Table of contents
1. One observation of Blockchain Consensus
2. Conflux Algorithm: Design & Explanation
3. Safety against Double Spending Attacks
4. Robustness against live attacks
5. Challenges and Solutions on System Level
6. Evaluation of Conflux
1. One observation of Blockchain Consensus
2. Conflux Algorithm: Design & Explanation
3. Safety against Double Spending Attacks
4. Robustness against live attacks
5. Challenges and Solutions on System Level
6. Evaluation of Conflux