- Mar 2021
-
blog.ethereum.org blog.ethereum.org
-
you are sent only the numbers (t(s)h(s) k) and (w(s)v(s) k)
Who is sending to whom? What does it prove if you are sent two identical numbers? Poor explanation :-(
-
a secret evaluation point s
only one?
-
permutes
How is that permuting? Permutation means changing the ordering.
-
t(s)h(s) = w(s)v(s)
Seems to imply calculation of E(t(s))E(h(s)) etc. using homomorphic properties, but fails to explain that, or even what the homomorphic properties allow.
-
- Dec 2020
-
ieeexplore.ieee.org ieeexplore.ieee.org-18
-
can be forced to broadcast the generated block
Doesn't prevent DoS attacks of the network layer. How do you distinguish between "not finished yet" and network outage?
-
In this scenario, SGX can be used to protect the security of the leader nodes.
How?
-
Moreover, as obtaining 51% of the stake in PoS is much easier than obtaining 51% of the computing power in PoW
Ethereum 2.0 people would probably strongly disagree with this. Collusion of mining pools is easy to imagine; obtaining 51% of ETH market cap is not!
-
old
Old (e.g. slow or insecure) or cheap? Probably the latter.
-
the TC enclave will contact the data source via HTTPS to obtain the requested data
You just said "the enclave lacks direct network access"?! The paper shows it going through the relay (Figure 1). Guess that's what the 2nd half of the sentence means.
-
Town Crier (TC)
- 2016 paper claimed would be open source
- since acquired by Chainlink
- Old home page, broken links
-
Ekiden
Now Oasis Network
-
ShadowEth
2017 paper revised March 2018. Can't find any public code.
-
Hawk
Website. Not updated since 2015?
-
Considering the nothing at stake attack
-
The node that first completes the waiting process will obtain the right to create the new block and receive the reward
Why is waiting needed? Why didn't they skip straight to PoLK below to take the lowest number?
-
nodes need to generate a random number in each round
Each node generates a random number for itself? or for another node?
-
To relieve this problem, PoUW designs a statistical analysis scheme to test whether the mining time of the submitted blocks is different from the expected value.
What is the "mining time"? How is the expected value obtained? Why can't this be spoofed?
-
A. Sharding
Is there supposed to be a section IV. B.?
-
trusted time
Doesn't require internet so presumably relative time only
-
tempered
tampered with?
-
but it still faces several vulnerabilities, e.g., nothing at stake attack, long-range attack
The cited paper lists mitigations and references older Ethereum papers, but is from 2018 so unclear whether recent Ethereum 2.0 research mitigates further.
-
the enclave
enclaves?
-