On BlockChain Technology: Overview of Bitcoin and Future Insights

In this paper, we consider blockchain technology that enabledthe existence of digital currency and we investigate Bitcoin cryptocurrency application. This technology nowadays represents a new feature that replaces existing client-server core system on top of some distributed systems with many additional features such as high availability, resistance to alteration, fault tolerance and cost reduction. After overviewing how such technology is working, we highlightthe requirements and benefits related to the security, database and network. We mainly focus on answering the most Bitcoin queries including privacy and double spending. Furthermore, as blockchain has potential applications far beyond bitcoin, we draw future insights where applications based blockchain are provisioned in the market in order to be totally or partially independent of the centralized systems and we provide a questionnaire helping organizations for better using the blockchain feasibilities.

[1]  Michael Naehrig,et al.  Elliptic Curve Cryptography in Practice , 2014, Financial Cryptography.

[2]  Ralph C. Merkle,et al.  A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.

[3]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[4]  A. Narayanan,et al.  Securing Bitcoin wallets via a new DSA / ECDSA threshold signature scheme , 2015 .

[5]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[6]  Leslie Lamport,et al.  The part-time parliament , 1998, TOCS.

[7]  Joshua A. Kroll,et al.  The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries , 2013 .

[8]  Michael S. Kester,et al.  Bitcoin Transaction Graph Analysis , 2015, ArXiv.

[9]  Nicolas Courtois,et al.  On The Longest Chain Rule and Programmed Self-Destruction of Crypto Currencies , 2014, ArXiv.

[10]  Joshua A. Kroll,et al.  Securing Bitcoin wallets via threshold signatures , 2014 .

[11]  Fergal Reid,et al.  An Analysis of Anonymity in the Bitcoin System , 2011, PASSAT 2011.

[12]  Victor S. Miller,et al.  Use of Elliptic Curves in Cryptography , 1985, CRYPTO.

[13]  .. Massias,et al.  DESIGN OF A SECURE TIMESTAMPING SERVICEWITH MINIMAL TRUST REQUIREMENTH , 1999 .

[14]  Christian Decker,et al.  BlueWallet: The Secure Bitcoin Wallet , 2014, STM.

[15]  Adi Shamir,et al.  Quantitative Analysis of the Full Bitcoin Transaction Graph , 2013, Financial Cryptography.

[16]  Adam Back,et al.  Hashcash - A Denial of Service Counter-Measure , 2002 .

[17]  Ralph C. Merkle,et al.  Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.

[18]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[19]  Ronald L. Rivest,et al.  Peppercoin Micropayments , 2004, Financial Cryptography.

[20]  Berry Schoenmakers,et al.  Security Aspects of the EcashTM Payment System , 1997, State of the Art in Applied Cryptography.

[21]  Michael K. Reiter,et al.  Byzantine quorum systems , 1997, STOC '97.

[22]  Dennis Shasha,et al.  The many faces of consensus in distributed systems , 1992, Computer.