Survey on Surging Technology: Cryptocurrency
The paper gives an insight on cryptography within digital money used in electronic commerce. The combination of digital currencies with cryptography is named as cryptocurrencies or cryptocoins. Though this technique came into existence years ago, it is bound to have a great future due to its flexibility and very less or nil transaction costs. The concept of cryptocurrency is not new in digital world and is already gaining subtle importance in electronic commerce market. This technology can bring down various risks that may have occurred in usage of physical currencies. The transaction of cryptocurrencies are protected with strong cryptographic hash functions that ensure the safe sending and receiving of assets within the transaction chain or blockchain in a Peer-to-Peer network. The paper discusses the merits and demerits of this technology with a wide range of applications that use cryptocurrency.
 Satoshi Nakamoto, â€œBitcoin: A Peer-To-Peer Electronic Cash Systemâ€, https://bitcoin.org
 Bastiaan Quast, â€œBitcoin and Cryptocurrencies: Or How Inflation Will Come About in Cybermoneyâ€, February 2014, 20th International Conference on Computational Engineering, Geneva.
 Decker C., Wattenhofer R., â€œInformation propagation in the Bitcoin networkâ€, IEEE International Conference on Peer-to-Peer Computing, 2013, Zurich.
 Neil Gandal., Hanna Halaburda., â€œCompetition in the Cryptocurrency Marketâ€, September 2014, Currency Department, Bank of Canada, Ontario.
 Mitsuru Iwamura, Yukinobu Kitamura, Tsutomu Matsumoto, â€œIs Bitcoin the Only Cryptocurrency in the Town?â€, February 2014, Institute of Economic research, Hitsubashi University.
 Alex Heid, Analysis of the Cryptocurrency Marketplace, http://www.HackMiami.org
 Eyal and E. G. Sirer. Majority is not enough: Bitcoin mining is vulnerable. In Financial Cryptography and Data Security, pages 436-454. Springer, 2014.
 S. King and S. Nadal. Ppcoin: Peer-to-peer crypto-currency with proof-of-stake. self-published paper, August, 19, 2012.
 Reid, F., Harrigan M.: An Analysis of Anonymity in the Bitcoin System, arXiv:1107.4524v2 [physics.soc-ph] 7 May 2012.
 Holz, T., Steiner, M., Dahl, F., Biersack, E., Freiling, F.C.. Measurements and mitigation of peer-to-peer-based botnets: A case study onstorm worm. Proceedings of the USENIX Workshop on Large-Scale Exploits and Emergent Threats 2008.
 Stock, B., Gobel, J., Engelberth, M., Freiling, F.C., Holz, T.. Walowdac-analysis of a peer-to-peer botnet. In: Proceedings of the European Conference on Computer Network Defense (EC2ND). 2009.
 Rossow, C., Andriesse, D., Werner, T., Stone-Gross, B., Plohmann, D., Dietrich, C.J., et al. P2PWNED: modeling and evaluating the resilience of peer-to-peer botnets. In: Proceedings of the 34th IEEE Symposium on Security and Privacy (S&P). 2013.
 Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G.M., et al. A fistful of bitcoins: Characterizing payments among men with no names. In: Proceedings of the Internet Measurement Conference. 2013.
 Karame, G.O., Androulaki, E., Capkun, S.. Double-spending fast payments in bitcoin. In: Proceedings of the 2012 ACM conference on Computer and Communications Security. 2012.
 Ron, D., Shamir, A.. Quantitative analysis of the full bitcoin transaction graph. IACR Cryptology ePrint Archive 2012.
 Ober, M., Katzenbeisser, S., Hamacher, K.. Structure and anonymity of the bitcoin transaction graph. Future Internet 2013.
 Litke, P., Stewart, J.: Cryptocurrency-stealing malware landscape (2014) [Online, Retrieved March, 2014].
 Bamert, T., Decker, C., Elsen, L., Wattenhofer, R., Welten, S.: Have a Snack, Pay with Bitcoins. In: 13th IEEE International Conference on Peer-to-Peer Computing (P2P), Trento, Italy. (2013).
 Boehm, F., Pesch, P.: Bitcoin: A First Legal Analysis - with Reference to German and American Law. In: Workshop on Bitcoin Research. (2014).
 Bentov, C. Lee, A. Mizrahi, and M. Rosenfeld. Proof of activity: Extending bitcoin's proof of work via proof of stake [extended abstract] ACM SIGMETRICS Performance Evaluation Review, 42(3):34-37, 2014.
 G. Wood. Ethereum: A secure decentralized generalised transaction ledger. Ethereum Project Yellow Paper, 2014.
 Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, and Stefan Savage. A fistful of Bitcoins: Characterizing payments among men with no names. In Proceedings of the 2013 Conference on Internet Measurement Conference, IMC '13, pages 127-140, 2013.
 Kumar, M.V.R., Bhalaji, N. & Singh, S. â€œAn augmented approach for pseudo-free groups in smart cyber-physical systemâ€ Cluster Comput (2018). https://doi.org/10.1007/s10586-018-2353-2.
View Full Article:
How to Cite
LicenseAuthors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under aÂ Creative Commons Attribution Licensethat allows others to share the work with an acknowledgement of the work''s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal''s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (SeeÂ The Effect of Open Access).