CFP last date
22 April 2024
Reseach Article

Restricting the Illegal Transactions in Cryptocurrencies

by Utkarsh Wadhwa, Vivek Tomar, Jasmine Bedi Khurana
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 166 - Number 2
Year of Publication: 2017
Authors: Utkarsh Wadhwa, Vivek Tomar, Jasmine Bedi Khurana
10.5120/ijca2017913938

Utkarsh Wadhwa, Vivek Tomar, Jasmine Bedi Khurana . Restricting the Illegal Transactions in Cryptocurrencies. International Journal of Computer Applications. 166, 2 ( May 2017), 29-32. DOI=10.5120/ijca2017913938

@article{ 10.5120/ijca2017913938,
author = { Utkarsh Wadhwa, Vivek Tomar, Jasmine Bedi Khurana },
title = { Restricting the Illegal Transactions in Cryptocurrencies },
journal = { International Journal of Computer Applications },
issue_date = { May 2017 },
volume = { 166 },
number = { 2 },
month = { May },
year = { 2017 },
issn = { 0975-8887 },
pages = { 29-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume166/number2/27644-2017913938/ },
doi = { 10.5120/ijca2017913938 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:12:38.789186+05:30
%A Utkarsh Wadhwa
%A Vivek Tomar
%A Jasmine Bedi Khurana
%T Restricting the Illegal Transactions in Cryptocurrencies
%J International Journal of Computer Applications
%@ 0975-8887
%V 166
%N 2
%P 29-32
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The trend of digital currencies is catching fire these days, more and more people want to use digital currency. When we talk about digital currencies then how can we forget taking the name of Cryptocurrencies like Bitcoin. These currencies because of their P2P nature have won lot of hearts. You must have heard that “Every Rose has a thorn”, similar type of thing is with Cryptocurrencies too. Because of the reason these currencies are P2P nature and there is no 3rd party who controls these cryptocurrencies, these are being used for illegal drugs – arms dealing and for purchasing weapons online which are used in the terror attacks. We have found out a solution in order to put an end to it and the solution is Freezing of Assets. In this the owner will have the liberty to freeze any account whichever seem fishy and the freezed accounts will have their money intact, just the difference will be that they won’t be able to transfer the money.

References
  1. Ethereum. Wikipedia Available at- https://en.wikipedia.org/wiki/EthereumS
  2. Nakamoto, - “Bitcoin: A Peer-to-Peer Electronic Cash System”, 2008, bitcoin.org/bitcoin.pdf.
  3. L. Luu, J. Teutsch, R. Kulkarni, and P. Saxena, ―”Demystifying incentives in the consensus computer in proceedings of ACM CCS”, 2015, to appear. http://www.coindesk.com/making-sense-bitcoins-halving/
  4. George Danezis - UCL Computer Science https://cointelegraph.com/news/www0.cs.ucl.ac.uk/staff/G.Danezis/papers/ndss16currencies.pdf
  5. A. Narayanan, J. Bonneau, E. Felten, A. Miller, and S. Goldfeder, “Bitcoin and cryptocurrency technologies”
  6. Aldridge, Judith, a David Décary-Hétu. 2014. “Not an 'Ebay for Drugs': The Cryptomarket 'Silk Road' as a Paradigm Shifting Criminal Innovation”. SSRN Working Paper. https://www.toptal.com/bitcoin/blockchain-technology-powering-bitcoin
  7. J. Bonneau, A. Miller, J. Clark, A. Narayanan, J. A. Kroll, and E. W. Felten. Sok: “Research perspectives and challenges for bitcoin and cryptocurrencies”. In 2015 IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, USA, May 17-21, 2015, pages 104–121, 2015.
  8. F. Reid and M. Harrigan. “An Analysis of Anonymity in the Bitcoin System. In Security and Privacy in Social Networks”, pages 197–223. Springer New York, 2013.
  9. M. Peck. “Bitcoin-Central is Now The World’s First Bitcoin Bank”...Kind Of. IEEE Spectrum: Tech Talk, Dec. 2012. spectrum.ieee.org/techtalk/telecom/internet/ bitcoincentral-is-now-theworlds-first-bitcoin-bankkind-of.
Index Terms

Computer Science
Information Sciences

Keywords

Bitcoins Cryptocurrencies Ethereum Freezing assets cryptographic algorithms