5 code implementations • 10 Apr 2019 • Philip Daian, Steven Goldfeder, Tyler Kell, Yunqi Li, Xueyuan Zhao, Iddo Bentov, Lorenz Breidenbach, Ari Juels
We study the breadth of DEX arbitrage bots in a subset of transactions that yield quantifiable revenue to these bots.
Cryptography and Security Computer Science and Game Theory
1 code implementation • 19 Feb 2017 • Andrew Miller, Iddo Bentov, Ranjit Kumaresan, Christopher Cordi, Patrick McCorry
Our construction is also modular, making use of a generic abstraction from folklore, called the "state channel," which we are the first to formalize.
Cryptography and Security
no code implementations • 15 May 2016 • Iddo Bentov, Ariel Gabizon, David Zuckerman
We examine a protocol $\pi_{\text{beacon}}$ that outputs unpredictable and publicly verifiable randomness, meaning that the output is unknown at the time that $\pi_{\text{beacon}}$ starts, yet everyone can verify that the output is close to uniform after $\pi_{\text{beacon}}$ terminates.
Cryptography and Security