Snapshot Cherry-Picking Attack in CEX Proof of Reserves and its Mitigation

The rapid growth of the crypto asset industry has led to the adoption of proof of reserves (PoR) protocols for transparency in centralized exchanges (CEXs). By providing proofs to users that the exchange’s total reserves equal or exceed its total liabilities, PoR allows these exchanges to...

Full description

Saved in:
Bibliographic Details
Main Authors: Beomjoong Kim, Dongjun Lee, Junghee Lee, Wonjun Lee
Format: Article
Language:English
Published: IEEE 2025-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10979308/
Tags: Add Tag
No Tags, Be the first to tag this record!