### Abstract

In this work we propose a scheme that could be used as an alternative to the existing proof of work(PoW) scheme for mining in Bitcoin P2P network. Our scheme ensures that the miner must do at least a non-trivial amount of computation for solving the computational problem put forth in the paper and thus solving a PoW puzzle. Here, we have proposed to use the problem of finding the largest clique in a big graph as a replacement for the existing Bitcoin PoW scheme. In this paper, we have dealt with a graph having O(2^{30}) vertices and O(2^{48}) edges which is constructed deterministically using the set of transactions executed within a certain time slot. We have discussed some algorithms that can be used by any Bitcoin miner to solve the PoW puzzle. Then we discuss an algorithm that could perform this task by doing O(2^{80}) hash calculations. We have also proposed an improvement to this algorithm by which the PoW puzzle can be solved by calculating O(2^{70.5}) hashes and using O(2^{48}) space. This scheme is better than the existing proof of work schemes that use Hashcash, where a lucky miner could manage to find a solution to the proof of work puzzle by doing smaller amount of computation though it happens with very low probability. Bitcoin incentivizes the computing power of miners and hence, it is desirable that miners with more computing power always wins. Also, the Bitcoin PoW scheme only incentivizes computing power of miners but our PoW scheme incentivizes both computing power and memory of a miner. In our proposed scheme only the miner cannot randomly find a largest clique without knowing the clique number of the graph.

Original language | English |
---|---|

Title of host publication | Information Security and Cryptology - 11th International Conference, Inscrypt 2015, Revised Selected Papers |

Editors | Dongdai Lin, Xiao Feng Wang, Moti Yung |

Publisher | Springer Verlag |

Pages | 260-279 |

Number of pages | 20 |

ISBN (Print) | 9783319388977 |

DOIs | |

Publication status | Published - Jan 1 2016 |

Event | 11th International Conference on Information Security and Cryptology, Inscrypt 2015 - Beijing, China Duration: Nov 1 2015 → Nov 3 2015 |

### Publication series

Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|

Volume | 9589 |

ISSN (Print) | 0302-9743 |

ISSN (Electronic) | 1611-3349 |

### Other

Other | 11th International Conference on Information Security and Cryptology, Inscrypt 2015 |
---|---|

Country | China |

City | Beijing |

Period | 11/1/15 → 11/3/15 |

### All Science Journal Classification (ASJC) codes

- Theoretical Computer Science
- Computer Science(all)

## Fingerprint Dive into the research topics of 'On the application of clique problem for proof-of-work in cryptocurrencies'. Together they form a unique fingerprint.

## Cite this

*Information Security and Cryptology - 11th International Conference, Inscrypt 2015, Revised Selected Papers*(pp. 260-279). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 9589). Springer Verlag. https://doi.org/10.1007/978-3-319-38898-4_16