Ensuring Secure and Efficient Cross-Chain Option Transfers | HackerNoon
Table of Links Abstract and Introduction Preliminaries Overview Protocol 4.1 Efficient Option Transfer Protocol 4.2 Holder Collateral-Free Cross-Chain Options Security Analysis 5.1 Option Transfer Properties 5.2 Option Properties Implementation Related Work Conclusion and Discussion, and References A. Codes B. Proofs 5 SECURITY ANALYSIS We analyze and prove the properties satisfied by our proposed protocol. Recall from the previous illustration that Alice/Carol is called the holder, and Bob/Dave is the writer, and Carol or Dave is