Bitcoin/Blockchain. Workshop
|
|
- Meghan Lilian Davis
- 5 years ago
- Views:
Transcription
1 Prev : H() nonce: 2009 Prev : H() nonce: Prev : H() nonce: data data data Bitcoin/Blockchain Workshop Prashanth.B Founder, CEO, lastbit pb@lastbit.io
2 Overview (Day 1 Hour 1) 1. An Introduction to crypto-currency 2. Distributed systems 3. Bitcoin
3 An Introduction to Cryptocurrency
4 History of Currency Before 1971 Today
5 Bitcoin vs. Banks Decentralized Centralized 100,000,000 Satoshi =
6 Source: bitcoin.org
7 Distributed Systems
8 Introduction
9 Fault Tolerance & State Replication COMMENTS A -> Good weather B -> No it s terrible A -> The glass is half full B -> It s half empty COMMENTS A -> Good weather B -> No it s terrible A -> The glass is half full B -> It s half empty COMMENTS A -> Good weather B -> It s half empty A -> The glass is half full B -> No it s terrible
10 Naïve Client-Server Protocol Client sends command one at a time to server Client-Server Protocol with ACK (Eg: TCP) Client sends command one at a time to server Server sends ACK If ACK not received within a reasonable time, resend command. Tip: Add sequence number, to prevent same command from being executed multiple times
11 The impossibility of consensus The impossibility of consensus. Example : Two friends Meet at 7pm? Sure. ACK receipt. Ok. ACK(ACK (ACK receipt)) Bob Alice
12 Consensus Definition: Distributed consensus The protocol terminates and all correct nodes agree upon the same value that was originally proposed by a correct node. A node that can have ANY imaginable arbitrary behavior is called Byzantine
13 Hash Functions x H(x) X Hello SHA256( Hello ) 2CF24DBA5FB0A30E26E83B2AC5B9E29E1B161E5C1FA7425E B9824 X Hallo SHA256( Hallo ) D3751D33F9CD5049C4AF2B E4D3BAF130BCBB87F389E349FBAEB20B9 Analogous to a digital fingerprint Source: Bitcoin: A peer to peer electronic cash system Satoshi Nakomoto
14 Properties of Hash Functions Collision Free If H(x) = H(y) => x = y Hiding Given H(x) it is infeasible to compute x X Hello SHA256( Hello ) 2CF24DBA5FB0A30E26E83B2AC5B9E29E1B161E5C1FA7425E B9824
15 Byzantine General s Problem Let s attack on Sunday No I have a date on Sunday. Let s attack on Monday.
16 X = Let s attack on Sunday H(X) = 00000efa2 Y = No I have a date on Sunday. Let s attack on Monday H(X) = 00000ab23
17 X = Let s attack on Sunday, Monday, Tuesday Y = Let s attack on Monday H(X) = efa2 H(y) = ab23
18 Bitcoin
19 A Distributed Ledger Block N Block Height Block N-1 Block N-2 Blockchain Block 2 Block 1 Block 0 Genesis Block
20 Mining Very difficult! Very easy!
21
22 Basic digital cash Signed by Alice s K p Pay to K p Bob Signed by Goofy s K p Pay to K p Alice Coin 1 Goofycoin Signed by Goofy s K p CreateCoin[1]
23 Double Spending Signed by Alice s K p Pay to K p Bob Signed by Alice s K p Pay to K p Charlie Signed by Goofy s K p Goofycoin Pay to K p Alice Signed by Goofy s K p CreateCoin[1]
24 Double Spending Solution ScroogeCoin Signed by Scrooge Previous ID : 69 Transaction Previous : H( ) ID : 70 Transaction Previous ID : 71 Transaction
25 What s in a Block? Block Hash Previous Block Hash Merkle Root Nonce Difficulty Block Size: x kb Number of Transactions: n <Transactions> b3fa19b9610b326b11ef8c6d150bac0be5fbe9 af9d6b ca1d9de981f2f79eeb6a8b41fedcdc6d69c c678e2e ec88a3581bb2e1b1bffd9e47a233f8dae92d fa1d744f9acf Nonce: Difficulty: 4,143,878,474, Block Size: kb Number of Transactions: 1788 <Transactions>
26
27 <Demo> github.com/prashb94 -> Blockchain_Java_Demonstration
28 Overview (Day 1 Hour 2) 1. Keys 2. Wallets 3. Transactions
29 Bitcoin Keys Private Key (256 bits) Pick a number between 1 and n-1, where n is slightly less than Example: 64-bit hex encoded (64 * 4 = 256) 2368fa8dd9eeff910631dedb5fef297ae3b5a92948bcbc5a238fecf4d4 b6c68d Private Key WIF KxQYUNbiXYCubtMam7VjRQVRmKyS3dZE36trm1QHrzcgTVUER8 Ns
30 Public Key Public Key - K = k * G G is fixed, defined by secp256k1 standard K is a point (x,y) on the curve. Given K it is infeasible to compute k
31 ECC x = y y 2 mod p = (x 3 + 7) mod p
32 Multiplication on the Elliptic Curve kp = P + P +. + P (k times) -2G G -4G 4G -8G 2G And so on until we get kg
33 Addresses k = Private Key 2368fa8dd9eeff910631dedb5fef297ae3b5a92948bcbc5a238fecf4d4b6c68d K = k* G K = Public Key 035b2dee61996d9d305dd7a5b8212f2fd07d65b4d92bcef4b9e1df271a2d tk = SHA256(K) pubkeyhash = RIPEMD(tK) (20 bytes/160 bits) Address = Base58CheckEncode(pubKeyHash) 1PbVVETY8NBNY9L7V8iqzmyM5zFWsHAGq3
34 Compressed and Uncompressed Keys X = F028892BAD7ED57D2FB57BF33081D5CFCF6F9ED3D3D7F159C2E2FFF579DC341A Y = 07CF33DA18BD734C600B96A72BBC4749D5141C90EC8AC328AE52DDFE2E505BDB K (520 bits) = 04 F028892BAD7ED57D2FB57BF33081D5CFCF6F9ED3D3D7F159C2E2FFF579DC341A 07CF33DA18BD734C600B96A72BBC4749D5141C90EC8AC328AE52DDFE2E505BDB y 2 mod p = (x 3 + 7) mod p K (264 bits) = 03F028892BAD7ED57D2FB57BF33081D5CFCF6F9ED3D3D7F159C2E2FFF579DC341A ~50% reduction in size!
35 Key Generation P K K p A Elliptic Curve Multiplication Hash function Private Key Public Key Address L1yodjsu78NMy4yaXx8SawvQA2zsHUikhxifuan7HbNtTQfvUVBF 1NuRkdFFqKHxURW1PiK3gzBaZHwys2k2P4
36 Wallets Non Deterministic Wallets
37 Wallets Deterministic Wallets (Type 1) Seed
38 Wallets Hierarchial Deterministic Wallets (BIP 32/44) Master Key m/ 0 Seed m m/ 1 m/ 2 Child Keys Grand-child Keys
39 BIP 39 Seeds & Mnemonics Seed - 0C1E24E D297E14D45F14E1A1A Mnemonic - army van defense carry jealous true garbage claim echo media make crunch Word list 2048 words Process Generate Entropy, Split into 11 bit equal partitions. Each partition corresponds to an index in the 2048 word list.
40 Example Entropy input (128 bits) Mnemonic (12 words) Passphrase Seed (512 bits) 0c1e24e d297e14d45f14e1a1a army van defense carry jealous true garbage claim echo media make crunch SuperDuperSecret 3b5df16df cfdd a5e170c e3afe6c 88defeefb0818c793dbb28ab3ab091897d dc8a18358f80b79d49acf64142ae57037d1d54 Entropy input (256 bits) Mnemonic (24 words) Passphrase Seed (512 bits) caff939d32d574753fe684d3c947c dd8423e74abcf8c cake apple borrow silk endorse fitness top denial coil riot stay wolf luggage oxygen faint major edit measure invite love trap field dilemma oblige (none) 3269bce2674acbd188d4f120072b13b088a0ecf87c6e4ca e41657a0bb78f5315b33b3a04356e53d062e5 5f1e0deaa082df8d df848a6ad7e
41 Key Formats Type Prefix Example Raw None (256 bits) Hex None fecf4d4b6c68d (64 hex digits) WIF 5 5J3mBbAH58CpQ3Y5RNJp UKPE62SQ5tfcvU2Jpbnkey hfsyb1jcn WIF Compressed K or L KxQYUNbiXYCubtMam7VjR QVRmKyS3dZE36trm1QHrz cgtvuer8ns
42 Paper Wallet example Address Private Key Download the Mycelium Testnet Wallet application from the Google Play Store Install the app and press the button circled below.
43 Select Advanced Scan your private key This is your address. Paste it into any block explorer to view complete data. Or select a transaction and click on the hash Example: testnet.blockchain.info
44 Anatomy of a Transaction Inputs Amount Outputs Amount BTC BTC BTC BTC Input 1 Input 2 From Alice, signed by Alice Output 1 To Bob Output 2 To Joe Total BTC Total BTC Difference = 0.05 BTC (Implied transaction fee)
45 Source: Mastering Bitcoin (O'Reilly Media)
46 { "version": 1, "locktime": 0, "vin": [ { "txid": "7957a35fe64f80d234d76d83a2a8f1a0d8149a41d81de548f0a65a8a999f6f18", "vout": 0, "scriptsig" : " d142d86652a3f47ba4746ec719bbfbd040a570b1deccbb6498c75c4ae24cb02204b9f039ff08df09cbe9f6addac960298cad530a863ea8f53982c09db8f 6e3813[ALL] 0484ecc0d46f1918b30928fa0e4ed99f16a0fb4fde0735e7ade8416ab9fe423cc d172787ec3457eee41c04f4938de5cc17b4a10fa336a8d752adf", "sequence": } ], "vout": [ { }, { "value": , "scriptpubkey": "OP_DUP OP_HASH160 ab c3dbd2f7b92a94e0581f5d50f654e7 OP_EQUALVERIFY OP_CHECKSIG" "value": , "scriptpubkey": "OP_DUP OP_HASH160 7f9b1a7fb68d60c536c2fd8aeaa53a8f3cc025a8 OP_EQUALVERIFY OP_CHECKSIG", } ] }
47 Bitcoin Scripts Turing incomplete Stateless verification Stack based language Example OP_ADD 20 OP_EQUAL
48 P2PKH (Pay To Public Key Hash) Transaction output is locked with a script Anyone who can present a signature corresponding to the public key in the script can spend that output Standard P2PKH locking script OP_DUP OP_HASH160 <Public Key Hash> OP_EQUALVERIFY OP_CHECKSIG Standard P2PKH unlocking script <Signature> <Public Key>
49 <Sig> <PublicKey> OP_DUP OP_HASH160 <Public Key Hash> OP_EQUALVERIFY OP_CHECKSIG <sig> <PubK> <sig> <Sig> <PublicKey> OP_DUP OP_HASH160 <Public Key Hash> OP_EQUALVERIFY OP_CHECKSIG <PubK> <PubK> <sig> <Sig> <PublicKey> OP_DUP OP_HASH160 <Public Key Hash> OP_EQUALVERIFY OP_CHECKSIG
50 <PubKHash> <PubK> <sig> <Sig> <PublicKey> OP_DUP OP_HASH160 <Public Key Hash> OP_EQUALVERIFY OP_CHECKSIG <PubKHash> <PubKHash> <PubK> <sig> <Sig> <PublicKey> OP_DUP OP_HASH160 <Public Key Hash> OP_EQUALVERIFY OP_CHECKSIG <PubK> <sig> <Sig> <PublicKey> OP_DUP OP_HASH160 <Public Key Hash> OP_EQUALVERIFY OP_CHECKSIG <Sig> <PublicKey> OP_DUP OP_HASH160 <Public Key Hash> OP_EQUALVERIFY OP_CHECKSIG TRUE
51 Digital Signatures Sign Hello World! P K Private Key M Message K p Public Key Signature 732fe6c8c6c616fbe90133f491beb831ba0c61c3072a1ab11ded1a53770c459e 1074e1d0cfc3127cf2f717bb20c4310ac29e20aa83aaf43a4809bfe8bab825e5 Verify Yes/No
52 Properties of DSA P K Private Key K p Public Key Hello Goofy f49..1beb8 Hello Goofy n 01fda...9af211 Hello Goofy n+1 51afde ef2315a Verify Yes/No
53 <Demo>
54 Overview (Day 2 Hour 1) 1. Advanced Transactions 2. Merkle Trees 3. Applications
55 Multisignature Scripts Locking Script : M <PubKey 1> <PubKey 2>..<PubKey N> N CHECKMULTISIG Unlocking Script : <Signature 1> <Signature 2> Validation Script : 0 <Signature 1> <Signature 2> M <PubKey 1> <PubKey 2>..<PubKey N> N CHECKMULTISIG
56 Standard Locking Script 2 04C16B8698A9ABF84250A7C3EA7EEDEF9897D1C8C6ADF47F06CF73370D74DCCA01CDCA79DCC5C395 D7EEC6984D83F1F50C900A24DD47F569FD4193AF5DE762C58704A D8655D6A935BEAF2CA23E3 FB87A3495E7AF308EDF08DAC3C1FCBFC2C75B4B0F4D0B1B70CD C0C2B1D5CE65C97D78D0 E E8B49047E63248B75DB7379BE9CDA8CE5751D16485F431E46117B9D0C1837C9D F3 93DA7D4420D7E1A9162F0279CFC10F1E8E8F3020DECDBC3C0DD389D D65CBD7149B ED7F78E EE6FDA162A187543A9D85BAAA93A4AB3A8F044DADA618D ABE8A35D A8C5B73997AD343BE5C2AFD94A AFA1ECED3C68D446BCAB69AC0BA7DF50D56231BE0AAB F1FDEEC78A6A45E394BA29A1EDF518C022DD618DA774D207D137AAB59E0B000EB7ED238F4D800 5 CHECKMULTISIG P2SH Locking Script HASH160 54c557e07dde5bb6cb791c7a540e0a4796f5e97e EQUAL
57 P2SH (Pay To Script Hash) Without P2SH Locking Script Unlocking Script 2 PubKey1 PubKey2 PubKey3 PubKey4 PubKey5 5 CHECKMULTISIG Sig1 Sig2 With P2SH Redeem Script Locking Script Unlocking Script 2 PubKey1 PubKey2 PubKey3 PubKey4 PubKey5 5 CHECKMULTISIG HASH160 <20-byte hash of redeem script> EQUAL Sig1 Sig2 <redeem script>
58 Bitcoin Transaction Malleability Mt.Gox - 850,000 bitcoins stolen
59 OP_RETURN OP_RETURN <data> "asm" : "OP_DUP OP_HASH160 b8268ce4d481413c4e848ff353cd c45b OP_EQUALVERIFY OP_CHECKSIG" "asm" : "OP_RETURN c c6f "
60 Merkle Trees Merkle Root H ABCD Hash(H AB + H CD ) H AB Hash(H A + H B ) H CD Hash(H C + H D ) H A Hash(Tx A) H B Hash(Tx B) H C Hash(Tx C) H D Hash(Tx D)
61 Merkle Path Merkle Root H ABCD Hash(H AB + H CD ) H AB Hash(H A + H B ) H CD Hash(H C + H D ) H A Hash(Tx A) H B Hash(Tx B) H C Hash(Tx C) H D Hash(Tx D)
62 Merkle Tree Efficiency Number of transactions Approx. size of block Path size (hashes) Path size (bytes) 4 transactions 1 kilobyte 3 hashes 96 bytes 16 transactions 4 kilobytes 4 hashes 128 bytes 512 transactions 128 kilobytes 9 hashes 288 bytes 2048 transactions 512 kilobytes 11 hashes 352 bytes 65,535 transactions 16 megabytes 16 hashes 512 bytes
63 SPV Nodes Only downloads block headers Merkle trees used extensively to verify if a tx is included in a block Less than 1 kilobyte of data for the entire merkle path
64 Takeaway As block size increases, merkle path size increases much slower Nodes can download just the 80 byte block headers instead of storing the entire blockchain (SPV nodes)
65 Secure Timestamping Data e21
66 Colored Coins Add secondary value to Bitcoin Store ANY asset on the BITCOIN blockchain
67 You cannot prove Clairvoyance
68 Overview (Day 2 Hour 2) 1. Anonymity 2. Scaling 3. Ethereum
69 Blind Signatures Original Message Original Message Carbon paper lined envelope Remove envelope
70 Zk-SNARKS
71 Micropayment Channels
72 HTLC H = Hash(R) IF # Payment if you have the secret R HASH160 <H> EQUALVERIFY ELSE # Refund after timeout. <locktime> CHECKLOCKTIMEVERIFY DROP <Payer Public Key> CHECKSIG ENDIF
73 Lightning Network
74
75 Ethereum
76 Decentralized Applications 1 Ether = 1,000,000,000,000,000,000 Wei (10 18 )
77 Gas Account based protocol unlike UTXO based in Bitcoin
78 UTXO vs. Accounts
79 Transactions
80 Nonces Replay attack
81 Eg: Tell me all instances of an event of type X (eg. a crowdfunding contract reaching its goal) emitted by this address in the past 30 days
82 Smart Contracts Externally Owned Accounts (EOA) and Contract Accounts Controlled by P k No P k Solidity/Serpent Turing Complete
83 DAO
84 The DAO Hard Fork July Recursive call bug, 3.6 MM ETH stolen 89% of community voted for hard fork
85 Parity Hack Line 215 and Line ,000$ frozen in multisig wallets Hacked by mistake
86
87 References Mastering Bitcoin Andreas M. Antonopoulos, O Reilly Media. Distributed Ledger Technology Roger. M. Wattenhofer, ETH Zurich.
Bitcoin and Blockchain Technology: Addresses, Transactions, and Blocks. Ferdinando M. Ametrano
Bitcoin and Blockchain Technology: Addresses, Transactions, and Blocks Ferdinando M. Ametrano https://www.ametrano.net/about/ Table of Contents 1. Addresses and Wallet Import Formats 2. TxIns, TxOs, UTxOs
More informationBLOCKCHAIN Blockchains and Transactions Part II A Deeper Dive
BLOCKCHAIN Blockchains and Transactions Part II A Deeper Dive www.blockchaintrainingalliance.com Blockchain Page 3 Blockchain is NOT Bitcoin Page 4 Transactions Page 5 Multi-Signature Addresses An Address
More informationUpgrading Bitcoin: Segregated Witness. Dr. Johnson Lau Bitcoin Core Contributor Co-author of Segregated Witness BIPs March-2016
Upgrading Bitcoin: Segregated Witness Dr. Johnson Lau Bitcoin Core Contributor Co-author of Segregated Witness BIPs 141-143 16-March-2016 Topics A short introduction to Bitcoin transactions What is transaction
More informationMechanics of Bitcoin
Mechanics of Bitcoin Minsoo Ryu Hanyang University Outline Bitcoin Transactions Bitcoin Scripts Bitcoin Blocks Bitcoin Network Limitations and Improvements For more information, visit https://bitcoin.org/en/developer-reference#
More informationErgo platform. Dmitry Meshkov
Ergo platform Dmitry Meshkov Prehistory Motivation Theory Practice Provably secure 1000 currencies New features Ad-hoc solutions Impractical Security issues Motivation Theory Provably secure New features
More informationICS 421 & ICS 690. Bitcoin & Blockchain. Assoc. Prof. Lipyeow Lim Information & Computer Sciences Department University of Hawai`i at Mānoa
ICS 421 & ICS 690 Bitcoin & Blockchain Assoc. Prof. Lipyeow Lim Information & Computer Sciences Department University of Hawai`i at Mānoa Accepted by: Overstock.com Expedia.com Newegg.com Tigerdirect.com
More informationWhat is Bitcoin? How Bitcoin Works. Outline. Outline. Bitcoin. Problems with Centralization
What is Bitcoin? How Bitcoin Works Kai Brünnler Research Institute for Security in the Information Society Bern University of Applied Sciences Bitcoin an open-source software a peer-to-peer network a decentralized
More informationLecture 6. Mechanics of Bitcoin
Lecture 6 Mechanics of Bitcoin Bitcoin transactions time An account-based ledger (not Bitcoin) Create 25 coins and credit to Alice ASSERTED BY MINERS SIMPLIFICATION: only one transaction per block time
More informationUniversity of Duisburg-Essen Bismarckstr Duisburg Germany HOW BITCOIN WORKS. Matthäus Wander. June 29, 2011
University of Duisburg-Essen Bismarckstr. 90 47057 Duisburg Germany HOW BITCOIN WORKS June 29, 2011 Overview Electronic currency system Decentralized No trusted third party involved Unstructured peer-to-peer
More informationENEE 457: E-Cash and Bitcoin
ENEE 457: E-Cash and Bitcoin Charalampos (Babis) Papamanthou cpap@umd.edu Money today Any problems? Cash is cumbersome and can be forged Credit card transactions require centralized online bank are not
More informationSKBI Cryptocurrency Technical Seminar Series Seminar 1: Basics: Cryptography and Transactions
SKBI Cryptocurrency Technical Seminar Series Seminar 1: Basics: Cryptography and Transactions Zhiguo Wan Sim Kee Boon Institute for Financial Economics Singapore Management University Schedule of bitcoin
More informationComputer Security. 14. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2019
Computer Security 14. Blockchain & Bitcoin Paul Krzyzanowski Rutgers University Spring 2019 April 15, 2019 CS 419 2019 Paul Krzyzanowski 1 Bitcoin & Blockchain Bitcoin cryptocurrency system Introduced
More informationBitcoin (Part I) Ken Calvert Keeping Current Seminar 22 January Keeping Current 1
Bitcoin (Part I) Ken Calvert Keeping Current Seminar 22 January 2014 2014.01.22 Keeping Current 1 Questions What problem is Bitcoin solving? Where did it come from? How does the system work? What makes
More informationBlockchain Bitcoin & Ethereum
Blockchain Bitcoin & Ethereum Pascal.Urien@Telecom-ParisTech.fr Pascal Urien 1 "Bitcoin: A Peer-to-Peer Electronic Cash System." Satoshi Nakamoto In this paper, we propose a solution to the double-spending
More informationBlockchain, Cryptocurrency, Smart Contracts and Initial Coin Offerings: A Technical Perspective
SESSION ID: LAB3-R09 Blockchain, Cryptocurrency, Smart Contracts and Initial Coin Offerings: A Technical Perspective Tom Plunkett Consulting Solutions Director Oracle Captain Brittany Snelgrove United
More informationAnupam Datta CMU. Spring 2017
Anupam Datta CMU Spring 2017 A rational reconstruction of Bitcoin 1. Start with straw man design 2. Identify weaknesses 3. Augment design and iterate Alice: I, Alice, am giving Bob one coin Alice digitally
More informationFiiiCOIN. Yellow Paper. FiiiCOIN Yellow Paper v0.01. A versatile, scalable and energy efficient blockchain technology. Authors.
FiiiCOIN A versatile, scalable and energy efficient blockchain technology Yellow Paper Authors Sylvester Lee CTO & Founder John Liu Solutions Architect 1 P a g e Abstract FiiiCoin is a transaction network
More informationTechnical Analysis of Established Blockchain Systems
Technical Analysis of Established Blockchain Systems Florian Haffke, 20.11.2017, Munich Chair of Software Engineering for Business Information Systems (sebis) Faculty of Informatics Technische Universität
More informationAnupam Datta CMU. Fall 2015
Anupam Datta CMU Fall 2015 A rational reconstruction of Bitcoin 1. Start with straw man design 2. Identify weaknesses 3. Augment design and iterate Alice: I, Alice, am giving Bob one coin Alice digitally
More informationThe Technology behind Smart Contracts
The Technology behind Smart Contracts Florian Glaser, Chair of E-Finance, Information Systems Department Goethe University 01.09.2016 > Agenda Transactions in detail
More informationBlockchains & Cryptocurrencies
1 Blockchains & Cryptocurrencies A Technical Introduction Lorenz Breidenbach ETH Zürich Cornell Tech The Initiative for CryptoCurrencies & Contracts (IC3) 2 Cryptocurrency Mania Market cap as of yesterday:
More informationIntroduction to Bitcoin I
Introduction to Bitcoin I P Peterlongo 1 A Tomasi 1 1 University of Trento Department of Mathematics June 10, 2013 Outline 1 Fiat and online payments Functions of Online payments and cost of clearing 2
More informationBlockchain. CS 240: Computing Systems and Concurrency Lecture 20. Marco Canini
Blockchain CS 240: Computing Systems and Concurrency Lecture 20 Marco Canini Credits: Michael Freedman and Kyle Jamieson developed much of the original material. Bitcoin: 10,000 foot view New bitcoins
More informationProblem: Equivocation!
Bitcoin: 10,000 foot view Bitcoin and the Blockchain New bitcoins are created every ~10 min, owned by miner (more on this later) Thereafter, just keep record of transfers e.g., Alice pays Bob 1 BTC COS
More informationVisualizing and Tracing Bitcoin Transactions
Visualizing and Tracing Bitcoin Transactions Matthew Consterdine & Dennis Parchkov & Altay Adademir Abstract This project demonstrates the ability to visualize, and trace transactions through the Bitcoin
More informationBitcoin, a decentralized and trustless protocol
Bitcoin, a decentralized and trustless protocol Thomas Sibut-Pinote Inria Saclay February 12, 2015 Thomas Sibut-Pinote Bitcoin, a decentralized and trustless protocol 1 / 42 Introduction Questions 1 Introduction
More informationConsensus & Blockchain
Consensus & Blockchain S P Suresh Chennai Mathematical Institute Formal Methods Update Meeting IIT Mandi July 17, 2017 The Bitcoin revolution is upon us What is Bitcoin? Bitcoin: an exciting new currency
More informationCryptography and Cryptocurrencies. Intro to Cryptography and Cryptocurrencies
Intro to Cryptographic Hash Functions Hash Pointers and Data Structures Block Chains Merkle Trees Digital Signatures Public Keys and Identities Let s design us some Digital Cash! Intro to Cryptographic
More informationLecture 3. Introduction to Cryptocurrencies
Lecture 3 Introduction to Cryptocurrencies Public Keys as Identities public key := an identity if you see sig such that verify(pk, msg, sig)=true, think of it as: pk says, [msg] to speak for pk, you must
More informationDistributed Algorithms Bitcoin
Distributed Algorithms Bitcoin Alberto Montresor Università di Trento 2018/12/18 Acknowledgment: Joseph Bonneau, Ed Felten, Arvind Narayanan This work is licensed under a Creative Commons Attribution-ShareAlike
More informationSmalltalk 3/30/15. The Mathematics of Bitcoin Brian Heinold
Smalltalk 3/30/15 The Mathematics of Bitcoin Brian Heinold What is Bitcoin? Created by Satoshi Nakamoto in 2008 What is Bitcoin? Created by Satoshi Nakamoto in 2008 Digital currency (though not the first)
More informationBitcoin and Blockchain
Bitcoin and Blockchain COS 418: Distributed Systems Lecture 18 Zhenyu Song [Credit: Selected content adapted from Michael Freedman. Slides refined by Chris Hodsdon and Theano Stavrinos] Why Bitcoin? All
More informationWho wants to be a millionaire? A class in creating your own cryptocurrency
DEVNET-3626 Who wants to be a millionaire? A class in creating your own cryptocurrency Tom Davies, Sr. Manager, DevNet Sandbox Vallard Benincosa, Software Engineer Cisco Spark How Questions? Use Cisco
More informationBlockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric
Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Elli Androulaki Staff member, IBM Research, Zurich Workshop on cryptocurrencies Athens, 06.03.2016 Blockchain systems
More informationHyperledger fabric: towards scalable blockchain for business
Marko Vukolić, IBM Research - Zurich Hyperledger fabric: towards scalable blockchain for business Trust in Digital Life The Hague, Netherlands, June 17 2016 Blockchain shared, replicated, ledger Consensus
More informationViacoin Whitepaper. Viacoin Dev Team September 12, Abstract
Viacoin Dev Team September 12, 2017 Last updated on March 17, 2018 Abstract Viacoin is an open source crypto-currency created in 2014, derived from the [bitcoin2008]bitcoin protocol that supports embedded
More informationAbout cryptocurrencies and blockchains part 1. Jyväskylä 17th of April 2018 Henri Heinonen
About cryptocurrencies and blockchains part 1 Jyväskylä 17th of April 2018 Henri Heinonen (henri.t.heinonen@jyu.fi) What is a blockchain? BitTorrent is a famous example of a peer-to-peer network (P2P)
More informationRealization and Addressing Analysis In Blockchain Bitcoin
IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Realization and Addressing Analysis In Blockchain Bitcoin To cite this article: Raja Sakti Arief Daulay et al 2017 IOP Conf. Ser.:
More informationHyperledger Fabric v1:
Marko Vukolić, IBM Research - Zurich May 4, 2017 Hyperledger Fabric v1: Rethinking Permissioned Blockchains Blockchain: du Bitcoin au Smart Contract 4 Mai 2017 2017 IBM Corporation What is a Blockchain?
More informationEnsimag - 4MMSR Network Security Student Seminar. Bitcoin: A peer-to-peer Electronic Cash System Satoshi Nakamoto
Ensimag - 4MMSR Network Security Student Seminar Bitcoin: A peer-to-peer Electronic Cash System Satoshi Nakamoto wafa.mbarek@ensimag.fr halima.myesser@ensimag.fr 1 Table of contents: I- Introduction: Classic
More informationWorking on scripts with logical opcodes. Thomas Kerin
Working on scripts with logical opcodes Thomas Kerin 1 Thanks to the speakers committee and conference organizers! 2 Logical opcodes Script has logical opcodes - IF/NOTIF/ELSE/ENDIF. Allows for different
More informationEmulation of Hash-Time-Locked Contracts of the Lightning network by a trusted, but publically auditable escrow service
Emulation of Hash-Time-Locked Contracts of the Lightning network by a trusted, but publically auditable escrow service C. J. Plooy (cjp@ultimatestunts.nl) April 19, 2015 Contents 1 Introduction 2 2 Bi-directional
More informationThe power of Blockchain: Smart Contracts. Foteini Baldimtsi
The power of Blockchain: Smart Contracts Foteini Baldimtsi The Blockchain at the heart of a cryptocurrency Alice sends 2 John sends 1 Dave sends 5 to Bob to Eve to Alice Bob sends 1 Eve sends 4 to Dave
More informationBitcoin Script 2.0 and Strengthened Payment Channels
Bitcoin Script 2.0 and Strengthened Payment Channels Johnson Lau, Bitcoin protocol developer Olaoluwa Osuntokun, Co-founder Lightning Labs Presented at Scaling Bitcoin 2017 Stanford, CA November 4th 2017
More informationPrivacy based Public Key Infrastructure (PKI) using Smart Contract in Blockchain Technology
2 nd Advanced Workshop on Blockchain, IIT Bombay Privacy based Public Key Infrastructure (PKI) using Smart Contract in Blockchain Technology Sivakumar.P M.Tech (CSE), Sem-III, NIT Trichy Guide:- Dr Kunwar
More informationPlease go to for some instructions on installing the programming environment needed for this course.
Please go to http://bit.ly/suss_segwit for some instructions on installing the programming environment needed for this course. Segregated Witness and Lightning Network: Implications on the Future of Payment
More informationBurstcoin Technical information about mining and block forging
Burstcoin Technical information about mining and block forging Table of contents 1. Introduction 2. Algorithms and Acronyms 3. Mining process 4. Block forging process Introduction With most cryptocurrencies
More informationEECS 498 Introduction to Distributed Systems
EECS 498 Introduction to Distributed Systems Fall 2017 Harsha V. Madhyastha Today Bitcoin: A peer-to-peer digital currency Spark: In-memory big data processing December 4, 2017 EECS 498 Lecture 21 2 December
More informationUnblockable Chains. Is Blockchain the ultimate malicious infrastructure? Omer Zohar
Unblockable Chains Is Blockchain the ultimate malicious infrastructure? Omer Zohar #WhoAmI Researching malware backbones for the past decade Following blockchain eco-system since 2013 Finally had some
More informationReliability, distributed consensus and blockchain COSC412
Reliability, distributed consensus and blockchain COSC412 Learning objectives Encourage you to always design for failure Appreciate how decentralised consensus is useful to support principles of security
More informationSecurity Analysis of Bitcoin. Dibyojyoti Mukherjee Jaswant Katragadda Yashwant Gazula
Security Analysis of Bitcoin Dibyojyoti Mukherjee Jaswant Katragadda Yashwant Gazula Security Analysis of Bitcoin Introduction How Bitcoin works? Similar peer-to-peer systems Vulnerabilities and solutions
More informationBitcoin/Namecoin/*coin: On Bitcoin like protocols and their relation to other IT-Security issues
: On Bitcoin like protocols and their relation to other IT-Security issues Aljosha Judmayer ajudmayer@sba-research.org 2014-11-07 SBA Research Area 1 (GRC): Governance, Risk and Compliance P1.1: Risk Management
More informationErgo platform overview
December 2018 Dmitry Meshkov Ergo platform overview Outline Ergo vision Decentralization Survivability Applicability Roadmap 2 Part 1 Ergo vision 3 History Research and Scorex framework development Testnet
More informationBlockchain distributed DNS without trust:
Aalto University School of Science Master s Programme in Computer, Communication and Information Sciences Jukka Rasi Blockchain distributed DNS without trust: Publishing IOT device addresses and verifying
More informationPage Total
Page 2 3 4 5 6 7 8 9 Total Mark FIRST NAME LAST (FAMILY) NAME STUDENT NUMBER INSE 6630 Fall 2017 Duration: 3 hours One single-sided letter-sized reference sheet of paper is allowed Write answers in the
More informationKey concepts of blockchain
Advisory A brief history of blockchains 2008 The mysterious Satoshi Nakamoto publishes his Bitcoin white paper 2014 2017 Nov. 23 rd Ethereum crowd sale Number of crypto tokens: 1.172 BTC $8.216 The first
More informationGame Monetization based on Cryptocurrencies and Blockchains
Game Monetization based on Cryptocurrencies and Blockchains Luciano Silva Universidade Presbiteriana Mackenzie Laboratório de Computação Visual (LCV) Faculdade de Computação e Informática São Paulo Brasil
More informationBlockchain (a.k.a. the slowest, most fascinating database you ll ever see)
Blockchain (a.k.a. the slowest, most fascinating database you ll ever see) GOTO Amsterdam 13 June, 2017 Stefan Tilkov, @stilkov I don t know Blockchain and so can you 1. Bitcoin > Practical application
More informationCS 251: Bitcoin and Crypto Currencies Fall 2015
CS 251: Bitcoin and Crypto Currencies Fall 2015 Final Exam The exam is open book and open notes. You have 2 hours. Please answer all five questions. All questions are weighted equally. You may use course
More informationBiomedical and Healthcare Applications for Blockchain. Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs
Biomedical and Healthcare Applications for Blockchain Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs Network Analysis Working Group 01.25.2018 Outline Introduction to bitcoin + blockchain
More informationThe Blockchain. Josh Vorick
The Blockchain Josh Vorick Bitcoin is a currency. Blockchain is a technology. What is a blockchain? A decentralized database that anyone can add to and no one can delete from The Bitcoin blockchain Agenda
More informationCS 251: Bitcoin and Cryptocurrencies Fall 2016
CS 251: Bitcoin and Cryptocurrencies Fall 2016 Homework 3 due : 2016-11-28, 23:59 via Gradescope (entry code M4YJ69 ) 1. Idioms of use: Consider the transaction graph in the figure below: rectangles represent
More informationAnalysis of the Bitcoin UTXO set*
Analysis of the Bitcoin UTXO set* Sergi Delgado-Segura, Cristina Pérez-Solà, Guillermo Navarro-Arribas, Jordi Herrera-Joancomartí Department of Information Engineering and Communications, Universitat Autònoma
More informationBitcoin. CS6450: Distributed Systems Lecture 20 Ryan Stutsman
Bitcoin CS6450: Distributed Systems Lecture 20 Ryan Stutsman Material taken/derived from Princeton COS-418 materials created by Michael Freedman and Kyle Jamieson at Princeton University. Licensed for
More informationSecurity, Privacy and Interoperability in Payment- Channel Networks
FAKULTÄT FÜR!NFORMATIK Faculty of Informatics & PRIVACY SECURITY GROUP Security, Privacy and Interoperability in Payment- Channel Networks Pedro Moreno-Sanchez (@pedrorechez) Joint work with Giulio Malavolta,
More informationLecture 10. A2 - will post tonight - due in two weeks
Lecture 10 A2 - will post tonight - due in two weeks The DAO - $72M USD in Ether Decentralized Dragon's Den or Shark's Tank A pot of money that you could contribute to and receive voting shares for You
More informationErgo platform: from prototypes to a survivable cryptocurrency
January 2019 Dmitry Meshkov Ergo platform: from prototypes to a survivable cryptocurrency Outline Ergo Consensus Light Storage vision protocol clients fee Voting Smart Monetary Roadmap system contracts
More informationApplied cryptography
Applied cryptography Electronic Cash Andreas Hülsing 29 November 2016 1 / 61 Classical Cash - Life Cycle Mint produces money (coins / bank notes) Sent to bank User withdraws money (reduces account balance)
More informationCS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University
CS 4770: Cryptography CS 6750: Cryptography and Communication Security Alina Oprea Associate Professor, CCIS Northeastern University March 30 2017 Outline Digital currencies Advantages over paper cash
More informationGENESIS VISION NETWORK
GENESIS VISION NETWORK Contents 1. Description of the problem 7 11. Trust management 15 2. The problem with smart contracts 8 12. GVN Token 16 3. Centralised exchanges against decentralised 8 13. Deposit
More informationDistributed Ledger Technology & Fintech Applications. Hart Montgomery, NFIC 2017
Distributed Ledger Technology & Fintech Applications Hart Montgomery, NFIC 2017 Let s consider a common scenario: Banks want to trade some asset class Participants in the market want to be able to efficiently
More informationJan Møller Co-founder, CTO Chainalysis
Jan Møller Co-founder, CTO Chainalysis How Does Bitcoin Actually Work? This talk is not about the poli:cal or economical impact of Bitcoin. This talk is not about how to buy, sell, spend, or secure your
More informationSCP: A Computationally Scalable Byzantine Consensus Protocol for Blockchains
SCP: A Computationally Scalable Byzantine Consensus Protocol for Blockchains Loi Luu, Viswesh Narayanan, Kunal Baweja, Chaodong Zheng, Seth Gilbert, Prateek Saxena National University of Singapore Bitcoin
More informationProof-of-Stake Protocol v3.0
Proof-of-Stake Protocol v3.0 Abstract Proof of Stake's security has proven itself reliable & effective over years of testing while at the same time solving Bitcoin s issues caused by the Proof of Work
More informationISSUSE AND FEATURES TO CONSIDER WHEN SELECTING A BLOCKCHAIN SYSTEM. Find us at
ISSUSE AND FEATURES TO CONSIDER WHEN SELECTING A BLOCKCHAIN SYSTEM Find us at www.chainfrog.com Licenses Most blockchains are open-source (and you should not select a closed source one) If you are going
More informationBlockchain Certification Protocol (BCP)
Blockchain Certification Protocol (BCP) Fu Yong Quah fuyong@fyquah.me www.fyquah.me Abstract. A semi-decentralized certification system built above the existing 1 Bitcoin network, an innovative peer-to-peer
More informationSOME OF THE PROBLEMS IN BLOCKCHAIN TODAY
BLOCKCHAIN EVOLVED THE PROBLEM SOME OF THE PROBLEMS IN BLOCKCHAIN TODAY An overall lack of governance is one of the most challenging facets of current blockchain ecosystems Controversy regarding scalability
More informationDigital Currencies: Algorithms and Protocols
Digital Currencies: Algorithms and Protocols Élise Alfieri , Emmanuel Fleury LaBRI, Université de Bordeaux, France March 7, 2017 Alfieri, Fleury
More informationSecurity: Focus of Control
Security: Focus of Control Three approaches for protection against security threats a) Protection against invalid operations b) Protection against unauthorized invocations c) Protection against unauthorized
More informationBITCOIN PROTOCOL & CONSENSUS: A HIGH LEVEL OVERVIEW
BITCOIN PROTOCOL & CONSENSUS: A HIGH LEVEL OVERVIEW Rustie Lin Wang Move the area1 over the image a little inside and then right click, replace image to change the background. (and delete this box while
More informationSet: Hub-and-Spoke Cryptographic Payment Channels
Set: Hub-and-Spoke Cryptographic Payment Channels v0.0.1 Nathan Ginnever: nathan@finalitylabs.io Abstract Here we outline the Set-Payment channel protocol (In a later paper we incrementally extend Set
More informationCryptocurrencies for Investigators
Cryptocurrencies for Investigators By Nick Furneaux CSITech Ltd Course Description Cryptocurrencies in their many forms, based on the blockchain concept, are here to stay and will increasingly pervade
More informationRadix - Public Node Incentives
Radix - Public Node Incentives Dan Hughes Piers Ridyard www.radix.global December 2017 Abstract In this paper we present a novel method for implementing a mechanism to reward work carried out across a
More informationSharding. Making blockchains scalable, decentralized and secure.
Sharding Making blockchains scalable, decentralized and secure. The Scalability Triangle Scalability Decentralization Semi-formally defining these properties Assume the total computational/bandwidth capacity
More informationDiscreet Log Contracts
Discreet Log Contracts Thaddeus Dryja MIT Digital Currency Initiative Abstract Smart contracts [1] are an often touted feature of cryptographic currency systems such as Bitcoin, but they have yet to see
More informationThe security and insecurity of blockchains and smart contracts
The security and insecurity of blockchains and smart contracts Jean-Pierre Flori, expert in cryptography, Agence Nationale de la Sécurité des Systèmes d Information (ANSSI) In J.P. Dardayrol, editor of
More informationLet's build a blockchain!
I'm Haseeb. That's me. Let's build a blockchain! A mini-cryptocurrency in Ruby I'm Haseeb Qureshi. I'm a software engineer. I'm working at a blockchain company called 21.co. Unless something terrible has
More informationWhat is Bitcoin? Consensus technology has the power to do for economics what the internet did for information - Dan Larimer
What is Bitcoin? Consensus technology has the power to do for economics what the internet did for information - Dan Larimer Ross Rydman 2014 For Academic Use Only The 30 second description Bitcoin is the
More informationEthereum Consortium Blockchain in Azure Marketplace Christine Avanessians Senior Program Manager
Ethereum Consortium Blockchain in Azure Marketplace Christine Avanessians Senior Program Manager Overview The next phase of our support of blockchain on Microsoft Azure is the release of the Ethereum Consortium
More informationChapter 13. Digital Cash. Information Security/System Security p. 570/626
Chapter 13 Digital Cash Information Security/System Security p. 570/626 Introduction While cash is used in illegal activities such as bribing money laundering tax evasion it also protects privacy: not
More informationEthereum. Campbell R. Harvey* Duke University and NBER. Ashwin Ramachandran Duke University. Brent Xu ConsenSys. Innovation and Cryptoventures
Innovation and Cryptoventures Ethereum Campbell R. Harvey* Duke University and NBER Ashwin Ramachandran Duke University Brent Xu ConsenSys February 12, 2018 1 2 Overview Ethereum Basics Under the hood
More informationGRADUBIQUE: AN ACADEMIC TRANSCRIPT DATABASE USING BLOCKCHAIN ARCHITECTURE
San Jose State University SJSU ScholarWorks Master's Projects Master's Theses and Graduate Research Fall 12-14-2018 GRADUBIQUE: AN ACADEMIC TRANSCRIPT DATABASE USING BLOCKCHAIN ARCHITECTURE Thinh Nguyen
More informationAn Analysis of Atomic Swaps on and between Ethereum Blockchains Research Project I
An Analysis of Atomic Swaps on and between Ethereum Blockchains Research Project I Master of System and Network Engineering Informatics Institute, University of Amsterdam Peter Bennink Lennart van Gijtenbeek
More informationJuly 01, Mixin Network. A free and lightning fast peer-to-peer transactional network for digital assets.
Draft @ July 01, 2018 Mixin Network A free and lightning fast peer-to-peer transactional network for digital assets. TECHNICAL WHITE PAPER SUBJECT TO FURTHER REVIEW AND UPDATE contact@mixin.one 1 of 29
More informationUsing Blockchain Technology and Smart Contracts for Access Management in IoT devices
Date of acceptance Grade Instructor : Prof. Sasu Tarkoma Advisor : Oscar Novo Using Blockchain Technology and Smart Contracts for Access Management in IoT devices Rupsha Bagchi Helsinki May 8, 2017 UNIVERSITY
More informationI. Introduction. II. Security, Coinage and Attacks
Abstract Proof of Stake's security has proven itself over years of testing. Advances in this technology in Blackcoin's Proof-of-Stake 3.0 have solved the issues faced with Coin-Age, Block Reward and Blockchain
More informationECC: Peer-to-Peer Electronic Cash with Trustless Network Services
ECC: Peer-to-Peer Electronic Cash with Trustless Network Services Greg Griffith October 2017 (griffith@cryptounited.io) https://www.ecc.network ECC: Peer-to-Peer Electronic Cash with Trustless Network
More informationActive Planning Committee John Lindsay, Patent Attorney Tony Schuman, Investment Advisor Todd Russell, Gov t Contract Opportunities
Agenda 11:30-11:45 Check-In, networking 11:45-12:45 12:45 Announcements, Networking Active Planning Committee John Lindsay, Patent Attorney Tony Schuman, Investment Advisor Todd Russell, Gov t Contract
More informationSoftware Security. Final Exam Preparation. Be aware, there is no guarantee for the correctness of the answers!
Software Security Final Exam Preparation Note: This document contains the questions from the final exam on 09.06.2017. Additionally potential questions about Combinatorial Web Security Testing and Decentralized
More informationBLOCKCHAIN CADEC Pär Wenåker & Peter Larsson
BLOCKCHAIN CADEC 2018 - Pär Wenåker & Peter Larsson BITCOIN BITCOIN PAPER Posted 31/10 2008 Bitcoin v0.1 released Satoshi Nakamoto satoshi at vistomail.com Thu Jan 8 14:27:40 EST 2009 Previous message:
More information