2021
DOI: 10.48550/arxiv.2105.02927
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Securing Parallel-chain Protocols under Variable Mining Power

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

1
0
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 16 publications
1
0
0
Order By: Relevance
“…All the parameters used in our analysis are listed in Table , a miner controlling a ๐œ™ fraction of the computational resources will contribute a ๐œ™ fraction of work. This is similar to the analysis on the variable difficulty Fruitchains [38].…”
Section: Security With Ouroborossupporting
confidence: 76%
“…All the parameters used in our analysis are listed in Table , a miner controlling a ๐œ™ fraction of the computational resources will contribute a ๐œ™ fraction of work. This is similar to the analysis on the variable difficulty Fruitchains [38].…”
Section: Security With Ouroborossupporting
confidence: 76%