Brief Announcement: ZeroBlock: Timestamp-Free Prevention of Block-Withholding Attack in Bitcoin

Conference object English OPEN
Solat , Siamak; Potop-Butucaru , Maria;
(2017)
  • Publisher: Springer
  • Related identifiers: doi: 10.1007/978-3-319-69084-1_25
  • Subject: Selfish mining | Cryptocurrency | [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] | Electronic Currency | Block-withholding | [ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR] | Bitcoin | ZeroBlock
    acm: InformationSystems_DATABASEMANAGEMENT

International audience; Bitcoin was recently introduced as a peer-to-peer electronic currency in order to facilitate transactions outside the traditional financial system. The core of Bitcoin, the Blockchain, is the history of the transactions in the system maintained b... View more
  • References (42)
    42 references, page 1 of 5

    [1] Nakamoto, Satoshi. “Bitcoin: A peer-to-peer electronic cash system.” Consulted 1.2012 (2008): 28

    [2] Back, Adam. “Hashcash-a denial of service counter-measure.” (2002)

    [3] Decker, Christian, and Roger Wattenhofer. “Information propagation in the bitcoin network.” Peer-to-Peer Computing (P2P), 2013 IEEE Thirteenth International Conference on. IEEE, 2013

    [4] Eyal, Ittay, and Emin Gu¨n Sirer. “Majority is not enough: Bitcoin mining is vulnerable.” Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2014. 436-454

    [5] Garay, Juan, Aggelos Kiayias, and Nikos Leonardos. “The bitcoin backbone protocol: Analysis and applications.” Advances in CryptologyEUROCRYPT 2015. Springer Berlin Heidelberg, 2015. 281-310

    [6] Courtois, Nicolas T., and Lear Bahack. “On subversive miner strategies and block withholding attack in bitcoin digital currency.” arXiv preprint arXiv:1402.1718 (2014)

    [7] Miers, Ian, et al. “Zerocoin: Anonymous distributed e-cash from bitcoin.” Security and Privacy (SP), 2013 IEEE Symposium on. IEEE, 2013

    [8] Bonneau, Joseph, et al. “Mixcoin: Anonymity for Bitcoin with accountable mixes.” Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2014. 486-504

    [9] Eyal, Ittay. “The miner's dilemma.” Security and Privacy (SP), 2015 IEEE Symposium on. IEEE, 2015

    [10] Bastiaan, Martijn. “Preventing the 51%-Attack: a Stochastic Analysis of Two Phase Proof of Work in Bitcoin.” Availab le at http://referaat. cs. utwente. nl/conference/22/paper/7473/preventingthe-51-attack-astochastic-analysis-of-two-phase-proof-of-work-in-bitcoin. pdf. 2015

  • Metrics
    No metrics available
Share - Bookmark