UX Design & Webflow Agency NYC | Composite Global
All Posts

Bitcoin: A Peer-to-Peer Electronic Cash System

Share

October 31, 2008

PDF
Download the full letter to print or read anytime
Download
PDF
Download the full letter to print or read anytime
Download

Abstract.

A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution. Digital signatures provide part of the solution, but the main benefits are lost if a trusted third party is still required to prevent double-spending. We propose a solution to the double-spending problem using a peer-to-peer network.

The network timestamps transactions by hashing them into an ongoing chain of hash-based proof-of-work, forming a record that cannot be changed without redoing the proof-of-work. The longest chain not only serves as proof of the sequence of events witnessed, but proof that it came from the largest pool of CPU power. As long as a majority of CPU power is controlled by nodes that are not cooperating to attack the network, they'll generate the longest chain and outpace attackers. The network itself requires minimal structure. Messages are broadcast on a best effort basis, and nodes can leave and rejoin the network at will, accepting the longest proof-of-work chain as proof of what happened while they were gone.

Start Reading
Start Reading

Abstract.

A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution. Digital signatures provide part of the solution, but the main benefits are lost if a trusted third party is still required to prevent double-spending. We propose a solution to the double-spending problem using a peer-to-peer network.

The network timestamps transactions by hashing them into an ongoing chain of hash-based proof-of-work, forming a record that cannot be changed without redoing the proof-of-work. The longest chain not only serves as proof of the sequence of events witnessed, but proof that it came from the largest pool of CPU power. As long as a majority of CPU power is controlled by nodes that are not cooperating to attack the network, they'll generate the longest chain and outpace attackers. The network itself requires minimal structure. Messages are broadcast on a best effort basis, and nodes can leave and rejoin the network at will, accepting the longest proof-of-work chain as proof of what happened while they were gone.

Start Reading
Start Reading
newsletter

Sign up for weekly research

Subscribe now to learn what’s driving bitcoin markets, track significant regulatory developments, and get the data that deserves your attention.

Featured Research & Insights

Bitcoin's Outperformance and the Case for a Bottom

Bitcoin's Outperformance and the Case for a Bottom

Bitcoin's Outperformance and the Case for a Bottom
Video
April 20, 2026
Bitcoin's Quiet Grind Higher, Institutional Bitcoin Goes Mainstream

Bitcoin's Quiet Grind Higher, Institutional Bitcoin Goes Mainstream

Bitcoin's Quiet Grind Higher, Institutional Bitcoin Goes Mainstream
Research
April 17, 2026
Read Now
State of bitcoin (Q1 2026)

State of bitcoin (Q1 2026)

State of bitcoin (Q1 2026)
Video
April 15, 2026
Let's Connect

Want to learn more about NYDIG?

Please complete the contact form, and we will help you find the right person to learn more.