BLOCKCHAIN PROTOCOL STUDY

Abstract

Blockchain has great advantages over existing payment systems (bank cards, electronic money, etc.), such as decentralization and auditing capacity. There is a wide range of blockchain applications, ranging from cryptocurrency, financial services, risk management, the Internet of things and ending with public and social services. A number of studies had focused on the use of blockchain technology in various applications. We are doing research of blockchain technology soundness. In particular, this article focuses on analyzing the safety of using a blockchain, represents typical attacks on a protocol, examines blockchain applications and discusses technical problems, as well as recent innovations in solving difficult problems. It also provides an analysis of the two most popular cryptocurrencies and smart contracts, as well as the safety problems associated with them.

Author Biography

Ruslan Radjabovich Giliazov, Lomonosov Moscow State University

Researcher, Department of Information Security, Faculty of Computational Mathematics and Cybernetics

References

[1] Bonneau J., Miller A., Clark J., Narayanan A., Kroll J., Felten E.W. SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies. Proceedings of 2015 IEEE Symposium on Security and Privacy. San Jose, CA, 2015. p. 104-121. (In Eng.) DOI: 10.1109/SP.2015.14
[2] Anjana P.S., Kumari S., Peri S., Rathor S., Somani A. Entitling concurrency to smart contracts using op-timistic transactional memory. Proceedings of the 20th International Conference on Distributed Computing and Net-working (ICDCN '19). ACM, New York, NY, USA, 2019. p. 508-508. (In Eng.) DOI: 10.1145/3288599.3299723
[3] Mense A., Flatscher M. Security Vulnerabilities in Ethereum Smart Contracts. In: Indrawan-Santiago M., Pardede E., Salvadori I.L., Steinbauer M., Khalil I., Anderst-Kotsis G. (eds) Proceedings of the 20th International Conference on Information Integration and Web-based Applications & Services (iiWAS2018), ACM, New York, NY, USA, 2018. p. 375-380. (In Eng.) DOI: 10.1145/3282373.3282419
[4] Apostolaki M., Zohar A., Vanbever L. Hijacking Bitcoin: Routing Attacks on Cryptocurrencies. Proceedings of 2017 IEEE Symposium on Security and Privacy (SP). San Jose, CA, 2017. p. 375-392. (In Eng.) DOI: 10.1109/SP.2017.29
[5] Zhang F., Eyal I., Escriva R., Juels A., van Renesse R. REM: Resource-Efficient Mining for Blockchains. Proceedings of the 26th USENIX Security Symposium. Vancouver, BC, 2017. p. 1427-1444. Available at: https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-zhang.pdf (accessed 19.01.2019). (In Eng.)
[6] Zhou Y., Kumar D., Bakshi S., Mason J., Miller A., Bailey M. Erays: Reverse Engineering Ethereum’s Opaque Smart Contracts. Proceedings of the 27th USENIX Security Symposium. August 15-17, 2018. Baltimore, MD, USA, 2018. p. 1371-1385. Available at: https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-zhou.pdf (accessed 19.01.2019). (In Eng.)
[7] Frantz C.K., Nowostawski M. From Institutions to Code: Towards Automated Generation of Smart Contracts. Proceedings of 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W). Augsburg, 2016. p. 210-215. (In Eng.) DOI: 10.1109/FAS-W.2016.53
[8] Johnson D., Menezes A., Vanstone S. The Elliptic Curve Digital Signature Algorithm (ECDSA). International Journal of Information Security. 2001; 1(1):36-63. (In Eng.) DOI: 10.1007/s102070100002
[9] Nakamoto S. Bitcoin: A Peer-to-Peer Electronic Cash System. Cryptography Mailing list. 2009; 3:1-9. Available at: https://bitcoin.org/bitcoin.pdf (accessed 19.01.2019). (In Eng.)
[10] Pérez-Solà C., Delgado-Segura S., Navarro-Arribas G., Herrera-Joancomartí J. Double-spending prevention for Bitcoin zero-confirmation transactions. International Journal of Information Security. 2018. p. 1-13. (In Eng.) DOI: 10.1007/s10207-018-0422-4
[11] Narayanan A., Bonneau J., Felten E., Miller A., Goldfeder S. Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction. Princeton University Press, Princeton, NJ, USA, 2016. Available at: https://www.lopp.net/pdf/princeton_bitcoin_book.pdf (accessed 19.01.2019). (In Eng.)
[12] Whitman M.E., Mattord H.J. Readings and Cases in Information Security: Law and Ethics. Cengage Learning, 2010. (In Eng.)
[13] Merkle Signatures for Real-World Use. Available at: http://www.mit.edu/~rio/merkle.pdf (accessed 19.01.2019). (In Eng.)
[14] Back A. Hashcash A Denial of Service Counter-Measure. 2002. Available at: http://www.hashcash.org/hashcash (accessed 19.01.2019). (In Eng.)
Published
2019-04-19
How to Cite
GILIAZOV, Ruslan Radjabovich. BLOCKCHAIN PROTOCOL STUDY. Modern Information Technologies and IT-Education, [S.l.], v. 15, n. 1, p. 190-199, apr. 2019. ISSN 2411-1473. Available at: <http://sitito.cs.msu.ru/index.php/SITITO/article/view/508>. Date accessed: 03 july 2024. doi: https://doi.org/10.25559/SITITO.15.201901.190-199.
Section
Research and development in the field of new IT and their applications