Coinbit: A Peer-to-Peer Electronic Cash System
|
|
- Bernard Watson
- 5 years ago
- Views:
Transcription
1 Coinbit: A Peer-to-Peer Electronic Cash System Abstract. A solely peer-to-peer version of electronic cash would grant a direct transaction without any third party involved. Digital signatures are part of the solution, but benefits are obsolete if a third party is required to avert double- spending. This paper offers a solution to this problem in proposing a peer-to-peer network. This system timestamps transactions by altercating them into a chain of hash-based proof-of-work, establishing a record that cannot be altered without redoing the proof-of-work. The longest chain serves as a verification of the sequence of events, moreover it substantiates that it came from the largest pool of CPU power. As long as a majority of CPU power is controlled by nodes that are not attacking the network, they will generate the longest chain and excel attackers. For this network a minimal structure is needed. Information flow is broadcasted on a best effort basis, and nodes can come and go to the network without restraint, accepting the longest proof-of-work chain as proof of what occurred during their absence. 1. Introduction Trade on the Internet has come to depend almost entirely on financial institutions serving as a trustworthy party to process electronic remittances. This system suffers from the inherent weaknesses of the trust-based model. Non-reversible transactions cannot be executed, since financial institutions cannot avoid interfering in those matters. The cost of mediation increases expenditure. It also limits the transaction size and cuts off the option for minor casual transactions. Furthermore it leads to an augmenting amount of costs with regard to making non-reversible payments for non-reversible services. With each option of reversal, the need for a trustworthy party advances. Consequently merchants have to ask their customers for more information than normally required. Fraud is therefore being regarded as inevitable to a certain extent. These uncertainties can be evaded by using physical currency, but there seems to be no system to proceed payments without an additional trustworthy party. To improve this an electronic payment system based on cryptographic proof should be implemented instead the system of trust. This would enable parties to transact directly without any further party involved. Transactions that cannot be reversed would protect sellers from fraud, and security mechanisms could easily be installed to protect buyers. This paper proposes a solution to this problem using a peer-to-peer distributed timestamp server to generate proof of the chronological transaction order. The system is secure as long as genuine nodes hold more CPU power than any colluding attackers. 1
2 2. Transactions An electronic coin is defined as a chain of digital signatures. Each proprietor remits one coin to the next by digitally signing a hash of the previous transaction and the public key of the next owner and summate these to the end of the coin. A payee can then verify the signatures to verify this chain of proprietorship. The predicament is that the payee cannot verify that the coin has not been double-spent by one of the previous owners. To date a common solution has been to introduce a trustworthy authority, or mint, that investigates every remittance concerning double-spending. After each transaction, the coin must be returned to the mint in order to issue a new one. Only those coins issued directly from this authority are trusted not to be double-spent. The dilemma of this system is that its destiny relies on the institution operating the mint as every transaction has to go through it. The payee needs to know that the previous owners did not sign any earlier transactions. To achieve our objective it is solely the earliest transaction that matters. Consequently any further attempt of double-spending does not have to be considered. The only way to confirm the lack of a transaction is to be aware of all previous ones. In the mint-based model, all transactions were scrutinised and it was then decided which one has been the first to be proceeded. To achieve this without a trustworthy party, transactions must be publicly announced. Additionally a system is required for participants to agree on a single succession history of received transactions. The payee needs a verification that at the time of every transaction, the latter has been the first to be received compared to the majority of further existing ones. 3. Timestamp Server The solution proposed in this paper initiates with a timestamp server. This component works by taking a hash of a block of items to be timestamped and publishing the hash, such as in a newspaper. The timestamp authenticates that the data must have existed at the time in order to get into the hash. Each timestamp includes the previous one in its hash, forming a chain, with each additional timestamp reinforcing the previous ones. 2
3 4. Proof-of-Work To implement such a timestamp server on a peer-to-peer basis, a proof-of-work system similar to Adam Back s Hashcash is necessary, rather than newspaper or Usenet posts. This system includes scanning for a value that when hashed, the hash starts with a number of zero bits. The average work needed is exponential to the number of zero bits required and can be verified by producing a single hash. For the timestamp network proposed in this paper, the proof-of-work is implemented by incrementing a nonce in the block until a value is found that gives the block s hash the required zero bits. Once the CPU effort has been expended to achieve a satisfactory proof-of-work, the block cannot be altered without redoing everything. The procedure of adjusting one block would include redoing all the blocks succeeding it. With this the proof-of-work also solves the problem of determining representation in majority decision making. If the majority were based on one-ip-address-one-vote, it could be sabotaged by anyone able to allocate many IPs. The core of the proof-of-work is a one-cpu-one-vote. The majority decision is represented by the longest chain, which has the largest proof-of-work effort implemented in it. If a majority of CPU power is controlled by genuine nodes, this very chain will grow the fastest and outpace any competing ones. To modify a previous block, an attacker would have to redo the proof-of-work of the block and all subsequent blocks and then catch up with and surpass the work of the genuine nodes. It will be demonstrated later in this paper that the probability of a slow attack advancing declines exponentially as following blocks are added. To compensate for increasing hardware speed and varying interest in running nodes over time, the proof-of-work difficulty is determined by a moving average targeting an average number of blocks per hour. If they are generated too quickly, the predicament accumulates. 5. Network Here are the steps explaining how to run the network: 1) New transactions are being broadcasted to all nodes. 2) Each node transfers new transactions into a block. 3) Each node works on finding a difficult proof-of-work for its block. 4) When a node finds a proof-of-work, it sends the block to all nodes. 5) Nodes accept the block only if all transactions in it are valid and not already spent. 6) Nodes express their acceptance of the block by creating the next block in the chain, using the hash of the accepted block as the previous hash. The longest chain is always considered by the nodes to be the correct one and they will keep working on its extension. If two nodes send varying versions of the next block simultaneously, some nodes may receive one or the other first. In that case, they work on the first one they acquired, but save the other branch in case it is extended. This connection will be interrupted when the next proof-of-work is found and one branch elongated. The nodes that were working on the other branch will consequently switch to the longer one. 3
4 New transaction procedures do not automatically have to influence all nodes. As long as many nodes are contacted, they will get into a block immediately. Block broadcasts are also tolerant of lost messages. If a node does not receive a block, it will request it when it acquires the subsequent block and realizes it missed one. 6. Incentive The first transaction in a block is a special one that starts a new coin owned by the initiator of the block. This adds an enticement for nodes to support the network. It also provides a way to distribute coins into circulation initially, since no authority issues them. The steady addition of new coins can be compared with the gold miners method in using resources in such a way that includes an addition to gold to circulation. In this present case, it is CPU time and electricity that are consumed. The enticement can also be supported with transaction fees. If the output value of a transaction is less than its input value, the difference is a transaction fee that is added to the incentive value of the block containing the transaction. Once a predetermined number of coins have entered circulation, the incentive can transform entirely into transaction fees and therefore be utterly without inflation free. The incentive may help stimulate nodes to stay authentic. If an attacker can assemble more CPU power than all the authentic nodes, this person would have to choose between using it to defraud people by gaining his payments illegally or using it to create new coins. It might be more profitable for the attacker to play by the rules. Those regulations would rather favour him with a large quantity of new coins than any other party involved, than impairing the system and the value of his own wealth. 7. Reclaiming Disk Space Once the latest transaction in a coin is buried under a sufficient amount of blocks, the transactions made before can be discarded in order to preserve disk space. To achieve this without breaking the block s hash, transactions are hashed in a Merkle Tree, with only the root included in the block s hash. Old blocks can consequently be compacted by taking off branches of that organigram. The interior hashes do not have to be kept. A block header with no transactions would be about 80 bytes. If we suppose blocks are generated every 10 minutes, 80 bytes * 6 * 24 * 365 = 4.2MB per year. With computer systems typically selling with 2GB of RAM as of 2008, and Moore s Law predicting current growth of 1.2GB per year, storage should not be a problem even if the block headers must be kept in memory. 4
5 8. Simplified Payment Verification To authenticate payments without running a complete network node is feasible. The only item needed is a copy of the block headers of the longest proof-of-work chain, which he can get by querying network nodes until he is persuaded he has the longest chain, and obtain the Merkle branch linking the transaction to the block it is timestamped in. He cannot check the transaction for himself, but by connecting it to a place in the chain, he learns that a network node has accepted it, and blocks summated after it further confirm the network has approved it. In essence, the verification is sound as long as genuine nodes control the network. However it is more vulnerable the moment it is attacked. While network nodes can verify transactions on their own, the simplified method can be deceived by an attacker as long as this person can continue to vanquish the network. One protection strategy would be to accept alerts from network nodes as soon as they detect an invalid block, persuading the user s software to download the full block and to confirm the incongruity. Businesses that frequently receive payments will presumably prefer to establish their own nodes in order to achieve independent security and accelerated verification. 9. Combining and Splitting Value It is certainly possible to handle coins on an individual basis, but a separate transaction for every cent during a remittance would be too cumbersome a method. To allow the splitting and combining of a value, transactions consist of multiple inputs and outputs. As a rule there are two kinds of inputs: either a single input from a larger previous transaction or multiple inputs connecting minor amounts. And furthermore there are at most two outputs: one for the payment, and one returning the change back to the sender. 5
6 It is worth being mentioned that in this paper it is not considered a problem where a transaction relies on several ones, and those transactions respectively depend on many more. In such a case it is not necessary to excerpt a single copy of a transaction s history. 10. Privacy With the help of our traditional banking model a level of privacy is accomplished by limiting access to information to the parties involved and the reliable third party. This procedure consequently demands that all transactions are publicly announced. Privacy however can still be preserved by interrupting the flow of information: by keeping public keys anonymous. The only aspect the public can learn is that a party is sending an amount of coins to someone else, but without any further information provided as to the addressee s identity. Stock exchanges operate in an equivalent manner. A new key pair should be used as an additional firewall for each transaction to prevent them from being connected with an ordinary proprietor. Nonetheless a certain quantity of connection cannot be averted with multi-input transactions, which reveal that their inputs were owned by the same proprietor. This method contains the possibility that if the owner of a key is exposed, this could reveal other transactions conducted by the same person. 11. Calculations In this paragraph we take the liberty to construct a scenario of an attacker trying to create an alternate chain faster than the genuine one. Even if this is successful, the system is not succumbed to erratic changes, such as unreasonably creating value or taking money that the attacker could not possibly claim to be his. An invalid transaction will not be approved by nodes as payment, and authentic nodes will therefore never accept a block containing them. The only way an attacker can achieve to alter one of his own transactions is to retrieve the amount he has recently spent. The competition between those two chains, i.e. the genuine one and the one being attacked can be declared as a Binomial Random Walk. The successful event is the genuine chain being extended by one block, increasing its lead by +1, and the failing event is the attacker s chain being extended by one block, reducing the gap by -1. 6
7 The probability of an attacker trying to progress from a given deficit is akin to a Gambler s Ruin predicament. Suppose a gambler with unlimited credit starts at a deficit and plays potentially an infinite number of trials trying to reach breakeven. The probability he ever reaches breakeven, or that an attacker ever catches up with the honest chain, can be described as follows: p = probability an honest node finds the next block q = probability the attacker finds the next block q = probability the attacker will ever catch up from z blocks behind 1 When p > q, the probability falls exponentially to the number of blocks the attacker has to progress with augmentations. If he does not succeed, his chances decrease immediately as he fails to proceed. The following part will reveal how long the recipient of a new transaction needs to wait before he can be certain the sender cannot alter the transaction any more. Moreover it is assumed the sender is an attacker trying to make the recipient believe he paid him for the time being but after a certain period of time remits the amount back to himself. As soon as this occurs the receiver will be alerted and respectively the perpetrator hopes for a belated reaction. A new key pair is created by the recipient and he provides the public key to the sender shortly before signing. This way it is avoided that a chain of blocks is altered beforehand. The dishonest sender is persistently producing a transaction which he is about to proceed shortly afterwards. Once this has been executed, this sender starts working covertly on a substitute transaction. Meanwhile the recipient waits until this transaction has been added to a block and all subsequent ones have been connected. The exact content of the attacker s work is not revealed to the receiver. Should the time per each genuine block be as awaited, the attacker s improvement will be a Poisson distribution: λ Assuming the attacker is continuously progressing, the Poisson density is multiplied for each amount of progress that is made at that very moment: λ 0 1 Rearranging to avoid constituting the infinite tail of the distribution... 7
8 Converting to C code... #include <math.h> double AttackerSuccessProbability(double q, int z) { double p = q; double lambda = z * (q / p); double sum = 1.0; int i, k; for (k = 0; k <= z; k++) { double poisson = exp(-lambda); for (i = 1; i <= k; i++) poisson *= lambda / i; sum -= poisson * (1 - pow(q / p, z - k)); } return sum; } We can finally learn the probability declining exponentially with z. q=0.1 z=0 P= z=1 P= z=2 P= z=3 P= z=4 P= z=5 P= z=6 P= z=7 P= z=8 P= z=9 P= z=10 P= q=0.3 z=0 P= z=5 P= z=10 P= z=15 P= z=20 P= z=25 P= z=30 P= z=35 P= z=40 P= z=45 P= z=50 P=
9 Solving for P less than 0.1%... P < q=0.10 z=5 q=0.15 z=8 q=0.20 z=11 q=0.25 z=15 q=0.30 z=24 q=0.35 z=41 q=0.40 z=89 q=0.45 z= Conclusion This paper introduced a new system concerning electronic transaction save a third trustworthy party. At the beginning the common transaction of coins made from digital signatures has been presented. This method offers a sound control of proprietorship. However it is incomplete as it does not provide means to stop double-spending. As a solution to this problem this paper introduces a peer-to-peer network using proof-ofwork to establish a public history of transactions. In this way it will be computationally impossible for an attacker to alter authentic nodes as long as these control a majority of CPU power. This network provides a very sound basis because of its inherent unregulated structure. Nodes work simultaneously with hardly any coordination. Their identity does not have to be verified as their messages are not routed to any place in particular. They only have to be delivered the best way possible. Nodes can come and go to the network arbitrarily, accepting the proof-of-work chain as a verification during their absence. They rule with their CPU power, showing their acceptance of valid blocks by extending them and rejecting invalid blocks by refusing to work on them. Any rules and enticements necessary can be administered by this system. 9
Bitcoin: A Peer-to-Peer Electronic Cash System
Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto satoshi@vistomail.com www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online payments to be sent directly
More informationBitcoin: A Peer-to-Peer Electronic Cash System
Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto satoshin@gmx.com www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online payments to be sent directly
More informationCRUDE COINS. https://crudecoins.net
CRUDE COINS https://crudecoins.net In this whitepaper we have presented Crude Coins is a brand new technology for securely transferring money between anonymous peers. Introduction: Launch story: CrudeCoins
More informationBitcoin Candy A Peer-to-Peer Electronic Cash System
Bitcoin Candy A Peer-to-Peer Electronic Cash System Elon M elon.m@bitcoincandy.global www.bitcoincandy.global Table of Contents 1. Legal disclaimer 2 2. Introduction 3 3. Technical Specification 3 4. Transactions
More informationWhitepaper Rcoin Global
Whitepaper Rcoin Global SUMMARY 1. Introduction 2. What is Rcoin Global? 3. Transactions 4. Hybrid Network Concept 5. Keepers 6. Incentive 7. Smart Contract Token 8. Token Distribution 9. Rcoin Global
More informationMegacoin: A Peer-to-Peer Electronic Cash System. https://megacoin.eu/ https://github.com/limxtec/megacoin https://github.com/limxtec/megacoin/releases
4 8 S Megacoin: A Peer-to-Peer Electronic Cash System https://megacoin.eu/ https://github.com/limxtec/megacoin https://github.com/limxtec/megacoin/releases o, i f t THE MEGACOIN BLOCKCHAIN First Block:
More informationChapter 13. Digital Cash. Information Security/System Security p. 570/626
Chapter 13 Digital Cash Information Security/System Security p. 570/626 Introduction While cash is used in illegal activities such as bribing money laundering tax evasion it also protects privacy: not
More informationEnsimag - 4MMSR Network Security Student Seminar. Bitcoin: A peer-to-peer Electronic Cash System Satoshi Nakamoto
Ensimag - 4MMSR Network Security Student Seminar Bitcoin: A peer-to-peer Electronic Cash System Satoshi Nakamoto wafa.mbarek@ensimag.fr halima.myesser@ensimag.fr 1 Table of contents: I- Introduction: Classic
More informationBARTER TO BITCOIN: THE CHANGING VISAGE OF TRANSACTIONS
www.elkjournals.com BARTER TO BITCOIN: THE CHANGING VISAGE OF TRANSACTIONS Devansh Awasthi Scholar, National Institute of Technology, Jaipur Nitisha Gitarattan International Business School, Delhi ABSTRACT
More informationBYZANTINE CONSENSUS THROUGH BITCOIN S PROOF- OF-WORK
Informatiemanagement: BYZANTINE CONSENSUS THROUGH BITCOIN S PROOF- OF-WORK The aim of this paper is to elucidate how Byzantine consensus is achieved through Bitcoin s novel proof-of-work system without
More informationComputer Security. 14. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2019
Computer Security 14. Blockchain & Bitcoin Paul Krzyzanowski Rutgers University Spring 2019 April 15, 2019 CS 419 2019 Paul Krzyzanowski 1 Bitcoin & Blockchain Bitcoin cryptocurrency system Introduced
More informationIntroduction to Bitcoin I
Introduction to Bitcoin I P Peterlongo 1 A Tomasi 1 1 University of Trento Department of Mathematics June 10, 2013 Outline 1 Fiat and online payments Functions of Online payments and cost of clearing 2
More informationBiomedical Security. Cipher Block Chaining and Applications
1 Biomedical Security Erwin M. Bakker 2 Cipher Block Chaining and Applications Slides and figures are adapted from: W. Stallings, Cryptography and Network Security 4 th Edition and 7 th Edition 1 3 Block
More informationBiomedical Security. Some Security News 10/5/2018. Erwin M. Bakker
Biomedical Security Erwin M. Bakker Some Security News October 03, 2018 - Hackers attacking healthcare through remote access systems and disrupting operations is the number one patient safety risk, according
More informationENEE 457: E-Cash and Bitcoin
ENEE 457: E-Cash and Bitcoin Charalampos (Babis) Papamanthou cpap@umd.edu Money today Any problems? Cash is cumbersome and can be forged Credit card transactions require centralized online bank are not
More informationCCP: Conflicts Check Protocol for Bitcoin Block Security 1
CCP: Conflicts Check Protocol for Bitcoin Block Security Chen Yang Peking University, China yc900@pku.edu.cn Abstract In this work, we present our early stage results on a Conflicts Check Protocol (CCP)
More informationCS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University
CS 4770: Cryptography CS 6750: Cryptography and Communication Security Alina Oprea Associate Professor, CCIS Northeastern University March 30 2017 Outline Digital currencies Advantages over paper cash
More informationTransactions as Proof-of-Stake! by Daniel Larimer!
Transactions as Proof-of-Stake by Daniel Larimer dlarimer@invictus-innovations.com November, 28 th 2013 Abstract The concept behind Proof-of-Stake is that a block chain should be secured by those with
More informationWhat is Proof of Work?
What is Proof of Work? Educational Series September 18, 2018 Overview There are many protocols that regulate how nodes on a blockchain achieve consensus, and currently the most popular is proof-of-work.
More informationILCOIN White Paper. In ILCOIN We Trust ILCOIN
ILCOIN White Paper In ILCOIN We Trust ILCOIN ILCOIN Development Team September 2017 TABLE OF CONTENTS WHAT IS ILCOIN WE NEED THINGS THAT DRAW ON THE REVOLUTION OF BITCOIN, BUT BITCOIN ALONE IS NOT GOOD
More informationBitcoin. CS6450: Distributed Systems Lecture 20 Ryan Stutsman
Bitcoin CS6450: Distributed Systems Lecture 20 Ryan Stutsman Material taken/derived from Princeton COS-418 materials created by Michael Freedman and Kyle Jamieson at Princeton University. Licensed for
More informationProblem: Equivocation!
Bitcoin: 10,000 foot view Bitcoin and the Blockchain New bitcoins are created every ~10 min, owned by miner (more on this later) Thereafter, just keep record of transfers e.g., Alice pays Bob 1 BTC COS
More informationTOPPERCASH TOPPERCASH WHITEPAPER REFORM THE BEST OF BLOCKCHAIN
TOPPERCASH TOPPERCASH WHITEPAPER REFORM THE BEST OF BLOCKCHAIN ABSTRACT A PEER-TO-PEER CRYPTO-CURRENCY DESIGN DERIVED FROM SATOSHI NAKAMOTO S BITCOIN. PROOF- OF-STAKE REPLACES PROOF-OF- WORK TO PROVIDE
More informationUntraceable Nym Creation on the Freedom 2.0 Network
Russell Samuels Ed Hawco November 1, 2000 Untraceable Nym Creation on the Freedom 2.0 Network Version 2.0 This whitepaper, targeted at users with a basic understanding of Freedom, describes the Freedom
More informationNeel Gupte. Index Terms Bitcoin, Cryptocurreny, Block Chain, Hashing, Proof-of-Work, Double-spending, Momentum Method, Proof of Stake.
International Journal of Scientific & Engineering Research, Volume 6, Issue 9, September-2015 259 An Analysis of the Hash-Based Proof-of-Work Chain in the Bitcoin Network Neel Gupte Abstract A Bitcoin
More informationBITCOIN MECHANICS AND OPTIMIZATIONS. Max Fang Philip Hayes
1 BITCOIN MECHNICS ND OPTIMIZTIONS Max Fang Philip Hayes 1 Cryptocurrency Mining: Proof-of-Work Consensus Nadir khtar LECTURE OUTLINE 2 1 Intro and Terminology 2 Bitcoin and Consensus 3 Bitcoin Concepts
More informationSmalltalk 3/30/15. The Mathematics of Bitcoin Brian Heinold
Smalltalk 3/30/15 The Mathematics of Bitcoin Brian Heinold What is Bitcoin? Created by Satoshi Nakamoto in 2008 What is Bitcoin? Created by Satoshi Nakamoto in 2008 Digital currency (though not the first)
More informationBlockchain. CS 240: Computing Systems and Concurrency Lecture 20. Marco Canini
Blockchain CS 240: Computing Systems and Concurrency Lecture 20 Marco Canini Credits: Michael Freedman and Kyle Jamieson developed much of the original material. Bitcoin: 10,000 foot view New bitcoins
More informationSecurity Analysis of Bitcoin. Dibyojyoti Mukherjee Jaswant Katragadda Yashwant Gazula
Security Analysis of Bitcoin Dibyojyoti Mukherjee Jaswant Katragadda Yashwant Gazula Security Analysis of Bitcoin Introduction How Bitcoin works? Similar peer-to-peer systems Vulnerabilities and solutions
More informationBitcoin (Part I) Ken Calvert Keeping Current Seminar 22 January Keeping Current 1
Bitcoin (Part I) Ken Calvert Keeping Current Seminar 22 January 2014 2014.01.22 Keeping Current 1 Questions What problem is Bitcoin solving? Where did it come from? How does the system work? What makes
More informationEECS 498 Introduction to Distributed Systems
EECS 498 Introduction to Distributed Systems Fall 2017 Harsha V. Madhyastha Today Bitcoin: A peer-to-peer digital currency Spark: In-memory big data processing December 4, 2017 EECS 498 Lecture 21 2 December
More informationBitcoin and Blockchain
Bitcoin and Blockchain COS 418: Distributed Systems Lecture 18 Zhenyu Song [Credit: Selected content adapted from Michael Freedman. Slides refined by Chris Hodsdon and Theano Stavrinos] Why Bitcoin? All
More informationUniversity of Duisburg-Essen Bismarckstr Duisburg Germany HOW BITCOIN WORKS. Matthäus Wander. June 29, 2011
University of Duisburg-Essen Bismarckstr. 90 47057 Duisburg Germany HOW BITCOIN WORKS June 29, 2011 Overview Electronic currency system Decentralized No trusted third party involved Unstructured peer-to-peer
More informationOn the impact of propogation delay on mining rewards in Bitcoin. Xuan Wen 1. Abstract
On the impact of propogation delay on mining rewards in Bitcoin Xuan Wen 1 Abstract Bitcoin 2 is a decentralized digital currency that is rapidly gaining in popularity. The Bitcoin system relies on miners
More informationApplied cryptography
Applied cryptography Electronic Cash Andreas Hülsing 29 November 2016 1 / 61 Classical Cash - Life Cycle Mint produces money (coins / bank notes) Sent to bank User withdraws money (reduces account balance)
More informationA Gentle Introduction To Bitcoin Mining
A Gentle Introduction To Bitcoin Mining Table of Contents Title...3 How Do Bitcoin Transactions Work?...4 Why Is Mining Needed In Bitcoin?...5 Why Do Miners Mine?...6 What Is This Computationally Expensive
More informationA simple approach of Peer-to-Peer E-Cash system
A simple approach of Peer-to-Peer E-Cash system Mr. Dharamvir, Mr. Rabinarayan Panda Asst. Professor, Dept. of MCA, The Oxford College of Engineering Bangalore, India. Abstract-With the popularization
More informationA Lightweight Blockchain Consensus Protocol
A Lightweight Blockchain Consensus Protocol Keir Finlow-Bates keir@chainfrog.com Abstract A lightweight yet deterministic and objective consensus protocol would allow blockchain systems to be maintained
More informationHow Bitcoin achieves Decentralization. How Bitcoin achieves Decentralization
Centralization vs. Decentralization Distributed Consensus Consensus without Identity, using a Block Chain Incentives and Proof of Work Putting it all together Centralization vs. Decentralization Distributed
More informationIAME: An Expert System for Blockchain Identity Verification
IAME: An Expert System for Blockchain Identity Verification Nathaniel Tsang Mang Kin Suryani Chang www.iame.io Abstract. A decentralized identification system that would allow parties performing Blockchain
More informationECC: Peer-to-Peer Electronic Cash with Trustless Network Services
ECC: Peer-to-Peer Electronic Cash with Trustless Network Services Greg Griffith October 2017 (griffith@cryptounited.io) https://www.ecc.network ECC: Peer-to-Peer Electronic Cash with Trustless Network
More informationUpgrading Bitcoin: Segregated Witness. Dr. Johnson Lau Bitcoin Core Contributor Co-author of Segregated Witness BIPs March-2016
Upgrading Bitcoin: Segregated Witness Dr. Johnson Lau Bitcoin Core Contributor Co-author of Segregated Witness BIPs 141-143 16-March-2016 Topics A short introduction to Bitcoin transactions What is transaction
More informationPrivacy-Enabled NFTs: User-Mintable, Non-Fungible Tokens With Private Off-Chain Data
Privacy-Enabled NFTs: User-Mintable, Non-Fungible Tokens With Private Off-Chain Data Philip Stehlik Lucas Vogelsang August 8, 2018 1 Abstract Privacy-enabled NFTs (non-fungible tokens) are user-mintable
More informationThe Design of an Anonymous and a Fair Novel E-cash System
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 2, Number 2 (2012), pp. 103-109 International Research Publications House http://www. ripublication.com The Design of
More informationP2P BitCoin: Technical details
ELT-53206 Peer-to-Peer Networks P2P BitCoin: Technical details Mathieu Devos Tampere University of Technology Department of Electronics & Communications Engineering mathieu.devos@tut.fi TG406 2 Outline
More informationBitcoin. Arni Par ov. December 17, 2013
Bitcoin Arni Par ov December 17, 2013 Abstract Bitcoin is a distributed, peer-to-peer cryptocurrency that functions without any central authority and in recent years has gained large popularity. This paper
More informationConsensus & Blockchain
Consensus & Blockchain S P Suresh Chennai Mathematical Institute Formal Methods Update Meeting IIT Mandi July 17, 2017 The Bitcoin revolution is upon us What is Bitcoin? Bitcoin: an exciting new currency
More informationReliability, distributed consensus and blockchain COSC412
Reliability, distributed consensus and blockchain COSC412 Learning objectives Encourage you to always design for failure Appreciate how decentralised consensus is useful to support principles of security
More informationVersion 0.7. GoldCoin Patch Announcement. What is a 51% attack. The impossible made possible
Version 0.7 www.gldcoin.com www.gldtalk.org October 11 2013 GoldCoin Patch Announcement Welcome to the GoldCoin minor version 7 announcement. We have some fantastic news for you folks today. We have at
More informationBitcoin a Peer-to-Peer payment solution
Bitcoin a Peer-to-Peer payment solution [Security Considerations] Jean-Guillaume Dumas University Joseph Fourier Grenoble Jean-Guillaume.Dumas@imag.fr Pascal Sygnet Grenoble INP Ensimag Pascal.Sygnet @Phelma.Grenoble-inp.fr
More informationSharding. Making blockchains scalable, decentralized and secure.
Sharding Making blockchains scalable, decentralized and secure. The Scalability Triangle Scalability Decentralization Semi-formally defining these properties Assume the total computational/bandwidth capacity
More informationAlternative Consensus Algorithms. Murat Osmanoglu
Alternative Consensus Algorithms Murat Osmanoglu Bitcoin Block i-1 Block i Block i+1 Hash i-2 Nonce i-1 Hash i-1 Nonce i Hash i Nonce i+1 tx tx tx tx tx tx tx tx tx tx tx tx Do you really need a Blockchain?
More informationA Step By Step Guide To Use PayPal
A Step By Step Guide To Use PayPal Table of Contents Introduction... 3 Creating an Account... 4 PayPal Verification... 5 Verification Process... 5 Utility of Each Account... 7 Transfer of Funds... 8 Checking
More informationSmartPool: practical decentralized pool mining. Loi Luu, Yaron Velner, Jason Teutsch, and Prateek Saxena August 18, 2017
SmartPool: practical decentralized pool mining Loi Luu, Yaron Velner, Jason Teutsch, and Prateek Saxena August 18, 2017 Mining pools Miners role in cryptocurrencies Definition: A cryptocurrency is a decentralized
More informationIntroduction to Cryptography in Blockchain Technology. December 23, 2018
Introduction to Cryptography in Blockchain Technology December 23, 2018 What is cryptography? The practice of developing protocols that prevent third parties from viewing private data. Modern cryptography
More informationSCP: A Computationally Scalable Byzantine Consensus Protocol for Blockchains
SCP: A Computationally Scalable Byzantine Consensus Protocol for Blockchains Loi Luu, Viswesh Narayanan, Kunal Baweja, Chaodong Zheng, Seth Gilbert, Prateek Saxena National University of Singapore Bitcoin
More informationTechnical White Paper. Cube Engine Version 1.0
Technical White Paper Cube Engine Version 1.0 Last Updated: Feb 06. 2018 1 Contents 1. Summary 1) Introduction 2) Overview 2. Features of Cube Chain 1) Cubing 2) Indexing Block 3) Statistics Block 4) Escrow
More informationJan Møller Co-founder, CTO Chainalysis
Jan Møller Co-founder, CTO Chainalysis How Does Bitcoin Actually Work? This talk is not about the poli:cal or economical impact of Bitcoin. This talk is not about how to buy, sell, spend, or secure your
More informationOpenbankIT: a banking platform for e- money management based on blockchain technology
OpenbankIT: a banking platform for e- money management based on blockchain technology Dr. Pavel Kravchenko, Sergiy Vasilchuk, Bohdan Skriabin pavel@distributedlab.com, vsv@atticlab.net, bohdan@distributedlab.com
More informationDigital Cash Systems
Digital Cash Systems Xiang Yin Department of Computer Science McMaster University December 1, 2010 Outline 1 Digital Cash 2 3 4 5 Digital Cash Overview Properties Digital Cash Systems Digital Cash Digital
More informationBitBill: Scalable, Robust, Verifiable Peer-to-Peer Billing for Cloud Computing
BitBill: Scalable, Robust, Verifiable Peer-to-Peer Billing for Cloud Computing Li Chen, Kai Chen SING Lab Computer Science and Engineering Hong Kong University of Science and Technology Trust in the Cloud
More informationSecurity (and finale) Dan Ports, CSEP 552
Security (and finale) Dan Ports, CSEP 552 Today Security: what if parts of your distributed system are malicious? BFT: state machine replication Bitcoin: peer-to-peer currency Course wrap-up Security Too
More informationICS 421 & ICS 690. Bitcoin & Blockchain. Assoc. Prof. Lipyeow Lim Information & Computer Sciences Department University of Hawai`i at Mānoa
ICS 421 & ICS 690 Bitcoin & Blockchain Assoc. Prof. Lipyeow Lim Information & Computer Sciences Department University of Hawai`i at Mānoa Accepted by: Overstock.com Expedia.com Newegg.com Tigerdirect.com
More informationAnalyzing Bitcoin Security. Philippe Camacho
Analyzing Bitcoin Security Philippe Camacho philippe.camacho@dreamlab.net Universidad Católica, Santiago de Chile 15 of June 2016 Bitcoin matters Map Blockchain Design Known Attacks Security Models Double
More informationBurstcoin Technical information about mining and block forging
Burstcoin Technical information about mining and block forging Table of contents 1. Introduction 2. Algorithms and Acronyms 3. Mining process 4. Block forging process Introduction With most cryptocurrencies
More informationBlockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric
Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Elli Androulaki Staff member, IBM Research, Zurich Workshop on cryptocurrencies Athens, 06.03.2016 Blockchain systems
More informationBlockchain Certification Protocol (BCP)
Blockchain Certification Protocol (BCP) Fu Yong Quah fuyong@fyquah.me www.fyquah.me Abstract. A semi-decentralized certification system built above the existing 1 Bitcoin network, an innovative peer-to-peer
More informationToken White Paper. Global marketplace based on Block chain for small-scale business I ver P a g e
Token White Paper Global marketplace based on Block chain for small-scale business 1 P a g e 2018 I ver. 1.0 Contents Qatar Coin Token 3 Contents 4 1. What is QatarCoin 5 2. What is a digital currency
More informationCryptography and Network Security Chapter 14
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture
More informationCS 251: Bitcoin and Crypto Currencies Fall 2015
CS 251: Bitcoin and Crypto Currencies Fall 2015 Final Exam The exam is open book and open notes. You have 2 hours. Please answer all five questions. All questions are weighted equally. You may use course
More informationGENESIS VISION NETWORK
GENESIS VISION NETWORK Contents 1. Description of the problem 7 11. Trust management 15 2. The problem with smart contracts 8 12. GVN Token 16 3. Centralised exchanges against decentralised 8 13. Deposit
More informationBITCOIN PROTOCOL & CONSENSUS: A HIGH LEVEL OVERVIEW
BITCOIN PROTOCOL & CONSENSUS: A HIGH LEVEL OVERVIEW Rustie Lin Wang Move the area1 over the image a little inside and then right click, replace image to change the background. (and delete this box while
More informationIntForex demonstration bank account list IntForex demonstration rates IntForex demonstration rates... 22
Table of Contents int-forex.com Home screen... 3 IntForex registration... 4 IntForex activation... 6 IntForex login... 8 IntForex home... 8 IntForex exchange rates... 9 IntForex client functions... 10
More informationPayment systems. Tuomas Aura CSE-C3400 Information security. Aalto University, autumn 2014
Payment systems Tuomas Aura CSE-C3400 Information security Aalto University, autumn 2014 1. Card payments Outline 2. Anonymous payments and BitCoin 2 CARD PAYMENT 3 Bank cards Credit or debit card Card
More informationDICE. Brief Overview Book. A New Generation Social Cryptocurrency. March DICE Money. Revision 2
DICE A New Generation Social Cryptocurrency Brief Overview Book Revision 2 March 2018 DICE Money 2018 This document is dated Tuesday, 03 April 2018. The provisions of this document are privileged and confidential.
More informationGroup means any company within the STB Leasing Limited s group of companies and/or the ThinkSmart group of companies.
PRIVACY DECLARATION In this Privacy Declaration, unless the context otherwise requires: We, us, our means STB Leasing Limited, and/or RentSmart Limited trading as ThinkSmart ( ThinkSmart / we / us ), and
More informationProof-of-Work & Bitcoin
CS 220: Introduction to Parallel Computing Proof-of-Work & Bitcoin Lecture 19 Bitcoin: Mining for Heat https://qz.com/1117836/bitcoin-mining-heatshomes-for-free-in-siberia/ 4/25/18 CS 220: Parallel Computing
More informationFinancial CISM. Certified Information Security Manager (CISM) Download Full Version :
Financial CISM Certified Information Security Manager (CISM) Download Full Version : http://killexams.com/pass4sure/exam-detail/cism required based on preliminary forensic investigation, but doing so as
More informationHawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. Yashar Dehkan Asl
Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts Yashar Dehkan Asl Chapter I Introduction Decentralized Cryptocurrencies: Such as Bitcoin and altcoins are getting more
More informationMaking Decryption Accountable
Making Decryption Accountable Mark D. Ryan University of Birmingham Abstract. Decryption is accountable if the users that create ciphertexts can gain information about the circumstances of the decryptions
More informationProof-of-Stake Protocol v3.0
Proof-of-Stake Protocol v3.0 Abstract Proof of Stake's security has proven itself reliable & effective over years of testing while at the same time solving Bitcoin s issues caused by the Proof of Work
More informationBUZCOIN TOKENS SALE PRIVACY POLICY. Last updated:
BUZCOIN TOKENS SALE PRIVACY POLICY Last updated: 20.10.2018 STATUS AND ACCEPTANCE OF PRIVACY POLICY 1. This Privacy Policy (hereinafter referred to as the Policy ) sets forth the general rules of Participant
More informationOTP Server Authentication System Authentication Schemes V1.0. Feitian Technologies Co., Ltd. Website:
OTP Server Authentication System Authentication Schemes V1.0 Feitian Technologies Co., Ltd. Revision History: Date Revision Description Mar. 2010 V1.0 Release of the first version i Software Developer
More informationBitcoin, Security for Cloud & Big Data
Bitcoin, Security for Cloud & Big Data CS 161: Computer Security Prof. David Wagner April 18, 2013 Bitcoin Public, distributed, peer-to-peer, hash-chained audit log of all transactions ( block chain ).
More informationAs a 3rd generation currency, not only are transactions secured, private and fast, you actually get paid for holding DigitalPrice coins.
Introduction With the circulation of cryptocurrency becoming common, there is a need for additional information. The scope of this white paper is to provide that information. If you are under the impression
More informationBitcoin, a decentralized and trustless protocol
Bitcoin, a decentralized and trustless protocol Thomas Sibut-Pinote Inria Saclay February 12, 2015 Thomas Sibut-Pinote Bitcoin, a decentralized and trustless protocol 1 / 42 Introduction Questions 1 Introduction
More informationBitcoin. Tom Anderson
Bitcoin Tom Anderson Admin Course evals My office hours next week are cancelled Bitcoin Goal Electronic money without trust $34B market value Created out of thin air, from a paper + some code Pros/cons
More informationA Mathematical Proof. Zero Knowledge Protocols. Interactive Proof System. Other Kinds of Proofs. When referring to a proof in logic we usually mean:
A Mathematical Proof When referring to a proof in logic we usually mean: 1. A sequence of statements. 2. Based on axioms. Zero Knowledge Protocols 3. Each statement is derived via the derivation rules.
More informationZero Knowledge Protocols. c Eli Biham - May 3, Zero Knowledge Protocols (16)
Zero Knowledge Protocols c Eli Biham - May 3, 2005 442 Zero Knowledge Protocols (16) A Mathematical Proof When referring to a proof in logic we usually mean: 1. A sequence of statements. 2. Based on axioms.
More informationYada. A blockchain-based social graph
Yada A blockchain-based social graph January 2018 Abstract The goal of Yada is to achieve an acceptable level anonymity, privacy, and freedom of expression while making available to the public a structure
More informationInterac e-transfer Terms and Conditions
Interac e-transfer Terms and Conditions 1. What the Words Mean: In this Interac e-transfer Terms and Conditions document (the Agreement ), please remember that: "I", "me", "my", you, ICICI Bank Customer
More informationAnupam Datta CMU. Fall 2015
Anupam Datta CMU Fall 2015 A rational reconstruction of Bitcoin 1. Start with straw man design 2. Identify weaknesses 3. Augment design and iterate Alice: I, Alice, am giving Bob one coin Alice digitally
More informationEnhanced Immutability of Permissioned Blockchain Networks by Tethering Provenance with a Public Blockchain Network
Enhanced Immutability of Permissioned Blockchain Networks by Tethering Provenance with a Public Blockchain Network Abstract Azeem Ahmed (azeem.ahmed@consensys.net) Jim Zhang (jim.zhang@consensys.net) Permissioned
More informationCryptographic Checksums
Cryptographic Checksums Mathematical function to generate a set of k bits from a set of n bits (where k n). k is smaller then n except in unusual circumstances Example: ASCII parity bit ASCII has 7 bits;
More informationSpaceMint Overcoming Bitcoin s waste of energy
Bitcoin Overcoming Bitcoin s waste of energy Georg Fuchsbauer joint work with S Park, A Kwon, K Pietrzak, J Alwen and P Gaži Digital currency Decentralized (no bank issuing coins) Pseudonymous Controled
More informationA Review on Blockchain Application for Decentralized Decision of Ownership of IoT Devices
Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 10, Number 8 (2017) pp. 2449-2456 Research India Publications http://www.ripublication.com A Review on Blockchain Application for
More informationNational Travel Associates
National Travel Associates Fraud Prevention Module 2012 National Travel Associates Fraud In The Travel Industry With the popularity of online booking engines in the 90 s there was a huge insurgence of
More informationOutline Key Management CS 239 Computer Security February 9, 2004
Outline Key Management CS 239 Computer Security February 9, 2004 Properties of keys Key management Key servers Certificates Page 1 Page 2 Introduction Properties of Keys It doesn t matter how strong your
More informationBiomedical and Healthcare Applications for Blockchain. Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs
Biomedical and Healthcare Applications for Blockchain Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs Network Analysis Working Group 01.25.2018 Outline Introduction to bitcoin + blockchain
More informationCube Chain Technical White Paper
1 2 Cube Chain Technical White Paper Cube Engine Version 2.0 1. Overview 1.1 Overview Blockchain is an encryption system that creates blocks of data at regular intervals and validates data through hash
More information