Subject: Computer Science - Cryptography and Security
Current cryptocurrencies, starting with Bitcoin, build a decentralized blockchain-based transaction ledger, maintained through proofs-of-work that also serve to generate a monetary supply. Such decentralization has benefits, such as independence from national political... View more
 M. Babaioff, S. Dobzinski, S. Oren, and A. Zohar, “On Bitcoin and red balloons,” SIGecom Exchanges, vol. 10, no. 3, pp. 56-73, 2011.
 Bank of England, Private communication, 2015.
 --, “One bank research agenda,” 2015, www.bankofengland.co.uk/research/Documents/onebank/ discussion.pdf.
 E. Ben-Sasson, A. Chiesa, C. Garman, M. Green, I. Miers, E. Tromer, and M. Virza, “Zerocash: Decentralized anonymous payments from bitcoin,” in 2014 IEEE Symposium on Security and Privacy, SP 2014, Berkeley, CA, USA, May 18-21, 2014. IEEE Computer Society, 2014, pp. 459-474.
 B. Bernanke, Nov. 2013, qz.com/148399/ben-bernankebitcoin-may-hold-long-term-promise/.
 J. Bonneau, A. Miller, J. Clark, A. Narayanan, J. A. Kroll, and E. W. Felten, “Research perspectives and challenges for Bitcoin and cryptocurrencies,” in Proceedings of the IEEE Symposium on Security and Privacy, 2015.
 G. Danezis, C. Fournet, M. Kohlweiss, and B. Parno, “Pinocchio coin: building zerocoin from a succinct pairing-based proof system,” in PETShop'13, Proceedings of the 2013 ACM Workshop on Language Support for Privacy-Enhancing Technologies, Co-located with CCS 2013, November 4, 2013, Berlin, Germany, M. Franz, A. Holzer, R. Majumdar, B. Parno, and H. Veith, Eds. ACM, 2013, pp. 27-30.
 European Central Bank, “Virtual currency schemes - a further analysis,” Feb. 2015, www.ecb.europa.eu/pub/pdf/ other/virtualcurrencyschemesen.pdf.
 I. Eyal and E. G. Sirer, “Majority is not enough: Bitcoin mining is vulnerable,” in Proceedings of Financial Cryptography 2014, 2014.
 J. Garay, A. Kiayias, and N. Leonardos, “The Bitcoin backbone protocol: Analysis and applications,” in Proceedings of Eurocrypt 2015, 2015.