Update on Overleaf.
This commit is contained in:
14
ccs-body.tex
14
ccs-body.tex
@@ -27,9 +27,11 @@ In this work, we address this important issue and present XX (un petit nom ??),
|
|||||||
We prove that the properties needed to maintain security of the protocol still hold in a dynamic context.
|
We prove that the properties needed to maintain security of the protocol still hold in a dynamic context.
|
||||||
Our contributions are as follows:
|
Our contributions are as follows:
|
||||||
\begin{itemize}
|
\begin{itemize}
|
||||||
\item Study of the Mining in Logarithmic Space protocol in the variable difficulty setting.
|
\item We propose XX, a NIPoPoW protocol that handles a variable PoW difficulty for blocks while operating in $O(\polylog(n))$ storage complexity and $O(\polylog(n))$ communication complexity;
|
||||||
\item Modification of the protocol to account for said dynamicity.
|
\item We present experimental results illustrating the compression of Bitcoin.
|
||||||
\item Proof of properties in the dynamic context.
|
% \item Study of the Mining in Logarithmic Space protocol in the variable difficulty setting.
|
||||||
|
%\item Modification of the protocol to account for said dynamicity.
|
||||||
|
% \item Proof of properties in the dynamic context.
|
||||||
\end{itemize}
|
\end{itemize}
|
||||||
|
|
||||||
|
|
||||||
@@ -231,7 +233,7 @@ Any scheme for operating and compressing blockchains requires to design (i) a \e
|
|||||||
|
|
||||||
\subsubsection{Chain Compression Algorithm}
|
\subsubsection{Chain Compression Algorithm}
|
||||||
|
|
||||||
The Kiayias et al.'s chain compression algorithm (from~\cite{10.1145/3460120.3484784}, Algorithm 1) is parameterized by a security parameter $m$ and the common prefix parameter $k$. System parameter $m$ represents the number of blocks that a party wishes to receive to feel safe. The algorithm compresses the blockchain except for the $k$ most recent blocks, called \emph{unstable} blocks. The compression works as follows: for the highest level $\ell$ that contains more than $2m$ blocks, keep all the blocks but for every level $\mu$ below $\ell$, only keep the last $2m$ blocks and all the blocks after the $m^\text{th}$ block at the $\mu+1$ level. $\Pi$ is used to represent an instance of NIPoPoW proof. %\sg{what is $\mu$ here?} %\ea{We should introduce the $\Pi$ notation here}
|
The Kiayias et al.'s chain compression algorithm (from~\cite{10.1145/3460120.3484784}, Algorithm~\cite{alg:chaincompression}) is parameterized by a security parameter $m$ and the common prefix parameter $k$. System parameter $m$ represents the number of blocks that a party wishes to receive to feel safe. The algorithm compresses the blockchain except for the $k$ most recent blocks, called \emph{unstable} blocks. The compression works as follows: for the highest level $\ell$ that contains more than $2m$ blocks, keep all the blocks but for every level $\mu$ below $\ell$, only keep the last $2m$ blocks and all the blocks after the $m^\text{th}$ block at the $\mu+1$ level. $\Pi$ is used to represent an instance of NIPoPoW proof. %\sg{what is $\mu$ here?} %\ea{We should introduce the $\Pi$ notation here}
|
||||||
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||||||
\subsubsection{Compressed Chain Comparison Algorithm}
|
\subsubsection{Compressed Chain Comparison Algorithm}
|
||||||
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||||||
@@ -423,7 +425,7 @@ Given a chain $\mathcal{C}$ we want to compress, we set aside the most recent an
|
|||||||
The remaining $\mathcal{C}[:-k]$ constitutes our stable part of the chain.
|
The remaining $\mathcal{C}[:-k]$ constitutes our stable part of the chain.
|
||||||
|
|
||||||
\begin{algorithm}
|
\begin{algorithm}
|
||||||
\caption{Chain compression algorithm.}\label{alg:compression}
|
\caption{\label{alg:chaincompression}Chain compression algorithm.}
|
||||||
\begin{algorithmic}
|
\begin{algorithmic}
|
||||||
\Function{Dissolve$_{m,k}$}{$\mathcal{C}$}
|
\Function{Dissolve$_{m,k}$}{$\mathcal{C}$}
|
||||||
\State $\mathcal{C}^* \gets \mathcal{C}[:-k]$
|
\State $\mathcal{C}^* \gets \mathcal{C}[:-k]$
|
||||||
@@ -450,7 +452,7 @@ The remaining $\mathcal{C}[:-k]$ constitutes our stable part of the chain.
|
|||||||
\end{algorithm}
|
\end{algorithm}
|
||||||
|
|
||||||
\begin{algorithm}
|
\begin{algorithm}
|
||||||
\caption{State comparison algorithm.}\label{alg:comparison}
|
\caption{\label{alg:statecomparison}State comparison algorithm.}
|
||||||
\begin{algorithmic}
|
\begin{algorithmic}
|
||||||
\Function{maxvalid$_{m,k}$}{$\Pi, \Pi'$}
|
\Function{maxvalid$_{m,k}$}{$\Pi, \Pi'$}
|
||||||
\If{$\Pi$ is not valid}
|
\If{$\Pi$ is not valid}
|
||||||
|
|||||||
@@ -44,6 +44,9 @@
|
|||||||
\hidecommentfalse % comment to hide comments
|
\hidecommentfalse % comment to hide comments
|
||||||
\newcommand\LM[1]{\ifhidecomment{}\else{\textcolor{blue}{LM: #1}}\fi}
|
\newcommand\LM[1]{\ifhidecomment{}\else{\textcolor{blue}{LM: #1}}\fi}
|
||||||
|
|
||||||
|
\usepackage{ stmaryrd }
|
||||||
|
\newtheorem{theorem}{Theorem}
|
||||||
|
\newtheorem{definition}{Definition}
|
||||||
|
|
||||||
%\fancyhf{} % Remove fancy page headers
|
%\fancyhf{} % Remove fancy page headers
|
||||||
%\fancyhead[C]{Anonymous submission \#9999 to ACM CCS 2023} % TODO: replace 9999 with your paper number
|
%\fancyhead[C]{Anonymous submission \#9999 to ACM CCS 2023} % TODO: replace 9999 with your paper number
|
||||||
@@ -59,6 +62,8 @@
|
|||||||
|
|
||||||
\begin{document}
|
\begin{document}
|
||||||
\title{Mining in Logarithmic Space with Variable Difficulty} % TODO: replace with your title
|
\title{Mining in Logarithmic Space with Variable Difficulty} % TODO: replace with your title
|
||||||
|
\author{}
|
||||||
|
\maketitle
|
||||||
|
|
||||||
\begin{abstract}
|
\begin{abstract}
|
||||||
This paper addresses the lack of scalability in current blockchain technology and its hindrance to widespread adoption.
|
This paper addresses the lack of scalability in current blockchain technology and its hindrance to widespread adoption.
|
||||||
@@ -91,7 +96,6 @@
|
|||||||
|
|
||||||
% \keywords{blockchains; proof-of-work; logspace mining; superlight clients; NIPoPoWs; superblocks; variable difficulty} % TODO: replace with your keywords
|
% \keywords{blockchains; proof-of-work; logspace mining; superlight clients; NIPoPoWs; superblocks; variable difficulty} % TODO: replace with your keywords
|
||||||
|
|
||||||
\maketitle
|
|
||||||
|
|
||||||
\input{ccs-body} % TODO: replace with your brilliant paper!
|
\input{ccs-body} % TODO: replace with your brilliant paper!
|
||||||
|
|
||||||
|
|||||||
Reference in New Issue
Block a user