Retricoin: Bitcoin based on compact proofs of retrievability

@inproceedings{Sengupta2016RetricoinBB,
  title={Retricoin: Bitcoin based on compact proofs of retrievability},
  author={Binanda Sengupta and Samiran Bag and Sushmita Ruj and Kouichi Sakurai},
  booktitle={ICDCN},
  year={2016}
}
Bitcoin [24] is a fully decentralized electronic cash system. The generation of the proof-of-work in Bitcoin requires large amount of computing resources. However, this huge amount of energy is wasted as one cannot make something useful out of it. In this paper, we propose a scheme called Retricoin which replaces the heavy computational proof-of-work of Bitcoin by proofs of retrievability that have practical benefits. To guarantee the availability of an important but large file, we distribute… CONTINUE READING
Highly Cited
This paper has 23 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.

Explore Further: Topics Discussed in This Paper

Citations

Publications citing this paper.
Showing 1-10 of 14 extracted citations

BlockStore: A Secure Decentralized Storage Framework on Blockchain

2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA) • 2018
View 3 Excerpts

IoT Data Integrity Verification for Cyber-Physical Systems Using Blockchain

2018 IEEE 21st International Symposium on Real-Time Distributed Computing (ISORC) • 2018
View 1 Excerpt

Bitcoin Block Withholding Attack: Analysis and Mitigation

IEEE Transactions on Information Forensics and Security • 2017

Blockchain Based Data Integrity Service Framework for IoT Data

2017 IEEE International Conference on Web Services (ICWS) • 2017
View 1 Excerpt

References

Publications referenced by this paper.
Showing 1-3 of 3 references

Compact Proofs of Retrievability

ASIACRYPT • 2008
View 15 Excerpts
Highly Influenced

Permacoin: Repurposing Bitcoin Work for Data Preservation

2014 IEEE Symposium on Security and Privacy • 2014
View 17 Excerpts
Highly Influenced

Tor: The Second-Generation Onion Router

USENIX Security Symposium • 2004
View 5 Excerpts
Highly Influenced

Similar Papers

Loading similar papers…