Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Bitcoin’s academic pedigree
Narayanan A., Clark J. Queue15 (4):1-30,2017.Type:Article
Date Reviewed: May 24 2018

In this highly readable article, the authors Arvind Narayanan and Jeremy Clark search for the academic origins of the concept behind Bitcoin and blockchain technology.

They start with a high-level overview of the basic characteristics of these technologies and link them to earlier research. Sure enough, they found that not just most, but actually all, of the Bitcoin principles had been developed by others prior to the invention of Bitcoin.

Scientists such as Haber and Stornetta wrote back in the early 1990s about the need to timestamp linked transactions required to set up a digital notary where it was essential to demonstrate the exact time of the creation of documents. Their data structure was used by Bitcoin, as was their use of the word “block” to group sets of documents [1].

Likewise, the idea of Bitcoin mining was based on the proof-of-work concept, originally developed by Dwork and Naor in 1992 [2]. They devised it at the time to prevent email spam by forcing the sender and receiver to solve a simple challenge. A party sending out mass spam emails would be encumbered by the calculations required to solve the challenges; therefore, spam would be reduced by increasing its “cost.”

The article systematically links back the key concepts of Bitcoin and the blockchain to earlier academic work. Putting it all together, the authors conclude with the inevitable suggestion that many more forgotten ideas might be present in older academic work.

The brilliance of Bitcoin’s inventor, Nakamoto, was not that he came up with new ideas, but rather that he was able to connect the dots between separate academic research, and was able to turn it into a product. In the final paragraph, the authors suggest that academic researchers should engage more with the real world.

Reviewer:  Riemer Brouwer Review #: CR146047 (1808-0465)
1) Haber, S.; Stornetta, W. S. Secure names for bitstrings. In Proc. of the 4th ACM Conf. on Computer and Communications Security. ACM, 1997, 28–35. http://dl.acm.org/citation.cfm?id=266430
2) Dwork, C.; Naor, M. Pricing via processing or combatting junk mail. In Proc. of the 12th Annual Int. Cryptology Conf. on Advances in Cryptology (CRYPTO 92). Springer, 1992, 139–147. https://dl.acm.org/ citation.cfm?id=705669
Bookmark and Share
  Featured Reviewer  
 
Electronic Commerce (K.4.4 )
 
 
Data Encryption (E.3 )
 
Would you recommend this review?
yes
no
Other reviews under "Electronic Commerce": Date
Do electronic marketplaces lower the price of goods?
Lee H. Communications of the ACM 41(1): 73-80, 1998. Type: Article
Feb 1 1999
On-line profits
Keen P., Ballance C., Harvard Business School Press, Boston, MA, 1997. Type: Book (9780875848211)
May 1 1998
Secure electronic transactions
Loeb L., Artech House, Inc., Norwood, MA, 1998. Type: Book (9780890069929)
Jul 1 1998
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy