|
[1] A. Dorri, S. S. Kanhere, and R. Jurdak, “Towards an optimized blockchain for iot,” in 2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI). IEEE, 2017, pp. 173–178. [2] S. Nakamoto and A. Bitcoin, “A peer-to-peer electronic cash system,” Bitcoin.–URL: https://bitcoin. org/bitcoin. pdf, 2008. [3] N. Szabo, “Formalizing and securing relationships on public networks,” First Monday, vol. 2, no. 9, 1997. [4] O. Goldreich and R. Ostrovsky, “Software protection and simulation on oblivious rams,” Journal of the ACM (JACM), vol. 43, no. 3, pp. 431–473, 1996. [5] E. Stefanov, M. Van Dijk, E. Shi, C. Fletcher, L. Ren, X. Yu, and S. Devadas,“Path oram: an extremely simple oblivious ram protocol,” in Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. ACM, 2013, pp. 299–310. [6] X. Wang, H. Chan, and E. Shi, “Circuit oram: On tightness of the goldreichostrovsky lower bound,” in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM, 2015, pp. 850–861. [7] A. C. Yao, “Protocols for secure computations,” in 23rd annual symposium on foundations of computer science (sfcs 1982). IEEE, 1982, pp. 160–164. [8] W. Yu, K. Luo, Y. Ding, G. You, and K. Hu, “A parallel smart contract model,” in Proceedings of the 2018 International Conference on Machine Learning and Machine Intelligence. ACM, 2018, pp. 72–77. [9] N. S. Arora, R. D. Blumofe, and C. G. Plaxton, “Thread scheduling for multiprogrammed multiprocessors,” Theory of computing systems, vol. 34, no. 2, pp. 115–144, 2001. [10] S. Devadas, M. van Dijk, C. W. Fletcher, L. Ren, E. Shi, and D. Wichs, “Onion oram: A constant bandwidth blowup oblivious ram,” in Theory of Cryptography Conference. Springer, 2016, pp. 145–174. [11] T. Moataz, T. Mayberry, and E.-O. Blass, “Constant communication oram with small blocksize,” in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015, pp. 862–873. [12] O. Goldreich, “Towards a theory of software protection and simulation by oblivious rams,” in Proceedings of the nineteenth annual ACM symposium on Theory of computing. ACM, 1987, pp. 182–194. [13] R. Ostrovsky, “Efficient computation on oblivious rams,” in Proceedings of the twenty-second annual ACM symposium on Theory of computing. ACM, 1990, pp. 514–523. [14] M. T. Goodrich and M. Mitzenmacher, “Privacy-preserving access of outsourced data via oblivious ram simulation,” in International Colloquium on Automata, Languages, and Programming. Springer, 2011, pp. 576–587. [15] M. T. Goodrich, M. Mitzenmacher, O. Ohrimenko, and R. Tamassia, “Privacypreserving group data access via stateless oblivious ram simulation,” in Proceedings of the twenty-third annual ACM-SIAM symposium on Discrete Algorithms. SIAM, 2012, pp. 157–167. [16] E. Kushilevitz, S. Lu, and R. Ostrovsky, “On the (in) security of hash-based oblivious ram and a new balancing scheme,” in Proceedings of the twenty-third annual ACM-SIAM symposium on Discrete Algorithms. SIAM, 2012, pp. 143– 156. [17] S. Lu and R. Ostrovsky, “Distributed oblivious ram for secure two-party computation,” in Theory of Cryptography Conference. Springer, 2013, pp. 377–396. [18] E. Shi, T.-H. H. Chan, E. Stefanov, and M. Li, “Oblivious ram with o ((logn) 3) worst-case cost,” in International Conference on The Theory and Application of Cryptology and Information Security. Springer, 2011, pp. 197–214. [19] E. Foundation, “Ethereum’s white paper,” https://ethereum.org/whitepaper/,2016. [20] C. Lee, “litecoin’s white paper,” https://github.com/litecoin-project/litecoin,2011. [21] T. Limited, “Tether’s white paper,” https://tether.to/wp-content/uploads/2016/06/TetherWhitePaper.pdf, 2012. [22] A. Dubovitskaya, Z. Xu, S. Ryu, M. Schumacher, and F. Wang, “Secure and trustable electronic medical records sharing using blockchain,” in AMIA annual symposium proceedings, vol. 2017. American Medical Informatics Association, 2017, p. 650. [23] M. Holland, C. Nigischer, and J. Stjepandic, “Copyright protection in additive manufacturing with blockchain approach,” Transdisciplinary Engineering: A Paradigm Shift, vol. 5, pp. 914–921, 2017. [24] F. Tian, “An agri-food supply chain traceability system for china based on rfid & blockchain technology,” in 2016 13th international conference on service systems and service management (ICSSSM). IEEE, 2016, pp. 1–6. [25] S. Raju, S. Boddepalli, S. Gampa, Q. Yan, and J. S. Deogun, “Identity management using blockchain for cognitive cellular networks,” in 2017 IEEE International Conference on Communications (ICC). IEEE, 2017, pp. 1–6. [26] R. C. Merkle, “A digital signature based on a conventional encryption function,” in Conference on the theory and application of cryptographic techniques. Springer, 1987, pp. 369–378. [27] U. W. Chohan, “The double spending problem and cryptocurrencies,” Available at SSRN 3090174, 2017. [28] C. Dwork and M. Naor, “Pricing via processing or combatting junk mail,” in Annual International Cryptology Conference. Springer, 1992, pp. 139–147. [29] M. Jakobsson and A. Juels, “Proofs of work and bread pudding protocols,” in Secure information networks. Springer, 1999, pp. 258–272. [30] M. Castro, B. Liskov et al., “Practical byzantine fault tolerance,” in OSDI,vol. 99, no. 1999, 1999, pp. 173–186. [31] S. King and S. Nadal, “Ppcoin: Peer-to-peer crypto-currency with proof-ofstake,”self-published paper, August, vol. 19, 2012. [32] D. Larimer, “Delegated proof-of-stake (dpos),” Bitshare whitepaper, 2014. [33] V. Buterin et al., “A next-generation smart contract and decentralized application platform,” white paper, vol. 3, no. 37, 2014. [34] G. Wood et al., “Ethereum: A secure decentralised generalised transaction ledger,” Ethereum project yellow paper, vol. 151, no. 2014, pp. 1–32, 2014. [35] B. B. Daniel Larimer, “EOS.IO’s white paper,” https://github.com/EOSIO/Documentation/blob/master/TechnicalWhitePaper.md, 2017. [36] C. Cachin et al., “Architecture of the hyperledger blockchain fabric,” in Workshop on distributed cryptocurrencies and consensus ledgers, vol. 310, 2016, p. 4. [37] J. Kehrli, “Blockchain 2.0—-from bitcoin transactions to smart contract applications,” Niceideas, November. Available at: https://www. niceideas.ch/roller2/badtrash/entry/blockchain-2-0-frombitcoin (Accessed: 5 January 2018), 2016. [38] E. Stefanov, E. Shi, and D. Song, “Towards practical oblivious ram,” arXiv preprint arXiv:1106.3652, 2011.
|