A Survey on Security and Privacy Issues of Bitcoin

Bitcoin is a popular cryptocurrency that records all transactions in a distributed append-only public ledger called blockchain. The security of Bitcoin heavily relies on the incentive-compatible proof-of-work (PoW) based distributed consensus protocol, which is run by the network nodes called miners. In exchange for the incentive, the miners are expected to maintain the blockchain honestly. Since its launch in 2009, Bitcoin economy has grown at an enormous rate, and it is now worth about 150 billions of dollars. This exponential growth in the market value of bitcoins motivate adversaries to exploit weaknesses for profit, and researchers to discover new vulnerabilities in the system, propose countermeasures, and predict upcoming trends. In this paper, we present a systematic survey that covers the security and privacy aspects of Bitcoin. We start by giving an overview of the Bitcoin system and its major components along with their functionality and interactions within the system. We review the existing vulnerabilities in Bitcoin and its major underlying technologies such as blockchain and PoW-based consensus protocol. These vulnerabilities lead to the execution of various security threats to the standard functionality of Bitcoin. We then investigate the feasibility and robustness of the state-of-the-art security solutions. Additionally, we discuss the current anonymity considerations in Bitcoin and the privacy-related threats to Bitcoin users along with the analysis of the existing privacy-preserving solutions. Finally, we summarize the critical open challenges, and we suggest directions for future research towards provisioning stringent security and privacy solutions for Bitcoin.

[1]  Pedro Moreno-Sanchez,et al.  CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin , 2014, ESORICS.

[2]  Ilya Aldanov CryptoNote+ , 2019, IACR Cryptol. ePrint Arch..

[3]  Yongdae Kim,et al.  Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin , 2017, CCS.

[4]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[5]  Ghassan O. Karame,et al.  Misbehavior in Bitcoin: A Study of Double-Spending and Accountability , 2015, TSEC.

[6]  Giulio Malavolta,et al.  Concurrency and Privacy with Payment-Channel Networks , 2017, IACR Cryptol. ePrint Arch..

[7]  Prateek Saxena,et al.  On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining , 2015, 2015 IEEE 28th Computer Security Foundations Symposium.

[8]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[9]  Patrick D. McDaniel,et al.  An Analysis of Anonymity in Bitcoin Using P2P Network Traffic , 2014, Financial Cryptography.

[10]  Vallipuram Muthukkumarasamy,et al.  Securing Smart Cities Using Blockchain Technology , 2016, 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS).

[11]  Michael K. Reiter,et al.  Byzantine quorum systems , 1997, STOC '97.

[12]  Masooda Bashir,et al.  What Motivates People to Use Bitcoin? , 2016, SocInfo.

[13]  Elaine Shi,et al.  Bitter to Better - How to Make Bitcoin a Better Currency , 2012, Financial Cryptography.

[14]  Jeremy Clark,et al.  SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies , 2015, 2015 IEEE Symposium on Security and Privacy.

[15]  George Danezis,et al.  Consensus in the Age of Blockchains , 2017, ArXiv.

[16]  Warren He,et al.  Proof of Luck: an Efficient Blockchain Consensus Protocol , 2016, SysTEX@Middleware.

[17]  Luke Valenta,et al.  Blindcoin: Blinded, Accountable Mixes for Bitcoin , 2015, Financial Cryptography Workshops.

[18]  T. Maugh Why buy when you can rent? , 1984, Science.

[19]  Ghassan O. Karame,et al.  Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin , 2012, IACR Cryptol. ePrint Arch..

[20]  Matthias Mettler,et al.  Blockchain technology in healthcare: The revolution starts here , 2016, 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom).

[21]  Emin Gün Sirer,et al.  (Short Paper) PieceWork: Generalized Outsourcing Control for Proofs of Work , 2017, Financial Cryptography Workshops.

[22]  Mario Gerla,et al.  Securing Vehicle to Vehicle Communications using Blockchain through Visible Light and Acoustic Side-Channels , 2017, ArXiv.

[23]  Yoad Lewenberg,et al.  Inclusive Block Chain Protocols , 2015, Financial Cryptography.

[24]  Jeremy Clark,et al.  A first look at the usability of bitcoin key management , 2018, ArXiv.

[25]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[26]  Maria Gradinariu Potop-Butucaru,et al.  ZeroBlock: Preventing Selfish Mining in Bitcoin , 2016, ArXiv.

[27]  Jeffrey S. Rosenschein,et al.  Bitcoin Mining Pools: A Cooperative Game Theoretic Analysis , 2015, AAMAS.

[28]  Miguel Castro,et al.  Practical byzantine fault tolerance and proactive recovery , 2002, TOCS.

[29]  Alex Biryukov,et al.  Deanonymisation of Clients in Bitcoin P2P Network , 2014, CCS.

[30]  Tyler Moore,et al.  Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools , 2014, Financial Cryptography Workshops.

[31]  Feng Hao,et al.  Towards Bitcoin Payment Networks , 2016, ACISP.

[32]  Aggelos Kiayias,et al.  The Bitcoin Backbone Protocol with Chains of Variable Difficulty , 2017, CRYPTO.

[33]  S A R A H M E I K L E J O H N,et al.  A Fistful of Bitcoins Characterizing Payments Among Men with No Names , 2013 .

[34]  Emin Gün Sirer,et al.  Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.

[35]  Sushmita Ruj,et al.  Bitcoin Block Withholding Attack: Analysis and Mitigation , 2017, IEEE Transactions on Information Forensics and Security.

[36]  Ethan Heilman,et al.  Blindly Signed Contracts: Anonymous On-Blockchain and Off-Blockchain Bitcoin Transactions , 2016, Financial Cryptography Workshops.

[37]  Lear Bahack,et al.  Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft) , 2013, IACR Cryptol. ePrint Arch..

[38]  Aviv Zohar,et al.  Accelerating Bitcoin's Transaction Processing. Fast Money Grows on Trees, Not Chains , 2013, IACR Cryptol. ePrint Arch..

[39]  Zeyar Aung,et al.  Investigating factors behind choosing a cryptocurrency , 2014, 2014 IEEE International Conference on Industrial Engineering and Engineering Management.

[40]  Fergal Reid,et al.  An Analysis of Anonymity in the Bitcoin System , 2011, PASSAT 2011.

[41]  Bryan Ford,et al.  Dissent: accountable anonymous group messaging , 2010, CCS '10.

[42]  Qi Wang,et al.  Anonymity for Bitcoin From Secure Escrow Address , 2018, IEEE Access.

[43]  Pramod Viswanath,et al.  Dandelion: Redesigning the Bitcoin Network for Anonymity , 2017, Proc. ACM Meas. Anal. Comput. Syst..

[44]  Chandra Adhikari,et al.  Secure Framework for Healthcare Data Management Using Ethereum-based Blockchain Technology , 2017 .

[45]  Róbert Párhonyi,et al.  Micropayment Systems , 2010, Handbook of Financial Cryptography and Security.

[46]  Ghassan O. Karame,et al.  Is Bitcoin a Decentralized Currency? , 2014, IEEE Security & Privacy.

[47]  Cristina Pérez-Solà,et al.  Privacy in Bitcoin Transactions: New Challenges from Blockchain Scalability Solutions , 2016, MDAI.

[48]  Arshdeep Bahga,et al.  Blockchain Platform for Industrial Internet of Things , 2016 .

[49]  Robert H. Deng,et al.  Fair deposits against double-spending for Bitcoin transactions , 2017, 2017 IEEE Conference on Dependable and Secure Computing.

[50]  Elaine Shi,et al.  Permacoin: Repurposing Bitcoin Work for Data Preservation , 2014, 2014 IEEE Symposium on Security and Privacy.

[51]  Maureen O'Hara,et al.  From Mining to Markets: The Evolution of Bitcoin Transaction Fees , 2018, Journal of Financial Economics.

[52]  Daniel Kraft,et al.  Difficulty control for blockchain-based consensus systems , 2016, Peer-to-Peer Netw. Appl..

[53]  Stefano Zanero,et al.  BitIodine: Extracting Intelligence from the Bitcoin Network , 2014, Financial Cryptography.

[54]  Christian Decker,et al.  Bitcoin Transaction Malleability and MtGox , 2014, ESORICS.

[55]  Kartik Nayak,et al.  Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).

[56]  Aggelos Kiayias,et al.  Proofs of Proofs of Work with Sublinear Complexity , 2016, Financial Cryptography Workshops.

[57]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[58]  Meni Rosenfeld,et al.  Analysis of Hashrate-Based Double Spending , 2014, ArXiv.

[59]  Conrad Burchert,et al.  Scalable funding of Bitcoin micropayment channel networks , 2017, Royal Society Open Science.

[60]  Adi Shamir,et al.  On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak , 2008, ICALP.

[61]  Nicolas Courtois,et al.  The Unreasonable Fundamental Incertitudes Behind Bitcoin Mining , 2013, ArXiv.

[62]  Björn Scheuermann,et al.  Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies , 2016, IEEE Communications Surveys & Tutorials.

[63]  Adi Shamir,et al.  Quantitative Analysis of the Full Bitcoin Transaction Graph , 2013, Financial Cryptography.

[64]  Michael Naehrig,et al.  Elliptic Curve Cryptography in Practice , 2014, Financial Cryptography.

[65]  S. Matthew Weinberg,et al.  On the Instability of Bitcoin Without the Block Reward , 2016, CCS.

[66]  Giuseppe Ateniese,et al.  Redactable Blockchain – or – Rewriting History in Bitcoin and Friends , 2017, 2017 IEEE European Symposium on Security and Privacy (EuroS&P).

[67]  Martin White,et al.  Internet of Things, Blockchain and Shared Economy Applications , 2016, EUSPN/ICTH.

[68]  Meni Rosenfeld,et al.  Analysis of Bitcoin Pooled Mining Reward Systems , 2011, ArXiv.

[69]  Daniel Davis Wood,et al.  ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .

[70]  Vincent Gramoli,et al.  The Balance Attack Against Proof-Of-Work Blockchains: The R3 Testbed as an Example , 2016, ArXiv.

[71]  Kerem Kaskaloglu,et al.  Near Zero Bitcoin Transaction Fees Cannot Last Forever , 2014 .

[72]  Georg Fuchsbauer,et al.  SpaceMint: A Cryptocurrency Based on Proofs of Space , 2018, ERCIM News.

[73]  Alex Pentland,et al.  Enigma: Decentralized Computation Platform with Guaranteed Privacy , 2015, ArXiv.

[74]  Aggelos Kiayias,et al.  Proof-of-Burn , 2020, IACR Cryptol. ePrint Arch..

[75]  Ariel Gabizon,et al.  Cryptocurrencies Without Proof of Work , 2014, Financial Cryptography Workshops.

[76]  Hannes Hartenstein,et al.  A simulation model for analysis of attacks on the Bitcoin peer-to-peer network , 2015, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM).

[77]  Aniket Kate,et al.  Liar, Liar, Coins on Fire!: Penalizing Equivocation By Loss of Bitcoins , 2015, CCS.

[78]  Eli Ben-Sasson,et al.  Zerocash: Decentralized Anonymous Payments from Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.

[79]  Edgar R. Weippl,et al.  The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy , 2016, Financial Cryptography.

[80]  Joshua A. Kroll,et al.  Securing Bitcoin wallets via threshold signatures , 2014 .

[81]  Donald E. Eastlake,et al.  US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF) , 2011, RFC.

[82]  Aggelos Kiayias,et al.  Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online) , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).

[83]  Sarah Meiklejohn,et al.  Privacy-Enhancing Overlays in Bitcoin , 2015, Financial Cryptography Workshops.

[84]  Christian Decker,et al.  A Fast and Scalable Payment Network with Bitcoin Duplex Micropayment Channels , 2015, SSS.

[85]  Peter Fairley,et al.  Blockchain world - Feeding the blockchain beast if bitcoin ever does go mainstream, the electricity needed to sustain it will be enormous , 2017, IEEE Spectrum.

[86]  Alex Biryukov,et al.  Bitcoin over Tor isn't a Good Idea , 2014, 2015 IEEE Symposium on Security and Privacy.

[87]  Paulo Martins,et al.  TrustZone-backed bitcoin wallet , 2017, CS2@HiPEAC.

[88]  Martijn Bastiaan,et al.  Preventing the 51%-Attack: a Stochastic Analysis of Two Phase Proof of Work in Bitcoin , 2015 .

[89]  Bart Preneel,et al.  Publish or Perish: A Backward-Compatible Defense Against Selfish Mining in Bitcoin , 2017, CT-RSA.

[90]  David Chaum,et al.  Blind Signatures for Untraceable Payments , 1982, CRYPTO.

[91]  Matthew Green,et al.  Zerocoin: Anonymous Distributed E-Cash from Bitcoin , 2013, 2013 IEEE Symposium on Security and Privacy.

[92]  Haozhang Li,et al.  Bitcoin for smart trading in smart grid , 2015, The 21st IEEE International Workshop on Local and Metropolitan Area Networks.

[93]  Pedro Moreno-Sanchez,et al.  Mixing Confidential Transactions: Comprehensive Transaction Privacy for Bitcoin , 2017, IACR Cryptol. ePrint Arch..

[94]  Tyler Moore,et al.  The impact of DDoS and other security shocks on Bitcoin currency exchanges: evidence from Mt. Gox , 2017, J. Cybersecur..

[95]  Nicolas Courtois,et al.  Could Bitcoin transactions be 100x faster? , 2014, 2014 11th International Conference on Security and Cryptography (SECRYPT).

[96]  Hubert Ritzdorf,et al.  Tampering with the Delivery of Blocks and Transactions in Bitcoin , 2015, IACR Cryptol. ePrint Arch..

[97]  Ethan Heilman,et al.  Eclipse Attacks on Bitcoin's Peer-to-Peer Network , 2015, USENIX Security Symposium.

[98]  Brian Neil Levine,et al.  Sybil-Resistant Mixing for Bitcoin , 2014, WPES.

[99]  Anthony E. Krzesinski,et al.  Increased block size and Bitcoin blockchain dynamics , 2017, 2017 27th International Telecommunication Networks and Applications Conference (ITNAC).

[100]  Aviv Zohar,et al.  Optimal Selfish Mining Strategies in Bitcoin , 2015, Financial Cryptography.

[101]  Michael O. Rabin,et al.  Transaction Protection by Beacons , 1983, J. Comput. Syst. Sci..

[102]  Jeremy Clark,et al.  Provisions: Privacy-preserving Proofs of Solvency for Bitcoin Exchanges , 2015, CCS.

[103]  Jeremy Clark,et al.  Mixcoin: Anonymity for Bitcoin with Accountable Mixes , 2014, Financial Cryptography.

[104]  Tyler Moore,et al.  Empirical Analysis of Denial-of-Service Attacks in the Bitcoin Ecosystem , 2014, Financial Cryptography Workshops.

[105]  Burton Rosenberg,et al.  Handbook of Financial Cryptography and Security , 2010 .

[106]  Aggelos Kiayias,et al.  Blockchain Mining Games , 2016, EC.

[107]  Ethan Heilman,et al.  One Weird Trick to Stop Selfish Miners: Fresh Bitcoins, A Solution for the Honest Miner (Poster Abstract) , 2014, Financial Cryptography Workshops.

[108]  Klaus Wehrle,et al.  CoinParty: Secure Multi-Party Mixing of Bitcoins , 2015, CODASPY.

[109]  Hong-Sheng Zhou,et al.  TwinsCoin: A Cryptocurrency via Proof-of-Work and Proof-of-Stake , 2018, BCC '18.

[110]  Laura Ricci,et al.  Uncovering the Bitcoin Blockchain: An Analysis of the Full Users Graph , 2016, 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA).

[111]  Qingzhong Li,et al.  A Permissioned Blockchain Framework for Supporting Instant Transaction and Dynamic Block Size , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.

[112]  Arvind Narayanan,et al.  Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security , 2016, ACNS.

[113]  Ludwig Krippahl,et al.  CONDENSER: A Graph-Based Approachfor Detecting Botnets , 2014, ArXiv.

[114]  Mauro Conti,et al.  REMI: A Reliable and Secure Multicast Routing Protocol for IoT Networks , 2017, ARES.

[115]  Ghassan O. Karame,et al.  Double-spending fast payments in bitcoin , 2012, CCS.

[116]  Nicolas Courtois,et al.  On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency , 2014, ArXiv.

[117]  Tibor Juhas The use of elliptic curves in cryptography , 2007 .

[118]  Bryan Ford,et al.  Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing , 2016, USENIX Security Symposium.

[119]  Pedro Moreno-Sanchez,et al.  P2P Mixing and Unlinkable Bitcoin Transactions , 2017, NDSS.

[120]  Holger Paul Keeler,et al.  Bitcoin blockchain dynamics: The selfish-mine strategy in the presence of propagation delay , 2015, Perform. Evaluation.

[121]  Abhi Shelat,et al.  Socially Optimal Mining Pools , 2017, WINE.

[122]  Tyler Moore,et al.  Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk , 2013, Financial Cryptography.

[123]  Kasper Bonne Rasmussen,et al.  On Bitcoin Security in the Presence of Broken Cryptographic Primitives , 2016, ESORICS.

[124]  Ethan Heilman,et al.  TumbleBit: An Untrusted Bitcoin-Compatible Anonymous Payment Hub , 2017, NDSS.

[125]  Jon Crowcroft,et al.  A survey and comparison of peer-to-peer overlay network schemes , 2005, IEEE Communications Surveys & Tutorials.

[126]  Stuart Haber,et al.  How to time-stamp a digital document , 1990, Journal of Cryptology.

[127]  Aviv Zohar,et al.  Secure High-Rate Transaction Processing in Bitcoin , 2015, Financial Cryptography.

[128]  Sunny King,et al.  PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake , 2012 .

[129]  Michael S. Kester,et al.  Bitcoin Transaction Graph Analysis , 2015, ArXiv.

[130]  Maria Gradinariu Potop-Butucaru,et al.  ZeroBlock: Timestamp-Free Prevention of Block-Withholding Attack in Bitcoin , 2016 .

[131]  Maged Hamada Ibrahim SecureCoin: A Robust Secure and Efficient Protocol for Anonymous Bitcoin Ecosystem , 2017, Int. J. Netw. Secur..

[132]  Karl J. O'Dwyer,et al.  Bitcoin mining and its energy footprint , 2014 .

[133]  Bitcoin Risk Analysis , 2014 .

[134]  Ghassan O. Karame,et al.  Evaluating User Privacy in Bitcoin , 2013, Financial Cryptography.

[135]  A. Narayanan,et al.  Securing Bitcoin wallets via a new DSA / ECDSA threshold signature scheme , 2015 .

[136]  Tim Roughgarden,et al.  Incentive Compatibility of Bitcoin Mining Pool Reward Functions , 2016, Financial Cryptography.

[137]  Aron Laszka,et al.  When Bitcoin Mining Pools Run Dry - A Game-Theoretic Analysis of the Long-Term Impact of Attacks Between Mining Pools , 2015, Financial Cryptography Workshops.

[138]  Rob Jansen,et al.  Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications , 2015, IACR Cryptol. ePrint Arch..

[139]  Christian Decker,et al.  BlueWallet: The Secure Bitcoin Wallet , 2014, STM.

[140]  Pedro Moreno-Sanchez,et al.  ValueShuffle: Mixing Confidential Transactions for Comprehensive Transaction Privacy in Bitcoin , 2017, Financial Cryptography Workshops.

[141]  Jeremy Clark,et al.  CommitCoin: Carbon Dating Commitments with Bitcoin , 2011, IACR Cryptol. ePrint Arch..

[142]  Roberto Tamassia,et al.  Bitconeview: visualization of flows in the bitcoin transaction graph , 2015, 2015 IEEE Symposium on Visualization for Cyber Security (VizSec).

[143]  Yu Zhang,et al.  An IoT electric business model based on the protocol of bitcoin , 2015, 2015 18th International Conference on Intelligence in Next Generation Networks.

[144]  Joshua A. Kroll,et al.  The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries , 2013 .

[145]  Ren Zhang Broadcasting Intermediate Blocks as a Defense Mechanism Against Selfish-Mine in Bitcoin , 2015, IACR Cryptol. ePrint Arch..

[146]  Anthony Skjellum,et al.  A brief survey of Cryptocurrency systems , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).

[147]  Alex Pentland,et al.  Decentralizing Privacy: Using Blockchain to Protect Personal Data , 2015, 2015 IEEE Security and Privacy Workshops.

[148]  Iddo Bentov,et al.  Proof of Activity: Extending Bitcoin's Proof of Work via Proof of Stake [Extended Abstract]y , 2014, PERV.

[149]  Elaine Shi,et al.  Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts , 2016, 2016 IEEE Symposium on Security and Privacy (SP).

[150]  Laurent Vanbever,et al.  Hijacking Bitcoin: Routing Attacks on Cryptocurrencies , 2016, 2017 IEEE Symposium on Security and Privacy (SP).

[151]  Xingtong Liu,et al.  Unlinkable Coin Mixing Scheme for Transaction Privacy Enhancement of Bitcoin , 2018, IEEE Access.

[152]  Ittay Eyal,et al.  The Miner's Dilemma , 2014, 2015 IEEE Symposium on Security and Privacy.

[153]  Feng Hao,et al.  Refund Attacks on Bitcoin's Payment Protocol , 2016, Financial Cryptography.

[154]  Marcin Andrychowicz,et al.  On the Malleability of Bitcoin Transactions , 2015, Financial Cryptography Workshops.

[155]  Christian Decker,et al.  Have a snack, pay with Bitcoins , 2013, IEEE P2P 2013 Proceedings.

[156]  Ralph C. Merkle,et al.  A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.

[157]  Adam Doupé,et al.  Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin , 2016, 2016 APWG Symposium on Electronic Crime Research (eCrime).

[158]  Rainer Böhme,et al.  Trends, Tips, Tolls: A Longitudinal Study of Bitcoin Transaction Fees , 2014, Financial Cryptography Workshops.

[159]  David L. Mills,et al.  Internet Engineering Task Force (ietf) Network Time Protocol Version 4: Protocol and Algorithms Specification , 2010 .

[160]  Nigel P. Smart,et al.  Lattice Attacks on Digital Signature Schemes , 2001, Des. Codes Cryptogr..

[161]  Sushmita Ruj,et al.  Retricoin: Bitcoin based on compact proofs of retrievability , 2016, ICDCN.

[162]  Albert Levi,et al.  A Survey on Anonymity and Privacy in Bitcoin-Like Digital Cash Systems , 2018, IEEE Communications Surveys & Tutorials.

[163]  George Danezis,et al.  Mixminion: design of a type III anonymous remailer protocol , 2003, 2003 Symposium on Security and Privacy, 2003..

[164]  Adam Back,et al.  Hashcash - A Denial of Service Counter-Measure , 2002 .

[165]  Arvind Narayanan,et al.  When the cookie meets the blockchain: Privacy risks of web payments via cryptocurrencies , 2017, Proc. Priv. Enhancing Technol..

[166]  Zhili Sun,et al.  Blockchain-Based Dynamic Key Management for Heterogeneous Intelligent Transportation Systems , 2017, IEEE Internet of Things Journal.

[167]  Mo Adda,et al.  Proximity Awareness Approach to Enhance Propagation Delay on the Bitcoin Peer-to-Peer Network , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).

[168]  Jeremy Clark,et al.  Buy Your Coffee with Bitcoin: Real-World Deployment of a Bitcoin Point of Sale Terminal , 2016, 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld).