CFP last date
20 May 2024
Reseach Article

The Evolution of Improvised Cryptocurrency – UVCoin

by Jasmine Bedi Khurana, Utkarsh Wadhwa, Vivek Tomar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 156 - Number 5
Year of Publication: 2016
Authors: Jasmine Bedi Khurana, Utkarsh Wadhwa, Vivek Tomar
10.5120/ijca2016912441

Jasmine Bedi Khurana, Utkarsh Wadhwa, Vivek Tomar . The Evolution of Improvised Cryptocurrency – UVCoin. International Journal of Computer Applications. 156, 5 ( Dec 2016), 23-28. DOI=10.5120/ijca2016912441

@article{ 10.5120/ijca2016912441,
author = { Jasmine Bedi Khurana, Utkarsh Wadhwa, Vivek Tomar },
title = { The Evolution of Improvised Cryptocurrency – UVCoin },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2016 },
volume = { 156 },
number = { 5 },
month = { Dec },
year = { 2016 },
issn = { 0975-8887 },
pages = { 23-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume156/number5/26706-2016912441/ },
doi = { 10.5120/ijca2016912441 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:01:47.850772+05:30
%A Jasmine Bedi Khurana
%A Utkarsh Wadhwa
%A Vivek Tomar
%T The Evolution of Improvised Cryptocurrency – UVCoin
%J International Journal of Computer Applications
%@ 0975-8887
%V 156
%N 5
%P 23-28
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cryptocurrencies which evolved with bitcoin has a decentralized structure based on the ledger which is handled via proof of work mechanism, indeed generating a monetary supply. We all agree that decentralization save us from the cruel national political system but has a limitation of computational cost involved and problem related to scalability. The idea is to introduce a new cryptocurrency named UV Coin which is a cryptocurrency framework having control of the central banks but involves distributed set of authorities to prevent double spending. This coin will maintain enough transparency. The proof of the benefits is partial centralization such as elimination of wasteful hashing and involves a scalable system to avoid double spending attack.

References
  1. S. Nakamoto, “Bitcoin: A Peer-to-Peer Electronic Cash System,” 2008, bitcoin.org/bitcoin.pdf.
  2. D. O’Leary, V. D’Agostino, S. R. Re, J. Burney, andHoffman, “Method and system for processing Internet payments using the electronic funds transfer network,” Nov. 2013. [Online]. Available: www.google.com/patents/US20130317984
  3. Nasdaq, “Nasdaq launches enterprise-wide blockchain technology initiative,” May 2015, www.nasdaq.com/press-release/nasdaq-launches-enterprisewide-blockchain-technology-initiative-20150511-00485.
  4. European Central Bank, “Virtual currency schemes - a further analysis,” Feb. 2015, www.ecb.europa.eu/pub/pdf/other/virtualcurrencyschemesen.pdf.
  5. B. Bernanke, Nov. 2013, qz.com/148399/ben-bernankebitcoin-may-hold-long-term-promise/.
  6. HM Treasury, “Digital currencies: response to the call for information,” Mar. 2015, www.gov.uk/government/uploads/system/uploads/ attachment data/file/414040/digital currencies response to call for information final changes.pdf.
  7. A. Narayanan, J. Bonneau, E. Felten, A. Miller, and S. Goldfeder, Bitcoin and cryptocurrency technologies. [Online].Available:piazza.com/princeton/spring2015/btctech/resources
  8. A. Miller, A. Juels, E. Shi, B. Parno, and J. Katz, “Permacoin: Repurposing Bitcoin work for data preservation,” in Proceedings of the IEEE Symposium on Security and Privacy, 2014.
  9. L. Luu, J. Teutsch, R. Kulkarni, and P. Saxena, “Demystifying incentives in the consensus computer,” in proceedings of ACM CCS 2015, 2015, to appear.
  10. Bank of England, Private communication, 2015.
  11. B. Laurie, “An efficient distributed currency,” 2011,www.links.org/files/distributedcurrency.pdf.
  12. T. Young, “Atomic cross-chain exchange,” 2014,upcoder.com/11/atomic-cross-chain-exchange/.
  13. I. Miers, C. Garman, M. Green, and A. D. Rubin, “Zerocoin: Anonymous distributed e-cash from bitcoin,” in 2013 IEEE Symposium on Security and Privacy, SP 2013, Berkeley, CA, USA, May 19-22, 2013. IEEE Computer Society, 2013, pp. 397–411. [Online].Available:http://dx.doi.org/10.1109/SP.2013.34
  14. E. Ben-Sasson, A. Chiesa, C. Garman, M. Green, I. Miers, E. Tromer, and M. Virza, “Zerocash: Decentralized anonymous payments from bitcoin,” in 2014 IEEE Symposium on Security and Privacy, SP 2014, Berkeley, CA, USA, May 18-21, 2014. IEEE Computer Society, 2014, pp. 459–474. [Online]. Available: http://dx.doi.org/10.1109/SP.2014.36
  15. G. Danezis, C. Fournet, M. Kohlweiss, and B. Parno, “Pinocchio coin: building zerocoin from a succinct pairing-based proof system,” in PETShop’13, Proceedings of the 2013 ACM Workshop on Language Support for Privacy-Enhancing Technologies, Co-located with CCS 2013, November 4, 2013, Berlin, Germany, Franz, A. Holzer, R. Majumdar, B. Parno, and Veith, Eds. ACM, 2013, pp. 27–30. [Online]. Available: http://doi.acm.org/10.1145/2517872.2517878
  16. J. Groth and M. Kohlweiss, “One-out-of-many proofs: Or how to leak a secret and spend a coin,” in Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II, ser. Lecture Notes in Computer Science, E. Oswald and M. Fischlin, Eds., vol. 9057. Springer, 2015, pp. 253–280. [Online]. Available: http://dx.doi.org/10.1007/978-3-662-46803-6 9
Index Terms

Computer Science
Information Sciences

Keywords

Sybil attack Proof of Work Proof of stake UVCoin Double-Spending Attack Cryptocurrency Cryptographic Algorithm