Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

The Evolution of Improvised Cryptocurrency – UVCoin

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Jasmine Bedi Khurana, Utkarsh Wadhwa, Vivek Tomar

Jasmine Bedi Khurana, Utkarsh Wadhwa and Vivek Tomar. The Evolution of Improvised Cryptocurrency – UVCoin. International Journal of Computer Applications 156(5):23-28, December 2016. BibTeX

	author = {Jasmine Bedi Khurana and Utkarsh Wadhwa and Vivek Tomar},
	title = {The Evolution of Improvised Cryptocurrency – UVCoin},
	journal = {International Journal of Computer Applications},
	issue_date = {December 2016},
	volume = {156},
	number = {5},
	month = {Dec},
	year = {2016},
	issn = {0975-8887},
	pages = {23-28},
	numpages = {6},
	url = {},
	doi = {10.5120/ijca2016912441},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


Cryptocurrencies which evolved with bitcoin has a decentralized structure based on the ledger which is handled via proof of work mechanism, indeed generating a monetary supply. We all agree that decentralization save us from the cruel national political system but has a limitation of computational cost involved and problem related to scalability. The idea is to introduce a new cryptocurrency named UV Coin which is a cryptocurrency framework having control of the central banks but involves distributed set of authorities to prevent double spending. This coin will maintain enough transparency. The proof of the benefits is partial centralization such as elimination of wasteful hashing and involves a scalable system to avoid double spending attack.


  1. S. Nakamoto, “Bitcoin: A Peer-to-Peer Electronic Cash System,” 2008,
  2. D. O’Leary, V. D’Agostino, S. R. Re, J. Burney, andHoffman, “Method and system for processing Internet payments using the electronic funds transfer network,” Nov. 2013. [Online]. Available:
  3. Nasdaq, “Nasdaq launches enterprise-wide blockchain technology initiative,” May 2015,
  4. European Central Bank, “Virtual currency schemes - a further analysis,” Feb. 2015,
  5. B. Bernanke, Nov. 2013,
  6. HM Treasury, “Digital currencies: response to the call for information,” Mar. 2015, attachment data/file/414040/digital currencies response to call for information final changes.pdf.
  7. A. Narayanan, J. Bonneau, E. Felten, A. Miller, and S. Goldfeder, Bitcoin and cryptocurrency technologies. [Online]
  8. A. Miller, A. Juels, E. Shi, B. Parno, and J. Katz, “Permacoin: Repurposing Bitcoin work for data preservation,” in Proceedings of the IEEE Symposium on Security and Privacy, 2014.
  9. L. Luu, J. Teutsch, R. Kulkarni, and P. Saxena, “Demystifying incentives in the consensus computer,” in proceedings of ACM CCS 2015, 2015, to appear.
  10. Bank of England, Private communication, 2015.
  11. B. Laurie, “An efficient distributed currency,” 2011,
  12. T. Young, “Atomic cross-chain exchange,” 2014,
  13. I. Miers, C. Garman, M. Green, and A. D. Rubin, “Zerocoin: Anonymous distributed e-cash from bitcoin,” in 2013 IEEE Symposium on Security and Privacy, SP 2013, Berkeley, CA, USA, May 19-22, 2013. IEEE Computer Society, 2013, pp. 397–411. [Online].Available:
  14. E. Ben-Sasson, A. Chiesa, C. Garman, M. Green, I. Miers, E. Tromer, and M. Virza, “Zerocash: Decentralized anonymous payments from bitcoin,” in 2014 IEEE Symposium on Security and Privacy, SP 2014, Berkeley, CA, USA, May 18-21, 2014. IEEE Computer Society, 2014, pp. 459–474. [Online]. Available:
  15. G. Danezis, C. Fournet, M. Kohlweiss, and B. Parno, “Pinocchio coin: building zerocoin from a succinct pairing-based proof system,” in PETShop’13, Proceedings of the 2013 ACM Workshop on Language Support for Privacy-Enhancing Technologies, Co-located with CCS 2013, November 4, 2013, Berlin, Germany, Franz, A. Holzer, R. Majumdar, B. Parno, and Veith, Eds. ACM, 2013, pp. 27–30. [Online]. Available:
  16. J. Groth and M. Kohlweiss, “One-out-of-many proofs: Or how to leak a secret and spend a coin,” in Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II, ser. Lecture Notes in Computer Science, E. Oswald and M. Fischlin, Eds., vol. 9057. Springer, 2015, pp. 253–280. [Online]. Available: 9


Sybil attack, Proof of Work, Proof of stake, UVCoin, Double-Spending Attack, Cryptocurrency, Cryptographic Algorithm