2018 Crypto Valley Conference on Blockchain Technology (CVCBT)

20-22 June 2018

Filter Results

Displaying Results 1 - 22 of 22
  • [Title page i]

    Publication Year: 2018, Page(s): 1
    Request permission for reuse | PDF file iconPDF (101 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2018, Page(s): 3
    Request permission for reuse | PDF file iconPDF (138 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2018, Page(s): 4
    Request permission for reuse | PDF file iconPDF (119 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2018, Page(s):5 - 6
    Request permission for reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2018, Page(s): 7
    Request permission for reuse | PDF file iconPDF (33 KB)
    Freely Available from IEEE
  • A Scale-Out Blockchain for Value Transfer with Spontaneous Sharding

    Publication Year: 2018, Page(s):1 - 10
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (220 KB) | HTML iconHTML

    Bitcoin, as well as many of its successors, require the whole transaction record to be reliably acquired by all nodes to prevent double-spending. Recently, many blockchains have been proposed to achieve scale-out throughput by letting nodes only acquire a fraction of the whole transaction set. However, these schemes, e.g., sharding and off-chain techniques, suffer from a degradation in decentraliz... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IDMoB: IoT Data Marketplace on Blockchain

    Publication Year: 2018, Page(s):11 - 19
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (631 KB) | HTML iconHTML

    Today, Internet of Things (IoT) devices are the powerhouse of data generation with their ever-increasing numbers and widespread penetration. Similarly, artificial intelligence (AI) and machine learning (ML) solutions are getting integrated to all kinds of services, making products significantly more "smarter". The centerpiece of these technologies is "data". IoT device vendors should be able keep ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transaction Propagation on Permissionless Blockchains: Incentive and Routing Mechanisms

    Publication Year: 2018, Page(s):20 - 30
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (610 KB) | HTML iconHTML

    Existing permissionless blockchain solutions rely on peer-to-peer propagation mechanisms, where nodes in a network transfer transaction they received to their neighbors. Unfortunately, there is no explicit incentive for such transaction propagation. Therefore, existing propagation mechanisms will not be sustainable in a fully decentralized blockchain with rational nodes. In this work, we formally ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Selective Blockchain Transaction Pruning and State Derivability

    Publication Year: 2018, Page(s):31 - 40
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (250 KB) | HTML iconHTML

    Distributed ledger technologies, such as blockchain systems, have in recent years emerged as promising platforms for machine-to-machine commerce and other forms of multi-stakeholder applications. However, despite the potential demonstrated by projects such as Bitcoin, Ethereum, and Hyperledger Fabric, the disk space typically required to host a copy of a ledger may be prohibitively large for many ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Blockchain Based Protocol for Economical Communication in Industry 4.0

    Publication Year: 2018, Page(s):41 - 44
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (115 KB) | HTML iconHTML

    The article presents the architecture of communication protocol for modern industrial processes and business based on cyber-physical systems - Industry 4.0. The main attention is paid to one of the key trends of this concept - to economical autonomous agents i.e. to robots or smart things, which are able to make decisions independently about their economic actions. Agents begin to fully participat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Do you Need a Blockchain?

    Publication Year: 2018, Page(s):45 - 54
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (157 KB) | HTML iconHTML

    Blockchain is being praised as a technological innovation which allows to revolutionize how society trades and interacts. This reputation is in particular attributable to its properties of allowing mutually mistrusting entities to exchange financial value and interact without relying on a trusted third party. A blockchain moreover provides an integrity protected data storage and allows to provide ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Smart Contracts Using Blockly: Representing a Purchase Agreement Using a Graphical Programming Language

    Publication Year: 2018, Page(s):55 - 64
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (316 KB) | HTML iconHTML

    This research addresses the issue that in-depth programming knowhow is needed to read and write smart contracts. The goal was making the creation of smart contracts accessible to non-computer experts by the use of a graphical programming language (Blockly). We used modularization to capture the complexity of legal contracts and developed a mapping process to transform the graphical representation ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Characterization of Hyperledger Fabric

    Publication Year: 2018, Page(s):65 - 74
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (399 KB) | HTML iconHTML

    Hyperledger Fabric is a permissioned ledger platform designed to be highly modular and extensible, delivering confidentiality, privacy and scalability to enterprise blockchains. With Fabric's production grade availability in mid-2017, enterprises are experimenting with Fabric for building real-world blockchain applications. In this paper, we characterize the performance and scalability features of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data Mining for Detecting Bitcoin Ponzi Schemes

    Publication Year: 2018, Page(s):75 - 84
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (185 KB) | HTML iconHTML

    Soon after its introduction in 2009, Bitcoin has been adopted by cyber-criminals, which rely on its pseudonymity to implement virtually untraceable scams. One of the typical scams that operate on Bitcoin are the so-called Ponzi schemes. These are fraudulent investments which repay users with the funds invested by new users that join the scheme, and implode when it is no longer possible to find new... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stake-Bleeding Attacks on Proof-of-Stake Blockchains

    Publication Year: 2018, Page(s):85 - 92
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (329 KB) | HTML iconHTML

    We describe a general attack on proof-of-stake (PoS) blockchains without checkpointing. Our attack leverages transaction fees, the ability to treat transactions "out of context," and the standard longest chain rule to completely dominate a blockchain. The attack grows in power with the number of honest transactions and the stake held by the adversary, and can be launched by an adversary controllin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Analysis of Non-standard Bitcoin Transactions

    Publication Year: 2018, Page(s):93 - 96
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (328 KB) | HTML iconHTML

    In Bitcoin, the most common kind of transactions is in the form "Bob pays Alice", and it is based on the Pay to-Public Key Hash (P2PKH) script. P2PKH transactions are just one among many standard classes: a transaction is standard if it passes BitcoinCore's IsStandard() and IsStandardTx() tests. However, the creation of ad-hoc scripts to lock (and unlock) transactions allows for also generating no... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • (Short Paper) Developing a Smart Storage Container for a Blockchain-Based Supply Chain Application

    Publication Year: 2018, Page(s):97 - 100
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (390 KB) | HTML iconHTML

    Blockchain and Internet of Things are supposed to have big impact on logistics. This study presents a prototypical smart contract using smart storage containers in order to investigate the potential and the maturity of Blockchain and Internet of Things for logistical processes. A smart storage container is developed and connected to an Ethereum-based smart contract. The smart contract is based on ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • (Short Paper) Towards More Reliable Bitcoin Timestamps

    Publication Year: 2018, Page(s):101 - 104
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (137 KB) | HTML iconHTML

    Bitcoin provides freshness properties by forming a blockchain where each block is associated with its timestamp and the previous block. Due to these properties, the Bitcoin protocol is being used as a decentralized, trusted, and secure timestamping service. Although Bitcoin participants which create new blocks cannot modify their order, they can manipulate timestamps almost undetected. This underm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Revoking Records in an Immutable Ledger: A Platform for Issuing and Revoking Official Documents on Public Blockchains

    Publication Year: 2018, Page(s):105 - 111
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (306 KB) | HTML iconHTML

    The following topics are dealt with: electronic money; cryptography; transaction processing; data privacy; financial data processing; contracts; learning (artificial intelligence); digital signatures; cryptographic protocols; protocols. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • (Short Paper) Inputs Reduction for More Space in Bitcoin Blocks

    Publication Year: 2018, Page(s):112 - 115
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (487 KB) | HTML iconHTML

    Bitcoin blockchain is growing big, yet its transaction capacity hit its limits in 2017. One solution heavily discussed within the bitcoin community is to let it grow faster by increasing size of the blocks. However, making transactions smaller instead of blocks bigger is more sustainable and also brings other additional benefits. In this paper, we focus on space wasted by non-cryptographic use of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2018, Page(s): 117
    Request permission for reuse | PDF file iconPDF (28 KB)
    Freely Available from IEEE
  • [Roster page]

    Publication Year: 2018, Page(s): 118
    Request permission for reuse | PDF file iconPDF (164 KB)
    Freely Available from IEEE