BLOCKCHAIN PROTOCOL STUDY
Abstract
Blockchain has great advantages over existing payment systems (bank cards, electronic money, etc.), such as decentralization and auditing capacity. There is a wide range of blockchain applications, ranging from cryptocurrency, financial services, risk management, the Internet of things and ending with public and social services. A number of studies had focused on the use of blockchain technology in various applications. We are doing research of blockchain technology soundness. In particular, this article focuses on analyzing the safety of using a blockchain, represents typical attacks on a protocol, examines blockchain applications and discusses technical problems, as well as recent innovations in solving difficult problems. It also provides an analysis of the two most popular cryptocurrencies and smart contracts, as well as the safety problems associated with them.
References
[2] Anjana P.S., Kumari S., Peri S., Rathor S., Somani A. Entitling concurrency to smart contracts using op-timistic transactional memory. Proceedings of the 20th International Conference on Distributed Computing and Net-working (ICDCN '19). ACM, New York, NY, USA, 2019. p. 508-508. (In Eng.) DOI: 10.1145/3288599.3299723
[3] Mense A., Flatscher M. Security Vulnerabilities in Ethereum Smart Contracts. In: Indrawan-Santiago M., Pardede E., Salvadori I.L., Steinbauer M., Khalil I., Anderst-Kotsis G. (eds) Proceedings of the 20th International Conference on Information Integration and Web-based Applications & Services (iiWAS2018), ACM, New York, NY, USA, 2018. p. 375-380. (In Eng.) DOI: 10.1145/3282373.3282419
[4] Apostolaki M., Zohar A., Vanbever L. Hijacking Bitcoin: Routing Attacks on Cryptocurrencies. Proceedings of 2017 IEEE Symposium on Security and Privacy (SP). San Jose, CA, 2017. p. 375-392. (In Eng.) DOI: 10.1109/SP.2017.29
[5] Zhang F., Eyal I., Escriva R., Juels A., van Renesse R. REM: Resource-Efficient Mining for Blockchains. Proceedings of the 26th USENIX Security Symposium. Vancouver, BC, 2017. p. 1427-1444. Available at: https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-zhang.pdf (accessed 19.01.2019). (In Eng.)
[6] Zhou Y., Kumar D., Bakshi S., Mason J., Miller A., Bailey M. Erays: Reverse Engineering Ethereum’s Opaque Smart Contracts. Proceedings of the 27th USENIX Security Symposium. August 15-17, 2018. Baltimore, MD, USA, 2018. p. 1371-1385. Available at: https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-zhou.pdf (accessed 19.01.2019). (In Eng.)
[7] Frantz C.K., Nowostawski M. From Institutions to Code: Towards Automated Generation of Smart Contracts. Proceedings of 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W). Augsburg, 2016. p. 210-215. (In Eng.) DOI: 10.1109/FAS-W.2016.53
[8] Johnson D., Menezes A., Vanstone S. The Elliptic Curve Digital Signature Algorithm (ECDSA). International Journal of Information Security. 2001; 1(1):36-63. (In Eng.) DOI: 10.1007/s102070100002
[9] Nakamoto S. Bitcoin: A Peer-to-Peer Electronic Cash System. Cryptography Mailing list. 2009; 3:1-9. Available at: https://bitcoin.org/bitcoin.pdf (accessed 19.01.2019). (In Eng.)
[10] Pérez-Solà C., Delgado-Segura S., Navarro-Arribas G., Herrera-Joancomartí J. Double-spending prevention for Bitcoin zero-confirmation transactions. International Journal of Information Security. 2018. p. 1-13. (In Eng.) DOI: 10.1007/s10207-018-0422-4
[11] Narayanan A., Bonneau J., Felten E., Miller A., Goldfeder S. Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction. Princeton University Press, Princeton, NJ, USA, 2016. Available at: https://www.lopp.net/pdf/princeton_bitcoin_book.pdf (accessed 19.01.2019). (In Eng.)
[12] Whitman M.E., Mattord H.J. Readings and Cases in Information Security: Law and Ethics. Cengage Learning, 2010. (In Eng.)
[13] Merkle Signatures for Real-World Use. Available at: http://www.mit.edu/~rio/merkle.pdf (accessed 19.01.2019). (In Eng.)
[14] Back A. Hashcash A Denial of Service Counter-Measure. 2002. Available at: http://www.hashcash.org/hashcash (accessed 19.01.2019). (In Eng.)
![Creative Commons License](http://i.creativecommons.org/l/by/4.0/88x31.png)
This work is licensed under a Creative Commons Attribution 4.0 International License.
Publication policy of the journal is based on traditional ethical principles of the Russian scientific periodicals and is built in terms of ethical norms of editors and publishers work stated in Code of Conduct and Best Practice Guidelines for Journal Editors and Code of Conduct for Journal Publishers, developed by the Committee on Publication Ethics (COPE). In the course of publishing editorial board of the journal is led by international rules for copyright protection, statutory regulations of the Russian Federation as well as international standards of publishing.
Authors publishing articles in this journal agree to the following: They retain copyright and grant the journal right of first publication of the work, which is automatically licensed under the Creative Commons Attribution License (CC BY license). Users can use, reuse and build upon the material published in this journal provided that such uses are fully attributed.