Skip to main content

What Satoshi Did Not Know

  • Conference paper
  • First Online:
Financial Cryptography and Data Security (FC 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8975))

Included in the following conference series:

  • 3445 Accesses

Abstract

When Bitcoin was invented six years ago (cf. [8]), Barack Obama had just been inaugurated president and Lady Gaga had just released her first big single.

G. Andresen — I would like to thank Malte Möser for his help in preparing this transcript.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Adam Back. Hashcash A Denial of Service Counter-Measure (2002). http://www.hashcash.org/papers/hashcash.pdf. Accessed on 10 February 2015

  2. Ben-Sasson, E., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E., Virza, M.: Zerocash: decentralized anonymous payments from bitcoin. In: Proceedings of the 2014 IEEE Symposium on Security and Privacy (SP), pp. 459–474. IEEE (2014)

    Google Scholar 

  3. Ben-Sasson, E., Chiesa, A., Genkin, D., Tromer, E., Virza, M.: SNARKs for C: verifying program executions succinctly and in zero knowledge. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. LNCS, vol. 8043, pp. 90–108. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  4. Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  5. Eppstein, D., Goodrich, M.T., Uyeda, F., Varghese, G.: What’s the difference? efficient set reconciliation without prior context. In: Proceedings of the ACM SIGCOMM Conference, pp. 218–229. ACM, New York (2011)

    Google Scholar 

  6. Goodrich, M.T., Mitzenmacher, M.: Invertible bloom lookup tables. In: 49th Annual Allerton Conference on Communication, Control, and Computing, pp. 792–799. IEEE (2011)

    Google Scholar 

  7. Leslie, L.: Constructing digital signatures from a one-way function. Technical report SRI International Computer Science Laboratory, October 1979

    Google Scholar 

  8. Satoshi Nakamoto. Bitcoin: A Peer-to-Peer Electronic Cash System (2008). https://bitcoin.org/bitcoin.pdf. Accessed on 10 February 2015

  9. Nakamoto, S.: Re: Not a suggestion. https://bitcointalk.org/index.php?topic=770.msg9074#msg9074.2010. Accessed on 17 March 2015

  10. Schnorr, C.-P.: Efficient signature generation by smart cards. J. Cryptol. 4(3), 161–174 (1991)

    Article  MathSciNet  MATH  Google Scholar 

  11. U.S. Securities and Exchange Commission. Ponzi Schemes Using Virtual Currencies (2014). http://www.sec.gov/investor/alerts/ia_virtualcurrencies.pdf. Accessed on 28 February 2015

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gavin Andresen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Andresen, G. (2015). What Satoshi Did Not Know. In: Böhme, R., Okamoto, T. (eds) Financial Cryptography and Data Security. FC 2015. Lecture Notes in Computer Science(), vol 8975. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-47854-7_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-47854-7_1

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-47853-0

  • Online ISBN: 978-3-662-47854-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics