SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks

Size: px
Start display at page:

Download "SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks"

Transcription

1 SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks $ Giulio Malavolta Saarland University Pedro Moreno-Sanchez Purdue University Aniket Kate Purdue University Matteo Maffei TU Vienna NDSS 2017

2 Yet Another Talk about Cryptocurrencies? TumbleBit and CoinShuffle++ are excellent ideas to provide privacy in Bitcoin 2

3 Yet Another Talk about Cryptocurrencies? TumbleBit and CoinShuffle++ are excellent ideas to provide privacy in Bitcoin Bitcoin (as other permissionless cryptocurrencies) relies on a blockchain: High storage requirement (>100 GB) High power consumption for proof-of-work 2

4 Yet Another Talk about Cryptocurrencies? TumbleBit and CoinShuffle++ are excellent ideas to provide privacy in Bitcoin Bitcoin (as other permissionless cryptocurrencies) relies on a blockchain: High storage requirement (>100 GB) High power consumption for proof-of-work Is it possible to have a decentralized payment system without a blockchain? 2

5 Credit (or IOU Settlement) Networks: Basics 3

6 Credit (or IOU Settlement) Networks: Basics Transactions in the real world pay $100 Bob Alice IOweYou $100 Bob Alice 3

7 Credit (or IOU Settlement) Networks: Basics Transactions in the real world A credit network representation Bob pay $100 Alice Bob 100 Alice IOweYou $100 Bob Alice 3

8 Credit (or IOU Settlement) Networks: Basics Transactions in the real world A credit network representation pay $100 Bob 100 Bob Alice Alice IOweYou $100 Bob Alice During a hike with Alice & Bob pay $10 Dave Carol IOweYou $10 Dave Carol 3

9 Credit (or IOU Settlement) Networks: Basics Transactions in the real world A credit network representation pay $100 Bob 100 Bob Alice Alice IOweYou $100 Bob Alice During a hike with Alice & Bob Dave pay $10 Carol Dave Carol IOweYou $10 Dave Carol 3

10 Credit (or IOU Settlement) Networks: Basics Transactions in the real world A credit network representation pay $100 Bob 100 Bob Alice Alice IOweYou $100 Bob Alice 10 During a hike with Alice & Bob Dave pay $10 Carol Dave Carol IOweYou $10 Dave Carol 3

11 Credit (or IOU Settlement) Networks: Basics Transactions in the real world A credit network representation pay $100 Bob Bob Alice Alice IOweYou $100 Bob Alice 10 During a hike with Alice & Bob Dave pay $10 Carol Dave Carol IOweYou $10 Dave Carol 3

12 Credit (or IOU Settlement) Networks: Basics Transactions in the real world A credit network representation pay $100 Bob Bob Alice Alice IOweYou $100 Bob Alice During a hike with Alice & Bob Dave pay $10 Carol Dave Carol IOweYou $10 Dave Carol 3

13 Credit Network Examples Academic proposals: Ostra: preventing spam [NSDI 08] Bazaar: strengthening e-commerce [NSDI 11] SumUp: Sybil-resilient content voting [NSDI 09] Industry deployments: Ripple: A real-life online payment network Stellar: Another real-life online payment network 4

14 Credit Network Examples Academic proposals: Ostra: preventing spam [NSDI 08] Bazaar: strengthening e-commerce [NSDI 11] SumUp: Sybil-resilient content voting [NSDI 09] Industry deployments: Ripple: A real-life online payment network Stellar: Another real-life online payment network 4

15 Ripple Credit Network 5

16 Ripple Credit Network 5

17 Ripple Credit Network 5

18 Ripple Credit Network 5

19 Ripple Credit Network 5

20 Ripple Credit Network 5

21 Ripple Credit Network 5

22 Ripple Credit Network AED $ CAD 100 5

23 Ripple Credit Network AED BTC 10 BTC 5 $ CAD 100 5

24 Ripple Credit Network AED BTC 10 BTC 5 $ 60 CAD 100 XYZ 40 XID 100 GDW 10 FMM

25 Ripple Credit Network AED BTC 10 BTC 5 $ 60 CAD 100 XYZ 40 XID 100 GDW 10 FMM Tx time Worldwide, cross-currency tx Integrity 5

26 Ripple Credit Network AED BTC 10 BTC 5 $ 60 CAD 100 XYZ 40 XID 100 GDW 10 FMM Tx time ~ 1 day Worldwide, cross-currency tx Integrity ~ 5 seconds 5

27 Ripple Credit Network AED BTC 10 BTC 5 $ 60 CAD 100 XYZ 40 XID 100 GDW 10 FMM Tx time ~ 1 day Worldwide, cross-currency tx High fees Integrity ~ 5 seconds Tiny fees 5

28 Ripple Credit Network AED BTC 10 BTC 5 $ 60 CAD 100 XYZ 40 XID 100 GDW 10 FMM Tx time ~ 1 day Worldwide, cross-currency tx High fees Integrity Bank only ~ 5 seconds Tiny fees Public verifiability 5

29 Ripple Credit Network AED BTC 10 BTC 5 $ 60 CAD 100 XYZ 40 XID 100 GDW 10 FMM Tx time ~ 1 day ~ 5 seconds Worldwide, cross-currency tx High fees Ripple can significantly improve cross-currency remittance and settlements Tiny fees Integrity Bank only Public verifiability 5

30 Public Verifiability & Privacy Problem The Ripple Ledger Transaction Details Credit Graph 6

31 Public Verifiability & Privacy Problem The Ripple Ledger Transaction Details Credit Graph Listening to Whispers of Ripple: Linking Wallets and Deanonymizing Transactions in the Ripple Network Pedro Moreno-Sanchez, Muhammad Bilal Zafar, Aniket Kate. PETS 16 6

32 Public Verifiability & Privacy Problem The Ripple Ledger Transaction Details Credit Graph Listening to Whispers of Ripple: Linking Wallets and Deanonymizing Transactions in the Ripple Network Pedro Moreno-Sanchez, Muhammad Bilal Zafar, Aniket Kate. PETS 16 Current credit networks employ a global ledger 6

33 Our Contributions We question the need for a global ledger and global consensus 7

34 Our Contributions We question the need for a global ledger and global consensus SilentWhispers: Decentralized credit network with security and privacy guarantees defined in UC framework Inspired by our work in NDSS 15 7

35 Our Contributions We question the need for a global ledger and global consensus SilentWhispers: Decentralized credit network with security and privacy guarantees defined in UC framework Inspired by our work in NDSS 15 SilentWhispers overcomes several challenges: existence of a path, credit on a path and integrity of transactions 7

36 Our Contributions We question the need for a global ledger and global consensus SilentWhispers uses distributed landmark routing, secure multiparty computation and 2-step transactions SilentWhispers: Decentralized credit network with security and privacy guarantees defined in UC framework Inspired by our work in NDSS 15 SilentWhispers overcomes several challenges: existence of a path, credit on a path and integrity of transactions 7

37 Our Contributions We question the need for a global ledger and global consensus SilentWhispers uses distributed landmark routing, secure multiparty computation and 2-step transactions SilentWhispers: Decentralized credit network with security and privacy guarantees defined in UC framework Inspired by our work in NDSS 15 SilentWhispers overcomes several challenges: existence of a path, credit on a path and integrity of transactions SilentWhispers is feasible in practice and offers interesting alternatives to current emerging payment systems 7

38 SilentWhispers: A Decentralized Credit Network 8

39 SilentWhispers: A Decentralized Credit Network Local Information suffices: Credit links of a user determine his credit in the network 8

40 SilentWhispers: A Decentralized Credit Network Local Information suffices: Credit links of a user determine his credit in the network In-flow = Charles Out-flow = Bob 25 Net-flow = 410 Alice 8

41 SilentWhispers: A Decentralized Credit Network Local Information suffices: Credit links of a user determine his credit in the network In-flow = Charles Out-flow = Bob 25 Net-flow = 410 Net-flow is what matters: Net-flow of a user must not change without the user s consent Alice 8

42 SilentWhispers: A Decentralized Credit Network Local Information suffices: Credit links of a user determine his credit in the network In-flow = Charles Out-flow = Bob 25 Net-flow = 410 Net-flow is what matters: Net-flow of a user must not change without the user s consent 5 Alice Charles Charles In-flow = 450 Out-flow = 40 Bob 25 Net-flow = 410 Alice 8

43 SilentWhispers: A Decentralized Credit Network Local Information suffices: Credit links of a user determine his credit in the network In-flow = Charles Out-flow = Bob 25 Net-flow = 410 Net-flow is what matters: Net-flow of a user must not change without the user s consent 5 Alice Charles Charles In-flow = 450 Out-flow = 40 Bob 25 Net-flow = 410 Alice 8

44 SilentWhispers: A Decentralized Credit Network Local Information suffices: Credit links of a user determine his credit in the network In-flow = Charles Out-flow = Bob 25 Net-flow = 410 Net-flow is what matters: Net-flow of a user must not change without the user s consent 5 Alice Charles Charles In-flow = 450 Out-flow = 40 Bob 25 Net-flow = 410 Alice 8

45 SilentWhispers: A Decentralized Credit Network Local Information suffices: Credit links of a user determine his credit in the network In-flow = Charles Out-flow = Bob 25 Net-flow = 410 Net-flow is what matters: Net-flow of a user must not change without the user s consent 5 Alice Charles Charles In-flow = 450 Out-flow = Bob 25 Net-flow = 410 Alice 8

46 Challenges Find paths between users Calculate credit available in the path Ensure integrity of transactions And more 9

47 The routing challenge 10

48 Routing Challenge: Landmark Routing 11

49 Routing Challenge: Landmark Routing Determine credit path from sender to receiver 11

50 Routing Challenge: Landmark Routing Determine credit path from sender to receiver Common problem in standard networks and ad-hoc networks 11

51 Routing Challenge: Landmark Routing Determine credit path from sender to receiver Common problem in standard networks and ad-hoc networks The max-flow approach: Not scalable enough: O(V 3 ) or O(V 2 log(e)) 11

52 Routing Challenge: Landmark Routing Determine credit path from sender to receiver Common problem in standard networks and ad-hoc networks The max-flow approach: Not scalable enough: O(V 3 ) or O(V 2 log(e)) Landmark routing [Tschusiya 89] Calculate subset of all paths 11

53 Routing Challenge: Landmark Routing Determine credit path from sender to receiver Common problem in standard networks and ad-hoc networks The max-flow approach: Not scalable enough: O(V 3 ) or O(V 2 log(e)) Landmark routing [Tschusiya 89] Calculate subset of all paths 11

54 Routing Challenge: Landmark Routing Determine credit path from sender to receiver Common problem in standard networks and ad-hoc networks The max-flow approach: Not scalable enough: O(V 3 ) or O(V 2 log(e)) Landmark routing [Tschusiya 89] Calculate subset of all paths U2 U3 11

55 Routing Challenge: Landmark Routing Determine credit path from sender to receiver Common problem in standard networks and ad-hoc networks The max-flow approach: Not scalable enough: O(V 3 ) or O(V 2 log(e)) Landmark routing [Tschusiya 89] Calculate subset of all paths U2 U3 U1 U4 11

56 Routing Challenge: Landmark Routing Determine credit path from sender to receiver Common problem in standard networks and ad-hoc networks The max-flow approach: Not scalable enough: O(V 3 ) or O(V 2 log(e)) Landmark routing [Tschusiya 89] Calculate subset of all paths Distributed BFS: Local information suffices U2 U3 U1 U4 11

57 Routing Challenge: Landmark Routing Determine credit path from sender to receiver Common problem in standard networks and ad-hoc networks The max-flow approach: Not scalable enough: O(V 3 ) or O(V 2 log(e)) Landmark routing [Tschusiya 89] Calculate subset of all paths Distributed BFS: Local information suffices U2 U3 U1 U4 11

58 Routing Challenge: Landmark Routing Determine credit path from sender to receiver Common problem in standard networks and ad-hoc networks The max-flow approach: Not scalable enough: O(V 3 ) or O(V 2 log(e)) Landmark routing [Tschusiya 89] Calculate subset of all paths Distributed BFS: Local information suffices U2 U3 U1 U4 11

59 Routing Challenge: Landmark Routing Determine credit path from sender to receiver Common problem in standard networks and ad-hoc networks The max-flow approach: Not scalable enough: O(V 3 ) or O(V 2 log(e)) Landmark routing [Tschusiya 89] Calculate subset of all paths Distributed BFS: Local information suffices Enough in practice 1,2 More efficient than max-flow 1,2 U2 U3 1 [Our work in NDSS 15] 2 [Viswanath et al. EUROSYS 12] U1 U4 11

60 Calculation of credit available in a path 12

61 Credit in a Path: SMPC

62 Credit in a Path: SMPC

63 Credit in a Path: SMPC [x]: Secret share of x [30] [30] [30] 13

64 Credit in a Path: SMPC [x]: Secret share of x [30] [30] [30] Given [x] it is not possible to know x 13

65 Credit in a Path: SMPC [x]: Secret share of x [30] [15] [30] [15] [30] Given [x] it is not possible to know x 13

66 Credit in a Path: SMPC [x]: Secret share of x [30] [15] [25] [30] [30] [15] [25] [25] Given [x] it is not possible to know x 13

67 Credit in a Path: SMPC [x]: Secret share of x [30] [15] [25] [10] [30] [25] [30] [15] [25] [10] [10] Given [x] it is not possible to know x 13

68 Credit in a Path: SMPC [x]: Secret share of x [credit in path] [30] [15] [credit in path] [25] [10] [30] [25] [30] [15] [25] [10] [10] [credit in path] Given [x] it is not possible to know x 13

69 Credit in a Path: SMPC [x]: Secret share of x [credit in path] [30] [15] [credit in path] [25] [10] [30] [25] [30] [15] [25] [10] [10] [credit in path] Given [x] it is not possible to know x 13

70 Credit in a Path: SMPC [x]: Secret share of x [credit in path] [30] [15] [credit in path] [25] [10] [30] [25] [30] [15] [25] [10] [10] [credit in path] Given [x] it is not possible to know x Given enough copies of [x] one can reconstruct x 13

71 Integrity of the transactions 14

72 Transaction Integrity and Dispute Resolution 15

73 Transaction Integrity and Dispute Resolution 2-step transaction: on hold and settle 15

74 Transaction Integrity and Dispute Resolution 2-step transaction: on hold and settle Example:

75 Transaction Integrity and Dispute Resolution 2-step transaction: on hold and settle Example: 5 (5)

76 Transaction Integrity and Dispute Resolution 2-step transaction: on hold and settle Example: 5 (5) (5)

77 Transaction Integrity and Dispute Resolution 2-step transaction: on hold and settle Example: 5 (5) (5) Ok, received! 15

78 Transaction Integrity and Dispute Resolution 2-step transaction: on hold and settle Example: 5 (5) Ok, received! 15

79 Transaction Integrity and Dispute Resolution 2-step transaction: on hold and settle Example: 5 (5) Ok, received! Incentive 15

80 Transaction Integrity and Dispute Resolution 2-step transaction: on hold and settle Example: Ok, received! Incentive 15

81 Transaction Integrity and Dispute Resolution 2-step transaction: on hold and settle Example: Ok, received! Incentive Integrity: All landmarks cannot make the user lose credit 15

82 Transaction Integrity and Dispute Resolution 2-step transaction: on hold and settle Example: 5 No! our credit is 15! Ok, received! Incentive Integrity: All landmarks cannot make the user lose credit 15

83 Transaction Integrity and Dispute Resolution 2-step transaction: on hold and settle Example: 5 No! our credit is 15! Ok, received! Incentive Integrity: All landmarks cannot make the user lose credit Accountability: In case of dispute, users must prove the link value Local logs suffice to determine the valid current value The disputed value is bounded 15

84 Evaluation 16

85 Evaluation and Discussion 17

86 Evaluation and Discussion C++ prototype implementation Secret Sharing-based MPC library: Shared 17

87 Evaluation and Discussion C++ prototype implementation Secret Sharing-based MPC library: Shared Setup using Ripple transactions: Maximum path length: 10 links Maximum number of paths: 7 landmarks (Ripple Gateways) 17

88 Evaluation and Discussion C++ prototype implementation Secret Sharing-based MPC library: Shared Setup using Ripple transactions: Maximum path length: 10 links Maximum number of paths: 7 landmarks (Ripple Gateways) Computing available credit on a path in ~1.3 seconds Different paths in parallel 17

89 Evaluation and Discussion C++ prototype implementation Secret Sharing-based MPC library: Shared Setup using Ripple transactions: Maximum path length: 10 links Maximum number of paths: 7 landmarks (Ripple Gateways) Computing available credit on a path in ~1.3 seconds Different paths in parallel Feasible to run in practice current Ripple transactions 17

90 Evaluation and Discussion C++ prototype implementation Secret Sharing-based MPC library: Shared Setup using Ripple transactions: Maximum path length: 10 links Maximum number of paths: 7 landmarks (Ripple Gateways) Computing available credit on a path in ~1.3 seconds Different paths in parallel Feasible to run in practice current Ripple transactions SilentWhispers has attracted attention from industry: KOINA: 17

91 The Landscape of Emerging Payment Systems 18

92 The Landscape of Emerging Payment Systems Cryptocurrencies Ripple SilentWhispers Transfer of funds Direct transactions between any two wallets Transactions only via a path with enough credit 18

93 The Landscape of Emerging Payment Systems Cryptocurrencies Ripple SilentWhispers Transfer of funds Direct transactions between any two wallets Transactions only via a path with enough credit Transaction flexibility Fixed currency agreed between sender and receiver Support for cross-currency transactions 18

94 The Landscape of Emerging Payment Systems Cryptocurrencies Ripple SilentWhispers Transfer of funds Direct transactions between any two wallets Transactions only via a path with enough credit Transaction flexibility Fixed currency agreed between sender and receiver Support for cross-currency transactions Transaction verification Globally verified Locally verified by users in the path 18

95 Take Home Message 19

96 Take Home Message A credit network does not require a global ledger or global consensus 19

97 Take Home Message A credit network does not require a global ledger or global consensus SilentWhispers: A decentralized credit network enforcing security and privacy and overcoming several challenges 19

98 Take Home Message A credit network does not require a global ledger or global consensus SilentWhispers is feasible in practice and it has attracted attention from industry SilentWhispers: A decentralized credit network enforcing security and privacy and overcoming several challenges 19

99 Take Home Message A credit network does not require a global ledger or global consensus SilentWhispers is feasible in practice and it has attracted attention from industry SilentWhispers: A decentralized credit network enforcing security and privacy and overcoming several challenges SilentWhispers is an interesting alternative in the landscape of emerging payment systems 19

100 Take Home Message A credit network does not require a global ledger or global consensus SilentWhispers is feasible in practice and it has attracted attention from industry SilentWhispers: A decentralized credit network enforcing security and privacy and overcoming several challenges SilentWhispers is an interesting alternative in the landscape of emerging payment systems 19

Concurrency and Privacy with Payment Channel Networks

Concurrency and Privacy with Payment Channel Networks Concurrency and Privacy with Payment Channel Networks Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei*, and Srivatsan Ravi Friedrich-Alexander-University Purdue University *TU Vienna

More information

Security, Privacy and Interoperability in Payment- Channel Networks

Security, Privacy and Interoperability in Payment- Channel Networks FAKULTÄT FÜR!NFORMATIK Faculty of Informatics & PRIVACY SECURITY GROUP Security, Privacy and Interoperability in Payment- Channel Networks Pedro Moreno-Sanchez (@pedrorechez) Joint work with Giulio Malavolta,

More information

The power of Blockchain: Smart Contracts. Foteini Baldimtsi

The power of Blockchain: Smart Contracts. Foteini Baldimtsi The power of Blockchain: Smart Contracts Foteini Baldimtsi The Blockchain at the heart of a cryptocurrency Alice sends 2 John sends 1 Dave sends 5 to Bob to Eve to Alice Bob sends 1 Eve sends 4 to Dave

More information

ENEE 457: E-Cash and Bitcoin

ENEE 457: E-Cash and Bitcoin ENEE 457: E-Cash and Bitcoin Charalampos (Babis) Papamanthou cpap@umd.edu Money today Any problems? Cash is cumbersome and can be forged Credit card transactions require centralized online bank are not

More information

Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions

Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions Stefanie Roos University of Waterloo sroos@uwaterloo.ca Pedro Moreno-Sanchez Purdue University pmorenos@purdue.edu

More information

Privacy Preserving Payments in Credit Networks

Privacy Preserving Payments in Credit Networks Privacy Preserving Payments in Credit Networks Enabling trust with privacy in online marketplaces Pedro Moreno-Sanchez CISPA, Saarland University pedro@mmci.uni-saarland.de Aniket Kate CISPA, Saarland

More information

Security Analysis of Bitcoin. Dibyojyoti Mukherjee Jaswant Katragadda Yashwant Gazula

Security Analysis of Bitcoin. Dibyojyoti Mukherjee Jaswant Katragadda Yashwant Gazula Security Analysis of Bitcoin Dibyojyoti Mukherjee Jaswant Katragadda Yashwant Gazula Security Analysis of Bitcoin Introduction How Bitcoin works? Similar peer-to-peer systems Vulnerabilities and solutions

More information

SpaceMint Overcoming Bitcoin s waste of energy

SpaceMint Overcoming Bitcoin s waste of energy Bitcoin Overcoming Bitcoin s waste of energy Georg Fuchsbauer joint work with S Park, A Kwon, K Pietrzak, J Alwen and P Gaži Digital currency Decentralized (no bank issuing coins) Pseudonymous Controled

More information

Pedro MMCI, Saarland University

Pedro MMCI, Saarland University CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin [project page] [paper] @real_or_random Pedro Moreno-Sanchez @pedrorechez MMCI, Saarland University Aniket Kate @aniketpkate Introduction Alice

More information

Smalltalk 3/30/15. The Mathematics of Bitcoin Brian Heinold

Smalltalk 3/30/15. The Mathematics of Bitcoin Brian Heinold Smalltalk 3/30/15 The Mathematics of Bitcoin Brian Heinold What is Bitcoin? Created by Satoshi Nakamoto in 2008 What is Bitcoin? Created by Satoshi Nakamoto in 2008 Digital currency (though not the first)

More information

Lecture 9. Anonymity in Cryptocurrencies

Lecture 9. Anonymity in Cryptocurrencies Lecture 9 Anonymity in Cryptocurrencies Some say Bitcoin provides anonymity Bitcoin is a secure and anonymous digital currency WikiLeaks donations page Others say it doesn t Bitcoin won't hide you from

More information

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Elli Androulaki Staff member, IBM Research, Zurich Workshop on cryptocurrencies Athens, 06.03.2016 Blockchain systems

More information

Distributed Ledger Technology & Fintech Applications. Hart Montgomery, NFIC 2017

Distributed Ledger Technology & Fintech Applications. Hart Montgomery, NFIC 2017 Distributed Ledger Technology & Fintech Applications Hart Montgomery, NFIC 2017 Let s consider a common scenario: Banks want to trade some asset class Participants in the market want to be able to efficiently

More information

Key concepts of blockchain

Key concepts of blockchain Advisory A brief history of blockchains 2008 The mysterious Satoshi Nakamoto publishes his Bitcoin white paper 2014 2017 Nov. 23 rd Ethereum crowd sale Number of crypto tokens: 1.172 BTC $8.216 The first

More information

The Blockchain. Josh Vorick

The Blockchain. Josh Vorick The Blockchain Josh Vorick Bitcoin is a currency. Blockchain is a technology. What is a blockchain? A decentralized database that anyone can add to and no one can delete from The Bitcoin blockchain Agenda

More information

Alternatives to Blockchains. Sarah Meiklejohn (University College London)

Alternatives to Blockchains. Sarah Meiklejohn (University College London) Alternatives to Blockchains Sarah Meiklejohn (University College London) fully decentralized cryptocurrencies 2 fully decentralized cryptocurrencies tx tx(addra addrb) 2 fully decentralized cryptocurrencies

More information

Chapter 13. Digital Cash. Information Security/System Security p. 570/626

Chapter 13. Digital Cash. Information Security/System Security p. 570/626 Chapter 13 Digital Cash Information Security/System Security p. 570/626 Introduction While cash is used in illegal activities such as bribing money laundering tax evasion it also protects privacy: not

More information

Hyperledger fabric: towards scalable blockchain for business

Hyperledger fabric: towards scalable blockchain for business Marko Vukolić, IBM Research - Zurich Hyperledger fabric: towards scalable blockchain for business Trust in Digital Life The Hague, Netherlands, June 17 2016 Blockchain shared, replicated, ledger Consensus

More information

Bitcoin and Blockchain

Bitcoin and Blockchain Bitcoin and Blockchain COS 418: Distributed Systems Lecture 18 Zhenyu Song [Credit: Selected content adapted from Michael Freedman. Slides refined by Chris Hodsdon and Theano Stavrinos] Why Bitcoin? All

More information

Technical White Paper of. MOAC Mother of All Chains. June 8 th, 2017

Technical White Paper of. MOAC Mother of All Chains. June 8 th, 2017 Technical White Paper of MOAC Mother of All Chains June 8 th, 2017 [Abstract] MOAC is to design a scalable and resilient Blockchain that supports transactions, data access, control flow in a layered structure.

More information

Computer Security. 14. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2019

Computer Security. 14. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2019 Computer Security 14. Blockchain & Bitcoin Paul Krzyzanowski Rutgers University Spring 2019 April 15, 2019 CS 419 2019 Paul Krzyzanowski 1 Bitcoin & Blockchain Bitcoin cryptocurrency system Introduced

More information

BITCOIN PROTOCOL & CONSENSUS: A HIGH LEVEL OVERVIEW

BITCOIN PROTOCOL & CONSENSUS: A HIGH LEVEL OVERVIEW BITCOIN PROTOCOL & CONSENSUS: A HIGH LEVEL OVERVIEW Rustie Lin Wang Move the area1 over the image a little inside and then right click, replace image to change the background. (and delete this box while

More information

Set: Hub-and-Spoke Cryptographic Payment Channels

Set: Hub-and-Spoke Cryptographic Payment Channels Set: Hub-and-Spoke Cryptographic Payment Channels v0.0.1 Nathan Ginnever: nathan@finalitylabs.io Abstract Here we outline the Set-Payment channel protocol (In a later paper we incrementally extend Set

More information

Interledger. Internetworking for Money. Evan Schwartz Engineer at Ripple Co-Inventor of Interledger

Interledger. Internetworking for Money. Evan Schwartz Engineer at Ripple Co-Inventor of Interledger Interledger Internetworking for Money Evan Schwartz Engineer at Ripple Co-Inventor of Interledger Payments are broken. Accepting Payments in a Turkish Starbucks Accepting Payments OnlinePayments Online

More information

HashCash Consultants. Whitepaper-HC NET

HashCash Consultants. Whitepaper-HC NET Whitepaper- 1 Copyright Notice 2017 Hashcash Consultants. All Rights Reserved. This documentation is the sole property of Hashcash Consultants. Hashcash Consultants believes the information in this document

More information

Interledger. A Payment Protocol Inspired by IP. Adrian Hope-Bailie Evan Schwartz Stefan Thomas

Interledger. A Payment Protocol Inspired by IP. Adrian Hope-Bailie Evan Schwartz Stefan Thomas Interledger A Payment Protocol Inspired by IP Adrian Hope-Bailie Evan Schwartz Stefan Thomas Agenda 1. Project Background 2. Ledgers and the Problem with Payments Today 3. Interledger Packet and Protocol

More information

Ergo platform: from prototypes to a survivable cryptocurrency

Ergo platform: from prototypes to a survivable cryptocurrency January 2019 Dmitry Meshkov Ergo platform: from prototypes to a survivable cryptocurrency Outline Ergo Consensus Light Storage vision protocol clients fee Voting Smart Monetary Roadmap system contracts

More information

Algorand: Scaling Byzantine Agreements for Cryptocurrencies

Algorand: Scaling Byzantine Agreements for Cryptocurrencies Algorand: Scaling Byzantine Agreements for Cryptocurrencies Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, Nickolai Zeldovich Presented by: Preet Patel and Umang Lathia Outline Overview of Distributed

More information

Lecture 3. Introduction to Cryptocurrencies

Lecture 3. Introduction to Cryptocurrencies Lecture 3 Introduction to Cryptocurrencies Public Keys as Identities public key := an identity if you see sig such that verify(pk, msg, sig)=true, think of it as: pk says, [msg] to speak for pk, you must

More information

OpenbankIT: a banking platform for e- money management based on blockchain technology

OpenbankIT: a banking platform for e- money management based on blockchain technology OpenbankIT: a banking platform for e- money management based on blockchain technology Dr. Pavel Kravchenko, Sergiy Vasilchuk, Bohdan Skriabin pavel@distributedlab.com, vsv@atticlab.net, bohdan@distributedlab.com

More information

What is Proof of Work?

What is Proof of Work? What is Proof of Work? Educational Series September 18, 2018 Overview There are many protocols that regulate how nodes on a blockchain achieve consensus, and currently the most popular is proof-of-work.

More information

University of Duisburg-Essen Bismarckstr Duisburg Germany HOW BITCOIN WORKS. Matthäus Wander. June 29, 2011

University of Duisburg-Essen Bismarckstr Duisburg Germany HOW BITCOIN WORKS. Matthäus Wander. June 29, 2011 University of Duisburg-Essen Bismarckstr. 90 47057 Duisburg Germany HOW BITCOIN WORKS June 29, 2011 Overview Electronic currency system Decentralized No trusted third party involved Unstructured peer-to-peer

More information

Public Chain for Digital Asset Escrow

Public Chain for Digital Asset Escrow Public Chain for Digital Asset Escrow Decentralized PayPal Whitepaper 2018/03 v3 https://themis.network 1. OVERVIEW... 1 2. FAIR EXCHANGE IN DIGITAL COMMERCE... 4 2.1 TRANSACTIONS BETWEEN DIFFERENT DIGITAL

More information

COIN. Secure and Anonymous Decentralized Bitcoin Mixing PARTY

COIN. Secure and Anonymous Decentralized Bitcoin Mixing PARTY COIN PARTY Secure and Anonymous Decentralized Bitcoin Mixing Jan Henrik Ziegeldorf, Roman Matzu7, Fred Grossmann, Mar;n Henze, Klaus Wehrle Communica;on and Distributed Systems (COMSYS), RWTH Aachen, Germany

More information

Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. Yashar Dehkan Asl

Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. Yashar Dehkan Asl Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts Yashar Dehkan Asl Chapter I Introduction Decentralized Cryptocurrencies: Such as Bitcoin and altcoins are getting more

More information

Introduction to Cryptoeconomics

Introduction to Cryptoeconomics Introduction to Cryptoeconomics What is cryptoeconomics? Cryptoeconomics is about... Building systems that have certain desired properties Use cryptography to prove properties about messages that happened

More information

BlockFin A Fork-Tolerant, Leaderless Consensus Protocol April

BlockFin A Fork-Tolerant, Leaderless Consensus Protocol April BlockFin A Fork-Tolerant, Leaderless Consensus Protocol April 2018 @storecoin What are the most desirable features in a blockchain? Scalability (throughput) and decentralization (censorship resistance),

More information

Key Security Issues for implementation of Digital Currency, including ITU-T SG17 activities

Key Security Issues for implementation of Digital Currency, including ITU-T SG17 activities ITU Workshop on FG DFC Workshop on Standards for Digital Fiat Currency (DFC) () Key Issues for implementation of Digital Currency, including ITU-T SG17 activities Heung Youl Youm, PhD. Chairman of ITU-T

More information

Introduction to Cryptocurrency Ecosystem. By Raj Thimmiah

Introduction to Cryptocurrency Ecosystem. By Raj Thimmiah Introduction to Cryptocurrency Ecosystem By Raj Thimmiah How does a normal payment system work? Normal payment systems (generally) use ledgers Easy for servers to then check if someone is committing double

More information

The technical notes represented on the following pages are intended to describe and officially document the concepts behind NulleX Blockchain.

The technical notes represented on the following pages are intended to describe and officially document the concepts behind NulleX Blockchain. 1 The technical notes represented on the following pages are intended to describe and officially document the concepts behind NulleX Blockchain. This document provides and explains in detail the technical

More information

Biomedical and Healthcare Applications for Blockchain. Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs

Biomedical and Healthcare Applications for Blockchain. Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs Biomedical and Healthcare Applications for Blockchain Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs Network Analysis Working Group 01.25.2018 Outline Introduction to bitcoin + blockchain

More information

Bitcoin, a decentralized and trustless protocol

Bitcoin, a decentralized and trustless protocol Bitcoin, a decentralized and trustless protocol Thomas Sibut-Pinote Inria Saclay February 12, 2015 Thomas Sibut-Pinote Bitcoin, a decentralized and trustless protocol 1 / 42 Introduction Questions 1 Introduction

More information

Bitcoin (Part I) Ken Calvert Keeping Current Seminar 22 January Keeping Current 1

Bitcoin (Part I) Ken Calvert Keeping Current Seminar 22 January Keeping Current 1 Bitcoin (Part I) Ken Calvert Keeping Current Seminar 22 January 2014 2014.01.22 Keeping Current 1 Questions What problem is Bitcoin solving? Where did it come from? How does the system work? What makes

More information

Consensus & Blockchain

Consensus & Blockchain Consensus & Blockchain S P Suresh Chennai Mathematical Institute Formal Methods Update Meeting IIT Mandi July 17, 2017 The Bitcoin revolution is upon us What is Bitcoin? Bitcoin: an exciting new currency

More information

DisLedger - Distributed Concurrence Ledgers 12 August, 2017

DisLedger - Distributed Concurrence Ledgers  12 August, 2017 DisLedger - Distributed Concurrence Ledgers www.disledger.com info@disledger.com 12 August, 2017 This whitepaper describes DisLedger - Distributed Concurrence Ledgers (patent pending) an architecture for

More information

Public Wallet Interface for Ripple

Public Wallet Interface for Ripple CS 795 Blockchain Technologies CS 795 Authors: May 15, 2017 Contents 1 Abstract 2 2 Introduction 3 3 Program Design Architecture 6 4 Functionality 7 5 Preview 10 6 In-comparison with other wallets 13 7

More information

Catena: Efficient Non-equivocation via Bitcoin

Catena: Efficient Non-equivocation via Bitcoin Catena: Efficient Non-equivocation via Bitcoin Alin Tomescu MIT CSAIL Srinivas Devadas MIT CSAIL Abstract We present Catena, an efficiently-verifiable Bitcoin witnessing scheme. Catena enables any number

More information

SOME OF THE PROBLEMS IN BLOCKCHAIN TODAY

SOME OF THE PROBLEMS IN BLOCKCHAIN TODAY BLOCKCHAIN EVOLVED THE PROBLEM SOME OF THE PROBLEMS IN BLOCKCHAIN TODAY An overall lack of governance is one of the most challenging facets of current blockchain ecosystems Controversy regarding scalability

More information

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University CS 4770: Cryptography CS 6750: Cryptography and Communication Security Alina Oprea Associate Professor, CCIS Northeastern University March 30 2017 Outline Digital currencies Advantages over paper cash

More information

Candidates Day Modeling the Energy Consumption of. Ryan Cole Liang Cheng. CSE Department Lehigh University

Candidates Day Modeling the Energy Consumption of. Ryan Cole Liang Cheng. CSE Department Lehigh University Candidates Day 2016 Modeling the Energy Consumption of Blockchain Consensus Algorithms Daniel Lopresti, Interim Dean P.C. Rossin College of Engineering and Applied Science July 30, April 15,2018 2016 Ryan

More information

Preview. Mobile Payments. Payments Strategy Series. A Guide to Planning Your Approach. Price: $150

Preview. Mobile Payments. Payments Strategy Series. A Guide to Planning Your Approach. Price: $150 Payments Strategy Series Mobile Payments A Guide to Planning Your Approach Price: $150 WesPay Publications Payments Strategy Series WesPay (Western Payments Alliance) has a long tradition of working with

More information

Security: Focus of Control

Security: Focus of Control Security: Focus of Control Three approaches for protection against security threats a) Protection against invalid operations b) Protection against unauthorized invocations c) Protection against unauthorized

More information

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University CS 4770: Cryptography CS 6750: Cryptography and Communication Security Alina Oprea Associate Professor, CCIS Northeastern University April 9 2018 Schedule HW 4 Due on Thu 04/12 Programming project 3 Due

More information

How to use Fusioncoin Wallet

How to use Fusioncoin Wallet How to use Fusioncoin Wallet < How to make an account > Please click Register Type your user name, email address, password and click Register If you have authentication key, do not forget type it. (Email

More information

Prelude. The notes within this Whitepaper publication are intended to formally document the concepts and features of the Aegeus cryptocurrency.

Prelude. The notes within this Whitepaper publication are intended to formally document the concepts and features of the Aegeus cryptocurrency. Prelude The notes within this Whitepaper publication are intended to formally document the concepts and features of the Aegeus cryptocurrency. This document will explain methodically, the details of the

More information

Distributed Algorithms Bitcoin

Distributed Algorithms Bitcoin Distributed Algorithms Bitcoin Alberto Montresor Università di Trento 2018/12/18 Acknowledgment: Joseph Bonneau, Ed Felten, Arvind Narayanan This work is licensed under a Creative Commons Attribution-ShareAlike

More information

Blockchain, cryptography, and consensus

Blockchain, cryptography, and consensus ITU Workshop on Security Aspects of Blockchain (Geneva, Switzerland, 21 March 2017) Blockchain, cryptography, and consensus Dr. Christian Cachin IBM Research - Zurich www.zurich.ibm.com/~cca/ Geneva, Switzerland,

More information

Security Analysis of the Lightning Network

Security Analysis of the Lightning Network Security Analysis of the Lightning Network Laolu Osuntokun @roasbeef Lightning Labs BPASE 2017 State of the Hash-Lock In-progress Lightning Network specifications (lighting-rfc) Basis of Lightning Technology

More information

Anonymity vs. Privacy

Anonymity vs. Privacy Innovation and Cryptoventures Anonymity vs. Privacy Campbell R. Harvey Duke University, NBER and Investment Strategy Advisor, Man Group, plc January 25, 2017 2 Setting Considerable misunderstanding of

More information

Zero-Knowledge proof of knowledge transfer. Perm summer school on blockchain 2018

Zero-Knowledge proof of knowledge transfer. Perm summer school on blockchain 2018 Zero-Knowledge proof of knowledge transfer Teleport Teleport was born in 2016 from the idea to bring the power of peer-to-peer traffic distribution technology like BitTorrent to the solution of traffic

More information

Developing Blockchain Software

Developing Blockchain Software Developing Blockchain Software David Schwartz, Chief Cryptographer CPPCON: September 22, 2016 1 About Me David Schwartz Chief Cryptographer at Ripple One of the original architects of the Ripple Consensus

More information

How to use Fusioncoin Wallet

How to use Fusioncoin Wallet How to use Fusioncoin Wallet < How to make an account > Please click Register Type your user name, email address, password and click Register If you have authentication key, do not forget type it. (Email

More information

Blockchain Certification Protocol (BCP)

Blockchain Certification Protocol (BCP) Blockchain Certification Protocol (BCP) Fu Yong Quah fuyong@fyquah.me www.fyquah.me Abstract. A semi-decentralized certification system built above the existing 1 Bitcoin network, an innovative peer-to-peer

More information

Reliability, distributed consensus and blockchain COSC412

Reliability, distributed consensus and blockchain COSC412 Reliability, distributed consensus and blockchain COSC412 Learning objectives Encourage you to always design for failure Appreciate how decentralised consensus is useful to support principles of security

More information

Blockchain, Cryptocurrency, Smart Contracts and Initial Coin Offerings: A Technical Perspective

Blockchain, Cryptocurrency, Smart Contracts and Initial Coin Offerings: A Technical Perspective SESSION ID: LAB3-R09 Blockchain, Cryptocurrency, Smart Contracts and Initial Coin Offerings: A Technical Perspective Tom Plunkett Consulting Solutions Director Oracle Captain Brittany Snelgrove United

More information

Blockchain. CS 240: Computing Systems and Concurrency Lecture 20. Marco Canini

Blockchain. CS 240: Computing Systems and Concurrency Lecture 20. Marco Canini Blockchain CS 240: Computing Systems and Concurrency Lecture 20 Marco Canini Credits: Michael Freedman and Kyle Jamieson developed much of the original material. Bitcoin: 10,000 foot view New bitcoins

More information

PERUN: Virtual Payment Hubs over Cryptographic Currencies

PERUN: Virtual Payment Hubs over Cryptographic Currencies PERUN: Virtual Payment Hubs over Cryptographic Currencies Stefan Dziembowski University of Warsaw Lisa Eckey TU Darmstadt Sebastian Faust TU Darmstadt Daniel Malinowski University of Warsaw Abstract Payment

More information

Blockchain (de)constructed

Blockchain (de)constructed Blockchain (de)constructed Fritz Henglein Department of Computer Science, University of Copenhagen (DIKU) DIKU Business Club meeting on blockchain January 11th, 2016 Fritz Henglein Professor of programming

More information

Ergo platform. Dmitry Meshkov

Ergo platform. Dmitry Meshkov Ergo platform Dmitry Meshkov Prehistory Motivation Theory Practice Provably secure 1000 currencies New features Ad-hoc solutions Impractical Security issues Motivation Theory Provably secure New features

More information

Problem: Equivocation!

Problem: Equivocation! Bitcoin: 10,000 foot view Bitcoin and the Blockchain New bitcoins are created every ~10 min, owned by miner (more on this later) Thereafter, just keep record of transfers e.g., Alice pays Bob 1 BTC COS

More information

Privacy-Enabled NFTs: User-Mintable, Non-Fungible Tokens With Private Off-Chain Data

Privacy-Enabled NFTs: User-Mintable, Non-Fungible Tokens With Private Off-Chain Data Privacy-Enabled NFTs: User-Mintable, Non-Fungible Tokens With Private Off-Chain Data Philip Stehlik Lucas Vogelsang August 8, 2018 1 Abstract Privacy-enabled NFTs (non-fungible tokens) are user-mintable

More information

Table Of Contents. Introduction Blockchain and Cryptocurrency...1. Stellar (payment network)...2. Internet and its issues...3. LocalXpose...

Table Of Contents. Introduction Blockchain and Cryptocurrency...1. Stellar (payment network)...2. Internet and its issues...3. LocalXpose... Table Of Contents Introduction... 1 Blockchain and Cryptocurrency...1 Stellar (payment network)...2 Internet and its issues...3 LocalXpose... 5 How LocalXpose Actually works?...6 Why to use LocalXpose?...7

More information

As a 3rd generation currency, not only are transactions secured, private and fast, you actually get paid for holding DigitalPrice coins.

As a 3rd generation currency, not only are transactions secured, private and fast, you actually get paid for holding DigitalPrice coins. Introduction With the circulation of cryptocurrency becoming common, there is a need for additional information. The scope of this white paper is to provide that information. If you are under the impression

More information

TOPPERCASH TOPPERCASH WHITEPAPER REFORM THE BEST OF BLOCKCHAIN

TOPPERCASH TOPPERCASH WHITEPAPER REFORM THE BEST OF BLOCKCHAIN TOPPERCASH TOPPERCASH WHITEPAPER REFORM THE BEST OF BLOCKCHAIN ABSTRACT A PEER-TO-PEER CRYPTO-CURRENCY DESIGN DERIVED FROM SATOSHI NAKAMOTO S BITCOIN. PROOF- OF-STAKE REPLACES PROOF-OF- WORK TO PROVIDE

More information

Short review of the Coinmama.com. Registration on the Coinmama

Short review of the Coinmama.com. Registration on the Coinmama Short review of the Coinmama.com Coinmama is not an exchange in its' usual sense. Here you can only buy currency, so its' more like a currency exchanger. The platform doesn t have the built-in wallet and

More information

Technical Analysis of Established Blockchain Systems

Technical Analysis of Established Blockchain Systems Technical Analysis of Established Blockchain Systems Florian Haffke, 20.11.2017, Munich Chair of Software Engineering for Business Information Systems (sebis) Faculty of Informatics Technische Universität

More information

Overview & White Paper.

Overview & White Paper. Overview & White Paper www.phantomx.co CONTENT 2. Introduction 7. Scalability and Network 3. Summary 3. About PhantomX 3. Our mission 4. The team behind PhantomX 5. Specification 8. Proof-of-Work 9. Proof-of-Stake

More information

Ensimag - 4MMSR Network Security Student Seminar. Bitcoin: A peer-to-peer Electronic Cash System Satoshi Nakamoto

Ensimag - 4MMSR Network Security Student Seminar. Bitcoin: A peer-to-peer Electronic Cash System Satoshi Nakamoto Ensimag - 4MMSR Network Security Student Seminar Bitcoin: A peer-to-peer Electronic Cash System Satoshi Nakamoto wafa.mbarek@ensimag.fr halima.myesser@ensimag.fr 1 Table of contents: I- Introduction: Classic

More information

Bitcoin. CS6450: Distributed Systems Lecture 20 Ryan Stutsman

Bitcoin. CS6450: Distributed Systems Lecture 20 Ryan Stutsman Bitcoin CS6450: Distributed Systems Lecture 20 Ryan Stutsman Material taken/derived from Princeton COS-418 materials created by Michael Freedman and Kyle Jamieson at Princeton University. Licensed for

More information

How Bitcoin achieves Decentralization. How Bitcoin achieves Decentralization

How Bitcoin achieves Decentralization. How Bitcoin achieves Decentralization Centralization vs. Decentralization Distributed Consensus Consensus without Identity, using a Block Chain Incentives and Proof of Work Putting it all together Centralization vs. Decentralization Distributed

More information

A Scalable Smart Contracts Platform

A Scalable Smart Contracts Platform A Scalable Smart Contracts Platform! Shehar Bano! Postdoc, InfoSec group! University College London!! s.bano@ucl.ac.uk! @thatbano https://github.com/chainspace The Team Mustafa Al-Bassam! (UCL) Alberto

More information

A Blockchain-based Mapping System

A Blockchain-based Mapping System A Blockchain-based Mapping System IETF 98 Chicago March 2017 Jordi Paillissé, Albert Cabellos, Vina Ermagan, Fabio Maino jordip@ac.upc.edu http://openoverlayrouter.org 1 A short Blockchain tutorial 2 Blockchain

More information

Blockchain! What consultants should know about it. Daniel

Blockchain! What consultants should know about it. Daniel Blockchain! What consultants should know about it. Daniel Karzel @ Workshop Overview Quick overview of what is planned for the workshop. What you get out of this workshop Workshop goals Understand what

More information

DEV. Deviant Coin, Innovative Anonymity. A PoS/Masternode cr yptocurrency developed with POS proof of stake.

DEV. Deviant Coin, Innovative Anonymity. A PoS/Masternode cr yptocurrency developed with POS proof of stake. DEV Deviant Coin, Innovative Anonymity A PoS/Masternode cr yptocurrency developed with POS proof of stake. CONTENTS 03 Overview 06 Pre-mine phase 07 Privacy 08 Basic parameters 09 Proof-of-stake The benefits

More information

A Blockchain-based Flight Data Recorder for Cloud Accountability

A Blockchain-based Flight Data Recorder for Cloud Accountability A Blockchain-based Flight Data Recorder for Cloud Accountability G. D Angelo, S. Ferretti, M. Marzolla Dept. of Computer Science and Engineering s.ferretti@unibo.it Cloud Computing On-demand self service

More information

Bitcoin. when a decentralised economy becomes centralised. ClaudioJ Tessone. URPP Social Networks

Bitcoin. when a decentralised economy becomes centralised. ClaudioJ Tessone. URPP Social Networks Bitcoin when a decentralised economy becomes centralised ClaudioJ Tessone URPP Social Networks Scientifica Contents Prelude Introduction to Bitcoin Mining concentration Economic flow Governance Take-home

More information

ZILLIQA / ZILIKƏ/ NEXT GEN HIGH-THROUGHPUT BLOCKCHAIN PLATFORM DONG XINSHU, CEO JIA YAOQI, BLOCKCHAIN ZILLIQA.

ZILLIQA / ZILIKƏ/ NEXT GEN HIGH-THROUGHPUT BLOCKCHAIN PLATFORM DONG XINSHU, CEO JIA YAOQI, BLOCKCHAIN ZILLIQA. ZILLIQA / ZILIKƏ/ NEXT GEN HIGH-THROUGHPUT BLOCKCHAIN PLATFORM DONG XINSHU, CEO JIA YAOQI, BLOCKCHAIN ARCHITECT SCALABILITY OF PUBLIC BLOCKCHAIN BITCOIN 7 TX/S ETHEREUM 10 TX/S VISA 8000 TX/S SOME EXISTING

More information

Nervos CKB: A common knowledge base for blockchains and applications

Nervos CKB: A common knowledge base for blockchains and applications Nervos CKB: A common knowledge base for blockchains and applications Draft Version Jan Xie Nervos.org January 2, 2018 Abstract This document provides an overview of the Nervos Common Knowledge Base (CKB),

More information

INTRODUCTION WHY DAPS?

INTRODUCTION WHY DAPS? DAPS WHITEPAPER INTRODUCTION DAPS is a planned experimental hybrid fork-swap of Peepcoin, to be conducted in 2018. The goal of DAPS protocol is to create a fully anonymous coin and eventually payment system

More information

Hyperledger Fabric v1:

Hyperledger Fabric v1: Marko Vukolić, IBM Research - Zurich May 4, 2017 Hyperledger Fabric v1: Rethinking Permissioned Blockchains Blockchain: du Bitcoin au Smart Contract 4 Mai 2017 2017 IBM Corporation What is a Blockchain?

More information

NON-TECHNICAL WHITEPAPER Version 1.0

NON-TECHNICAL WHITEPAPER Version 1.0 NON-TECHNICAL WHITEPAPER Version 1.0 Abstract Decentralization in Cryptocurrency Standard blockchain environments contain many centralization vulnerabilities, such as monolithic development, consensus

More information

INX Tokenomics I

INX Tokenomics I Content: 1. INX Tokenomics 2. Why is our blockchain needed? 3. Why are our INX needed? 4. Our technology 5. Blockchain specifications 6. INX details 7. INX distribution 8. INX sales 9. Use of funds 10.

More information

Whitepaper Rcoin Global

Whitepaper Rcoin Global Whitepaper Rcoin Global SUMMARY 1. Introduction 2. What is Rcoin Global? 3. Transactions 4. Hybrid Network Concept 5. Keepers 6. Incentive 7. Smart Contract Token 8. Token Distribution 9. Rcoin Global

More information

Radix - Public Node Incentives

Radix - Public Node Incentives Radix - Public Node Incentives Dan Hughes Piers Ridyard www.radix.global December 2017 Abstract In this paper we present a novel method for implementing a mechanism to reward work carried out across a

More information

June 19, Mixin Network. A free and lightning fast peer-to-peer transactional network for digital assets.

June 19, Mixin Network. A free and lightning fast peer-to-peer transactional network for digital assets. Draft @ June 19, 2018 Mixin Network A free and lightning fast peer-to-peer transactional network for digital assets. TECHNICAL WHITE PAPER SUBJECT TO FURTHER REVIEW AND UPDATE contact@mixin.one 1 of 29

More information

P2P BitCoin: Technical details

P2P BitCoin: Technical details ELT-53206 Peer-to-Peer Networks P2P BitCoin: Technical details Mathieu Devos Tampere University of Technology Department of Electronics & Communications Engineering mathieu.devos@tut.fi TG406 2 Outline

More information

Cryptography and Cryptocurrencies. Intro to Cryptography and Cryptocurrencies

Cryptography and Cryptocurrencies. Intro to Cryptography and Cryptocurrencies Intro to Cryptographic Hash Functions Hash Pointers and Data Structures Block Chains Merkle Trees Digital Signatures Public Keys and Identities Let s design us some Digital Cash! Intro to Cryptographic

More information

cchannel Generalized State Channel Specification

cchannel Generalized State Channel Specification cchannel Generalized State Channel Specification Celer Network Core Team May 27, 2018 cchannel of the Celer Network is a generalized state channel and sidechain suite that provides a framework to support

More information

Proof of Stake Made Simple with Casper

Proof of Stake Made Simple with Casper Proof of Stake Made Simple with Casper Olivier Moindrot ICME, Stanford University olivierm@stanford.edu Charles Bournhonesque ICME, Stanford University cbournho@stanford.edu Abstract We study the recent

More information

CISC859: Topics in Advanced Networks & Distributed Computing: Network & Distributed System Security. A Brief Overview of Security & Privacy Issues

CISC859: Topics in Advanced Networks & Distributed Computing: Network & Distributed System Security. A Brief Overview of Security & Privacy Issues CISC859: Topics in Advanced Networks & Distributed Computing: Network & Distributed System Security A Brief Overview of Security & Privacy Issues 1 Topics to Be Covered Cloud computing RFID systems Bitcoin

More information