Distributed Algorithms Bitcoin

Size: px
Start display at page:

Download "Distributed Algorithms Bitcoin"

Transcription

1 Distributed Algorithms Bitcoin Alberto Montresor Università di Trento 2018/12/18 Acknowledgment: Joseph Bonneau, Ed Felten, Arvind Narayanan This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

2 Table of contents 1 Introduction 2 Preliminaries Hash function properties Hash-based data structures Signatures 3 Naive coins Goofy coin ScroogeCoin 4 Bitcoin Basics Ledger 5 Decentralization in Bitcoin BitCoin P2P Network Consensus basics Mining 6 Conclusions

3 Introduction What is Bitcoin? Blockchain An open, distributed ledger that can record transactions between multiple parties efficiently and in a verifiable and permanent way. Decentralization Blockchain may be built in a centralized way; Bitcoin was the first to realize one without a trusted third party. Cryptocurrency A digital asset designed to work as a medium of exchange that uses strong cryptography to secure financial transactions, control the creation of additional units, and verify the transfer of assets. Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 1 / 51

4 Introduction History 31/10/08: Satoshi Nakamoto sends a link to a paper titled "Bitcoin: A Peer-to-Peer Electronic Cash System" to a cryptography mailing list Released as an open-source project in January 2009 Nakamoto worked on the source until mid-2010, when he passed the control to prominent members of the Bitcoin community. Several incidents: 2010, exploit, large number of Bitcoins created and later reverted 2013, bug, fork in the chain - two independent chains were operating 2014, Mt.Gox repository filed for bankruptcy, 744K-B stolen Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 2 / 51

5 Introduction The original paper Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto satoshin@gmx.com Abstract. A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution. Digital signatures provide part of the solution, but the main benefits are lost if a trusted third party is still required to prevent double-spending. We propose a solution to the double-spending problem using a peer-to-peer network. The network timestamps transactions by hashing them into an ongoing chain of hash-based proof-of-work, forming a record that cannot be changed without redoing the proof-of-work. The longest chain not only serves as proof of the sequence of events witnessed, but proof that it came from the largest pool of CPU power. As long as a majority of CPU power is controlled by nodes that are not cooperating to attack the network, they'll generate the longest chain and outpace attackers. The network itself requires minimal structure. Messages are broadcast on a best effort basis, and nodes can leave and rejoin the network at will, accepting the longest proof-of-work chain as proof of what happened while they were gone. Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 3 / 51

6 Introduction A clever combination of existing techniques 2001: SHA-256 finalized 1999-present: Byzantine fault tolerance 1999-present: P2P networks 1998: Wei Dai, B-money 1998: Nick Szabo, Bit Gold 1997: HashCash : Proof-of-work for spam 1991: cryptographic timestamp 1980: public key crypto algorithm Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 4 / 51

7 Introduction Many features in a single protocol Anonymity/privacy Protection against sybil attacks Distributed ledger (notarization) Leader election Consensus Currency, digital payments Smart contracts An incentive framework Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 5 / 51

8 Preliminaries Hash function properties Properties of Hash functions Collision-free Difficult to find x and y such that: x y and H(x) = H(y) Application: Message digest If we know that H(x) = H(y), it is safe to assume that x = y To recognize a message that we saw before, just remember its hash. Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 6 / 51

9 Preliminaries Hash function properties Properties of Hash functions Hiding Given H(x), it is infeasible to find x. Corollary: If r is chosen from a probability distribution that has high min-entropy, then given H(r x), it is infeasible to find x. A random variable X has min-entropy k if max x P r[x = x] = 2 k High min-entropy means that the distribution is very spread out No particular value is chosen with more than negligible probability. Application: Commitment Want to commit to a value, reveal it later seal a value in an envelope now, and open the envelope later. Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 7 / 51

10 Preliminaries Hash function properties Properties of Hash functions Commitment API (com, key) commit(msg) match verify(com, key, msg) Sealing the envelope (com, key) commit(msg) Publish com Opening the envelope Publish key, msg; com already published Anyone can use verify() to check validity Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 8 / 51

11 Preliminaries Hash function properties Properties of Hash functions Commitment API (com, key) commit(msg) match verify(com, key, msg) Implementation commit(msg) (H(msg key), key) where key is a random 256-bit value verify(com, key, msg) (H(msg key) = com) Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 8 / 51

12 Preliminaries Hash function properties Properties of Hash functions Commitment API (com, key) commit(msg) match verify(com, key, msg) Security properties Hiding: Given com, infeasible to find msg Binding: Infeasible to find msg msg such that verify(commit(msg), msg ) = true Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 8 / 51

13 Preliminaries Hash function properties Properties of Hash functions Puzzle-friendly For every possible output value y, if r is chosen from a distribution with high min-entropy, then it is infeasible to find x such that H(r x) = y Application: Search puzzle Given a puzzle k (from high min-entropy distribution) and a target set Y, try to find a solution x such that: H(k x) Y Puzzle-friendly property implies that no solving strategy is much better than trying random values of x Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 9 / 51

14 Preliminaries Hash-based data structures Hash pointer Hash pointer A pointer to where some info is stored, and a (cryptographic) hash of the info If we have a hash pointer, we can: ask to get the info back verify that it hasn t changed H( ) (data) will draw hash pointers like this Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 10 / 51

15 Preliminaries Hash-based data structures Blockchain Linked list with hashdetecting pointers (Blockchain) tampering H( ) prev: H( ) prev: H( ) prev: H( ) data data data use case: tamper-evident log Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 11 / 51

16 Preliminaries Hash-based data structures Merkle tree Binaryproving tree with hash membership pointers (Merkle in a tree) Merkle tree H( ) H( ) show O(log n) items H( ) H( ) H( ) H( ) (data) Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 12 / 51

17 Preliminaries Hash-based data structures Merkle tree Advantages of Merkle Trees Tree holds many items, but just need to remember the root hash Can verify membership in O(log n) time/space Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 13 / 51

18 Preliminaries Hash-based data structures Public/private signatures Objectives Only you can sign, but anyone can verify Signature is tied to a particular document Cannot be cut-and-pasted to another doc API for digital signatures (sk, pk) generatekeys(keysize) sk: secret signing key pk: public verification key sig sign(sk, message) isvalid verify(pk, message, sig) Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 14 / 51

19 Preliminaries Signatures Public/private signatures Requirements Valid signatures verify: verify(pk, message, sign(sk, message)) = true An adversary who: knows pk gets to see signatures on messages of his choice can t produce a verifiable signature on another message Bitcoin Uses ECDSA (Elliptic Curve Digital Signature Algorithm) Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 15 / 51

20 Preliminaries Signatures Public/private signatures Public keys identity If you see sig such that verify(pk, msg, sig) = true, think of it as pk says [msg] Decentralized identity management Anybody can make a new identity at any time No central point of coordination These identities are called addresses in Bitcoin Privacy Addresses not directly connected to real-world identity. But observer can link together an address s activity over time, make inferences Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 16 / 51

21 Naive coins Goofy coin GoofyCoin double-spending attack signed by pk Alice Pay to pk Bob : H( ) signed by pk Alice Pay to pk Chuck : H( ) signed by pk Goofy Pay to pk Alice : H( ) signed by pk Goofy CreateCoin [uniquecoinid] Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 17 / 51

22 Naive coins ScroogeCoin ScroogeCoin Don t worry, I m honest. Crucial question: Can we descroogify the currency, and operate without any central, trusted party? Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 18 / 51

23 Bitcoin Basics Definitions Transaction A transaction is a transfer of Bitcoin value that is broadcast to the network and collected into blocks. A transaction typically references previous transaction outputs as new transaction inputs and dedicates all input Bitcoin values to new outputs. Transactions are not encrypted, so it is possible to browse and view every transaction ever collected into a block. Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 19 / 51

24 Bitcoin Basics Ledger Blocks Transaction data is bundled together and recorded in files called blocks Single unit of work for miners Limit length of hash-chain of blocks Faster to verify history The real deal: a Bitco { "hash":" aad2...", "ver":2, "prev_block":" ", block header transaction data "time": , "bits": , "nonce": , "mrkl_root":" ", "n_tx":354, "size":181520, "tx":[... ], "mrkl_tree":[ "6bd5eb25...",... "89776cdb..." ] } Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 20 / 51

25 Bitcoin Basics Ledger Structure of the Blockchain Bitcoin block structure Hash chain of blocks prev: H( ) trans: H( ) prev: H( ) trans: H( ) prev: H( ) trans: H( ) H( ) H( ) Hash tree (Merkle tree) of transactions in each block H( ) H( ) H( ) H( ) transaction transaction transaction transaction Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 21 / 51

26 Bitcoin Basics Ledger 5/26/2016 Bitcoin Blockchain Size Blockchain size Home Charts Stats Wallet 80,000 Blockchain Size Source: blockchain.info 70,000 60,000 50,000 40,000 MB 30,000 20,000 10, Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 22 / 51

27 Bitcoin Basics Ledger An account-based ledger (not Bitcoin) An account-based ledger (not Bitcoin) time Create 25 coins and credit to Alice ASSERTED BY MINERS Transfer 17 coins from Alice to Bob SIGNED(Alice) Transfer 8 coins from Bob to Carol SIGNED(Bob) Transfer 5 coins from Carol to Alice SIGNED(Carol) Transfer 15 coins from Alice to David SIGNED(Alice) might need to scan backwards until genesis! is this valid? SIMPLIFICATION: only one transaction per block Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 23 / 51

28 Bitcoin Basics Ledger A transaction-based ledger (Bitcoin) A transaction-based ledger (Bitcoin) time Inputs: Ø Outputs: 25.0 Alice change address Inputs: 1[0] Outputs: 17.0 Bob, 8.0 Alice Inputs: 2[0] Outputs: 8.0 Carol, 7.0 Bob Inputs: 2[1] Outputs: 6.0 David, 2.0 Alice SIGNED(Alice) SIGNED(Bob) SIGNED(Alice) SIMPLIFICATION: only one transaction per block we implement this with hash pointers finite scan to check for validity is this valid? Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 24 / 51

29 Bitcoin Basics Ledger Merging value Merging value time 1... Inputs: Outputs: 17.0 Bob, 8.0 Alice SIGNED(Alice) 2... Inputs: Outputs: 6.0 Carol, 2.0 Bob SIGNED(Carol) 3 Inputs: 1[0], 2[1] Outputs: 19.0 Bob SIGNED(Bob) SIMPLIFICATION: only one transaction per block Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 25 / 51

30 Bitcoin Basics Ledger Joint payments Joint payments time 1... Inputs:... Outputs: 17.0 Bob, 8.0 Alice SIGNED(Alice) Inputs: 1[1] Outputs: 6.0 Carol, 2.0 Bob Inputs: 2[0], 2[1] Outputs: 8.0 David SIGNED(Carol) two signatures! SIGNED(Carol), SIGNED(Bob) SIMPLIFICATION: only one transaction per block Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 26 / 51

31 Decentralization in Bitcoin Aspects of decentralization in Bitcoin Technological aspects of decentralization in Bitcoin Who maintains the ledger? Who has authority over which transactions are valid? Who creates new Bitcoins? Socio-economical aspects of decentralization in Bitcoin Who determines how the rules of the system change? Who maintains the software How do Bitcoins acquire exchange value? Beyond the protocol exchanges, wallet software, service providers... Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 27 / 51

32 Decentralization in Bitcoin Decentralization in Bitcoin Peer-to-peer network Open to anyone, low barrier to entry Consensus Consensus is reached by waiting long enough to observe confirmations from most of the network Mining Open to anyone, but inevitable concentration of power often seen as undesirable Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 28 / 51

33 Decentralization in Bitcoin BitCoin P2P Network Bitcoin is a peer-to-peer system Bitcoin is a peer-to-peer system When Alice wants to pay Bob, she broadcasts the transaction to all Bitcoin nodes When Alice wants to pay Bob: she broadcasts the transaction to all Bitcoin nodes signed by Alice Pay to pk Bob : H( ) Note: Bob s computer is not in the picture Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 29 / 51

34 Decentralization in Bitcoin BitCoin P2P Network Bitcoin P2P network Ad-hoc protocol (runs on TCP port 8333) Ad-hoc network with random topology All nodes are equal New nodes can join at any time Forget non-responding nodes after 3 hr Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 30 / 51

35 Decentralization in Bitcoin BitCoin P2P Network Bitcoin P2P network getaddr() Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 31 / 51

36 Decentralization in Bitcoin BitCoin P2P Network Bitcoin P2P network , Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 31 / 51

37 Decentralization in Bitcoin BitCoin P2P Network Bitcoin P2P network 1 5 getaddr() 8 getaddr() Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 31 / 51

38 Decentralization in Bitcoin BitCoin P2P Network Bitcoin P2P network Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 31 / 51

39 Decentralization in Bitcoin BitCoin P2P Network Network characteristics How big is the network? Impossible to measure exactly Estimates-up to 1M IP addresses/month Only about 5-10k full nodes Full nodes Permanently connected Store entire block chain Forward every tx/block Tracking UTXO (Unspent Transaction Output) M UTXOs Can easily fit into RAM Thin clients Connected on-demand Store block headers only Request transactions as needed, to verify payment Trust full nodes 1000x cost savings! Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 32 / 51

40 Decentralization in Bitcoin BitCoin P2P Network Software diversity About 90% of nodes run Core Bitcoin (C++) Some are out of date versions Other implementations running successfully BitcoinJ (Java) Libbitcoin (C++) btcd (Go) Original Satoshi client Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 33 / 51

41 Decentralization in Bitcoin Consensus basics Bitcoin consensus Bitcoin s key challenge Key technical challenge of decentralized e-cash: distributed consensus or, how to decentralize ScroogeCoin Theory vs practice Remember the theoretical impossibility results Bitcoin consensus works better in practice than in theory Theory is still catching up Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 34 / 51

42 Decentralization in Bitcoin Consensus basics How consensus could work in BitCoin At any given time: All nodes have a sequence of blocks of transactions they ve reached consensus on Each node has a set of outstanding transactions it has heard about How consensus could work in Bitcoin Tx Tx Tx Tx Tx Tx Tx Tx Tx Tx Tx Tx Consensus protocol Tx Tx Tx Tx Tx Tx OK to select any valid block, even if proposed by only one node Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 35 / 51

43 Decentralization in Bitcoin Consensus basics Consensus without identity Why identity? Pragmatic: some protocols need node IDs Security: assume less than 50% are malicious Why don t Bitcoin nodes have identities? Identity is hard in a P2P system Sybil attack Pseudo-anonymity is a goal of Bitcoin Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 36 / 51

44 Decentralization in Bitcoin Consensus basics Key idea: implicit consensus New transactions are sent to all nodes Each node collects new transactions into a block In each round a random node gets to broadcast its block This node proposes the next block in the chain Other nodes implicitly accept/reject this block by either extending it or ignoring it and extending chain from earlier block Every block contains hash of the block it extends Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 37 / 51

45 Decentralization in Bitcoin Consensus basics What can a malicious node do? Honest What nodes can will extend a malicious the longest validnode branch do? C A B signed by A Pay to pk B : H( ) Doublespending attack signed by A Pay to pk A : H( ) C A A Honest nodes will extend the longest valid branch Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 38 / 51

46 Decentralization in Bitcoin Consensus basics What can a malicious node do? From Bob the Bob merchant s the merchant s point of view point of view 1 confirmation 3 confirmations C A B C A A double-spend attempt Double-spend probability decreases exponentially with # of confirmations Hear about C A B transaction 0 confirmations Most common heuristic: 6 confirmations Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 39 / 51

47 Decentralization in Bitcoin Consensus basics Recap Protection against invalid transactions is cryptographic, but enforced by consensus Protection against double-spending is purely by consensus You re never 100% sure a transaction is in consensus branch. Guarantee is probabilistic Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 40 / 51

48 Decentralization in Bitcoin Mining Some things Bitcoin does differently Introduces incentives Possible only because it s a currency! Embraces randomness Does away with the notion of a specific end-point Consensus happens over long time scales about 1 hour Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 41 / 51

49 Decentralization in Bitcoin Mining Assumption of honesty is problematic Incentives for behaving honestly Block reward Can we give nodes incentives for behaving honestly? Can we penalize the node that created this block? Can we reward nodes that created these blocks? Everything Creator of so block far is gets just to a distributed consensus protocol But now we utilize the fact that the currency has value include special coin-creation transaction in the block choose recipient address of this transaction Value is fixed: currently 25 BTC, halves every 4 years (next: ) Block creator gets to collect the reward only if the block ends up on long-term consensus branch! Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 42 / 51

50 Decentralization in Bitcoin Mining Finite supply of Bitcoins Total supply: 21 million Block reward is how new Bitcoins are created Runs out in No new Bitcoins unless rules change Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 43 / 51

51 Decentralization in Bitcoin Mining Selecting the random node Problems How to pick a random node? How to avoid a free-for-all due to rewards? How to prevent Sybil attacks? Proof-of-work To approximate selecting a random node: select nodes in proportion to a resource that no one can monopolize (we hope) Equivalent views of proof of work Select nodes in proportion to computing power Let nodes compete for right to create block Make it moderately hard to create new identities Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 44 / 51

52 Decentralization in Bitcoin Mining Hash puzzles Hash puzzles To create block, find nonce s.t. H(nonce prev_hash tx tx) is very small nonce prev_h Tx Tx Output space of hash Target space If hash function is secure: only way to succeed is to try enough nonces until you get lucky Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 45 / 51

53 Decentralization in Bitcoin Mining Proof-of-work properties Property 1: Difficult to compute hash/s (EHash/s) (16/12/2018) 120 blocks/ 211k transactions per day (16/12/2018) TWh per year (2018) Property 2: Parameterizable cost Nodes automatically re-calculate the target every two weeks Goal: average time between blocks = 10 minutes Property 3: Trivial to verify Nonce must be published as part of block Other miners simply verify that H(nonce prev_hash tx... tx) < target Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 46 / 51

54 Decentralization in Bitcoin Mining Solving hash hash puzzles puzzles is probabilistic is probabilistic 10 minutes Probability density Time to next block (entire network) Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 47 / 51

55 Decentralization in Bitcoin Mining 51% Attacks Key security assumption Attacks infeasible if majority of miners weighted by hash power follow the protocol What can a 51% attacker do? Steal coins from existing address? NO Suppress some transactions From the blockchain? YES From the P2P network NO Change the block reward? NO Destroy confidence in Bitcoin? YES!!! Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 48 / 51

56 Conclusions Limits for Bitcoin Hard-coded limits for BitCoin 10 min. average creation time per block 1M bytes in a block 20,000 signature operations per block 21M total Bitcoins maximum 50,25, Bitcoin mining reward Throughput limits in Bitcoin 1 Mbytes/block every 10 minutes > 250 bytes/transaction 7 transactions/sec Compare to: VISA: 2,000-10,000 transactions/sec PayPal: transaction/sec Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 49 / 51

57 Conclusions There and back again: from Bitcoin and BFT Permissionless vs Permissioned Permissioned Hyperledger Fabric Tendermint Ripple Stellar IOTA Many others Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 50 / 51

58 Conclusions Extensions of BitCoin Beyond money Scripting 2-out-3 signatures Distributed Execution of derivatives-contracts-as-programs Ethereum Virtual Machine (EVM) Altcoins (1748 with market cap 1$) Alberto Montresor (UniTN) DS - Bitcoin 2018/12/18 51 / 51

59 Reading Material A. Narayanan, J. Bonneau, E. Felten, A. Miller, and S. Goldfeder. Bitcoin and Cryptocurrency Technologies. Princeton University Press, Feb In this presentation: Chapters 1-3 (77 pages) Warning: 300+ pages F. Tschorsch and B. Scheuermann. Bitcoin and beyond: A technical survey on decentralized digital currencies. IEEE Communications Surveys and Tutorials, 18(3): , (Suggested) 37 pages C. Cachin and M. Vukolic. Blockchain consensus protocols in the wild. CoRR, abs/ ,

Cryptography and Cryptocurrencies. Intro to Cryptography and Cryptocurrencies

Cryptography and Cryptocurrencies. Intro to Cryptography and Cryptocurrencies Intro to Cryptographic Hash Functions Hash Pointers and Data Structures Block Chains Merkle Trees Digital Signatures Public Keys and Identities Let s design us some Digital Cash! Intro to Cryptographic

More information

Lecture 3. Introduction to Cryptocurrencies

Lecture 3. Introduction to Cryptocurrencies Lecture 3 Introduction to Cryptocurrencies Public Keys as Identities public key := an identity if you see sig such that verify(pk, msg, sig)=true, think of it as: pk says, [msg] to speak for pk, you must

More information

How Bitcoin achieves Decentralization. How Bitcoin achieves Decentralization

How Bitcoin achieves Decentralization. How Bitcoin achieves Decentralization Centralization vs. Decentralization Distributed Consensus Consensus without Identity, using a Block Chain Incentives and Proof of Work Putting it all together Centralization vs. Decentralization Distributed

More information

Blockchain, Cryptocurrency, Smart Contracts and Initial Coin Offerings: A Technical Perspective

Blockchain, Cryptocurrency, Smart Contracts and Initial Coin Offerings: A Technical Perspective SESSION ID: LAB3-R09 Blockchain, Cryptocurrency, Smart Contracts and Initial Coin Offerings: A Technical Perspective Tom Plunkett Consulting Solutions Director Oracle Captain Brittany Snelgrove United

More information

Problem: Equivocation!

Problem: Equivocation! Bitcoin: 10,000 foot view Bitcoin and the Blockchain New bitcoins are created every ~10 min, owned by miner (more on this later) Thereafter, just keep record of transfers e.g., Alice pays Bob 1 BTC COS

More information

ENEE 457: E-Cash and Bitcoin

ENEE 457: E-Cash and Bitcoin ENEE 457: E-Cash and Bitcoin Charalampos (Babis) Papamanthou cpap@umd.edu Money today Any problems? Cash is cumbersome and can be forged Credit card transactions require centralized online bank are not

More information

Blockchain. CS 240: Computing Systems and Concurrency Lecture 20. Marco Canini

Blockchain. CS 240: Computing Systems and Concurrency Lecture 20. Marco Canini Blockchain CS 240: Computing Systems and Concurrency Lecture 20 Marco Canini Credits: Michael Freedman and Kyle Jamieson developed much of the original material. Bitcoin: 10,000 foot view New bitcoins

More information

Lecture 6. Mechanics of Bitcoin

Lecture 6. Mechanics of Bitcoin Lecture 6 Mechanics of Bitcoin Bitcoin transactions time An account-based ledger (not Bitcoin) Create 25 coins and credit to Alice ASSERTED BY MINERS SIMPLIFICATION: only one transaction per block time

More information

Bitcoin and Blockchain

Bitcoin and Blockchain Bitcoin and Blockchain COS 418: Distributed Systems Lecture 18 Zhenyu Song [Credit: Selected content adapted from Michael Freedman. Slides refined by Chris Hodsdon and Theano Stavrinos] Why Bitcoin? All

More information

Bitcoin. CS6450: Distributed Systems Lecture 20 Ryan Stutsman

Bitcoin. CS6450: Distributed Systems Lecture 20 Ryan Stutsman Bitcoin CS6450: Distributed Systems Lecture 20 Ryan Stutsman Material taken/derived from Princeton COS-418 materials created by Michael Freedman and Kyle Jamieson at Princeton University. Licensed for

More information

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University CS 4770: Cryptography CS 6750: Cryptography and Communication Security Alina Oprea Associate Professor, CCIS Northeastern University March 30 2017 Outline Digital currencies Advantages over paper cash

More information

Blockchains & Cryptocurrencies

Blockchains & Cryptocurrencies 1 Blockchains & Cryptocurrencies A Technical Introduction Lorenz Breidenbach ETH Zürich Cornell Tech The Initiative for CryptoCurrencies & Contracts (IC3) 2 Cryptocurrency Mania Market cap as of yesterday:

More information

Computer Security. 14. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2019

Computer Security. 14. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2019 Computer Security 14. Blockchain & Bitcoin Paul Krzyzanowski Rutgers University Spring 2019 April 15, 2019 CS 419 2019 Paul Krzyzanowski 1 Bitcoin & Blockchain Bitcoin cryptocurrency system Introduced

More information

University of Duisburg-Essen Bismarckstr Duisburg Germany HOW BITCOIN WORKS. Matthäus Wander. June 29, 2011

University of Duisburg-Essen Bismarckstr Duisburg Germany HOW BITCOIN WORKS. Matthäus Wander. June 29, 2011 University of Duisburg-Essen Bismarckstr. 90 47057 Duisburg Germany HOW BITCOIN WORKS June 29, 2011 Overview Electronic currency system Decentralized No trusted third party involved Unstructured peer-to-peer

More information

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University CS 4770: Cryptography CS 6750: Cryptography and Communication Security Alina Oprea Associate Professor, CCIS Northeastern University April 9 2018 Schedule HW 4 Due on Thu 04/12 Programming project 3 Due

More information

Chapter 13. Digital Cash. Information Security/System Security p. 570/626

Chapter 13. Digital Cash. Information Security/System Security p. 570/626 Chapter 13 Digital Cash Information Security/System Security p. 570/626 Introduction While cash is used in illegal activities such as bribing money laundering tax evasion it also protects privacy: not

More information

Smalltalk 3/30/15. The Mathematics of Bitcoin Brian Heinold

Smalltalk 3/30/15. The Mathematics of Bitcoin Brian Heinold Smalltalk 3/30/15 The Mathematics of Bitcoin Brian Heinold What is Bitcoin? Created by Satoshi Nakamoto in 2008 What is Bitcoin? Created by Satoshi Nakamoto in 2008 Digital currency (though not the first)

More information

Biomedical Security. Cipher Block Chaining and Applications

Biomedical Security. Cipher Block Chaining and Applications 1 Biomedical Security Erwin M. Bakker 2 Cipher Block Chaining and Applications Slides and figures are adapted from: W. Stallings, Cryptography and Network Security 4 th Edition and 7 th Edition 1 3 Block

More information

Bitcoin and Cryptocurrency Technologies. Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller, Steven Goldfeder

Bitcoin and Cryptocurrency Technologies. Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller, Steven Goldfeder Bitcoin and Cryptocurrency Technologies Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller, Steven Goldfeder Draft Oct 6, 2015 Chapter 2: How Bitcoin Achieves Decentralization In this chapter,

More information

P2P BitCoin: Technical details

P2P BitCoin: Technical details ELT-53206 Peer-to-Peer Networks P2P BitCoin: Technical details Mathieu Devos Tampere University of Technology Department of Electronics & Communications Engineering mathieu.devos@tut.fi TG406 2 Outline

More information

Bitcoin (Part I) Ken Calvert Keeping Current Seminar 22 January Keeping Current 1

Bitcoin (Part I) Ken Calvert Keeping Current Seminar 22 January Keeping Current 1 Bitcoin (Part I) Ken Calvert Keeping Current Seminar 22 January 2014 2014.01.22 Keeping Current 1 Questions What problem is Bitcoin solving? Where did it come from? How does the system work? What makes

More information

Biomedical Security. Some Security News 10/5/2018. Erwin M. Bakker

Biomedical Security. Some Security News 10/5/2018. Erwin M. Bakker Biomedical Security Erwin M. Bakker Some Security News October 03, 2018 - Hackers attacking healthcare through remote access systems and disrupting operations is the number one patient safety risk, according

More information

BLOCKCHAIN The foundation behind Bitcoin

BLOCKCHAIN The foundation behind Bitcoin BLOCKCHAIN The foundation behind Bitcoin Sourav Sen Gupta Indian Statistical Institute, Kolkata CRYPTOGRAPHY Backbone of Blockchain Technology Component 1 : Cryptographic Hash Functions HASH FUNCTIONS

More information

Introduction to Bitcoin I

Introduction to Bitcoin I Introduction to Bitcoin I P Peterlongo 1 A Tomasi 1 1 University of Trento Department of Mathematics June 10, 2013 Outline 1 Fiat and online payments Functions of Online payments and cost of clearing 2

More information

ICS 421 & ICS 690. Bitcoin & Blockchain. Assoc. Prof. Lipyeow Lim Information & Computer Sciences Department University of Hawai`i at Mānoa

ICS 421 & ICS 690. Bitcoin & Blockchain. Assoc. Prof. Lipyeow Lim Information & Computer Sciences Department University of Hawai`i at Mānoa ICS 421 & ICS 690 Bitcoin & Blockchain Assoc. Prof. Lipyeow Lim Information & Computer Sciences Department University of Hawai`i at Mānoa Accepted by: Overstock.com Expedia.com Newegg.com Tigerdirect.com

More information

EECS 498 Introduction to Distributed Systems

EECS 498 Introduction to Distributed Systems EECS 498 Introduction to Distributed Systems Fall 2017 Harsha V. Madhyastha Today Bitcoin: A peer-to-peer digital currency Spark: In-memory big data processing December 4, 2017 EECS 498 Lecture 21 2 December

More information

How Bitcoin Achieves Decentralization

How Bitcoin Achieves Decentralization Copyright, Princeton University Press. No part of this book may be CHAPTER 2 How Bitcoin Achieves Decentralization In this chapter, we discuss decentralization in Bitcoin. In Chapter 1, we looked at the

More information

Ensimag - 4MMSR Network Security Student Seminar. Bitcoin: A peer-to-peer Electronic Cash System Satoshi Nakamoto

Ensimag - 4MMSR Network Security Student Seminar. Bitcoin: A peer-to-peer Electronic Cash System Satoshi Nakamoto Ensimag - 4MMSR Network Security Student Seminar Bitcoin: A peer-to-peer Electronic Cash System Satoshi Nakamoto wafa.mbarek@ensimag.fr halima.myesser@ensimag.fr 1 Table of contents: I- Introduction: Classic

More information

Security Analysis of Bitcoin. Dibyojyoti Mukherjee Jaswant Katragadda Yashwant Gazula

Security Analysis of Bitcoin. Dibyojyoti Mukherjee Jaswant Katragadda Yashwant Gazula Security Analysis of Bitcoin Dibyojyoti Mukherjee Jaswant Katragadda Yashwant Gazula Security Analysis of Bitcoin Introduction How Bitcoin works? Similar peer-to-peer systems Vulnerabilities and solutions

More information

Consensus & Blockchain

Consensus & Blockchain Consensus & Blockchain S P Suresh Chennai Mathematical Institute Formal Methods Update Meeting IIT Mandi July 17, 2017 The Bitcoin revolution is upon us What is Bitcoin? Bitcoin: an exciting new currency

More information

Bitcoin, a decentralized and trustless protocol

Bitcoin, a decentralized and trustless protocol Bitcoin, a decentralized and trustless protocol Thomas Sibut-Pinote Inria Saclay February 12, 2015 Thomas Sibut-Pinote Bitcoin, a decentralized and trustless protocol 1 / 42 Introduction Questions 1 Introduction

More information

SpaceMint Overcoming Bitcoin s waste of energy

SpaceMint Overcoming Bitcoin s waste of energy Bitcoin Overcoming Bitcoin s waste of energy Georg Fuchsbauer joint work with S Park, A Kwon, K Pietrzak, J Alwen and P Gaži Digital currency Decentralized (no bank issuing coins) Pseudonymous Controled

More information

Hyperledger fabric: towards scalable blockchain for business

Hyperledger fabric: towards scalable blockchain for business Marko Vukolić, IBM Research - Zurich Hyperledger fabric: towards scalable blockchain for business Trust in Digital Life The Hague, Netherlands, June 17 2016 Blockchain shared, replicated, ledger Consensus

More information

Applied cryptography

Applied cryptography Applied cryptography Electronic Cash Andreas Hülsing 29 November 2016 1 / 61 Classical Cash - Life Cycle Mint produces money (coins / bank notes) Sent to bank User withdraws money (reduces account balance)

More information

Biomedical and Healthcare Applications for Blockchain. Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs

Biomedical and Healthcare Applications for Blockchain. Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs Biomedical and Healthcare Applications for Blockchain Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs Network Analysis Working Group 01.25.2018 Outline Introduction to bitcoin + blockchain

More information

Ergo platform. Dmitry Meshkov

Ergo platform. Dmitry Meshkov Ergo platform Dmitry Meshkov Prehistory Motivation Theory Practice Provably secure 1000 currencies New features Ad-hoc solutions Impractical Security issues Motivation Theory Provably secure New features

More information

The power of Blockchain: Smart Contracts. Foteini Baldimtsi

The power of Blockchain: Smart Contracts. Foteini Baldimtsi The power of Blockchain: Smart Contracts Foteini Baldimtsi The Blockchain at the heart of a cryptocurrency Alice sends 2 John sends 1 Dave sends 5 to Bob to Eve to Alice Bob sends 1 Eve sends 4 to Dave

More information

BITCOIN MECHANICS AND OPTIMIZATIONS. Max Fang Philip Hayes

BITCOIN MECHANICS AND OPTIMIZATIONS. Max Fang Philip Hayes 1 BITCOIN MECHNICS ND OPTIMIZTIONS Max Fang Philip Hayes 1 Cryptocurrency Mining: Proof-of-Work Consensus Nadir khtar LECTURE OUTLINE 2 1 Intro and Terminology 2 Bitcoin and Consensus 3 Bitcoin Concepts

More information

Hyperledger Fabric v1:

Hyperledger Fabric v1: Marko Vukolić, IBM Research - Zurich May 4, 2017 Hyperledger Fabric v1: Rethinking Permissioned Blockchains Blockchain: du Bitcoin au Smart Contract 4 Mai 2017 2017 IBM Corporation What is a Blockchain?

More information

Bitcoin: A Peer-to-Peer Electronic Cash System

Bitcoin: A Peer-to-Peer Electronic Cash System Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto satoshin@gmx.com www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online payments to be sent directly

More information

Bitcoin, Security for Cloud & Big Data

Bitcoin, Security for Cloud & Big Data Bitcoin, Security for Cloud & Big Data CS 161: Computer Security Prof. David Wagner April 18, 2013 Bitcoin Public, distributed, peer-to-peer, hash-chained audit log of all transactions ( block chain ).

More information

SCP: A Computationally Scalable Byzantine Consensus Protocol for Blockchains

SCP: A Computationally Scalable Byzantine Consensus Protocol for Blockchains SCP: A Computationally Scalable Byzantine Consensus Protocol for Blockchains Loi Luu, Viswesh Narayanan, Kunal Baweja, Chaodong Zheng, Seth Gilbert, Prateek Saxena National University of Singapore Bitcoin

More information

Let's build a blockchain!

Let's build a blockchain! I'm Haseeb. That's me. Let's build a blockchain! A mini-cryptocurrency in Ruby I'm Haseeb Qureshi. I'm a software engineer. I'm working at a blockchain company called 21.co. Unless something terrible has

More information

CONSENSUS PROTOCOLS & BLOCKCHAINS. Techruption Lecture March 16 th, 2017 Maarten Everts (TNO & University of Twente)

CONSENSUS PROTOCOLS & BLOCKCHAINS. Techruption Lecture March 16 th, 2017 Maarten Everts (TNO & University of Twente) CONSENSUS PROTOCOLS & BLOCKCHAINS Techruption Lecture March 16 th, 2017 Maarten Everts (TNO & University of Twente) 2 Consensus protocols & blockchain 3 Consensus protocols & blockchain 4 Consensus protocols

More information

Jan Møller Co-founder, CTO Chainalysis

Jan Møller Co-founder, CTO Chainalysis Jan Møller Co-founder, CTO Chainalysis How Does Bitcoin Actually Work? This talk is not about the poli:cal or economical impact of Bitcoin. This talk is not about how to buy, sell, spend, or secure your

More information

Distributed Ledger Technology & Fintech Applications. Hart Montgomery, NFIC 2017

Distributed Ledger Technology & Fintech Applications. Hart Montgomery, NFIC 2017 Distributed Ledger Technology & Fintech Applications Hart Montgomery, NFIC 2017 Let s consider a common scenario: Banks want to trade some asset class Participants in the market want to be able to efficiently

More information

BITCOIN PROTOCOL & CONSENSUS: A HIGH LEVEL OVERVIEW

BITCOIN PROTOCOL & CONSENSUS: A HIGH LEVEL OVERVIEW BITCOIN PROTOCOL & CONSENSUS: A HIGH LEVEL OVERVIEW Rustie Lin Wang Move the area1 over the image a little inside and then right click, replace image to change the background. (and delete this box while

More information

About cryptocurrencies and blockchains part 1. Jyväskylä 17th of April 2018 Henri Heinonen

About cryptocurrencies and blockchains part 1. Jyväskylä 17th of April 2018 Henri Heinonen About cryptocurrencies and blockchains part 1 Jyväskylä 17th of April 2018 Henri Heinonen (henri.t.heinonen@jyu.fi) What is a blockchain? BitTorrent is a famous example of a peer-to-peer network (P2P)

More information

BIT COIN. Bitcoin and Cryptocurrency Technologies. Reference. By Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller, Steven Goldfeder

BIT COIN. Bitcoin and Cryptocurrency Technologies. Reference. By Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller, Steven Goldfeder BIT COIN Reference Bitcoin and Cryptocurrency Technologies By Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller, Steven Goldfeder References Main reference: Bitcoin and Cryptocurrency Technologies,

More information

primechain building blockchains for a better world

primechain building blockchains for a better world primechain building blockchains for a better world The nuts and bolts of blockchain technology Rohas Nagpal, Primechain Technologies Pvt. Ltd. The nuts and bolts of blockchain technology Depending upon

More information

REM: Resource Efficient Mining for Blockchains

REM: Resource Efficient Mining for Blockchains REM: Resource Efficient Mining for Blockchains Fan Zhang, Ittay Eyal, Robert Escriva, Ari Juels, Robbert van Renesse Vancouver, Canada 13 September 2017 USENIX Security 2017 1 The Cryptocurrency Vision

More information

Brown University. Yana Hrytsenko. Final Project: Blockchain for PKI: Using Blockchain data structure for Public Key. Infrastructure.

Brown University. Yana Hrytsenko. Final Project: Blockchain for PKI: Using Blockchain data structure for Public Key. Infrastructure. Brown University Yana Hrytsenko Final Project: Blockchain for PKI: Using Blockchain data structure for Public Key Infrastructure May 2017 1 Blockchain for PKI Using Blockchain data structure for Public

More information

BLOCKCHAIN The foundation behind Bitcoin

BLOCKCHAIN The foundation behind Bitcoin BLOCKCHAIN The foundation behind Bitcoin Sourav Sen Gupta Indian Statistical Institute, Kolkata CRYPTOGRAPHY Backbone of Blockchain Technology Component 1 : Cryptographic Hash Functions HASH FUNCTIONS

More information

Bitcoin: A Peer-to-Peer Electronic Cash System

Bitcoin: A Peer-to-Peer Electronic Cash System Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto satoshi@vistomail.com www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online payments to be sent directly

More information

Who wants to be a millionaire? A class in creating your own cryptocurrency

Who wants to be a millionaire? A class in creating your own cryptocurrency DEVNET-3626 Who wants to be a millionaire? A class in creating your own cryptocurrency Tom Davies, Sr. Manager, DevNet Sandbox Vallard Benincosa, Software Engineer Cisco Spark How Questions? Use Cisco

More information

Bitcoin/Namecoin/*coin: On Bitcoin like protocols and their relation to other IT-Security issues

Bitcoin/Namecoin/*coin: On Bitcoin like protocols and their relation to other IT-Security issues : On Bitcoin like protocols and their relation to other IT-Security issues Aljosha Judmayer ajudmayer@sba-research.org 2014-11-07 SBA Research Area 1 (GRC): Governance, Risk and Compliance P1.1: Risk Management

More information

Whitepaper Rcoin Global

Whitepaper Rcoin Global Whitepaper Rcoin Global SUMMARY 1. Introduction 2. What is Rcoin Global? 3. Transactions 4. Hybrid Network Concept 5. Keepers 6. Incentive 7. Smart Contract Token 8. Token Distribution 9. Rcoin Global

More information

Transactions as Proof-of-Stake! by Daniel Larimer!

Transactions as Proof-of-Stake! by Daniel Larimer! Transactions as Proof-of-Stake by Daniel Larimer dlarimer@invictus-innovations.com November, 28 th 2013 Abstract The concept behind Proof-of-Stake is that a block chain should be secured by those with

More information

Lecture 44 Blockchain Security I (Overview)

Lecture 44 Blockchain Security I (Overview) Blockchains Architecture, Design and Use Cases Prof. Sandip Chakraborty Prof. Praveen Jayachandran Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 44 Blockchain

More information

The security and insecurity of blockchains and smart contracts

The security and insecurity of blockchains and smart contracts The security and insecurity of blockchains and smart contracts Jean-Pierre Flori, expert in cryptography, Agence Nationale de la Sécurité des Systèmes d Information (ANSSI) In J.P. Dardayrol, editor of

More information

Blockchain (a.k.a. the slowest, most fascinating database you ll ever see)

Blockchain (a.k.a. the slowest, most fascinating database you ll ever see) Blockchain (a.k.a. the slowest, most fascinating database you ll ever see) GOTO Amsterdam 13 June, 2017 Stefan Tilkov, @stilkov I don t know Blockchain and so can you 1. Bitcoin > Practical application

More information

BYZANTINE CONSENSUS THROUGH BITCOIN S PROOF- OF-WORK

BYZANTINE CONSENSUS THROUGH BITCOIN S PROOF- OF-WORK Informatiemanagement: BYZANTINE CONSENSUS THROUGH BITCOIN S PROOF- OF-WORK The aim of this paper is to elucidate how Byzantine consensus is achieved through Bitcoin s novel proof-of-work system without

More information

Darkcoin: Peer to Peer Crypto Currency with Anonymous Blockchain Transactions and an Improved Proof of Work System

Darkcoin: Peer to Peer Crypto Currency with Anonymous Blockchain Transactions and an Improved Proof of Work System Darkcoin: Peer to Peer Crypto Currency with Anonymous Blockchain Transactions and an Improved Proof of Work System Introduction Evan Duffield, Kyle Hagan (evan@darkcoin.io, kyle@darkcoin.io) 18 March 2014

More information

Bitcoin. Arni Par ov. December 17, 2013

Bitcoin. Arni Par ov. December 17, 2013 Bitcoin Arni Par ov December 17, 2013 Abstract Bitcoin is a distributed, peer-to-peer cryptocurrency that functions without any central authority and in recent years has gained large popularity. This paper

More information

GRADUBIQUE: AN ACADEMIC TRANSCRIPT DATABASE USING BLOCKCHAIN ARCHITECTURE

GRADUBIQUE: AN ACADEMIC TRANSCRIPT DATABASE USING BLOCKCHAIN ARCHITECTURE San Jose State University SJSU ScholarWorks Master's Projects Master's Theses and Graduate Research Fall 12-14-2018 GRADUBIQUE: AN ACADEMIC TRANSCRIPT DATABASE USING BLOCKCHAIN ARCHITECTURE Thinh Nguyen

More information

Using Chains for what They re Good For

Using Chains for what They re Good For Using Chains for what They re Good For Andrew Poelstra usingchainsfor@wpsoftware.net Scaling Bitcoin, November 5, 2017 1 / 14 On-Chain Smart Contracting Bitcoin (and Ethereum, etc.) uses a scripting language

More information

Digital Currencies: Algorithms and Protocols

Digital Currencies: Algorithms and Protocols Digital Currencies: Algorithms and Protocols Élise Alfieri , Emmanuel Fleury LaBRI, Université de Bordeaux, France March 7, 2017 Alfieri, Fleury

More information

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Elli Androulaki Staff member, IBM Research, Zurich Workshop on cryptocurrencies Athens, 06.03.2016 Blockchain systems

More information

A Perspective on Bitcoin and Blockchain

A Perspective on Bitcoin and Blockchain A Perspective on Bitcoin and Blockchain BART PRENEEL IMEC-COSIC KU LEUVEN BART.PRENEEL(AT)ESAT.KULEUVEN.BE 6 JUNE 2017 1 Currencies = maintaining memory Envelope and contents from Susa, Iran, circa 3300

More information

SmartPool: practical decentralized pool mining. Loi Luu, Yaron Velner, Jason Teutsch, and Prateek Saxena August 18, 2017

SmartPool: practical decentralized pool mining. Loi Luu, Yaron Velner, Jason Teutsch, and Prateek Saxena August 18, 2017 SmartPool: practical decentralized pool mining Loi Luu, Yaron Velner, Jason Teutsch, and Prateek Saxena August 18, 2017 Mining pools Miners role in cryptocurrencies Definition: A cryptocurrency is a decentralized

More information

An Introduction to Blockchain and Distributed Ledger Technology

An Introduction to Blockchain and Distributed Ledger Technology An Introduction to Blockchain and Distributed Ledger Technology Ron van der Meyden UNSW School of Computer Science and Engineering The source of the buzz Bitcoin: A Peer-to-Peer Electronic Cash System,

More information

What is Proof of Work?

What is Proof of Work? What is Proof of Work? Educational Series September 18, 2018 Overview There are many protocols that regulate how nodes on a blockchain achieve consensus, and currently the most popular is proof-of-work.

More information

On the impact of propogation delay on mining rewards in Bitcoin. Xuan Wen 1. Abstract

On the impact of propogation delay on mining rewards in Bitcoin. Xuan Wen 1. Abstract On the impact of propogation delay on mining rewards in Bitcoin Xuan Wen 1 Abstract Bitcoin 2 is a decentralized digital currency that is rapidly gaining in popularity. The Bitcoin system relies on miners

More information

Proof of Stake Made Simple with Casper

Proof of Stake Made Simple with Casper Proof of Stake Made Simple with Casper Olivier Moindrot ICME, Stanford University olivierm@stanford.edu Charles Bournhonesque ICME, Stanford University cbournho@stanford.edu Abstract We study the recent

More information

Radix - Public Node Incentives

Radix - Public Node Incentives Radix - Public Node Incentives Dan Hughes Piers Ridyard www.radix.global December 2017 Abstract In this paper we present a novel method for implementing a mechanism to reward work carried out across a

More information

BlockFin A Fork-Tolerant, Leaderless Consensus Protocol April

BlockFin A Fork-Tolerant, Leaderless Consensus Protocol April BlockFin A Fork-Tolerant, Leaderless Consensus Protocol April 2018 @storecoin What are the most desirable features in a blockchain? Scalability (throughput) and decentralization (censorship resistance),

More information

BBc-1 : Beyond Blockchain One - An Architecture for Promise-Fixation Device in the Air -

BBc-1 : Beyond Blockchain One - An Architecture for Promise-Fixation Device in the Air - BBc-1 : Beyond Blockchain One - An Architecture for Promise-Fixation Device in the Air - Kenji Saito and Takeshi Kubo {ks91 t-kubo}@beyond-blockchain.org Revision 0.1 October 31, 2017 1 Introduction Blockchain

More information

Upgrading Bitcoin: Segregated Witness. Dr. Johnson Lau Bitcoin Core Contributor Co-author of Segregated Witness BIPs March-2016

Upgrading Bitcoin: Segregated Witness. Dr. Johnson Lau Bitcoin Core Contributor Co-author of Segregated Witness BIPs March-2016 Upgrading Bitcoin: Segregated Witness Dr. Johnson Lau Bitcoin Core Contributor Co-author of Segregated Witness BIPs 141-143 16-March-2016 Topics A short introduction to Bitcoin transactions What is transaction

More information

Ethereum. Campbell R. Harvey* Duke University and NBER. Ashwin Ramachandran Duke University. Brent Xu ConsenSys. Innovation and Cryptoventures

Ethereum. Campbell R. Harvey* Duke University and NBER. Ashwin Ramachandran Duke University. Brent Xu ConsenSys. Innovation and Cryptoventures Innovation and Cryptoventures Ethereum Campbell R. Harvey* Duke University and NBER Ashwin Ramachandran Duke University Brent Xu ConsenSys February 12, 2018 1 2 Overview Ethereum Basics Under the hood

More information

Realization and Addressing Analysis In Blockchain Bitcoin

Realization and Addressing Analysis In Blockchain Bitcoin IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Realization and Addressing Analysis In Blockchain Bitcoin To cite this article: Raja Sakti Arief Daulay et al 2017 IOP Conf. Ser.:

More information

Analyzing Bitcoin Security. Philippe Camacho

Analyzing Bitcoin Security. Philippe Camacho Analyzing Bitcoin Security Philippe Camacho philippe.camacho@dreamlab.net Universidad Católica, Santiago de Chile 15 of June 2016 Bitcoin matters Map Blockchain Design Known Attacks Security Models Double

More information

Bitcoin/Blockchain. Workshop

Bitcoin/Blockchain. Workshop Prev : H() nonce: 2009 Prev : H() nonce: 13514 Prev : H() nonce: 80724 data data data Bitcoin/Blockchain Workshop Prashanth.B Founder, CEO, lastbit pb@lastbit.io Overview (Day 1 Hour 1) 1. An Introduction

More information

Cryptocurrency and Blockchain Research

Cryptocurrency and Blockchain Research Cryptocurrency and Blockchain Research CHANATHIP NAMPREMPRE, PH.D. 1 Agenda Recall bitcoin consensus protocol Components of bitcoin consensus protocol Variations on the same theme Beware of snake oil Solution:

More information

Technical Analysis of Established Blockchain Systems

Technical Analysis of Established Blockchain Systems Technical Analysis of Established Blockchain Systems Florian Haffke, 20.11.2017, Munich Chair of Software Engineering for Business Information Systems (sebis) Faculty of Informatics Technische Universität

More information

Blockchain, cryptography, and consensus

Blockchain, cryptography, and consensus ITU Workshop on Security Aspects of Blockchain (Geneva, Switzerland, 21 March 2017) Blockchain, cryptography, and consensus Dr. Christian Cachin IBM Research - Zurich www.zurich.ibm.com/~cca/ Geneva, Switzerland,

More information

Scalable overlay Networks

Scalable overlay Networks overlay Networks Dr. Samu Varjonen 1 Lectures MO 15.01. C122 Introduction. Exercises. Motivation. TH 18.01. DK117 Unstructured networks I MO 22.01. C122 Unstructured networks II TH 25.01. DK117 Bittorrent

More information

Neel Gupte. Index Terms Bitcoin, Cryptocurreny, Block Chain, Hashing, Proof-of-Work, Double-spending, Momentum Method, Proof of Stake.

Neel Gupte. Index Terms Bitcoin, Cryptocurreny, Block Chain, Hashing, Proof-of-Work, Double-spending, Momentum Method, Proof of Stake. International Journal of Scientific & Engineering Research, Volume 6, Issue 9, September-2015 259 An Analysis of the Hash-Based Proof-of-Work Chain in the Bitcoin Network Neel Gupte Abstract A Bitcoin

More information

Blockchain Bitcoin & Ethereum

Blockchain Bitcoin & Ethereum Blockchain Bitcoin & Ethereum Pascal.Urien@Telecom-ParisTech.fr Pascal Urien 1 "Bitcoin: A Peer-to-Peer Electronic Cash System." Satoshi Nakamoto In this paper, we propose a solution to the double-spending

More information

Reliability, distributed consensus and blockchain COSC412

Reliability, distributed consensus and blockchain COSC412 Reliability, distributed consensus and blockchain COSC412 Learning objectives Encourage you to always design for failure Appreciate how decentralised consensus is useful to support principles of security

More information

BLOCKCHAIN Blockchains and Transactions Part II A Deeper Dive

BLOCKCHAIN Blockchains and Transactions Part II A Deeper Dive BLOCKCHAIN Blockchains and Transactions Part II A Deeper Dive www.blockchaintrainingalliance.com Blockchain Page 3 Blockchain is NOT Bitcoin Page 4 Transactions Page 5 Multi-Signature Addresses An Address

More information

Blockchain Certification Protocol (BCP)

Blockchain Certification Protocol (BCP) Blockchain Certification Protocol (BCP) Fu Yong Quah fuyong@fyquah.me www.fyquah.me Abstract. A semi-decentralized certification system built above the existing 1 Bitcoin network, an innovative peer-to-peer

More information

Security, Privacy and Interoperability in Payment- Channel Networks

Security, Privacy and Interoperability in Payment- Channel Networks FAKULTÄT FÜR!NFORMATIK Faculty of Informatics & PRIVACY SECURITY GROUP Security, Privacy and Interoperability in Payment- Channel Networks Pedro Moreno-Sanchez (@pedrorechez) Joint work with Giulio Malavolta,

More information

International Journal of Computer Engineering and Applications, Volume XIII, Issue II, Feb. 19, ISSN

International Journal of Computer Engineering and Applications, Volume XIII, Issue II, Feb. 19,   ISSN BLOCK-CHAIN: SURVEY ON PRIVACY, SECURITY AND CHALLENGES Monalisha Sinha ABSTRACT: Department of computer science & engineering Birla institute of technology Ranchi, India Blockchain has gained wide attention

More information

CRUDE COINS. https://crudecoins.net

CRUDE COINS. https://crudecoins.net CRUDE COINS https://crudecoins.net In this whitepaper we have presented Crude Coins is a brand new technology for securely transferring money between anonymous peers. Introduction: Launch story: CrudeCoins

More information

Anupam Datta CMU. Fall 2015

Anupam Datta CMU. Fall 2015 Anupam Datta CMU Fall 2015 A rational reconstruction of Bitcoin 1. Start with straw man design 2. Identify weaknesses 3. Augment design and iterate Alice: I, Alice, am giving Bob one coin Alice digitally

More information

Crypto tricks: Proof of work, Hash chaining

Crypto tricks: Proof of work, Hash chaining Crypto tricks: Proof of work, Hash chaining CS 161: Computer Security Prof. David Wagner April 13, 2016 A Tangent: How Can I Prove I Am Rich? Math Puzzle Proof of Work Problem. To prove to Bob I m not

More information

Formally Specifying Blockchain Protocols

Formally Specifying Blockchain Protocols Formally Specifying Blockchain Protocols 1 IOHK company building blockchain applications research focused invested in functional programming built Cardano network, Ada cryptocurrency 2 Blockchain Protocols

More information

Blockchain! What consultants should know about it. Daniel

Blockchain! What consultants should know about it. Daniel Blockchain! What consultants should know about it. Daniel Karzel @ Workshop Overview Quick overview of what is planned for the workshop. What you get out of this workshop Workshop goals Understand what

More information

A Gentle Introduction To Bitcoin Mining

A Gentle Introduction To Bitcoin Mining A Gentle Introduction To Bitcoin Mining Table of Contents Title...3 How Do Bitcoin Transactions Work?...4 Why Is Mining Needed In Bitcoin?...5 Why Do Miners Mine?...6 What Is This Computationally Expensive

More information

Fruitchains: A Fair Blockchain?

Fruitchains: A Fair Blockchain? Fruitchains: A Fair Blockchain? Kyrylo Voronchenko Supervised by Michal Zajac June 4, 2018 Abstract This report is an overview of the paper [PS16] in which authors introduced a new protocol called FruitChain

More information