International Journal of Computer Engineering and Applications, Volume XIII, Issue II, Feb. 19, ISSN
|
|
- Karen Goodwin
- 5 years ago
- Views:
Transcription
1 BLOCK-CHAIN: SURVEY ON PRIVACY, SECURITY AND CHALLENGES Monalisha Sinha ABSTRACT: Department of computer science & engineering Birla institute of technology Ranchi, India Blockchain has gained wide attention in the recent years due to the advantage related to the decentralised and distributed ledger technology. It contains block of chain, and each block is connected to everyone. Each block contains the information of every block. Peer to peer network is trusted by everyone as any single change is seen by everyone. Block-chain is used by every application like IOT (Internet of Things), finance and so on. But still its privacy challenge can temper block-chain applications. The survey of this paper is to highlight the privacy challenges of block-chain. We also highlight the overview of block-chain their working and their applications used in various field. Keywords: Block-chain, Crypto-currency, Privacy, Digital Signature, IOT, Smart contract, Security [1] INTRODUCTION As internet has covers all the industry, same as block-chain will cover all the industry. In the next 2 and 5 years, block-chain will be used by everyone. Marketing, the beginning of this recent era, block-chain has become the innovative innovation in this digital world. The application of blockchain is widely spread from crypto currency to IOT (internet of things) [1] and so on. Bit coin, the digital crypto currency is the first application of block chain application. It is used to exchange money. Bit coin works on peer-to-peer network. In traditional transaction, when we transfer money there is bank in between them but in block-chain there is no centralised user. It is distributed. But in distributed, the main points come in mind is of security and trust. Security can Monalisha Sinha 6
2 BLOCK-CHAIN: SURVEY ON PRIVACY, SECURITY AND CHALLENGES be achieved by asymmetric cryptography but how can we gain trust. To achieve trust each node will work as ledger and each person present in that node will be able to update and validate the transaction, which will be visible by all of them. This can make trust on each other. [2] CONCEPT OF BLOCK-CHAIN Block-chain is a peer-to -peer network technology, which compromises of several technologies like cryptography, mathematics, algorithm to solve problems of distributed database. The key elements of block-chain make it secure as compared with traditional database. The key elements of block-chain are: - [A]Distributed: Block-chain, P2P (peer-to-peer) network technology [5], where every incoming block are visible by another block in the following node. That incoming block will be verified by all other block in the node, if that block is invalid than it will be discarded otherwise it is added to the chain of block-chain. [B]Transparent: The blocks in the block-chain is seen by all the members present in the chain and if a block is updated then it is also seen by all the members of block-chain. This makes block-chain more secure and transparent. [C]Autonomy: Because of autonomous nature, no single person can control the network. Particularly any person can update and validate the block in the block-chain and view them anytime if they are accepted by other block i.e. members present in that chain in decentralised network. Meanwhile anyone can join the network and a new node will be created. According to consensus property, everyone present in the chain has to trust the entire member in the chain. [D]Immutable: Any block in the block chain cannot be altered by anyone. One has to gain51% of the total node so that he can challenge that block is inaccurate. [3] WORKING OF BLOCK-CHAIN The block-chain works as: - 1. When-ever a new block or an update comes in the chain of block-chain; majority present in the chain verifies the present block and check the history of that block. 2. If the majority in the chain agrees that the history of present block is valid, then that the present block is added to the chain of block-chain. 3. If the majority does not agree of the addition or validation of the block, then that block will be discarded from the chain. Monalisha Sinha 7
3 4. This property of distributed consensus model allows block-chain to be distributed ledger.it means that is no need of centralised database. [4] STRUCTURE OF BLOCK-CHAIN: Block-chain contains of sequence of blocks. That blocks consists of complete list of transactions records and main data, previous block hash, current block hash, timestamp and other information s. Each block present in the block chain points to the previous block and so on and contains the hash of that previous block called the parent block. The first block is called genesis block as it has no parent block and does not contain any hash of previous block. Genesis block only contain hash of its block. The diagram of structure of block-chain is given below: - Block hash Block hash Block hash Time-stamp Time-stamp Time-stamp Previous hash Other information information s GENESIS BLOCK Figure:1. Structure of block-chain Previous hash Other information Previous hash Other information [5] DIGITAL SIGNATURE: Digital signature is an electronic verification of the sender. It serves three purposes: 1. Authentication: a digital signature gives the receiver reason to believe the message was created and sent by the claimed sender. 2. Non-repudiation: with digital signature, the sender cannot deny having sent the message later. 3. Integrity: a digital signature ensures that the message was not altered in transit. It is commonly used for software distribution, financial transaction and other cases where it is important to detect forgery and tampering. Digital signature uses asymmetric cryptography which means public key is employed. In the transaction two keys are created public and private key. Private key is kept with sender and public key is given to receiver. Digest is created by the sender by hashing algorithm. Then the sender encrypts the digest with his private key. This encrypt digest is called digital signature. Elliptic curve digital signature (ECDSA) []is used by the block-chain as digital signature. Monalisha Sinha 8
4 BLOCK-CHAIN: SURVEY ON PRIVACY, SECURITY AND CHALLENGES [6] CONSENSUS IN BLOCK CHAIN: Firstly, what is consensus and why it is required. The dictionary meaning of consensus is general agreement and this is the exact thing happen in distributed system. The fundamental problem in distributed computing is that how we can achieve overall system reliability in the presence of a number of faulty processes. A consensus algorithm is a process in computer science which is used to achieve agreement among distributed processes or system. Proof of work is the example of consensus algorithm. Consensus algorithms in blockchain are: 1. Proof-of-work (PoW) 2. Proof-of-stake (PoS) 3. Proof-of-elapsed time 4. Byzantine fault tolerance 5. Proof of burn [7] PROOF OF WORK (PoW): Bit coins, devised by Satoshi Nakamoto, uses proof of work consensus algorithm. It does two things:- 1. It ensures that the next block in a block-chain is the one and only version of the truth 2. It keeps powerful adversaries from derailing the system and successfully forking the chain.the benefits of Proof-of-work (PoW) is that it works but since one has to do massive mining operation that means bit coin miner has to solve cryptographic puzzles to get reward and it required huge computational power. Huge amount to time and power is consumed in mining in proof of work. The cons of Proof-of-work (PoW) is that it is located in that place where electricity is cheap, it means its killing the planet and the second is that it is slow, it takes 10 to 16 minutes to do a bit coin transaction which actually tough to scale. Proof-of-work (PoW) runs on the system of longest chain wind it runs on the assumption that most of the miner working on the chain and that chain will grow the faster and the longest. Hence, bit coin is safe if more than 50% of the miners are honest. [8] PROOF-OF-STAKE(PoS) Crypto currencies like bit coin uses enormous amounts of energy to secure their networks, but why are that and more importantly- what are the solutions? Mining new coins takes a lot of computing power because of the proof-of work algorithm. Proof of stake is the solution of proof of work. Proof-of-stake uses an election process in which one node is randomly chosen to validate the next block. proof-of-stake has no miner but instead has validator and it does not let people mine block but instead mint or forge blocks. Validators are not chosen completely randomly. To become a validator, a node has to deposit a certain amount of coins into the network as stake. This is also known as security deposit. The size of the stake determines the chances of the validator to be chosen to forge the next block. [9] TYPES OF BLOCKCHAIN: Block-chain is of three types: Monalisha Sinha 9
5 1. Public block-chain: as the name suggests is the block-chain of public, meaning a kind of blockchain which is for the people, by the people and of the people. Anyone in the chain can participate in updating, validating the blocks. Public block-chain is open and transparent to all, it means anyone can see the transaction in the chain. In public block-chain no one is in charge so decision is made by various decentralised consensus mechanism such as proof of work (PoW) and proof-of- stake (PoS). Bit coin and ethereum are public block-chain. 2. Private block-chain: it is a private property of an individual or an organisation. There is an in charge that can validate and update the transaction. The consensus is achieved on the whims of the central in-charge who can give mining rights to anyone or not giving at all. It is cryptographic secured. 3. Consortium block-chain: In consortium block-chain, instead of having one in-charge, there is more than one in-charge. Basically, it is done in group of companies or representatives individuals coming together and making decision for the best benefit of the whole network. [10]APPLICATION OF BLOCK-CHAIN: 1. CRYPTOCURRENCY: BIT COIN Bit coin is a digital currency [2][3][4] which aims to do away with all the problems we have paying for things online. It is the electronic cash which does not depends on any bank. Money is transfer through peer-to-peer network. Bit coin is extremely fast instead of traditional bank. When we send money to someone, we can t get it back. This seems that no one can blame that they can t get their money. 2. SMART CONTRACT Smart contract, also called distributed apps) are very popular. It uses distributed ledger to store contracts. It is same as contract in the real world. The difference is that it is digital. It is tiny program that is stored in block-chain [6][8] 3. HYPERLEDGER Hyper-ledger is not a crypto currency, a block-chain and not a company. It is the project under Linux foundation. It is the open-source development project where people from all over the planet can come and help hyper-ledger to get developed as software and as a platform. It is the open sourced community of communities. 4. IOT IOT continues to grow at a rapid rate sensors and devices are becoming more common place to communicate information in business networks where data such as location temperature or other properties need to be shared a permission block-chain ledger can help create a tamper evident record this opens up new ways of automatic business processes among partner without having to set up a costly centralized It infrastructure and all participate have access to the same data. IOT permits packets transmit required status information as it passes through multiple carriers. the business contract specifies the conditions that must be met during the shipment from the factory to the grocery store and all parties must adhere to the term of the contract, a temperature sensor embedded in the package stores the data locally and sends it to the block-chain through the IOT platform, add weight points upon receiving connectivity information is shared across all peers. In this example, both carrier1 and carrier2 met the contractual obligation and the shipment arrived at its destination without exposure to access temperature using block-chain allows all the business partner to access the same temperature data without requiring central control. Monalisha Sinha 10
6 BLOCK-CHAIN: SURVEY ON PRIVACY, SECURITY AND CHALLENGES [11] SECURITY AND CHALLENGES Now mobile phones are also not safe. They are openly to various attacks. There are number of ways to detect the data such as pattern matching, which are stored in centralised server. So centralized server is also vulnerable for theft of data. Block-chain has helped the security of distributed network [7] 1. 51% attacks: It is the attack on a block-chain i.e. bit coin. In this attack, miners takes control more than 50% of the networks which helps them to prevent new transaction from getting permission to be added in the chain. They could also reverse the transactions that were already completed. Therefore, this could result in double-spending. 2. Fork problems in block-chain Cryptographic key that moves memory, the rules by which the memory is moved are set by the miner itself. So, rules are understood and if rules are changed, then fork is done, and the entire miner needs to agree about the new rules. There are two types of fork Hard fork In hard fork, it only accepts the new nodes, old nodes are made invalid. Updated version must be upgraded. One Path only follow the new and updated path while another path follows the old path. Soft fork In soft fork, previous valid blocks are made invalid. Soft fork requires majority of the miner updating the new rules and likes hard forks only new version is accepted. 3. Block-chain scale As the number of transaction increases, the chain of block-chain will increases and it will take a lot of times and computing power. 4. Block-chain confirmation time Traditional bank takes almost 2-3 days for transaction of money, but block-chain takes nearly 2-3 min to transfer the money. But still some factors are missing in it. [12] CONCLUSION As block-chain is increasing day by day, there are some advantages and disadvantages of blockchain too. People should be made aware about the block-chain technologies. Government should take care regarding their disadvantages and makes new laws so that this technology should change the digital world which should prevent misbehaves. [13] AKNOWLEDGEMENT I would like to thank the Computer Science department at BIT Mesra, Ranchi to provide me deep knowledge regarding block-chain. This helped me a lot in doing survey regarding this paper. Monalisha Sinha 11
7 REFERENCES [1] A. Dorri, S. S. Kanhere, and R. Jurdak, Blockchain in internet of things: challenges and solutions, arxiv preprint arxiv: , [2] D. Genkin, D. Papadopoulos, and C. Papamanthou, Privacy in decentralized cryptocurrencies, Communications of the Acm, vol. 61, no. 6, pp , [3] S. Meiklejohn and C. Orlandi, Privacy-Enhancing Overlays in Bit- coin. Springer Berlin Heidelberg, [4] J. Ylihuumo, D. Ko, S. Choi, S. Park, and K. Smolander, Where is current research on blockchain technology?a systematic review, Plos One, vol. 11, no. 10, p. e , [5] S. King and S. Nadal, Ppcoin: Peer-to-peer Crypto-Currency with Proof-of-Stake, [6] A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Pa- pamanthou, Hawk: The blockchain model of cryp tography and privacy-preserving smart contracts, in 2016 IEEE Symposium on Security and Privacy (SP 16), pp , May [7] Iuon-Chang Lin1,2 and Tzu-Chun Liao, A Survey of Blockchain Security Issues and Challenges, International Journal of Network Security, Vol.19, No.5, PP , Sept [8] H. Watanabe, S. Fujimura, A. Nakadaira, Y. Miyazaki, A. Akutsu, and J. Kishigami, Blockchain contract: Securing a blockchain ap- plied to smart contracts, in IEEE International Conference on Consumer Electronics (ICCE 16), pp , Jan Monalisha Sinha 12
ENEE 457: E-Cash and Bitcoin
ENEE 457: E-Cash and Bitcoin Charalampos (Babis) Papamanthou cpap@umd.edu Money today Any problems? Cash is cumbersome and can be forged Credit card transactions require centralized online bank are not
More informationDistributed Ledger Technology & Fintech Applications. Hart Montgomery, NFIC 2017
Distributed Ledger Technology & Fintech Applications Hart Montgomery, NFIC 2017 Let s consider a common scenario: Banks want to trade some asset class Participants in the market want to be able to efficiently
More informationThe game If you listen very carefully during the first 4 cards (or use the cheat sheet) you will get an advantage on the last 5 cards
The blockchain game GAMEMASTER NOTES Time: 10 minutes The game: up to 9 info/question cards + a short test with 7 questions Reward: The game If you listen very carefully during the first 4 cards (or use
More informationBlockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric
Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Elli Androulaki Staff member, IBM Research, Zurich Workshop on cryptocurrencies Athens, 06.03.2016 Blockchain systems
More informationCS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University
CS 4770: Cryptography CS 6750: Cryptography and Communication Security Alina Oprea Associate Professor, CCIS Northeastern University March 30 2017 Outline Digital currencies Advantages over paper cash
More informationSmalltalk 3/30/15. The Mathematics of Bitcoin Brian Heinold
Smalltalk 3/30/15 The Mathematics of Bitcoin Brian Heinold What is Bitcoin? Created by Satoshi Nakamoto in 2008 What is Bitcoin? Created by Satoshi Nakamoto in 2008 Digital currency (though not the first)
More informationProof of Stake Made Simple with Casper
Proof of Stake Made Simple with Casper Olivier Moindrot ICME, Stanford University olivierm@stanford.edu Charles Bournhonesque ICME, Stanford University cbournho@stanford.edu Abstract We study the recent
More informationComputer Security. 14. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2019
Computer Security 14. Blockchain & Bitcoin Paul Krzyzanowski Rutgers University Spring 2019 April 15, 2019 CS 419 2019 Paul Krzyzanowski 1 Bitcoin & Blockchain Bitcoin cryptocurrency system Introduced
More informationI. Introduction. II. Security, Coinage and Attacks
Abstract Proof of Stake's security has proven itself over years of testing. Advances in this technology in Blackcoin's Proof-of-Stake 3.0 have solved the issues faced with Coin-Age, Block Reward and Blockchain
More informationChapter 13. Digital Cash. Information Security/System Security p. 570/626
Chapter 13 Digital Cash Information Security/System Security p. 570/626 Introduction While cash is used in illegal activities such as bribing money laundering tax evasion it also protects privacy: not
More informationProof-of-Stake Protocol v3.0
Proof-of-Stake Protocol v3.0 Abstract Proof of Stake's security has proven itself reliable & effective over years of testing while at the same time solving Bitcoin s issues caused by the Proof of Work
More informationLet's build a blockchain!
I'm Haseeb. That's me. Let's build a blockchain! A mini-cryptocurrency in Ruby I'm Haseeb Qureshi. I'm a software engineer. I'm working at a blockchain company called 21.co. Unless something terrible has
More informationProblem: Equivocation!
Bitcoin: 10,000 foot view Bitcoin and the Blockchain New bitcoins are created every ~10 min, owned by miner (more on this later) Thereafter, just keep record of transfers e.g., Alice pays Bob 1 BTC COS
More informationCS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University
CS 4770: Cryptography CS 6750: Cryptography and Communication Security Alina Oprea Associate Professor, CCIS Northeastern University April 9 2018 Schedule HW 4 Due on Thu 04/12 Programming project 3 Due
More informationIntroduction to Bitcoin I
Introduction to Bitcoin I P Peterlongo 1 A Tomasi 1 1 University of Trento Department of Mathematics June 10, 2013 Outline 1 Fiat and online payments Functions of Online payments and cost of clearing 2
More informationBlockchains & Cryptocurrencies
1 Blockchains & Cryptocurrencies A Technical Introduction Lorenz Breidenbach ETH Zürich Cornell Tech The Initiative for CryptoCurrencies & Contracts (IC3) 2 Cryptocurrency Mania Market cap as of yesterday:
More informationECC: Peer-to-Peer Electronic Cash with Trustless Network Services
ECC: Peer-to-Peer Electronic Cash with Trustless Network Services Greg Griffith October 2017 (griffith@cryptounited.io) https://www.ecc.network ECC: Peer-to-Peer Electronic Cash with Trustless Network
More informationA Review on Blockchain Application for Decentralized Decision of Ownership of IoT Devices
Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 10, Number 8 (2017) pp. 2449-2456 Research India Publications http://www.ripublication.com A Review on Blockchain Application for
More informationDEV. Deviant Coin, Innovative Anonymity. A PoS/Masternode cr yptocurrency developed with POS proof of stake.
DEV Deviant Coin, Innovative Anonymity A PoS/Masternode cr yptocurrency developed with POS proof of stake. CONTENTS 03 Overview 06 Pre-mine phase 07 Privacy 08 Basic parameters 09 Proof-of-stake The benefits
More informationBlockchain Based E-Voting Recording System Design
Blockchain Based E-Voting Recording System Design Rifa Hanifatunnisa (Author) School of Electrical Engineering and Informatics Bandung Institute of Technology Bandung, West Java, Indonesia rifahani@students.itb.ac.id
More informationKey concepts of blockchain
Advisory A brief history of blockchains 2008 The mysterious Satoshi Nakamoto publishes his Bitcoin white paper 2014 2017 Nov. 23 rd Ethereum crowd sale Number of crypto tokens: 1.172 BTC $8.216 The first
More informationBlockchain without Bitcoin. Muralidhar Gopinath October 19, 2017 University at Albany
Blockchain without Bitcoin Muralidhar Gopinath October 19, 2017 University at Albany What is Blockchain? Contains records (blocks) that are linked (chained) to one another using cryptography Each block
More informationOn the impact of propogation delay on mining rewards in Bitcoin. Xuan Wen 1. Abstract
On the impact of propogation delay on mining rewards in Bitcoin Xuan Wen 1 Abstract Bitcoin 2 is a decentralized digital currency that is rapidly gaining in popularity. The Bitcoin system relies on miners
More informationAn Introduction to Blockchain and Distributed Ledger Technology
An Introduction to Blockchain and Distributed Ledger Technology Ron van der Meyden UNSW School of Computer Science and Engineering The source of the buzz Bitcoin: A Peer-to-Peer Electronic Cash System,
More informationHawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. Yashar Dehkan Asl
Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts Yashar Dehkan Asl Chapter I Introduction Decentralized Cryptocurrencies: Such as Bitcoin and altcoins are getting more
More informationBlockchain. CS 240: Computing Systems and Concurrency Lecture 20. Marco Canini
Blockchain CS 240: Computing Systems and Concurrency Lecture 20 Marco Canini Credits: Michael Freedman and Kyle Jamieson developed much of the original material. Bitcoin: 10,000 foot view New bitcoins
More informationBITCOIN PROTOCOL & CONSENSUS: A HIGH LEVEL OVERVIEW
BITCOIN PROTOCOL & CONSENSUS: A HIGH LEVEL OVERVIEW Rustie Lin Wang Move the area1 over the image a little inside and then right click, replace image to change the background. (and delete this box while
More informationBBc-1 : Beyond Blockchain One - An Architecture for Promise-Fixation Device in the Air -
BBc-1 : Beyond Blockchain One - An Architecture for Promise-Fixation Device in the Air - Kenji Saito and Takeshi Kubo {ks91 t-kubo}@beyond-blockchain.org Revision 0.1 October 31, 2017 1 Introduction Blockchain
More informationBitcoin. CS6450: Distributed Systems Lecture 20 Ryan Stutsman
Bitcoin CS6450: Distributed Systems Lecture 20 Ryan Stutsman Material taken/derived from Princeton COS-418 materials created by Michael Freedman and Kyle Jamieson at Princeton University. Licensed for
More informationAs a 3rd generation currency, not only are transactions secured, private and fast, you actually get paid for holding DigitalPrice coins.
Introduction With the circulation of cryptocurrency becoming common, there is a need for additional information. The scope of this white paper is to provide that information. If you are under the impression
More informationBlockchain! What consultants should know about it. Daniel
Blockchain! What consultants should know about it. Daniel Karzel @ Workshop Overview Quick overview of what is planned for the workshop. What you get out of this workshop Workshop goals Understand what
More informationBurstcoin Technical information about mining and block forging
Burstcoin Technical information about mining and block forging Table of contents 1. Introduction 2. Algorithms and Acronyms 3. Mining process 4. Block forging process Introduction With most cryptocurrencies
More informationWho wants to be a millionaire? A class in creating your own cryptocurrency
DEVNET-3626 Who wants to be a millionaire? A class in creating your own cryptocurrency Tom Davies, Sr. Manager, DevNet Sandbox Vallard Benincosa, Software Engineer Cisco Spark How Questions? Use Cisco
More informationBitcoin, a decentralized and trustless protocol
Bitcoin, a decentralized and trustless protocol Thomas Sibut-Pinote Inria Saclay February 12, 2015 Thomas Sibut-Pinote Bitcoin, a decentralized and trustless protocol 1 / 42 Introduction Questions 1 Introduction
More informationGENESIS VISION NETWORK
GENESIS VISION NETWORK Contents 1. Description of the problem 7 11. Trust management 15 2. The problem with smart contracts 8 12. GVN Token 16 3. Centralised exchanges against decentralised 8 13. Deposit
More informationSpaceMint Overcoming Bitcoin s waste of energy
Bitcoin Overcoming Bitcoin s waste of energy Georg Fuchsbauer joint work with S Park, A Kwon, K Pietrzak, J Alwen and P Gaži Digital currency Decentralized (no bank issuing coins) Pseudonymous Controled
More informationBLOCKCHAIN ARCHITECT Certification. Blockchain Architect
BLOCKCHAIN ARCHITECT Certification Blockchain Architect The Next-Gen IT Academy from Arcitura is dedicated to providing an ever-growing variety of training courses and accreditations in contemporary technologies
More informationBitcoin and Blockchain
Bitcoin and Blockchain COS 418: Distributed Systems Lecture 18 Zhenyu Song [Credit: Selected content adapted from Michael Freedman. Slides refined by Chris Hodsdon and Theano Stavrinos] Why Bitcoin? All
More informationPrivacy based Public Key Infrastructure (PKI) using Smart Contract in Blockchain Technology
2 nd Advanced Workshop on Blockchain, IIT Bombay Privacy based Public Key Infrastructure (PKI) using Smart Contract in Blockchain Technology Sivakumar.P M.Tech (CSE), Sem-III, NIT Trichy Guide:- Dr Kunwar
More informationIntroduction to Cryptoeconomics
Introduction to Cryptoeconomics What is cryptoeconomics? Cryptoeconomics is about... Building systems that have certain desired properties Use cryptography to prove properties about messages that happened
More informationSOME OF THE PROBLEMS IN BLOCKCHAIN TODAY
BLOCKCHAIN EVOLVED THE PROBLEM SOME OF THE PROBLEMS IN BLOCKCHAIN TODAY An overall lack of governance is one of the most challenging facets of current blockchain ecosystems Controversy regarding scalability
More informationBYZANTINE CONSENSUS THROUGH BITCOIN S PROOF- OF-WORK
Informatiemanagement: BYZANTINE CONSENSUS THROUGH BITCOIN S PROOF- OF-WORK The aim of this paper is to elucidate how Byzantine consensus is achieved through Bitcoin s novel proof-of-work system without
More informationprimechain building blockchains for a better world
primechain building blockchains for a better world The nuts and bolts of blockchain technology Rohas Nagpal, Primechain Technologies Pvt. Ltd. The nuts and bolts of blockchain technology Depending upon
More informationTable Of Contents. Introduction Blockchain and Cryptocurrency...1. Stellar (payment network)...2. Internet and its issues...3. LocalXpose...
Table Of Contents Introduction... 1 Blockchain and Cryptocurrency...1 Stellar (payment network)...2 Internet and its issues...3 LocalXpose... 5 How LocalXpose Actually works?...6 Why to use LocalXpose?...7
More informationReliability, distributed consensus and blockchain COSC412
Reliability, distributed consensus and blockchain COSC412 Learning objectives Encourage you to always design for failure Appreciate how decentralised consensus is useful to support principles of security
More informationHyperledger fabric: towards scalable blockchain for business
Marko Vukolić, IBM Research - Zurich Hyperledger fabric: towards scalable blockchain for business Trust in Digital Life The Hague, Netherlands, June 17 2016 Blockchain shared, replicated, ledger Consensus
More informationConsensus & Blockchain
Consensus & Blockchain S P Suresh Chennai Mathematical Institute Formal Methods Update Meeting IIT Mandi July 17, 2017 The Bitcoin revolution is upon us What is Bitcoin? Bitcoin: an exciting new currency
More informationIntroduc)on to Bitcoin
Introduc)on to Bitcoin CONTENTS What is Bitcoin Who created it? Who prints it? How does Bitcoin work? The characteris5cs of Bitcoin WHAT IS BITCOIN Bitcoin is a form of digital currency, created and held
More informationThe power of Blockchain: Smart Contracts. Foteini Baldimtsi
The power of Blockchain: Smart Contracts Foteini Baldimtsi The Blockchain at the heart of a cryptocurrency Alice sends 2 John sends 1 Dave sends 5 to Bob to Eve to Alice Bob sends 1 Eve sends 4 to Dave
More informationBlockFin A Fork-Tolerant, Leaderless Consensus Protocol April
BlockFin A Fork-Tolerant, Leaderless Consensus Protocol April 2018 @storecoin What are the most desirable features in a blockchain? Scalability (throughput) and decentralization (censorship resistance),
More informationSecurity Analysis of Bitcoin. Dibyojyoti Mukherjee Jaswant Katragadda Yashwant Gazula
Security Analysis of Bitcoin Dibyojyoti Mukherjee Jaswant Katragadda Yashwant Gazula Security Analysis of Bitcoin Introduction How Bitcoin works? Similar peer-to-peer systems Vulnerabilities and solutions
More informationWhitepaper Rcoin Global
Whitepaper Rcoin Global SUMMARY 1. Introduction 2. What is Rcoin Global? 3. Transactions 4. Hybrid Network Concept 5. Keepers 6. Incentive 7. Smart Contract Token 8. Token Distribution 9. Rcoin Global
More informationREM: Resource Efficient Mining for Blockchains
REM: Resource Efficient Mining for Blockchains Fan Zhang, Ittay Eyal, Robert Escriva, Ari Juels, Robbert van Renesse Vancouver, Canada 13 September 2017 USENIX Security 2017 1 The Cryptocurrency Vision
More informationTable of contents. Technical Features. Our approach. Technical Overview. Stage 1 (Using Ethereum blockchain) Participants. Data Owner.
Table of contents Technical Features Our approach Technical Overview Stage 1 (Using Ethereum blockchain) Participants Data Owner Data Verifier Marketplace Data Buyer Creditor Data Platform Architecture
More informationEECS 498 Introduction to Distributed Systems
EECS 498 Introduction to Distributed Systems Fall 2017 Harsha V. Madhyastha Today Bitcoin: A peer-to-peer digital currency Spark: In-memory big data processing December 4, 2017 EECS 498 Lecture 21 2 December
More informationWhite Paper. Blockchain alternatives: The case for CRAQ
White Paper Blockchain alternatives: The case for CRAQ Blockchain technology continues to gain attention as the foundation of the bitcoin economy. Given the rapid gain in popularity of bitcoin, it s no
More informationBlockchain and Additive Manufacturing
Blockchain and Additive Manufacturing January 10, 2019 Presentation to the South Texas Section, AIChE Lisa M. Smith Chief Corporate Development Officer Data Gumbo Corporation Blockchain Basics Data Gumbo
More informationData Consistency and Blockchain. Bei Chun Zhou (BlockChainZ)
Data Consistency and Blockchain Bei Chun Zhou (BlockChainZ) beichunz@cn.ibm.com 1 Data Consistency Point-in-time consistency Transaction consistency Application consistency 2 Strong Consistency ACID Atomicity.
More informationBLOCKCHAIN The foundation behind Bitcoin
BLOCKCHAIN The foundation behind Bitcoin Sourav Sen Gupta Indian Statistical Institute, Kolkata CRYPTOGRAPHY Backbone of Blockchain Technology Component 1 : Cryptographic Hash Functions HASH FUNCTIONS
More informationBlockchain (de)constructed
Blockchain (de)constructed Fritz Henglein Department of Computer Science, University of Copenhagen (DIKU) DIKU Business Club meeting on blockchain January 11th, 2016 Fritz Henglein Professor of programming
More informationSecurity: Focus of Control
Security: Focus of Control Three approaches for protection against security threats a) Protection against invalid operations b) Protection against unauthorized invocations c) Protection against unauthorized
More informationWhat is Proof of Work?
What is Proof of Work? Educational Series September 18, 2018 Overview There are many protocols that regulate how nodes on a blockchain achieve consensus, and currently the most popular is proof-of-work.
More informationThe security and insecurity of blockchains and smart contracts
The security and insecurity of blockchains and smart contracts Jean-Pierre Flori, expert in cryptography, Agence Nationale de la Sécurité des Systèmes d Information (ANSSI) In J.P. Dardayrol, editor of
More informationA Blockchain-based Mapping System
A Blockchain-based Mapping System IETF 98 Chicago March 2017 Jordi Paillissé, Albert Cabellos, Vina Ermagan, Fabio Maino jordip@ac.upc.edu http://openoverlayrouter.org 1 A short Blockchain tutorial 2 Blockchain
More informationEVALUATION OF PROOF OF WORK (POW) BLOCKCHAINS SECURITY NETWORK ON SELFISH MINING
EVALUATION OF PROOF OF WORK (POW) BLOCKCHAINS SECURITY NETWORK ON SELFISH MINING I Gusti Ayu Kusdiah Gemeliarana Department of Electrical Engineering University of Indonesia Depok, Indonesia i.gusti79@ui.ac.id
More informationCONSENSUS PROTOCOLS & BLOCKCHAINS. Techruption Lecture March 16 th, 2017 Maarten Everts (TNO & University of Twente)
CONSENSUS PROTOCOLS & BLOCKCHAINS Techruption Lecture March 16 th, 2017 Maarten Everts (TNO & University of Twente) 2 Consensus protocols & blockchain 3 Consensus protocols & blockchain 4 Consensus protocols
More informationFormally Specifying Blockchain Protocols
Formally Specifying Blockchain Protocols 1 IOHK company building blockchain applications research focused invested in functional programming built Cardano network, Ada cryptocurrency 2 Blockchain Protocols
More informationA Lightweight Blockchain Consensus Protocol
A Lightweight Blockchain Consensus Protocol Keir Finlow-Bates keir@chainfrog.com Abstract A lightweight yet deterministic and objective consensus protocol would allow blockchain systems to be maintained
More informationICS 421 & ICS 690. Bitcoin & Blockchain. Assoc. Prof. Lipyeow Lim Information & Computer Sciences Department University of Hawai`i at Mānoa
ICS 421 & ICS 690 Bitcoin & Blockchain Assoc. Prof. Lipyeow Lim Information & Computer Sciences Department University of Hawai`i at Mānoa Accepted by: Overstock.com Expedia.com Newegg.com Tigerdirect.com
More informationDAVID ANDREWS, FOUNDER RYATTA BLOCKCHAIN FOUNDATIONS
DAVID ANDREWS, FOUNDER RYATTA GROUP, CRYPTOGRAPHY IS THE STUDY OF TECHNIQUES FOR SECURE COMMUNICATION cryptography is defined as the practice and study of techniques for secure communication in the early
More informationAnalyzing Bitcoin Security. Philippe Camacho
Analyzing Bitcoin Security Philippe Camacho philippe.camacho@dreamlab.net Universidad Católica, Santiago de Chile 15 of June 2016 Bitcoin matters Map Blockchain Design Known Attacks Security Models Double
More informationNON-TECHNICAL WHITEPAPER Version 1.0
NON-TECHNICAL WHITEPAPER Version 1.0 Abstract Decentralization in Cryptocurrency Standard blockchain environments contain many centralization vulnerabilities, such as monolithic development, consensus
More informationPhysical Access Control Management System Based on Permissioned Blockchain
Physical Access Control Management System Based on Permissioned Blockchain Sara Rouhani Department of Computer Science University of Saskatchewan Saskatoon, Canada sara.rouhani@usask.ca Vahid Pourheidari
More informationThe nuts and bolts of blockchain technology
The nuts and bolts of blockchain technology Rohas Nagpal Primechain Technologies Pvt. Ltd. rohas@primechain.in Abstract: Blockchain technology has earned the respect of Governments and banks around the
More informationRealization and Addressing Analysis In Blockchain Bitcoin
IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Realization and Addressing Analysis In Blockchain Bitcoin To cite this article: Raja Sakti Arief Daulay et al 2017 IOP Conf. Ser.:
More informationDistributed Ledger With Secure Data Deletion
Distributed Ledger With Secure Data Deletion Vitalii Demianets (norbloc AB), Astyanax Kanakakis (norbloc AB) Revision 1.4, November 2016 Abstract One of the core attributes of distributed ledgers, the
More informationBaFin-Tech 2018 BlockChain & Security (from #developerview)
BaFin-Tech 2018 BlockChain & Security (from #developerview) DLT Lab 10 th April 2018 sven.lehnert@main-incubator.com, @itnext_de Experiences from practice Agenda: Blockchain Security 1 Theory: Blockchain
More informationBlockchain, cryptography, and consensus
ITU Workshop on Security Aspects of Blockchain (Geneva, Switzerland, 21 March 2017) Blockchain, cryptography, and consensus Dr. Christian Cachin IBM Research - Zurich www.zurich.ibm.com/~cca/ Geneva, Switzerland,
More informationIoT security based on the DPK platform
Zz S E C U M O B I. WHITE PAPER IoT security based on the DPK platform Powered by Ethereum David Khoury Elie Kfoury ABSTRACT Public key distribution remains one of the main security weaknesses in many
More informationNeel Gupte. Index Terms Bitcoin, Cryptocurreny, Block Chain, Hashing, Proof-of-Work, Double-spending, Momentum Method, Proof of Stake.
International Journal of Scientific & Engineering Research, Volume 6, Issue 9, September-2015 259 An Analysis of the Hash-Based Proof-of-Work Chain in the Bitcoin Network Neel Gupte Abstract A Bitcoin
More informationKDC COIN WHITEPAPER KDC COIN WHITEPAPER.
KDC COIN WHITEPAPER Contents 1.Introduction 2.Key technologies 2.1 Proof-of-stake 2.1.1 Comparison of POW and DPOS 2.1.2 Encryption 2.1.3 Blocks and block creation 2.1.4 Coins and forging process 2.1.5
More informationPrelude. The notes within this Whitepaper publication are intended to formally document the concepts and features of the Aegeus cryptocurrency.
Prelude The notes within this Whitepaper publication are intended to formally document the concepts and features of the Aegeus cryptocurrency. This document will explain methodically, the details of the
More informationBlockchain Certification Protocol (BCP)
Blockchain Certification Protocol (BCP) Fu Yong Quah fuyong@fyquah.me www.fyquah.me Abstract. A semi-decentralized certification system built above the existing 1 Bitcoin network, an innovative peer-to-peer
More informationEnsimag - 4MMSR Network Security Student Seminar. Bitcoin: A peer-to-peer Electronic Cash System Satoshi Nakamoto
Ensimag - 4MMSR Network Security Student Seminar Bitcoin: A peer-to-peer Electronic Cash System Satoshi Nakamoto wafa.mbarek@ensimag.fr halima.myesser@ensimag.fr 1 Table of contents: I- Introduction: Classic
More informationErgo platform. Dmitry Meshkov
Ergo platform Dmitry Meshkov Prehistory Motivation Theory Practice Provably secure 1000 currencies New features Ad-hoc solutions Impractical Security issues Motivation Theory Provably secure New features
More informationHow Formal Analysis and Verification Add Security to Blockchain-based Systems
Verification Add Security to Blockchain-based Systems January 26, 2017 (MIT Media Lab) Pindar Wong (VeriFi Ltd.) 2 Outline of this talk Security Definition of Blockchain-based system Technology and Security
More informationBiomedical and Healthcare Applications for Blockchain. Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs
Biomedical and Healthcare Applications for Blockchain Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs Network Analysis Working Group 01.25.2018 Outline Introduction to bitcoin + blockchain
More informationBitcoin (Part I) Ken Calvert Keeping Current Seminar 22 January Keeping Current 1
Bitcoin (Part I) Ken Calvert Keeping Current Seminar 22 January 2014 2014.01.22 Keeping Current 1 Questions What problem is Bitcoin solving? Where did it come from? How does the system work? What makes
More informationKey Security Issues for implementation of Digital Currency, including ITU-T SG17 activities
ITU Workshop on FG DFC Workshop on Standards for Digital Fiat Currency (DFC) () Key Issues for implementation of Digital Currency, including ITU-T SG17 activities Heung Youl Youm, PhD. Chairman of ITU-T
More informationBlockchain (a.k.a. the slowest, most fascinating database you ll ever see)
Blockchain (a.k.a. the slowest, most fascinating database you ll ever see) GOTO Amsterdam 13 June, 2017 Stefan Tilkov, @stilkov I don t know Blockchain and so can you 1. Bitcoin > Practical application
More informationBLOCKCHIAN (BC) is an immutable timestamp ledger of
1 LSB: A Lightweight Scalable BlockChain for IoT Security and Privacy Ali Dorri, Salil S. Kanhere, Raja Jurdak, and Praveen Gauravaram arxiv:1712.2969v1 [cs.cr] 8 Dec 217 Abstract BlockChain (BC) has attracted
More informationBitcoin/Namecoin/*coin: On Bitcoin like protocols and their relation to other IT-Security issues
: On Bitcoin like protocols and their relation to other IT-Security issues Aljosha Judmayer ajudmayer@sba-research.org 2014-11-07 SBA Research Area 1 (GRC): Governance, Risk and Compliance P1.1: Risk Management
More informationEXECUTIVE PRODUCT SUMMARY
Enterprise Blockchain Infrastructure For Decentralized Internet EXECUTIVE PRODUCT SUMMARY August 10 th 2018 A product by Contents Opportunity....1 Introduction.... 2 Solution.... 3 Microservices Oriented
More informationTechnical White Paper. Cube Engine Version 1.0
Technical White Paper Cube Engine Version 1.0 Last Updated: Feb 06. 2018 1 Contents 1. Summary 1) Introduction 2) Overview 2. Features of Cube Chain 1) Cubing 2) Indexing Block 3) Statistics Block 4) Escrow
More informationElphyrecoin (ELPH) a Private, Untraceable, ASIC-Resistant CryptoCurrency Based on CryptoNote
Elphyrecoin (ELPH) a Private, Untraceable, ASIC-Resistant CryptoCurrency Based on CryptoNote This is the First Version of the Elphyrecoin s White Paper Please Check the Website for Future Updates White
More informationVladimir Groshev. COO, Project Coordinator.
Vladimir Groshev COO, Project Coordinator If absolute anonymity and complete security is what you are looking for, Then SISHUB is what you need! 1. Anonymous STEEL Messenger 2. Built-in cryptocurrency
More informationUniversity of Duisburg-Essen Bismarckstr Duisburg Germany HOW BITCOIN WORKS. Matthäus Wander. June 29, 2011
University of Duisburg-Essen Bismarckstr. 90 47057 Duisburg Germany HOW BITCOIN WORKS June 29, 2011 Overview Electronic currency system Decentralized No trusted third party involved Unstructured peer-to-peer
More informationToken White Paper. Global marketplace based on Block chain for small-scale business I ver P a g e
Token White Paper Global marketplace based on Block chain for small-scale business 1 P a g e 2018 I ver. 1.0 Contents Qatar Coin Token 3 Contents 4 1. What is QatarCoin 5 2. What is a digital currency
More informationEthereum. Campbell R. Harvey* Duke University and NBER. Ashwin Ramachandran Duke University. Brent Xu ConsenSys. Innovation and Cryptoventures
Innovation and Cryptoventures Ethereum Campbell R. Harvey* Duke University and NBER Ashwin Ramachandran Duke University Brent Xu ConsenSys February 12, 2018 1 2 Overview Ethereum Basics Under the hood
More informationSecure Multi Level Encryption with Blockchain in Distributed system
Impact Factor (SJIF): 5.301 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 Volume 6, Issue 4, April-2019 Secure Multi Level Encryption
More information