability Attack against Lightning Network Channels Cristina Pérez-Solà and Alejandro Ranchal-Pedrosa and Jordi Herrera-Joancomartí and Guillermo Navarro-Arribas and Joaquin Garcia-Alfaro. 2019
7
97.A percolation model for the emergence of the Bitcoin Lightning Network Bartolucci, Silvia and Caccioli, Fabio and Vivo, Pierpaolo. 2019
7
98.A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network Tran, Muoi and Choi, Inho and Moon, Gi Jun and Vu, Anh V and Kang, Min Suk. 2020
6
99.On the optionality and fairness of Atomic Swaps Han, Runchao and Lin, Haoyu and Yu, Jiangshan. 2019
6
100.Cerberus Channels: Incentivizing Watchtowers for Bitcoin Georgia Avarikioti and Orfeas Stefanos Thyfronitis Litos and Roger Wattenhofer. 2019
5
101.Cascading Machine Learning to Attack Bitcoin Anonymity Zola, Francesco and Eguimendia, Maria and Bruse, Jan Lukas and Urrutia, Raul Orduna. 2019
5
102.Proof-of-Burn Kostis Karantias and Aggelos Kiayias and Dionysis Zindros. 2019
4
103.Prism: Scaling Bitcoin by 10,000 x Yang, Lei and Bagaria, Vivek and Wang, Gerui and Alizadeh, Mohammad and Tse, David and Fanti, Giulia and Viswanath, Pramod. 2019
4
104.Scalable lightning factories for Bitcoin Alejandro Ranchal Pedrosa and Maria Potop-Butucaru and Sara Tucci Piergiovanni. 2019
3
105.Paralysis Proofs: Safe Access-Structure Updates for Cryptocurrencies and More Fan Zhang and Philip Daian and Iddo Bentov and Ari Juels. 2018
3
106.Lightning Factories Pedrosa, Alejandro Ranchal and Potop-Butucaru, Maria and Tucci-Piergiovanni, Sara. 2019
3
107.ShareLock: Mixing for Cryptocurrencies from Multiparty ECDSA Shlomovits, Omer and Seres, Istv\'an Andr\'as. 2019
3
108.On Profitability of Nakamoto double spend Grunspan, Cyril and P\'erez-Marco, Ricardo. 2019
3
109.The Arwen Trading Protocols (Full Version) Ethan Heilman and Sebastien Lipmann and Sharon Goldberg. 2020
3
110.Utreexo: A dynamic hash-based accumulator optimized for the Bitcoin UTXO set Dryja, Thaddeus. 2019  
3
111.Ride the lightning: The game theory of payment channels Avarikioti, Zeta and Heimbach, Lioba and Wang, Yuyi and Wattenhofer, Roger. 2020
3
112.Bandwidth-Efficient Transaction Relay for Bitcoin Naumenko, Gleb and Maxwell, Gregory and Wuille, Pieter and Fedorova, Sasha and Beschastnikh, Ivan. 2019   
2
113.The mathematics of Bitcoin Grunspan, Cyril and P\'erez-Marco, Ricardo. 2020
2
114.Generalized Bitcoin-Compatible Channels Lukas Aumayr and Oguzhan Ersoy and Andreas Erwig and Sebastian Faust and Kristina Hostakova and Matteo Maffei and Pedro Moreno-Sanchez and Siavash Riahi. 2020
2
115.TxChain: Efficient Cryptocurrency Light Clients via Contingent Transaction Aggregation Alexei Zamyatin and Zeta Avarikioti and Daniel Perez and William J. Knottenbelt. 2020
2
116.Bitcoin-Compatible Virtual Channels Lukas Aumayr and Oguzhan Ersoy and Andreas Erwig and Sebastian Faust and Kristina Hostáková and Matteo Maffei and Pedro Moreno-Sanchez and Siavash Riahi. 2020
2
117.Splitting Payments Locally While Routing Interdimensionally Lisa Eckey and Sebastian Faust and Kristina Hostáková and Stefanie Roos. 2020
2
118.A New Look at the Refund Mechanism in the Bitcoin Payment Protocol Avizheh, Sepideh and Safavi-Naini, Reihaneh and Shahandashti, Siamak F. 2018
1
119.Bitcontracts: Adding Expressive Smart Contracts to Legacy Cryptocurrencies Karl Wüst and Loris Diana and Kari Kostiainen and Ghassan Karame and Sinisa Matetic and Srdjan Capkun. 2019
1
120.The Bitcoin Backbone Protocol Against Quantum Adversaries Alexandru Cojocaru and Juan Garay and Aggelos Kiayias and Fang Song and Petros Wallden. 2019
1
121.Number of confirmation blocks for Bitcoin and GHOST consensus protocols on networks with delayed message delivery Kovalchuk, Lyudmila and Kaidalov, Dmytro and Nastenko, Andrii and Shevtsov, Oleksiy and Rodinko, Mariia and Oliynykov, Roman. 2018
1
122.Coalition-Safe Equilibria with Virtual Payoffs Kiayias, Aggelos and Stouka, Aikaterini-Panagiota. 2019
1
123.Full Analysis of Nakamoto Consensus in Bounded-Delay Networks Juan Garay and Aggelos Kiayias and Nikos Leonardos. 2020
1
124.Renegotiation and recursion in Bitcoin contracts Bartoletti, Massimo and Murgia, Maurizio and Zunino, Roberto. 2020
1
125.A Quantitative Analysis of Security, Anonymity and Scalability for the Lightning Network Sergei Tikhomirov and Pedro Moreno-Sanchez and Matteo Maffei. 2020
1
126.MoneyMorph: Censorship Resistant Rendezvous using Permissionless Cryptocurrencies Minaei, Mohsen and Moreno-Sanchez, Pedro and Kate, Aniket. 2020
1
127.Tight Consistency Bounds for Bitcoin Peter Gaži and Aggelos Kiayias and Alexander Russell. 2020
1
128.Blockchain with Varying Number of Players T-H. Hubert Chan and Naomi Ephraim and Antonio Marcedone and Andrew Morgan and Rafael Pass and Elaine Shi. 2020
1
129.Flood \& Loot: A Systemic Attack On The Lightning Network Harris, Jona and Zohar, Aviv. 2020  
1
130.Contractvm: decentralized applications on Bitcoin Bartoletti, Massimo and Gessa, Davide and Podda, Alessandro Sebastian. 2018
0
131.12 Angry Miners Eghbali, Aryaz and Wattenhofer, Roger. 2019
0
132.Characterizing Orphan Transactions in the Bitcoin Network Imtiaz, Muhammad Anas and Starobinski, David and Trachtenberg, Ari. 2019
0
133.Bitcoin Crypto–Bounties for Quantum Capable Adversaries Dragos Ioan Ilie and Kostis Karantias and William J. Knottenbelt. 2020
0
134.Committing to Quantum Resistance, Better: A Speed–and–Risk–Configurable Defence for Bitcoin against a Fast Quantum Computing Attack Dragos Ioan Ilie and William J. Knottenbelt and Iain Stewart. 2020
0
135.Bitcoin Transaction Networks: an overview of recent results Vallarano, Nicol\`o and Tessone, Claudio and Squartini, Tiziano. 2020
0
136.Custody Protocols Using Bitcoin Vaults Swambo, Jacob and Hommel, Spencer and McElrath, Bob and Bishop, Bryan. 2020
0
137.Liquid: A Bitcoin Sidechain Nick, Jonas and Poelstra, Andrew and Sanders, Gregory. 2020
0
138.Bitcoin covenants unchained Bartoletti, Massimo and Lande, Stefano and Zunino, Roberto. 2020
0
139.Leveraging Weight Functions for Optimistic Responsiveness in Blockchains Simon Holmgaard Kamp and Bernardo Magri and Christian Matt and Jesper Buus Nielsen and Søren Eller Thomsen and Daniel Tschudi. 2020
0
140.Timelocked Bribes Majid Khabbazian and Tejaswi Nadahalli and Roger Wattenhofer. 2020
0
141.An empirical study of availability and reliability properties of the Bitcoin Lightning Network Waugh, Finnegan and Holz, Ralph. 2020
0
142.Model Checking Bitcoin and other Proof-of-Work Consensus Protocols DiGiacomo-Castillo, Max and Liang, Yiyun and Pal, Advay and Mitchell, John C. 2020
0
143.A Gas-Efficient Superlight Bitcoin Client in Solidity Stelios Daveas and Kostis Karantias and Aggelos Kiayias and Dionysis Zindros. 2020  
0
144.Formalizing Nakamoto-Style Proof of Stake Søren Eller Thomsen and Bas Spitters. 2020
0
145.A Comprehensive Survey on Smart Contract Construction and Execution: Paradigms, Tools and Systems Hu, Bin and Zhang, Zongyang and Liu, Jianwei and Liu, Yizhong and Yin, Jiayuan and Lu, Rongxing and Lin, Xiaodong. 2020
0

Videos