This study investigates the architecture of the popular cryptocurrency platform, Bitcoin, and the underlying protocols that allow for Feather Forking attacks to occur - namely, Proof-of-Work (POW), Peer-to-Peer communication (P2P), and miner strategy. We also propose that the Blindly Signed Contracts anonymity protocol can be used as a countermeasure for such attacks while also providing greater privacy.
-
Notifications
You must be signed in to change notification settings - Fork 0
This study investigates the architecture of the popular cryptocurrency platform, Bitcoin, and the underlying protocols that allow for Feather Forking attacks to occur - namely, Proof-of-Work (POW), Peer-to-Peer communication (P2P), and miner strategy. We also propose that the Blindly Signed Contracts anonymity protocol can be used as a counterme…
Curf/bitcoin-feather-forking-countermeasure
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
About
This study investigates the architecture of the popular cryptocurrency platform, Bitcoin, and the underlying protocols that allow for Feather Forking attacks to occur - namely, Proof-of-Work (POW), Peer-to-Peer communication (P2P), and miner strategy. We also propose that the Blindly Signed Contracts anonymity protocol can be used as a counterme…
Resources
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published