Beruflich Dokumente
Kultur Dokumente
01) 653
Figure 6: Hard Fork happens because the old node veri- Figure 8: Soft Fork happens because the new node verifi-
fication requirement is much stricter than the new node cation requirement is much stricter than the old node
on the network can pay any other peer even if they don’t [3] N. T. Courtois and L. Bahack, “On subversive miner
directly have a channel open between each other. strategies and block withholding attack in bitcoin
digital currency,” CoRR, vol. abs/1402.1718, 2014.
[4] I. Eyal and E. G. Sirer, “Majority is not
4.5 Current Regulations Problems
enough: Bitcoin mining is vulnerable,” CoRR,
Use Biction for example, the characteristics of decentral- vol. abs/1311.0243, 2013.
ized system, will weak the central bank’s ability to con- [5] J. Garay, A. Kiayias, and N. Leonardos, The Bit-
trol the economic policy and the amount of money, that coin Backbone Protocol: Analysis and Applications,
makes government be cautious of blockchain technologies, pp. 281–310, Springer Berlin Heidelberg, Berlin, Hei-
authorities have to research this new issue, accelerate for- delberg, 2015.
mulating new policy, otherwise it will have risk on the [6] A. Gervais, G. O. Karame, V. Capkun, and S. Cap-
market. kun, “Is bitcoin a decentralized currency?,” IEEE
Security Privacy, vol. 12, pp. 54–60, May 2014.
4.6 Integrated Cost Problem [7] A. Gervais, G. O. Karame, K. Wüst, V. Glykantzis,
H. Ritzdorf, and S. Capkun, “On the security and
Of course it will have lot of cost including time and money performance of proof of work blockchains,” in Pro-
to change existing system, especially when it’s an infras- ceedings of ACM SIGSAC Conference on Computer
tructure. We have to make sure this innovative technology and Communications Security (CCS’16), pp. 3–16,
not only create economic benefits, meet the requirements New York, NY, USA, 2016.
of supervision, but also bridge with traditional organi- [8] A. Gervais, H. Ritzdorf, G. O. Karame, and S. Cap-
zation, and it always encounter difficulties from internal kun, “Tampering with the delivery of blocks and
organization which is existing now. transactions in bitcoin,” in Proceedings of the 22Nd
ACM SIGSAC Conference on Computer and Com-
munications Security (CCS’15), pp. 692–705, New
5 Conclusions York, NY, USA, 2015.
[9] E. Heilman, A. Kendler, A. Zohar, and S. Goldberg,
There’s no doubt that blockchain is a hot issue in recent “Eclipse attacks on bitcoin’s peer-to-peer network,”
years, although it has some topics we need to notice, some in 24th USENIX Security Symposium, pp. 129–144,
problems has already been improved along with new tech- Washington, D.C., 2015.
nique’s developing on application side, getting more and [10] G. Karame, “On the security and scalability of bit-
more mature and stable. coin’s blockchain,” in Proceedings of ACM SIGSAC
The government have to make corresponding laws for Conference on Computer and Communications Secu-
this technology, and enterprise should ready for embrace rity (CCS’16), pp. 1861–1862, New York, NY, USA,
blockchain technologies, preventing it brings too much im- 2016.
pact to current system. [11] G. O. Karame, “Two bitcoins at the price of one?
When we enjoy in the advantage of blockchain tech- double-spending attacks on fast payments in bit-
nologies bring to us, in the same time, we still have to coin,” in Proceedings of Conference on Computer and
stay cautious on its influence and security issues that it Communication Security, pp. 1–17, 2012.
could be have. [12] S. King and S. Nadal, Ppcoin: Peer-to-peer
Crypto-Currency with Proof-of-Stake, 2012.
(https://archive.org/stream/PPCoinPaper/
Acknowledgments ppcoin-paper_djvu.txt)
This study was supported by the National Science Council [13] A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Pa-
of Taiwan under grant NSC 105-2410-H-005 -023 -MY2. pamanthou, “Hawk: The blockchain model of cryp-
The authors gratefully acknowledge the anonymous re- tography and privacy-preserving smart contracts,”
viewers for their valuable comments. in 2016 IEEE Symposium on Security and Privacy
(SP’16), pp. 839–858, May 2016.
[14] L. Luu, V. Narayanan, C. Zheng, K. Baweja, S.
References Gilbert, and P. Saxena, “A secure sharding proto-
col for open blockchains,” in Proceedings of ACM
[1] I. Bentov, A. Gabizon, and A. Mizrahi, “Cryp- SIGSAC Conference on Computer and Communica-
tocurrencies without proof of work,” CoRR, tions Security (CCS’16), pp. 17–30, New York, NY,
vol. abs/1406.5694, 2014. USA, 2016.
[2] J. Bonneau, A. Miller, J. Clark, A. Narayanan, J. A. [15] S. Nakamoto, Bitcoin: A Peer-to-Peer Electronic
Kroll, and E. W. Felten, “Sok: Research perspectives Cash System, Feb. 24, 2013. (http://bitcoin.org/
and challenges for bitcoin and cryptocurrencies,” in bitcoin.pdf)
IEEE Symposium on Security and Privacy, pp. 104– [16] E. U. Opara, O. A. Soluade, “Straddling the next
121, May 2015. cyber frontier: The empirical analysis on network
International Journal of Network Security, Vol.19, No.5, PP.653-659, Sept. 2017 (DOI: 10.6633/IJNS.201709.19(5).01) 659