BLOCKCHAIN The foundation behind Bitcoin

Size: px
Start display at page:

Download "BLOCKCHAIN The foundation behind Bitcoin"

Transcription

1 BLOCKCHAIN The foundation behind Bitcoin Sourav Sen Gupta Indian Statistical Institute, Kolkata

2 CRYPTOGRAPHY Backbone of Blockchain Technology

3 Component 1 : Cryptographic Hash Functions

4 HASH FUNCTIONS Map variable-length input to constant-length output. x h y

5 HASH FUNCTIONS Finding the pre-image of a given output is not easy.? h y

6 HASH FUNCTIONS Finding a colliding twin of a given input is not easy x1 x2 h y

7 HASH FUNCTIONS Finding any colliding pair of inputs is not easy x1 x2 h y It is of course possible, but not easy.

8 HASH FUNCTIONS Minor input-mismatch to major output-mismatch x1 y h x2 y

9 CONSTRUCTIONS m1 m2 mn IV f f f h Merkle-Damgard Construction Example : SHA 256 used in Bitcoin

10 CONSTRUCTIONS m1 m2 mn h1 r c f f f f Sponge Construction Example : SHA 3 used in Ethereum

11 APPLICATIONS r x h y commit(x) : c = h(r x) verify(c,r,x) : h(r x) == c Provably secure scheme for Commitment Random nonce r must have a high min-entropy for this scheme to be secure.

12 APPLICATIONS x h y record(x) : c = h(x) verify(c,x) : h(x) == c Provably secure scheme for tamper-detection

13 DATA STRUCTURES data h addr(data) hash(data) Hash Pointer Tamper-evident data pointer = Hash Pointer

14 DATA STRUCTURES data data HP(block) timestamp Block h HP(block) timestamp Block Tamper-evident linked data structure = Block

15 DATA STRUCTURES data data data data data HP(block) HP(block) HP(block) HP(block) HP(block) timestamp timestamp timestamp timestamp timestamp Block Block Block Block Block Tamper-evident linked-list = Blockchain

16 DATA STRUCTURES data data data data data HP(block) HP(block) HP(block) HP(block) HP(block) timestamp timestamp timestamp timestamp timestamp Block Block Block Block Block data data data data data HP(block) HP(block) HP(block) HP(block) HP(block) timestamp timestamp timestamp timestamp timestamp Block Block Block Block Block Tamper-evident linked-list = Blockchain

17 DATA STRUCTURES HP(root) data HP(left) HP(right) data timestamp Node data HP(left) HP(right) HP(left) HP(right) timestamp timestamp Node data Node data HP(left) HP(right) HP(left) HP(right) timestamp Node timestamp Node Tamper-evident binary-tree = Merkle Tree

18 DATA STRUCTURES HP(root) data HP(left) HP(right) data timestamp Node data HP(left) HP(right) HP(left) HP(right) timestamp timestamp Node data Node data HP(left) HP(right) HP(left) HP(right) timestamp Node timestamp Node Tamper-evident binary-tree = Merkle Tree

19 DATA STRUCTURES Properties Blockchain Merkle Tree Merkle Trie Size of Commitment O(1) O(1) O(1) Append a Block/Node O(1) O(log n) O(k) Update a Block/Node O(n) O(log n) O(k) Proof of Membership O(n) O(log n) O(k) Structural Abstraction List of Objects Set of Objects Set of (key, value) Used for Construction Bitcoin Bitcoin Ethereum

20 QUESTIONS Can any pointer-based data structure be efficiently converted into a Hash-Pointer based data structure? Will such an exercise be at all useful in any use case? Do these structures provide any additional advantage?

21 Component 2 : Digital Signature Schemes

22 DIGITAL SIGNATURE? s = sign(sk,m) sk keygen(n) pk verify(pk,m,s) Digital signature as a set of three algorithms

23 DIGITAL SIGNATURE? s = sign(sk,m) sk keygen(n) pk verify(pk,m,s) (sk, pk) = keygen(n) verify(pk,m,sign(sk,m)) = True

24 DIGITAL SIGNATURE? s = sign(sk,m) sk keygen(n) pk verify(pk,m,s) Given pk and access to sign(mi) as an oracle, an adversary should not be able to create a valid fresh message-signature pair (m,s)

25 CONSTRUCTION Q Fp Elliptic Curve Digital Signature Algorithm (ECDSA) ECDSA on curve E(Fp) : { (x,y) in Fp x Fp y 2 = x } with base prime p =

26 CONSTRUCTION Elliptic Curve group of size E(Fp) = q ~ p ~ Parameters Format Range Bit-size sk random Zq 256 pk sk x G E(Fp) 512 m hash(m) Zq 256 Signature (r, s) Zq x Zq 512 ECDSA on curve E(Fp) : { (x,y) in Fp x Fp y 2 = x } with base prime p =

27 APPLICATION pk sk sk? sk verify(pk,m,sign(sk,m)) Publish the public key pk as your Identity Use the secret key sk to prove your identity

28 BITCOIN Blockchain in Practice

29 BITCOIN Ledger of Transactions between Pseudonymous Identities Semi-Decentralised Publicly-Verifiable Tamper-Resistant Eventually-Consistent

30 NOT BITCOIN Economic Transaction that we are familiar with Tx

31 NOT BITCOIN Tx Centralised Account-based Ledger

32 NOT BITCOIN Tx Decentralised Account-based Ledger

33 NOT BITCOIN YET Tx Tx Tx Tx Tx Tx Tx Tx Decentralised Transaction-based Ledger

34 TRANSACTION Tx Tx Signed by Network verifies the Signature

35 TRANSACTION Tx pk Tx pk Signed by sk Network verifies the Signature

36 TRANSACTION Input : Array of previous Transactions Output : Array of recipient Addresses pk1 Tx R1 pk Sender(s) pk2 Tx pk3 Tx sk1 Tx sk2 sk3 R2 R3 pk pk Recipient(s) Network verifies the Signature(s)

37 TRANSACTION Input : Array of previous Transactions Output : Array of recipient Addresses Input Transactions pk1 Tx pk2 Tx pk3 Tx R1 pk sk1 Tx pk R2 sk2 sk3 R3 pk Recipients Signatures Network verifies the Signature(s)

38 Metadata TRANSACTION Input(s) Output(s) Data obtained from blockchain.info

39 LEDGER Tx Tx Tx Tx Tx Tx Tx Tx Tx Tx Tx Tx Tx Tx Tx Tx Tx Tx Tx Tx Decentralised Transaction-based Ledger

40 BLOCK Data obtained from blockchain.info

41 BLOCK Data obtained from blockchain.info

42 BLOCK Data obtained from blockchain.info

43 BLOCK Data obtained from blockchain.info

44 BLOCK Data obtained from blockchain.info

45 BITCOIN Tx Tx Tx Tx Transaction Mining

46 MINING Tx Tx Tx Tx Transaction Computational Lottery (Puzzle) Find r such that hash(r m) < C Existing blocks at a given time Winner writes the next block

47 MINING Data obtained from blockchain.info

48 MINING Data obtained from blockchain.info

49 MINING Data obtained from blockchain.info

50 MINING Data obtained from blockchain.info

51 MINING Data obtained from blockchain.info

52 BITCOIN Tx Tx Tx Tx Transaction Mining

53 BITCOIN Framework Decentralised peer-to-peer collaborative network Goal : All peers should agree on a sequence of transactions

54 BITCOIN Publicly-Verifiable as the complete ledger and the hash function is public

55 BITCOIN Tamper-Evident / Tamper-Resistant as the ledger is connected through a chain of hash pointers X X X X X X X

56 BITCOIN Eventually-Consistent as the longest chain eventually sustains as the main chain

57 BITCOIN Data obtained from blockchain.info

58 BITCOIN Data obtained from blockchain.info

59 BITCOIN Data obtained from blockchain.info

60 BITCOIN Semi-Decentralised as the mining is dominated by computational power

61 BITCOIN Data obtained from blockchain.info

62 BITCOIN Data obtained from blockchain.info

63 Robin Yao (BW), Wang Chun (F2Pool), Marshall Long (FinalHash), Pan Zhibiao (Bitmain) Liu Xiang Fu (Avalon), Sam Cole (KnCMiner) and Alex Petrov (BitFury)

64 BITCOIN Semi-Decentralised Tamper-Resistant Publicly-Verifiable Eventually-Consistent

65 ECONOMICS The success story of Bitcoin

66 BITCOIN Data obtained from blockchain.info

67 BITCOIN Data obtained from blockchain.info

68 BITCOIN Data obtained from blockchain.info

69 BITCOIN Data obtained from blockchain.info

70 BITCOIN Data obtained from blockchain.info

71 BITCOIN Data obtained from blockchain.info

72 SECURITY The threat from Bitcoin

73 BITCOIN Transactions : Completely transparent and public Identities : Opaque and pseudonymous addresses ~ 170 Million bitcoin addresses ~ 150 Million bitcoin transactions ~ 80 GB of compressed raw data ~ 80% of transactions have < 2 inputs ~ 90% of transactions have < 3 outputs

74 BITCOIN

75 BITCOIN Identities : Opaque and pseudonymous addresses Anyone can create arbitrarily many identities All identities look the same on the network ~ 170 Million bitcoin addresses ~ 150 Million bitcoin transactions Provides anonymity of Bitcoin transactions.

76 BITCOIN Data obtained from blockchain.info

77 BITCOIN Data obtained from blockchain.info

78 BITCOIN Data obtained from blockchain.info

79 Dark Marketplaces to buy-and-sell Drugs

80 Dark Marketplaces to buy-and-sell Guns and Fake ID

81 BITCOIN Identities : Opaque and pseudonymous addresses Anyone can create arbitrarily many identities All identities look the same on the network ~ 170 Million bitcoin addresses ~ 150 Million bitcoin transactions Is it still possible to trace transactions and identities?

82 DE-ANONYMIZATION Potential solution to the threat from Anonymity

83 TRANSACTION S1 R1 S2 Tx R2 Sn Rm

84 EXAMPLE #1 1FLa9NcXJPA2XvF34LRuB4zbXX4Ws32dpL S1 Tx R1 18rdKmjrg1EawxgiVT3ikLExj6GWS2MNCk Note : Single recipient with an exact match of input to output highly unlikely.

85 EXAMPLE #2 1Ao6mKMEXxCVNVAuGjfLXZ3Zf43hd3yAEq S1 Tx R1 1H3bY2Cv1pmn8ffTdyeRvZAUjNJC1giQHm R2 16pDB5bvoqRGvoH32GaJLfsEcaMc2T9xDr Note : Nice complete denomination along with a random change.

86 EXAMPLE #3 1PXzMrz8KBNEkTt3Wnuqy4axiWszbyQKyE S1 Tx R1 19onWuLmjXGVfc7oUAEVuy9Yd3jxqhsUbK R2 1AASWBCGveXH6H5yTCZW2x7uZrawDiqp4U Note : BTC = 6.50 USD at the time of transaction.

87 EXAMPLE #4 19SZcQ2CzJacQZE9rYwQjsfcBKMWDNwBWD S1 Tx R1 1PLjv1VzGEKxtM2FnRzg2FmDjen9trUBrh 13Zjnzx8VxtLUEiYcrVXKp5sLucLMvBqaG S2 Note : Two arbitrary inputs exactly match up to a desired output highly unlikely.

88 EXAMPLE # USD 4.10 USD 1Djvb34FNpNXtrbbjaQeERZf68cyUdWyzd S1 Tx R1 1AffmSG4tcNRjcgTWTnS6TM3cWPeeA9EVd 17atn5sagYRBUvzgFLd9bUjWF4yStkdokW S2 R2 1Nq612zwhEZDBNz2AeWKZxD6LvwiLm6cQU 6.03 USD 7.95 USD Note : Two input transactions coupled for a payment plus some random change.

89 CLUSTERING 1PXzMrz8KBNEkTt3Wnuqy4axiWszbyQKyE 1Djvb34FNpNXtrbbjaQeERZf68cyUdWyzd 1FLa9NcXJPA2XvF34LRuB4zbXX4Ws32dpL 17atn5sagYRBUvzgFLd9bUjWF4yStkdokW 19onWuLmjXGVfc7oUAEVuy9Yd3jxqhsUbK 1AASWBCGveXH6H5yTCZW2x7uZrawDiqp4U 1AffmSG4tcNRjcgTWTnS6TM3cWPeeA9EVd 18rdKmjrg1EawxgiVT3ikLExj6GWS2MNCk 1Ao6mKMEXxCVNVAuGjfLXZ3Zf43hd3yAEq 19SZcQ2CzJacQZE9rYwQjsfcBKMWDNwBWD 13Zjnzx8VxtLUEiYcrVXKp5sLucLMvBqaG 16pDB5bvoqRGvoH32GaJLfsEcaMc2T9xDr 1H3bY2Cv1pmn8ffTdyeRvZAUjNJC1giQHm 1PLjv1VzGEKxtM2FnRzg2FmDjen9trUBrh 1Nq612zwhEZDBNz2AeWKZxD6LvwiLm6cQU

90 IDENTIFICATION 1PXzMrz8KBNEkTt3Wnuqy4axiWszbyQKyE 1Djvb34FNpNXtrbbjaQeERZf68cyUdWyzd 1FLa9NcXJPA2XvF34LRuB4zbXX4Ws32dpL 17atn5sagYRBUvzgFLd9bUjWF4yStkdokW 19onWuLmjXGVfc7oUAEVuy9Yd3jxqhsUbK 1AASWBCGveXH6H5yTCZW2x7uZrawDiqp4U 1AffmSG4tcNRjcgTWTnS6TM3cWPeeA9EVd 18rdKmjrg1EawxgiVT3ikLExj6GWS2MNCk 1Ao6mKMEXxCVNVAuGjfLXZ3Zf43hd3yAEq 19SZcQ2CzJacQZE9rYwQjsfcBKMWDNwBWD 13Zjnzx8VxtLUEiYcrVXKp5sLucLMvBqaG 16pDB5bvoqRGvoH32GaJLfsEcaMc2T9xDr 1H3bY2Cv1pmn8ffTdyeRvZAUjNJC1giQHm 1PLjv1VzGEKxtM2FnRzg2FmDjen9trUBrh 1Nq612zwhEZDBNz2AeWKZxD6LvwiLm6cQU

91 CLUSTERING The Unreasonable Effectiveness of Address Clustering Harrigan and Fretter, May 2016

92 DE-ANONYMIZATION Passive : Analytics on 80 GB of Bitcoin blockchain data Clustering of Bitcoin Addresses with suitable definition of Metrics Identification of the Clusters using known and/or leaked Addresses Active : Injecting and tracking marked Bitcoin transactions Registering on Dark Marketplaces, Exchanges, and Mining Pools Using Addresses leaked from all these sources for Identification Elliptic ( does something similar in the UK. We should try to build our own tool for de-anonymization.

93 BLOCKCHAIN Versatile Toolkit for Protocols

94 TRANSACTION Input : Array of previous Transactions Output : Array of recipient Addresses Input Transactions pk1 Tx pk2 Tx pk3 Tx R1 pk sk1 Tx pk R2 sk2 sk3 R3 pk Recipients Signatures Network verifies the Signature(s)

95 Metadata TRANSACTION Input(s) Output(s) Data obtained from blockchain.info

96 BITCOIN SCRIPT Data obtained from blockchain.info

97 POTENTIAL With a powerful Scripting Language

98 Developing Smart Contracts on Blockchain

99 Smart Contracts BitShares Ripple BitGold Zcash ADePT Proof of Existence OneName Factom Retricoin Namecoin Proof of Space OpenBazaar Smart Properties BigchainDB BitHealth ZeroCoin Bitcoin-NG Proof of Commitment RSCoin Ethereum SpaceMint Proof of Stake BitNation GHOST Perma-Coin Proof of Retrievability

100 Bitcoin is an idea with disruptive ramifications. Thank you for listening!

BLOCKCHAIN The foundation behind Bitcoin

BLOCKCHAIN The foundation behind Bitcoin BLOCKCHAIN The foundation behind Bitcoin Sourav Sen Gupta Indian Statistical Institute, Kolkata CRYPTOGRAPHY Backbone of Blockchain Technology Component 1 : Cryptographic Hash Functions HASH FUNCTIONS

More information

ENEE 457: E-Cash and Bitcoin

ENEE 457: E-Cash and Bitcoin ENEE 457: E-Cash and Bitcoin Charalampos (Babis) Papamanthou cpap@umd.edu Money today Any problems? Cash is cumbersome and can be forged Credit card transactions require centralized online bank are not

More information

Computer Security. 14. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2019

Computer Security. 14. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2019 Computer Security 14. Blockchain & Bitcoin Paul Krzyzanowski Rutgers University Spring 2019 April 15, 2019 CS 419 2019 Paul Krzyzanowski 1 Bitcoin & Blockchain Bitcoin cryptocurrency system Introduced

More information

Smalltalk 3/30/15. The Mathematics of Bitcoin Brian Heinold

Smalltalk 3/30/15. The Mathematics of Bitcoin Brian Heinold Smalltalk 3/30/15 The Mathematics of Bitcoin Brian Heinold What is Bitcoin? Created by Satoshi Nakamoto in 2008 What is Bitcoin? Created by Satoshi Nakamoto in 2008 Digital currency (though not the first)

More information

Cryptography and Cryptocurrencies. Intro to Cryptography and Cryptocurrencies

Cryptography and Cryptocurrencies. Intro to Cryptography and Cryptocurrencies Intro to Cryptographic Hash Functions Hash Pointers and Data Structures Block Chains Merkle Trees Digital Signatures Public Keys and Identities Let s design us some Digital Cash! Intro to Cryptographic

More information

Bitcoin, a decentralized and trustless protocol

Bitcoin, a decentralized and trustless protocol Bitcoin, a decentralized and trustless protocol Thomas Sibut-Pinote Inria Saclay February 12, 2015 Thomas Sibut-Pinote Bitcoin, a decentralized and trustless protocol 1 / 42 Introduction Questions 1 Introduction

More information

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University CS 4770: Cryptography CS 6750: Cryptography and Communication Security Alina Oprea Associate Professor, CCIS Northeastern University March 30 2017 Outline Digital currencies Advantages over paper cash

More information

Blockchain, Cryptocurrency, Smart Contracts and Initial Coin Offerings: A Technical Perspective

Blockchain, Cryptocurrency, Smart Contracts and Initial Coin Offerings: A Technical Perspective SESSION ID: LAB3-R09 Blockchain, Cryptocurrency, Smart Contracts and Initial Coin Offerings: A Technical Perspective Tom Plunkett Consulting Solutions Director Oracle Captain Brittany Snelgrove United

More information

Bitcoin (Part I) Ken Calvert Keeping Current Seminar 22 January Keeping Current 1

Bitcoin (Part I) Ken Calvert Keeping Current Seminar 22 January Keeping Current 1 Bitcoin (Part I) Ken Calvert Keeping Current Seminar 22 January 2014 2014.01.22 Keeping Current 1 Questions What problem is Bitcoin solving? Where did it come from? How does the system work? What makes

More information

Bitcoin and Blockchain

Bitcoin and Blockchain Bitcoin and Blockchain COS 418: Distributed Systems Lecture 18 Zhenyu Song [Credit: Selected content adapted from Michael Freedman. Slides refined by Chris Hodsdon and Theano Stavrinos] Why Bitcoin? All

More information

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University CS 4770: Cryptography CS 6750: Cryptography and Communication Security Alina Oprea Associate Professor, CCIS Northeastern University April 9 2018 Schedule HW 4 Due on Thu 04/12 Programming project 3 Due

More information

Blockchains & Cryptocurrencies

Blockchains & Cryptocurrencies 1 Blockchains & Cryptocurrencies A Technical Introduction Lorenz Breidenbach ETH Zürich Cornell Tech The Initiative for CryptoCurrencies & Contracts (IC3) 2 Cryptocurrency Mania Market cap as of yesterday:

More information

Problem: Equivocation!

Problem: Equivocation! Bitcoin: 10,000 foot view Bitcoin and the Blockchain New bitcoins are created every ~10 min, owned by miner (more on this later) Thereafter, just keep record of transfers e.g., Alice pays Bob 1 BTC COS

More information

Blockchain. CS 240: Computing Systems and Concurrency Lecture 20. Marco Canini

Blockchain. CS 240: Computing Systems and Concurrency Lecture 20. Marco Canini Blockchain CS 240: Computing Systems and Concurrency Lecture 20 Marco Canini Credits: Michael Freedman and Kyle Jamieson developed much of the original material. Bitcoin: 10,000 foot view New bitcoins

More information

ICS 421 & ICS 690. Bitcoin & Blockchain. Assoc. Prof. Lipyeow Lim Information & Computer Sciences Department University of Hawai`i at Mānoa

ICS 421 & ICS 690. Bitcoin & Blockchain. Assoc. Prof. Lipyeow Lim Information & Computer Sciences Department University of Hawai`i at Mānoa ICS 421 & ICS 690 Bitcoin & Blockchain Assoc. Prof. Lipyeow Lim Information & Computer Sciences Department University of Hawai`i at Mānoa Accepted by: Overstock.com Expedia.com Newegg.com Tigerdirect.com

More information

Lecture 9. Anonymity in Cryptocurrencies

Lecture 9. Anonymity in Cryptocurrencies Lecture 9 Anonymity in Cryptocurrencies Some say Bitcoin provides anonymity Bitcoin is a secure and anonymous digital currency WikiLeaks donations page Others say it doesn t Bitcoin won't hide you from

More information

Distributed Algorithms Bitcoin

Distributed Algorithms Bitcoin Distributed Algorithms Bitcoin Alberto Montresor Università di Trento 2018/12/18 Acknowledgment: Joseph Bonneau, Ed Felten, Arvind Narayanan This work is licensed under a Creative Commons Attribution-ShareAlike

More information

Alternatives to Blockchains. Sarah Meiklejohn (University College London)

Alternatives to Blockchains. Sarah Meiklejohn (University College London) Alternatives to Blockchains Sarah Meiklejohn (University College London) fully decentralized cryptocurrencies 2 fully decentralized cryptocurrencies tx tx(addra addrb) 2 fully decentralized cryptocurrencies

More information

The power of Blockchain: Smart Contracts. Foteini Baldimtsi

The power of Blockchain: Smart Contracts. Foteini Baldimtsi The power of Blockchain: Smart Contracts Foteini Baldimtsi The Blockchain at the heart of a cryptocurrency Alice sends 2 John sends 1 Dave sends 5 to Bob to Eve to Alice Bob sends 1 Eve sends 4 to Dave

More information

Bitcoin (and why it uses SO much energy)

Bitcoin (and why it uses SO much energy) Bitcoin (and why it uses SO much energy) David Malone Hamilton Institute / Dept Maths&Stats Maynooth University. 2018-11-08 Bitcoin Background Bitcoin is a cryptocurrency that started around 2008 2009.

More information

About cryptocurrencies and blockchains part 1. Jyväskylä 17th of April 2018 Henri Heinonen

About cryptocurrencies and blockchains part 1. Jyväskylä 17th of April 2018 Henri Heinonen About cryptocurrencies and blockchains part 1 Jyväskylä 17th of April 2018 Henri Heinonen (henri.t.heinonen@jyu.fi) What is a blockchain? BitTorrent is a famous example of a peer-to-peer network (P2P)

More information

Introduction to Bitcoin I

Introduction to Bitcoin I Introduction to Bitcoin I P Peterlongo 1 A Tomasi 1 1 University of Trento Department of Mathematics June 10, 2013 Outline 1 Fiat and online payments Functions of Online payments and cost of clearing 2

More information

Bitcoin Mining. A high-level technical introduction. Konstantinos Karasavvas

Bitcoin Mining. A high-level technical introduction. Konstantinos Karasavvas Bitcoin Mining A high-level technical introduction Konstantinos Karasavvas Outline PoW / Hashcash Transaction propagation Block mining Block propagation Mining Profitability Proof of Work From wikipedia:

More information

Who wants to be a millionaire? A class in creating your own cryptocurrency

Who wants to be a millionaire? A class in creating your own cryptocurrency DEVNET-3626 Who wants to be a millionaire? A class in creating your own cryptocurrency Tom Davies, Sr. Manager, DevNet Sandbox Vallard Benincosa, Software Engineer Cisco Spark How Questions? Use Cisco

More information

Blockchain (a.k.a. the slowest, most fascinating database you ll ever see)

Blockchain (a.k.a. the slowest, most fascinating database you ll ever see) Blockchain (a.k.a. the slowest, most fascinating database you ll ever see) GOTO Amsterdam 13 June, 2017 Stefan Tilkov, @stilkov I don t know Blockchain and so can you 1. Bitcoin > Practical application

More information

Key concepts of blockchain

Key concepts of blockchain Advisory A brief history of blockchains 2008 The mysterious Satoshi Nakamoto publishes his Bitcoin white paper 2014 2017 Nov. 23 rd Ethereum crowd sale Number of crypto tokens: 1.172 BTC $8.216 The first

More information

Lecture 6. Mechanics of Bitcoin

Lecture 6. Mechanics of Bitcoin Lecture 6 Mechanics of Bitcoin Bitcoin transactions time An account-based ledger (not Bitcoin) Create 25 coins and credit to Alice ASSERTED BY MINERS SIMPLIFICATION: only one transaction per block time

More information

DEV. Deviant Coin, Innovative Anonymity. A PoS/Masternode cr yptocurrency developed with POS proof of stake.

DEV. Deviant Coin, Innovative Anonymity. A PoS/Masternode cr yptocurrency developed with POS proof of stake. DEV Deviant Coin, Innovative Anonymity A PoS/Masternode cr yptocurrency developed with POS proof of stake. CONTENTS 03 Overview 06 Pre-mine phase 07 Privacy 08 Basic parameters 09 Proof-of-stake The benefits

More information

Technical Analysis of Established Blockchain Systems

Technical Analysis of Established Blockchain Systems Technical Analysis of Established Blockchain Systems Florian Haffke, 20.11.2017, Munich Chair of Software Engineering for Business Information Systems (sebis) Faculty of Informatics Technische Universität

More information

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Elli Androulaki Staff member, IBM Research, Zurich Workshop on cryptocurrencies Athens, 06.03.2016 Blockchain systems

More information

SpaceMint Overcoming Bitcoin s waste of energy

SpaceMint Overcoming Bitcoin s waste of energy Bitcoin Overcoming Bitcoin s waste of energy Georg Fuchsbauer joint work with S Park, A Kwon, K Pietrzak, J Alwen and P Gaži Digital currency Decentralized (no bank issuing coins) Pseudonymous Controled

More information

Scriptless Scripts. Scriptless Scripts. Andrew Poelstra. March 4, 2017

Scriptless Scripts. Scriptless Scripts. Andrew Poelstra. March 4, 2017 Scriptless Scripts Andrew Poelstra grindelwald@wpsoftware.net March 4, 2017 Introduction Scriptless Scripts? Scriptless scripts: magicking digital signatures so that they can only be created by faithful

More information

Blockchain Certification Protocol (BCP)

Blockchain Certification Protocol (BCP) Blockchain Certification Protocol (BCP) Fu Yong Quah fuyong@fyquah.me www.fyquah.me Abstract. A semi-decentralized certification system built above the existing 1 Bitcoin network, an innovative peer-to-peer

More information

Formally Specifying Blockchain Protocols

Formally Specifying Blockchain Protocols Formally Specifying Blockchain Protocols 1 IOHK company building blockchain applications research focused invested in functional programming built Cardano network, Ada cryptocurrency 2 Blockchain Protocols

More information

Security, Privacy and Interoperability in Payment- Channel Networks

Security, Privacy and Interoperability in Payment- Channel Networks FAKULTÄT FÜR!NFORMATIK Faculty of Informatics & PRIVACY SECURITY GROUP Security, Privacy and Interoperability in Payment- Channel Networks Pedro Moreno-Sanchez (@pedrorechez) Joint work with Giulio Malavolta,

More information

Consensus & Blockchain

Consensus & Blockchain Consensus & Blockchain S P Suresh Chennai Mathematical Institute Formal Methods Update Meeting IIT Mandi July 17, 2017 The Bitcoin revolution is upon us What is Bitcoin? Bitcoin: an exciting new currency

More information

A Perspective on Bitcoin and Blockchain

A Perspective on Bitcoin and Blockchain A Perspective on Bitcoin and Blockchain BART PRENEEL IMEC-COSIC KU LEUVEN BART.PRENEEL(AT)ESAT.KULEUVEN.BE 6 JUNE 2017 1 Currencies = maintaining memory Envelope and contents from Susa, Iran, circa 3300

More information

Bitcoin. CS6450: Distributed Systems Lecture 20 Ryan Stutsman

Bitcoin. CS6450: Distributed Systems Lecture 20 Ryan Stutsman Bitcoin CS6450: Distributed Systems Lecture 20 Ryan Stutsman Material taken/derived from Princeton COS-418 materials created by Michael Freedman and Kyle Jamieson at Princeton University. Licensed for

More information

Blockchain & Distributed Internet Infrastructure

Blockchain & Distributed Internet Infrastructure Blockchain & Distributed Internet Infrastructure Dirk Kutscher NEC Laboratories Europe 1 Purpose of this Meeting Discuss blockchain-based and Distributed Internet Infrastructure concepts, state of the

More information

SmartPool: practical decentralized pool mining. Loi Luu, Yaron Velner, Jason Teutsch, and Prateek Saxena August 18, 2017

SmartPool: practical decentralized pool mining. Loi Luu, Yaron Velner, Jason Teutsch, and Prateek Saxena August 18, 2017 SmartPool: practical decentralized pool mining Loi Luu, Yaron Velner, Jason Teutsch, and Prateek Saxena August 18, 2017 Mining pools Miners role in cryptocurrencies Definition: A cryptocurrency is a decentralized

More information

ECC: Peer-to-Peer Electronic Cash with Trustless Network Services

ECC: Peer-to-Peer Electronic Cash with Trustless Network Services ECC: Peer-to-Peer Electronic Cash with Trustless Network Services Greg Griffith October 2017 (griffith@cryptounited.io) https://www.ecc.network ECC: Peer-to-Peer Electronic Cash with Trustless Network

More information

University of Duisburg-Essen Bismarckstr Duisburg Germany HOW BITCOIN WORKS. Matthäus Wander. June 29, 2011

University of Duisburg-Essen Bismarckstr Duisburg Germany HOW BITCOIN WORKS. Matthäus Wander. June 29, 2011 University of Duisburg-Essen Bismarckstr. 90 47057 Duisburg Germany HOW BITCOIN WORKS June 29, 2011 Overview Electronic currency system Decentralized No trusted third party involved Unstructured peer-to-peer

More information

Unblockable Chains. Is Blockchain the ultimate malicious infrastructure? Omer Zohar

Unblockable Chains. Is Blockchain the ultimate malicious infrastructure? Omer Zohar Unblockable Chains Is Blockchain the ultimate malicious infrastructure? Omer Zohar #WhoAmI Researching malware backbones for the past decade Following blockchain eco-system since 2013 Finally had some

More information

Security Analysis of Bitcoin. Dibyojyoti Mukherjee Jaswant Katragadda Yashwant Gazula

Security Analysis of Bitcoin. Dibyojyoti Mukherjee Jaswant Katragadda Yashwant Gazula Security Analysis of Bitcoin Dibyojyoti Mukherjee Jaswant Katragadda Yashwant Gazula Security Analysis of Bitcoin Introduction How Bitcoin works? Similar peer-to-peer systems Vulnerabilities and solutions

More information

Blockchain Bitcoin & Ethereum

Blockchain Bitcoin & Ethereum Blockchain Bitcoin & Ethereum Pascal.Urien@Telecom-ParisTech.fr Pascal Urien 1 "Bitcoin: A Peer-to-Peer Electronic Cash System." Satoshi Nakamoto In this paper, we propose a solution to the double-spending

More information

Cryptocurrencies for Investigators

Cryptocurrencies for Investigators Cryptocurrencies for Investigators By Nick Furneaux CSITech Ltd Course Description Cryptocurrencies in their many forms, based on the blockchain concept, are here to stay and will increasingly pervade

More information

Design Patterns which Facilitate Message Digest Collision Attacks on Blockchains

Design Patterns which Facilitate Message Digest Collision Attacks on Blockchains Symposium on Distributed Ledger Technology SDLT'2017 Gold Coast Campus, Griffith University June 13, 2017 Design Patterns which Facilitate Message Digest Collision Attacks on Blockchains Peter Robinson,

More information

Overview. CSC 580 Cryptography and Computer Security. Hash Function Basics and Terminology. March 28, Cryptographic Hash Functions (Chapter 11)

Overview. CSC 580 Cryptography and Computer Security. Hash Function Basics and Terminology. March 28, Cryptographic Hash Functions (Chapter 11) CSC 580 Cryptography and Computer Security Cryptographic Hash Functions (Chapter 11) March 28, 2017 Overview Today: Review Homework 8 solutions Discuss cryptographic hash functions Next: Study for quiz

More information

Chapter 13. Digital Cash. Information Security/System Security p. 570/626

Chapter 13. Digital Cash. Information Security/System Security p. 570/626 Chapter 13 Digital Cash Information Security/System Security p. 570/626 Introduction While cash is used in illegal activities such as bribing money laundering tax evasion it also protects privacy: not

More information

Blockchain, cryptography, and consensus

Blockchain, cryptography, and consensus ITU Workshop on Security Aspects of Blockchain (Geneva, Switzerland, 21 March 2017) Blockchain, cryptography, and consensus Dr. Christian Cachin IBM Research - Zurich www.zurich.ibm.com/~cca/ Geneva, Switzerland,

More information

Prelude. The notes within this Whitepaper publication are intended to formally document the concepts and features of the Aegeus cryptocurrency.

Prelude. The notes within this Whitepaper publication are intended to formally document the concepts and features of the Aegeus cryptocurrency. Prelude The notes within this Whitepaper publication are intended to formally document the concepts and features of the Aegeus cryptocurrency. This document will explain methodically, the details of the

More information

The security and insecurity of blockchains and smart contracts

The security and insecurity of blockchains and smart contracts The security and insecurity of blockchains and smart contracts Jean-Pierre Flori, expert in cryptography, Agence Nationale de la Sécurité des Systèmes d Information (ANSSI) In J.P. Dardayrol, editor of

More information

P2P BitCoin: Technical details

P2P BitCoin: Technical details ELT-53206 Peer-to-Peer Networks P2P BitCoin: Technical details Mathieu Devos Tampere University of Technology Department of Electronics & Communications Engineering mathieu.devos@tut.fi TG406 2 Outline

More information

Blockchain & Smart Contracts Introduction. Dr. Sebastian Bürgel

Blockchain & Smart Contracts Introduction. Dr. Sebastian Bürgel Blockchain & Smart Contracts Introduction Dr. Sebastian Bürgel Does the following make sense? State-of-the-Art Trade Finance (2017) http://blog.zuehlke.com/en/how-the-blockchain-can-disrupt-trade-finance/

More information

How Formal Analysis and Verification Add Security to Blockchain-based Systems

How Formal Analysis and Verification Add Security to Blockchain-based Systems Verification Add Security to Blockchain-based Systems January 26, 2017 (MIT Media Lab) Pindar Wong (VeriFi Ltd.) 2 Outline of this talk Security Definition of Blockchain-based system Technology and Security

More information

What is Bitcoin? Consensus technology has the power to do for economics what the internet did for information - Dan Larimer

What is Bitcoin? Consensus technology has the power to do for economics what the internet did for information - Dan Larimer What is Bitcoin? Consensus technology has the power to do for economics what the internet did for information - Dan Larimer Ross Rydman 2014 For Academic Use Only The 30 second description Bitcoin is the

More information

CSC 580 Cryptography and Computer Security

CSC 580 Cryptography and Computer Security CSC 580 Cryptography and Computer Security Cryptographic Hash Functions (Chapter 11) March 22 and 27, 2018 Overview Today: Quiz (based on HW 6) Graded HW 2 due Grad/honors students: Project topic selection

More information

The Blockchain. Josh Vorick

The Blockchain. Josh Vorick The Blockchain Josh Vorick Bitcoin is a currency. Blockchain is a technology. What is a blockchain? A decentralized database that anyone can add to and no one can delete from The Bitcoin blockchain Agenda

More information

Ergo platform. Dmitry Meshkov

Ergo platform. Dmitry Meshkov Ergo platform Dmitry Meshkov Prehistory Motivation Theory Practice Provably secure 1000 currencies New features Ad-hoc solutions Impractical Security issues Motivation Theory Provably secure New features

More information

Keychat: Secure Messaging via Bitcoin. Robert Chen, John Kuszmaul, Yiming Zheng Mentored By Alin Tomescu

Keychat: Secure Messaging via Bitcoin. Robert Chen, John Kuszmaul, Yiming Zheng Mentored By Alin Tomescu Keychat: Secure Messaging via Bitcoin Robert Chen, John Kuszmaul, Yiming Zheng Mentored By Alin Tomescu 1 Motivation We want to secure communications. Alice Bob Sensitive Financial Information Yay, Money!

More information

Privacy based Public Key Infrastructure (PKI) using Smart Contract in Blockchain Technology

Privacy based Public Key Infrastructure (PKI) using Smart Contract in Blockchain Technology 2 nd Advanced Workshop on Blockchain, IIT Bombay Privacy based Public Key Infrastructure (PKI) using Smart Contract in Blockchain Technology Sivakumar.P M.Tech (CSE), Sem-III, NIT Trichy Guide:- Dr Kunwar

More information

Matt Howard and Ajay Patel CIS 556: Cryptography University of Pennsylvania Fall DriveCoin: A Proof of Space Cryptocurrency

Matt Howard and Ajay Patel CIS 556: Cryptography University of Pennsylvania Fall DriveCoin: A Proof of Space Cryptocurrency CIS 556: Cryptography University of Pennsylvania Fall 2015 : A Proof of Space Cryptocurrency Abstract We present an implementation of a cryptocurrency based on the newlytheorized and studied Proof of Space

More information

primechain building blockchains for a better world

primechain building blockchains for a better world primechain building blockchains for a better world The nuts and bolts of blockchain technology Rohas Nagpal, Primechain Technologies Pvt. Ltd. The nuts and bolts of blockchain technology Depending upon

More information

Principals of Blockchain technology - Digital Business Ecosystem Kick of meeting Helsinki

Principals of Blockchain technology - Digital Business Ecosystem Kick of meeting Helsinki Principals of Blockchain technology - Digital Business Ecosystem Kick of meeting 25.2.2016 Helsinki Dr. Kari Korpela, Information Logistics Integration School of Business and Management Lappeenranta University

More information

Secure digital certificates with a blockchain protocol

Secure digital certificates with a blockchain protocol Secure digital certificates with a blockchain protocol Federico Pintore 1 Trento, 10 th February 2017 1 University of Trento Federico Pintore Blockchain and innovative applications Trento, 10 th February

More information

Jan Møller Co-founder, CTO Chainalysis

Jan Møller Co-founder, CTO Chainalysis Jan Møller Co-founder, CTO Chainalysis How Does Bitcoin Actually Work? This talk is not about the poli:cal or economical impact of Bitcoin. This talk is not about how to buy, sell, spend, or secure your

More information

Bitcoin. Arni Par ov. December 17, 2013

Bitcoin. Arni Par ov. December 17, 2013 Bitcoin Arni Par ov December 17, 2013 Abstract Bitcoin is a distributed, peer-to-peer cryptocurrency that functions without any central authority and in recent years has gained large popularity. This paper

More information

Let's build a blockchain!

Let's build a blockchain! I'm Haseeb. That's me. Let's build a blockchain! A mini-cryptocurrency in Ruby I'm Haseeb Qureshi. I'm a software engineer. I'm working at a blockchain company called 21.co. Unless something terrible has

More information

Brown University. Yana Hrytsenko. Final Project: Blockchain for PKI: Using Blockchain data structure for Public Key. Infrastructure.

Brown University. Yana Hrytsenko. Final Project: Blockchain for PKI: Using Blockchain data structure for Public Key. Infrastructure. Brown University Yana Hrytsenko Final Project: Blockchain for PKI: Using Blockchain data structure for Public Key Infrastructure May 2017 1 Blockchain for PKI Using Blockchain data structure for Public

More information

Applied cryptography

Applied cryptography Applied cryptography Electronic Cash Andreas Hülsing 29 November 2016 1 / 61 Classical Cash - Life Cycle Mint produces money (coins / bank notes) Sent to bank User withdraws money (reduces account balance)

More information

International Journal of Computer Engineering and Applications, Volume XIII, Issue II, Feb. 19, ISSN

International Journal of Computer Engineering and Applications, Volume XIII, Issue II, Feb. 19,   ISSN BLOCK-CHAIN: SURVEY ON PRIVACY, SECURITY AND CHALLENGES Monalisha Sinha ABSTRACT: Department of computer science & engineering Birla institute of technology Ranchi, India Blockchain has gained wide attention

More information

Lecture 3. Introduction to Cryptocurrencies

Lecture 3. Introduction to Cryptocurrencies Lecture 3 Introduction to Cryptocurrencies Public Keys as Identities public key := an identity if you see sig such that verify(pk, msg, sig)=true, think of it as: pk says, [msg] to speak for pk, you must

More information

Table of contents. Technical Features. Our approach. Technical Overview. Stage 1 (Using Ethereum blockchain) Participants. Data Owner.

Table of contents. Technical Features. Our approach. Technical Overview. Stage 1 (Using Ethereum blockchain) Participants. Data Owner. Table of contents Technical Features Our approach Technical Overview Stage 1 (Using Ethereum blockchain) Participants Data Owner Data Verifier Marketplace Data Buyer Creditor Data Platform Architecture

More information

An Introduction to Blockchain and Distributed Ledger Technology

An Introduction to Blockchain and Distributed Ledger Technology An Introduction to Blockchain and Distributed Ledger Technology Ron van der Meyden UNSW School of Computer Science and Engineering The source of the buzz Bitcoin: A Peer-to-Peer Electronic Cash System,

More information

Detecting Insider Attacks on Databases using Blockchains

Detecting Insider Attacks on Databases using Blockchains Detecting Insider Attacks on Databases using Blockchains Shubham Sharma, Rahul Gupta, Shubham Sahai Srivastava and Sandeep K. Shukla Department of Computer Science and Engineering Indian Institute of Technology,

More information

BLOCKCHAIN Blockchains and Transactions Part II A Deeper Dive

BLOCKCHAIN Blockchains and Transactions Part II A Deeper Dive BLOCKCHAIN Blockchains and Transactions Part II A Deeper Dive www.blockchaintrainingalliance.com Blockchain Page 3 Blockchain is NOT Bitcoin Page 4 Transactions Page 5 Multi-Signature Addresses An Address

More information

Ensimag - 4MMSR Network Security Student Seminar. Bitcoin: A peer-to-peer Electronic Cash System Satoshi Nakamoto

Ensimag - 4MMSR Network Security Student Seminar. Bitcoin: A peer-to-peer Electronic Cash System Satoshi Nakamoto Ensimag - 4MMSR Network Security Student Seminar Bitcoin: A peer-to-peer Electronic Cash System Satoshi Nakamoto wafa.mbarek@ensimag.fr halima.myesser@ensimag.fr 1 Table of contents: I- Introduction: Classic

More information

CSE 5852, Modern Cryptography: Foundations Fall Lecture 26. pk = (p,g,g x ) y. (p,g,g x ) xr + y Check g xr +y =(g x ) r.

CSE 5852, Modern Cryptography: Foundations Fall Lecture 26. pk = (p,g,g x ) y. (p,g,g x ) xr + y Check g xr +y =(g x ) r. CSE 5852, Modern Cryptography: Foundations Fall 2016 Lecture 26 Prof. enjamin Fuller Scribe: Tham Hoang 1 Last Class Last class we introduce the Schnorr identification scheme [Sch91]. The scheme is to

More information

Cryptocurrency and Blockchain Research

Cryptocurrency and Blockchain Research Cryptocurrency and Blockchain Research CHANATHIP NAMPREMPRE, PH.D. 1 Agenda Recall bitcoin consensus protocol Components of bitcoin consensus protocol Variations on the same theme Beware of snake oil Solution:

More information

Data Consistency and Blockchain. Bei Chun Zhou (BlockChainZ)

Data Consistency and Blockchain. Bei Chun Zhou (BlockChainZ) Data Consistency and Blockchain Bei Chun Zhou (BlockChainZ) beichunz@cn.ibm.com 1 Data Consistency Point-in-time consistency Transaction consistency Application consistency 2 Strong Consistency ACID Atomicity.

More information

Anupam Datta CMU. Fall 2015

Anupam Datta CMU. Fall 2015 Anupam Datta CMU Fall 2015 A rational reconstruction of Bitcoin 1. Start with straw man design 2. Identify weaknesses 3. Augment design and iterate Alice: I, Alice, am giving Bob one coin Alice digitally

More information

Privacy on the Blockchain: Unique Ring Signatures. Rebekah Mercer

Privacy on the Blockchain: Unique Ring Signatures. Rebekah Mercer arxiv:1612.01188v2 [cs.cr] 25 Dec 2016 Privacy on the Blockchain: Unique Ring Signatures. Rebekah Mercer This report is submitted as part requirement for the MSc in Information Security at University College

More information

Ergo platform overview

Ergo platform overview December 2018 Dmitry Meshkov Ergo platform overview Outline Ergo vision Decentralization Survivability Applicability Roadmap 2 Part 1 Ergo vision 3 History Research and Scorex framework development Testnet

More information

The nuts and bolts of blockchain technology

The nuts and bolts of blockchain technology The nuts and bolts of blockchain technology Rohas Nagpal Primechain Technologies Pvt. Ltd. rohas@primechain.in Abstract: Blockchain technology has earned the respect of Governments and banks around the

More information

Biomedical Security. Cipher Block Chaining and Applications

Biomedical Security. Cipher Block Chaining and Applications 1 Biomedical Security Erwin M. Bakker 2 Cipher Block Chaining and Applications Slides and figures are adapted from: W. Stallings, Cryptography and Network Security 4 th Edition and 7 th Edition 1 3 Block

More information

Efficient Data Structures for Tamper-Evident Logging

Efficient Data Structures for Tamper-Evident Logging Efficient Data Structures for Tamper-Evident Logging Scott A. Crosby Dan S. Wallach Rice University Everyone has logs Tamper evident solutions Current commercial solutions Write only hardware appliances

More information

A Review on Blockchain Application for Decentralized Decision of Ownership of IoT Devices

A Review on Blockchain Application for Decentralized Decision of Ownership of IoT Devices Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 10, Number 8 (2017) pp. 2449-2456 Research India Publications http://www.ripublication.com A Review on Blockchain Application for

More information

Crypto tricks: Proof of work, Hash chaining

Crypto tricks: Proof of work, Hash chaining Crypto tricks: Proof of work, Hash chaining CS 161: Computer Security Prof. David Wagner April 13, 2016 A Tangent: How Can I Prove I Am Rich? Math Puzzle Proof of Work Problem. To prove to Bob I m not

More information

Proof of Stake Made Simple with Casper

Proof of Stake Made Simple with Casper Proof of Stake Made Simple with Casper Olivier Moindrot ICME, Stanford University olivierm@stanford.edu Charles Bournhonesque ICME, Stanford University cbournho@stanford.edu Abstract We study the recent

More information

CONSENSUS PROTOCOLS & BLOCKCHAINS. Techruption Lecture March 16 th, 2017 Maarten Everts (TNO & University of Twente)

CONSENSUS PROTOCOLS & BLOCKCHAINS. Techruption Lecture March 16 th, 2017 Maarten Everts (TNO & University of Twente) CONSENSUS PROTOCOLS & BLOCKCHAINS Techruption Lecture March 16 th, 2017 Maarten Everts (TNO & University of Twente) 2 Consensus protocols & blockchain 3 Consensus protocols & blockchain 4 Consensus protocols

More information

Whitepaper Rcoin Global

Whitepaper Rcoin Global Whitepaper Rcoin Global SUMMARY 1. Introduction 2. What is Rcoin Global? 3. Transactions 4. Hybrid Network Concept 5. Keepers 6. Incentive 7. Smart Contract Token 8. Token Distribution 9. Rcoin Global

More information

SCP: A Computationally Scalable Byzantine Consensus Protocol for Blockchains

SCP: A Computationally Scalable Byzantine Consensus Protocol for Blockchains SCP: A Computationally Scalable Byzantine Consensus Protocol for Blockchains Loi Luu, Viswesh Narayanan, Kunal Baweja, Chaodong Zheng, Seth Gilbert, Prateek Saxena National University of Singapore Bitcoin

More information

A world-wide network of interconnected objects uniquely addressable, based on standard communication protocols

A world-wide network of interconnected objects uniquely addressable, based on standard communication protocols Things having identities and virtual personalities operating in smart spaces using intelligent interfaces to connect and communicate within social, environmental, and user contexts A world-wide network

More information

BITCOIN MECHANICS AND OPTIMIZATIONS. Max Fang Philip Hayes

BITCOIN MECHANICS AND OPTIMIZATIONS. Max Fang Philip Hayes 1 BITCOIN MECHNICS ND OPTIMIZTIONS Max Fang Philip Hayes 1 Cryptocurrency Mining: Proof-of-Work Consensus Nadir khtar LECTURE OUTLINE 2 1 Intro and Terminology 2 Bitcoin and Consensus 3 Bitcoin Concepts

More information

Visualizing and Tracing Bitcoin Transactions

Visualizing and Tracing Bitcoin Transactions Visualizing and Tracing Bitcoin Transactions Matthew Consterdine & Dennis Parchkov & Altay Adademir Abstract This project demonstrates the ability to visualize, and trace transactions through the Bitcoin

More information

Hyperledger fabric: towards scalable blockchain for business

Hyperledger fabric: towards scalable blockchain for business Marko Vukolić, IBM Research - Zurich Hyperledger fabric: towards scalable blockchain for business Trust in Digital Life The Hague, Netherlands, June 17 2016 Blockchain shared, replicated, ledger Consensus

More information

Radix - Public Node Incentives

Radix - Public Node Incentives Radix - Public Node Incentives Dan Hughes Piers Ridyard www.radix.global December 2017 Abstract In this paper we present a novel method for implementing a mechanism to reward work carried out across a

More information

How Bitcoin achieves Decentralization. How Bitcoin achieves Decentralization

How Bitcoin achieves Decentralization. How Bitcoin achieves Decentralization Centralization vs. Decentralization Distributed Consensus Consensus without Identity, using a Block Chain Incentives and Proof of Work Putting it all together Centralization vs. Decentralization Distributed

More information

XYO Network: Network Implementation

XYO Network: Network Implementation XYO Network: Network Implementation Erik Saberski, Carter Harrison, Arie Trouw August, 2018 The XY Oracle Network utilizes a novel blockchain protocol to provide a trustless, cryptographic network of decentralized

More information

Reliability, distributed consensus and blockchain COSC412

Reliability, distributed consensus and blockchain COSC412 Reliability, distributed consensus and blockchain COSC412 Learning objectives Encourage you to always design for failure Appreciate how decentralised consensus is useful to support principles of security

More information