Skip to main content

Cryptocurrencies Without Proof of Work

  • Conference paper
  • First Online:
Financial Cryptography and Data Security (FC 2016)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9604))

Included in the following conference series:

Abstract

We study decentralized cryptocurrency protocols in which the participants do not deplete physical scarce resources. Such protocols commonly rely on Proof of Stake, i.e., on mechanisms that extend voting power to the stakeholders of the system. We offer analysis of existing protocols that have a substantial amount of popularity. We then present our novel pure Proof of Stake protocols, and argue that they help in mitigating problems that the existing protocols exhibit.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    See http://peercoin.net/assets/paper/peercoin-paper.pdf.

  2. 2.

    More precisely, as w goes to infinity this is the limit of the probability of the event.

References

  1. Bahack, L., Courtois, N.: (2014). http://arxiv.org/abs/1402.1718

  2. Ben-Or, M., Linial, N.: Collective coin flipping. In: Micali, S. (ed.) Randomness and Computation, pp. 91–115. Academic Press, New York (1990)

    Google Scholar 

  3. Bentov, I., Lee, C., Mizrahi, A., Rosenfeld, M.: Proof of activity. In: ACM SIGMETRICS Workshop - NetEcon (2014). http://eprint.iacr.org/2014/452

    Google Scholar 

  4. Boldyreva, A.: Efficient threshold signature, multisignature and blind signature schemes based on the gap-Diffie-Hellman-group signature scheme. In: PKC2003 (2003)

    Google Scholar 

  5. Eyal, I.: The miner’s dilemma. In: 36th IEEE S&P (2015)

    Google Scholar 

  6. Eyal, I., Sirer, E.G.: Majority is not enough: bitcoin mining is vulnerable. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 431–449. Springer, Heidelberg (2014)

    Google Scholar 

  7. Garay, J., Kiayias, A., Leonardos, N.: The bitcoin backbone protocol: analysis and applications. In: Eurocryppt 2015 (2015)

    Google Scholar 

  8. Itakura, K., Nakamura, K.: A public key cryptosystem suitable for digital multisignatures. NEC Res. Dev. 71, 1–8 (1983)

    Google Scholar 

  9. Kamp, J., Zuckerman, D.: Deterministic extractors for bit-fixing sources and exposure-resilient cryptography. In: SICOMP, vol. 36 (2007)

    Google Scholar 

  10. Kroll, J., Davey, I., Felten, E.: The economics of bitcoin mining, or bitcoin in the presence of adversaries. In: 12th WEIS (2013)

    Google Scholar 

  11. Lu, S., Ostrovsky, R., Sahai, A., Shacham, H., Waters, B.: Sequential aggregate signatures. J. Cryptology 26(2), 340–373 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  12. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Bitcoin.org

  13. Micali, S., Ohta K., Reyzin, L.: Accountable-subgroup multisignatures (extended abstract). In: Proceedings of CCS 2001, pp. 245–254. ACM Press (2001)

    Google Scholar 

  14. Poelstra, A.: (2014). https://download.wpsoftware.net/bitcoin/pos.pdf

  15. Rosenfeld, M.: (2012). http://arxiv.org/abs/1402.2009

  16. User “cunicula” (2012). https://bitcointalk.org/index.php?topic=122291

  17. User “QuantumM...” (2011). https://bitcointalk.org/index.php?topic=27787

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Iddo Bentov .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 International Financial Cryptography Association

About this paper

Cite this paper

Bentov, I., Gabizon, A., Mizrahi, A. (2016). Cryptocurrencies Without Proof of Work. In: Clark, J., Meiklejohn, S., Ryan, P., Wallach, D., Brenner, M., Rohloff, K. (eds) Financial Cryptography and Data Security. FC 2016. Lecture Notes in Computer Science(), vol 9604. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-53357-4_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-53357-4_10

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-53356-7

  • Online ISBN: 978-3-662-53357-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics