Remember Me
Or use your Academic/Social account:


Or use your Academic/Social account:


You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.


Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message


Verify Password:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Decker, Christian; Seidel, Jochen; Wattenhofer, Roger (2014)
Languages: English
Types: Preprint
Subjects: Computer Science - Distributed, Parallel, and Cluster Computing, Computer Science - Cryptography and Security
The Bitcoin system only provides eventual consistency. For everyday life, the time to confirm a Bitcoin transaction is prohibitively slow. In this paper we propose a new system, built on the Bitcoin blockchain, which enables strong consistency. Our system, PeerCensus, acts as a certification authority, manages peer identities in a peer-to-peer network, and ultimately enhances Bitcoin and similar systems with strong consistency. Our extensive analysis shows that PeerCensus is in a secure state with high probability. We also show how Discoin, a Bitcoin variant that decouples block creation and transaction confirmation, can be built on top of PeerCensus, enabling real-time payments. Unlike Bitcoin, once transactions in Discoin are committed, they stay committed.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • [1] Gaving Andreesen. BIP 0050: March 2013 Chain Fork Post-Mortem. https://github.com/bitcoin/bips, 2013. [Online; accessed December 12, 2014].
    • [2] Elli Androulaki, Ghassan Karame, Marc Roeschlin, Tobias Scherer, and Srdjan Capkun. Evaluating user privacy in bitcoin. IACR Cryptology ePrint Archive, 2012:596, 2012.
    • [3] M. Babaioff, S. Dobzinski, S. Oren, and A. Zohar. On bitcoin and red balloons. In Proc. of Electronic Commerce, 2012.
    • [4] Adam Back, Matt Corallo, Luke Dashjr, Mark Friedenbach, Gregory Maxwell, Andrew Miller, Andrew Poelstra, Jorge Timón, and Pieter Wuille. Enabling blockchain innovations with pegged sidechains, 2014.
    • [5] Tobias Bamert, Christian Decker, Lennart Elsen, Samuel Welten, and Roger Wattenhofer. Have a snack, pay with bitcoin. In IEEE Internation Conference on Peer-to-Peer Computing (P2P), Trento, Italy, 2013.
    • [6] Vitalik Butterin et al. A next-generation smart contract and decentralized application platform, 2014.
    • [7] Miguel Castro, Barbara Liskov, et al. A correctness proof for a practical byzantine-fault-tolerant replication algorithm. Technical report, Technical Memo MIT/LCS/TM-590, MIT Laboratory for Computer Science, 1999.
    • [8] Miguel Castro, Barbara Liskov, et al. Practical byzantine fault tolerance. In OSDI, volume 99, pages 173-186, 1999.
    • [9] David Chaum. Blind signatures for untraceable payments. In Advances in cryptology, 1983.
    • [10] David Chaum, Amos Fiat, and Moni Naor. Untraceable electronic cash. In Advances in cryptology, 1990.
    • [11] Jeremy Clark and Aleksander Essex. Commitcoin: Carbon dating commitments with bitcoin. In Financial Cryptography and Data Security. 2012.
    • [12] Christian Decker and Roger Wattenhofer. Information propagation in the bitcoin network. In IEEE International Conference on Peer-to-Peer Computing (P2P), Trento, Italy, September 2013.
    • [13] Christian Decker and Roger Wattenhofer. Bitcoin Transaction Malleability and MtGox. In 19th European Symposium on Research in Computer Security (ESORICS), Wroclaw, Poland, September 2014.
    • [14] C Dwork and M Naor. Pricing via processing or combating junk mail. Lecture Notes in Computer Science, 576:114-128, 1992.
    • [15] Ittay Eyal and Emin Gün Sirer. Majority is not enough: Bitcoin mining is vulnerable. arXiv preprint arXiv:1311.0243, 2013.
    • [16] Juan Garay, Aggelos Kiayias, and Nikos Leonardos. The bitcoin backbone protocol: Analysis and applications. Technical report, 2014.
    • [17] G.O. Karame, E. Androulaki, and S. Capkun. Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin. In Proc. of Conference on Computer and Communication Security, 2012.
    • [18] Ramakrishna Kotla, Lorenzo Alvisi, Mike Dahlin, Allen Clement, and Edmund Wong. Zyzzyva: speculative byzantine fault tolerance. In ACM SIGOPS symposium on Operating systems principles, 2007.
    • [19] Leslie Lamport, Robert Shostak, and Marshall Pease. The byzantine generals problem. ACM Transactions on Programming Languages and Systems, 1982.
    • [20] Ian Miers, Christina Garman, Matthew Green, and Aviel D. Rubin. Zerocoin: Anonymous distributed e-cash from bitcoin. 2013.
    • [21] Andrew Miller, Ari Juels, Elaine Shi, Bryan Parno, and Jonathan Katz. Permacoin: Repurposing bitcoin work for data preservation. 2014.
    • [22] Andrew Miller and Joseph LaViola. Anonymous byzantine consensus from moderately-hard puzzles: A model for bitcoin. 2014.
    • [23] Andrew Miller, Elaine Shi, Ahmed Kosba, and Jonathan Katz. Preprint: Nonoutsourceable scratch-off puzzles to discourage bitcoin mining coalitions.
    • [24] Michael Mitzenmacher and Eli Upfal. Probability and computing: Randomized algorithms and probabilistic analysis. Cambridge University Press, 2005.
    • [25] Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system. https: //bitcoin.org/bitcoin.pdf. [Online; accessed March 26, 2014].
    • [26] M. Pease, R. Shostak, and L. Lamport. Reaching agreement in the presence of faults. Journal of the ACM (JACM).
    • [27] F. Reid and M. Harrigan. An analysis of anonymity in the bitcoin system. In Proc. of the Conference on Social Computing (socialcom), 2011.
    • [28] Michael K. Reiter. A secure group membership protocol. IEEE Transactions on Software Engineering, 1996.
    • [29] Meni Rosenfeld. Analysis of bitcoin pooled mining reward systems. arXiv preprint arXiv:1112.4980, 2011.
    • [30] Meni Rosenfeld. Analysis of hashrate-based double spending. https: //bitcoil.co.il/Doublespend.pdf, 2012. [Online; accessed February 17th, 2014].
    • [31] Meni Rosenfeld. Overview of colored coins. Technical report, 2012.
    • [32] David Schwartz, Noah Youngs, and Arthur Britto. The ripple protocol consensus algorithm, 2014.
    • [33] JR Willett, Maran Hidskes, David Johnston, Ron Gross, and Marv Schneider. The master protocol / mastercoin complete specification. https://github.com/mastercoin-MSC/spec, 2012.
  • No related research data.
  • No similar publications.
  • BioEntity Site Name

Share - Bookmark

Cite this article

Collected from