From Crypto-Paper to Crypto-Currency: the Cardano Consensus Layer
11
Overview
12
Distributed Computation over a Netwo
13
Consensus Layer of Cardano
14
Theory + Practice Interplay
15
Connecting theory with implementation
16
Block-Fetch, Forecasting, Denial of Service
17
What are Randomness Beacons?
18
Important Beacon Parameters
19
Constructions: Verifiable Random Functic (VRF)
20
Constructions: Threshold VRFs
21
Lock Puzzles and Verifiable Delay Functions
Description:
Explore the world of cryptocurrency in this 48-minute lecture covering a range of topics from attacking threshold wallets to the Cardano consensus layer. Dive into threshold signature schemes, the Golden Shoe setup and vulnerability, and learn about mitigating exploits. Discover the intricacies of distributed computation over networks and how theory interplays with practical implementation in blockchain technology. Examine block-fetch mechanisms, forecasting, and denial of service prevention. Investigate randomness beacons, their important parameters, and constructions like Verifiable Random Functions (VRF) and Threshold VRFs. Conclude with an introduction to lock puzzles and Verifiable Delay Functions, gaining a comprehensive understanding of cutting-edge cryptocurrency concepts and security measures.