Jan. 2, 2024, 4:11 a.m. | Shu-Jie Cao, Dongning Guo

cs.CR updates on arXiv.org arxiv.org

This paper delves into the fundamental trade-off between security, latency,
and throughput in proof-of-work longest-chain-wins protocols, also known as the
Nakamoto consensus. New upper and lower bounds on the probability of violating
transaction safety are derived as a function of honest and adversarial mining
rates, an upper bound on block propagation delays, and transaction confirmation
latency, both in time and in block depth. The results include a first
closed-form finite-latency bound applicable to all delays and mining rates up
to …

adversarial function latency mining proof protocols safety security trade transaction wins work

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Associate Manager, BPT Infrastructure & Ops (Security Engineer)

@ SC Johnson | PHL - Makati

Cybersecurity Analyst - Project Bound

@ NextEra Energy | Jupiter, FL, US, 33478

Lead Cyber Security Operations Center (SOC) Analyst

@ State Street | Quincy, Massachusetts

Junior Information Security Coordinator (Internship)

@ Garrison Technology | London, Waterloo, England, United Kingdom

Sr. Security Engineer

@ ScienceLogic | Reston, VA