On BlockChain Technology: Overview of Bitcoin and Future Insights

被引:0
作者
Hellani, Hussein [1 ]
Samhat, Abed Ellatif [2 ]
Chamoun, Maroun [1 ]
El Ghor, Hussein [2 ]
Serhrouchni, Ahmed [3 ]
机构
[1] St Joseph Univ, Beirut, Lebanon
[2] Lebanese Univ, Beirut, Lebanon
[3] Telecom ParisTech, Paris, France
来源
2018 IEEE INTERNATIONAL MULTIDISCIPLINARY CONFERENCE ON ENGINEERING TECHNOLOGY (IMCET) | 2018年
关键词
POW; Blockchain; P2P; distributed ledger; Consensus;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In this paper, we consider blockchain technology that enabled the existence of digital currency and we investigate Bitcoin cryptocurrency application. This technology nowadays represents a new feature that replaces existing client-server core system on top of some distributed systems with many additional features such as high availability, resistance to alteration, fault tolerance and cost reduction. After overviewing how such technology is working, we highlightthe requirements and benefits related to the security, database and network. We mainly focus on answering the most Bitcoin queries including privacy and double spending. Furthermore, as blockchain has potential applications far beyond bitcoin, we draw future insights where applications based blockchain are provisioned in the market in order to be totally or partially independent of the centralized systems and we provide a questionnaire helping organizations for better using the blockchain feasibilities.
引用
收藏
页数:8
相关论文
共 29 条
[1]  
Andresen G., 2011, BIP 11 M OF N STANDA
[2]  
[Anonymous], 2002, PROC 20 S INF THEORY
[3]  
[Anonymous], 2012, BIP 16 PAY SCRIPT HA
[4]  
Back A., 2002, HASHCASH A DENIAL SE
[5]   BlueWallet: The secure Bitcoin wallet [J].
Bamert, Tobias ;
Decker, Christian ;
Wattenhofer, Roger ;
Welten, Samuel .
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8743 :65-80
[6]   Elliptic Curve Cryptography in Practice [J].
Bos, Joppe W. ;
Halderman, J. Alex ;
Heninger, Nadia ;
Moore, Jonathan ;
Naehrig, Michael ;
Wustrow, Eric .
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 :157-175
[7]  
Courtois N. T., 2014, ABS14050534 COMP RES
[8]   The Sybil attack [J].
Douceur, JR .
PEER-TO-PEER SYSTEMS, 2002, 2429 :251-260
[9]  
Finney H, 2011, RE BEST PRACTICE FAS
[10]  
Fleder M., 2013, 6858 MIT