Advertisement

Cryptocurrencies Without Proof of Work

  • Iddo Bentov
  • Ariel Gabizon
  • Alex Mizrahi
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9604)

Abstract

We study decentralized cryptocurrency protocols in which the participants do not deplete physical scarce resources. Such protocols commonly rely on Proof of Stake, i.e., on mechanisms that extend voting power to the stakeholders of the system. We offer analysis of existing protocols that have a substantial amount of popularity. We then present our novel pure Proof of Stake protocols, and argue that they help in mitigating problems that the existing protocols exhibit.

Keywords

Money Supply Previous Block Honest Node Current Timestamp Payment Transaction 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Bahack, L., Courtois, N.: (2014). http://arxiv.org/abs/1402.1718
  2. 2.
    Ben-Or, M., Linial, N.: Collective coin flipping. In: Micali, S. (ed.) Randomness and Computation, pp. 91–115. Academic Press, New York (1990)Google Scholar
  3. 3.
    Bentov, I., Lee, C., Mizrahi, A., Rosenfeld, M.: Proof of activity. In: ACM SIGMETRICS Workshop - NetEcon (2014). http://eprint.iacr.org/2014/452
  4. 4.
    Boldyreva, A.: Efficient threshold signature, multisignature and blind signature schemes based on the gap-Diffie-Hellman-group signature scheme. In: PKC2003 (2003)Google Scholar
  5. 5.
    Eyal, I.: The miner’s dilemma. In: 36th IEEE S&P (2015)Google Scholar
  6. 6.
    Eyal, I., Sirer, E.G.: Majority is not enough: bitcoin mining is vulnerable. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 431–449. Springer, Heidelberg (2014)Google Scholar
  7. 7.
    Garay, J., Kiayias, A., Leonardos, N.: The bitcoin backbone protocol: analysis and applications. In: Eurocryppt 2015 (2015)Google Scholar
  8. 8.
    Itakura, K., Nakamura, K.: A public key cryptosystem suitable for digital multisignatures. NEC Res. Dev. 71, 1–8 (1983)Google Scholar
  9. 9.
    Kamp, J., Zuckerman, D.: Deterministic extractors for bit-fixing sources and exposure-resilient cryptography. In: SICOMP, vol. 36 (2007)Google Scholar
  10. 10.
    Kroll, J., Davey, I., Felten, E.: The economics of bitcoin mining, or bitcoin in the presence of adversaries. In: 12th WEIS (2013)Google Scholar
  11. 11.
    Lu, S., Ostrovsky, R., Sahai, A., Shacham, H., Waters, B.: Sequential aggregate signatures. J. Cryptology 26(2), 340–373 (2013)MathSciNetCrossRefzbMATHGoogle Scholar
  12. 12.
    Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Bitcoin.org
  13. 13.
    Micali, S., Ohta K., Reyzin, L.: Accountable-subgroup multisignatures (extended abstract). In: Proceedings of CCS 2001, pp. 245–254. ACM Press (2001)Google Scholar
  14. 14.
  15. 15.
    Rosenfeld, M.: (2012). http://arxiv.org/abs/1402.2009
  16. 16.
  17. 17.
    User “QuantumM...” (2011). https://bitcointalk.org/index.php?topic=27787

Copyright information

© International Financial Cryptography Association 2016

Authors and Affiliations

  1. 1.Department of Computer ScienceTechnionHaifaIsrael
  2. 2.Chromaway.comStockholmSweden

Personalised recommendations