Concurrency and Privacy with Payment Channel Networks
|
|
- Frank Chambers
- 6 years ago
- Views:
Transcription
1 Concurrency and Privacy with Payment Channel Networks Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei*, and Srivatsan Ravi Friedrich-Alexander-University Purdue University *TU Vienna
2 Bitcoin Scalability Issues < 10 transactions per second > 135 GB of memory required No micropayment (high fees) 2
3 Payment Channels Enable multiple payments between two users without committing every single payment to the blockchain Alice Alice Alice Bob Bob Bob 3
4 Payment Channel Networks (PCN) Each payment channel requires to deposit bitcoins Impractical to open a channel with every other user 1 BTC to Bob 1 BTC to Cat Alice Bob Cat 4
5 Hash Time-Lock Contracts Hash-Time Lock Contract (HTLC) enables conditional payments between two users Alice HTLC(Alice, Bob, 1, y, 30): Pay Bob 1 BTC iff Bob shows some x such that H(x) = y, before 30 days Bob (x, ) H(x) = y? 5
6 The Lightning Network Multiple chained HTLC enable multi-hop payments in the presence of untrusted intermediaries x : H(x) = y Alice Bob Cat y 6
7 The Lightning Network Multiple chained HTLC enable multi-hop payments in the presence of untrusted intermediaries HTLC(Alice, Bob, 1, y, 30) Alice x : H(x) = y Bob Cat y 7
8 The Lightning Network Multiple chained HTLC enable multi-hop payments in the presence of untrusted intermediaries HTLC(Bob, Cat, 1, y, 29) HTLC(Alice, Bob, 1, y, 30) Alice Bob x : H(x) = y Cat y 8
9 The Lightning Network Multiple chained HTLC enable multi-hop payments in the presence of untrusted intermediaries HTLC(Bob, Cat, 1, y, 29) HTLC(Alice, Bob, 1, y, 30) Alice x Bob Cat y 9
10 The Lightning Network Multiple chained HTLC enables multi-hop payments in the presence of untrusted intermediaries Bob does not gain or lose coins HTLC(Alice, Bob, 1, y, 30) Alice HTLC(Bob, Cat, 1, y, 29) Bob x Cat y 10
11 Contributions Definition of security and privacy properties for PCNs Privacy analysis of PCNs and solution (Fulgor) Concurrency analysis of PCNs and solution (Rayo) Prototype implementation 11
12 Security Properties Our model highlights two main security properties: Balance Security: Pr [ ] Serializability: => 12
13 Privacy Properties Our model highlights two privacy properties (Off-path) value privacy: (On-path) relationship anonymity: 13
14 Privacy in PCNs: Challenge? Off-chain payments => Privacy-preserving payments HTLC(Alice, Bob, 1, y, 30) Alice HTLC(Bob, Cat, 1, y, 29) Bob Figure 1: Illustrative example of payment channel. White solid boxes denote Bitcoin addresses and their current balance, dashed Cat Figure 2: Illustrative example of (bold) numbers represent the capa the payment from Alice to Bob. A via Carol, Edward and Fabi. 14 There
15 Privacy in PCNs: Challenge? Off-chain payments => Privacy-preserving payments HTLC(Alice, Bob, 1, y, 30) Alice HTLC(Bob, Cat, 1, y, 29) Bob Figure 1: Illustrative example of payment channel. White solid boxes denote Bitcoin addresses and their current balance, dashed Same y! Cat Figure 2: Illustrative example of (bold) numbers represent the capa the payment from Alice to Bob. A via Carol, Edward and Fabi. 15 There
16 Privacy in PCNs: Our Solution Our setting: P2P Network Our goal: On-chain operations: HTLC as in the Lightning Network Rest of cryptographic operations must be off-chain Full compatibility with the current Bitcoin script Our solution: Fulgor: Based on Multi-hop HTLC 16
17 Multi-hop HTLC Building block: Non-interactive zero knowledge (ZKBoo [GMO16]) Alice Bob Cat x 0 : H(x 0 ) = y 0 x 1 : H(x 0 x 1 ) = y 1 17
18 Multi-hop HTLC Building block: Non-interactive zero knowledge (ZKBoo [GMO16])? H(x 0 ) = y 0 Alice Bob Cat x 0 : H(x 0 ) = y 0 x 1 : H(x 0 x 1 ) = y 1 (x 0, y 0 ) 18
19 Multi-hop HTLC Building block: Non-interactive zero knowledge (ZKBoo [GMO16]) V(s,") = 1 Alice x0 : H(x0) = y0 x1 : H(x0 x1) = y1 Bob s := (x1, y1, y0, ") Cat! : x0 s.t. H(x0 x1) = y1 H(x0) = y0 19
20 Multi-hop HTLC Building block: Non-interactive zero knowledge (ZKBoo [GMO16]) HTLC(Alice, Bob, 1, y1, 30) Alice x0 : H(x0) = y0 x1 : H(x0 x1) = y1 Bob Cat s := (x1, y1, y0, ")! : x0 s.t. H(x0 x1) = y1 H(x0) = y0 20
21 Multi-hop HTLC Building block: Non-interactive zero knowledge (ZKBoo [GMO16]) HTLC(Alice, Bob, 1, y1, 30) HTLC(Bob, Cat, 1, y0, 29) Alice x0 : H(x0) = y0 x1 : H(x0 x1) = y1 Bob Cat s := (x1, y1, y0, ")! : x0 s.t. H(x0 x1) = y1 H(x0) = y0 21
22 Multi-hop HTLC HTLC(Alice, Bob, 1, r1, 30) HTLC(Bob, Cat, 1, r0, 29) HTLC(Alice, Bob, 1, y1, 30) HTLC(Bob, Cat, 1, y0, 29) Alice x0 : H(x0) = y0 x1 : H(x0 x1) = y1 Bob Cat s := (x1, y1, y0, ")! : x0 s.t. H(x0 x1) = y1 H(x0) = y0 22
23 Multi-hop HTLC x1 x0 HTLC(Alice, Bob, 1, y1, 30) Alice x0 : H(x0) = y0 x1 : H(x0 x1) = y1 Bob HTLC(Bob, Cat, 1, y0, 29) x0 Cat s := (x1, y1, y0, ")! : x0 s.t. H(x0 x1) = y1 H(x0) = y0 23
24 Multi-hop HTLC Soundness of NIZK => Bob does not loss coins Zero-knowledge of NIZK => Bob does not steal coins x1 x0 HTLC(Alice, Bob, 1, y1, 30) Alice x0 : H(x0) = y0 x1 : H(x0 x1) = y1 Bob HTLC(Bob, Cat, 1, y0, 29) x0 Cat s := (x1, y1, y0, ")! : x0 s.t. H(x0 x1) = y1 H(x0) = y0 24
25 Concurrency in PCNs Concurrent on-chain payments can be easily ordered by miners No user has a complete view of off-chain concurrent payments in a P2P network A blocking solution can lead to deadlocks Alice to Gabriel Bob to Edward 25
26 Concurrency in PCNs Concurrent on-chain payments can be easily ordered by miners No user has a complete view of off-chain concurrent payments in a P2P network A blocking solution can lead to deadlocks Alice to Gabriel Bob to Edward 26
27 Concurrency in PCNs Concurrent on-chain payments can be easily ordered by miners No user has a complete view of off-chain concurrent payments in a P2P network A blocking solution can lead to deadlocks Alice to Gabriel Bob to Edward 27
28 Concurrency in PCNs Concurrent on-chain payments can be easily ordered by miners No user has a complete view of off-chain concurrent payments in a P2P network A blocking solution can lead to deadlocks Alice to Gabriel Bob to Edward 28
29 Concurrency in PCNs: Our Solution A non-blocking solution (Rayo): at least one payment finishes Main idea: Use global transaction identifiers T2 T1 Alice to Gabriel Bob to Edward Queue T2 Abort T1 29
30 Concurrency vs Privacy Tradeoff Global identifiers leak transaction ID to intermediate users Non-blocking solutions cannot achieve strong privacy BLOCKING (Fulgor) Anonymity set for P 0 NON-BLOCKING (Rayo) Anonymity set for P 0 30
31 Implementation and Performance Running time of our solution largely dominated by NIZK Creating a proof requires 309 ms. Proof verification requires 130 ms Proof size: 1.65MB 5-hop payment: Non-private (LN): 609 ms Private: 1929 ms and ~ 5 MB (Proofs are not included in the blockchain) 31
32 Conclusions Define the security and privacy properties of interest in PCN Inherent tradeoff between concurrency and privacy Fulgor and Rayo: two approaches for concurrency and privacy Our solutions are efficient, compatible with Bitcoin script and without storage overhead in the blockchain 32
33 Paper: eprint.iacr.org/2017/820 Thank you for your attention! Giulio Malavolta, Pedro Aniket Kate, Matteo Maffei, and
Security, Privacy and Interoperability in Payment- Channel Networks
FAKULTÄT FÜR!NFORMATIK Faculty of Informatics & PRIVACY SECURITY GROUP Security, Privacy and Interoperability in Payment- Channel Networks Pedro Moreno-Sanchez (@pedrorechez) Joint work with Giulio Malavolta,
More informationSilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks
SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks $ Giulio Malavolta Saarland University Pedro Moreno-Sanchez Purdue University Aniket Kate Purdue University Matteo Maffei
More informationBlind Signatures in Scriptless Scripts
Blind Signatures in Scriptless Scripts Jonas Nick jonasd.nick@gmail.com @n1ckler February 17, 2019 Blind Signatures in Scriptless Scripts Jonas Nick jonasd.nick@gmail.com @n1ckler 1/24 Schnorr Signatures
More informationUniversity of Duisburg-Essen Bismarckstr Duisburg Germany HOW BITCOIN WORKS. Matthäus Wander. June 29, 2011
University of Duisburg-Essen Bismarckstr. 90 47057 Duisburg Germany HOW BITCOIN WORKS June 29, 2011 Overview Electronic currency system Decentralized No trusted third party involved Unstructured peer-to-peer
More informationUsing Chains for what They re Good For
Using Chains for what They re Good For Andrew Poelstra usingchainsfor@wpsoftware.net Scaling Bitcoin, November 5, 2017 1 / 14 On-Chain Smart Contracting Bitcoin (and Ethereum, etc.) uses a scripting language
More informationENEE 457: E-Cash and Bitcoin
ENEE 457: E-Cash and Bitcoin Charalampos (Babis) Papamanthou cpap@umd.edu Money today Any problems? Cash is cumbersome and can be forged Credit card transactions require centralized online bank are not
More informationPage Total
Page 2 3 4 5 6 7 8 9 Total Mark FIRST NAME LAST (FAMILY) NAME STUDENT NUMBER INSE 6630 Fall 2017 Duration: 3 hours One single-sided letter-sized reference sheet of paper is allowed Write answers in the
More informationBlockchain. CS 240: Computing Systems and Concurrency Lecture 20. Marco Canini
Blockchain CS 240: Computing Systems and Concurrency Lecture 20 Marco Canini Credits: Michael Freedman and Kyle Jamieson developed much of the original material. Bitcoin: 10,000 foot view New bitcoins
More informationProblem: Equivocation!
Bitcoin: 10,000 foot view Bitcoin and the Blockchain New bitcoins are created every ~10 min, owned by miner (more on this later) Thereafter, just keep record of transfers e.g., Alice pays Bob 1 BTC COS
More informationThe Blockchain. Josh Vorick
The Blockchain Josh Vorick Bitcoin is a currency. Blockchain is a technology. What is a blockchain? A decentralized database that anyone can add to and no one can delete from The Bitcoin blockchain Agenda
More informationSet: Hub-and-Spoke Cryptographic Payment Channels
Set: Hub-and-Spoke Cryptographic Payment Channels v0.0.1 Nathan Ginnever: nathan@finalitylabs.io Abstract Here we outline the Set-Payment channel protocol (In a later paper we incrementally extend Set
More informationHawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. Yashar Dehkan Asl
Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts Yashar Dehkan Asl Chapter I Introduction Decentralized Cryptocurrencies: Such as Bitcoin and altcoins are getting more
More informationThe power of Blockchain: Smart Contracts. Foteini Baldimtsi
The power of Blockchain: Smart Contracts Foteini Baldimtsi The Blockchain at the heart of a cryptocurrency Alice sends 2 John sends 1 Dave sends 5 to Bob to Eve to Alice Bob sends 1 Eve sends 4 to Dave
More informationPrivacy- Preserving Smart Contracts
Privacy- Preserving Smart Contracts Ranjit Kumaresan Microso8 Research Joint work with Iddo Bentov, Tal Moran, Vinod Vaikuntanathan, Prashant Vasudevan, Melissa Chase Smart Contracts [Szabo 94] Automate
More informationLecture 9. Anonymity in Cryptocurrencies
Lecture 9 Anonymity in Cryptocurrencies Some say Bitcoin provides anonymity Bitcoin is a secure and anonymous digital currency WikiLeaks donations page Others say it doesn t Bitcoin won't hide you from
More informationMultiparty Computation (MPC) protocols
Multiparty Computation (MPC) protocols Protocols where the users of the protocol don t trust each other, but nevertheless they want to achieve a common goal I don t trust Bob I don t trust Alice Alice
More informationBLOCKCHAIN Blockchains and Transactions Part II A Deeper Dive
BLOCKCHAIN Blockchains and Transactions Part II A Deeper Dive www.blockchaintrainingalliance.com Blockchain Page 3 Blockchain is NOT Bitcoin Page 4 Transactions Page 5 Multi-Signature Addresses An Address
More informationBlockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric
Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Elli Androulaki Staff member, IBM Research, Zurich Workshop on cryptocurrencies Athens, 06.03.2016 Blockchain systems
More informationKey concepts of blockchain
Advisory A brief history of blockchains 2008 The mysterious Satoshi Nakamoto publishes his Bitcoin white paper 2014 2017 Nov. 23 rd Ethereum crowd sale Number of crypto tokens: 1.172 BTC $8.216 The first
More informationSecurity Analysis of the Lightning Network
Security Analysis of the Lightning Network Laolu Osuntokun @roasbeef Lightning Labs BPASE 2017 State of the Hash-Lock In-progress Lightning Network specifications (lighting-rfc) Basis of Lightning Technology
More informationCS 251: Bitcoin and Cryptocurrencies Fall 2016
CS 251: Bitcoin and Cryptocurrencies Fall 2016 Homework 3 due : 2016-11-28, 23:59 via Gradescope (entry code M4YJ69 ) 1. Idioms of use: Consider the transaction graph in the figure below: rectangles represent
More informationSmalltalk 3/30/15. The Mathematics of Bitcoin Brian Heinold
Smalltalk 3/30/15 The Mathematics of Bitcoin Brian Heinold What is Bitcoin? Created by Satoshi Nakamoto in 2008 What is Bitcoin? Created by Satoshi Nakamoto in 2008 Digital currency (though not the first)
More informationChapter 13. Digital Cash. Information Security/System Security p. 570/626
Chapter 13 Digital Cash Information Security/System Security p. 570/626 Introduction While cash is used in illegal activities such as bribing money laundering tax evasion it also protects privacy: not
More informationPedro MMCI, Saarland University
CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin [project page] [paper] @real_or_random Pedro Moreno-Sanchez @pedrorechez MMCI, Saarland University Aniket Kate @aniketpkate Introduction Alice
More informationComputer Security. 14. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2019
Computer Security 14. Blockchain & Bitcoin Paul Krzyzanowski Rutgers University Spring 2019 April 15, 2019 CS 419 2019 Paul Krzyzanowski 1 Bitcoin & Blockchain Bitcoin cryptocurrency system Introduced
More informationDoS on a Bitcoin Lightning Network channel.
DoS on a Bitcoin Lightning Network channel. Willem Rens (UvA MSc SNE student) Supervisors: Maarten Everts (TNO) & Oskar van Deventer (TNO) August 2, 2018 Abstract The purpose of this research is to identify
More informationBitcoin and Blockchain
Bitcoin and Blockchain COS 418: Distributed Systems Lecture 18 Zhenyu Song [Credit: Selected content adapted from Michael Freedman. Slides refined by Chris Hodsdon and Theano Stavrinos] Why Bitcoin? All
More informationBitcoin (Part I) Ken Calvert Keeping Current Seminar 22 January Keeping Current 1
Bitcoin (Part I) Ken Calvert Keeping Current Seminar 22 January 2014 2014.01.22 Keeping Current 1 Questions What problem is Bitcoin solving? Where did it come from? How does the system work? What makes
More informationUpgrading Bitcoin: Segregated Witness. Dr. Johnson Lau Bitcoin Core Contributor Co-author of Segregated Witness BIPs March-2016
Upgrading Bitcoin: Segregated Witness Dr. Johnson Lau Bitcoin Core Contributor Co-author of Segregated Witness BIPs 141-143 16-March-2016 Topics A short introduction to Bitcoin transactions What is transaction
More informationBiomedical and Healthcare Applications for Blockchain. Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs
Biomedical and Healthcare Applications for Blockchain Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs Network Analysis Working Group 01.25.2018 Outline Introduction to bitcoin + blockchain
More informationIntroduction to Cryptography in Blockchain Technology. December 23, 2018
Introduction to Cryptography in Blockchain Technology December 23, 2018 What is cryptography? The practice of developing protocols that prevent third parties from viewing private data. Modern cryptography
More informationZero-Knowledge proof of knowledge transfer. Perm summer school on blockchain 2018
Zero-Knowledge proof of knowledge transfer Teleport Teleport was born in 2016 from the idea to bring the power of peer-to-peer traffic distribution technology like BitTorrent to the solution of traffic
More informationWho wants to be a millionaire? A class in creating your own cryptocurrency
DEVNET-3626 Who wants to be a millionaire? A class in creating your own cryptocurrency Tom Davies, Sr. Manager, DevNet Sandbox Vallard Benincosa, Software Engineer Cisco Spark How Questions? Use Cisco
More informationcchannel Generalized State Channel Specification
cchannel Generalized State Channel Specification Celer Network Core Team May 27, 2018 cchannel of the Celer Network is a generalized state channel and sidechain suite that provides a framework to support
More informationBiomedical Security. Cipher Block Chaining and Applications
1 Biomedical Security Erwin M. Bakker 2 Cipher Block Chaining and Applications Slides and figures are adapted from: W. Stallings, Cryptography and Network Security 4 th Edition and 7 th Edition 1 3 Block
More informationSettling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions
Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions Stefanie Roos University of Waterloo sroos@uwaterloo.ca Pedro Moreno-Sanchez Purdue University pmorenos@purdue.edu
More informationHow Bitcoin achieves Decentralization. How Bitcoin achieves Decentralization
Centralization vs. Decentralization Distributed Consensus Consensus without Identity, using a Block Chain Incentives and Proof of Work Putting it all together Centralization vs. Decentralization Distributed
More informationTowards Usable Off-Chain Payments
Towards Usable Off-Chain Payments Guillaume Felley Supervised by: Dr. Arthur Gervais Prof. Dr. Roger Wattenhofer September 2018 1 . 2 Acknowledgement I would first like to thank my thesis supervisor Dr.
More informationOverview & White Paper.
Overview & White Paper www.phantomx.co CONTENT 2. Introduction 7. Scalability and Network 3. Summary 3. About PhantomX 3. Our mission 4. The team behind PhantomX 5. Specification 8. Proof-of-Work 9. Proof-of-Stake
More informationBiomedical Security. Some Security News 10/5/2018. Erwin M. Bakker
Biomedical Security Erwin M. Bakker Some Security News October 03, 2018 - Hackers attacking healthcare through remote access systems and disrupting operations is the number one patient safety risk, according
More informationEECS 498 Introduction to Distributed Systems
EECS 498 Introduction to Distributed Systems Fall 2017 Harsha V. Madhyastha Today Bitcoin: A peer-to-peer digital currency Spark: In-memory big data processing December 4, 2017 EECS 498 Lecture 21 2 December
More informationSecurity (and finale) Dan Ports, CSEP 552
Security (and finale) Dan Ports, CSEP 552 Today Security: what if parts of your distributed system are malicious? BFT: state machine replication Bitcoin: peer-to-peer currency Course wrap-up Security Too
More informationBitcoin, Security for Cloud & Big Data
Bitcoin, Security for Cloud & Big Data CS 161: Computer Security Prof. David Wagner April 18, 2013 Bitcoin Public, distributed, peer-to-peer, hash-chained audit log of all transactions ( block chain ).
More informationEnsimag - 4MMSR Network Security Student Seminar. Bitcoin: A peer-to-peer Electronic Cash System Satoshi Nakamoto
Ensimag - 4MMSR Network Security Student Seminar Bitcoin: A peer-to-peer Electronic Cash System Satoshi Nakamoto wafa.mbarek@ensimag.fr halima.myesser@ensimag.fr 1 Table of contents: I- Introduction: Classic
More informationDiscreet Log Contracts
Discreet Log Contracts Thaddeus Dryja MIT Digital Currency Initiative Abstract Smart contracts [1] are an often touted feature of cryptographic currency systems such as Bitcoin, but they have yet to see
More informationSecurity Analysis of Bitcoin. Dibyojyoti Mukherjee Jaswant Katragadda Yashwant Gazula
Security Analysis of Bitcoin Dibyojyoti Mukherjee Jaswant Katragadda Yashwant Gazula Security Analysis of Bitcoin Introduction How Bitcoin works? Similar peer-to-peer systems Vulnerabilities and solutions
More informationAlternatives to Blockchains. Sarah Meiklejohn (University College London)
Alternatives to Blockchains Sarah Meiklejohn (University College London) fully decentralized cryptocurrencies 2 fully decentralized cryptocurrencies tx tx(addra addrb) 2 fully decentralized cryptocurrencies
More informationErgo platform. Dmitry Meshkov
Ergo platform Dmitry Meshkov Prehistory Motivation Theory Practice Provably secure 1000 currencies New features Ad-hoc solutions Impractical Security issues Motivation Theory Provably secure New features
More informationP2P BitCoin: Technical details
ELT-53206 Peer-to-Peer Networks P2P BitCoin: Technical details Mathieu Devos Tampere University of Technology Department of Electronics & Communications Engineering mathieu.devos@tut.fi TG406 2 Outline
More informationWhat is Proof of Work?
What is Proof of Work? Educational Series September 18, 2018 Overview There are many protocols that regulate how nodes on a blockchain achieve consensus, and currently the most popular is proof-of-work.
More informationICS 421 & ICS 690. Bitcoin & Blockchain. Assoc. Prof. Lipyeow Lim Information & Computer Sciences Department University of Hawai`i at Mānoa
ICS 421 & ICS 690 Bitcoin & Blockchain Assoc. Prof. Lipyeow Lim Information & Computer Sciences Department University of Hawai`i at Mānoa Accepted by: Overstock.com Expedia.com Newegg.com Tigerdirect.com
More informationApplied cryptography
Applied cryptography Electronic Cash Andreas Hülsing 29 November 2016 1 / 61 Classical Cash - Life Cycle Mint produces money (coins / bank notes) Sent to bank User withdraws money (reduces account balance)
More informationErgo platform: from prototypes to a survivable cryptocurrency
January 2019 Dmitry Meshkov Ergo platform: from prototypes to a survivable cryptocurrency Outline Ergo Consensus Light Storage vision protocol clients fee Voting Smart Monetary Roadmap system contracts
More informationCOIN. Secure and Anonymous Decentralized Bitcoin Mixing PARTY
COIN PARTY Secure and Anonymous Decentralized Bitcoin Mixing Jan Henrik Ziegeldorf, Roman Matzu7, Fred Grossmann, Mar;n Henze, Klaus Wehrle Communica;on and Distributed Systems (COMSYS), RWTH Aachen, Germany
More informationGENESIS VISION NETWORK
GENESIS VISION NETWORK Contents 1. Description of the problem 7 11. Trust management 15 2. The problem with smart contracts 8 12. GVN Token 16 3. Centralised exchanges against decentralised 8 13. Deposit
More informationBlockchain Certification Protocol (BCP)
Blockchain Certification Protocol (BCP) Fu Yong Quah fuyong@fyquah.me www.fyquah.me Abstract. A semi-decentralized certification system built above the existing 1 Bitcoin network, an innovative peer-to-peer
More informationEnsuring Trustworthiness of Transactions under Different Isolation Levels
Ensuring Trustworthiness of Transactions under Different Isolation Levels Rohit Jain, Sunil Prabhakar Department of Computer Sciences, Purdue University West Lafayette, IN, USA {jain29,sunil}@cs.purdue.edu
More informationBitcoin, a decentralized and trustless protocol
Bitcoin, a decentralized and trustless protocol Thomas Sibut-Pinote Inria Saclay February 12, 2015 Thomas Sibut-Pinote Bitcoin, a decentralized and trustless protocol 1 / 42 Introduction Questions 1 Introduction
More informationBitcoin (and why it uses SO much energy)
Bitcoin (and why it uses SO much energy) David Malone Hamilton Institute / Dept Maths&Stats Maynooth University. 2018-11-08 Bitcoin Background Bitcoin is a cryptocurrency that started around 2008 2009.
More informationAn Analysis of Atomic Swaps on and between Ethereum Blockchains Research Project I
An Analysis of Atomic Swaps on and between Ethereum Blockchains Research Project I Master of System and Network Engineering Informatics Institute, University of Amsterdam Peter Bennink Lennart van Gijtenbeek
More informationCS 251: Bitcoin and Crypto Currencies Fall 2015
CS 251: Bitcoin and Crypto Currencies Fall 2015 Final Exam The exam is open book and open notes. You have 2 hours. Please answer all five questions. All questions are weighted equally. You may use course
More informationBitcoin. CS6450: Distributed Systems Lecture 20 Ryan Stutsman
Bitcoin CS6450: Distributed Systems Lecture 20 Ryan Stutsman Material taken/derived from Princeton COS-418 materials created by Michael Freedman and Kyle Jamieson at Princeton University. Licensed for
More informationCatena: Preventing Lies with
November 28th, 2016 Catena: Preventing Lies with Alin Tomescu alinush@mit.edu MIT CSAIL Srinivas Devadas devadas@mit.edu MIT CSAIL New England Security Day (NESD), Fall '16 The problem: Equivocation The
More informationAbstraction: Distributed Ledger
Bitcoin 2 Abstraction: Distributed Ledger 3 Implementation: Blockchain this happened this happened this happen hashes & signatures hashes & signatures hashes signatu 4 Implementation: Blockchain this happened
More informationBlockchain, Cryptocurrency, Smart Contracts and Initial Coin Offerings: A Technical Perspective
SESSION ID: LAB3-R09 Blockchain, Cryptocurrency, Smart Contracts and Initial Coin Offerings: A Technical Perspective Tom Plunkett Consulting Solutions Director Oracle Captain Brittany Snelgrove United
More informationCrypto tricks: Proof of work, Hash chaining
Crypto tricks: Proof of work, Hash chaining CS 161: Computer Security Prof. David Wagner April 13, 2016 A Tangent: How Can I Prove I Am Rich? Math Puzzle Proof of Work Problem. To prove to Bob I m not
More informationCS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University
CS 4770: Cryptography CS 6750: Cryptography and Communication Security Alina Oprea Associate Professor, CCIS Northeastern University April 9 2018 Schedule HW 4 Due on Thu 04/12 Programming project 3 Due
More informationElphyrecoin (ELPH) a Private, Untraceable, ASIC-Resistant CryptoCurrency Based on CryptoNote
Elphyrecoin (ELPH) a Private, Untraceable, ASIC-Resistant CryptoCurrency Based on CryptoNote This is the First Version of the Elphyrecoin s White Paper Please Check the Website for Future Updates White
More informationBlockchains & Cryptocurrencies
1 Blockchains & Cryptocurrencies A Technical Introduction Lorenz Breidenbach ETH Zürich Cornell Tech The Initiative for CryptoCurrencies & Contracts (IC3) 2 Cryptocurrency Mania Market cap as of yesterday:
More informationIntroduction to Bitcoin I
Introduction to Bitcoin I P Peterlongo 1 A Tomasi 1 1 University of Trento Department of Mathematics June 10, 2013 Outline 1 Fiat and online payments Functions of Online payments and cost of clearing 2
More informationEthereum. Campbell R. Harvey* Duke University and NBER. Ashwin Ramachandran Duke University. Brent Xu ConsenSys. Innovation and Cryptoventures
Innovation and Cryptoventures Ethereum Campbell R. Harvey* Duke University and NBER Ashwin Ramachandran Duke University Brent Xu ConsenSys February 12, 2018 1 2 Overview Ethereum Basics Under the hood
More informationarxiv: v1 [cs.cr] 30 Jul 2018
Parsec: A State Channel for the Internet of Value Amit Kumar Jaiswal [0000 0001 8848 7041] University of Bedfordshire, Luton, UK amitkumar.jaiswal@beds.ac.uk, arxiv:1807.11378v1 [cs.cr] 30 Jul 2018 Abstract.
More informationAdministration Naive DBMS CMPT 454 Topics. John Edgar 2
Administration Naive DBMS CMPT 454 Topics John Edgar 2 http://www.cs.sfu.ca/coursecentral/454/johnwill/ John Edgar 4 Assignments 25% Midterm exam in class 20% Final exam 55% John Edgar 5 A database stores
More informationTURING COMPLETE BITCOIN SCRIPT. White Paper CRAIG WRIGHT, NCHAIN. Electronic copy available at:
TURING COMPLETE BITCOIN SCRIPT White Paper CRAIG WRIGHT, NCHAIN Electronic copy available at: https://ssrn.com/abstract=3160279 Contents Executive Summary... 2 Functional Specification... 3 Technical Specification...
More informationR3C3: Cryptographically secure Censorship Resistant Rendezvous using Cryptocurrencies
R3C3: Cryptographically secure Censorship Resistant Rendezvous using Cryptocurrencies Mohsen Minaei Pedro Moreno-Sanchez Aniket Kate Purdue University {mohsen, pmorenos, aniket}@purdue.edu Revision: May
More informationSpaceMint Overcoming Bitcoin s waste of energy
Bitcoin Overcoming Bitcoin s waste of energy Georg Fuchsbauer joint work with S Park, A Kwon, K Pietrzak, J Alwen and P Gaži Digital currency Decentralized (no bank issuing coins) Pseudonymous Controled
More informationSimple Password-Hardened Encryption Services
Simple Password-Hardened Encryption Services Russell W. F. Lai 1, Christoph Egger 1, Manuel Reinert 2, Sherman S. M. Chow 3, Matteo Maffei 4, and Dominique Schröder 1 1 Friedrich-Alexander University Erlangen-Nuremberg
More informationCS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University
CS 4770: Cryptography CS 6750: Cryptography and Communication Security Alina Oprea Associate Professor, CCIS Northeastern University March 30 2017 Outline Digital currencies Advantages over paper cash
More informationAn analysis of the applicability of blockchain to secure IP addresses allocation, delegation and bindings draft-paillisse-sidrops-blockchain-01
An analysis of the applicability of blockchain to secure IP addresses allocation, delegation and bindings draft-paillisse-sidrops-blockchain-01 OPSEC - IETF 101 - London March 2018 Jordi Paillissé, Albert
More informationHow Formal Analysis and Verification Add Security to Blockchain-based Systems
Verification Add Security to Blockchain-based Systems January 26, 2017 (MIT Media Lab) Pindar Wong (VeriFi Ltd.) 2 Outline of this talk Security Definition of Blockchain-based system Technology and Security
More informationScriptless Scripts. Scriptless Scripts. Andrew Poelstra. March 4, 2017
Scriptless Scripts Andrew Poelstra grindelwald@wpsoftware.net March 4, 2017 Introduction Scriptless Scripts? Scriptless scripts: magicking digital signatures so that they can only be created by faithful
More informationVisualizing and Tracing Bitcoin Transactions
Visualizing and Tracing Bitcoin Transactions Matthew Consterdine & Dennis Parchkov & Altay Adademir Abstract This project demonstrates the ability to visualize, and trace transactions through the Bitcoin
More informationThe Technology behind Smart Contracts
The Technology behind Smart Contracts Florian Glaser, Chair of E-Finance, Information Systems Department Goethe University 01.09.2016 > Agenda Transactions in detail
More informationLEOcoin Private Chat wallet FAQ V 1
LEOcoin Private Chat wallet F V 1 Staking. With the old LEOcoin wallet, I was staking twice a day and getting my rewards within the hour. New wallet says staking opportunities will be every 30 days. Do
More informationSOME OF THE PROBLEMS IN BLOCKCHAIN TODAY
BLOCKCHAIN EVOLVED THE PROBLEM SOME OF THE PROBLEMS IN BLOCKCHAIN TODAY An overall lack of governance is one of the most challenging facets of current blockchain ecosystems Controversy regarding scalability
More informationMicropayments, Now! Probabilistic Micropayments in Bitcoin
Micropayments, Now! Probabilistic Micropayments in Bitcoin Jeremy Rubin November 26, 2015 In this paper, I introduce a probabilistic micropayments scheme which works without any modification to the Bitcoin
More informationCatena: Efficient Non-equivocation via Bitcoin
Catena: Efficient Non-equivocation via Bitcoin Alin Tomescu MIT CSAIL Srinivas Devadas MIT CSAIL Abstract We present Catena, an efficiently-verifiable Bitcoin witnessing scheme. Catena enables any number
More informationICO Review: Raiden Network (RDN)
ICO Review: Raiden Network (RDN) Scalable Transfers for Ethereum October 10, 2017 What is Raiden Network? Raiden is an payment network built on top of the Ethereum network. PAYMENT CHANNEL NETWORK It aims
More informationPERUN: Virtual Payment Hubs over Cryptographic Currencies
PERUN: Virtual Payment Hubs over Cryptographic Currencies Stefan Dziembowski University of Warsaw Lisa Eckey TU Darmstadt Sebastian Faust TU Darmstadt Daniel Malinowski University of Warsaw Abstract Payment
More informationConsensus & Blockchain
Consensus & Blockchain S P Suresh Chennai Mathematical Institute Formal Methods Update Meeting IIT Mandi July 17, 2017 The Bitcoin revolution is upon us What is Bitcoin? Bitcoin: an exciting new currency
More informationAnupam Datta CMU. Fall 2015
Anupam Datta CMU Fall 2015 A rational reconstruction of Bitcoin 1. Start with straw man design 2. Identify weaknesses 3. Augment design and iterate Alice: I, Alice, am giving Bob one coin Alice digitally
More informationCS 347 Parallel and Distributed Data Processing
CS 347 Parallel and Distributed Data Processing Spring 2016 Notes 5: Concurrency Control Topics Data Database design Queries Decomposition Localization Optimization Transactions Concurrency control Reliability
More informationInterledger. Internetworking for Money. Evan Schwartz Engineer at Ripple Co-Inventor of Interledger
Interledger Internetworking for Money Evan Schwartz Engineer at Ripple Co-Inventor of Interledger Payments are broken. Accepting Payments in a Turkish Starbucks Accepting Payments OnlinePayments Online
More informationIntroduc)on to Bitcoin
Introduc)on to Bitcoin CONTENTS What is Bitcoin Who created it? Who prints it? How does Bitcoin work? The characteris5cs of Bitcoin WHAT IS BITCOIN Bitcoin is a form of digital currency, created and held
More informationResource-Efficient Mining (REM) with Proofs of Useful Work (PoUW)
Resource-Efficient Mining (REM) with Proofs of Useful Work (PoUW) Ittay Eyal Technion, EE and IC3 with Fan Zhang, Robert Escriva. Ari Juels, and Robbert van Renesse Workshop on Blockchain Technology and
More informationPublic Chain for Digital Asset Escrow
Public Chain for Digital Asset Escrow Decentralized PayPal Whitepaper 2018/03 v3 https://themis.network 1. OVERVIEW... 1 2. FAIR EXCHANGE IN DIGITAL COMMERCE... 4 2.1 TRANSACTIONS BETWEEN DIFFERENT DIGITAL
More informationTechnical Analysis of Established Blockchain Systems
Technical Analysis of Established Blockchain Systems Florian Haffke, 20.11.2017, Munich Chair of Software Engineering for Business Information Systems (sebis) Faculty of Informatics Technische Universität
More informationIndistinguishable Proofs of Work or Knowledge
Indistinguishable Proofs of Work or Knowledge Foteini Baldimtsi, Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang ASIACRYPT 2016 8th December, Hanoi, Vietnam Motivation (ZK) Proofs of Knowledge - PoK
More informationTransaction Fee Reduction in Coinblesk. Sebastian Stephan Baden, Switzerland Student ID:
MASTER THESIS Communication Systems Group, Prof. Dr. Burkhard Stiller Transaction Fee Reduction in Coinblesk Sebastian Stephan Baden, Switzerland Student ID: 08-731-465 Supervisor: Thomas Bocek Date of
More informationDeveloping Blockchain Software
Developing Blockchain Software David Schwartz, Chief Cryptographer CPPCON: September 22, 2016 1 About Me David Schwartz Chief Cryptographer at Ripple One of the original architects of the Ripple Consensus
More information