<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Alessio Meneghetti</string-name>
          <email>alessio.meneghetti@unitn.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Massimiliano Sala</string-name>
          <email>maxsalacodes@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Daniele Taufer</string-name>
          <email>daniele.taufer@unitn.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Trento</institution>
          ,
          <addr-line>Trento</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>We lay the foundations for a blockchain scheme, whose consensus is reached via a proof-of-work algorithm based on the solution of consecutive discrete logarithm problems over the point group of elliptic curves. In the considered architecture, the curves are pseudorandomly determined by block creators, chosen to be cryptographically secure and changed at every epoch. Given the current state of the chain and a prescribed set of transactions, the curve selection is fully rigid, therefore trust is needed neither in miners nor in the scheme proposers.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <sec id="sec-1-1">
        <title>A proof-of-work (PoW) is a procedure that allows a prover to demonstrate that it is very likely to having performed a speci c amount of computational work within a prescribed interval of time.</title>
      </sec>
      <sec id="sec-1-2">
        <title>This concept has been formalized in 1999 [19], although previous instances of delaying</title>
        <p>
          functions conceived for similar purposes had appeared earlier [
          <xref ref-type="bibr" rid="ref12 ref14 ref17 ref2 ref20 ref30 ref9">2, 9, 12, 14, 17, 20, 30</xref>
          ].
        </p>
        <p>
          Since 2008, PoW-methods [
          <xref ref-type="bibr" rid="ref24">24</xref>
          ] have been attracting a considerable interest as Bitcoin [
          <xref ref-type="bibr" rid="ref27">27</xref>
          ]
introduced a PoW-based consensus algorithm, which puts miners in competition for solving a
cryptographic challenge. Bitcoin's consensus relies on a hashcash system [
          <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
          ], whose workload
may be easily adjusted with a fastly veri able output. Despite their high e ciency and easy
implementation, all the hashcash-based protocols share a common limitation: the huge amount
of computations employed by nodes becomes useless after the consensus is reached. This aspect
has been raising environmental concerns and many solutions have been proposed to reduce
these energy-intensive computer calculations.
        </p>
      </sec>
      <sec id="sec-1-3">
        <title>A promising countermeasure to this issue is the adoption of bread pudding protocols [19].</title>
      </sec>
      <sec id="sec-1-4">
        <title>They face the aforementioned problem by perfoming a computational work that is reusable</title>
        <p>
          either for practical [
          <xref ref-type="bibr" rid="ref11 ref13 ref26 ref33">11, 13, 26, 33</xref>
          ], cryptographical [
          <xref ref-type="bibr" rid="ref19 ref29">19, 29</xref>
          ] or mathematical [
          <xref ref-type="bibr" rid="ref36">36</xref>
          ] reasons.
Moreover, the latter class of systems encloses several protocols that are meant to be research
propellants [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ], namely designed to boost the commitment upon the solution of di cult mathematical
problems.
        </p>
      </sec>
      <sec id="sec-1-5">
        <title>Along the same line, we propose a blockchain architecture with a PoW-consensus algorithm based on the solution of the Discrete Logarithm Problem over the point groups of elliptic curves (ECDLP). This approach does not aim at reducing the energy consumption, but at adding a scienti c scope to the PoW mechanics, meanwhile achieving supplementary security features.</title>
      </sec>
      <sec id="sec-1-6">
        <title>The idea of basing the PoW on ECDLP has already appeared in other works [18, 21], as</title>
        <p>
          this problem is widely studied and applied in cryptographic protocols. However, the considered
curves does not usually ful l the standard security criteria [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ], especially for what concerns
the fully rigidity : the network has to initially trust an authority that is providing the curve
parameters.
        </p>
      </sec>
      <sec id="sec-1-7">
        <title>In this work we radically solve this issue by designing a PoW-system based on elliptic curves</title>
        <p>that are changing over the time. Since the curves are pseudo-randomly constructed and satisfy
general security conditions, a malicious user could attack the chain only by breaking the ECDLP
for an immense class of elliptic curves, which is currently considered infeasible.</p>
      </sec>
      <sec id="sec-1-8">
        <title>An extended version of this work may be found in [23].</title>
      </sec>
      <sec id="sec-1-9">
        <title>This paper is organized as follows: after a quick summary of the ECDLP in Section 2, we</title>
        <p>deline the proposed blockchain architecture in Section 3 and its blocks construction in Section</p>
      </sec>
      <sec id="sec-1-10">
        <title>4. The strong points of this system are discussed in Section 5, while in Section 6 future work directions are suggested.</title>
        <p>2</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>ECDLP</title>
      <sec id="sec-2-1">
        <title>The ECDLP is a renown problem that consists of nding an integer N 2 N such that the N -th</title>
        <p>multiple of a base point P of an elliptic curve E over a nite eld equals another given point
Q, i.e. Q = N P .</p>
        <sec id="sec-2-1-1">
          <title>Solving ECDLP for a well-chosen curve E is considered to be a di cult challenge. Currently</title>
          <p>
            the best known general attacks are Baby-Step Giant-Step [
            <xref ref-type="bibr" rid="ref32">32</xref>
            ] and Pollard's Rho - Kangaroo
algorithms [
            <xref ref-type="bibr" rid="ref28">28</xref>
            ], which have an asymptotic complexity of O(pjEj), where jEj is the size of E.
          </p>
        </sec>
        <sec id="sec-2-1-2">
          <title>The introduction of Semaev's polynomials [31] have suggested the existence of subexponential algorithms to solve ECDLP, however no clear evidence has emerged. Pairings-based attacks [15, 25], Index calculus [1, 22, 35] and Xedni calculus [34] have been recently being studied, but none of them seem to signi cantly reduce the problem complexity so far.</title>
          <p>3</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>A sample blockchain architecture</title>
      <sec id="sec-3-1">
        <title>To show how our PoW works, we introduce a schematic sample ledger architecture, but our</title>
        <p>algorithm may easily be adapted for any blockchain scheme. Our architecture is based on two
types of blocks:
[EB] An Epoch Block contains, aside from the header and a list of transactions, a prime number
p, an elliptic curve E de ned over Fp and a base point P of E, all to be determined by
the proposing miner.</p>
        <sec id="sec-3-1-1">
          <title>Moreover, it encloses as PoW an integer N 2 f0; : : : ; jEj 1g to be discovered by the</title>
          <p>proposing miner such that N P is the point of E that is deterministically determined
from the header of the block.</p>
        </sec>
      </sec>
      <sec id="sec-3-2">
        <title>These EBs occur once every 2016 blocks in the blockchain.</title>
        <p>[SB] The Standard Blocks are just a light version of the EB blocks, they are constructed in the
same way except for p, E, P , which are inherited from the last EB block of the chain.</p>
      </sec>
      <sec id="sec-3-3">
        <title>SBs constitute the vast majority of the blocks of the chain.</title>
      </sec>
      <sec id="sec-3-4">
        <title>Data #0</title>
      </sec>
      <sec id="sec-3-5">
        <title>EBs basically de ne the setting (curves and base points) on which the discrete logarithm</title>
      </sec>
      <sec id="sec-3-6">
        <title>PoWs will have to be solved in the following epoch. They are slightly heavier to be produced and veri ed but occur rarely (roughly once every two weeks with a BTC-like di culty adjustment).</title>
        <p>4</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Block construction</title>
      <sec id="sec-4-1">
        <title>In this section we de ne the envisioned speci cations of blocks, whose motivation will be analyzed in Section 5.</title>
      </sec>
      <sec id="sec-4-2">
        <title>First, we need a deterministic function P_Gen to construct a point on a given elliptic curve</title>
      </sec>
      <sec id="sec-4-3">
        <title>E from a prescribed hash digest h, which we treat as an integer for simplicity. The following is a concrete example of such a function.</title>
        <p>f u n c t i o n P _ G e n ( h , E )
i = 0
w h i l e #{ p o i n t s of E with x - c o o r d = h + i } = 0:
i = i + 1
P = ( h + i , *) p o i n t of E with 0 * &lt; p /2
r e t u r n P</p>
      </sec>
      <sec id="sec-4-4">
        <title>We notice that the points determined by the above function are a ne by construction. The</title>
        <p>
          hash H that we propose to use in the following is SHA3-512 [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ], which provides a satisfying
collision resistance even against post-quantum attacks, but one might conceivably replace it
with another properly constructed one.
        </p>
        <p>Standard Blocks</p>
      </sec>
      <sec id="sec-4-5">
        <title>A minimal model of a SB consists of a list of valid transactions and a header, which comprises</title>
        <p>their Merkel root M, the hash of the previous header hprev and an integer N solving
PoW :</p>
        <p>P_Gen(H(hprevjjM); E) = N</p>
        <p>P;
where E and P are the ones de ned in the last EB.
h = H(new header)
hprev</p>
        <p>M</p>
      </sec>
      <sec id="sec-4-6">
        <title>New transactions</title>
        <p>T1</p>
        <p>T2
Tk
Epoch Blocks</p>
      </sec>
      <sec id="sec-4-7">
        <title>An EB is a thick version of a SB, namely it is constructed in a similar fashion but it encloses</title>
        <p>three additional data: the prime p, the elliptic curve E over Fp and the base point P of E.</p>
      </sec>
      <sec id="sec-4-8">
        <title>Generating p</title>
        <p>
          The prime number p is the responsible of the expected running time of the PoW. Its size is
determined by the di culty parameter d, whose tuning depends on the block production
ratio that a designer wants to obtain. Therefore we do not discuss the choice of d but we
refer to the BTC implementation [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ] or to more structured models such as personalized
di culty adjustments [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]. Our goal is to produce a prime number of the prescribed size
and satisfying known properties of secutity (for a detailed description, see the full paper
[
          <xref ref-type="bibr" rid="ref23">23</xref>
          ]).
        </p>
        <p>Given the di culty parameter d and the hash of the previous header h, we propose the
generation of such a prime number p as follows.
f u n c t i o n p _ G e n ( d , h )
r e p e a t
h = H( h )
p = N e x t P r i m e ( h mod 22d )
u n t i l p s a t i s f i e s the r e q u i r e d p r o p e r t i e s
r e t u r n p</p>
      </sec>
      <sec id="sec-4-9">
        <title>Generating E</title>
      </sec>
      <sec id="sec-4-10">
        <title>We aim at generating pseudorandom elliptic curves for which no attacks are currently known, i.e. satisfying a number of security properties [6, 23].</title>
      </sec>
      <sec id="sec-4-11">
        <title>Let h be the previous block header, we suggest to generate the curve as follows.</title>
        <p>f u n c t i o n E _ G e n ( p , h )
i = 0
r e p e a t
i = i + 1</p>
        <p>AE = H( h + i )
BE = H(AE )</p>
        <p>E d e f i n e d by y2 = x3 + AE x + BE over Fp
u n t i l E is an EC s a t i s f y i n g s e c u r i t y p r o p e r t i e s
r e t u r n E</p>
      </sec>
      <sec id="sec-4-12">
        <title>Generating P</title>
      </sec>
      <sec id="sec-4-13">
        <title>The base point we prescribe for an EB and its subsequent epoch is</title>
        <p>P = P_Gen(H(p jj AE jj BE ); E):</p>
      </sec>
      <sec id="sec-4-14">
        <title>The new epoch parameters are manufactured before the PoW production, which therefore depends on them. [EB]</title>
        <p>h = H(new header)</p>
      </sec>
      <sec id="sec-4-15">
        <title>Epoch Data</title>
        <p>p = p_Gen (d; hprev)
E = E_Gen (p; hprev)
P = P_Gen (H(p jj AE jj BE); E)</p>
        <p>PoW : N
hprev
M</p>
      </sec>
      <sec id="sec-4-16">
        <title>New transactions</title>
        <p>T1
T2
Tk</p>
      </sec>
      <sec id="sec-4-17">
        <title>Despite the veri cation of SBs is extremely fast, EBs are slower to be checked since veri ers need to test that all the curve parameters involved have been properly constructed, running several types of mathematical algorithms such as primality testing, nite elds operations and points counting.</title>
        <p>5</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Method discussion</title>
      <sec id="sec-5-1">
        <title>Here we discuss motivation and advantages of the presented choices.</title>
      </sec>
      <sec id="sec-5-2">
        <title>First, this PoW model involves many di erent mathematical algorithms of wide interest, for which this blockchain may represent a concrete research propellant. Furthermore, it might also provide a public collection of cryptographically secure elliptic curves of moderate size.</title>
      </sec>
      <sec id="sec-5-3">
        <title>Apart from its scienti c usefulness, it conveys many desirable security properties. The chal</title>
        <p>lenges involved do not rely on a given curve of questionable provenance but on the generic
di culty of the ECDLP, which is much more fair to be trusted. Thus, we nd it aims at
embracing the decentralization ideals that lead to cryptocurrencies creation: even the
mathematical objects involved are publicly manufactured, no trust is required even in the authors or
the proposing entities.</p>
      </sec>
      <sec id="sec-5-4">
        <title>As for blocks forgery, we point out that both SBs and EBs comprise a PoW which depends on the entire block, together with the previous one. This means that any counterfeit in any position of the chain results into an incorrect nal block, which may be easily detected from the network.</title>
      </sec>
      <sec id="sec-5-5">
        <title>Moreover, it is hard to conceive shortcuts for the PoW production: for a given di culty</title>
        <p>
          parameter d we expect a d-bits secutity of the general ECDPL by using p 22d, unless attacks
outperforming Pollard's rho are discovered. Furthermore, common base eld operations speed
ups are avoided by making use of non-exceptional primes, ensuring a fair and general problem
to be solved equally for every miner. In fact, neither speci c algorithms nor dedicated hardware
may be used for solving such a general problem, of which easy cases are carefully avoided [
          <xref ref-type="bibr" rid="ref23">23</xref>
          ].
        </p>
        <p>
          Besides security, the curves we propose are fully rigid as de ned in [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]: their construction is
entirely explained in terms of the previous block, which cannot be controlled by a malicious actor
since there is no room for miner choices (such as nonces). Even assuming that the transactions
of the previous block might be chosen ad hoc, an attacker who wants to impose a particular
curve during the next epoch has to brute-force invert the hash H at the cost of one ECDLP
solution for each attempt, until a desired hash digest is obtained, within the time needed for
the entire network to solve a single ECDLP. We consider this scenario unachievable under
realistic assumptions. However, even assuming that a miner succeeds in breaking or nding a
shortcut for solving the ECDLP over the current epoch curve, it would bene t from the chance
of consistently winning the PoW-challenge only until the next epoch. In any case, this miner
would get no advantage in the choice of the next epoch curve. We nd this eventuality a fair
reward for such an unlikely and scienti cally unexpected achievement.
        </p>
      </sec>
      <sec id="sec-5-6">
        <title>As regards the di erence between EBs and SBs, we point out that the bulk of miner's work consists of the ECDLP solution: we expect good parameters to be generated in EBs in a time which is linear in the di culty parameter [16] whereas the asymptotic di culty of ECDLP solution is exponential in it.</title>
      </sec>
      <sec id="sec-5-7">
        <title>Since the curves creation appears not to be computationally demanding when compared to the actual PoW, then lazy miners do not have any substantial advantage in skipping it.</title>
        <p>6</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Conclusion</title>
      <sec id="sec-6-1">
        <title>We have proposed a new PoW-based blockchain model based on general ECDLP, highlighting the desirable properties that such a scheme provides in terms of scienti c relevance, security and pure decentralization ideals.</title>
      </sec>
      <sec id="sec-6-2">
        <title>The past proposals [18, 21] have the high merit of introducing ECDLP as a problem whose</title>
        <p>solution provides consensus, but we felt compelled to remove the suspiscious choice of the curve
serving as a common battle eld for miners. The novel multi-curve approach introduced in the
current work wipes out this grey area by providing a fully transparent scheme.</p>
      </sec>
      <sec id="sec-6-3">
        <title>It may be interesting to produce an actual implementation of the proposed scheme, obtaining practical time measurments and e ciency considerations. A subsequent engaging project might address the resistance of such a protocol to the known attacks under real-world assumptions, comparing the obtained results with outcomes of existing cryptocurrencies.</title>
      </sec>
      <sec id="sec-6-4">
        <title>Finally, di erent types of PoW might be conceived in a similar fashion, possibly employing problems which are thought to resist even to quantum attacks.</title>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>Aknowledgments</title>
      <sec id="sec-7-1">
        <title>The results presented here have been carried on within the EU-ESF activities, call PON Ricerca e Innovazione 2014-2020, project Distributed Ledgers for Secure Open Communities. We thank the Quadrans Foundation for its support.</title>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>A.</given-names>
            <surname>Amadori</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Pintore</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Sala</surname>
          </string-name>
          ,
          <article-title>On the discrete logarithm problem for prime- eld elliptic curves</article-title>
          ,
          <source>Finite Fields and Their Applications</source>
          , Vol.
          <volume>51</volume>
          , pp.
          <volume>168</volume>
          {
          <issue>182</issue>
          (
          <year>2018</year>
          ), URL: https://doi.org/10. 1016/j.ffa.
          <year>2018</year>
          .
          <volume>01</volume>
          .009.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>S.</given-names>
            <surname>Ar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Cai</surname>
          </string-name>
          , Benchmarks Using Numerical Instability,
          <string-name>
            <surname>SODA</surname>
          </string-name>
          (
          <year>1994</year>
          ), URL: https://dl.acm. org/citation.cfm?id=
          <fpage>314476</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>A.</given-names>
            <surname>Back</surname>
          </string-name>
          , Hashcash, (
          <year>1997</year>
          ), URL: http://www.cypherspace.org/hashcash.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>A.</given-names>
            <surname>Back</surname>
          </string-name>
          , Hashcash - A
          <string-name>
            <surname>Denial of Service</surname>
          </string-name>
          Counter-Measure,
          <article-title>(</article-title>
          <year>2002</year>
          ), URL: http://www.hashcash. org/papers/hashcash.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>M.</given-names>
            <surname>Ball</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Rosen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Sabin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. N.</given-names>
            <surname>Vasudevan</surname>
          </string-name>
          , Proofs of Useful Work,
          <string-name>
            <surname>IACR</surname>
          </string-name>
          (
          <year>2017</year>
          ), URL: https://eprint.iacr.org/
          <year>2017</year>
          /203.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>D. J.</given-names>
            <surname>Bernstein</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. L.</given-names>
            <surname>Lange</surname>
          </string-name>
          ,
          <article-title>Safecurves: choosing safe curves for elliptic-curve cryptography</article-title>
          , URL: https://safecurves.cr.yp.to/.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>G.</given-names>
            <surname>Bertoni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Daemen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Peeters</surname>
          </string-name>
          ,
          <string-name>
            <surname>G. van Assche</surname>
          </string-name>
          ,
          <string-name>
            <surname>R. van Keer</surname>
          </string-name>
          ,
          <article-title>Keccak implementation overview</article-title>
          , (
          <year>2012</year>
          ), URL: https://keccak.team/files/Keccak-implementation-
          <volume>3</volume>
          .2.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Bitcoin</surname>
            <given-names>team</given-names>
          </string-name>
          ,
          <source>PoW implementation</source>
          , (
          <year>2018</year>
          ), URL: https://github.com/bitcoin/bitcoin/blob/ master/src/pow.cpp.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>J.</given-names>
            <surname>Cai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. J.</given-names>
            <surname>Lipton</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Sedgewick</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. C.</given-names>
            <surname>Yao</surname>
          </string-name>
          ,
          <article-title>Towards uncheatable benchmarks</article-title>
          ,
          <source>IEEE</source>
          (
          <year>1993</year>
          ), URL: https://doi.org/10.1109/SCT.
          <year>1993</year>
          .
          <volume>336546</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>C.</given-names>
            <surname>Chou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Lin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Chang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Tu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Liao</surname>
          </string-name>
          ,
          <article-title>Personalized Di culty Adjustment for Countering the Double-Spending Attack in Proof-of-Work Consensus Protocols</article-title>
          , arXiv (
          <year>2018</year>
          ), URL: https://arxiv.org/abs/
          <year>1807</year>
          .02933.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>CureCoin</given-names>
            <surname>Team</surname>
          </string-name>
          ,
          <source>2019 Curecoin Model (White Paper draft)</source>
          , (
          <year>2019</year>
          ), URL: https://curecoin.net/ white-paper.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>C.</given-names>
            <surname>Dwork</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Naor</surname>
          </string-name>
          , Pricing via Processing or Combatting Junk Mail, Annual International Cryptology Conference (
          <year>1992</year>
          ), URL: https://doi.org/10.1007/3-540-48071-4_
          <fpage>10</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>H.</given-names>
            <surname>Finney</surname>
          </string-name>
          , RPOW - Reusable Proofs of Work, (
          <year>2004</year>
          ), URL: https://nakamotoinstitute.org/ finney/rpow/index.html.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>M. K. Franklin</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Malkhi</surname>
          </string-name>
          , Auditable Metering with Lightweight Security, Financial
          <string-name>
            <surname>Cryptography</surname>
          </string-name>
          (
          <year>1997</year>
          ), URL: https://doi.org/10.1007/3-540-63594-7_
          <fpage>75</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>G.</given-names>
            <surname>Frey</surname>
          </string-name>
          ,
          <string-name>
            <surname>H.</surname>
          </string-name>
          <article-title>Ruck, A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves</article-title>
          ,
          <source>Mathematics of Computation</source>
          (
          <year>1994</year>
          ), URL: https://www.jstor.org/stable/ 2153546?seq=
          <fpage>1</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>S. D.</given-names>
            <surname>Galbraith</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Mckee</surname>
          </string-name>
          ,
          <article-title>The Probability That The Number Of Points On An Elliptic Curve Over A Finite Field Is Prime</article-title>
          , IEEE (
          <year>2000</year>
          ), URL: https://www.math.auckland.ac.nz/~sgal018/cm. pdf.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>D. M. Goldschlag</surname>
            ,
            <given-names>S. G.</given-names>
          </string-name>
          <string-name>
            <surname>Stubblebine</surname>
          </string-name>
          , Publicly Veri able Lotteries: Applications of Delaying Functions, Financial
          <string-name>
            <surname>Cryptography</surname>
          </string-name>
          (
          <year>1994</year>
          ), URL: http://dl.acm.org/citation.cfm?id=
          <volume>647502</volume>
          .
          <fpage>728319</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>M.</given-names>
            <surname>Hastings</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Heninger</surname>
          </string-name>
          ,
          <string-name>
            <surname>E. Wustrow,</surname>
          </string-name>
          <article-title>The Proof is in the Pudding: Proofs of Work for Solving Discrete Logarithms</article-title>
          ,
          <string-name>
            <surname>IACR</surname>
          </string-name>
          (
          <year>2018</year>
          ), URL: https://eprint.iacr.org/
          <year>2018</year>
          /939.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>M.</given-names>
            <surname>Jakobsson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Juels</surname>
          </string-name>
          ,
          <article-title>Proofs of Work and Bread Pudding Protocols (Extended Abstract)</article-title>
          ,
          <source>Secure Information Networks</source>
          (
          <year>1999</year>
          ), URL: https://doi.org/10.1007/978-0-
          <fpage>387</fpage>
          -35568-9_
          <fpage>18</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>A.</given-names>
            <surname>Juels</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Brainard</surname>
          </string-name>
          , Client Puzzles:
          <string-name>
            <given-names>A Cryptographic</given-names>
            <surname>Countermeasure Against Connection Depletion Attacks</surname>
          </string-name>
          ,
          <string-name>
            <surname>NDSS</surname>
          </string-name>
          (
          <year>1999</year>
          ), URL: https://www.ndss
          <article-title>-symposium.org/ndss1999/ cryptographic-defense-against-connection-depletion-attacks.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>M.</given-names>
            <surname>Lochter</surname>
          </string-name>
          ,
          <article-title>Blockchain as cryptanalytic tool</article-title>
          ,
          <source>IACR</source>
          (
          <year>2018</year>
          ), URL: https://eprint.iacr.org/
          <year>2018</year>
          /893.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>G.</given-names>
            <surname>McGuire</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Mueller</surname>
          </string-name>
          ,
          <article-title>A New Index Calculus Algorithm for the Elliptic Curve Discrete Logarithm Problem and Summation Polynomial Evaluation, IACR (</article-title>
          <year>2017</year>
          ), URL: https://eprint.iacr.org/
          <year>2017</year>
          /1262.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>A.</given-names>
            <surname>Meneghetti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Sala</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Taufer</surname>
          </string-name>
          ,
          <article-title>A new ECDLP-based PoW model</article-title>
          ,
          <source>ArXiv</source>
          (
          <year>2019</year>
          ), URL: https: //arxiv.org/abs/
          <year>1911</year>
          .11287.
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>A.</given-names>
            <surname>Meneghetti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Sala</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Taufer</surname>
          </string-name>
          ,
          <article-title>A survey on PoW-based consensus</article-title>
          ,
          <source>AETiC</source>
          , Vol.
          <volume>4</volume>
          , No.
          <volume>1</volume>
          (
          <year>2020</year>
          ). URL: http://aetic.theiaer.org/archive/v4/v4n1/p2.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>A. J.</given-names>
            <surname>Menezes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Okamoto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Vanstone</surname>
          </string-name>
          ,
          <article-title>Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field</article-title>
          , IEEE (
          <year>1993</year>
          ), URL: https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=
          <fpage>259647</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>A.</given-names>
            <surname>Miller</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Juels</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Shi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Katz</surname>
          </string-name>
          ,
          <article-title>Permacoin: Repurposing Bitcoin Work for Data Preservation</article-title>
          , IEEE (
          <year>2014</year>
          ), URL: https://www.microsoft.com/en-us/research/publication/ permacoin-repurposing
          <article-title>-bitcoin-work-for-data-preservation.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>S.</given-names>
            <surname>Nakamoto</surname>
          </string-name>
          ,
          <article-title>Bitcoin: A Peer-to-Peer Electronic Cash System, (</article-title>
          <year>2008</year>
          ), URL: https://bitcoin. org/bitcoin.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <surname>J. M. Pollard</surname>
          </string-name>
          ,
          <article-title>Monte Carlo Methods for Index Computation (mod p)</article-title>
          ,
          <source>Mathematics of Computation</source>
          (
          <year>1978</year>
          ), URL: http://doi.org/10.2307/2006496.
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>R. L.</given-names>
            <surname>Rivest</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . Shamir,
          <article-title>PayWord and MicroMint: Two simple micropayment schemes</article-title>
          ,
          <source>International Workshop on Security Protocols</source>
          (
          <year>1997</year>
          ), URL: http://doi.org/10.1007/3-540-62494-
          <issue>5</issue>
          _
          <fpage>6</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>R. L.</given-names>
            <surname>Rivest</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Shamir</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. A.</given-names>
            <surname>Wagner</surname>
          </string-name>
          ,
          <article-title>Time-lock Puzzles and Timed-release Crypto</article-title>
          , Massachusetts Institute of Technology Cambridge (
          <year>1996</year>
          ), URL: https://dl.acm.org/citation.cfm? id=
          <fpage>888615</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>I. A.</given-names>
            <surname>Semaev</surname>
          </string-name>
          ,
          <article-title>Summation polynomials and the discrete logarithm problem on elliptic curves</article-title>
          ,
          <source>IACR</source>
          (
          <year>2004</year>
          ), URL: https://eprint.iacr.org/
          <year>2004</year>
          /031.pdf
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>D.</given-names>
            <surname>Shanks</surname>
          </string-name>
          , Class Number,
          <article-title>a Theory of Factorization and Genera</article-title>
          ,
          <source>Proceedings of Symposium of Pure Mathematics</source>
          , Vol.
          <volume>20</volume>
          , pp.
          <volume>415</volume>
          {
          <issue>440</issue>
          (
          <year>1969</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>A.</given-names>
            <surname>Shoker</surname>
          </string-name>
          , Sustainable Blockchain through Proof of eXercise, IEEE (
          <year>2017</year>
          ), URL: https:// ieeexplore.ieee.org/stamp/stamp.jsp?tp=&amp;arnumber=
          <fpage>8171383</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [34]
          <string-name>
            <given-names>J. H.</given-names>
            <surname>Silverman</surname>
          </string-name>
          ,
          <article-title>The Xedni Calculus and the Elliptic Curve Discrete Logarithm Problem</article-title>
          , Designs,
          <source>Codes and Cryptography</source>
          , Vol.
          <volume>20</volume>
          , pp.
          <volume>5</volume>
          {
          <issue>40</issue>
          (
          <year>2000</year>
          ), URL: https://doi.org/10.1023/A:
          <fpage>1008319518035</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [35]
          <string-name>
            <given-names>J. H.</given-names>
            <surname>Silverman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Suzuki</surname>
          </string-name>
          ,
          <article-title>Elliptic Curve Discrete Logarithms and the Index Calculus</article-title>
          ,
          <source>Advances in Cryptology { ASIACRYPT ' 98</source>
          , pp.
          <volume>120</volume>
          {
          <issue>125</issue>
          (
          <year>1998</year>
          ) URL: https://doi.org/10.1007/ 3-540-49649-1_
          <fpage>10</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [36]
          <string-name>
            <given-names>K.</given-names>
            <surname>Sunny</surname>
          </string-name>
          ,
          <article-title>Primecoin: Cryptocurrency with Prime Number Proof-of-</article-title>
          <string-name>
            <surname>Work</surname>
          </string-name>
          ,
          <article-title>(</article-title>
          <year>2013</year>
          ), URL: http: //primecoin.io/bin/primecoin-paper.pdf.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>