Bitcoins blockchain fueled innovation, and a number of innovative applications have already been devised by exploiting the secure and distributed provisions of the underlying blockchain.
This clearly shows the change of value enabled by the Bitcoin blockchain technology. Namely, while the original focus of the Bitcoin blockchain was to support money transfer among users, a number of applications built around the blockchain concern other possible use cases and scenarios. Prominent applications include secure time-stamping, secure commitment schemes, and smart contracts. Note that some of these extensions cannot be deployed without changing the code base of Bitcoin (i.e., via a hard fork). These are referred to as altcoins and preserve mining power by leveraging the already established Bitcoin community.
 Namecoin—Wikipedia, 2010. available from https://en.wikipedia.org/wiki/ Namecoin.
 Namecoin—Domain Name Specification, 2010. available from https://wiki.namecoin.
 Harry Kalodner, Miles Carlsten, Paul Ellenbogen, Joseph Bonneau, and Arvind Narayanan. An empirical study of Namecoin and lessons for decentralized namespace design. WEIS ’15: Proceedings of the 14th Workshop on the Economics of Information Security, June 2015.
 Digital asset holdings acquires hyperledger and bits of proof. available from http:
 Archived webpage of digital asset holdings- hyperledger. available from https:
 Hyperledger summary. available from https://web.archive.org/web/
 Bits of proof. available from http://bitsofproof.com/.
 Bits of proof launches ”red hat for bitcoin”, 2013. available from http://www.coindesk.
 Nakamoto’s paper encoded in a Bitcoin transaction, 2014. available from https://
 Hidden surprises in the Bitcoin blockchain, 2014. available from http://www.righto.com/
 BTProof: Trusted timestamping on the Bitcoin blockchain, 2012. available from https://www.
 Proof of Existence, 2012. available from https://www.proofofexistence.com/.
 Andrew Miller, Ari Juels, Elaine Shi, Bryan Parno, and Jonathan Katz. Permacoin: Repurposing bitcoin work for data preservation. In 2014 IEEE Symposium on Security and Privacy, SP 2014, Berkeley, CA, USA, May 18-21, 2014, pages 475-490. IEEE Computer Society, 2014.
 Hovav Shacham and Brent Waters. Compact Proofs of Retrievability. In ASIACRYPT, pages 90107, 2008.
 Frederik Armknecht, Jens-Matthias Bohli, Ghassan O. Karame, Zongren Liu, and Christian A. Reuter. Outsourced proofs of retrievability. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS ’14, pages 831-843, New York, 2014. ACM.
 OneName, 2014. available from https://onename.com/.
 Frederik Armknecht, Jens-Matthias Bohli, Ghassan O. Karame, Zongren Liu, and Christian A. Reuter. Outsourced proofs of retrievability. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, November 3-7, 2014, pages 831-843, 2014.
 Frederik Armknecht, Jens-Matthias Bohli, Ghassan O. Karame, and Franck Youssef. Transparent data deduplication in the cloud. In Proceedings of the 22NdACM SIGSAC Conference on Computer and Communications Security, CCS ’15, pages 886-900, New York, 2015. ACM. available from http://doi.acm.org/10.1145/2810103.2813630.
 Bitcoin as a public source of randomness, 2014. available from https://docs.google.
 Contracts—Bitcoin wiki, 2015. available from https://en.bitcoin.it/wiki/
 Ethereum Homestead Release. available from https://www.ethereum.org/.
 Ari Juels, Ahmed Kosba, and Elaine Shi. The ring of gyges: Using smart contracts for crime. available from http://www.arijuels.com/wp-content/uploads/2013/09/public_ gyges.pdf.