SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks
|
|
- Ruby Briggs
- 5 years ago
- Views:
Transcription
1 SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks $ Giulio Malavolta Saarland University Pedro Moreno-Sanchez Purdue University Aniket Kate Purdue University Matteo Maffei TU Vienna NDSS 2017
2 Yet Another Talk about Cryptocurrencies? TumbleBit and CoinShuffle++ are excellent ideas to provide privacy in Bitcoin 2
3 Yet Another Talk about Cryptocurrencies? TumbleBit and CoinShuffle++ are excellent ideas to provide privacy in Bitcoin Bitcoin (as other permissionless cryptocurrencies) relies on a blockchain: High storage requirement (>100 GB) High power consumption for proof-of-work 2
4 Yet Another Talk about Cryptocurrencies? TumbleBit and CoinShuffle++ are excellent ideas to provide privacy in Bitcoin Bitcoin (as other permissionless cryptocurrencies) relies on a blockchain: High storage requirement (>100 GB) High power consumption for proof-of-work Is it possible to have a decentralized payment system without a blockchain? 2
5 Credit (or IOU Settlement) Networks: Basics 3
6 Credit (or IOU Settlement) Networks: Basics Transactions in the real world pay $100 Bob Alice IOweYou $100 Bob Alice 3
7 Credit (or IOU Settlement) Networks: Basics Transactions in the real world A credit network representation Bob pay $100 Alice Bob 100 Alice IOweYou $100 Bob Alice 3
8 Credit (or IOU Settlement) Networks: Basics Transactions in the real world A credit network representation pay $100 Bob 100 Bob Alice Alice IOweYou $100 Bob Alice During a hike with Alice & Bob pay $10 Dave Carol IOweYou $10 Dave Carol 3
9 Credit (or IOU Settlement) Networks: Basics Transactions in the real world A credit network representation pay $100 Bob 100 Bob Alice Alice IOweYou $100 Bob Alice During a hike with Alice & Bob Dave pay $10 Carol Dave Carol IOweYou $10 Dave Carol 3
10 Credit (or IOU Settlement) Networks: Basics Transactions in the real world A credit network representation pay $100 Bob 100 Bob Alice Alice IOweYou $100 Bob Alice 10 During a hike with Alice & Bob Dave pay $10 Carol Dave Carol IOweYou $10 Dave Carol 3
11 Credit (or IOU Settlement) Networks: Basics Transactions in the real world A credit network representation pay $100 Bob Bob Alice Alice IOweYou $100 Bob Alice 10 During a hike with Alice & Bob Dave pay $10 Carol Dave Carol IOweYou $10 Dave Carol 3
12 Credit (or IOU Settlement) Networks: Basics Transactions in the real world A credit network representation pay $100 Bob Bob Alice Alice IOweYou $100 Bob Alice During a hike with Alice & Bob Dave pay $10 Carol Dave Carol IOweYou $10 Dave Carol 3
13 Credit Network Examples Academic proposals: Ostra: preventing spam [NSDI 08] Bazaar: strengthening e-commerce [NSDI 11] SumUp: Sybil-resilient content voting [NSDI 09] Industry deployments: Ripple: A real-life online payment network Stellar: Another real-life online payment network 4
14 Credit Network Examples Academic proposals: Ostra: preventing spam [NSDI 08] Bazaar: strengthening e-commerce [NSDI 11] SumUp: Sybil-resilient content voting [NSDI 09] Industry deployments: Ripple: A real-life online payment network Stellar: Another real-life online payment network 4
15 Ripple Credit Network 5
16 Ripple Credit Network 5
17 Ripple Credit Network 5
18 Ripple Credit Network 5
19 Ripple Credit Network 5
20 Ripple Credit Network 5
21 Ripple Credit Network 5
22 Ripple Credit Network AED $ CAD 100 5
23 Ripple Credit Network AED BTC 10 BTC 5 $ CAD 100 5
24 Ripple Credit Network AED BTC 10 BTC 5 $ 60 CAD 100 XYZ 40 XID 100 GDW 10 FMM
25 Ripple Credit Network AED BTC 10 BTC 5 $ 60 CAD 100 XYZ 40 XID 100 GDW 10 FMM Tx time Worldwide, cross-currency tx Integrity 5
26 Ripple Credit Network AED BTC 10 BTC 5 $ 60 CAD 100 XYZ 40 XID 100 GDW 10 FMM Tx time ~ 1 day Worldwide, cross-currency tx Integrity ~ 5 seconds 5
27 Ripple Credit Network AED BTC 10 BTC 5 $ 60 CAD 100 XYZ 40 XID 100 GDW 10 FMM Tx time ~ 1 day Worldwide, cross-currency tx High fees Integrity ~ 5 seconds Tiny fees 5
28 Ripple Credit Network AED BTC 10 BTC 5 $ 60 CAD 100 XYZ 40 XID 100 GDW 10 FMM Tx time ~ 1 day Worldwide, cross-currency tx High fees Integrity Bank only ~ 5 seconds Tiny fees Public verifiability 5
29 Ripple Credit Network AED BTC 10 BTC 5 $ 60 CAD 100 XYZ 40 XID 100 GDW 10 FMM Tx time ~ 1 day ~ 5 seconds Worldwide, cross-currency tx High fees Ripple can significantly improve cross-currency remittance and settlements Tiny fees Integrity Bank only Public verifiability 5
30 Public Verifiability & Privacy Problem The Ripple Ledger Transaction Details Credit Graph 6
31 Public Verifiability & Privacy Problem The Ripple Ledger Transaction Details Credit Graph Listening to Whispers of Ripple: Linking Wallets and Deanonymizing Transactions in the Ripple Network Pedro Moreno-Sanchez, Muhammad Bilal Zafar, Aniket Kate. PETS 16 6
32 Public Verifiability & Privacy Problem The Ripple Ledger Transaction Details Credit Graph Listening to Whispers of Ripple: Linking Wallets and Deanonymizing Transactions in the Ripple Network Pedro Moreno-Sanchez, Muhammad Bilal Zafar, Aniket Kate. PETS 16 Current credit networks employ a global ledger 6
33 Our Contributions We question the need for a global ledger and global consensus 7
34 Our Contributions We question the need for a global ledger and global consensus SilentWhispers: Decentralized credit network with security and privacy guarantees defined in UC framework Inspired by our work in NDSS 15 7
35 Our Contributions We question the need for a global ledger and global consensus SilentWhispers: Decentralized credit network with security and privacy guarantees defined in UC framework Inspired by our work in NDSS 15 SilentWhispers overcomes several challenges: existence of a path, credit on a path and integrity of transactions 7
36 Our Contributions We question the need for a global ledger and global consensus SilentWhispers uses distributed landmark routing, secure multiparty computation and 2-step transactions SilentWhispers: Decentralized credit network with security and privacy guarantees defined in UC framework Inspired by our work in NDSS 15 SilentWhispers overcomes several challenges: existence of a path, credit on a path and integrity of transactions 7
37 Our Contributions We question the need for a global ledger and global consensus SilentWhispers uses distributed landmark routing, secure multiparty computation and 2-step transactions SilentWhispers: Decentralized credit network with security and privacy guarantees defined in UC framework Inspired by our work in NDSS 15 SilentWhispers overcomes several challenges: existence of a path, credit on a path and integrity of transactions SilentWhispers is feasible in practice and offers interesting alternatives to current emerging payment systems 7
38 SilentWhispers: A Decentralized Credit Network 8
39 SilentWhispers: A Decentralized Credit Network Local Information suffices: Credit links of a user determine his credit in the network 8
40 SilentWhispers: A Decentralized Credit Network Local Information suffices: Credit links of a user determine his credit in the network In-flow = Charles Out-flow = Bob 25 Net-flow = 410 Alice 8
41 SilentWhispers: A Decentralized Credit Network Local Information suffices: Credit links of a user determine his credit in the network In-flow = Charles Out-flow = Bob 25 Net-flow = 410 Net-flow is what matters: Net-flow of a user must not change without the user s consent Alice 8
42 SilentWhispers: A Decentralized Credit Network Local Information suffices: Credit links of a user determine his credit in the network In-flow = Charles Out-flow = Bob 25 Net-flow = 410 Net-flow is what matters: Net-flow of a user must not change without the user s consent 5 Alice Charles Charles In-flow = 450 Out-flow = 40 Bob 25 Net-flow = 410 Alice 8
43 SilentWhispers: A Decentralized Credit Network Local Information suffices: Credit links of a user determine his credit in the network In-flow = Charles Out-flow = Bob 25 Net-flow = 410 Net-flow is what matters: Net-flow of a user must not change without the user s consent 5 Alice Charles Charles In-flow = 450 Out-flow = 40 Bob 25 Net-flow = 410 Alice 8
44 SilentWhispers: A Decentralized Credit Network Local Information suffices: Credit links of a user determine his credit in the network In-flow = Charles Out-flow = Bob 25 Net-flow = 410 Net-flow is what matters: Net-flow of a user must not change without the user s consent 5 Alice Charles Charles In-flow = 450 Out-flow = 40 Bob 25 Net-flow = 410 Alice 8
45 SilentWhispers: A Decentralized Credit Network Local Information suffices: Credit links of a user determine his credit in the network In-flow = Charles Out-flow = Bob 25 Net-flow = 410 Net-flow is what matters: Net-flow of a user must not change without the user s consent 5 Alice Charles Charles In-flow = 450 Out-flow = Bob 25 Net-flow = 410 Alice 8
46 Challenges Find paths between users Calculate credit available in the path Ensure integrity of transactions And more 9
47 The routing challenge 10
48 Routing Challenge: Landmark Routing 11
49 Routing Challenge: Landmark Routing Determine credit path from sender to receiver 11
50 Routing Challenge: Landmark Routing Determine credit path from sender to receiver Common problem in standard networks and ad-hoc networks 11
51 Routing Challenge: Landmark Routing Determine credit path from sender to receiver Common problem in standard networks and ad-hoc networks The max-flow approach: Not scalable enough: O(V 3 ) or O(V 2 log(e)) 11
52 Routing Challenge: Landmark Routing Determine credit path from sender to receiver Common problem in standard networks and ad-hoc networks The max-flow approach: Not scalable enough: O(V 3 ) or O(V 2 log(e)) Landmark routing [Tschusiya 89] Calculate subset of all paths 11
53 Routing Challenge: Landmark Routing Determine credit path from sender to receiver Common problem in standard networks and ad-hoc networks The max-flow approach: Not scalable enough: O(V 3 ) or O(V 2 log(e)) Landmark routing [Tschusiya 89] Calculate subset of all paths 11
54 Routing Challenge: Landmark Routing Determine credit path from sender to receiver Common problem in standard networks and ad-hoc networks The max-flow approach: Not scalable enough: O(V 3 ) or O(V 2 log(e)) Landmark routing [Tschusiya 89] Calculate subset of all paths U2 U3 11
55 Routing Challenge: Landmark Routing Determine credit path from sender to receiver Common problem in standard networks and ad-hoc networks The max-flow approach: Not scalable enough: O(V 3 ) or O(V 2 log(e)) Landmark routing [Tschusiya 89] Calculate subset of all paths U2 U3 U1 U4 11
56 Routing Challenge: Landmark Routing Determine credit path from sender to receiver Common problem in standard networks and ad-hoc networks The max-flow approach: Not scalable enough: O(V 3 ) or O(V 2 log(e)) Landmark routing [Tschusiya 89] Calculate subset of all paths Distributed BFS: Local information suffices U2 U3 U1 U4 11
57 Routing Challenge: Landmark Routing Determine credit path from sender to receiver Common problem in standard networks and ad-hoc networks The max-flow approach: Not scalable enough: O(V 3 ) or O(V 2 log(e)) Landmark routing [Tschusiya 89] Calculate subset of all paths Distributed BFS: Local information suffices U2 U3 U1 U4 11
58 Routing Challenge: Landmark Routing Determine credit path from sender to receiver Common problem in standard networks and ad-hoc networks The max-flow approach: Not scalable enough: O(V 3 ) or O(V 2 log(e)) Landmark routing [Tschusiya 89] Calculate subset of all paths Distributed BFS: Local information suffices U2 U3 U1 U4 11
59 Routing Challenge: Landmark Routing Determine credit path from sender to receiver Common problem in standard networks and ad-hoc networks The max-flow approach: Not scalable enough: O(V 3 ) or O(V 2 log(e)) Landmark routing [Tschusiya 89] Calculate subset of all paths Distributed BFS: Local information suffices Enough in practice 1,2 More efficient than max-flow 1,2 U2 U3 1 [Our work in NDSS 15] 2 [Viswanath et al. EUROSYS 12] U1 U4 11
60 Calculation of credit available in a path 12
61 Credit in a Path: SMPC
62 Credit in a Path: SMPC
63 Credit in a Path: SMPC [x]: Secret share of x [30] [30] [30] 13
64 Credit in a Path: SMPC [x]: Secret share of x [30] [30] [30] Given [x] it is not possible to know x 13
65 Credit in a Path: SMPC [x]: Secret share of x [30] [15] [30] [15] [30] Given [x] it is not possible to know x 13
66 Credit in a Path: SMPC [x]: Secret share of x [30] [15] [25] [30] [30] [15] [25] [25] Given [x] it is not possible to know x 13
67 Credit in a Path: SMPC [x]: Secret share of x [30] [15] [25] [10] [30] [25] [30] [15] [25] [10] [10] Given [x] it is not possible to know x 13
68 Credit in a Path: SMPC [x]: Secret share of x [credit in path] [30] [15] [credit in path] [25] [10] [30] [25] [30] [15] [25] [10] [10] [credit in path] Given [x] it is not possible to know x 13
69 Credit in a Path: SMPC [x]: Secret share of x [credit in path] [30] [15] [credit in path] [25] [10] [30] [25] [30] [15] [25] [10] [10] [credit in path] Given [x] it is not possible to know x 13
70 Credit in a Path: SMPC [x]: Secret share of x [credit in path] [30] [15] [credit in path] [25] [10] [30] [25] [30] [15] [25] [10] [10] [credit in path] Given [x] it is not possible to know x Given enough copies of [x] one can reconstruct x 13
71 Integrity of the transactions 14
72 Transaction Integrity and Dispute Resolution 15
73 Transaction Integrity and Dispute Resolution 2-step transaction: on hold and settle 15
74 Transaction Integrity and Dispute Resolution 2-step transaction: on hold and settle Example:
75 Transaction Integrity and Dispute Resolution 2-step transaction: on hold and settle Example: 5 (5)
76 Transaction Integrity and Dispute Resolution 2-step transaction: on hold and settle Example: 5 (5) (5)
77 Transaction Integrity and Dispute Resolution 2-step transaction: on hold and settle Example: 5 (5) (5) Ok, received! 15
78 Transaction Integrity and Dispute Resolution 2-step transaction: on hold and settle Example: 5 (5) Ok, received! 15
79 Transaction Integrity and Dispute Resolution 2-step transaction: on hold and settle Example: 5 (5) Ok, received! Incentive 15
80 Transaction Integrity and Dispute Resolution 2-step transaction: on hold and settle Example: Ok, received! Incentive 15
81 Transaction Integrity and Dispute Resolution 2-step transaction: on hold and settle Example: Ok, received! Incentive Integrity: All landmarks cannot make the user lose credit 15
82 Transaction Integrity and Dispute Resolution 2-step transaction: on hold and settle Example: 5 No! our credit is 15! Ok, received! Incentive Integrity: All landmarks cannot make the user lose credit 15
83 Transaction Integrity and Dispute Resolution 2-step transaction: on hold and settle Example: 5 No! our credit is 15! Ok, received! Incentive Integrity: All landmarks cannot make the user lose credit Accountability: In case of dispute, users must prove the link value Local logs suffice to determine the valid current value The disputed value is bounded 15
84 Evaluation 16
85 Evaluation and Discussion 17
86 Evaluation and Discussion C++ prototype implementation Secret Sharing-based MPC library: Shared 17
87 Evaluation and Discussion C++ prototype implementation Secret Sharing-based MPC library: Shared Setup using Ripple transactions: Maximum path length: 10 links Maximum number of paths: 7 landmarks (Ripple Gateways) 17
88 Evaluation and Discussion C++ prototype implementation Secret Sharing-based MPC library: Shared Setup using Ripple transactions: Maximum path length: 10 links Maximum number of paths: 7 landmarks (Ripple Gateways) Computing available credit on a path in ~1.3 seconds Different paths in parallel 17
89 Evaluation and Discussion C++ prototype implementation Secret Sharing-based MPC library: Shared Setup using Ripple transactions: Maximum path length: 10 links Maximum number of paths: 7 landmarks (Ripple Gateways) Computing available credit on a path in ~1.3 seconds Different paths in parallel Feasible to run in practice current Ripple transactions 17
90 Evaluation and Discussion C++ prototype implementation Secret Sharing-based MPC library: Shared Setup using Ripple transactions: Maximum path length: 10 links Maximum number of paths: 7 landmarks (Ripple Gateways) Computing available credit on a path in ~1.3 seconds Different paths in parallel Feasible to run in practice current Ripple transactions SilentWhispers has attracted attention from industry: KOINA: 17
91 The Landscape of Emerging Payment Systems 18
92 The Landscape of Emerging Payment Systems Cryptocurrencies Ripple SilentWhispers Transfer of funds Direct transactions between any two wallets Transactions only via a path with enough credit 18
93 The Landscape of Emerging Payment Systems Cryptocurrencies Ripple SilentWhispers Transfer of funds Direct transactions between any two wallets Transactions only via a path with enough credit Transaction flexibility Fixed currency agreed between sender and receiver Support for cross-currency transactions 18
94 The Landscape of Emerging Payment Systems Cryptocurrencies Ripple SilentWhispers Transfer of funds Direct transactions between any two wallets Transactions only via a path with enough credit Transaction flexibility Fixed currency agreed between sender and receiver Support for cross-currency transactions Transaction verification Globally verified Locally verified by users in the path 18
95 Take Home Message 19
96 Take Home Message A credit network does not require a global ledger or global consensus 19
97 Take Home Message A credit network does not require a global ledger or global consensus SilentWhispers: A decentralized credit network enforcing security and privacy and overcoming several challenges 19
98 Take Home Message A credit network does not require a global ledger or global consensus SilentWhispers is feasible in practice and it has attracted attention from industry SilentWhispers: A decentralized credit network enforcing security and privacy and overcoming several challenges 19
99 Take Home Message A credit network does not require a global ledger or global consensus SilentWhispers is feasible in practice and it has attracted attention from industry SilentWhispers: A decentralized credit network enforcing security and privacy and overcoming several challenges SilentWhispers is an interesting alternative in the landscape of emerging payment systems 19
100 Take Home Message A credit network does not require a global ledger or global consensus SilentWhispers is feasible in practice and it has attracted attention from industry SilentWhispers: A decentralized credit network enforcing security and privacy and overcoming several challenges SilentWhispers is an interesting alternative in the landscape of emerging payment systems 19
Concurrency and Privacy with Payment Channel Networks
Concurrency and Privacy with Payment Channel Networks Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei*, and Srivatsan Ravi Friedrich-Alexander-University Purdue University *TU Vienna
More informationSecurity, Privacy and Interoperability in Payment- Channel Networks
FAKULTÄT FÜR!NFORMATIK Faculty of Informatics & PRIVACY SECURITY GROUP Security, Privacy and Interoperability in Payment- Channel Networks Pedro Moreno-Sanchez (@pedrorechez) Joint work with Giulio Malavolta,
More informationThe power of Blockchain: Smart Contracts. Foteini Baldimtsi
The power of Blockchain: Smart Contracts Foteini Baldimtsi The Blockchain at the heart of a cryptocurrency Alice sends 2 John sends 1 Dave sends 5 to Bob to Eve to Alice Bob sends 1 Eve sends 4 to Dave
More informationENEE 457: E-Cash and Bitcoin
ENEE 457: E-Cash and Bitcoin Charalampos (Babis) Papamanthou cpap@umd.edu Money today Any problems? Cash is cumbersome and can be forged Credit card transactions require centralized online bank are not
More informationSettling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions
Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions Stefanie Roos University of Waterloo sroos@uwaterloo.ca Pedro Moreno-Sanchez Purdue University pmorenos@purdue.edu
More informationPrivacy Preserving Payments in Credit Networks
Privacy Preserving Payments in Credit Networks Enabling trust with privacy in online marketplaces Pedro Moreno-Sanchez CISPA, Saarland University pedro@mmci.uni-saarland.de Aniket Kate CISPA, Saarland
More informationSecurity Analysis of Bitcoin. Dibyojyoti Mukherjee Jaswant Katragadda Yashwant Gazula
Security Analysis of Bitcoin Dibyojyoti Mukherjee Jaswant Katragadda Yashwant Gazula Security Analysis of Bitcoin Introduction How Bitcoin works? Similar peer-to-peer systems Vulnerabilities and solutions
More informationSpaceMint Overcoming Bitcoin s waste of energy
Bitcoin Overcoming Bitcoin s waste of energy Georg Fuchsbauer joint work with S Park, A Kwon, K Pietrzak, J Alwen and P Gaži Digital currency Decentralized (no bank issuing coins) Pseudonymous Controled
More informationPedro MMCI, Saarland University
CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin [project page] [paper] @real_or_random Pedro Moreno-Sanchez @pedrorechez MMCI, Saarland University Aniket Kate @aniketpkate Introduction Alice
More informationSmalltalk 3/30/15. The Mathematics of Bitcoin Brian Heinold
Smalltalk 3/30/15 The Mathematics of Bitcoin Brian Heinold What is Bitcoin? Created by Satoshi Nakamoto in 2008 What is Bitcoin? Created by Satoshi Nakamoto in 2008 Digital currency (though not the first)
More informationLecture 9. Anonymity in Cryptocurrencies
Lecture 9 Anonymity in Cryptocurrencies Some say Bitcoin provides anonymity Bitcoin is a secure and anonymous digital currency WikiLeaks donations page Others say it doesn t Bitcoin won't hide you from
More informationBlockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric
Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Elli Androulaki Staff member, IBM Research, Zurich Workshop on cryptocurrencies Athens, 06.03.2016 Blockchain systems
More informationDistributed Ledger Technology & Fintech Applications. Hart Montgomery, NFIC 2017
Distributed Ledger Technology & Fintech Applications Hart Montgomery, NFIC 2017 Let s consider a common scenario: Banks want to trade some asset class Participants in the market want to be able to efficiently
More informationKey concepts of blockchain
Advisory A brief history of blockchains 2008 The mysterious Satoshi Nakamoto publishes his Bitcoin white paper 2014 2017 Nov. 23 rd Ethereum crowd sale Number of crypto tokens: 1.172 BTC $8.216 The first
More informationThe Blockchain. Josh Vorick
The Blockchain Josh Vorick Bitcoin is a currency. Blockchain is a technology. What is a blockchain? A decentralized database that anyone can add to and no one can delete from The Bitcoin blockchain Agenda
More informationAlternatives to Blockchains. Sarah Meiklejohn (University College London)
Alternatives to Blockchains Sarah Meiklejohn (University College London) fully decentralized cryptocurrencies 2 fully decentralized cryptocurrencies tx tx(addra addrb) 2 fully decentralized cryptocurrencies
More informationChapter 13. Digital Cash. Information Security/System Security p. 570/626
Chapter 13 Digital Cash Information Security/System Security p. 570/626 Introduction While cash is used in illegal activities such as bribing money laundering tax evasion it also protects privacy: not
More informationHyperledger fabric: towards scalable blockchain for business
Marko Vukolić, IBM Research - Zurich Hyperledger fabric: towards scalable blockchain for business Trust in Digital Life The Hague, Netherlands, June 17 2016 Blockchain shared, replicated, ledger Consensus
More informationBitcoin and Blockchain
Bitcoin and Blockchain COS 418: Distributed Systems Lecture 18 Zhenyu Song [Credit: Selected content adapted from Michael Freedman. Slides refined by Chris Hodsdon and Theano Stavrinos] Why Bitcoin? All
More informationTechnical White Paper of. MOAC Mother of All Chains. June 8 th, 2017
Technical White Paper of MOAC Mother of All Chains June 8 th, 2017 [Abstract] MOAC is to design a scalable and resilient Blockchain that supports transactions, data access, control flow in a layered structure.
More informationComputer Security. 14. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2019
Computer Security 14. Blockchain & Bitcoin Paul Krzyzanowski Rutgers University Spring 2019 April 15, 2019 CS 419 2019 Paul Krzyzanowski 1 Bitcoin & Blockchain Bitcoin cryptocurrency system Introduced
More informationBITCOIN PROTOCOL & CONSENSUS: A HIGH LEVEL OVERVIEW
BITCOIN PROTOCOL & CONSENSUS: A HIGH LEVEL OVERVIEW Rustie Lin Wang Move the area1 over the image a little inside and then right click, replace image to change the background. (and delete this box while
More informationSet: Hub-and-Spoke Cryptographic Payment Channels
Set: Hub-and-Spoke Cryptographic Payment Channels v0.0.1 Nathan Ginnever: nathan@finalitylabs.io Abstract Here we outline the Set-Payment channel protocol (In a later paper we incrementally extend Set
More informationInterledger. Internetworking for Money. Evan Schwartz Engineer at Ripple Co-Inventor of Interledger
Interledger Internetworking for Money Evan Schwartz Engineer at Ripple Co-Inventor of Interledger Payments are broken. Accepting Payments in a Turkish Starbucks Accepting Payments OnlinePayments Online
More informationHashCash Consultants. Whitepaper-HC NET
Whitepaper- 1 Copyright Notice 2017 Hashcash Consultants. All Rights Reserved. This documentation is the sole property of Hashcash Consultants. Hashcash Consultants believes the information in this document
More informationInterledger. A Payment Protocol Inspired by IP. Adrian Hope-Bailie Evan Schwartz Stefan Thomas
Interledger A Payment Protocol Inspired by IP Adrian Hope-Bailie Evan Schwartz Stefan Thomas Agenda 1. Project Background 2. Ledgers and the Problem with Payments Today 3. Interledger Packet and Protocol
More informationErgo platform: from prototypes to a survivable cryptocurrency
January 2019 Dmitry Meshkov Ergo platform: from prototypes to a survivable cryptocurrency Outline Ergo Consensus Light Storage vision protocol clients fee Voting Smart Monetary Roadmap system contracts
More informationAlgorand: Scaling Byzantine Agreements for Cryptocurrencies
Algorand: Scaling Byzantine Agreements for Cryptocurrencies Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, Nickolai Zeldovich Presented by: Preet Patel and Umang Lathia Outline Overview of Distributed
More informationLecture 3. Introduction to Cryptocurrencies
Lecture 3 Introduction to Cryptocurrencies Public Keys as Identities public key := an identity if you see sig such that verify(pk, msg, sig)=true, think of it as: pk says, [msg] to speak for pk, you must
More informationOpenbankIT: a banking platform for e- money management based on blockchain technology
OpenbankIT: a banking platform for e- money management based on blockchain technology Dr. Pavel Kravchenko, Sergiy Vasilchuk, Bohdan Skriabin pavel@distributedlab.com, vsv@atticlab.net, bohdan@distributedlab.com
More informationWhat is Proof of Work?
What is Proof of Work? Educational Series September 18, 2018 Overview There are many protocols that regulate how nodes on a blockchain achieve consensus, and currently the most popular is proof-of-work.
More informationUniversity of Duisburg-Essen Bismarckstr Duisburg Germany HOW BITCOIN WORKS. Matthäus Wander. June 29, 2011
University of Duisburg-Essen Bismarckstr. 90 47057 Duisburg Germany HOW BITCOIN WORKS June 29, 2011 Overview Electronic currency system Decentralized No trusted third party involved Unstructured peer-to-peer
More informationPublic Chain for Digital Asset Escrow
Public Chain for Digital Asset Escrow Decentralized PayPal Whitepaper 2018/03 v3 https://themis.network 1. OVERVIEW... 1 2. FAIR EXCHANGE IN DIGITAL COMMERCE... 4 2.1 TRANSACTIONS BETWEEN DIFFERENT DIGITAL
More informationCOIN. Secure and Anonymous Decentralized Bitcoin Mixing PARTY
COIN PARTY Secure and Anonymous Decentralized Bitcoin Mixing Jan Henrik Ziegeldorf, Roman Matzu7, Fred Grossmann, Mar;n Henze, Klaus Wehrle Communica;on and Distributed Systems (COMSYS), RWTH Aachen, Germany
More informationHawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. Yashar Dehkan Asl
Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts Yashar Dehkan Asl Chapter I Introduction Decentralized Cryptocurrencies: Such as Bitcoin and altcoins are getting more
More informationIntroduction to Cryptoeconomics
Introduction to Cryptoeconomics What is cryptoeconomics? Cryptoeconomics is about... Building systems that have certain desired properties Use cryptography to prove properties about messages that happened
More informationBlockFin A Fork-Tolerant, Leaderless Consensus Protocol April
BlockFin A Fork-Tolerant, Leaderless Consensus Protocol April 2018 @storecoin What are the most desirable features in a blockchain? Scalability (throughput) and decentralization (censorship resistance),
More informationKey Security Issues for implementation of Digital Currency, including ITU-T SG17 activities
ITU Workshop on FG DFC Workshop on Standards for Digital Fiat Currency (DFC) () Key Issues for implementation of Digital Currency, including ITU-T SG17 activities Heung Youl Youm, PhD. Chairman of ITU-T
More informationIntroduction to Cryptocurrency Ecosystem. By Raj Thimmiah
Introduction to Cryptocurrency Ecosystem By Raj Thimmiah How does a normal payment system work? Normal payment systems (generally) use ledgers Easy for servers to then check if someone is committing double
More informationThe technical notes represented on the following pages are intended to describe and officially document the concepts behind NulleX Blockchain.
1 The technical notes represented on the following pages are intended to describe and officially document the concepts behind NulleX Blockchain. This document provides and explains in detail the technical
More informationBiomedical and Healthcare Applications for Blockchain. Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs
Biomedical and Healthcare Applications for Blockchain Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs Network Analysis Working Group 01.25.2018 Outline Introduction to bitcoin + blockchain
More informationBitcoin, a decentralized and trustless protocol
Bitcoin, a decentralized and trustless protocol Thomas Sibut-Pinote Inria Saclay February 12, 2015 Thomas Sibut-Pinote Bitcoin, a decentralized and trustless protocol 1 / 42 Introduction Questions 1 Introduction
More informationBitcoin (Part I) Ken Calvert Keeping Current Seminar 22 January Keeping Current 1
Bitcoin (Part I) Ken Calvert Keeping Current Seminar 22 January 2014 2014.01.22 Keeping Current 1 Questions What problem is Bitcoin solving? Where did it come from? How does the system work? What makes
More informationConsensus & Blockchain
Consensus & Blockchain S P Suresh Chennai Mathematical Institute Formal Methods Update Meeting IIT Mandi July 17, 2017 The Bitcoin revolution is upon us What is Bitcoin? Bitcoin: an exciting new currency
More informationDisLedger - Distributed Concurrence Ledgers 12 August, 2017
DisLedger - Distributed Concurrence Ledgers www.disledger.com info@disledger.com 12 August, 2017 This whitepaper describes DisLedger - Distributed Concurrence Ledgers (patent pending) an architecture for
More informationPublic Wallet Interface for Ripple
CS 795 Blockchain Technologies CS 795 Authors: May 15, 2017 Contents 1 Abstract 2 2 Introduction 3 3 Program Design Architecture 6 4 Functionality 7 5 Preview 10 6 In-comparison with other wallets 13 7
More informationCatena: Efficient Non-equivocation via Bitcoin
Catena: Efficient Non-equivocation via Bitcoin Alin Tomescu MIT CSAIL Srinivas Devadas MIT CSAIL Abstract We present Catena, an efficiently-verifiable Bitcoin witnessing scheme. Catena enables any number
More informationSOME OF THE PROBLEMS IN BLOCKCHAIN TODAY
BLOCKCHAIN EVOLVED THE PROBLEM SOME OF THE PROBLEMS IN BLOCKCHAIN TODAY An overall lack of governance is one of the most challenging facets of current blockchain ecosystems Controversy regarding scalability
More informationCS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University
CS 4770: Cryptography CS 6750: Cryptography and Communication Security Alina Oprea Associate Professor, CCIS Northeastern University March 30 2017 Outline Digital currencies Advantages over paper cash
More informationCandidates Day Modeling the Energy Consumption of. Ryan Cole Liang Cheng. CSE Department Lehigh University
Candidates Day 2016 Modeling the Energy Consumption of Blockchain Consensus Algorithms Daniel Lopresti, Interim Dean P.C. Rossin College of Engineering and Applied Science July 30, April 15,2018 2016 Ryan
More informationPreview. Mobile Payments. Payments Strategy Series. A Guide to Planning Your Approach. Price: $150
Payments Strategy Series Mobile Payments A Guide to Planning Your Approach Price: $150 WesPay Publications Payments Strategy Series WesPay (Western Payments Alliance) has a long tradition of working with
More informationSecurity: Focus of Control
Security: Focus of Control Three approaches for protection against security threats a) Protection against invalid operations b) Protection against unauthorized invocations c) Protection against unauthorized
More informationCS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University
CS 4770: Cryptography CS 6750: Cryptography and Communication Security Alina Oprea Associate Professor, CCIS Northeastern University April 9 2018 Schedule HW 4 Due on Thu 04/12 Programming project 3 Due
More informationHow to use Fusioncoin Wallet
How to use Fusioncoin Wallet < How to make an account > Please click Register Type your user name, email address, password and click Register If you have authentication key, do not forget type it. (Email
More informationPrelude. The notes within this Whitepaper publication are intended to formally document the concepts and features of the Aegeus cryptocurrency.
Prelude The notes within this Whitepaper publication are intended to formally document the concepts and features of the Aegeus cryptocurrency. This document will explain methodically, the details of the
More informationDistributed Algorithms Bitcoin
Distributed Algorithms Bitcoin Alberto Montresor Università di Trento 2018/12/18 Acknowledgment: Joseph Bonneau, Ed Felten, Arvind Narayanan This work is licensed under a Creative Commons Attribution-ShareAlike
More informationBlockchain, cryptography, and consensus
ITU Workshop on Security Aspects of Blockchain (Geneva, Switzerland, 21 March 2017) Blockchain, cryptography, and consensus Dr. Christian Cachin IBM Research - Zurich www.zurich.ibm.com/~cca/ Geneva, Switzerland,
More informationSecurity Analysis of the Lightning Network
Security Analysis of the Lightning Network Laolu Osuntokun @roasbeef Lightning Labs BPASE 2017 State of the Hash-Lock In-progress Lightning Network specifications (lighting-rfc) Basis of Lightning Technology
More informationAnonymity vs. Privacy
Innovation and Cryptoventures Anonymity vs. Privacy Campbell R. Harvey Duke University, NBER and Investment Strategy Advisor, Man Group, plc January 25, 2017 2 Setting Considerable misunderstanding of
More informationZero-Knowledge proof of knowledge transfer. Perm summer school on blockchain 2018
Zero-Knowledge proof of knowledge transfer Teleport Teleport was born in 2016 from the idea to bring the power of peer-to-peer traffic distribution technology like BitTorrent to the solution of traffic
More informationDeveloping Blockchain Software
Developing Blockchain Software David Schwartz, Chief Cryptographer CPPCON: September 22, 2016 1 About Me David Schwartz Chief Cryptographer at Ripple One of the original architects of the Ripple Consensus
More informationHow to use Fusioncoin Wallet
How to use Fusioncoin Wallet < How to make an account > Please click Register Type your user name, email address, password and click Register If you have authentication key, do not forget type it. (Email
More informationBlockchain Certification Protocol (BCP)
Blockchain Certification Protocol (BCP) Fu Yong Quah fuyong@fyquah.me www.fyquah.me Abstract. A semi-decentralized certification system built above the existing 1 Bitcoin network, an innovative peer-to-peer
More informationReliability, distributed consensus and blockchain COSC412
Reliability, distributed consensus and blockchain COSC412 Learning objectives Encourage you to always design for failure Appreciate how decentralised consensus is useful to support principles of security
More informationBlockchain, Cryptocurrency, Smart Contracts and Initial Coin Offerings: A Technical Perspective
SESSION ID: LAB3-R09 Blockchain, Cryptocurrency, Smart Contracts and Initial Coin Offerings: A Technical Perspective Tom Plunkett Consulting Solutions Director Oracle Captain Brittany Snelgrove United
More informationBlockchain. CS 240: Computing Systems and Concurrency Lecture 20. Marco Canini
Blockchain CS 240: Computing Systems and Concurrency Lecture 20 Marco Canini Credits: Michael Freedman and Kyle Jamieson developed much of the original material. Bitcoin: 10,000 foot view New bitcoins
More informationPERUN: Virtual Payment Hubs over Cryptographic Currencies
PERUN: Virtual Payment Hubs over Cryptographic Currencies Stefan Dziembowski University of Warsaw Lisa Eckey TU Darmstadt Sebastian Faust TU Darmstadt Daniel Malinowski University of Warsaw Abstract Payment
More informationBlockchain (de)constructed
Blockchain (de)constructed Fritz Henglein Department of Computer Science, University of Copenhagen (DIKU) DIKU Business Club meeting on blockchain January 11th, 2016 Fritz Henglein Professor of programming
More informationErgo platform. Dmitry Meshkov
Ergo platform Dmitry Meshkov Prehistory Motivation Theory Practice Provably secure 1000 currencies New features Ad-hoc solutions Impractical Security issues Motivation Theory Provably secure New features
More informationProblem: Equivocation!
Bitcoin: 10,000 foot view Bitcoin and the Blockchain New bitcoins are created every ~10 min, owned by miner (more on this later) Thereafter, just keep record of transfers e.g., Alice pays Bob 1 BTC COS
More informationPrivacy-Enabled NFTs: User-Mintable, Non-Fungible Tokens With Private Off-Chain Data
Privacy-Enabled NFTs: User-Mintable, Non-Fungible Tokens With Private Off-Chain Data Philip Stehlik Lucas Vogelsang August 8, 2018 1 Abstract Privacy-enabled NFTs (non-fungible tokens) are user-mintable
More informationTable Of Contents. Introduction Blockchain and Cryptocurrency...1. Stellar (payment network)...2. Internet and its issues...3. LocalXpose...
Table Of Contents Introduction... 1 Blockchain and Cryptocurrency...1 Stellar (payment network)...2 Internet and its issues...3 LocalXpose... 5 How LocalXpose Actually works?...6 Why to use LocalXpose?...7
More informationAs a 3rd generation currency, not only are transactions secured, private and fast, you actually get paid for holding DigitalPrice coins.
Introduction With the circulation of cryptocurrency becoming common, there is a need for additional information. The scope of this white paper is to provide that information. If you are under the impression
More informationTOPPERCASH TOPPERCASH WHITEPAPER REFORM THE BEST OF BLOCKCHAIN
TOPPERCASH TOPPERCASH WHITEPAPER REFORM THE BEST OF BLOCKCHAIN ABSTRACT A PEER-TO-PEER CRYPTO-CURRENCY DESIGN DERIVED FROM SATOSHI NAKAMOTO S BITCOIN. PROOF- OF-STAKE REPLACES PROOF-OF- WORK TO PROVIDE
More informationShort review of the Coinmama.com. Registration on the Coinmama
Short review of the Coinmama.com Coinmama is not an exchange in its' usual sense. Here you can only buy currency, so its' more like a currency exchanger. The platform doesn t have the built-in wallet and
More informationTechnical Analysis of Established Blockchain Systems
Technical Analysis of Established Blockchain Systems Florian Haffke, 20.11.2017, Munich Chair of Software Engineering for Business Information Systems (sebis) Faculty of Informatics Technische Universität
More informationOverview & White Paper.
Overview & White Paper www.phantomx.co CONTENT 2. Introduction 7. Scalability and Network 3. Summary 3. About PhantomX 3. Our mission 4. The team behind PhantomX 5. Specification 8. Proof-of-Work 9. Proof-of-Stake
More informationEnsimag - 4MMSR Network Security Student Seminar. Bitcoin: A peer-to-peer Electronic Cash System Satoshi Nakamoto
Ensimag - 4MMSR Network Security Student Seminar Bitcoin: A peer-to-peer Electronic Cash System Satoshi Nakamoto wafa.mbarek@ensimag.fr halima.myesser@ensimag.fr 1 Table of contents: I- Introduction: Classic
More informationBitcoin. CS6450: Distributed Systems Lecture 20 Ryan Stutsman
Bitcoin CS6450: Distributed Systems Lecture 20 Ryan Stutsman Material taken/derived from Princeton COS-418 materials created by Michael Freedman and Kyle Jamieson at Princeton University. Licensed for
More informationHow Bitcoin achieves Decentralization. How Bitcoin achieves Decentralization
Centralization vs. Decentralization Distributed Consensus Consensus without Identity, using a Block Chain Incentives and Proof of Work Putting it all together Centralization vs. Decentralization Distributed
More informationA Scalable Smart Contracts Platform
A Scalable Smart Contracts Platform! Shehar Bano! Postdoc, InfoSec group! University College London!! s.bano@ucl.ac.uk! @thatbano https://github.com/chainspace The Team Mustafa Al-Bassam! (UCL) Alberto
More informationA Blockchain-based Mapping System
A Blockchain-based Mapping System IETF 98 Chicago March 2017 Jordi Paillissé, Albert Cabellos, Vina Ermagan, Fabio Maino jordip@ac.upc.edu http://openoverlayrouter.org 1 A short Blockchain tutorial 2 Blockchain
More informationBlockchain! What consultants should know about it. Daniel
Blockchain! What consultants should know about it. Daniel Karzel @ Workshop Overview Quick overview of what is planned for the workshop. What you get out of this workshop Workshop goals Understand what
More informationDEV. Deviant Coin, Innovative Anonymity. A PoS/Masternode cr yptocurrency developed with POS proof of stake.
DEV Deviant Coin, Innovative Anonymity A PoS/Masternode cr yptocurrency developed with POS proof of stake. CONTENTS 03 Overview 06 Pre-mine phase 07 Privacy 08 Basic parameters 09 Proof-of-stake The benefits
More informationA Blockchain-based Flight Data Recorder for Cloud Accountability
A Blockchain-based Flight Data Recorder for Cloud Accountability G. D Angelo, S. Ferretti, M. Marzolla Dept. of Computer Science and Engineering s.ferretti@unibo.it Cloud Computing On-demand self service
More informationBitcoin. when a decentralised economy becomes centralised. ClaudioJ Tessone. URPP Social Networks
Bitcoin when a decentralised economy becomes centralised ClaudioJ Tessone URPP Social Networks Scientifica Contents Prelude Introduction to Bitcoin Mining concentration Economic flow Governance Take-home
More informationZILLIQA / ZILIKƏ/ NEXT GEN HIGH-THROUGHPUT BLOCKCHAIN PLATFORM DONG XINSHU, CEO JIA YAOQI, BLOCKCHAIN ZILLIQA.
ZILLIQA / ZILIKƏ/ NEXT GEN HIGH-THROUGHPUT BLOCKCHAIN PLATFORM DONG XINSHU, CEO JIA YAOQI, BLOCKCHAIN ARCHITECT SCALABILITY OF PUBLIC BLOCKCHAIN BITCOIN 7 TX/S ETHEREUM 10 TX/S VISA 8000 TX/S SOME EXISTING
More informationNervos CKB: A common knowledge base for blockchains and applications
Nervos CKB: A common knowledge base for blockchains and applications Draft Version Jan Xie Nervos.org January 2, 2018 Abstract This document provides an overview of the Nervos Common Knowledge Base (CKB),
More informationINTRODUCTION WHY DAPS?
DAPS WHITEPAPER INTRODUCTION DAPS is a planned experimental hybrid fork-swap of Peepcoin, to be conducted in 2018. The goal of DAPS protocol is to create a fully anonymous coin and eventually payment system
More informationHyperledger Fabric v1:
Marko Vukolić, IBM Research - Zurich May 4, 2017 Hyperledger Fabric v1: Rethinking Permissioned Blockchains Blockchain: du Bitcoin au Smart Contract 4 Mai 2017 2017 IBM Corporation What is a Blockchain?
More informationNON-TECHNICAL WHITEPAPER Version 1.0
NON-TECHNICAL WHITEPAPER Version 1.0 Abstract Decentralization in Cryptocurrency Standard blockchain environments contain many centralization vulnerabilities, such as monolithic development, consensus
More informationINX Tokenomics I
Content: 1. INX Tokenomics 2. Why is our blockchain needed? 3. Why are our INX needed? 4. Our technology 5. Blockchain specifications 6. INX details 7. INX distribution 8. INX sales 9. Use of funds 10.
More informationWhitepaper Rcoin Global
Whitepaper Rcoin Global SUMMARY 1. Introduction 2. What is Rcoin Global? 3. Transactions 4. Hybrid Network Concept 5. Keepers 6. Incentive 7. Smart Contract Token 8. Token Distribution 9. Rcoin Global
More informationRadix - Public Node Incentives
Radix - Public Node Incentives Dan Hughes Piers Ridyard www.radix.global December 2017 Abstract In this paper we present a novel method for implementing a mechanism to reward work carried out across a
More informationJune 19, Mixin Network. A free and lightning fast peer-to-peer transactional network for digital assets.
Draft @ June 19, 2018 Mixin Network A free and lightning fast peer-to-peer transactional network for digital assets. TECHNICAL WHITE PAPER SUBJECT TO FURTHER REVIEW AND UPDATE contact@mixin.one 1 of 29
More informationP2P BitCoin: Technical details
ELT-53206 Peer-to-Peer Networks P2P BitCoin: Technical details Mathieu Devos Tampere University of Technology Department of Electronics & Communications Engineering mathieu.devos@tut.fi TG406 2 Outline
More informationCryptography and Cryptocurrencies. Intro to Cryptography and Cryptocurrencies
Intro to Cryptographic Hash Functions Hash Pointers and Data Structures Block Chains Merkle Trees Digital Signatures Public Keys and Identities Let s design us some Digital Cash! Intro to Cryptographic
More informationcchannel Generalized State Channel Specification
cchannel Generalized State Channel Specification Celer Network Core Team May 27, 2018 cchannel of the Celer Network is a generalized state channel and sidechain suite that provides a framework to support
More informationProof of Stake Made Simple with Casper
Proof of Stake Made Simple with Casper Olivier Moindrot ICME, Stanford University olivierm@stanford.edu Charles Bournhonesque ICME, Stanford University cbournho@stanford.edu Abstract We study the recent
More informationCISC859: Topics in Advanced Networks & Distributed Computing: Network & Distributed System Security. A Brief Overview of Security & Privacy Issues
CISC859: Topics in Advanced Networks & Distributed Computing: Network & Distributed System Security A Brief Overview of Security & Privacy Issues 1 Topics to Be Covered Cloud computing RFID systems Bitcoin
More information