You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: OPEN_PROBLEMS/DECENTRALIZED_DATA_DELIVERY_MARKETS.md
+14-14Lines changed: 14 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -150,9 +150,9 @@ These type of solutions have been found/highlighted:
150
150
Solutions of this type enable the client and the provider to verify the actual service before unlocking the payment. One of the main tools used is locking the access to the service by encrypting it with a key and then performing an exchange of the key that gives access to the service.
151
151
152
152
These solutions can be found in several forms:
153
-
-[Solving the Buyer and Seller’s Dilemma: A Dual-Deposit Escrow Smart Contract for Provably Cheat-Proof Delivery and Payment for a Digital Good without a Trusted Mediator](INSERT URL)
154
-
-[FairSwap: How to fairly exchange digital goods](INSERT URL)
155
-
-[Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services](INSERT URL)
153
+
-[Solving the Buyer and Seller’s Dilemma: A Dual-Deposit Escrow Smart Contract for Provably Cheat-Proof Delivery and Payment for a Digital Good without a Trusted Mediator](http://anrg.usc.edu/www/papers/Dual_Deposit_ICBC_2019.pdf)
154
+
-[FairSwap: How to fairly exchange digital goods](https://eprint.iacr.org/2018/740.pdf)
155
+
-[Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services](https://acmccs.github.io/papers/p229-campanelliA.pdf)
156
156
157
157
**Known shortcomings of these approaches:**
158
158
* Vulnerable to griefing attacks.
@@ -163,9 +163,9 @@ These solutions can be found in several forms:
163
163
164
164
These solutions build on top of the Fair Exchange ones and adopt an Optimistic approach where some sort of Reputation or Stake is used to give both parties trust that the exchange will occur correctly. If one misbehaves, they can still rely on a dispute system.
165
165
166
-
-[OptiSwap: Fast Optimistic Fair Exchange](INSERT URL)
167
-
-[Asynchronous Protocols for Optimistic Fair Exchange](INSERT URL)
168
-
-[Optimistic Fair Exchange with Multiple Arbiters](INSERT URL)
166
+
-[OptiSwap: Fast Optimistic Fair Exchange](https://dl.acm.org/doi/10.1145/3320269.3384749)
167
+
-[Asynchronous Protocols for Optimistic Fair Exchange](https://ieeexplore.ieee.org/abstract/document/674826?casa_token=K7FXNFUKD7AAAAAA:cAcsxIQvxTqvUpRZ73PYBtG2lGtyrA0qMAEuBa46q4Zas4d3aD7yATmZhxYrhem0RxKGwlqn4g)
168
+
-[Optimistic Fair Exchange with Multiple Arbiters](https://eprint.iacr.org/2009/069.pdf)
169
169
170
170
**Known shortcomings of these approaches:**
171
171
* Setup + Dispute resolution is non-trivial and takes significant time
@@ -174,9 +174,9 @@ These solutions build on top of the Fair Exchange ones and adopt an Optimistic a
174
174
175
175
Reputation-based solutions give the possibility to speed up the transfer and improve the quality of the service by leveraging the trust built over time between clients & providers.
176
176
177
-
-[Proof of Delivery in a Trustless Network](INSERT URL)
178
-
-[Proof-of-Prestige: A Useful Work Reward System for Unverifiable Tasks](INSERT URL)
179
-
-[Mechanisms for Outsourcing Computation via a Decentralized Market](INSERT URL)
177
+
-[Proof of Delivery in a Trustless Network](https://ieeexplore.ieee.org/document/8751417)
178
+
-[Proof-of-Prestige: A Useful Work Reward System for Unverifiable Tasks](https://www.ee.ucl.ac.uk/~ipsaras/files/Proof_of_Prestige-icbc19.pdf)
179
+
-[Mechanisms for Outsourcing Computation via a Decentralized Market](https://scopelab.ai/files/eisele2020mechanisms.pdf)
180
180
- Other Gradual Fair Exchange Class of constructions
181
181
182
182
**Known shortcomings of these approaches:**
@@ -186,17 +186,17 @@ Reputation-based solutions give the possibility to speed up the transfer and imp
186
186
187
187
There are multiple solutions with the goal of delivering reader privacy and writer privacy. These incur an additional cost in setup and/or latency. Disclaimer: At the time of writing, we haven't dived deep into this set of solutions.
188
188
189
-
-[Blockchain based Privacy-Preserving Software Updates with Proof-of-Delivery for Internet of Things](INSERT URL)
190
-
-[SilentDelivery: Practical Timed-delivery of Private Information using Smart Contracts](INSERT URL)
191
-
-[Bulletproofs+: Shorter Proofs for Privacy-Enhanced Distributed Ledger](INSERT URL)
189
+
-[Blockchain based Privacy-Preserving Software Updates with Proof-of-Delivery for Internet of Things](https://www.sciencedirect.com/science/article/abs/pii/S074373151930098X)
190
+
-[SilentDelivery: Practical Timed-delivery of Private Information using Smart Contracts](https://arxiv.org/abs/1912.07824)
191
+
-[Bulletproofs+: Shorter Proofs for Privacy-Enhanced Distributed Ledger](https://eprint.iacr.org/2020/735.pdf)
192
192
193
193
#### Traditional approaches (close to Web 2.0 world)
194
194
195
195
196
196
These approaches suggest novel ways to add integrity checks to data transferred or to promote new ways for content distribution, but they don’t depart from the Web 2.0 world of assumptions such as trusted third parties and central points of control.
197
197
198
-
-[The multimedia blockchain: a distributed and tamper-proof media transaction framework](INSERT URL)
199
-
-[Reliable Client Accounting for P2P-Infrastructure Hybrids](INSERT URL)
198
+
-[The multimedia blockchain: a distributed and tamper-proof media transaction framework](http://www.cs.stir.ac.uk/~dbh/downloads/Multimedia-Blockchain-DSP17.pdf)
199
+
-[Reliable Client Accounting for P2P-Infrastructure Hybrids](https://www.cis.upenn.edu/~ahae/papers/accounting-nsdi2012.pdf)
200
200
201
201
**Known shortcomings of these approaches:**
202
202
* Not fully aware of the challenges of building a decentralized network
0 commit comments