Search Results - "Kovalchuk, Lyudmila"
-
1
Blockchain Technologies: Probability of Double-Spend Attack on a Proof-of-Stake Consensus
Published in Sensors (Basel, Switzerland) (25-09-2021)“…Two double-spend attack strategies on a proof-of-stake consensus are considered. For each strategy, the probability of its success is obtained, which depends…”
Get full text
Journal Article -
2
Achieving Security in Proof-of-Proof Protocol with Non-Zero Synchronization Time
Published in Mathematics (Basel) (01-07-2022)“…Among the most significant problems that almost any blockchain faces are the problems of increasing its throughput (i.e., the number of transactions per unit…”
Get full text
Journal Article -
3
The Method of Choosing Parameters for Margin Trading Protocols in the Constant Product Model
Published in Mathematics (Basel) (01-10-2023)“…We introduce a new method of choosing parameters for margin trading protocols in the Constant Product Model and apply it to our new DeFi Margin Trading…”
Get full text
Journal Article -
4
Models for Generation of Proof Forest in zk-SNARK Based Sidechains
Published in Cryptography (01-03-2023)“…Sidechains are among the most promising scalability and extended functionality solutions for blockchains. Application of zero knowledge techniques (Latus,…”
Get full text
Journal Article -
5
Probability Models of Distributed Proof Generation for zk-SNARK-Based Blockchains
Published in Mathematics (Basel) (01-12-2021)“…The paper is devoted to the investigation of the distributed proof generation process, which makes use of recursive zk-SNARKs. Such distributed proof…”
Get full text
Journal Article -
6
Probability of double spend attack for network with non-zero time delay
Published in Publicationes mathematicae (Debrecen) (01-12-2022)Get full text
Journal Article -
7
Decreasing security threshold against double spend attack in networks with slow synchronization
Published in Computer communications (15-03-2020)“…We research the probability change of successful double spend attack on Proof-of-Work consensus protocol depending on network parameters in the model with…”
Get full text
Journal Article -
8
Game theory analysis of incentive distribution for prompt generation of the proof tree in zk-SNARK based sidechains
Published in 2022 IEEE International Carnahan Conference on Security Technology (ICCST) (07-09-2022)“…In sidechains with Latus consensus, a block forger generates a block using SNARK-proofs, created by decentralized provers and organized in a perfect binary…”
Get full text
Conference Proceeding -
9
Reputation-Based Incentive Model for Decentralized Analysis of Development Proposals
Published in 2023 IEEE 12th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS) (07-09-2023)“…In this paper we present a reputation-based incentive model for community-driven decentralized analysis of cryptocurrency platform development proposals…”
Get full text
Conference Proceeding -
10
Parallel Contests for Crowdsourcing Reviews: Existence and Quality of Equilibria
Published 08-02-2022“…Motivated by the intricacies of allocating treasury funds in blockchain settings, we study the problem of crowdsourcing reviews for many different proposals,…”
Get full text
Journal Article -
11
On Generation of Cycles, Chains and Graphs of Pairing-Friendly Elliptic Curves
Published in 2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T) (06-10-2020)“…We study the problem of generation of cycles, chains and graphs of pairing-friendly elliptic curves using in succinct non-interactive arguments for knowledge…”
Get full text
Conference Proceeding -
12
Decreasing Security Threshold Against Double Spend Attack in Networks with Slow Synchronization
Published in IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) (01-04-2019)“…We study probability change of double spend attack on Proof-of-Work consensus protocol depending on network parameters in the model with continuous time. We…”
Get full text
Conference Proceeding -
13
Analysis of splitting attacks on Bitcoin and GHOST consensus protocols
Published in 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS) (01-09-2017)“…We propose new mathematical models of splitting attacks targeted at two major consensus protocols applied in cryptocurrencies. Obtained upper bounds of…”
Get full text
Conference Proceeding