Update on Overleaf.

This commit is contained in:
loic.miller
2023-06-19 14:45:13 +00:00
committed by node
parent fbce7cbcf9
commit 8bf25cbb80

View File

@@ -215,8 +215,6 @@ Any scheme for operating and compressing blockchains requires to design (i) a \e
%\label{fig:kiayias_diagram}
%\end{figure}
\subsection{Chain Compression Algorithm}
Kiayias et al.'s chain compression algorithm (from~\cite{10.1145/3460120.3484784}, Algorithm 1) is parameterized by a security parameter $m$ and the common prefix parameter $k$. System parameter $m$ represents the number of blocks that a party wishes to receive to feel safe. The algorithm compresses the blockchain except for the $k$ most recent blocks, called \emph{unstable} blocks. The compression works as follows: For the highest level $\ell$ that contains more than $2m$ blocks, keep all the blocks but for every level $\mu$ below $\ell$, only keep the last $2m$ blocks and all the blocks after the $m^\text{th}$ block at the $\mu+1$ level. $\Pi$ is used to represent an instance of NIPoPoW proof.