Coinbit: A Peer-to-Peer Electronic Cash System

Size: px
Start display at page:

Download "Coinbit: A Peer-to-Peer Electronic Cash System"

Transcription

1 Coinbit: A Peer-to-Peer Electronic Cash System Abstract. A solely peer-to-peer version of electronic cash would grant a direct transaction without any third party involved. Digital signatures are part of the solution, but benefits are obsolete if a third party is required to avert double- spending. This paper offers a solution to this problem in proposing a peer-to-peer network. This system timestamps transactions by altercating them into a chain of hash-based proof-of-work, establishing a record that cannot be altered without redoing the proof-of-work. The longest chain serves as a verification of the sequence of events, moreover it substantiates that it came from the largest pool of CPU power. As long as a majority of CPU power is controlled by nodes that are not attacking the network, they will generate the longest chain and excel attackers. For this network a minimal structure is needed. Information flow is broadcasted on a best effort basis, and nodes can come and go to the network without restraint, accepting the longest proof-of-work chain as proof of what occurred during their absence. 1. Introduction Trade on the Internet has come to depend almost entirely on financial institutions serving as a trustworthy party to process electronic remittances. This system suffers from the inherent weaknesses of the trust-based model. Non-reversible transactions cannot be executed, since financial institutions cannot avoid interfering in those matters. The cost of mediation increases expenditure. It also limits the transaction size and cuts off the option for minor casual transactions. Furthermore it leads to an augmenting amount of costs with regard to making non-reversible payments for non-reversible services. With each option of reversal, the need for a trustworthy party advances. Consequently merchants have to ask their customers for more information than normally required. Fraud is therefore being regarded as inevitable to a certain extent. These uncertainties can be evaded by using physical currency, but there seems to be no system to proceed payments without an additional trustworthy party. To improve this an electronic payment system based on cryptographic proof should be implemented instead the system of trust. This would enable parties to transact directly without any further party involved. Transactions that cannot be reversed would protect sellers from fraud, and security mechanisms could easily be installed to protect buyers. This paper proposes a solution to this problem using a peer-to-peer distributed timestamp server to generate proof of the chronological transaction order. The system is secure as long as genuine nodes hold more CPU power than any colluding attackers. 1

2 2. Transactions An electronic coin is defined as a chain of digital signatures. Each proprietor remits one coin to the next by digitally signing a hash of the previous transaction and the public key of the next owner and summate these to the end of the coin. A payee can then verify the signatures to verify this chain of proprietorship. The predicament is that the payee cannot verify that the coin has not been double-spent by one of the previous owners. To date a common solution has been to introduce a trustworthy authority, or mint, that investigates every remittance concerning double-spending. After each transaction, the coin must be returned to the mint in order to issue a new one. Only those coins issued directly from this authority are trusted not to be double-spent. The dilemma of this system is that its destiny relies on the institution operating the mint as every transaction has to go through it. The payee needs to know that the previous owners did not sign any earlier transactions. To achieve our objective it is solely the earliest transaction that matters. Consequently any further attempt of double-spending does not have to be considered. The only way to confirm the lack of a transaction is to be aware of all previous ones. In the mint-based model, all transactions were scrutinised and it was then decided which one has been the first to be proceeded. To achieve this without a trustworthy party, transactions must be publicly announced. Additionally a system is required for participants to agree on a single succession history of received transactions. The payee needs a verification that at the time of every transaction, the latter has been the first to be received compared to the majority of further existing ones. 3. Timestamp Server The solution proposed in this paper initiates with a timestamp server. This component works by taking a hash of a block of items to be timestamped and publishing the hash, such as in a newspaper. The timestamp authenticates that the data must have existed at the time in order to get into the hash. Each timestamp includes the previous one in its hash, forming a chain, with each additional timestamp reinforcing the previous ones. 2

3 4. Proof-of-Work To implement such a timestamp server on a peer-to-peer basis, a proof-of-work system similar to Adam Back s Hashcash is necessary, rather than newspaper or Usenet posts. This system includes scanning for a value that when hashed, the hash starts with a number of zero bits. The average work needed is exponential to the number of zero bits required and can be verified by producing a single hash. For the timestamp network proposed in this paper, the proof-of-work is implemented by incrementing a nonce in the block until a value is found that gives the block s hash the required zero bits. Once the CPU effort has been expended to achieve a satisfactory proof-of-work, the block cannot be altered without redoing everything. The procedure of adjusting one block would include redoing all the blocks succeeding it. With this the proof-of-work also solves the problem of determining representation in majority decision making. If the majority were based on one-ip-address-one-vote, it could be sabotaged by anyone able to allocate many IPs. The core of the proof-of-work is a one-cpu-one-vote. The majority decision is represented by the longest chain, which has the largest proof-of-work effort implemented in it. If a majority of CPU power is controlled by genuine nodes, this very chain will grow the fastest and outpace any competing ones. To modify a previous block, an attacker would have to redo the proof-of-work of the block and all subsequent blocks and then catch up with and surpass the work of the genuine nodes. It will be demonstrated later in this paper that the probability of a slow attack advancing declines exponentially as following blocks are added. To compensate for increasing hardware speed and varying interest in running nodes over time, the proof-of-work difficulty is determined by a moving average targeting an average number of blocks per hour. If they are generated too quickly, the predicament accumulates. 5. Network Here are the steps explaining how to run the network: 1) New transactions are being broadcasted to all nodes. 2) Each node transfers new transactions into a block. 3) Each node works on finding a difficult proof-of-work for its block. 4) When a node finds a proof-of-work, it sends the block to all nodes. 5) Nodes accept the block only if all transactions in it are valid and not already spent. 6) Nodes express their acceptance of the block by creating the next block in the chain, using the hash of the accepted block as the previous hash. The longest chain is always considered by the nodes to be the correct one and they will keep working on its extension. If two nodes send varying versions of the next block simultaneously, some nodes may receive one or the other first. In that case, they work on the first one they acquired, but save the other branch in case it is extended. This connection will be interrupted when the next proof-of-work is found and one branch elongated. The nodes that were working on the other branch will consequently switch to the longer one. 3

4 New transaction procedures do not automatically have to influence all nodes. As long as many nodes are contacted, they will get into a block immediately. Block broadcasts are also tolerant of lost messages. If a node does not receive a block, it will request it when it acquires the subsequent block and realizes it missed one. 6. Incentive The first transaction in a block is a special one that starts a new coin owned by the initiator of the block. This adds an enticement for nodes to support the network. It also provides a way to distribute coins into circulation initially, since no authority issues them. The steady addition of new coins can be compared with the gold miners method in using resources in such a way that includes an addition to gold to circulation. In this present case, it is CPU time and electricity that are consumed. The enticement can also be supported with transaction fees. If the output value of a transaction is less than its input value, the difference is a transaction fee that is added to the incentive value of the block containing the transaction. Once a predetermined number of coins have entered circulation, the incentive can transform entirely into transaction fees and therefore be utterly without inflation free. The incentive may help stimulate nodes to stay authentic. If an attacker can assemble more CPU power than all the authentic nodes, this person would have to choose between using it to defraud people by gaining his payments illegally or using it to create new coins. It might be more profitable for the attacker to play by the rules. Those regulations would rather favour him with a large quantity of new coins than any other party involved, than impairing the system and the value of his own wealth. 7. Reclaiming Disk Space Once the latest transaction in a coin is buried under a sufficient amount of blocks, the transactions made before can be discarded in order to preserve disk space. To achieve this without breaking the block s hash, transactions are hashed in a Merkle Tree, with only the root included in the block s hash. Old blocks can consequently be compacted by taking off branches of that organigram. The interior hashes do not have to be kept. A block header with no transactions would be about 80 bytes. If we suppose blocks are generated every 10 minutes, 80 bytes * 6 * 24 * 365 = 4.2MB per year. With computer systems typically selling with 2GB of RAM as of 2008, and Moore s Law predicting current growth of 1.2GB per year, storage should not be a problem even if the block headers must be kept in memory. 4

5 8. Simplified Payment Verification To authenticate payments without running a complete network node is feasible. The only item needed is a copy of the block headers of the longest proof-of-work chain, which he can get by querying network nodes until he is persuaded he has the longest chain, and obtain the Merkle branch linking the transaction to the block it is timestamped in. He cannot check the transaction for himself, but by connecting it to a place in the chain, he learns that a network node has accepted it, and blocks summated after it further confirm the network has approved it. In essence, the verification is sound as long as genuine nodes control the network. However it is more vulnerable the moment it is attacked. While network nodes can verify transactions on their own, the simplified method can be deceived by an attacker as long as this person can continue to vanquish the network. One protection strategy would be to accept alerts from network nodes as soon as they detect an invalid block, persuading the user s software to download the full block and to confirm the incongruity. Businesses that frequently receive payments will presumably prefer to establish their own nodes in order to achieve independent security and accelerated verification. 9. Combining and Splitting Value It is certainly possible to handle coins on an individual basis, but a separate transaction for every cent during a remittance would be too cumbersome a method. To allow the splitting and combining of a value, transactions consist of multiple inputs and outputs. As a rule there are two kinds of inputs: either a single input from a larger previous transaction or multiple inputs connecting minor amounts. And furthermore there are at most two outputs: one for the payment, and one returning the change back to the sender. 5

6 It is worth being mentioned that in this paper it is not considered a problem where a transaction relies on several ones, and those transactions respectively depend on many more. In such a case it is not necessary to excerpt a single copy of a transaction s history. 10. Privacy With the help of our traditional banking model a level of privacy is accomplished by limiting access to information to the parties involved and the reliable third party. This procedure consequently demands that all transactions are publicly announced. Privacy however can still be preserved by interrupting the flow of information: by keeping public keys anonymous. The only aspect the public can learn is that a party is sending an amount of coins to someone else, but without any further information provided as to the addressee s identity. Stock exchanges operate in an equivalent manner. A new key pair should be used as an additional firewall for each transaction to prevent them from being connected with an ordinary proprietor. Nonetheless a certain quantity of connection cannot be averted with multi-input transactions, which reveal that their inputs were owned by the same proprietor. This method contains the possibility that if the owner of a key is exposed, this could reveal other transactions conducted by the same person. 11. Calculations In this paragraph we take the liberty to construct a scenario of an attacker trying to create an alternate chain faster than the genuine one. Even if this is successful, the system is not succumbed to erratic changes, such as unreasonably creating value or taking money that the attacker could not possibly claim to be his. An invalid transaction will not be approved by nodes as payment, and authentic nodes will therefore never accept a block containing them. The only way an attacker can achieve to alter one of his own transactions is to retrieve the amount he has recently spent. The competition between those two chains, i.e. the genuine one and the one being attacked can be declared as a Binomial Random Walk. The successful event is the genuine chain being extended by one block, increasing its lead by +1, and the failing event is the attacker s chain being extended by one block, reducing the gap by -1. 6

7 The probability of an attacker trying to progress from a given deficit is akin to a Gambler s Ruin predicament. Suppose a gambler with unlimited credit starts at a deficit and plays potentially an infinite number of trials trying to reach breakeven. The probability he ever reaches breakeven, or that an attacker ever catches up with the honest chain, can be described as follows: p = probability an honest node finds the next block q = probability the attacker finds the next block q = probability the attacker will ever catch up from z blocks behind 1 When p > q, the probability falls exponentially to the number of blocks the attacker has to progress with augmentations. If he does not succeed, his chances decrease immediately as he fails to proceed. The following part will reveal how long the recipient of a new transaction needs to wait before he can be certain the sender cannot alter the transaction any more. Moreover it is assumed the sender is an attacker trying to make the recipient believe he paid him for the time being but after a certain period of time remits the amount back to himself. As soon as this occurs the receiver will be alerted and respectively the perpetrator hopes for a belated reaction. A new key pair is created by the recipient and he provides the public key to the sender shortly before signing. This way it is avoided that a chain of blocks is altered beforehand. The dishonest sender is persistently producing a transaction which he is about to proceed shortly afterwards. Once this has been executed, this sender starts working covertly on a substitute transaction. Meanwhile the recipient waits until this transaction has been added to a block and all subsequent ones have been connected. The exact content of the attacker s work is not revealed to the receiver. Should the time per each genuine block be as awaited, the attacker s improvement will be a Poisson distribution: λ Assuming the attacker is continuously progressing, the Poisson density is multiplied for each amount of progress that is made at that very moment: λ 0 1 Rearranging to avoid constituting the infinite tail of the distribution... 7

8 Converting to C code... #include <math.h> double AttackerSuccessProbability(double q, int z) { double p = q; double lambda = z * (q / p); double sum = 1.0; int i, k; for (k = 0; k <= z; k++) { double poisson = exp(-lambda); for (i = 1; i <= k; i++) poisson *= lambda / i; sum -= poisson * (1 - pow(q / p, z - k)); } return sum; } We can finally learn the probability declining exponentially with z. q=0.1 z=0 P= z=1 P= z=2 P= z=3 P= z=4 P= z=5 P= z=6 P= z=7 P= z=8 P= z=9 P= z=10 P= q=0.3 z=0 P= z=5 P= z=10 P= z=15 P= z=20 P= z=25 P= z=30 P= z=35 P= z=40 P= z=45 P= z=50 P=

9 Solving for P less than 0.1%... P < q=0.10 z=5 q=0.15 z=8 q=0.20 z=11 q=0.25 z=15 q=0.30 z=24 q=0.35 z=41 q=0.40 z=89 q=0.45 z= Conclusion This paper introduced a new system concerning electronic transaction save a third trustworthy party. At the beginning the common transaction of coins made from digital signatures has been presented. This method offers a sound control of proprietorship. However it is incomplete as it does not provide means to stop double-spending. As a solution to this problem this paper introduces a peer-to-peer network using proof-ofwork to establish a public history of transactions. In this way it will be computationally impossible for an attacker to alter authentic nodes as long as these control a majority of CPU power. This network provides a very sound basis because of its inherent unregulated structure. Nodes work simultaneously with hardly any coordination. Their identity does not have to be verified as their messages are not routed to any place in particular. They only have to be delivered the best way possible. Nodes can come and go to the network arbitrarily, accepting the proof-of-work chain as a verification during their absence. They rule with their CPU power, showing their acceptance of valid blocks by extending them and rejecting invalid blocks by refusing to work on them. Any rules and enticements necessary can be administered by this system. 9

Bitcoin: A Peer-to-Peer Electronic Cash System

Bitcoin: A Peer-to-Peer Electronic Cash System Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto satoshi@vistomail.com www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online payments to be sent directly

More information

Bitcoin: A Peer-to-Peer Electronic Cash System

Bitcoin: A Peer-to-Peer Electronic Cash System Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto satoshin@gmx.com www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online payments to be sent directly

More information

CRUDE COINS. https://crudecoins.net

CRUDE COINS. https://crudecoins.net CRUDE COINS https://crudecoins.net In this whitepaper we have presented Crude Coins is a brand new technology for securely transferring money between anonymous peers. Introduction: Launch story: CrudeCoins

More information

Bitcoin Candy A Peer-to-Peer Electronic Cash System

Bitcoin Candy A Peer-to-Peer Electronic Cash System Bitcoin Candy A Peer-to-Peer Electronic Cash System Elon M elon.m@bitcoincandy.global www.bitcoincandy.global Table of Contents 1. Legal disclaimer 2 2. Introduction 3 3. Technical Specification 3 4. Transactions

More information

Whitepaper Rcoin Global

Whitepaper Rcoin Global Whitepaper Rcoin Global SUMMARY 1. Introduction 2. What is Rcoin Global? 3. Transactions 4. Hybrid Network Concept 5. Keepers 6. Incentive 7. Smart Contract Token 8. Token Distribution 9. Rcoin Global

More information

Megacoin: A Peer-to-Peer Electronic Cash System. https://megacoin.eu/ https://github.com/limxtec/megacoin https://github.com/limxtec/megacoin/releases

Megacoin: A Peer-to-Peer Electronic Cash System. https://megacoin.eu/ https://github.com/limxtec/megacoin https://github.com/limxtec/megacoin/releases 4 8 S Megacoin: A Peer-to-Peer Electronic Cash System https://megacoin.eu/ https://github.com/limxtec/megacoin https://github.com/limxtec/megacoin/releases o, i f t THE MEGACOIN BLOCKCHAIN First Block:

More information

Chapter 13. Digital Cash. Information Security/System Security p. 570/626

Chapter 13. Digital Cash. Information Security/System Security p. 570/626 Chapter 13 Digital Cash Information Security/System Security p. 570/626 Introduction While cash is used in illegal activities such as bribing money laundering tax evasion it also protects privacy: not

More information

Ensimag - 4MMSR Network Security Student Seminar. Bitcoin: A peer-to-peer Electronic Cash System Satoshi Nakamoto

Ensimag - 4MMSR Network Security Student Seminar. Bitcoin: A peer-to-peer Electronic Cash System Satoshi Nakamoto Ensimag - 4MMSR Network Security Student Seminar Bitcoin: A peer-to-peer Electronic Cash System Satoshi Nakamoto wafa.mbarek@ensimag.fr halima.myesser@ensimag.fr 1 Table of contents: I- Introduction: Classic

More information

BARTER TO BITCOIN: THE CHANGING VISAGE OF TRANSACTIONS

BARTER TO BITCOIN: THE CHANGING VISAGE OF TRANSACTIONS www.elkjournals.com BARTER TO BITCOIN: THE CHANGING VISAGE OF TRANSACTIONS Devansh Awasthi Scholar, National Institute of Technology, Jaipur Nitisha Gitarattan International Business School, Delhi ABSTRACT

More information

BYZANTINE CONSENSUS THROUGH BITCOIN S PROOF- OF-WORK

BYZANTINE CONSENSUS THROUGH BITCOIN S PROOF- OF-WORK Informatiemanagement: BYZANTINE CONSENSUS THROUGH BITCOIN S PROOF- OF-WORK The aim of this paper is to elucidate how Byzantine consensus is achieved through Bitcoin s novel proof-of-work system without

More information

Computer Security. 14. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2019

Computer Security. 14. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2019 Computer Security 14. Blockchain & Bitcoin Paul Krzyzanowski Rutgers University Spring 2019 April 15, 2019 CS 419 2019 Paul Krzyzanowski 1 Bitcoin & Blockchain Bitcoin cryptocurrency system Introduced

More information

Introduction to Bitcoin I

Introduction to Bitcoin I Introduction to Bitcoin I P Peterlongo 1 A Tomasi 1 1 University of Trento Department of Mathematics June 10, 2013 Outline 1 Fiat and online payments Functions of Online payments and cost of clearing 2

More information

Biomedical Security. Cipher Block Chaining and Applications

Biomedical Security. Cipher Block Chaining and Applications 1 Biomedical Security Erwin M. Bakker 2 Cipher Block Chaining and Applications Slides and figures are adapted from: W. Stallings, Cryptography and Network Security 4 th Edition and 7 th Edition 1 3 Block

More information

Biomedical Security. Some Security News 10/5/2018. Erwin M. Bakker

Biomedical Security. Some Security News 10/5/2018. Erwin M. Bakker Biomedical Security Erwin M. Bakker Some Security News October 03, 2018 - Hackers attacking healthcare through remote access systems and disrupting operations is the number one patient safety risk, according

More information

ENEE 457: E-Cash and Bitcoin

ENEE 457: E-Cash and Bitcoin ENEE 457: E-Cash and Bitcoin Charalampos (Babis) Papamanthou cpap@umd.edu Money today Any problems? Cash is cumbersome and can be forged Credit card transactions require centralized online bank are not

More information

CCP: Conflicts Check Protocol for Bitcoin Block Security 1

CCP: Conflicts Check Protocol for Bitcoin Block Security 1 CCP: Conflicts Check Protocol for Bitcoin Block Security Chen Yang Peking University, China yc900@pku.edu.cn Abstract In this work, we present our early stage results on a Conflicts Check Protocol (CCP)

More information

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University CS 4770: Cryptography CS 6750: Cryptography and Communication Security Alina Oprea Associate Professor, CCIS Northeastern University March 30 2017 Outline Digital currencies Advantages over paper cash

More information

Transactions as Proof-of-Stake! by Daniel Larimer!

Transactions as Proof-of-Stake! by Daniel Larimer! Transactions as Proof-of-Stake by Daniel Larimer dlarimer@invictus-innovations.com November, 28 th 2013 Abstract The concept behind Proof-of-Stake is that a block chain should be secured by those with

More information

What is Proof of Work?

What is Proof of Work? What is Proof of Work? Educational Series September 18, 2018 Overview There are many protocols that regulate how nodes on a blockchain achieve consensus, and currently the most popular is proof-of-work.

More information

ILCOIN White Paper. In ILCOIN We Trust ILCOIN

ILCOIN White Paper. In ILCOIN We Trust ILCOIN ILCOIN White Paper In ILCOIN We Trust ILCOIN ILCOIN Development Team September 2017 TABLE OF CONTENTS WHAT IS ILCOIN WE NEED THINGS THAT DRAW ON THE REVOLUTION OF BITCOIN, BUT BITCOIN ALONE IS NOT GOOD

More information

Bitcoin. CS6450: Distributed Systems Lecture 20 Ryan Stutsman

Bitcoin. CS6450: Distributed Systems Lecture 20 Ryan Stutsman Bitcoin CS6450: Distributed Systems Lecture 20 Ryan Stutsman Material taken/derived from Princeton COS-418 materials created by Michael Freedman and Kyle Jamieson at Princeton University. Licensed for

More information

Problem: Equivocation!

Problem: Equivocation! Bitcoin: 10,000 foot view Bitcoin and the Blockchain New bitcoins are created every ~10 min, owned by miner (more on this later) Thereafter, just keep record of transfers e.g., Alice pays Bob 1 BTC COS

More information

TOPPERCASH TOPPERCASH WHITEPAPER REFORM THE BEST OF BLOCKCHAIN

TOPPERCASH TOPPERCASH WHITEPAPER REFORM THE BEST OF BLOCKCHAIN TOPPERCASH TOPPERCASH WHITEPAPER REFORM THE BEST OF BLOCKCHAIN ABSTRACT A PEER-TO-PEER CRYPTO-CURRENCY DESIGN DERIVED FROM SATOSHI NAKAMOTO S BITCOIN. PROOF- OF-STAKE REPLACES PROOF-OF- WORK TO PROVIDE

More information

Untraceable Nym Creation on the Freedom 2.0 Network

Untraceable Nym Creation on the Freedom 2.0 Network Russell Samuels Ed Hawco November 1, 2000 Untraceable Nym Creation on the Freedom 2.0 Network Version 2.0 This whitepaper, targeted at users with a basic understanding of Freedom, describes the Freedom

More information

Neel Gupte. Index Terms Bitcoin, Cryptocurreny, Block Chain, Hashing, Proof-of-Work, Double-spending, Momentum Method, Proof of Stake.

Neel Gupte. Index Terms Bitcoin, Cryptocurreny, Block Chain, Hashing, Proof-of-Work, Double-spending, Momentum Method, Proof of Stake. International Journal of Scientific & Engineering Research, Volume 6, Issue 9, September-2015 259 An Analysis of the Hash-Based Proof-of-Work Chain in the Bitcoin Network Neel Gupte Abstract A Bitcoin

More information

BITCOIN MECHANICS AND OPTIMIZATIONS. Max Fang Philip Hayes

BITCOIN MECHANICS AND OPTIMIZATIONS. Max Fang Philip Hayes 1 BITCOIN MECHNICS ND OPTIMIZTIONS Max Fang Philip Hayes 1 Cryptocurrency Mining: Proof-of-Work Consensus Nadir khtar LECTURE OUTLINE 2 1 Intro and Terminology 2 Bitcoin and Consensus 3 Bitcoin Concepts

More information

Smalltalk 3/30/15. The Mathematics of Bitcoin Brian Heinold

Smalltalk 3/30/15. The Mathematics of Bitcoin Brian Heinold Smalltalk 3/30/15 The Mathematics of Bitcoin Brian Heinold What is Bitcoin? Created by Satoshi Nakamoto in 2008 What is Bitcoin? Created by Satoshi Nakamoto in 2008 Digital currency (though not the first)

More information

Blockchain. CS 240: Computing Systems and Concurrency Lecture 20. Marco Canini

Blockchain. CS 240: Computing Systems and Concurrency Lecture 20. Marco Canini Blockchain CS 240: Computing Systems and Concurrency Lecture 20 Marco Canini Credits: Michael Freedman and Kyle Jamieson developed much of the original material. Bitcoin: 10,000 foot view New bitcoins

More information

Security Analysis of Bitcoin. Dibyojyoti Mukherjee Jaswant Katragadda Yashwant Gazula

Security Analysis of Bitcoin. Dibyojyoti Mukherjee Jaswant Katragadda Yashwant Gazula Security Analysis of Bitcoin Dibyojyoti Mukherjee Jaswant Katragadda Yashwant Gazula Security Analysis of Bitcoin Introduction How Bitcoin works? Similar peer-to-peer systems Vulnerabilities and solutions

More information

Bitcoin (Part I) Ken Calvert Keeping Current Seminar 22 January Keeping Current 1

Bitcoin (Part I) Ken Calvert Keeping Current Seminar 22 January Keeping Current 1 Bitcoin (Part I) Ken Calvert Keeping Current Seminar 22 January 2014 2014.01.22 Keeping Current 1 Questions What problem is Bitcoin solving? Where did it come from? How does the system work? What makes

More information

EECS 498 Introduction to Distributed Systems

EECS 498 Introduction to Distributed Systems EECS 498 Introduction to Distributed Systems Fall 2017 Harsha V. Madhyastha Today Bitcoin: A peer-to-peer digital currency Spark: In-memory big data processing December 4, 2017 EECS 498 Lecture 21 2 December

More information

Bitcoin and Blockchain

Bitcoin and Blockchain Bitcoin and Blockchain COS 418: Distributed Systems Lecture 18 Zhenyu Song [Credit: Selected content adapted from Michael Freedman. Slides refined by Chris Hodsdon and Theano Stavrinos] Why Bitcoin? All

More information

University of Duisburg-Essen Bismarckstr Duisburg Germany HOW BITCOIN WORKS. Matthäus Wander. June 29, 2011

University of Duisburg-Essen Bismarckstr Duisburg Germany HOW BITCOIN WORKS. Matthäus Wander. June 29, 2011 University of Duisburg-Essen Bismarckstr. 90 47057 Duisburg Germany HOW BITCOIN WORKS June 29, 2011 Overview Electronic currency system Decentralized No trusted third party involved Unstructured peer-to-peer

More information

On the impact of propogation delay on mining rewards in Bitcoin. Xuan Wen 1. Abstract

On the impact of propogation delay on mining rewards in Bitcoin. Xuan Wen 1. Abstract On the impact of propogation delay on mining rewards in Bitcoin Xuan Wen 1 Abstract Bitcoin 2 is a decentralized digital currency that is rapidly gaining in popularity. The Bitcoin system relies on miners

More information

Applied cryptography

Applied cryptography Applied cryptography Electronic Cash Andreas Hülsing 29 November 2016 1 / 61 Classical Cash - Life Cycle Mint produces money (coins / bank notes) Sent to bank User withdraws money (reduces account balance)

More information

A Gentle Introduction To Bitcoin Mining

A Gentle Introduction To Bitcoin Mining A Gentle Introduction To Bitcoin Mining Table of Contents Title...3 How Do Bitcoin Transactions Work?...4 Why Is Mining Needed In Bitcoin?...5 Why Do Miners Mine?...6 What Is This Computationally Expensive

More information

A simple approach of Peer-to-Peer E-Cash system

A simple approach of Peer-to-Peer E-Cash system A simple approach of Peer-to-Peer E-Cash system Mr. Dharamvir, Mr. Rabinarayan Panda Asst. Professor, Dept. of MCA, The Oxford College of Engineering Bangalore, India. Abstract-With the popularization

More information

A Lightweight Blockchain Consensus Protocol

A Lightweight Blockchain Consensus Protocol A Lightweight Blockchain Consensus Protocol Keir Finlow-Bates keir@chainfrog.com Abstract A lightweight yet deterministic and objective consensus protocol would allow blockchain systems to be maintained

More information

How Bitcoin achieves Decentralization. How Bitcoin achieves Decentralization

How Bitcoin achieves Decentralization. How Bitcoin achieves Decentralization Centralization vs. Decentralization Distributed Consensus Consensus without Identity, using a Block Chain Incentives and Proof of Work Putting it all together Centralization vs. Decentralization Distributed

More information

IAME: An Expert System for Blockchain Identity Verification

IAME: An Expert System for Blockchain Identity Verification IAME: An Expert System for Blockchain Identity Verification Nathaniel Tsang Mang Kin Suryani Chang www.iame.io Abstract. A decentralized identification system that would allow parties performing Blockchain

More information

ECC: Peer-to-Peer Electronic Cash with Trustless Network Services

ECC: Peer-to-Peer Electronic Cash with Trustless Network Services ECC: Peer-to-Peer Electronic Cash with Trustless Network Services Greg Griffith October 2017 (griffith@cryptounited.io) https://www.ecc.network ECC: Peer-to-Peer Electronic Cash with Trustless Network

More information

Upgrading Bitcoin: Segregated Witness. Dr. Johnson Lau Bitcoin Core Contributor Co-author of Segregated Witness BIPs March-2016

Upgrading Bitcoin: Segregated Witness. Dr. Johnson Lau Bitcoin Core Contributor Co-author of Segregated Witness BIPs March-2016 Upgrading Bitcoin: Segregated Witness Dr. Johnson Lau Bitcoin Core Contributor Co-author of Segregated Witness BIPs 141-143 16-March-2016 Topics A short introduction to Bitcoin transactions What is transaction

More information

Privacy-Enabled NFTs: User-Mintable, Non-Fungible Tokens With Private Off-Chain Data

Privacy-Enabled NFTs: User-Mintable, Non-Fungible Tokens With Private Off-Chain Data Privacy-Enabled NFTs: User-Mintable, Non-Fungible Tokens With Private Off-Chain Data Philip Stehlik Lucas Vogelsang August 8, 2018 1 Abstract Privacy-enabled NFTs (non-fungible tokens) are user-mintable

More information

The Design of an Anonymous and a Fair Novel E-cash System

The Design of an Anonymous and a Fair Novel E-cash System International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 2, Number 2 (2012), pp. 103-109 International Research Publications House http://www. ripublication.com The Design of

More information

P2P BitCoin: Technical details

P2P BitCoin: Technical details ELT-53206 Peer-to-Peer Networks P2P BitCoin: Technical details Mathieu Devos Tampere University of Technology Department of Electronics & Communications Engineering mathieu.devos@tut.fi TG406 2 Outline

More information

Bitcoin. Arni Par ov. December 17, 2013

Bitcoin. Arni Par ov. December 17, 2013 Bitcoin Arni Par ov December 17, 2013 Abstract Bitcoin is a distributed, peer-to-peer cryptocurrency that functions without any central authority and in recent years has gained large popularity. This paper

More information

Consensus & Blockchain

Consensus & Blockchain Consensus & Blockchain S P Suresh Chennai Mathematical Institute Formal Methods Update Meeting IIT Mandi July 17, 2017 The Bitcoin revolution is upon us What is Bitcoin? Bitcoin: an exciting new currency

More information

Reliability, distributed consensus and blockchain COSC412

Reliability, distributed consensus and blockchain COSC412 Reliability, distributed consensus and blockchain COSC412 Learning objectives Encourage you to always design for failure Appreciate how decentralised consensus is useful to support principles of security

More information

Version 0.7. GoldCoin Patch Announcement. What is a 51% attack. The impossible made possible

Version 0.7. GoldCoin Patch Announcement. What is a 51% attack. The impossible made possible Version 0.7 www.gldcoin.com www.gldtalk.org October 11 2013 GoldCoin Patch Announcement Welcome to the GoldCoin minor version 7 announcement. We have some fantastic news for you folks today. We have at

More information

Bitcoin a Peer-to-Peer payment solution

Bitcoin a Peer-to-Peer payment solution Bitcoin a Peer-to-Peer payment solution [Security Considerations] Jean-Guillaume Dumas University Joseph Fourier Grenoble Jean-Guillaume.Dumas@imag.fr Pascal Sygnet Grenoble INP Ensimag Pascal.Sygnet @Phelma.Grenoble-inp.fr

More information

Sharding. Making blockchains scalable, decentralized and secure.

Sharding. Making blockchains scalable, decentralized and secure. Sharding Making blockchains scalable, decentralized and secure. The Scalability Triangle Scalability Decentralization Semi-formally defining these properties Assume the total computational/bandwidth capacity

More information

Alternative Consensus Algorithms. Murat Osmanoglu

Alternative Consensus Algorithms. Murat Osmanoglu Alternative Consensus Algorithms Murat Osmanoglu Bitcoin Block i-1 Block i Block i+1 Hash i-2 Nonce i-1 Hash i-1 Nonce i Hash i Nonce i+1 tx tx tx tx tx tx tx tx tx tx tx tx Do you really need a Blockchain?

More information

A Step By Step Guide To Use PayPal

A Step By Step Guide To Use PayPal A Step By Step Guide To Use PayPal Table of Contents Introduction... 3 Creating an Account... 4 PayPal Verification... 5 Verification Process... 5 Utility of Each Account... 7 Transfer of Funds... 8 Checking

More information

SmartPool: practical decentralized pool mining. Loi Luu, Yaron Velner, Jason Teutsch, and Prateek Saxena August 18, 2017

SmartPool: practical decentralized pool mining. Loi Luu, Yaron Velner, Jason Teutsch, and Prateek Saxena August 18, 2017 SmartPool: practical decentralized pool mining Loi Luu, Yaron Velner, Jason Teutsch, and Prateek Saxena August 18, 2017 Mining pools Miners role in cryptocurrencies Definition: A cryptocurrency is a decentralized

More information

Introduction to Cryptography in Blockchain Technology. December 23, 2018

Introduction to Cryptography in Blockchain Technology. December 23, 2018 Introduction to Cryptography in Blockchain Technology December 23, 2018 What is cryptography? The practice of developing protocols that prevent third parties from viewing private data. Modern cryptography

More information

SCP: A Computationally Scalable Byzantine Consensus Protocol for Blockchains

SCP: A Computationally Scalable Byzantine Consensus Protocol for Blockchains SCP: A Computationally Scalable Byzantine Consensus Protocol for Blockchains Loi Luu, Viswesh Narayanan, Kunal Baweja, Chaodong Zheng, Seth Gilbert, Prateek Saxena National University of Singapore Bitcoin

More information

Technical White Paper. Cube Engine Version 1.0

Technical White Paper. Cube Engine Version 1.0 Technical White Paper Cube Engine Version 1.0 Last Updated: Feb 06. 2018 1 Contents 1. Summary 1) Introduction 2) Overview 2. Features of Cube Chain 1) Cubing 2) Indexing Block 3) Statistics Block 4) Escrow

More information

Jan Møller Co-founder, CTO Chainalysis

Jan Møller Co-founder, CTO Chainalysis Jan Møller Co-founder, CTO Chainalysis How Does Bitcoin Actually Work? This talk is not about the poli:cal or economical impact of Bitcoin. This talk is not about how to buy, sell, spend, or secure your

More information

OpenbankIT: a banking platform for e- money management based on blockchain technology

OpenbankIT: a banking platform for e- money management based on blockchain technology OpenbankIT: a banking platform for e- money management based on blockchain technology Dr. Pavel Kravchenko, Sergiy Vasilchuk, Bohdan Skriabin pavel@distributedlab.com, vsv@atticlab.net, bohdan@distributedlab.com

More information

Digital Cash Systems

Digital Cash Systems Digital Cash Systems Xiang Yin Department of Computer Science McMaster University December 1, 2010 Outline 1 Digital Cash 2 3 4 5 Digital Cash Overview Properties Digital Cash Systems Digital Cash Digital

More information

BitBill: Scalable, Robust, Verifiable Peer-to-Peer Billing for Cloud Computing

BitBill: Scalable, Robust, Verifiable Peer-to-Peer Billing for Cloud Computing BitBill: Scalable, Robust, Verifiable Peer-to-Peer Billing for Cloud Computing Li Chen, Kai Chen SING Lab Computer Science and Engineering Hong Kong University of Science and Technology Trust in the Cloud

More information

Security (and finale) Dan Ports, CSEP 552

Security (and finale) Dan Ports, CSEP 552 Security (and finale) Dan Ports, CSEP 552 Today Security: what if parts of your distributed system are malicious? BFT: state machine replication Bitcoin: peer-to-peer currency Course wrap-up Security Too

More information

ICS 421 & ICS 690. Bitcoin & Blockchain. Assoc. Prof. Lipyeow Lim Information & Computer Sciences Department University of Hawai`i at Mānoa

ICS 421 & ICS 690. Bitcoin & Blockchain. Assoc. Prof. Lipyeow Lim Information & Computer Sciences Department University of Hawai`i at Mānoa ICS 421 & ICS 690 Bitcoin & Blockchain Assoc. Prof. Lipyeow Lim Information & Computer Sciences Department University of Hawai`i at Mānoa Accepted by: Overstock.com Expedia.com Newegg.com Tigerdirect.com

More information

Analyzing Bitcoin Security. Philippe Camacho

Analyzing Bitcoin Security. Philippe Camacho Analyzing Bitcoin Security Philippe Camacho philippe.camacho@dreamlab.net Universidad Católica, Santiago de Chile 15 of June 2016 Bitcoin matters Map Blockchain Design Known Attacks Security Models Double

More information

Burstcoin Technical information about mining and block forging

Burstcoin Technical information about mining and block forging Burstcoin Technical information about mining and block forging Table of contents 1. Introduction 2. Algorithms and Acronyms 3. Mining process 4. Block forging process Introduction With most cryptocurrencies

More information

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Elli Androulaki Staff member, IBM Research, Zurich Workshop on cryptocurrencies Athens, 06.03.2016 Blockchain systems

More information

Blockchain Certification Protocol (BCP)

Blockchain Certification Protocol (BCP) Blockchain Certification Protocol (BCP) Fu Yong Quah fuyong@fyquah.me www.fyquah.me Abstract. A semi-decentralized certification system built above the existing 1 Bitcoin network, an innovative peer-to-peer

More information

Token White Paper. Global marketplace based on Block chain for small-scale business I ver P a g e

Token White Paper. Global marketplace based on Block chain for small-scale business I ver P a g e Token White Paper Global marketplace based on Block chain for small-scale business 1 P a g e 2018 I ver. 1.0 Contents Qatar Coin Token 3 Contents 4 1. What is QatarCoin 5 2. What is a digital currency

More information

Cryptography and Network Security Chapter 14

Cryptography and Network Security Chapter 14 Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture

More information

CS 251: Bitcoin and Crypto Currencies Fall 2015

CS 251: Bitcoin and Crypto Currencies Fall 2015 CS 251: Bitcoin and Crypto Currencies Fall 2015 Final Exam The exam is open book and open notes. You have 2 hours. Please answer all five questions. All questions are weighted equally. You may use course

More information

GENESIS VISION NETWORK

GENESIS VISION NETWORK GENESIS VISION NETWORK Contents 1. Description of the problem 7 11. Trust management 15 2. The problem with smart contracts 8 12. GVN Token 16 3. Centralised exchanges against decentralised 8 13. Deposit

More information

BITCOIN PROTOCOL & CONSENSUS: A HIGH LEVEL OVERVIEW

BITCOIN PROTOCOL & CONSENSUS: A HIGH LEVEL OVERVIEW BITCOIN PROTOCOL & CONSENSUS: A HIGH LEVEL OVERVIEW Rustie Lin Wang Move the area1 over the image a little inside and then right click, replace image to change the background. (and delete this box while

More information

IntForex demonstration bank account list IntForex demonstration rates IntForex demonstration rates... 22

IntForex demonstration bank account list IntForex demonstration rates IntForex demonstration rates... 22 Table of Contents int-forex.com Home screen... 3 IntForex registration... 4 IntForex activation... 6 IntForex login... 8 IntForex home... 8 IntForex exchange rates... 9 IntForex client functions... 10

More information

Payment systems. Tuomas Aura CSE-C3400 Information security. Aalto University, autumn 2014

Payment systems. Tuomas Aura CSE-C3400 Information security. Aalto University, autumn 2014 Payment systems Tuomas Aura CSE-C3400 Information security Aalto University, autumn 2014 1. Card payments Outline 2. Anonymous payments and BitCoin 2 CARD PAYMENT 3 Bank cards Credit or debit card Card

More information

DICE. Brief Overview Book. A New Generation Social Cryptocurrency. March DICE Money. Revision 2

DICE. Brief Overview Book. A New Generation Social Cryptocurrency. March DICE Money. Revision 2 DICE A New Generation Social Cryptocurrency Brief Overview Book Revision 2 March 2018 DICE Money 2018 This document is dated Tuesday, 03 April 2018. The provisions of this document are privileged and confidential.

More information

Group means any company within the STB Leasing Limited s group of companies and/or the ThinkSmart group of companies.

Group means any company within the STB Leasing Limited s group of companies and/or the ThinkSmart group of companies. PRIVACY DECLARATION In this Privacy Declaration, unless the context otherwise requires: We, us, our means STB Leasing Limited, and/or RentSmart Limited trading as ThinkSmart ( ThinkSmart / we / us ), and

More information

Proof-of-Work & Bitcoin

Proof-of-Work & Bitcoin CS 220: Introduction to Parallel Computing Proof-of-Work & Bitcoin Lecture 19 Bitcoin: Mining for Heat https://qz.com/1117836/bitcoin-mining-heatshomes-for-free-in-siberia/ 4/25/18 CS 220: Parallel Computing

More information

Financial CISM. Certified Information Security Manager (CISM) Download Full Version :

Financial CISM. Certified Information Security Manager (CISM) Download Full Version : Financial CISM Certified Information Security Manager (CISM) Download Full Version : http://killexams.com/pass4sure/exam-detail/cism required based on preliminary forensic investigation, but doing so as

More information

Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. Yashar Dehkan Asl

Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. Yashar Dehkan Asl Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts Yashar Dehkan Asl Chapter I Introduction Decentralized Cryptocurrencies: Such as Bitcoin and altcoins are getting more

More information

Making Decryption Accountable

Making Decryption Accountable Making Decryption Accountable Mark D. Ryan University of Birmingham Abstract. Decryption is accountable if the users that create ciphertexts can gain information about the circumstances of the decryptions

More information

Proof-of-Stake Protocol v3.0

Proof-of-Stake Protocol v3.0 Proof-of-Stake Protocol v3.0 Abstract Proof of Stake's security has proven itself reliable & effective over years of testing while at the same time solving Bitcoin s issues caused by the Proof of Work

More information

BUZCOIN TOKENS SALE PRIVACY POLICY. Last updated:

BUZCOIN TOKENS SALE PRIVACY POLICY. Last updated: BUZCOIN TOKENS SALE PRIVACY POLICY Last updated: 20.10.2018 STATUS AND ACCEPTANCE OF PRIVACY POLICY 1. This Privacy Policy (hereinafter referred to as the Policy ) sets forth the general rules of Participant

More information

OTP Server Authentication System Authentication Schemes V1.0. Feitian Technologies Co., Ltd. Website:

OTP Server Authentication System Authentication Schemes V1.0. Feitian Technologies Co., Ltd. Website: OTP Server Authentication System Authentication Schemes V1.0 Feitian Technologies Co., Ltd. Revision History: Date Revision Description Mar. 2010 V1.0 Release of the first version i Software Developer

More information

Bitcoin, Security for Cloud & Big Data

Bitcoin, Security for Cloud & Big Data Bitcoin, Security for Cloud & Big Data CS 161: Computer Security Prof. David Wagner April 18, 2013 Bitcoin Public, distributed, peer-to-peer, hash-chained audit log of all transactions ( block chain ).

More information

As a 3rd generation currency, not only are transactions secured, private and fast, you actually get paid for holding DigitalPrice coins.

As a 3rd generation currency, not only are transactions secured, private and fast, you actually get paid for holding DigitalPrice coins. Introduction With the circulation of cryptocurrency becoming common, there is a need for additional information. The scope of this white paper is to provide that information. If you are under the impression

More information

Bitcoin, a decentralized and trustless protocol

Bitcoin, a decentralized and trustless protocol Bitcoin, a decentralized and trustless protocol Thomas Sibut-Pinote Inria Saclay February 12, 2015 Thomas Sibut-Pinote Bitcoin, a decentralized and trustless protocol 1 / 42 Introduction Questions 1 Introduction

More information

Bitcoin. Tom Anderson

Bitcoin. Tom Anderson Bitcoin Tom Anderson Admin Course evals My office hours next week are cancelled Bitcoin Goal Electronic money without trust $34B market value Created out of thin air, from a paper + some code Pros/cons

More information

A Mathematical Proof. Zero Knowledge Protocols. Interactive Proof System. Other Kinds of Proofs. When referring to a proof in logic we usually mean:

A Mathematical Proof. Zero Knowledge Protocols. Interactive Proof System. Other Kinds of Proofs. When referring to a proof in logic we usually mean: A Mathematical Proof When referring to a proof in logic we usually mean: 1. A sequence of statements. 2. Based on axioms. Zero Knowledge Protocols 3. Each statement is derived via the derivation rules.

More information

Zero Knowledge Protocols. c Eli Biham - May 3, Zero Knowledge Protocols (16)

Zero Knowledge Protocols. c Eli Biham - May 3, Zero Knowledge Protocols (16) Zero Knowledge Protocols c Eli Biham - May 3, 2005 442 Zero Knowledge Protocols (16) A Mathematical Proof When referring to a proof in logic we usually mean: 1. A sequence of statements. 2. Based on axioms.

More information

Yada. A blockchain-based social graph

Yada. A blockchain-based social graph Yada A blockchain-based social graph January 2018 Abstract The goal of Yada is to achieve an acceptable level anonymity, privacy, and freedom of expression while making available to the public a structure

More information

Interac e-transfer Terms and Conditions

Interac e-transfer Terms and Conditions Interac e-transfer Terms and Conditions 1. What the Words Mean: In this Interac e-transfer Terms and Conditions document (the Agreement ), please remember that: "I", "me", "my", you, ICICI Bank Customer

More information

Anupam Datta CMU. Fall 2015

Anupam Datta CMU. Fall 2015 Anupam Datta CMU Fall 2015 A rational reconstruction of Bitcoin 1. Start with straw man design 2. Identify weaknesses 3. Augment design and iterate Alice: I, Alice, am giving Bob one coin Alice digitally

More information

Enhanced Immutability of Permissioned Blockchain Networks by Tethering Provenance with a Public Blockchain Network

Enhanced Immutability of Permissioned Blockchain Networks by Tethering Provenance with a Public Blockchain Network Enhanced Immutability of Permissioned Blockchain Networks by Tethering Provenance with a Public Blockchain Network Abstract Azeem Ahmed (azeem.ahmed@consensys.net) Jim Zhang (jim.zhang@consensys.net) Permissioned

More information

Cryptographic Checksums

Cryptographic Checksums Cryptographic Checksums Mathematical function to generate a set of k bits from a set of n bits (where k n). k is smaller then n except in unusual circumstances Example: ASCII parity bit ASCII has 7 bits;

More information

SpaceMint Overcoming Bitcoin s waste of energy

SpaceMint Overcoming Bitcoin s waste of energy Bitcoin Overcoming Bitcoin s waste of energy Georg Fuchsbauer joint work with S Park, A Kwon, K Pietrzak, J Alwen and P Gaži Digital currency Decentralized (no bank issuing coins) Pseudonymous Controled

More information

A Review on Blockchain Application for Decentralized Decision of Ownership of IoT Devices

A Review on Blockchain Application for Decentralized Decision of Ownership of IoT Devices Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 10, Number 8 (2017) pp. 2449-2456 Research India Publications http://www.ripublication.com A Review on Blockchain Application for

More information

National Travel Associates

National Travel Associates National Travel Associates Fraud Prevention Module 2012 National Travel Associates Fraud In The Travel Industry With the popularity of online booking engines in the 90 s there was a huge insurgence of

More information

Outline Key Management CS 239 Computer Security February 9, 2004

Outline Key Management CS 239 Computer Security February 9, 2004 Outline Key Management CS 239 Computer Security February 9, 2004 Properties of keys Key management Key servers Certificates Page 1 Page 2 Introduction Properties of Keys It doesn t matter how strong your

More information

Biomedical and Healthcare Applications for Blockchain. Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs

Biomedical and Healthcare Applications for Blockchain. Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs Biomedical and Healthcare Applications for Blockchain Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs Network Analysis Working Group 01.25.2018 Outline Introduction to bitcoin + blockchain

More information

Cube Chain Technical White Paper

Cube Chain Technical White Paper 1 2 Cube Chain Technical White Paper Cube Engine Version 2.0 1. Overview 1.1 Overview Blockchain is an encryption system that creates blocks of data at regular intervals and validates data through hash

More information