no code implementations • 29 Jun 2023 • Aggelos Kiayias, Philip Lazos, Jan Christoph Schlegel
Cryptocurrencies come with a variety of tokenomic policies as well as aspirations of desirable monetary characteristics that have been described by proponents as 'sound money' or even 'ultra sound money.'
no code implementations • 30 Dec 2020 • Alexandru Cojocaru, Juan Garay, Aggelos Kiayias, Fang Song, Petros Wallden
We prove that the chain of PoWs problem reduces to a problem we call multi-solution Bernoulli search, for which we establish its quantum query complexity.
Quantum Physics Cryptography and Security
no code implementations • 15 Jan 2020 • Aggelos Kiayias, Saad Quader, Alexander Russell
We improve the fundamental security threshold of eventual consensus Proof-of-Stake (PoS) blockchain protocols under the longest-chain rule by showing, for the first time, the positive effect of rounds with concurrent honest leaders.
Distributed, Parallel, and Cluster Computing Cryptography and Security Discrete Mathematics
no code implementations • 8 Jul 2016 • Aggelos Kiayias, Elias Koutsoupias, Maria Kyropoulou, Yiannis Tselekounis
In the simplest game the miners release every mined block immediately, but are strategic on which blocks to mine.
Computer Science and Game Theory Cryptography and Security