SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies

@article{Bonneau2015SoKRP,
  title={SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies},
  author={Joseph Bonneau and Andrew K. Miller and Jeremy Clark and Arvind Narayanan and Joshua A. Kroll and Edward W. Felten},
  journal={2015 IEEE Symposium on Security and Privacy},
  year={2015},
  pages={104-121}
}
Bit coin has emerged as the most successful cryptographic currency in history. [] Key Method We survey anonymity issues in Bit coin and provide an evaluation framework for analyzing a variety of privacy-enhancing proposals. Finally we provide new insights on what we term disinter mediation protocols, which absolve the need for trusted intermediaries in an interesting set of applications. We identify three general disinter mediation strategies and provide a detailed comparison.

Tables from this paper

Generation of digital currency and application development (Digibucks)
TLDR
The main aim is to provide more security to cryptocurrencies and reducing the update interval time, which will attract more users and interest them in using this digital currency more frequently.
A Survey on Security and Privacy Issues of Bitcoin
TLDR
This paper presents a systematic survey that covers the security and privacy aspects of Bitcoin, and reviews the existing vulnerabilities in Bitcoin and its major underlying technologies such as blockchain and PoW-based consensus protocol.
Bitcoin : A Deeper Look on Cryptocurrency Concepts and Challenges
TLDR
Several essential methods that have the same concepts as the traditional currency transaction approach, which could influence what is more than one specific digital currency are explained and discussed.
A Security Analysis of FirstCoin
TLDR
This paper identifies and discusses vulnerabilities of FirstCoin, which lead to a low network hash rate and allow for 51% attacks, and proposes a double-spending attack that exploits these vulnerabilities and demonstrates the proposed attack’s feasibility by running it in an isolated evaluation environment.
Research Statement Provable Security for Cryptocurrencies
TLDR
This dissertation developed (the first) formal models for Bitcoin’s security, and created programming languages that safely encapsulate cryptographic protocols, so that even non-expert application developers can use them in cryptocurrency applications.
SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies
TLDR
Noand near-fork attacks are highlighted as a powerful, yet largely underestimated, AIM category that raises serious security concerns not only for smart contract platforms but also in the context of cryptocurrencies based on Nakamoto consensus.
A Literature Review on Bitcoin: Transformation of Crypto Currency Into a Global Phenomenon
TLDR
This study presents an idea about the “potential” of bitcoin, highlights the prerequisites, needs, implications, and challenges faced by bitcoin in processing business transactions, and reports on the attributes of bitcoin through a systematic literature review.
Hijacking Bitcoin: Large-scale Network Attacks on Cryptocurrencies
TLDR
It is shown that attacks that are commonly believed to be hard are actually within the reach of anyone with access to a BGP-enabled network and hijacking less than 900 prefixes, and several suggestions on approaches to mitigate such attacks employing both short-term and long-term measures are provided.
Provable Security for Cryptocurrencies
TLDR
This thesis provides a formal specification and construction for each layer of an abstract cryptocurrency protocol, and proves that their constructions satisfy their specifications, and constructs secure puzzles that address important and well-known challenges facing Bitcoin today.
An evaluation of the effects of broken cryptographic primitives on Bitcoin
TLDR
It is concluded that solving the effects of broken cryptographic primitives on the operation of the Bitcoin network and the changes to the Bitcoin protocol that will be necessary in response requires some degree of centralization, or the use of Zero-Knowledge Proofs along or on top of Bitcoin.
...
...

References

SHOWING 1-10 OF 158 REFERENCES
On The Longest Chain Rule and Programmed Self-Destruction of Crypto Currencies
TLDR
This paper develops a theory of Programmed Self-Destruction of crypto currencies and exhibits examples of 'alt-coins' which validate the theory and for which the process of programmed decline and rapid self-destruction has clearly already started.
CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin
TLDR
CoinShuffle is a completely decentralized Bitcoin mixing protocol that allows users to utilize Bitcoin in a truly anonymous manner and it does not require any trusted, accountable or untrusted third party and it is perfectly compatible with the current Bitcoin system.
Sybil-Resistant Mixing for Bitcoin
TLDR
Xim is proposed, a two-party mixing protocol that is compatible with Bitcoin and related virtual currencies, and is the first decentralized protocol to simultaneously address Sybil attackers, denial-of-service attacks, and timing-based inference attacks.
Permacoin: Repurposing Bitcoin Work for Data Preservation
TLDR
This work proposes a modification to Bit coin that repurposes its mining resources to achieve a more broadly useful goal: distributed storage of archival data and presents an alternative scratch-off puzzle for Bit coin based on Proofs-of-Retrievability (PORs).
Bitcoin over Tor isn't a Good Idea
TLDR
This paper shows how an attacker can fingerprint users and then recognize them and learn their IP addresses when they decide to connect to the Bit coin network directly.
Accelerating Bitcoin's Transaction Processing. Fast Money Grows on Trees, Not Chains
TLDR
The block generation rate can be securely increased to more than one block per second – a 600 fold speedup compared to today’s rate, while still allowing the network to processes many transactions per second.
Secure Multiparty Computations on Bitcoin
TLDR
The Bit coin system can be used to go beyond the standard "emulation-based" definition of the MPCs, by constructing protocols that link their inputs and the outputs with the real Bit coin transactions.
An inquiry into money laundering tools in the Bitcoin ecosystem
TLDR
A first systematic account of opportunities and limitations of anti-money laundering (AML) in Bitcoin, a decentralized cryptographic currency proliferating on the Internet, is provided and it appears unlikely that a Know-Your-Customer principle can be enforced in the Bitcoin system.
Overview of Colored Coins
TLDR
The implementation details of colored bitcoins are discussed, which can make use of the existing Bitcoin infrastructure and can be stored and transferred without the need for a third party, and even be exchanged for one another in an atomic transaction.
Zerocash: Decentralized Anonymous Payments from Bitcoin
TLDR
This paper formulate and construct decentralized anonymous payment schemes (DAP schemes) and builds Zero cash, a practical instantiation of the DAP scheme construction that is orders of magnitude more efficient than the less-anonymous Zero coin and competitive with plain Bit coin.
...
...