The Emergence in Mining Technology of Digital Gold: Ambiguity Surrounded in the Bitcoin System
-
2018-11-30 https://doi.org/10.14419/ijet.v7i4.25.26935 -
Bitcoin, Crypto currency, Digital Currency, Ethereum, Litecoin. -
Abstract
This article is based on the revolutionary development in the year 2008 by Satoshi Nakamoto was of a “Peer to peer Electronic cash systemâ€. The purpose of this paper is to analyze research surrounding the anonymity of online transactions using cryptocurrencies and report on the feasibility that does not have a regulatory body. This article takes the wheel around the journey of an unknown secondary invention which emerged as the digital gold across the globe and works as the digital barter system, a stepping stone towards the cashless world. The success wing of the invention was the decentralized mechanism to operate a digital cash system that restricts and checks double payment. Unlike in centralized server system, in the decentralised network, every nod in the network ensures and achieves absolute consensus. Crypto-currencies being unique and volatile are the most talked, researched, observed topic of the past few years. It is no less than an ocean of opportunities which works differently for different set of people. Crypto currencies functionalities and trade revolve around the internet based global markets. The design of the paper follows on from the approach taken by Reid and Harrigan, 2013 in determining whether the transactions made need to be detected and should have an option of rectifying the errors after knowing the peer or the location of the dealer or investor. By doing so, this research tests the interest of the investor and how much an individual will rely on such online mining of currency. Additionally, this will create an atmosphere which can extradite fraudulent or illegitimate transactions.
Â
Â
 -
References
[1] Ajtai, M. (1996), “Generating hard instances of lattice problemsâ€, Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of computing, ACM, Philadelphia, PA, pp. 99-108.
[2] Bisoyi, B. and Das, B. (2017). Organic Farming: A Sustainable Environmental Ingenuity for Biotechnological Intervention towards a Green World. International Journal of Innovative Research in Science, Engineering and Technology, 6(9), pp.179-186
[3] Bisoyi, B. and Das, B. (2015). Adapting green technology for optimal deployment of renewable energy resources and green power for future sustainability, Indian Journal of Science & Technology, 8 (28), pp.1-6.
[4] Bisoyi, B. and Das, B. (2015). Necessitate green environment for sustainable computing†published in Advances in Intelligent Systems and Computing, Advances in Intelligent Systems and Computing, Volume: 380, pp. 514-524.
[5] Bisoyi, B. and Das, B. (2018). Green technology for attaining environmental safety and sustainable development, International Journal of Mechanical Engineering and Technology (IJMET) Volume 9, Issue 3, March 2018, pp. 1087 – 1094
[6] Bisoyi, B. and Das, B.(2015). Development in the Field Of Technology for Cooperative Problem Solving Utilizing Nonconventional Energy Resources in India &Future Trend, International Journal of Scientific Research And Management, 3(1), pp.2321-3418.
[7] Bank, European Central. (2015). Virtual currency schemes– a further analysis. Frankfurt, Germany: European Central Bank.
[8] Bradshaw, D. (2015). NYU Stern broadens impact of Bitcoin expertise. Financial Times.
[9] BTCManager. (2016, 10 15). Ethereum continues to be exploited. Retrieved from BTC Manager: https://btcmanager.com/news/tech/ethereum-continues-to-beexploited-another-hard-fork/
[10] Buterin, V. (2013), “A next generation smart contract and decentralized application platformâ€, available at: www.the-blockchain.com/docs/Ethereum-white-paper-a-nextgeneration-smart-contract-and-decentralized-application-platform-vitalik buterin.pdf [Google Scholar]
[11] Buterin, V. (2016a), “Critical update re: DAO vulnerabilityâ€, available at: https://blog.ethereum.org/2016/06/17/critical-update-re-dao-vulnerability/ Buterin, V. (2016b), “Hard fork completedâ€, available at: https://blog.ethereum.org/2016/07/20/hard-fork-completed/
[12] Caffyn, G. (2015, August 21). What is the Bitcoin Block Size Debate and Why Does it Matter? Retrieved from Coindesk:http://www.coindesk.com/what-is-the-bitcoinblock-size-debate-and-whydoes-it-matter/
[13] Chen, A. B. (n.d.). Bitcoin: Technical Background and Data Analysis. Finance and Economics Discussion Series Divisions of Research & Statistics and Monetary Affairs Federal Reserve Board, Washington, D.C.
[14] S. Rohini, M. Sharanya, A. Vidhya, S. Viji and P. Poornima. "Proximity Coupled Microstrip Antenna for Bluetooth, WIMAX and WLAN Applications ." International Journal of Communication and Computer Technologies 5 (2017), 48-52.
[15] DamgÃ¥rd, I. and Jurik, M. (2001), “A generalisation, a simplification and some applications of pailliers probabilistic public-key systemâ€, in Kim, K. (Ed.), Public Key Cryptography, Lecture Notes in Computer Science, Springer, Berlin, Vol. 1992, doi: https://doi.org/10.1007/3-540-44586-2_9. [Crossref], [Google Scholar]
[16] Delmolino, K., Arnett, M., Kosba, A., Miller, A. and Shi, E. (2015), “Step by step towards creating a safe smart contract: lessons and insights from a cryptocurrency labâ€, available at: https://eprint.iacr.org/2015/460.pdf
[17] Diaz, C. D. (2015, December 17). Who controls Ethereum? The relationship between Ethereum and ConsenSys:a mystery that matters. Retrieved from Medium.com:https://medium.com/@celeduc/who-controls ethereum94fcb4aa3a50#.xodo2v329
[18] Douceur, J.R. (2002), “The Sybil attackâ€, Proceedings of 1st International Workshop on Peer-to-Peer Systems (IPTPS-2002), Lecture Notes in Computer Science, Springer-Verlag, Berlin, Vol. 2429, pp. 251-260.
[19] Ethereum, F. (2016), “Introduction to smart contractsâ€, available at: https://solidity.readthedocs.io/en/develop/introduction-to-smart-contracts.html
[20] Eyal, I. and Sirer, E.G. (2014), “It’s time for a hard bitcoin forkâ€, available at: http://hackingdistributed.com/p/2014/06/13/in-ghash-bitcoin-trusts/
[21] Fischer, M.J., Lynch, N.A. and Paterson, M.S. (1983), “Impossibility of distributed consensus with one faulty processâ€, Proceedings of the 2nd ACM SIGACT645 SIGMOD Symposium on Principles of Database Systems, Association of Computing Machinery, New York, NY.
[22] Gentry, C. (2009), “A fully homomorphic encryption schemeâ€, Ph.D. dissertation thesis, Standford University, Standford.
[23] Gentry, C., Sahai, A. and Waters, B. (2013), “Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-basedâ€, Cryptology ePrint Archive, Report 2013/340.
[24] Dahiya, V. A Survey on Educational Data Mining.
[25] Gervais, A., Karame, G.O., Wst, K., Glykantzis, V., Ritzdorf, H. and Capkun, S. (2016), “On the security and performance of proof of work blockchainsâ€, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS-2016), Association of Computing Machinery, New York, NY, pp. 3-16.
[26] Goodin, D. (2014), “Bitcoin security guarantee shattered by anonymous miner with 51% network powerâ€, available at: https://arstechnica.com/security/2014/06/bitcoin-security-guarantee-shattered-by-anonymous-miner-with-51-network-power/
[27] Gupta, M. (2017), Blockchain for Dummies, IBM Limited Edition, John Wiley and Sons, Hoboken, NJ, available at: https://public.dhe.ibm.com/common/ssi/ecm/xi/en/xim12354usen/
[28] Hayes, A. (2015). What factors give cryptocurrencies their value: An empirical analysis. New York: The New School for Social Research.
[29] Hyperledger, F. (2017), “Hyperledger: Linux foundation projectsâ€, available at: www.hyperledger.org/
[30] Margaret Harwood-Jones (2016), Blockchain and T2S: A potential disruptor, Beyond Borders Report, SCB https://www.sc.com/BeyondBorders/blockchain-mass-adoption/
[31] McGrath, R. (2016, July 21). Cryptocurrency Governance Processes: A Master Class. Retrieved from Robert McGrath’s Blog: https://robertmcgrath.wordpress.com/2016/07/21/cryptocurrencygovernance- processesa-master-class/
[32] Nakamoto, S. (n.d.). Bitcoin: A Peer-to-Peer Electronic Cash System. Bitcoin.org.
[33] Reid, F. and Harrigan, M. (2013), “An analysis of the anonymity in the Bitcoin systemâ€, in Altshuler, Y., Elovici, Y., Cremers, A.B., Aharony, N. and Pentland, A. (Eds), Security and Privacy in Social Networks, Springer, New York, NY.
[34] Sid Kalla and Matt Chwierut (2017, Jan 8), 2016- Year Blockchain ICO’s disrupted Venture Capital, Coindesk Report. https://www.coindesk.com/2016-ico-blockchainreplace-traditional-vc/
[35] Stallings, W. and Brown, L. (2015), Computer Security: Principles and Practice, 3rd ed., Pearson Education, London.
[36] Szabo, N. (1997), “Formalizing and securing relationships on public networksâ€, First Monday, Vol. 2 No. 9Todd, P. (2016, June 21). Will The Cryptocurrency Industry Figure Out Governance? Retrieved from Velocity Blog:http://blog.velocity.technology/cryptocurrencygovernance/
[37] Velner, Y., Teutsch, J. and and Luu, L. (2017), “Smart contracts make bitcoin mining pools vulnerableâ€, available at: https://eprint.iacr.org/2017/230.pdf Walch, A. (2017), “Should public blockchains serve as financial market infrastructures?â€, Handbook of Digital Banking and Internet Finance, Elsevier, Amsterdam, Vol. 2, available at: https://ssrn.com/abstract=2879239
[38] Wood, G. (2016), “Ethereum: a secure decentralised generalised transaction ledgerâ€, available at: http://gavwood.com/paper.pdf
[39] Wüst, K. and Gervais, A. (2016), “Ethereum eclipse attacksâ€, ETH Library, available at: http://e-collection.library.ethz.ch/eserv/eth:49728/709eth-49728-01.pdf
[40] Yarvin, C., Monk, P., Dyudin, A. and Pasco, R. (2016), “Urbit: a solid-state interpreterâ€, available at: www.urbit.org
[41] Yermack, D. (2013). Is Bitcoin a Real Currency? New York: New York University Stern School of Business.
-
Downloads
-
How to Cite
Gupta, A., Das, B., & Bisoyi, B. (2018). The Emergence in Mining Technology of Digital Gold: Ambiguity Surrounded in the Bitcoin System. International Journal of Engineering & Technology, 7(4.25), 262-266. https://doi.org/10.14419/ijet.v7i4.25.26935Received date: 2019-01-31
Accepted date: 2019-01-31
Published date: 2018-11-30