10.02.2016 Views

Bitcoin and Cryptocurrency Technologies

1Qqc4BN

1Qqc4BN

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Further reading<br />

The <strong>Bitcoin</strong> whitepaper:<br />

Nakamoto, Satoshi. ​<strong>Bitcoin</strong>: A peer‐to‐peer electronic cash system​. (2008)<br />

The original application of proof‐of‐work:<br />

Back, Adam. ​Hashcash‐a denial of service counter‐measure​.​(2002)<br />

The Paxos algorithm for consensus:<br />

Lamport, Leslie. ​Paxos made simple​.​ACM Sigact News 32.4 (2001): 18‐25.<br />

Exercises<br />

2<br />

1. Why do miners run “full nodes” that keep track of the entire block chain whereas Bob the<br />

merchant can get away with a “lite node” that implements “simplified payment verification,” needing<br />

to examine only the last few blocks?<br />

2. If a malicious ISP completely controls a user’s connections, can it launch a double‐spend attack<br />

against the user? How much computational effort would this take?<br />

3. Consider Bob the merchant deciding whether or not to accept the C​ A​<br />

→ B transaction. What Bob is<br />

really interested in is whether or not the other chain will catch up. Why, then, does he simply check<br />

how many confirmations C​ A​<br />

→ B has received, instead of computing the difference in length between<br />

the two chains?<br />

2<br />

This only applies to “solo” miners who’re not part of a mining pool, but we haven’t discussed that yet.<br />

73

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!