A scalable verification solution for blockchains

نویسندگان

  • Jason Teutsch
  • Christian Reitwießner
چکیده

Bitcoin and Ethereum, whose miners arguably collectively comprise the most powerful computational resource in the history of mankind, offer no more power for processing and verifying transactions than a typical smart phone. The system described herein bypasses this bottleneck and brings scalable computation to Ethereum. Our new system consists of a financial incentive layer atop a dispute resolution layer where the latter takes form of a versatile “verification game.” In addition to secure outsourced computation, immediate applications include decentralized mining pools whose operator is an Ethereum smart contract, a cryptocurrency with scalable transaction throughput, and a trustless means for transferring currency between disjoint cryptocurrency systems.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

μchain: How to Forget without Hard Forks

In this paper, we explore an idea of making (proof-of-work) blockchains mutable. We propose and implement μchain, a mutable blockchain, that enables modifications of blockchain history. Blockchains are, by common definition, distributed and immutable data structures that store a history of events, such as transactions in a digital currency system. While the very idea of mutable event history ma...

متن کامل

Dynamic configuration and collaborative scheduling in supply chains based on scalable multi-agent architecture

Due to diversified and frequently changing demands from customers, technological advances and global competition, manufacturers rely on collaboration with their business partners to share costs, risks and expertise. How to take advantage of advancement of technologies to effectively support operations and create competitive advantage is critical for manufacturers to survive. To respond to these...

متن کامل

Anonymous Identities for Permissioned Blockchains

In this paper we address the issue of retaining user anonymity within a permissioned blockchain. We present the ChainAnchor architecture that adds an identity and privacy-preserving layer above the blockchain, either the private blockchain or the public Blockchain in Bitcoin. ChainAnchor adds an anonymous identity verification step such that anyone can read and verify transactions from the bloc...

متن کامل

Scalable Hardware Verification with Symbolic Simulation

programming 8-bit pic microcontrollers in c with interactive hardware simulation PDF pro scalable net 20 application designs PDF pro scalable net 20 application designs experts voice in net PDF scalable voip mobility integration and deployment PDF vblock solution for a virtualized scalable 50000 user PDF simulation of industrial systems discrete event simulation using excelvba resource manageme...

متن کامل

Verifiable Anonymous Identities and Access Control in Permissioned Blockchains

In this paper we address the issue of identity and access control within shared permissioned blockchains. We propose the ChainAchor system that provides anonymous but verifiable identities for entities on the blockchain. ChainAchor also provides access control to entities seeking to submit transactions to the blockchain to read/verify transactions on the the permissioned blockchain. Consensus n...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017