Snapshot Cherry-Picking Attack in CEX Proof of Reserves and its Mitigation
The rapid growth of the crypto asset industry has led to the adoption of proof of reserves (PoR) protocols for transparency in centralized exchanges (CEXs). By providing proofs to users that the exchange’s total reserves equal or exceed its total liabilities, PoR allows these exchanges to...
Saved in:
| Main Authors: | Beomjoong Kim, Dongjun Lee, Junghee Lee, Wonjun Lee |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IEEE
2025-01-01
|
| Series: | IEEE Access |
| Subjects: | |
| Online Access: | https://ieeexplore.ieee.org/document/10979308/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Proofs without words
by: Edmundas Mazėtis, et al.
Published: (2023-11-01) -
Sybil Attack-Resistant Blockchain-Based Proof-of-Location Mechanism with Privacy Protection in VANET
by: Narayan Khatri, et al.
Published: (2024-12-01) -
On understanding of proof in English and American law
by: O. V. Tiaglo
Published: (2018-11-01) -
High School Students’ Performances on Proof Comprehension Tests
by: Burcak Boz Yaman Boz Yaman, et al.
Published: (2018-05-01) -
Review of Ayatollah Javadi Amoli's Perspective
on the Proofs of God's Existence
by: حمیدرضا آیت اللهی
Published: (2017-08-01)