2022
DOI: 10.3390/s22197524
|View full text |Cite
|
Sign up to set email alerts
|

Verifiable Delay Function and Its Blockchain-Related Application: A Survey

Abstract: The concept of verifiable delay functions has received attention from researchers since it was first proposed in 2018. The applications of verifiable delay are also widespread in blockchain research, such as: computational timestamping, public random beacons, resource-efficient blockchains, and proofs of data replication. This paper introduces the concept of verifiable delay functions and systematically summarizes the types of verifiable delay functions. Firstly, the description and characteristics of verifiab… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 66 publications
0
3
0
Order By: Relevance
“…In 2018, Boneh et al [25] first introduced the verifiable delay function (VDF) as a cryptographic primitive, and their work presented several typical structures for designing the VDF. Since then, VDF has attracted increasing attention from scholars and has been widely investigated in decentralized applications, such as resource-efficient blockchains [26,27].…”
Section: Verifiable Delay Function (Vdf)mentioning
confidence: 99%
“…In 2018, Boneh et al [25] first introduced the verifiable delay function (VDF) as a cryptographic primitive, and their work presented several typical structures for designing the VDF. Since then, VDF has attracted increasing attention from scholars and has been widely investigated in decentralized applications, such as resource-efficient blockchains [26,27].…”
Section: Verifiable Delay Function (Vdf)mentioning
confidence: 99%
“…There is an important distinction between the computation and the verification. After the result y = f (x) has been computed, it can be efficiently confirmed by any observer [44] without computing the sequential steps again.…”
Section: Cryptographymentioning
confidence: 99%
“…This makes data among the most-valuable resources in the world [3,7]. The main risks associated with privacy breaches during data transformation include data leakage, data misuse, data association, and data sharing [8][9][10]. The querying of data is the most-common operation when using data [11][12][13].…”
Section: Introductionmentioning
confidence: 99%