• Corpus ID: 44370121

An Analysis of the Bitcoin Electronic Cash System

  title={An Analysis of the Bitcoin Electronic Cash System},
  author={Danielle Drainvile},
In a world that relies heavily on technology, privacy is sought by many. Privacy, among other things, is especially desired when making an online payment. This motivates the use of electronic cash, a form of electronic payment system based on the paper cash system used daily. The most successful and widely used of these services is Bitcoin – a decentralized peer-to-peer electronic cash system. This paper provides a broad introduction to Bitcoin, while analyzing its construction and… 

Figures and Tables from this paper

Bitcoin and Beyond: Exclusively Informational Monies
It seems that a dual money system, having two units with a fluctuating rate, may be obtained, to remedy some, but not all, of the ethical worries that arise when contemplating Bitcoin after hypothetically having become a dominant form of money.
Implementation and Analysis of the use of the Blockchain Transactions on the Workings of the Bitcoin
The author analyzes how the transaction is running, as well as how blockchain bitcoin is doing work in transactions on the system to make transactions.
Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies
This survey unroll and structure the manyfold results and research directions of Bitcoin, and deduce the fundamental structures and insights at the core of the Bitcoin protocol and its applications.
Bitcoin influence on E-commerce
Bitcoin gives mutual connection to expand the business of E-commerce, as well as the benefits provided by the application of e-commerce in the world of online business.
One Weird Trick to Stop Selfish Miners: Fresh Bitcoins, A Solution for the Honest Miner (Poster Abstract)
  • E. Heilman
  • Mathematics
    Financial Cryptography Workshops
  • 2014
In “Majority is not Enough: Bitcoin Mining is Vulnerable”, Eyal and Sirer study a Bitcoin mining strategy called selfish mining, in which selfish behavior is incentivized over honest behavior, eventually causing most miners to adopt the selfish strategy, despite it being harmful to Bitcoin as a whole.
Analyzing the Bitcoin Network: The First Four Years
This explorative study examines the economy and transaction network of the decentralized digital currency Bitcoin during the first four years of its existence and establishes and analyze a novel integrated dataset that enriches data from the Bitcoin blockchain with off-network data such as business categories and geo-locations.
How economic freedom reflects on the Bitcoin transaction network
Based on the assumption that economic freedom facilitates the growth of traditional economic sectors, this study seeks to understand the role it plays in fintech sector. For this purpose, by adopting
Exploring the Bitcoin Network
This explorative paper focuses on descriptive statistics and network analysis of the Bitcoin transaction graph based on recent data using graph mining algorithms and can serve as a starting point in investigating anonymity and economic relationships in Bitcoin on a new structural level.
Analysis Techniques for Illicit Bitcoin Transactions
This comprehensive overview of analysis techniques for illicit Bitcoin transactions addresses both technical, machine learning approaches as well as a non-technical, legal, and governance
Realization and Addressing Analysis In Blockchain Bitcoin
The implementation research and analyze address blockchain on this bitcoin will have the results that refers to making address bitcoin a safe and boost security of address the bitcoin. The working


Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin
This paper analyzes the security of using Bitcoin for fast payments, where the time between the exchange of currency and goods is short, and proposes a lightweight countermeasure that enables the detection of doublespending attacks in fast transactions.
Evaluating User Privacy in Bitcoin
This research examines the use of pseudonymity in the Bitcoin network, and the role that it plays in the development of trust and confidence in the system.
Bitter to Better - How to Make Bitcoin a Better Currency
An in-depth investigation is performed to understand what made Bitcoin so successful, while decades of research on cryptographic e-cash has not lead to a large-scale deployment.
Quantitative Analysis of the Full Bitcoin Transaction Graph
This paper answers for the first time a variety of interesting questions about the typical behavior of users, how they acquire and how they spend their bitcoins, the balance of bitcoins they keep in their accounts, andHow they move bitcoins between their various accounts in order to better protect their privacy.
Untraceable Electronic Cash
An electronic cash protocol including the steps of using a one-way function f1 to generate an image f1 (x1) from a preimage x1 and receiving from the second party a note including a digital signature.
Blind Signatures for Untraceable Payments
Automation of the way we pay for goods and services is already underway, as can be seen by the variety and growth of electronic banking services available to consumers. The ultimate structure of the
CommitCoin: Carbon Dating Commitments with Bitcoin - (Short Paper)
In the standard definition of a commitment scheme, the sender commits to a message and immediately sends the commitment to the recipient interested in it. However the sender may not always know at
Updated Digital Signature Standard Approved as Federal Information Processing Standard (FIPS)186-3 | NIST
An important component of the federal government’s cryptographic toolkit was recently updated by the National Institute of Standards and Technology (NIST) and issued as Federal Information Processing
Parallel Collision Search with Cryptanalytic Applications
The new technique greatly extends the reach of practical attacks, providing the most cost-effective means known to date for defeating: the small subgroup used in certain schemes based on discrete logarithms such as Schnorr, DSA, and elliptic curve cryptosystems; hash functions; and double encryption and three-key triple encryption.
Protocols for Public Key Cryptosystems
  • R. Merkle
  • Computer Science, Mathematics
    1980 IEEE Symposium on Security and Privacy
  • 1980
Several protocols for public key distribution and for digital signatures are briefly compared with each other and with the conventional alternative.