This repository contains code and data used to generate the results presented in [1].
The paper studies the creation and consumption of dust in the Bitcoin blockchain, i.e., amounts of currency that are smaller than the fees required to spend them in a transaction.
The paper also proposes a new method that allows resource-constrained nodes to retrieve dust transactions by sending authenticated queries to full nodes. The proposed method employs a variant of the Merkle R-tree authenticated data structure discussed in [2].
- Loporchio, Matteo, et al. "An Analysis of Bitcoin Dust Through Authenticated Queries." Complex Networks and Their Applications XI: Proceedings of The Eleventh International Conference on Complex Networks and their Applications: COMPLEX NETWORKS 2022—Volume 2. Cham: Springer International Publishing, 2023.
- Yang, Yin, et al. "Authenticated indexing for outsourced spatial databases." The VLDB Journal 18 (2009): 631-648.