Here is an early draft of a paper explaining DCKR in more detail. Aside from fixing typos, cleaning up style and grammar, fixing technical off-by-one errors etc, I also hope to add a section analyzing security strengths and weaknesses of each feature. I might also add an appendix comparing this to other signature schemes that either involve hash functions or that involve a time component in their operation.
Feedback is welcome. If anyone knows of similar proposals, or even just anything close enough from a functional perspective to merit inclusion in an appendix, I'd love to hear about it.
Update: instead of linking to a specific version of the paper, here is a link to a page about DCKR which I'll update with new versions of the paper, diagram, or other material. Otherwise, all of my posts would soon just be about DCKR. Check this page periodically for the latest:
Bitcoin is the first example of a new class of technology that is so fundamental, that it has yet to be properly named. Blockchain, smart co...
(For sake of expediency, the following will be rather dense and presumes some background in both electricity markets and the Lightning Netwo...
In 1976, Nobel laureate Friedrich Hayek proposed that money should be denationalized, such that privately issued moneys would compete over t...