Beyond Bitcoin - Part I: A critical look at blockchain-based systems

After more than six years from the launch of Bitcoin, it has become evident that the decentralized transaction ledger functionality implemented through the blockchain technology can be used not only for cryptocurrencies, but to register, confirm and transfer any kind of contract and property. In this work we analyze the most relevant functionalities and known issues of this technology, with the intent of pointing out the possible behaviours that are not as efficient as they should when t with a broader outlook. Our analysis would be the starting point for the

[1]  Moni Naor,et al.  Pricing via Processing or Combatting Junk Mail , 1992, CRYPTO.

[2]  Melanie Swan,et al.  Blockchain: Blueprint for a New Economy , 2015 .

[3]  H. Viswanathan,et al.  THE FUTURE of THE INTERNET of THINGS , 2016 .

[4]  Ralph C. Merkle,et al.  A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.

[5]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[6]  R. Weber Internet Corporation For Assigned Names And Numbers , 2010 .

[7]  Alfred Menezes,et al.  The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.

[8]  Colin Percival STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS , 2009 .

[9]  Russ Housley,et al.  Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2002, RFC.

[10]  Primavera De Filippi,et al.  Decentralized Blockchain Technology and the Rise of Lex Cryptographia , 2015 .

[11]  A. Takura,et al.  A secure and trusted time stamping authority , 1999, 1999 Internet Workshop. IWS99. (Cat. No.99EX385).

[12]  Sunny King,et al.  PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake , 2012 .

[13]  Bart Preneel,et al.  RIPEMD-160: A Strengthened Version of RIPEMD , 1996, FSE.

[14]  Nick Szabo,et al.  Formalizing and Securing Relationships on Public Networks , 1997, First Monday.

[15]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[16]  David Cooper,et al.  Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2008, RFC.

[17]  Carl E. Landwehr,et al.  Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.

[18]  Markus Jakobsson,et al.  Proofs of Work and Bread Pudding Protocols , 1999, Communications and Multimedia Security.

[19]  G. Laccetti,et al.  Brute force attacks on hash functions , 2007 .

[20]  Hermann Kopetz,et al.  Real-time systems , 2018, CSC '73.

[21]  Phillip Rogaway,et al.  Nonce-Based Symmetric Encryption , 2004, FSE.

[22]  Meni Rosenfeld,et al.  Analysis of Hashrate-Based Double Spending , 2014, ArXiv.