A brief survey of Cryptocurrency systems

Cryptocurrencies have emerged as important financial software systems. They rely on a secure distributed ledger data structure; mining is an integral part of such systems. Mining adds records of past transactions to the distributed ledger known as Blockchain, allowing users to reach secure, robust consensus for each transaction. Mining also introduces wealth in the form of new units of currency. Cryptocurrencies lack a central authority to mediate transactions because they were designed as peer-to-peer systems. They rely on miners to validate transactions. Cryptocurrencies require strong, secure mining algorithms. In this paper we survey and compare and contrast current mining techniques as used by major Cryptocurrencies. We evaluate the strengths, weaknesses, and possible threats to each mining strategy. Overall, a perspective on how Cryptocurrencies mine, where they have comparable performance and assurance, and where they have unique threats and strengths are outlined.

[1]  D. Chaum David Chaum on Electronic Commerce How much do you trust Big Brother? , 1997, IEEE Internet Computing.

[2]  Adam Back,et al.  Hashcash - A Denial of Service Counter-Measure , 2002 .

[3]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[4]  Helena Handschuh,et al.  Security Analysis of SHA-256 and Sisters , 2003, Selected Areas in Cryptography.

[5]  Thomas Shrimpton,et al.  Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance , 2004, FSE.

[6]  Odysseas G. Koufopavlou,et al.  Implementation of the SHA-2 Hash Family Standard Using FPGAs , 2005, The Journal of Supercomputing.

[7]  Thomas R. Eisenmann,et al.  PayPal Merchant Services , 2006 .

[8]  Brian Neil Levine,et al.  A Survey of Solutions to the Sybil Attack , 2006 .

[9]  E. Biham,et al.  The SHAvite-3 Hash Function , 2008 .

[10]  Stefan Lucks,et al.  The Skein Hash Function Family , 2009 .

[11]  Colin Percival STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS , 2009 .

[12]  Steffen Reith,et al.  On Optimized FPGA Implementations of the SHA-3 Candidate Groestl , 2009, IACR Cryptol. ePrint Arch..

[13]  Hongjun Wu,et al.  The Hash Function JH , 2009 .

[14]  Martin Feldhofer,et al.  High-Speed Hardware Implementations of BLAKE, Blue Midnight Wish, CubeHash, ECHO, Fugue, Gröstl, Hamsi, JH, Keccak, Luffa, Shabal, SHAvite-3, SIMD, and Skein , 2009, IACR Cryptol. ePrint Arch..

[15]  Martin Schläffer Subspace Distinguisher for 5/8 Rounds of the ECHO-256 Hash Function , 2010, Selected Areas in Cryptography.

[16]  Mohamed El-Hadedy,et al.  Resource-efficient implementation of Blue Midnight Wish-256 hash function on Xilinx FPGA platform , 2010, 2010 Sixth International Conference on Information Assurance and Security.

[17]  Tecnica,et al.  Application-specific Integrated Circuit , 2010 .

[18]  W. Jack,et al.  Mobile Money: The Economics of M-Pesa , 2011 .

[19]  Sunny King,et al.  PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake , 2012 .

[20]  Samuel Neves,et al.  BLAKE2: Simpler, Smaller, Fast as MD5 , 2013, ACNS.

[21]  William J. Luther Cryptocurrencies, Network Effects, and Switching Costs , 2013 .

[22]  David Kuo Chuen Lee The Cryptocurrency Revolution and its Impact , 2014 .

[23]  Nicolas Courtois,et al.  Optimizing SHA256 in Bitcoin Mining , 2014, CSS.

[24]  Iddo Bentov,et al.  Proof of Activity: Extending Bitcoin's Proof of Work via Proof of Stake [Extended Abstract]y , 2014, PERV.

[25]  Karl J. O'Dwyer,et al.  Bitcoin mining and its energy footprint , 2014 .

[26]  David Schwartz,et al.  The Ripple Protocol Consensus Algorithm , 2014 .

[27]  Daniel Davis Wood,et al.  ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .

[28]  Elaine Shi,et al.  Permacoin: Repurposing Bitcoin Work for Data Preservation , 2014, 2014 IEEE Symposium on Security and Privacy.

[29]  Vitalik Buterin A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .

[30]  Arvind Narayanan,et al.  An Empirical Study of Namecoin and Lessons for Decentralized Namespace Design , 2015, WEIS.

[31]  Melanie Swan,et al.  Blockchain: Blueprint for a New Economy , 2015 .

[32]  Ryan Farell,et al.  An Analysis of the Cryptocurrency Industry , 2015 .

[33]  Simon Josefsson,et al.  The scrypt Password-Based Key Derivation Function , 2016, RFC.

[34]  Sanjay Jain,et al.  When Cryptocurrencies Mine Their Own Business , 2016, Financial Cryptography.

[35]  William J. Luther Cryptocurrencies, Network Effects, and Switching Costs , 2016 .

[36]  Oliver Hinz,et al.  Blockchain , 2020, Bus. Inf. Syst. Eng..

[37]  H. Sherman,et al.  Principles of Macroeconomics , 2018 .