2012
DOI: 10.1007/978-3-642-32946-3_28
|View full text |Cite
|
Sign up to set email alerts
|

CommitCoin: Carbon Dating Commitments with Bitcoin

Abstract: Abstract. In the standard definition of a commitment scheme, the sender commits to a message and immediately sends the commitment to the recipient interested in it. However the sender may not always know at the time of commitment who will become interested in verifying it. Further, when the interested party does emerge, it could be critical to establish when the commitment was made. Employing a proof of work protocol at commitment time will later allow anyone to "carbon date" when the commitment was made, appr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
55
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 67 publications
(55 citation statements)
references
References 23 publications
0
55
0
Order By: Relevance
“…In [14], Karame et al thoroughly investigate double-spending attacks in Bitcoin and show that double-spending fast payments in Bitcoin can be performed in spite of the measures recommended by Bitcoin developers. Clark et al [11] propose the use of the Bitcoin PoW to construct verifiable commitment schemes. Reid and Harrigan [16] analyze the flow Bitcoin transactions in a small part of Bitcoin log, and show that external information, i.e., publicly announced addresses, can be used to link identities and organizations to some transactions.…”
Section: Related Workmentioning
confidence: 99%
“…In [14], Karame et al thoroughly investigate double-spending attacks in Bitcoin and show that double-spending fast payments in Bitcoin can be performed in spite of the measures recommended by Bitcoin developers. Clark et al [11] propose the use of the Bitcoin PoW to construct verifiable commitment schemes. Reid and Harrigan [16] analyze the flow Bitcoin transactions in a small part of Bitcoin log, and show that external information, i.e., publicly announced addresses, can be used to link identities and organizations to some transactions.…”
Section: Related Workmentioning
confidence: 99%
“…More precisely, each party sends its share to the other party and makes a zero-knowledge proof that it is indeed its share of the result. Of course, one of the parties has to reveal her share first (or at least a part of it) and the other party can quit the protocol at this moment, leaving the honest party with no information about the output 9 .…”
Section: Two-party Computationmentioning
confidence: 99%
“…Commitment schemes and zero-knowledge proofs in the context of the Bitcoin were already considered in [9], however, the construction and its applications are differentthe main idea of [9] is to use the Bitcoin system as a replacement of a trusted third party in time-stamping. The notion of "deposits" has already been used in Bitcoin (see [26], Example 1), but the application described there is different: the "deposit" is a method for a party with no reputation to prove that she is not a spambot by temporarily sacrificing some of her money.…”
Section: Introductionmentioning
confidence: 99%
“…This approach is used by Commitcoin [29] to insert hash digests in transactions. Bitcoins are not wasted using this method, and bandwidth is up to 32 bytes per input.…”
Section: Inserting Candc Instructions In Transactionsmentioning
confidence: 99%