Abstract
Although smart contracts are Turing complete, it is a misconception that they can fulfill all routine contracts.
- Ahmed, M., Wei, J., Wang, Y., and Al-Shaer, E. A poisoning attack against cryptocurrency mining pools. In Data Privacy Management, Cryptocurrencies and Blockchain Technology. Springer, 2018, 140--154.Google Scholar
- Androulaki, E., Karame, G.O., Roeschlin, M., Scherer, T., and Capkun, S. Evaluating user privacy in Bitcoin. In Proceedings of the International Conference on Financial Cryptography and Data Security. Springer, 2013, 34--51.Google ScholarCross Ref
- Blum, M. Coin flipping by telephone a protocol for solving impossible problems. ACM SIGACT News, 15, 1 (1983), 23--27. Google ScholarDigital Library
- Chaum, D. Blind signatures for untraceable payments. In Proceedings of Crypto. Springer, 1983, 199--203.Google Scholar
- Chaum, D., Fiat, A., Naor, M. Untraceable electronic cash. In Proceedings of Crypto. Springer-Verlag, New York, 1990, 319--327. Google ScholarDigital Library
- Cleve, R. Limits on the security of coin flips when half the processors are faulty. In Proceedings of 18<sup>th</sup> ACM Symposium on Theory of Computing. ACM, 1986, 364--369. Google ScholarDigital Library
- Eyal, I., Sirer, E.G. Majority is not enough: Bitcoin mining is vulnerable. In Proceedings of the International Conference on Financial Cryptography and Data Security. Springer, 2014, 436--454.Google ScholarCross Ref
- Moore, T. and Christin, N. Beware the middleman: Empirical analysis of Bitcoin-exchange risk. In Proceedings of the International Conference on Financial Cryptography and Data Security. Springer, 2013, 25--33.Google ScholarCross Ref
- Moser, M., Bohme, R., and Breuker, D. An inquiry into money-laundering tools in the Bitcoin ecosystem. In eCrime Researchers Summit. IEEE, 2013, 1--14.Google Scholar
- Nakamoto, S. Bitcoin: A peer-to-peer electronic cash system, 2008; https://bitcoin.org/bitcoin.pdfGoogle Scholar
- Ober, M., Katzenbeisser, S., and Hamacher, K. Structure and anonymity of the Bitcoin transaction graph. Future Internet 5, 2 (2013), 237--250.Google ScholarCross Ref
- Rivest, R.L. and Shamir, A. PayWord and MicroMint: Two simple micropayment schemes. In Proceedings of the International Workshop on Security Protocols. Springer, 1996, 69--87. Google ScholarDigital Library
- Trump, D. I will release my tax returns when Obama releases his birth certificate. 2011; http://www.businessinsider.com/donald-trump-tax-returns-obama-birth-certificate-2011-4Google Scholar
Index Terms
- The limit of blockchains: infeasibility of a smart Obama-Trump contract
Recommendations
Exploiting smart contracts in PBFT-based blockchains: A case study in medical prescription system
AbstractSmart contracts allow application developers to automate business processes through a decentralized computation architecture. Contemporary blockchain platforms such as Ethereum and Hyperledger Fabric offer support for smart contracts ...
Pervasive Smart Contracts for Blockchains in IoT Systems
ICBTA '18: Proceedings of the 2018 International Conference on Blockchain Technology and ApplicationThanks to its decentralized structure and immutability, blockchain technology has the potential to address relevant security and privacy challenges in the Internet of Things (IoT). In particular, by hosting and executing smart contracts, blockchain ...
On Consensus in Public Blockchains
ICBCT 2019: Proceedings of the 2019 International Conference on Blockchain TechnologyIn this paper, we formulate the consensus problem and its solutions as seen in public blockchains and contrast them to those of the traditional distributed consensus. The Proof of Work (PoW) algorithm introduced in Bitcoin provides the first elegant and ...
Comments