DIGITAL ASSET RESEARCH

Size: px
Start display at page:

Download "DIGITAL ASSET RESEARCH"

Transcription

1 Our Digital Assets Primer is a more in-depth look at the underlying technology behind digital assets, using two of the largest cryptocurrencies, in terms of network values, Bitcoin and Ethereum, as examples. Here, we explain at a technical level how transactions are conducted over each network. DIGITAL ASSET RESEARCH provides unbiased, institutional quality cryptocurrency research for hedge funds, family offices, traditional asset managers, and venture capitalists. To learn more about our products and services, please fill out a Demo Request form here. If you would like to stay up to date on important cryptocurrency related news, you can sign up for our newsletter here.

2 As you will learn in this report, digital assets go beyond the general idea of a digital currency, and may represent a variety of use cases; from consumer applications, such as tokenized travel insurance, to digital commodities, such as decentralized computation. The purpose of this primer is to give you a detailed explanation of the underlying technology behind digital assets using the cryptocurrencies with largest network values: Bitcoin and Ethereum. Before we dig into the fascinating technology behind both networks, it is important to make a few distinctions, which may ease this educational exercise. The word blockchain was first used to describe the structure of the database in which bitcoin transactions are recorded. However, Bitcoin s inventor, Satoshi Nakamoto, never used the word blockchain to describe this structure. When referring to Bitcoin s data structure, Nakamoto often used chain of blocks, and only after the launch of the Bitcoin network was term blockchain popularized. In a way, the use of the term blockchain today is analogous to the use of the term internet in the early 1990s; widely referenced, but often misunderstood. Before we understand what is happening at the transaction level, let us analyze the data structure that allows digital currencies to be both transparent and immutable. Transparency is achieved because every participant in these networks stores its own blockchain documenting all transactions that have ever occurred, and from where the balance of every other participant can be derived. Since all members must record each valid group of transactions, or blocks, malicious actors are unable to double spend funds or send more tokens than they own. Once a new block is broadcasted to all members of the network, all transactions in it are considered final since it would take an immense amount of computer power to change everyone s blockchain. Therefore, malicious actors are not able to change transactions that have happened in the past, granting distributed blockchain networks a high level of immutability and security.

3 Let us assume the network below is composed of only four participants: Alice, Bob, Carly and Doug. Each participant started with a total balance of 5 tokens (TKNs), and there were no transactions in the network:

4 In this section, we will attempt to explain Bitcoin and its underlying technology using an example of a bitcoin transaction. On the left side of the page, we will guide you through every step of this transaction s life cycle and provide the technical details behind each of these processes. (in the context of this report) Alice lives in Tokyo, and she will soon fly across the world to visit her friend Bob, who lives in New York. When Alice gets to New York, she wants to see a popular Broadway show, so she asks Bob to buy her the tickets in advance in case they get sold out. Alice insists that she wants to pay for the tickets and will send Bob the equivalent amount in bitcoin for the purchase. Alice wants to send BTC to her friend Bob To transact in the Bitcoin network, every participant must download software to interact with the blockchain and other network participants. This is referred to as a client, which sends requests to a server for specific applications. Web browsers, for example, are clients that interact with centralized servers to display data. When a URL is accessed, the client sends a request to the server storing the website s content and displays that content to the user. Bitcoin clients work similarly, but with a key difference. Instead of accessing data from a centralized server, Bitcoin clients interact with all other members in the network to source and validate the integrity of their data, which can easily be determined since all network participants store the same ledger. This is a key aspect of the Bitcoin network, as its decentralization grants unique security properties to the data flowing between network participants, or nodes. Client The interface that enables users to create blocks, verify and interact with the blockchain Nodes, by definition, are the individual participants of a large network. When we refer to the nodes of the Bitcoin network, we refer to the entities running a Bitcoin client. Collectively, Bitcoin nodes are what the network is made of. Nodes may interact with the network by running two types of clients: full clients and light clients. Alice, who has used before, asks Bob to download a Bitcoin client, which enables him to create an account & receive funds.

5 Full clients, also called thick clients, store a complete copy of the blockchain and contain all transactions that have ever occurred in the network. Full nodes are the backbone of the Bitcoin network and enforce the rules set forth by the protocol to ensure security and consistency of the data, as well as the process by which new data is added to the ledger. Because full nodes store a copy of all transactions that have ever occurred, they are able validate transactions initiated by any user by confirming all past transactions that such user conducted, thereby preventing malicious actors from sending more than what they possess. Full nodes also check the signatures of the parties involved in every transaction to prevent other users from double spending the same funds. Downloading an entire copy of the Bitcoin blockchain from other nodes in the network may take several days as the size of the blockchain is more than 130GB at the time of writing. However, this process only needs to be done once. After downloading the chain, users only need to download new a new block every 10 minutes. As an open-source project, there are over 15 Bitcoin clients that can be used to interact with the network. Instead of running a full node, Alice runs a light client that can be set up within minutes. She advises Bob to do the same. Because running a full node has several requirements, such as having sufficient storage space and memory, light clients (also called thin clients) were designed to ease the interaction with the network and reduce the frictions of owning and using bitcoin. Instead of storing a complete copy of the blockchain, light clients only store the header of each block, which only requires a fraction of the storage space. (Block) Header A unique identifier for each block of a blockchain. Only storing the block header, however, limits the functionality of a light client. A light client is unable to verify transactions and its main purpose is to broadcast transactions to the network.

6 Although both full and light clients can serve as a user s wallet, the definition of a wallet is broader. A wallet is the collection of data required to initiate transactions and receive bitcoin, which can come in many forms. The number of clients available for Bitcoin increases the efficiency of the network and has granted it near-zero down time. If there are bugs in one client, the network can process transactions through a different client. Clients generate addresses that define a user s identity in the network using a concept called Public Key Cryptography. Because Bitcoin was built for payments, users have a unique identity that can be shared publicly. Additionally, users need a unique identifier or password to authorize transactions. In other words, users need both public and private identities to receive and send funds. The private identifier is called a Private Key and the public identifier is called a Public Key. Public identities are often represented as addresses, which are derived from Public Keys. Bob downloaded a light client & sends Alice his Address over . There is a relationship between these keys so that only one Private Key can be associated with any one Public Key. This relationship exists because a Public Key is a mathematical derivation of a Private Key. When a user signs a transaction using a Private Key, this signature is checked against the Public Key of the same user. In the verification process, the relationship between a Private Key signature and a Public Key identity is validated without revealing the Private Key. Bitcoin achieves this by using what is called a Mathematical Trap Door, a function that can be performed in one direction (deriving Public Keys from Private Keys), but impossible to be performed in the reverse direction (deriving Private Keys from Public Keys). Private Key A combination of letters and numbers that can be used to spend the digital token associated with a specific Address. Public Key In the context of blockchain systems, a Public Key is an account address that can be publicly shared, and it is used to send and receive funds. Address A unique account derived from a Public Key.

7 5K2CrUJ2EYDaXPTSKuuk2Y9N2E9s4RsWHrvg9S8DnBi3yzzU1CgRw2WqEwq2w1sD Above is the example of a real Private Key. To enable better user experience, applications used to generate Private Keys often provide QR versions of each key. Private Keys are created by combining a series of random numbers into to generate a string of 256 bits. Private keys are shown to users in 64 hexadecimals digits, each of them with a size of 4 bits. The Public Key is derived from a unique Private Key using elliptical curve point multiplication, which is a one-way mathematical function. The Public Key, combined with a user signature generated using the corresponding Private Key, grants the user spending power of the balance associated with the account. String A finite sequence of characters (i.e., letters, numerals, symbols and punctuation marks). Hexadecimals A numeral system in which each hexadecimal digit represents four binary digits (bits). Elliptical Curve Point Multiplication The operation of successively adding a point along an elliptic curve to itself repeatedly to create a oneway function. 1P8zPByYiGDj2fGur17fvXAn7jwawuHZz2 It is important to note that Public Keys and Wallet Addresses are not the same. Addresses are used as an account identifier, and are derived from a Public Key through yet another one-way mathematical function. Bitcoin clients use a hash function for this operation. Hash function A function used to map data of arbitrary size and convert it to a fixed length output. Source: Digital Asset Research

8 A bitcoin transaction is a signed message that authorizes the transfer of funds. Each transaction includes the sender s Public Key, the receiver s Public Key, and a signature created using the sender s Private Key. The Bitcoin blockchain has a native multiple-entry accounting system and each transaction has inputs and outputs, which serve as debits and credits. Simply put, a user s balance is the sum of all debits associated with his or her Public Key, minus all credits. Alice now has Bob s address, which is the only thing she will need to initiate a transaction When Alice initiates a transaction of BTC or 10 millibits (mbtc) to Bob, her Bitcoin client will look at all previous unspent outputs (debits) related to her Public Key, and show her balance. Alice then scans or copies Bob s Public Key, adds the transaction amount and chooses how fast she wants the funds to reach Bob. The speed at which Bob will receive Alice s transaction is dependent upon how much network fees Alice is willing to pay. Millibits (mbtc) The name used to represent bitcoins. Alice decides how much she will pay in fees, which is proportionate to the speed at which Bob will receive the funds. Bitcoin relies on participants in the network to process all transactions and include them in the ledger, an activity called mining. Miners prioritize transactions with higher fees, so if Alice wants Bob to receive the funds in less than one hour, she will have to pay higher fees. We will provide more details on the mining process in the next section. Mining The activity by which transactions are validated and new coins are generated. Source: Digital Asset Research

9 Because Bob will not need the funds right away, Alice decides to pay a rate of 2.21 mbtc per kilobyte in transaction fees, which is enough to make sure Bob will receive her transaction within the next 50 minutes, or 5 blockchain blocks. Alice previews the transaction to see how much she will pay in fees: Source: Digital Asset Research Because Alice decided to pay a transaction fee rate of 2.21 mbtc per kilobyte, and the size of her transaction is 336 bytes, the total amount paid in network fees is mbtc, or $4.65 USD. Bitcoin transactions are often composed of multiple inputs and outputs and the transaction initiated by Alice contains one input and two outputs. To send 10 mbtc to Bob, Alice s client uses a past transaction as an input to prove that she has a balance higher than the amount being sent. A day earlier, Alice received mbtc from her roommate Carly for her share of the rent. The client will use this transaction as input since it is higher than the amount being sent to Bob, and send the difference back to Alice.

10 Two outputs are then created; the first output of 10 mbtc goes to Bob, as it represents what Alice is sending, and the second output of mbtc goes back to Alice s address as change. Notice that the mbtc output that Alice will receive as change is already accounting for the 0.74 mbtc paid in network fees. Source: Digital Asset Research Before this transaction can be broadcasted to the network, Alice needs to prove that she possesses the Private Key associated with her bitcoin by signing the transaction. Alice can sign transactions by manually typing her Private Key in the console, or loading the text file used to store it. Alice s client will then combine all details from the transaction and convert it to hexadecimal format: 6f42666a921fff3b29c3e7115ed74bcd1e4febc6ee3adea403840ac57987c8e1 The above string is what is shared with other members of the network. Once broadcasted, the nodes around Alice verify the transaction and disseminate it to other nodes until the transaction gets processed by the miners. Since all nodes are storing a group of unprocessed transactions, this is called the memory pool, or mempool. When the mempool is large and nodes in the network must store many unprocessed transactions, the network fee rate per kilobyte increases since memory is scarce and as a result, users must pay more to transact in the network. Accordingly, the Bitcoin mempool is used as a proxy for network congestion and fees.

11 Mining is a competition in which players race to find the solution to a mathematical puzzle that confirms the validity of a Bitcoin transaction. Miners must devote an immense amount of computer resources to solving this mathematical puzzle and must also provide proof of the work they put into finding the solution. Even though finding a solution requires effort, verifying it does not. This system is called Proof of Work (PoW), and it has been researched as an anti-spam mechanism since the early 1990s. Since validating Bitcoin transactions requires work, this system guarantees the network s resilience against replay attacks and denial of service attacks. As more miners join the network, the cost of performing such attacks also increases. More importantly, mining ensures that the security of the network is not dependent upon a centralized party. The Bitcoin protocol has a native incentive mechanism that rewards miners for resources they devote to the network if a miner can successfully create a new block. Such amount decreases every 4 years and, at the time of writing, is 12.5 BTC per block. Miners also receive network transaction fees from every transaction they include in a block. When the Bitcoin network launched in January 2009, block rewards were 50 BTC per block. As expected, block rewards halved to 25 BTC in November 2012, and to 12.5 BTC in July In the year 2140, the Bitcoin protocol will stop generating new coins and mining rewards will only be based on network fees. At that point, around 21 million bitcoins will be in circulation and supply will be mostly deflationary. Replay Attack A type of network attack in which the adversary repeats or delays valid data transmission to exploit vulnerabilities within the protocol. Denial of Service (DoS) Attack An attack where the adversary seeks to make aspects of the network inaccessible to its users by flooding the system with service requests. The mathematical puzzled referenced in the introductory paragraph is based on a cryptographic hash function. Hash functions are particularly useful for this process since they are hard to solve, but easy to verify. Hash functions are used in many different fields to convert data of any arbitrary size to a fixedlength output. To produce proof of work, Bitcoin miners use the SHA-256 cryptographic algorithm; a hash function originally designed by the NSA for the encryption of sensitive information. Every time a miner fills a block with unprocessed transactions, the miner runs the SHA-256 hash algorithm multiple times with specific parameters to find a hash that starts with an arbitrary number of zeroes.

12 As the number of miners allocating resources to the network increases, so too does the amount of effort it takes to validate one block of transactions. This difficulty in validating each block is proportionate to the number of miners allocating resources to network. Every 2016-blocks, or around two weeks, the protocol determines a target difficulty so that on average, each block takes 10-minutes to be created. Digest The string created by the hash function. Source: Digital Asset Research Regardless of the number of inputs and outputs that are in a single transaction, the hash function will convert that data to a digest of a fixed length. Even the smallest change in the text input results in a completely different digest. Notice how, from Text A to Text B in the example above, the addition of a. to the input completely changed the digest. Finally, Alice s transaction is added to a block along with many other transactions. Once the block gets mine Bob can verify. Miners use hash functions to assign a unique, fixed length hash to each transaction. Digest The string created by the hash function. data sets in an efficient manner. Merkle Tree A data structure commonly used in cryptography and computer science to securely verify large data sets in an efficient manner.

13 The Bitcoin protocol uses a Merkle Tree structure to generate a block header that encompasses all transactions that are included in a block. The root hash, which is the final hash of this process is used in conjunction with a number that meets the requirements of the mathematical puzzle. Once the network peers validate the correctness of the solution, a new block is added to the Blockchain. Merkle Tree A data structure commonly used in cryptography and computer science to securely verify large data sets in an efficient manner.

14 From a technical standpoint, Ethereum relies on a state transition system to keep track of the transactions that occur in the network. While networks such as Bitcoin were designed with a focus on a transaction system, Ethereum emphasizes changes in state at an account level. State, in this context, refers to the most current set of data that incorporates all known inputs, or transactions. Ethereum keeps track of the state of all accounts in the network by maintaining a global state ledger that readjusts as new information comes in. When a group of transactions is considered valid and added to a block, a new global state is determined to reflect the changes introduced by the new block. Each participant of the network then updates their data sets to readjust the balance of the parties involved in those transactions. Relative to Bitcoin, Ethereum s account-based system is more simplistic and arguably leaner. A single Bitcoin transaction at times invokes dozens of inputs and may generate dozens of outputs, whereas an Ethereum transaction only produces one output that representing a change in the accounts within the network. Source: Digital Asset Research A new set of Ethereum transactions is found in intervals of as little as 12 seconds, and the network must reach consensus on a sequence of valid events to determine a change in global state, which incorporates the data of all accounts, balances, transactions and smart contracts. Ethereum shares some similarities with Bitcoin when it comes to processing transactions, and consensus on both networks is reached through mining via a Proof-of-Work system. Like Bitcoin, Ethereum also employs the concept of user accounts, but with a key difference; Ethereum accounts may be governed by software and store code. As a platform for programmatic money, Ethereum enables developers to add logic to transfers of value and create numerous decentralized applications, or Dapps.

15 Source: Digital Asset Research To better understand Ethereum as a platform for programmatic transfers of value, consider the following example: Alice is a software developer and lives in New York City with her dog, Charlie. Her work has been very demanding, and she has not had time to walk Charlie as much as needed. She decides to hire a dog walker to walk Charlie during the afternoon while she is at work. She goes on Craigslist and decides to hire a dog walker named Bob. Alice and Bob have never met before and their business transaction relies on trust from both parties. Alice needs to trust that Bob will actually walk her dog at the times she requested and follow a path of her choosing. Conversely, Bob needs to trust that Alice will pay him after completing the task while meeting all her requirements. Like many real-world business exchanges, Alice s verbal contract with Bob relies on counterparty trust. The logic behind their verbal contract can be represented by the conditional statement if Bob walks Charlie following a predetermined set of rules, transfer $30 from Alice s account to Bob s. Alice works as a developer and thinks she can convert the above statement into an automatically executable contract that represents her business relationship with Bob. At the time of writing, Ethereum supports 6 high level programming languages derived from popular counterparts. These high-level programming languages are then converted using a compiler to a common bytecode language that other participants in the network can understand. Since the common low-level language is cumbersome to write programs with, Ethereum s approach was to develop multiple development environments based on popular programming languages, the most popular of them is Solidity, which is based on JavaScript and C++. Before Alice starts developing her contract with Bob, she needs to install certain software on her computer that will enable her to interact with the Ethereum blockchain. This software is called a full node client, and is the backbone of distributed networks. Ethereum full node clients store a complete copy of the blockchain in their computers and all transactions and contracts that have ever occurred in the history of the network: from the very first transaction in the genesis block to the most recent block the software is able to find. Most importantly, full nodes enforce the consensus rules set forth by the protocol. These rules guarantee the security and consistency of the data that is stored on the

16 blockchain, as well as the process by which new data is amended to the ledger. Since full nodes store a copy of all transactions that have occurred in the network, they are able to verify the validity of transactions initiated by any user by confirming all past transactions associated with its address, as well as verifying the code that may have triggered the transaction. This decentralized verification process is important, as it prevents malicious actors from sending more than what they possess, or replaying the same transaction multiple times. The two most popular Ethereum clients, at the time of writing are Geth (Go-Ethereum), which uses the Go programming language, and Parity, which uses the Rust programming language. Downloading and synchronizing a full copy of the Ethereum blockchain from other nodes in the network may take days, or even weeks depending on a user s internet connection. A full archival version of Geth, which stores all historical states of the blockchain, has a total size of nearly 380 gigabytes. It is important to note that not all full nodes store archival copies of the blockchain. Most nodes that download archival versions of the blockchain also engage in mining, which, as mentioned earlier, is the process whereby transactions are validated and included in the blockchain. For purposes of developing smart contracts and safely interacting with the Ethereum blockchain, users can download the fast version of Geth, which is currently 28 gigabytes. Not every Ethereum user needs to run a full node to participate in the network. Because running a full node has cumbersome requirements, such as having sufficient storage space and memory, light clients were designed to ease the interaction with the network and reduce the frictions of owning and using ether. Rather than validating all transactions and running all code stored on the blockchain, light clients only verify the header of each block in the blockchain. This enables the integration of Ethereum wallets with mobile phones and browsers. Because Bob wants to quickly receive funds and initiate transactions, he decides to download a light client, which can be installed in minutes. One of the most innovative aspects of Ethereum is the concept of a built-in Turing-complete scripting language. Turing completeness is a characteristic of a system that has computational power equivalent to that of a Turing Machine, which is a device that can solve a set of mathematical functions and store the results of that computation. In the context of computer systems, it refers to the ability of finding answers to these problems. In very simplistic terms, Turing completeness is the ability of a system to perform basic computational functions. By featuring a Turing-complete development environment, Ethereum allows transfers of value to be triggered by the result of a script, enabling it to be used for multiple use cases. Conditional statements can be created using well-known control structures, such as if, else, while, etc. Alice will use the control structures in Solidity when writing her contract with Bob so that a transaction is triggered when certain conditions are met.

17 Over the past two years, significant development infrastructure has been built around Ethereum, especially for writing contracts in Solidity. Today, there are multiple Ethereum development frameworks that developers can use to test and deploy smart contracts. Testing smart contracts is essential because, once deployed, they cannot be changed. Unlike conventional software where developers can afford small bugs in the first release of their applications, smart contracts need to be extensively tested for exploits and vulnerabilities prior to deployment. Because smart contracts have accounts and hold value in the same way that regular users do, attackers have multi-million-dollar incentives to exploit potential vulnerabilities. Immutability enables developers to trust that the code will be executed based on predetermined rules, but immutability may hurt inexperienced developers. After she has written her smart contract, Alice extensively tests it prior to deployment. Ethereum enables conditional transfers of value that are based on the outcome of external events by using oracles. Generally, oracles can determine the outcomes of Binary Events, where the outcome is either yes or no; Categorical Events, where there are multiple discrete outcomes; and Scalar Events, where outcomes are determined by upper and lower numerical bounds. In the hypothetical example below, Alice will use an oracle to determine if Bob successfully completed the task. The smart contract Alice will write should have 4 main pieces of data highlighted below: import dev.dogwalkeroracle.io/api.sol contractdogwalk is using DogWalkerOracle { function WalkAroundPark () if(walkaroundpark!= true); oracle_query(api.dogwalkeroracle.io/alice) transfer(alice s Address, Bob s Address, 100Gwei) Source: Digital Asset Research 1. The event (WalkAroundPark) 2. The sender s address (Alice s Address) 3. The receiver s address (Bob s Address) 4. The amount to be sent per contract cycle (100Gwei) Alice understands that, for her smart contract to work, Bob will need to provide verifiable proof that he walked her dog around the local park during the predetermined time window. To accurately determine the completion of the task, she purchases a leash with a GPS tracker that tracks the location of her dog. Assume that the manufacturer of the collar provides an interface in which users can create routes, as well as an API that can be accessed through its website; dev.dogwalkeroracle.io/api.sol When the API is called, it determines whether Bob followed the correct path within the correct time window.

18 Prior to execution, the expressions contained in a smart contract are converted to set of computational instructions. These instructions, noted in bytecode, are then broadcasted as transactions to the rest of the network. Bytecode is code in portable, numeric form, and specifically designed for efficient execution. For simplicity, let us look at a real smart contract that features a basic mathematical equation: 1. SimpleMath Contract in Solidity 2. SimpleMath represented as Operation Codes PUSH1 0x60 PUSH1 0x40 MSTORE PUSH1 0x4 PUSH1 0x0 SSTORE CALLVALUE ISZERO PUSH1 0x13 JUMPI PUSH1 0x0 DUP1 REVERT JUMPDEST PUSH1 0x35 DUP1 PUSH1 0x20 PUSH1 0x0 CODECOPY PUSH1 0x0 RETURN STOP PUSH1 0x60 PUSH1 0x40 MSTORE PUSH1 0x0 DUP1 REVERT STOP LOG1 PUSH6 0x627A7A KECCAK256 PUSH9 0x52A0B4D3B17E BLOCKHASH PUSH24 0x82955F6BA0CF7FB5BDA10A04617D5FEA8F05E SimpleMath represented in bytecode fd5b f fd00a165627a7a a0b4d3b17e f6ba0cf7fb5bda10a04617d5fea8f05e Once a transaction is converted to bytecode, it is then broadcasted to the rest of the network and executed by the Ethereum Virtual Machine. Ethereum has been described as a decentralized computer because the code attached to every transaction is executed by all members of the network. Collectively, the network participants running full node Ethereum clients make up the Ethereum Virtual Machine. In computer science, a Virtual Machine is a system that emulates a computer and the EVM is Ethereum s native runtime environment where all code is executed. In addition to reaching consensus by verifying the validity of every transaction in the network, Ethereum nodes also verify the validity of the code that may have triggered an ether transfer. The EVM was designed as a stack machine, a type of computer that uses a LIFO (last in, first out) stack to temporarily store values.

19 Source: Digital Asset Research Once high-level code is converted to bytecode, each underlying operation within the smart contract will flow through the EVM stack like the example above. Each element in the stack of the EVM is 256-bits long, and the total size of the stack is limited to 1,024 elements. If, once compiled, a contract exceeds the maximum stack limit, the system will print an error and the contract will not be deployed. Both users and developers interact with the Ethereum network by initiating transactions. Ethereum s web3 API enables network participants to transfer ETH, and create and interact with smart contracts. Source: Digital Asset Research

20 Executing computer programs with the EVM also carries cost constraints in the form of network fees. Network fees in Ethereum are noted in Gas, a unit that represents computational costs as a function of time. Gas is also representative of the duration of each operation performed by the EVM. Since more complex operations require more processing power and take longer to be completed, they require more units of Gas to be executed. When sending funds or deploying smart contracts, users can assign a gas price to every unit of gas in every transaction. While gas is noted as a unit of measurement, gas price is denominated as a function of ETH. At the time of writing, the most popular gas price denomination is Gwei, which is one-millionth of an ETH. Ethereum clients often have built in recommendations for both gas limit and price, which fluctuates based on network congestion. If to send 1 ETH from the Ethereum Mist wallet the system recommends a gas limit of 31,500 units and a gas price of 10 Gwei, the maximum transaction fee is of ETH, or around $0.01. Mining is a competition in which players race to find a solution to a mathematical puzzle that confirms the validity of network transactions. Miners must devote an immense amount of computer resources to solve this mathematical puzzle and must also provide the proof of the work they put into finding the solution. Even though finding a solution to the puzzle requires effort, verifying its validity does not. This system, which also includes an incentive structure, was used by Satoshi Nakamoto in the implementation of Bitcoin and was based on several pre-existing technologies, including the Proof of Work (PoW) mechanism. Because Ethereum transaction verification requires work, this system guarantees the network s resilience against replay attacks and denial of service attacks. As more miners join the network, the cost of performing such attacks also increases. More importantly, mining ensures that the security of the network is not dependent upon a centralized party, but the collective effort of all network participants. The mathematical puzzle used in mining is based on a cryptographic hash function. Hash functions are particularly useful for this process since they are hard to solve, but easy to verify. Hash functions are used in many different fields to map data of any arbitrary size to a fixed-length output. To produce proof of work, Ethereum miners run Ethash; a cryptographic algorithm based on the Keccak-256 hash function. Every time a miner fills a block with unprocessed transactions, the miner runs Ethash multiple times with specific parameters to find a hash that starts with an arbitrary number of zeroes. As the number of miners allocating resources to the network increases, the amount of effort it takes to validate one block of transactions also increases. This difficulty in validating each block is proportionate to the number of miners allocating resources to network so that new blocks are amended to the blockchain at consistent intervals. In the future, Ethereum plans to introduce a new mechanism for validating transactions called Proof of Stake.

21 ONE OR MORE OF THE ANALYSTS PARTICIPATING IN THE PREPARATION OF THIS REPORT HAVE HOLDINGS OF BITCOIN AND ETHEREUM. The employees of Digital Asset Research ( DAR ) may purchase and use cryptocurrencies as part of the due diligence process. They may also own or hold them for any other reason. This report is for clients of Digital Asset Research ( DAR ) only. Use of this report, in any context, is governed by the Subscription Services Agreement and DAR s Terms of Use, both of which are incorporated here by reference. DAR is the sole and exclusive owner of this report and retains all right, title and interest to it and you do not have any right to the same except for the rights otherwise expressly granted herein or in the Subscription Services Agreement. You are permitted to store, display, analyze, modify, and print this report, but only for your own use. You are not permitted to (a) reverse engineer, decompile, decode, decrypt, disassemble, or in any way derive source code from this report; (b) modify, translate, adapt, alter, or create derivative works from this report; (c) copy (except as expressly permitted in the Subscription Services Agreement), distribute, publicly display, transmit, sell, rent, lease or otherwise exploit this report or grant any third party access to it; (d) frame or scrape or in-line link to the this report or use web crawlers, web spiders or other automated means to access, copy, index, process and/or store any of the information herein; (e) create apps, extensions, programs or other products or services that use any of the information herein; or (f) make or have made a service or product using similar ideas, features, functions or graphics of or providing a similar benefit as that provided by this report. DAR DOES NOT MAKE AND HEREBY EXPRESSLY DISCLAIMS ALL WARRANTIES, ORAL OR WRITTEN, EXPRESS OR IMPLIED, INCLUDING WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. WITHOUT LIMITING THE FOREGOING, YOU AGREE THAT YOUR USE OF THIS REPORT IS AT YOUR SOLE RISK AND ACKNOWLEDGE THAT THIS REPORT IS PROVIDED AS-IS AND DAR DOES NOT MAKE ANY WARRANTIES WITH RESPECT TO THE OPERATION, AVAILABILITY, RELIABILITY, ORIGINALITY OR ADEQUACY OF THE SAME. THIS REPORT (INCLUDING ANY INFERENCES OR CONCLUSIONS DRAWN HEREIN) IS BASED ON INFORMATION DAR CONSIDERS RELIABLE, HOWEVER, DAR DOES NOT REPRESENT IT AS ACCURATE OR COMPLETE, AND IT SHOULD NOT BE RELIED ON AS SUCH. THIS REPORT (INCLUDING ANY INFERENCES OR CONCLUSIONS DRAWN HEREIN) IS PROVIDED FOR GENERAL INFORMATIONAL PURPOSES ONLY AND YOU ARE RESPONSIBLE FOR DETERMINING WHETHER ANYTHING CONTAINED HEREIN IS SUITABLE FOR YOUR PARTICULAR CIRCUMSTANCES, AND FOR SEEKING PROFESSIONAL TAX AND/OR INVESTMENT ADVICE AS APPROPRIATE. DAR DOES NOT GIVE TAX, LEGAL OR INVESTMENT ADVICE OR ADVOCATE THE PURCHASE OR SALE OF ANY SECURITY, INVESTMENT, CRYPTOCURRENCY OR DIGITAL ASSET. NONE OF THE INFORMATION CONTAINED IN THIS REPORT CONSTITUTES OR IS INTENDED TO CONSTITUTE A RECOMMENDATION BY DAR TO ACQUIRE, HOLD, INVEST IN, OR USE ANY PARTICULAR COIN, TOKEN, CRYPTOCURRENCY, PROTOCOL, COMPANY OR FOUNDATION. You assume the entire risk of any use you make or permit to be made from this report. Without limiting the foregoing and to the maximum extent permitted by applicable law, in no event shall DAR have any liability regarding this report for damages, even if notified of such possibility. The information contained herein is as of the date hereof and is subject to change without prior notice. We may provide oral or written market commentary or trading strategies to our clients that reflect opinions that are contrary to the opinions expressed in this research. Information containing any historical information, data or analysis should not be taken as an indication or guarantee of any future performance as past performance does not guarantee future results. None of DAR s products or services recommend, endorse, or otherwise express any opinion regarding any coin, token, cryptocurrency protocol, company or foundation and none of DAR s products or services are intended to constitute investment advice or a recommendation to make (or refrain from making) any kind of investment decision and may not be relied on as such.

ENEE 457: E-Cash and Bitcoin

ENEE 457: E-Cash and Bitcoin ENEE 457: E-Cash and Bitcoin Charalampos (Babis) Papamanthou cpap@umd.edu Money today Any problems? Cash is cumbersome and can be forged Credit card transactions require centralized online bank are not

More information

Smalltalk 3/30/15. The Mathematics of Bitcoin Brian Heinold

Smalltalk 3/30/15. The Mathematics of Bitcoin Brian Heinold Smalltalk 3/30/15 The Mathematics of Bitcoin Brian Heinold What is Bitcoin? Created by Satoshi Nakamoto in 2008 What is Bitcoin? Created by Satoshi Nakamoto in 2008 Digital currency (though not the first)

More information

As a 3rd generation currency, not only are transactions secured, private and fast, you actually get paid for holding DigitalPrice coins.

As a 3rd generation currency, not only are transactions secured, private and fast, you actually get paid for holding DigitalPrice coins. Introduction With the circulation of cryptocurrency becoming common, there is a need for additional information. The scope of this white paper is to provide that information. If you are under the impression

More information

Who wants to be a millionaire? A class in creating your own cryptocurrency

Who wants to be a millionaire? A class in creating your own cryptocurrency DEVNET-3626 Who wants to be a millionaire? A class in creating your own cryptocurrency Tom Davies, Sr. Manager, DevNet Sandbox Vallard Benincosa, Software Engineer Cisco Spark How Questions? Use Cisco

More information

Computer Security. 14. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2019

Computer Security. 14. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2019 Computer Security 14. Blockchain & Bitcoin Paul Krzyzanowski Rutgers University Spring 2019 April 15, 2019 CS 419 2019 Paul Krzyzanowski 1 Bitcoin & Blockchain Bitcoin cryptocurrency system Introduced

More information

P2P BitCoin: Technical details

P2P BitCoin: Technical details ELT-53206 Peer-to-Peer Networks P2P BitCoin: Technical details Mathieu Devos Tampere University of Technology Department of Electronics & Communications Engineering mathieu.devos@tut.fi TG406 2 Outline

More information

Bitcoin (Part I) Ken Calvert Keeping Current Seminar 22 January Keeping Current 1

Bitcoin (Part I) Ken Calvert Keeping Current Seminar 22 January Keeping Current 1 Bitcoin (Part I) Ken Calvert Keeping Current Seminar 22 January 2014 2014.01.22 Keeping Current 1 Questions What problem is Bitcoin solving? Where did it come from? How does the system work? What makes

More information

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Elli Androulaki Staff member, IBM Research, Zurich Workshop on cryptocurrencies Athens, 06.03.2016 Blockchain systems

More information

Yada. A blockchain-based social graph

Yada. A blockchain-based social graph Yada A blockchain-based social graph January 2018 Abstract The goal of Yada is to achieve an acceptable level anonymity, privacy, and freedom of expression while making available to the public a structure

More information

The power of Blockchain: Smart Contracts. Foteini Baldimtsi

The power of Blockchain: Smart Contracts. Foteini Baldimtsi The power of Blockchain: Smart Contracts Foteini Baldimtsi The Blockchain at the heart of a cryptocurrency Alice sends 2 John sends 1 Dave sends 5 to Bob to Eve to Alice Bob sends 1 Eve sends 4 to Dave

More information

Bitcoin, a decentralized and trustless protocol

Bitcoin, a decentralized and trustless protocol Bitcoin, a decentralized and trustless protocol Thomas Sibut-Pinote Inria Saclay February 12, 2015 Thomas Sibut-Pinote Bitcoin, a decentralized and trustless protocol 1 / 42 Introduction Questions 1 Introduction

More information

Consensus & Blockchain

Consensus & Blockchain Consensus & Blockchain S P Suresh Chennai Mathematical Institute Formal Methods Update Meeting IIT Mandi July 17, 2017 The Bitcoin revolution is upon us What is Bitcoin? Bitcoin: an exciting new currency

More information

Introduction to Bitcoin I

Introduction to Bitcoin I Introduction to Bitcoin I P Peterlongo 1 A Tomasi 1 1 University of Trento Department of Mathematics June 10, 2013 Outline 1 Fiat and online payments Functions of Online payments and cost of clearing 2

More information

Chapter 13. Digital Cash. Information Security/System Security p. 570/626

Chapter 13. Digital Cash. Information Security/System Security p. 570/626 Chapter 13 Digital Cash Information Security/System Security p. 570/626 Introduction While cash is used in illegal activities such as bribing money laundering tax evasion it also protects privacy: not

More information

Technical White Paper of. MOAC Mother of All Chains. June 8 th, 2017

Technical White Paper of. MOAC Mother of All Chains. June 8 th, 2017 Technical White Paper of MOAC Mother of All Chains June 8 th, 2017 [Abstract] MOAC is to design a scalable and resilient Blockchain that supports transactions, data access, control flow in a layered structure.

More information

GENESIS VISION NETWORK

GENESIS VISION NETWORK GENESIS VISION NETWORK Contents 1. Description of the problem 7 11. Trust management 15 2. The problem with smart contracts 8 12. GVN Token 16 3. Centralised exchanges against decentralised 8 13. Deposit

More information

Problem: Equivocation!

Problem: Equivocation! Bitcoin: 10,000 foot view Bitcoin and the Blockchain New bitcoins are created every ~10 min, owned by miner (more on this later) Thereafter, just keep record of transfers e.g., Alice pays Bob 1 BTC COS

More information

Ethereum. Campbell R. Harvey* Duke University and NBER. Ashwin Ramachandran Duke University. Brent Xu ConsenSys. Innovation and Cryptoventures

Ethereum. Campbell R. Harvey* Duke University and NBER. Ashwin Ramachandran Duke University. Brent Xu ConsenSys. Innovation and Cryptoventures Innovation and Cryptoventures Ethereum Campbell R. Harvey* Duke University and NBER Ashwin Ramachandran Duke University Brent Xu ConsenSys February 12, 2018 1 2 Overview Ethereum Basics Under the hood

More information

Bitcoin and Blockchain

Bitcoin and Blockchain Bitcoin and Blockchain COS 418: Distributed Systems Lecture 18 Zhenyu Song [Credit: Selected content adapted from Michael Freedman. Slides refined by Chris Hodsdon and Theano Stavrinos] Why Bitcoin? All

More information

Security Analysis of Bitcoin. Dibyojyoti Mukherjee Jaswant Katragadda Yashwant Gazula

Security Analysis of Bitcoin. Dibyojyoti Mukherjee Jaswant Katragadda Yashwant Gazula Security Analysis of Bitcoin Dibyojyoti Mukherjee Jaswant Katragadda Yashwant Gazula Security Analysis of Bitcoin Introduction How Bitcoin works? Similar peer-to-peer systems Vulnerabilities and solutions

More information

What is Proof of Work?

What is Proof of Work? What is Proof of Work? Educational Series September 18, 2018 Overview There are many protocols that regulate how nodes on a blockchain achieve consensus, and currently the most popular is proof-of-work.

More information

Table of contents. Technical Features. Our approach. Technical Overview. Stage 1 (Using Ethereum blockchain) Participants. Data Owner.

Table of contents. Technical Features. Our approach. Technical Overview. Stage 1 (Using Ethereum blockchain) Participants. Data Owner. Table of contents Technical Features Our approach Technical Overview Stage 1 (Using Ethereum blockchain) Participants Data Owner Data Verifier Marketplace Data Buyer Creditor Data Platform Architecture

More information

BITCOIN PROTOCOL & CONSENSUS: A HIGH LEVEL OVERVIEW

BITCOIN PROTOCOL & CONSENSUS: A HIGH LEVEL OVERVIEW BITCOIN PROTOCOL & CONSENSUS: A HIGH LEVEL OVERVIEW Rustie Lin Wang Move the area1 over the image a little inside and then right click, replace image to change the background. (and delete this box while

More information

TOPPERCASH TOPPERCASH WHITEPAPER REFORM THE BEST OF BLOCKCHAIN

TOPPERCASH TOPPERCASH WHITEPAPER REFORM THE BEST OF BLOCKCHAIN TOPPERCASH TOPPERCASH WHITEPAPER REFORM THE BEST OF BLOCKCHAIN ABSTRACT A PEER-TO-PEER CRYPTO-CURRENCY DESIGN DERIVED FROM SATOSHI NAKAMOTO S BITCOIN. PROOF- OF-STAKE REPLACES PROOF-OF- WORK TO PROVIDE

More information

Technical White Paper. Cube Engine Version 1.0

Technical White Paper. Cube Engine Version 1.0 Technical White Paper Cube Engine Version 1.0 Last Updated: Feb 06. 2018 1 Contents 1. Summary 1) Introduction 2) Overview 2. Features of Cube Chain 1) Cubing 2) Indexing Block 3) Statistics Block 4) Escrow

More information

Technical Specifications for Platform Development

Technical Specifications for Platform Development Technical Specifications for Platform Development Contents 1. General Information about the Product... 2 2. Software Requirements... 3 2.1. Functional Requirements... 3 2.2. Server Requirements... 4 3.

More information

Blockchain Certification Protocol (BCP)

Blockchain Certification Protocol (BCP) Blockchain Certification Protocol (BCP) Fu Yong Quah fuyong@fyquah.me www.fyquah.me Abstract. A semi-decentralized certification system built above the existing 1 Bitcoin network, an innovative peer-to-peer

More information

Biomedical and Healthcare Applications for Blockchain. Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs

Biomedical and Healthcare Applications for Blockchain. Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs Biomedical and Healthcare Applications for Blockchain Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs Network Analysis Working Group 01.25.2018 Outline Introduction to bitcoin + blockchain

More information

Privacy based Public Key Infrastructure (PKI) using Smart Contract in Blockchain Technology

Privacy based Public Key Infrastructure (PKI) using Smart Contract in Blockchain Technology 2 nd Advanced Workshop on Blockchain, IIT Bombay Privacy based Public Key Infrastructure (PKI) using Smart Contract in Blockchain Technology Sivakumar.P M.Tech (CSE), Sem-III, NIT Trichy Guide:- Dr Kunwar

More information

Biomedical Security. Some Security News 10/5/2018. Erwin M. Bakker

Biomedical Security. Some Security News 10/5/2018. Erwin M. Bakker Biomedical Security Erwin M. Bakker Some Security News October 03, 2018 - Hackers attacking healthcare through remote access systems and disrupting operations is the number one patient safety risk, according

More information

Wormhole: A Smart Contract Solution for Bitcoin Cash

Wormhole: A Smart Contract Solution for Bitcoin Cash Wormhole: A Smart Contract Solution for Bitcoin Cash Abstract Born at block height 478,558, Bitcoin Cash (BCH) has been dedicated to bringing a reliable electronic cash to the world and fulfilling Satoshi

More information

The security and insecurity of blockchains and smart contracts

The security and insecurity of blockchains and smart contracts The security and insecurity of blockchains and smart contracts Jean-Pierre Flori, expert in cryptography, Agence Nationale de la Sécurité des Systèmes d Information (ANSSI) In J.P. Dardayrol, editor of

More information

Ergo platform. Dmitry Meshkov

Ergo platform. Dmitry Meshkov Ergo platform Dmitry Meshkov Prehistory Motivation Theory Practice Provably secure 1000 currencies New features Ad-hoc solutions Impractical Security issues Motivation Theory Provably secure New features

More information

Page Total

Page Total Page 2 3 4 5 6 7 8 9 Total Mark FIRST NAME LAST (FAMILY) NAME STUDENT NUMBER INSE 6630 Fall 2017 Duration: 3 hours One single-sided letter-sized reference sheet of paper is allowed Write answers in the

More information

Blockchains & Cryptocurrencies

Blockchains & Cryptocurrencies 1 Blockchains & Cryptocurrencies A Technical Introduction Lorenz Breidenbach ETH Zürich Cornell Tech The Initiative for CryptoCurrencies & Contracts (IC3) 2 Cryptocurrency Mania Market cap as of yesterday:

More information

Biomedical Security. Cipher Block Chaining and Applications

Biomedical Security. Cipher Block Chaining and Applications 1 Biomedical Security Erwin M. Bakker 2 Cipher Block Chaining and Applications Slides and figures are adapted from: W. Stallings, Cryptography and Network Security 4 th Edition and 7 th Edition 1 3 Block

More information

Jan Møller Co-founder, CTO Chainalysis

Jan Møller Co-founder, CTO Chainalysis Jan Møller Co-founder, CTO Chainalysis How Does Bitcoin Actually Work? This talk is not about the poli:cal or economical impact of Bitcoin. This talk is not about how to buy, sell, spend, or secure your

More information

INX Tokenomics I

INX Tokenomics I Content: 1. INX Tokenomics 2. Why is our blockchain needed? 3. Why are our INX needed? 4. Our technology 5. Blockchain specifications 6. INX details 7. INX distribution 8. INX sales 9. Use of funds 10.

More information

Radix - Public Node Incentives

Radix - Public Node Incentives Radix - Public Node Incentives Dan Hughes Piers Ridyard www.radix.global December 2017 Abstract In this paper we present a novel method for implementing a mechanism to reward work carried out across a

More information

Active Planning Committee John Lindsay, Patent Attorney Tony Schuman, Investment Advisor Todd Russell, Gov t Contract Opportunities

Active Planning Committee John Lindsay, Patent Attorney Tony Schuman, Investment Advisor Todd Russell, Gov t Contract Opportunities Agenda 11:30-11:45 Check-In, networking 11:45-12:45 12:45 Announcements, Networking Active Planning Committee John Lindsay, Patent Attorney Tony Schuman, Investment Advisor Todd Russell, Gov t Contract

More information

Ethereum Consortium Blockchain in Azure Marketplace Christine Avanessians Senior Program Manager

Ethereum Consortium Blockchain in Azure Marketplace Christine Avanessians Senior Program Manager Ethereum Consortium Blockchain in Azure Marketplace Christine Avanessians Senior Program Manager Overview The next phase of our support of blockchain on Microsoft Azure is the release of the Ethereum Consortium

More information

Next Paradigm for Decentralized Apps. Table of Contents 1. Introduction 1. Color Spectrum Overview 3. Two-tier Architecture of Color Spectrum 4

Next Paradigm for Decentralized Apps. Table of Contents 1. Introduction 1. Color Spectrum Overview 3. Two-tier Architecture of Color Spectrum 4 Color Spectrum: Next Paradigm for Decentralized Apps Table of Contents Table of Contents 1 Introduction 1 Color Spectrum Overview 3 Two-tier Architecture of Color Spectrum 4 Clouds in Color Spectrum 4

More information

ICS 421 & ICS 690. Bitcoin & Blockchain. Assoc. Prof. Lipyeow Lim Information & Computer Sciences Department University of Hawai`i at Mānoa

ICS 421 & ICS 690. Bitcoin & Blockchain. Assoc. Prof. Lipyeow Lim Information & Computer Sciences Department University of Hawai`i at Mānoa ICS 421 & ICS 690 Bitcoin & Blockchain Assoc. Prof. Lipyeow Lim Information & Computer Sciences Department University of Hawai`i at Mānoa Accepted by: Overstock.com Expedia.com Newegg.com Tigerdirect.com

More information

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University CS 4770: Cryptography CS 6750: Cryptography and Communication Security Alina Oprea Associate Professor, CCIS Northeastern University March 30 2017 Outline Digital currencies Advantages over paper cash

More information

NON-TECHNICAL WHITEPAPER Version 1.0

NON-TECHNICAL WHITEPAPER Version 1.0 NON-TECHNICAL WHITEPAPER Version 1.0 Abstract Decentralization in Cryptocurrency Standard blockchain environments contain many centralization vulnerabilities, such as monolithic development, consensus

More information

Proof-of-Stake Protocol v3.0

Proof-of-Stake Protocol v3.0 Proof-of-Stake Protocol v3.0 Abstract Proof of Stake's security has proven itself reliable & effective over years of testing while at the same time solving Bitcoin s issues caused by the Proof of Work

More information

Blockchain! What consultants should know about it. Daniel

Blockchain! What consultants should know about it. Daniel Blockchain! What consultants should know about it. Daniel Karzel @ Workshop Overview Quick overview of what is planned for the workshop. What you get out of this workshop Workshop goals Understand what

More information

Prelude. The notes within this Whitepaper publication are intended to formally document the concepts and features of the Aegeus cryptocurrency.

Prelude. The notes within this Whitepaper publication are intended to formally document the concepts and features of the Aegeus cryptocurrency. Prelude The notes within this Whitepaper publication are intended to formally document the concepts and features of the Aegeus cryptocurrency. This document will explain methodically, the details of the

More information

Lecture 10. A2 - will post tonight - due in two weeks

Lecture 10. A2 - will post tonight - due in two weeks Lecture 10 A2 - will post tonight - due in two weeks The DAO - $72M USD in Ether Decentralized Dragon's Den or Shark's Tank A pot of money that you could contribute to and receive voting shares for You

More information

A Lightweight Blockchain Consensus Protocol

A Lightweight Blockchain Consensus Protocol A Lightweight Blockchain Consensus Protocol Keir Finlow-Bates keir@chainfrog.com Abstract A lightweight yet deterministic and objective consensus protocol would allow blockchain systems to be maintained

More information

Blockchain. CS 240: Computing Systems and Concurrency Lecture 20. Marco Canini

Blockchain. CS 240: Computing Systems and Concurrency Lecture 20. Marco Canini Blockchain CS 240: Computing Systems and Concurrency Lecture 20 Marco Canini Credits: Michael Freedman and Kyle Jamieson developed much of the original material. Bitcoin: 10,000 foot view New bitcoins

More information

Key concepts of blockchain

Key concepts of blockchain Advisory A brief history of blockchains 2008 The mysterious Satoshi Nakamoto publishes his Bitcoin white paper 2014 2017 Nov. 23 rd Ethereum crowd sale Number of crypto tokens: 1.172 BTC $8.216 The first

More information

IAME: An Expert System for Blockchain Identity Verification

IAME: An Expert System for Blockchain Identity Verification IAME: An Expert System for Blockchain Identity Verification Nathaniel Tsang Mang Kin Suryani Chang www.iame.io Abstract. A decentralized identification system that would allow parties performing Blockchain

More information

CS 251: Bitcoin and Crypto Currencies Fall 2015

CS 251: Bitcoin and Crypto Currencies Fall 2015 CS 251: Bitcoin and Crypto Currencies Fall 2015 Final Exam The exam is open book and open notes. You have 2 hours. Please answer all five questions. All questions are weighted equally. You may use course

More information

BBc-1 : Beyond Blockchain One - An Architecture for Promise-Fixation Device in the Air -

BBc-1 : Beyond Blockchain One - An Architecture for Promise-Fixation Device in the Air - BBc-1 : Beyond Blockchain One - An Architecture for Promise-Fixation Device in the Air - Kenji Saito and Takeshi Kubo {ks91 t-kubo}@beyond-blockchain.org Revision 0.1 October 31, 2017 1 Introduction Blockchain

More information

Security Audit of FuzeX Smart Contract This report is public. ChainSecurity Ltd. January 11, 2018

Security Audit of FuzeX Smart Contract This report is public. ChainSecurity Ltd. January 11, 2018 Security Audit of FuzeX Smart Contract This report is public. ChainSecurity Ltd. January 11, 2018 1 Contents 1 System Overview 3 1.1 TGE Overview................................. 4 1.2 Token Rewards.................................

More information

Software Security. Final Exam Preparation. Be aware, there is no guarantee for the correctness of the answers!

Software Security. Final Exam Preparation. Be aware, there is no guarantee for the correctness of the answers! Software Security Final Exam Preparation Note: This document contains the questions from the final exam on 09.06.2017. Additionally potential questions about Combinatorial Web Security Testing and Decentralized

More information

BLOCKCHAIN Blockchains and Transactions Part II A Deeper Dive

BLOCKCHAIN Blockchains and Transactions Part II A Deeper Dive BLOCKCHAIN Blockchains and Transactions Part II A Deeper Dive www.blockchaintrainingalliance.com Blockchain Page 3 Blockchain is NOT Bitcoin Page 4 Transactions Page 5 Multi-Signature Addresses An Address

More information

Whitepaper Rcoin Global

Whitepaper Rcoin Global Whitepaper Rcoin Global SUMMARY 1. Introduction 2. What is Rcoin Global? 3. Transactions 4. Hybrid Network Concept 5. Keepers 6. Incentive 7. Smart Contract Token 8. Token Distribution 9. Rcoin Global

More information

Unblockable Chains. Is Blockchain the ultimate malicious infrastructure? Omer Zohar

Unblockable Chains. Is Blockchain the ultimate malicious infrastructure? Omer Zohar Unblockable Chains Is Blockchain the ultimate malicious infrastructure? Omer Zohar #WhoAmI Researching malware backbones for the past decade Following blockchain eco-system since 2013 Finally had some

More information

Vladimir Groshev. COO, Project Coordinator.

Vladimir Groshev. COO, Project Coordinator. Vladimir Groshev COO, Project Coordinator If absolute anonymity and complete security is what you are looking for, Then SISHUB is what you need! 1. Anonymous STEEL Messenger 2. Built-in cryptocurrency

More information

ECC: Peer-to-Peer Electronic Cash with Trustless Network Services

ECC: Peer-to-Peer Electronic Cash with Trustless Network Services ECC: Peer-to-Peer Electronic Cash with Trustless Network Services Greg Griffith October 2017 (griffith@cryptounited.io) https://www.ecc.network ECC: Peer-to-Peer Electronic Cash with Trustless Network

More information

Cryptocurrencies for Investigators

Cryptocurrencies for Investigators Cryptocurrencies for Investigators By Nick Furneaux CSITech Ltd Course Description Cryptocurrencies in their many forms, based on the blockchain concept, are here to stay and will increasingly pervade

More information

Ethereum Consortium Network Deployments Made Easy Christine Avanessians Senior Program Manager

Ethereum Consortium Network Deployments Made Easy Christine Avanessians Senior Program Manager Ethereum Consortium Network Deployments Made Easy Christine Avanessians Senior Program Manager Update History October 19, 2016: The document was revised to reflect the most recent update to the template.

More information

The Technology behind Smart Contracts

The Technology behind Smart Contracts The Technology behind Smart Contracts Florian Glaser, Chair of E-Finance, Information Systems Department Goethe University 01.09.2016 > Agenda Transactions in detail

More information

Blockchain (a.k.a. the slowest, most fascinating database you ll ever see)

Blockchain (a.k.a. the slowest, most fascinating database you ll ever see) Blockchain (a.k.a. the slowest, most fascinating database you ll ever see) GOTO Amsterdam 13 June, 2017 Stefan Tilkov, @stilkov I don t know Blockchain and so can you 1. Bitcoin > Practical application

More information

SmartPool: practical decentralized pool mining. Loi Luu, Yaron Velner, Jason Teutsch, and Prateek Saxena August 18, 2017

SmartPool: practical decentralized pool mining. Loi Luu, Yaron Velner, Jason Teutsch, and Prateek Saxena August 18, 2017 SmartPool: practical decentralized pool mining Loi Luu, Yaron Velner, Jason Teutsch, and Prateek Saxena August 18, 2017 Mining pools Miners role in cryptocurrencies Definition: A cryptocurrency is a decentralized

More information

Entrust WAP Server Certificate Relying Party Agreement

Entrust WAP Server Certificate Relying Party Agreement Entrust WAP Server Certificate Relying Party Agreement The WAP/WTLS specification v1.1 does not provide a means for certificate revocation checking. The following Relying Party Agreement" provides further

More information

The Blockchain. Josh Vorick

The Blockchain. Josh Vorick The Blockchain Josh Vorick Bitcoin is a currency. Blockchain is a technology. What is a blockchain? A decentralized database that anyone can add to and no one can delete from The Bitcoin blockchain Agenda

More information

Ergo platform: from prototypes to a survivable cryptocurrency

Ergo platform: from prototypes to a survivable cryptocurrency January 2019 Dmitry Meshkov Ergo platform: from prototypes to a survivable cryptocurrency Outline Ergo Consensus Light Storage vision protocol clients fee Voting Smart Monetary Roadmap system contracts

More information

How Bitcoin achieves Decentralization. How Bitcoin achieves Decentralization

How Bitcoin achieves Decentralization. How Bitcoin achieves Decentralization Centralization vs. Decentralization Distributed Consensus Consensus without Identity, using a Block Chain Incentives and Proof of Work Putting it all together Centralization vs. Decentralization Distributed

More information

Privacy-Enabled NFTs: User-Mintable, Non-Fungible Tokens With Private Off-Chain Data

Privacy-Enabled NFTs: User-Mintable, Non-Fungible Tokens With Private Off-Chain Data Privacy-Enabled NFTs: User-Mintable, Non-Fungible Tokens With Private Off-Chain Data Philip Stehlik Lucas Vogelsang August 8, 2018 1 Abstract Privacy-enabled NFTs (non-fungible tokens) are user-mintable

More information

DAVID ANDREWS, FOUNDER RYATTA BLOCKCHAIN FOUNDATIONS

DAVID ANDREWS, FOUNDER RYATTA BLOCKCHAIN FOUNDATIONS DAVID ANDREWS, FOUNDER RYATTA GROUP, CRYPTOGRAPHY IS THE STUDY OF TECHNIQUES FOR SECURE COMMUNICATION cryptography is defined as the practice and study of techniques for secure communication in the early

More information

Bitcoin, Security for Cloud & Big Data

Bitcoin, Security for Cloud & Big Data Bitcoin, Security for Cloud & Big Data CS 161: Computer Security Prof. David Wagner April 18, 2013 Bitcoin Public, distributed, peer-to-peer, hash-chained audit log of all transactions ( block chain ).

More information

IoT security based on the DPK platform

IoT security based on the DPK platform Zz S E C U M O B I. WHITE PAPER IoT security based on the DPK platform Powered by Ethereum David Khoury Elie Kfoury ABSTRACT Public key distribution remains one of the main security weaknesses in many

More information

TABLE OF CONTENTS VERSION 3 - NOVEMBER Joe Roets - j03 - [DRAFT] DRAGONCHAIN ARCHITECTURE

TABLE OF CONTENTS VERSION 3 - NOVEMBER Joe Roets - j03 - [DRAFT] DRAGONCHAIN ARCHITECTURE DRAGONCHAIN ARCHITECTURE VERSION 3 - NOVEMBER 2016 [DRAFT] Joe Roets - j03 - joe@dragonchain.org TABLE OF CONTENTS DRAGONCHAIN ARCHITECTURE ARCHITECTURAL GOALS ARCHITECTURAL ELEMENTS ABSTRACTION OF PROOF

More information

Distributed Ledger Technology & Fintech Applications. Hart Montgomery, NFIC 2017

Distributed Ledger Technology & Fintech Applications. Hart Montgomery, NFIC 2017 Distributed Ledger Technology & Fintech Applications Hart Montgomery, NFIC 2017 Let s consider a common scenario: Banks want to trade some asset class Participants in the market want to be able to efficiently

More information

Ergo platform overview

Ergo platform overview December 2018 Dmitry Meshkov Ergo platform overview Outline Ergo vision Decentralization Survivability Applicability Roadmap 2 Part 1 Ergo vision 3 History Research and Scorex framework development Testnet

More information

Transactions as Proof-of-Stake! by Daniel Larimer!

Transactions as Proof-of-Stake! by Daniel Larimer! Transactions as Proof-of-Stake by Daniel Larimer dlarimer@invictus-innovations.com November, 28 th 2013 Abstract The concept behind Proof-of-Stake is that a block chain should be secured by those with

More information

University of Duisburg-Essen Bismarckstr Duisburg Germany HOW BITCOIN WORKS. Matthäus Wander. June 29, 2011

University of Duisburg-Essen Bismarckstr Duisburg Germany HOW BITCOIN WORKS. Matthäus Wander. June 29, 2011 University of Duisburg-Essen Bismarckstr. 90 47057 Duisburg Germany HOW BITCOIN WORKS June 29, 2011 Overview Electronic currency system Decentralized No trusted third party involved Unstructured peer-to-peer

More information

AhnLab Software License Agreement

AhnLab Software License Agreement AhnLab Software License Agreement IMPORTANT - READ CAREFULLY BEFORE USING THE SOFTWARE. This AhnLab Software License Agreement (this "Agreement") is a legal agreement by and between you and AhnLab, Inc.

More information

This tutorial is aimed to give you a crisp understanding of the process of building your own blockchain.

This tutorial is aimed to give you a crisp understanding of the process of building your own blockchain. i About the Tutorial Blockchain is the current buzz that is dominating the software development trends. The development and designing of Blockchain involves three major components: client, miner and blockchain.

More information

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University CS 4770: Cryptography CS 6750: Cryptography and Communication Security Alina Oprea Associate Professor, CCIS Northeastern University April 9 2018 Schedule HW 4 Due on Thu 04/12 Programming project 3 Due

More information

How Formal Analysis and Verification Add Security to Blockchain-based Systems

How Formal Analysis and Verification Add Security to Blockchain-based Systems Verification Add Security to Blockchain-based Systems January 26, 2017 (MIT Media Lab) Pindar Wong (VeriFi Ltd.) 2 Outline of this talk Security Definition of Blockchain-based system Technology and Security

More information

Bitcoin. CS6450: Distributed Systems Lecture 20 Ryan Stutsman

Bitcoin. CS6450: Distributed Systems Lecture 20 Ryan Stutsman Bitcoin CS6450: Distributed Systems Lecture 20 Ryan Stutsman Material taken/derived from Princeton COS-418 materials created by Michael Freedman and Kyle Jamieson at Princeton University. Licensed for

More information

OpenbankIT: a banking platform for e- money management based on blockchain technology

OpenbankIT: a banking platform for e- money management based on blockchain technology OpenbankIT: a banking platform for e- money management based on blockchain technology Dr. Pavel Kravchenko, Sergiy Vasilchuk, Bohdan Skriabin pavel@distributedlab.com, vsv@atticlab.net, bohdan@distributedlab.com

More information

BLOCKCHAIN CADEC Pär Wenåker & Peter Larsson

BLOCKCHAIN CADEC Pär Wenåker & Peter Larsson BLOCKCHAIN CADEC 2018 - Pär Wenåker & Peter Larsson BITCOIN BITCOIN PAPER Posted 31/10 2008 Bitcoin v0.1 released Satoshi Nakamoto satoshi at vistomail.com Thu Jan 8 14:27:40 EST 2009 Previous message:

More information

Class Composer General Terms of Use

Class Composer General Terms of Use Class Composer General Terms of Use Effective Date: July 24, 2017 Welcome to Class Composer! Please continue reading to learn about the terms by which you may use our Service. If you have any questions

More information

The World s first Public Chain for Decentralized NaaS (Network-as-a-Service)

The World s first Public Chain for Decentralized NaaS (Network-as-a-Service) The World s first Public Chain for Decentralized NaaS (Network-as-a-Service) Disclaimer Presentation and the information contained herein is not intended to be a source of advice or credit analysis with

More information

FLIP Token (FLP) How to Participate in the FLIP Token (FLP) Sale Event. 1 Disclaimer 2. 2 What You Will Need 2

FLIP Token (FLP) How to Participate in the FLIP Token (FLP) Sale Event. 1 Disclaimer 2. 2 What You Will Need 2 FLIP Token (FLP) How to Participate in the FLIP Token (FLP) Sale Event 1 Disclaimer 2 2 What You Will Need 2 3 Create a New MEW Account 2 Step 1: Go to https://www.myetherwallet.com 3 Step 2: Go to the

More information

Ensimag - 4MMSR Network Security Student Seminar. Bitcoin: A peer-to-peer Electronic Cash System Satoshi Nakamoto

Ensimag - 4MMSR Network Security Student Seminar. Bitcoin: A peer-to-peer Electronic Cash System Satoshi Nakamoto Ensimag - 4MMSR Network Security Student Seminar Bitcoin: A peer-to-peer Electronic Cash System Satoshi Nakamoto wafa.mbarek@ensimag.fr halima.myesser@ensimag.fr 1 Table of contents: I- Introduction: Classic

More information

POLAR INTERNET SHARING, A CONNECTION OF CONSTELLATIONS

POLAR INTERNET SHARING, A CONNECTION OF CONSTELLATIONS POLAR INTERNET SHARING, A CONNECTION OF CONSTELLATIONS WHAT IS POLARCOIN? (POL) Polarcoin is an open source peer to peer decentralized cryptocurrency. There is no server for this network cause computer

More information

Distributed Ledger With Secure Data Deletion

Distributed Ledger With Secure Data Deletion Distributed Ledger With Secure Data Deletion Vitalii Demianets (norbloc AB), Astyanax Kanakakis (norbloc AB) Revision 1.4, November 2016 Abstract One of the core attributes of distributed ledgers, the

More information

FONT SOFTWARE END USER LICENSE AGREEMENT. We recommend that you print this Font Software End User License Agreement for further reference.

FONT SOFTWARE END USER LICENSE AGREEMENT. We recommend that you print this Font Software End User License Agreement for further reference. FONT SOFTWARE END USER LICENSE AGREEMENT We recommend that you print this Font Software End User License Agreement for further reference. This Font Software End User License Agreement (the Agreement )

More information

HIGH ACCESSIBILITY BLOCKCHAINS THROUGH TOKEN BASED PROOF-OF-STAKE MICRO COMMUNICATION CHANNELS

HIGH ACCESSIBILITY BLOCKCHAINS THROUGH TOKEN BASED PROOF-OF-STAKE MICRO COMMUNICATION CHANNELS HIGH ACCESSIBILITY BLOCKCHAINS THROUGH TOKEN BASED PROOF-OF-STAKE MICRO COMMUNICATION CHANNELS Written by Nelson Hunter Prendergast and Forrest Marshall Dated 3/26/2018 This white paper is a preliminary

More information

I. Introduction. II. Security, Coinage and Attacks

I. Introduction. II. Security, Coinage and Attacks Abstract Proof of Stake's security has proven itself over years of testing. Advances in this technology in Blackcoin's Proof-of-Stake 3.0 have solved the issues faced with Coin-Age, Block Reward and Blockchain

More information

On the impact of propogation delay on mining rewards in Bitcoin. Xuan Wen 1. Abstract

On the impact of propogation delay on mining rewards in Bitcoin. Xuan Wen 1. Abstract On the impact of propogation delay on mining rewards in Bitcoin Xuan Wen 1 Abstract Bitcoin 2 is a decentralized digital currency that is rapidly gaining in popularity. The Bitcoin system relies on miners

More information

Oracle Utilities Opower Rates Engagement Cloud Service

Oracle Utilities Opower Rates Engagement Cloud Service Oracle Utilities Opower Rates Engagement Cloud Service Product Overview E87463-01 Last Updated: June 22, 2018 Oracle Utilities Rates Engagement Cloud Service Product Overview E87463-01 Copyright 2017,

More information

Whitepaper The blockchain platform for building decentralized marketplaces

Whitepaper The blockchain platform for building decentralized marketplaces Whitepaper The blockchain platform for building decentralized marketplaces Matthew Liu Joshua Fraser Founders of originprotocol.com Certain statements in this document constitute forward-looking statements.

More information

Key Security Issues for implementation of Digital Currency, including ITU-T SG17 activities

Key Security Issues for implementation of Digital Currency, including ITU-T SG17 activities ITU Workshop on FG DFC Workshop on Standards for Digital Fiat Currency (DFC) () Key Issues for implementation of Digital Currency, including ITU-T SG17 activities Heung Youl Youm, PhD. Chairman of ITU-T

More information