Redactable Blockchain in the Permissionless Setting

Redactable Blockchain in the Permissionless Setting

IEEE Symposium on Security and Privacy via YouTube Direct link

Trusted Authority

9 of 24

9 of 24

Trusted Authority

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Redactable Blockchain in the Permissionless Setting

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 What data can this be
  3. 3 Why is this a problem
  4. 4 This clearly is a problem
  5. 5 Our solution
  6. 6 Dropping data
  7. 7 verifying hash links
  8. 8 adversary
  9. 9 Trusted Authority
  10. 10 Similar Solutions
  11. 11 Key Challenges
  12. 12 Our Protocol
  13. 13 Formalism
  14. 14 Properties
  15. 15 Block Header Structure
  16. 16 Request for Reduction
  17. 17 Candidate Pool
  18. 18 Miner Deliberation
  19. 19 Validation
  20. 20 Block Modification
  21. 21 Candidate Block
  22. 22 Deliberation
  23. 23 Public Verification
  24. 24 Questions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.