skip to main content
research-article
Free Access

The limit of blockchains: infeasibility of a smart Obama-Trump contract

Published:24 April 2019Publication History
Skip Abstract Section

Abstract

Although smart contracts are Turing complete, it is a misconception that they can fulfill all routine contracts.

References

  1. Ahmed, M., Wei, J., Wang, Y., and Al-Shaer, E. A poisoning attack against cryptocurrency mining pools. In Data Privacy Management, Cryptocurrencies and Blockchain Technology. Springer, 2018, 140--154.Google ScholarGoogle Scholar
  2. Androulaki, E., Karame, G.O., Roeschlin, M., Scherer, T., and Capkun, S. Evaluating user privacy in Bitcoin. In Proceedings of the International Conference on Financial Cryptography and Data Security. Springer, 2013, 34--51.Google ScholarGoogle ScholarCross RefCross Ref
  3. Blum, M. Coin flipping by telephone a protocol for solving impossible problems. ACM SIGACT News, 15, 1 (1983), 23--27. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Chaum, D. Blind signatures for untraceable payments. In Proceedings of Crypto. Springer, 1983, 199--203.Google ScholarGoogle Scholar
  5. Chaum, D., Fiat, A., Naor, M. Untraceable electronic cash. In Proceedings of Crypto. Springer-Verlag, New York, 1990, 319--327. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Cleve, R. Limits on the security of coin flips when half the processors are faulty. In Proceedings of 18<sup>th</sup> ACM Symposium on Theory of Computing. ACM, 1986, 364--369. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Eyal, I., Sirer, E.G. Majority is not enough: Bitcoin mining is vulnerable. In Proceedings of the International Conference on Financial Cryptography and Data Security. Springer, 2014, 436--454.Google ScholarGoogle ScholarCross RefCross Ref
  8. Moore, T. and Christin, N. Beware the middleman: Empirical analysis of Bitcoin-exchange risk. In Proceedings of the International Conference on Financial Cryptography and Data Security. Springer, 2013, 25--33.Google ScholarGoogle ScholarCross RefCross Ref
  9. Moser, M., Bohme, R., and Breuker, D. An inquiry into money-laundering tools in the Bitcoin ecosystem. In eCrime Researchers Summit. IEEE, 2013, 1--14.Google ScholarGoogle Scholar
  10. Nakamoto, S. Bitcoin: A peer-to-peer electronic cash system, 2008; https://bitcoin.org/bitcoin.pdfGoogle ScholarGoogle Scholar
  11. Ober, M., Katzenbeisser, S., and Hamacher, K. Structure and anonymity of the Bitcoin transaction graph. Future Internet 5, 2 (2013), 237--250.Google ScholarGoogle ScholarCross RefCross Ref
  12. Rivest, R.L. and Shamir, A. PayWord and MicroMint: Two simple micropayment schemes. In Proceedings of the International Workshop on Security Protocols. Springer, 1996, 69--87. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Trump, D. I will release my tax returns when Obama releases his birth certificate. 2011; http://www.businessinsider.com/donald-trump-tax-returns-obama-birth-certificate-2011-4Google ScholarGoogle Scholar

Index Terms

  1. The limit of blockchains: infeasibility of a smart Obama-Trump contract

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image Communications of the ACM
              Communications of the ACM  Volume 62, Issue 5
              May 2019
              83 pages
              ISSN:0001-0782
              EISSN:1557-7317
              DOI:10.1145/3328504
              Issue’s Table of Contents

              Copyright © 2019 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 24 April 2019

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article
              • Popular
              • Refereed

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            HTML Format

            View this article in HTML Format .

            View HTML Format