• Corpus ID: 237385942

Crypto Currency Regulation and Law Enforcement Perspectives

@article{Courtois2021CryptoCR,
  title={Crypto Currency Regulation and Law Enforcement Perspectives},
  author={Nicolas T. Courtois and Kacper Gradon and Klaus Schmeh},
  journal={ArXiv},
  year={2021},
  volume={abs/2109.01047}
}
This paper provides an overview of how crypto currency and blockchain engineering interacts with the law enforcement. We point out that a large proportion of crypto users are amateur investors and the dominant and the largest segment in crypto crime are simply investment scams (!). We look at various questions of criminal use and misuse of technology, especially in the areas of money laundering or cashing out the profits originating from illicit activities. The aim of the paper is to raise a… 

Review on Digital Currency

  • Yinghua Zhong
  • Economics, Computer Science
    Proceedings of the 2022 7th International Conference on Financial Innovation and Economic Development (ICFIED 2022)
  • 2022
TLDR
This article summarizes the concept, classification, characteristics and benefits, risks and potential problems of digital currency, and finally gives an overview of the development trend.

References

SHOWING 1-10 OF 45 REFERENCES

The use of crypto-currencies in funding violent jihad

TLDR
The need for further in-depth research into reliable ways to circumvent the current difficulties experienced in differentiating illicit transactions from legitimate ones and establishing reliable means of attribution is highlighted.

Could Bitcoin transactions be 100x faster?

TLDR
This paper looks at the question of fast transaction acceptance in bitcoin and other crypto currencies and claims that bitcoin needs to change in order to be able to satisfy the most basic needs of modern users.

On The Longest Chain Rule and Programmed Self-Destruction of Crypto Currencies

TLDR
This paper develops a theory of Programmed Self-Destruction of crypto currencies and exhibits examples of 'alt-coins' which validate the theory and for which the process of programmed decline and rapid self-destruction has clearly already started.

A Survey on Security and Privacy Issues of Bitcoin

TLDR
This paper presents a systematic survey that covers the security and privacy aspects of Bitcoin, and reviews the existing vulnerabilities in Bitcoin and its major underlying technologies such as blockchain and PoW-based consensus protocol.

Crypto-Hotwire: Illegal Blockchain Mining at Zero Cost Using Public Infrastructures

TLDR
This work indicates, using data from January and February of 2018 from the university, that a new kind of cyber attack aimed at illegally mining cryptocurrencies by stealing energy is real and presents a projection of the gains derived from these attacks.

Cryptocurrencies: The Next Generation of Terrorist Financing?

Virtual currencies — which are not legal tender in any country and are not issued or backed by any government — have become an important factor in global funds transfers. But features associated with

Electronic Currency: The Potential Risks to National Security and Methods to Minimize Them

TLDR
The estimate is given to the development of risks and threats to national security, combating laundering of criminal money and terrorism financing, which are formed under the conditions of the growing interest in virtual currencies, including Bitcoin.

The Brave New World of Bodacious Assumptions in Cryptography

TLDR
This work states that the security of a public-key system rests upon the assumed difficulty of a certain mathematical problem, and shows that the problems that are used in security proofs come from a small set of extensively studied, natural problems.

Bitcoin: A Peer-to-Peer Electronic Cash System

TLDR
This work proposes a solution to the double-spending problem using a peer-to-peer network, where the network timestamps transactions by hashing them into an ongoing chain of hash-based proof-of-work, forming a record that cannot be changed without redoing the proof- of-work.

Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management, Wallet and Cold Storage Solutions in Presence of Poor RNG Events

TLDR
This paper proposes new more advanced combination attacks in which the security of keys hold in cold storage can be compromised without executing any software exploit on the cold system, but through security incidents at operation such as bad random number or related random events.