Alternative Consensus Algorithms. Murat Osmanoglu
|
|
- Marion George
- 5 years ago
- Views:
Transcription
1 Alternative Consensus Algorithms Murat Osmanoglu
2 Bitcoin Block i-1 Block i Block i+1 Hash i-2 Nonce i-1 Hash i-1 Nonce i Hash i Nonce i+1 tx tx tx tx tx tx tx tx tx tx tx tx
3 Do you really need a Blockchain? Do you need a shared, consistent data store? Does more than one entity need to contribute the data? Data records, once written, are never updated or deleted? Sensitive identifiers wont be written to the data store? BC provides a historically consistent data store. If you don t need that, use or spreadsheets If your data comes from a single entity, use a database Blockchains don t allow modifications of historical data, if you don t need, use database Blockchain is not the proper place to write sensitive information, even if it s encrypted, Encrypted database Are the entities having a hard time deciding who controls the data? Do you want a tamperproof log of all writes to data store? You may have a blockchain! If there are no trust or control issues over who runs the data, use managed database If you don t need to audit what happened and when it happened use a database
4 Forms of Government Democracy Autocracy rule of the one Oligarchy rule of the few Democracy rule of the majority
5 Democracy Forms of Government Autocracy rule of the one autos(self) + kratos(to rule) Oligarchy rule of the few oligos(few) + arkho(to rule) Democracy rule of the majority demos(people) + kratos(to rule)
6 Democracy best way to ensure that an organization serves the interests of all its members fairly and equitably is to spread the ultimate power of decision and action evenly among all of its members but how the agreement be achieved on making rules or taking actions in the case of inevitable disagreements, conflict of interest, and varying levels of time, knowledge, and abilities among members voting is the key component in decision-making voting used for the purpose of making decisions or electing representatives? direct democracy and representative democracy
7 Democracy Direct Democracy to ensure maximum equality and fairness, all members for an organization should directly get involved in all important decision-making processes may not be possible for big organizations such as state or country Even if is feasible, it may not be desirable there is a wide variance in knowledge, interests, and abilities among the members of an organization. if the influence of each member is equal, the effective wisdom of collective may not be better than the average even it can be worse than average if that is the aggregation of conflicting policies
8 Representative Democracy Democracy relatively small number of people are elected by the members to make decisions on their behalf it creates stability or cohesiveness of policy but a powerful minority may take over the power for a long period of time it may promise proportional representation along certain lines (geographic), but may also incline disproportionalities along different lines (ethnic, racial, gender) full-time positions for the representatives (nothing for the losers), smaller body is less costly to maintain, and more efficient to act larger body is better to establish close relationship between the members and the representatives, and better in terms of reflecting the overall decision
9 Democracy Delegative Democracy (or Liquid Democracy) The members of the organization should have the widest possible direct choice of representatives They may build close relationships with their representatives No specific limit on the number of representatives Delegates don t have to compete with each other as in representative democracy They may compete to get votes from the members, but they don t win or loose seats As a member, there is no need to study candidates or party programs, just delegating your vote to someone you trust
10 Democracy Delegative Democracy (or Liquid Democracy) is there any upper bound for the number of members a delegate can represent? How do we maintain such body?(the cost of the maintenance?) How do we implement the voting process? How do we implement the decision-making process among the delegates?
11 Delegated Proof of Stake (Ouroboros) to be able to create blocks, stakeholders must be online, but this is not attractive for the one having small stake to be able generate fresh randomness for the leader election, majority of the elected stakeholders should participate in MPC protocol, that creates a strain on the network stakeholders will authorize other stakeholders to create blocks on their behalf and to represent them in leader election a delegate may join in the protocol only if he represents a number of stakeholders whose stake exceeds a given threshold Setting a threshold value avoids the fragmentation attack that aims to increase the delegate population in order to damage the performance
12 Delegated Proof of Stake (Ouroboros) any stakeholder can authorize a delegate to generate blocks on his behalf by utilizing a proxy signature scheme proxy signature enables someone (original signer) to delegate another one (proxy signer) to sign messages on his behalf, in case of temporal absence, lack of time, or computational power to limit the block generation power of the delegate to a certain range (slots or epoch), the stakeholder can put a limit on the message space the proxy can only sign the message ending with a slot number sl j
13 Delegated Proof of Stake (Larimer) every participant may delegate his voting power to a representative. top 100 representatives holding the total votes take turns to generate the next 100 blocks on defined schedule all representatives earn equal amount of money which is 10% of the transaction fees included in the average block if one of the representatives do not produce block, then this slot is skipped, and the protocol will continue with the next representative
14 Delegated Proof of Stake (Larimer) every wallet has a preference window that enables users to choose one or more representatives to vote once decided, user creates a transaction to transfer votes to the representative without a fee users can also monitor their representatives through their wallet, and change them according to the performance as long as more than half of the scheduled 100 blocks are produced after a transaction is broadcasted, then this transaction assumed to be on the majority fork.
15 Delegated Proof of Stake (Larimer) any transaction approved by even one of the representative can be included in the ledger in less than 30 min (block produced in 30 seconds) so none of the representatives can benefit by excluding transactions that for the other representatives top 100 are given equal weight regardless of votes delegated to them. One representative may control multiple representatives, even more than half since the votes may not be distributed equally. it can quickly be identified, and eliminated
16 Proof of Space (SpaceMint) to create a block, miners invest disk space instead of computing power dedicating more disk space means higher chance to create a block once the dedicated space is initialized, the cost of mining is marjinal a few disk accesses with minimal computation even if the reward is much smaller than the cost of buying disk space for mining, space still be dedicated towards mining unused disk space is available on many personal computers most mining is currently done by specialized ASICs, and they have no use other than Bitcoin mining. No such devices required for PoSpace a simple idea can be applied to Bitcoin to avoid mining pools : instead of applying the hash function to a nonce directly, it will be applied to the signature of the nonce (similar idea can be adapted to SpaceMint)
17 Proof of Space (SpaceMint) Prover At the initialization, prover stores some data F of size N Verifier At the initialization, verifier keeps only small piece of information S about F At any time later, verifier initialize a proof execution phase At the end, verifier outputs reject or accept we demand that verifier is highly efficient in both phases, and prover is highly efficient in the execution (generating the proof) and in the access to F be careful; a cheating prover can delete F after initialization
18 Graph Pebbling Proof of Space (SpaceMint) consider a directed acyclic graph G = (V E) every vertex is associated with a value w(v) in {0,1} L v 1 v 2 w(v 2 ) = H(v 2, w(v 1 )) v 5 w(v 5 ) = H(v 5, w(v 2 ), w(v 3 ), w(v 4 )) w(v 1 ) = H(v 1 ) v 3 v 4 w(v 3 ) = H(v 3, w(v 1 )) w(v 4 ) = H(v 4, w(v 2 ), w(v 3 )) Parameter : G = (V, E) s.t. lvl=n, D is efficiently samplable distribution over vertices First prover creates S=w(V) and a short proof λ from S, then keeps the graph and gives λ to verifier Verifier samples a subset CçD, and gives C to P Prover creates an answer A=w(C) for C Verifier accepts if A is compatible with λ
19 Hash Trees for Graph Pebbling Proof of Space (SpaceMint) v 1 v 2 v 3 v 4 v 5 v 6 v 7 v 8 x 1 x 2 x 3 x 4 x 5 x 12 x 34 x 56 x 1234 λ x a = H(v a ) x ab =H(x a,x b ) x abcd =H(x ab, x cd ) λ = H(x 1234,x 5678 ) x 6 x 7 x 78 x 5678 Prover creates hash tree and sends λ to verifier Verifier sends a challenge, for instance v 3, to prover Prover sends x 3 together with x 8 {x 4,x 12,x 5678 } to verifier Verifier accepts if If H is collusion-resistant, then prover must keep all the data to be able to provide valid proof λ=h(h(x 12,H(x 3,x 4 )),x 5678 )
20 Challenges Proof of Space (SpaceMint) Proof of Space requires interactions, it s hard to adapt it to the blockchain settings Generating a PoSpace is computationally cheap. It needs some clever way to decide which of many proof wins a miner should learn if he is a winner without any interaction nothing-at-stake : if mining is computationally cheap, then miners can mine on multiple chains, or try to create many different blocks with a single proof slows down consensus gives chance to cheating miners to get a greater reward enables double-spending attacks by someone controlling less than 50% of the space
21 Construction Proof of Space (SpaceMint) a miner joins the network by announcing its space commitment (pk, λ) via a special transaction. Genè(pk,sk), Init(pk,N)è(S,λ) where N is the size of the space in terms of bits that the miner contributes to the mining effort PC SC Block i Block i+1 Hash i Sig i Tran i Hash i+1 Sig i+1 Tran i+1 Hash i : current block index i miner s signature on Hash i-1 a space proof that contains pk Sig i : current block index i miner s signature on Tran i miner s signature on Sig i-1 Tran i : current block index i list of transactions Once an honest miner adds a new block to the chain, the transactions up to this block cannot be changed, even by someone that holds all secret keys of the miners that added all the previous blocks.
22 Construction three types of transactions : Proof of Space (SpaceMint) - regular payments : has the form tx = (payment, txid, in, out) where txid is a unique ID (no two tx in the blockchain can have same ID in is a list of input coins, in = (in 1,,in n ) where in j = (txid j,k j,sig j ) such that k j is an index that indicates the sender of txid j out is a list of output coins, out = (out 1,,out m ) where out i =(pk i,v i ) such that - space commitments : has the form tx = (commit, txid, (pk, λ)) where Init(pk,N) è(pk, λ) - penalties : has the form tx = (penalty, txid, pk, prf) pk is the public key of the transaction creator prf is the proof indicating that two blocks of same index signed by the same signer For regular payments; all signatures must be valid, any subsequent transaction must be used only one time in the blockchain(double-spendin), and the sum of the input values should be at least the sum of the output for the acceptance of tx
23 Construction Proof of Space (SpaceMint) Mining : - extract the hash value of the last block in the best chain so far, and a challenge c which is used to derive two long random strings C u, C v - compute challenges Chal(n,u,C u ) = (c 1,,c u ) - compute the proof of space a = (a 1,,a u ) - compute the quality Q(pk,λ,c,a) of the proof - if the quality is high enough (there is a realistic chance to be the best proof in that period), compute the proof of correct commitment b = (b 1,,b v ), create a block, send the block to the network
24 Construction Proof of Space (SpaceMint) Mining : - extract the hash value of the last block in the best chain so far, and a challenge c which is used to derive two long random strings C u, C v - compute challenges Chal(n,u,C u ) = (c 1,,c u ) How do we create this challenge? - (i-1)th compute block the can proof be of used space to derive a = (a 1,,a that u ) challenge, but it can slow down the consensus. - compute there may the quality be many Q(pk,λ,c,a) chains; rational of the miners proof can create different challenges for different chains, and try to create - if proofs the quality for different is high enough chains (there since it is is a easy realistic to do chance it to be the best proof in that period), compute the proof of correct commitment b = (b 1, Derive the challenge from the hash of block i Δ,b v ), create a block, send the block to the network the probability of multiple chains surviving for more than Δ blocks decreases exponentially
25 Construction Proof of Space (SpaceMint) Mining For : a set of valid proofs π 1 =(pk 1,λ 1,c 1, a 1 ),, π m =(pk m,λ m,c m, a m ), Q(π i ) should be defined in a way that the probability that π i has - extract the best the quality hash among value πof 1,, the π m last corresponds block in the to ith best miner s chain so far, and a challenge fraction of c which the total is used space to in derive the network, long which random is strings C u, C v N i / (N N m ) - compute where N challenges Chal(n,u,C u ) = (c 1,,c u ) i is the space committed to λ i - compute the proof of space a = (a 1,,a u ) - compute the quality Q(pk,λ,c,a) of the proof - if the quality is high enough (there is a realistic chance to be the best proof in that period), compute the proof of correct commitment b = (b 1,,b v ), create a block, send the block to the network
26 Nothing-at-Stake Grinding: Proof of Space (SpaceMint) - In PoSpace, it s computationally easy to generate proofs. So, miners can work on many different blocks (just try different transactions) till finding a good one that will allow them to generate good proofs for future - the challenge is derived from proof chain that does not contain transactions. Thus, a prover can create at most one valid proof per challenge Mining on mutiple chains: - In PoSpace, it s computationally easy to generate proofs. So, miners can work on all known chains in parallel to increase their profits, even to try double-spending and selfish-mining. - the challenge is derived the hash of block i Δ, and for any challenge there is a single proof. Besides, the protocol imposes a penalty via the penalty transactions (half of the reward for bad block is given to the creator of the penalty transaction, and other half is diminished)
SpaceMint Overcoming Bitcoin s waste of energy
Bitcoin Overcoming Bitcoin s waste of energy Georg Fuchsbauer joint work with S Park, A Kwon, K Pietrzak, J Alwen and P Gaži Digital currency Decentralized (no bank issuing coins) Pseudonymous Controled
More informationFormally Specifying Blockchain Protocols
Formally Specifying Blockchain Protocols 1 IOHK company building blockchain applications research focused invested in functional programming built Cardano network, Ada cryptocurrency 2 Blockchain Protocols
More informationTransactions as Proof-of-Stake! by Daniel Larimer!
Transactions as Proof-of-Stake by Daniel Larimer dlarimer@invictus-innovations.com November, 28 th 2013 Abstract The concept behind Proof-of-Stake is that a block chain should be secured by those with
More informationENEE 457: E-Cash and Bitcoin
ENEE 457: E-Cash and Bitcoin Charalampos (Babis) Papamanthou cpap@umd.edu Money today Any problems? Cash is cumbersome and can be forged Credit card transactions require centralized online bank are not
More informationChapter 13. Digital Cash. Information Security/System Security p. 570/626
Chapter 13 Digital Cash Information Security/System Security p. 570/626 Introduction While cash is used in illegal activities such as bribing money laundering tax evasion it also protects privacy: not
More informationProblem: Equivocation!
Bitcoin: 10,000 foot view Bitcoin and the Blockchain New bitcoins are created every ~10 min, owned by miner (more on this later) Thereafter, just keep record of transfers e.g., Alice pays Bob 1 BTC COS
More informationIntroduction to Cryptoeconomics
Introduction to Cryptoeconomics What is cryptoeconomics? Cryptoeconomics is about... Building systems that have certain desired properties Use cryptography to prove properties about messages that happened
More informationComputer Security. 14. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2019
Computer Security 14. Blockchain & Bitcoin Paul Krzyzanowski Rutgers University Spring 2019 April 15, 2019 CS 419 2019 Paul Krzyzanowski 1 Bitcoin & Blockchain Bitcoin cryptocurrency system Introduced
More informationAlternatives to Blockchains. Sarah Meiklejohn (University College London)
Alternatives to Blockchains Sarah Meiklejohn (University College London) fully decentralized cryptocurrencies 2 fully decentralized cryptocurrencies tx tx(addra addrb) 2 fully decentralized cryptocurrencies
More informationOUROBOROS PRAOS: AN ADAPTIVELY-SECURE, SEMI-SYNCHRONOUS
OUROBOROS PRAOS: AN ADAPTIVELY-SECURE, SEMI-SYNCHRONOUS PROOF-OF-STAKE BLOCKCHAIN Bernardo David Tokyo Tech & IOHK Peter Gaži IOHK Aggelos Kiayias U. Edinburgh & IOHK Eurocrypt 2018 Alexander Russell U.
More informationBitcoin. CS6450: Distributed Systems Lecture 20 Ryan Stutsman
Bitcoin CS6450: Distributed Systems Lecture 20 Ryan Stutsman Material taken/derived from Princeton COS-418 materials created by Michael Freedman and Kyle Jamieson at Princeton University. Licensed for
More informationAs a 3rd generation currency, not only are transactions secured, private and fast, you actually get paid for holding DigitalPrice coins.
Introduction With the circulation of cryptocurrency becoming common, there is a need for additional information. The scope of this white paper is to provide that information. If you are under the impression
More informationBlockchain. CS 240: Computing Systems and Concurrency Lecture 20. Marco Canini
Blockchain CS 240: Computing Systems and Concurrency Lecture 20 Marco Canini Credits: Michael Freedman and Kyle Jamieson developed much of the original material. Bitcoin: 10,000 foot view New bitcoins
More informationOn the impact of propogation delay on mining rewards in Bitcoin. Xuan Wen 1. Abstract
On the impact of propogation delay on mining rewards in Bitcoin Xuan Wen 1 Abstract Bitcoin 2 is a decentralized digital currency that is rapidly gaining in popularity. The Bitcoin system relies on miners
More informationSmalltalk 3/30/15. The Mathematics of Bitcoin Brian Heinold
Smalltalk 3/30/15 The Mathematics of Bitcoin Brian Heinold What is Bitcoin? Created by Satoshi Nakamoto in 2008 What is Bitcoin? Created by Satoshi Nakamoto in 2008 Digital currency (though not the first)
More informationEECS 498 Introduction to Distributed Systems
EECS 498 Introduction to Distributed Systems Fall 2017 Harsha V. Madhyastha Today Bitcoin: A peer-to-peer digital currency Spark: In-memory big data processing December 4, 2017 EECS 498 Lecture 21 2 December
More informationIntroduction to Cryptocurrency Ecosystem. By Raj Thimmiah
Introduction to Cryptocurrency Ecosystem By Raj Thimmiah How does a normal payment system work? Normal payment systems (generally) use ledgers Easy for servers to then check if someone is committing double
More informationProof-of-Stake Protocol v3.0
Proof-of-Stake Protocol v3.0 Abstract Proof of Stake's security has proven itself reliable & effective over years of testing while at the same time solving Bitcoin s issues caused by the Proof of Work
More informationCONSENSUS PROTOCOLS & BLOCKCHAINS. Techruption Lecture March 16 th, 2017 Maarten Everts (TNO & University of Twente)
CONSENSUS PROTOCOLS & BLOCKCHAINS Techruption Lecture March 16 th, 2017 Maarten Everts (TNO & University of Twente) 2 Consensus protocols & blockchain 3 Consensus protocols & blockchain 4 Consensus protocols
More informationBlockchain, Cryptocurrency, Smart Contracts and Initial Coin Offerings: A Technical Perspective
SESSION ID: LAB3-R09 Blockchain, Cryptocurrency, Smart Contracts and Initial Coin Offerings: A Technical Perspective Tom Plunkett Consulting Solutions Director Oracle Captain Brittany Snelgrove United
More informationWhat is Proof of Work?
What is Proof of Work? Educational Series September 18, 2018 Overview There are many protocols that regulate how nodes on a blockchain achieve consensus, and currently the most popular is proof-of-work.
More informationBitcoin and Blockchain
Bitcoin and Blockchain COS 418: Distributed Systems Lecture 18 Zhenyu Song [Credit: Selected content adapted from Michael Freedman. Slides refined by Chris Hodsdon and Theano Stavrinos] Why Bitcoin? All
More informationA Gentle Introduction To Bitcoin Mining
A Gentle Introduction To Bitcoin Mining Table of Contents Title...3 How Do Bitcoin Transactions Work?...4 Why Is Mining Needed In Bitcoin?...5 Why Do Miners Mine?...6 What Is This Computationally Expensive
More informationErgo platform: from prototypes to a survivable cryptocurrency
January 2019 Dmitry Meshkov Ergo platform: from prototypes to a survivable cryptocurrency Outline Ergo Consensus Light Storage vision protocol clients fee Voting Smart Monetary Roadmap system contracts
More informationBlockchains & Cryptocurrencies
1 Blockchains & Cryptocurrencies A Technical Introduction Lorenz Breidenbach ETH Zürich Cornell Tech The Initiative for CryptoCurrencies & Contracts (IC3) 2 Cryptocurrency Mania Market cap as of yesterday:
More informationThe security and insecurity of blockchains and smart contracts
The security and insecurity of blockchains and smart contracts Jean-Pierre Flori, expert in cryptography, Agence Nationale de la Sécurité des Systèmes d Information (ANSSI) In J.P. Dardayrol, editor of
More informationCS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University
CS 4770: Cryptography CS 6750: Cryptography and Communication Security Alina Oprea Associate Professor, CCIS Northeastern University April 9 2018 Schedule HW 4 Due on Thu 04/12 Programming project 3 Due
More informationWhitepaper Rcoin Global
Whitepaper Rcoin Global SUMMARY 1. Introduction 2. What is Rcoin Global? 3. Transactions 4. Hybrid Network Concept 5. Keepers 6. Incentive 7. Smart Contract Token 8. Token Distribution 9. Rcoin Global
More informationSCP: A Computationally Scalable Byzantine Consensus Protocol for Blockchains
SCP: A Computationally Scalable Byzantine Consensus Protocol for Blockchains Loi Luu, Viswesh Narayanan, Kunal Baweja, Chaodong Zheng, Seth Gilbert, Prateek Saxena National University of Singapore Bitcoin
More informationA Lightweight Blockchain Consensus Protocol
A Lightweight Blockchain Consensus Protocol Keir Finlow-Bates keir@chainfrog.com Abstract A lightweight yet deterministic and objective consensus protocol would allow blockchain systems to be maintained
More informationBitcoin, Security for Cloud & Big Data
Bitcoin, Security for Cloud & Big Data CS 161: Computer Security Prof. David Wagner April 18, 2013 Bitcoin Public, distributed, peer-to-peer, hash-chained audit log of all transactions ( block chain ).
More informationCS 251: Bitcoin and Crypto Currencies Fall 2015
CS 251: Bitcoin and Crypto Currencies Fall 2015 Final Exam The exam is open book and open notes. You have 2 hours. Please answer all five questions. All questions are weighted equally. You may use course
More informationCryptocurrency and Blockchain Research
Cryptocurrency and Blockchain Research CHANATHIP NAMPREMPRE, PH.D. 1 Agenda Recall bitcoin consensus protocol Components of bitcoin consensus protocol Variations on the same theme Beware of snake oil Solution:
More informationErgo platform overview
December 2018 Dmitry Meshkov Ergo platform overview Outline Ergo vision Decentralization Survivability Applicability Roadmap 2 Part 1 Ergo vision 3 History Research and Scorex framework development Testnet
More informationThe game If you listen very carefully during the first 4 cards (or use the cheat sheet) you will get an advantage on the last 5 cards
The blockchain game GAMEMASTER NOTES Time: 10 minutes The game: up to 9 info/question cards + a short test with 7 questions Reward: The game If you listen very carefully during the first 4 cards (or use
More informationUniversity of Duisburg-Essen Bismarckstr Duisburg Germany HOW BITCOIN WORKS. Matthäus Wander. June 29, 2011
University of Duisburg-Essen Bismarckstr. 90 47057 Duisburg Germany HOW BITCOIN WORKS June 29, 2011 Overview Electronic currency system Decentralized No trusted third party involved Unstructured peer-to-peer
More informationConsensus & Blockchain
Consensus & Blockchain S P Suresh Chennai Mathematical Institute Formal Methods Update Meeting IIT Mandi July 17, 2017 The Bitcoin revolution is upon us What is Bitcoin? Bitcoin: an exciting new currency
More informationTechnical White Paper of. MOAC Mother of All Chains. June 8 th, 2017
Technical White Paper of MOAC Mother of All Chains June 8 th, 2017 [Abstract] MOAC is to design a scalable and resilient Blockchain that supports transactions, data access, control flow in a layered structure.
More informationBlockchain Beyond Bitcoin. Mark O Connell
Mark O Connell mark@mkoconnell.com SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may use this material
More informationCS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University
CS 4770: Cryptography CS 6750: Cryptography and Communication Security Alina Oprea Associate Professor, CCIS Northeastern University March 30 2017 Outline Digital currencies Advantages over paper cash
More informationBitcoin, a decentralized and trustless protocol
Bitcoin, a decentralized and trustless protocol Thomas Sibut-Pinote Inria Saclay February 12, 2015 Thomas Sibut-Pinote Bitcoin, a decentralized and trustless protocol 1 / 42 Introduction Questions 1 Introduction
More informationBlockFin A Fork-Tolerant, Leaderless Consensus Protocol April
BlockFin A Fork-Tolerant, Leaderless Consensus Protocol April 2018 @storecoin What are the most desirable features in a blockchain? Scalability (throughput) and decentralization (censorship resistance),
More informationDEV. Deviant Coin, Innovative Anonymity. A PoS/Masternode cr yptocurrency developed with POS proof of stake.
DEV Deviant Coin, Innovative Anonymity A PoS/Masternode cr yptocurrency developed with POS proof of stake. CONTENTS 03 Overview 06 Pre-mine phase 07 Privacy 08 Basic parameters 09 Proof-of-stake The benefits
More informationI. Introduction. II. Security, Coinage and Attacks
Abstract Proof of Stake's security has proven itself over years of testing. Advances in this technology in Blackcoin's Proof-of-Stake 3.0 have solved the issues faced with Coin-Age, Block Reward and Blockchain
More informationSmartPool: practical decentralized pool mining. Loi Luu, Yaron Velner, Jason Teutsch, and Prateek Saxena August 18, 2017
SmartPool: practical decentralized pool mining Loi Luu, Yaron Velner, Jason Teutsch, and Prateek Saxena August 18, 2017 Mining pools Miners role in cryptocurrencies Definition: A cryptocurrency is a decentralized
More informationLecture 12. Algorand
Lecture 12 Algorand Proof-of-Stake Virtual Mining Proof of Stake Bitcoin uses proof of work to address sybil attacks and implement consensus Philosophy: Chance of winning in a block mining round proportional
More informationAlgorand: Scaling Byzantine Agreements for Cryptocurrencies
Algorand: Scaling Byzantine Agreements for Cryptocurrencies Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, Nickolai Zeldovich Presented by: Preet Patel and Umang Lathia Outline Overview of Distributed
More informationHow Bitcoin achieves Decentralization. How Bitcoin achieves Decentralization
Centralization vs. Decentralization Distributed Consensus Consensus without Identity, using a Block Chain Incentives and Proof of Work Putting it all together Centralization vs. Decentralization Distributed
More informationBYZANTINE CONSENSUS THROUGH BITCOIN S PROOF- OF-WORK
Informatiemanagement: BYZANTINE CONSENSUS THROUGH BITCOIN S PROOF- OF-WORK The aim of this paper is to elucidate how Byzantine consensus is achieved through Bitcoin s novel proof-of-work system without
More informationHyperledger fabric: towards scalable blockchain for business
Marko Vukolić, IBM Research - Zurich Hyperledger fabric: towards scalable blockchain for business Trust in Digital Life The Hague, Netherlands, June 17 2016 Blockchain shared, replicated, ledger Consensus
More informationRadix - Public Node Incentives
Radix - Public Node Incentives Dan Hughes Piers Ridyard www.radix.global December 2017 Abstract In this paper we present a novel method for implementing a mechanism to reward work carried out across a
More informationBurstcoin Technical information about mining and block forging
Burstcoin Technical information about mining and block forging Table of contents 1. Introduction 2. Algorithms and Acronyms 3. Mining process 4. Block forging process Introduction With most cryptocurrencies
More informationData Consistency and Blockchain. Bei Chun Zhou (BlockChainZ)
Data Consistency and Blockchain Bei Chun Zhou (BlockChainZ) beichunz@cn.ibm.com 1 Data Consistency Point-in-time consistency Transaction consistency Application consistency 2 Strong Consistency ACID Atomicity.
More informationReliability, distributed consensus and blockchain COSC412
Reliability, distributed consensus and blockchain COSC412 Learning objectives Encourage you to always design for failure Appreciate how decentralised consensus is useful to support principles of security
More informationDesign Patterns which Facilitate Message Digest Collision Attacks on Blockchains
Symposium on Distributed Ledger Technology SDLT'2017 Gold Coast Campus, Griffith University June 13, 2017 Design Patterns which Facilitate Message Digest Collision Attacks on Blockchains Peter Robinson,
More informationProof of Stake Made Simple with Casper
Proof of Stake Made Simple with Casper Olivier Moindrot ICME, Stanford University olivierm@stanford.edu Charles Bournhonesque ICME, Stanford University cbournho@stanford.edu Abstract We study the recent
More informationBitcoin (and why it uses SO much energy)
Bitcoin (and why it uses SO much energy) David Malone Hamilton Institute / Dept Maths&Stats Maynooth University. 2018-11-08 Bitcoin Background Bitcoin is a cryptocurrency that started around 2008 2009.
More informationBiomedical Security. Cipher Block Chaining and Applications
1 Biomedical Security Erwin M. Bakker 2 Cipher Block Chaining and Applications Slides and figures are adapted from: W. Stallings, Cryptography and Network Security 4 th Edition and 7 th Edition 1 3 Block
More informationErgo platform. Dmitry Meshkov
Ergo platform Dmitry Meshkov Prehistory Motivation Theory Practice Provably secure 1000 currencies New features Ad-hoc solutions Impractical Security issues Motivation Theory Provably secure New features
More informationGENESIS VISION NETWORK
GENESIS VISION NETWORK Contents 1. Description of the problem 7 11. Trust management 15 2. The problem with smart contracts 8 12. GVN Token 16 3. Centralised exchanges against decentralised 8 13. Deposit
More informationAnalyzing Bitcoin Security. Philippe Camacho
Analyzing Bitcoin Security Philippe Camacho philippe.camacho@dreamlab.net Universidad Católica, Santiago de Chile 15 of June 2016 Bitcoin matters Map Blockchain Design Known Attacks Security Models Double
More informationHijacking Bitcoin: Routing Attacks on Cryptocurrencies
Maria Apostolaki 1, Aviv Zohar 2, Laurent Vanbever 1 Presented by Pascal Blöchlinger 1 ETH Zürich, 2 The Hebrew University Motivation Money Security Rising interest Lacking knowledge of participants Overview
More informationBitcoin. Arni Par ov. December 17, 2013
Bitcoin Arni Par ov December 17, 2013 Abstract Bitcoin is a distributed, peer-to-peer cryptocurrency that functions without any central authority and in recent years has gained large popularity. This paper
More informationBitcoin (Part I) Ken Calvert Keeping Current Seminar 22 January Keeping Current 1
Bitcoin (Part I) Ken Calvert Keeping Current Seminar 22 January 2014 2014.01.22 Keeping Current 1 Questions What problem is Bitcoin solving? Where did it come from? How does the system work? What makes
More informationNeel Gupte. Index Terms Bitcoin, Cryptocurreny, Block Chain, Hashing, Proof-of-Work, Double-spending, Momentum Method, Proof of Stake.
International Journal of Scientific & Engineering Research, Volume 6, Issue 9, September-2015 259 An Analysis of the Hash-Based Proof-of-Work Chain in the Bitcoin Network Neel Gupte Abstract A Bitcoin
More informationThe power of Blockchain: Smart Contracts. Foteini Baldimtsi
The power of Blockchain: Smart Contracts Foteini Baldimtsi The Blockchain at the heart of a cryptocurrency Alice sends 2 John sends 1 Dave sends 5 to Bob to Eve to Alice Bob sends 1 Eve sends 4 to Dave
More informationOpenbankIT: a banking platform for e- money management based on blockchain technology
OpenbankIT: a banking platform for e- money management based on blockchain technology Dr. Pavel Kravchenko, Sergiy Vasilchuk, Bohdan Skriabin pavel@distributedlab.com, vsv@atticlab.net, bohdan@distributedlab.com
More informationApplied cryptography
Applied cryptography Electronic Cash Andreas Hülsing 29 November 2016 1 / 61 Classical Cash - Life Cycle Mint produces money (coins / bank notes) Sent to bank User withdraws money (reduces account balance)
More informationBiomedical and Healthcare Applications for Blockchain. Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs
Biomedical and Healthcare Applications for Blockchain Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs Network Analysis Working Group 01.25.2018 Outline Introduction to bitcoin + blockchain
More informationAdapting Blockchain Technology for Scientific Computing. Wei Li
Adapting Blockchain Technology for Scientific Computing Wei Li weili@weililab.org Abstract Blockchain stores information into a chain of s, whose integrity is usually guaranteed by Proof of Work (PoW).
More informationAdapting Blockchain Technology for Scientific Computing. Wei Li
Adapting Blockchain Technology for Scientific Computing Wei Li weili@weililab.org Abstract Blockchain stores information into a chain of s, whose integrity is usually guaranteed by Proof of Work (PoW).
More informationSecuring Distributed Computation via Trusted Quorums. Yan Michalevsky, Valeria Nikolaenko, Dan Boneh
Securing Distributed Computation via Trusted Quorums Yan Michalevsky, Valeria Nikolaenko, Dan Boneh Setting Distributed computation over data contributed by users Communication through a central party
More informationICS 421 & ICS 690. Bitcoin & Blockchain. Assoc. Prof. Lipyeow Lim Information & Computer Sciences Department University of Hawai`i at Mānoa
ICS 421 & ICS 690 Bitcoin & Blockchain Assoc. Prof. Lipyeow Lim Information & Computer Sciences Department University of Hawai`i at Mānoa Accepted by: Overstock.com Expedia.com Newegg.com Tigerdirect.com
More informationVersion 0.7. GoldCoin Patch Announcement. What is a 51% attack. The impossible made possible
Version 0.7 www.gldcoin.com www.gldtalk.org October 11 2013 GoldCoin Patch Announcement Welcome to the GoldCoin minor version 7 announcement. We have some fantastic news for you folks today. We have at
More informationIntroduction to Bitcoin I
Introduction to Bitcoin I P Peterlongo 1 A Tomasi 1 1 University of Trento Department of Mathematics June 10, 2013 Outline 1 Fiat and online payments Functions of Online payments and cost of clearing 2
More informationSharder Consensus. v1.0 CONTENTS 1 SHARDER CONSENSUS NODES DPOS SHARDER POOL DPOS REALIZATION POC...
Sharder Consensus v1.0 CONTENTS 1 SHARDER CONSENSUS... 1 2 NODES... 2 3 DPOS... 3 3.1 SHARDER POOL... 3 3.2 DPOS REALIZATION... 4 4 POC... 4 4.1 POC REALIZATION... 5 4.2 POC WEIGHTED TABLE... 6 4.3 POC
More informationAnupam Datta CMU. Fall 2015
Anupam Datta CMU Fall 2015 A rational reconstruction of Bitcoin 1. Start with straw man design 2. Identify weaknesses 3. Augment design and iterate Alice: I, Alice, am giving Bob one coin Alice digitally
More informationTable of contents. Technical Features. Our approach. Technical Overview. Stage 1 (Using Ethereum blockchain) Participants. Data Owner.
Table of contents Technical Features Our approach Technical Overview Stage 1 (Using Ethereum blockchain) Participants Data Owner Data Verifier Marketplace Data Buyer Creditor Data Platform Architecture
More informationDAG based DLT Network
DAG based DLT Network DAG based DLTs What is a DAG ledger? DAG (Directed Acyclic Graph) based DLTs are ambitious alternatives to blockchain. They re designed to offer all the advantages of blockchain technology,
More informationWhat is Bitcoin? How Bitcoin Works. Outline. Outline. Bitcoin. Problems with Centralization
What is Bitcoin? How Bitcoin Works Kai Brünnler Research Institute for Security in the Information Society Bern University of Applied Sciences Bitcoin an open-source software a peer-to-peer network a decentralized
More informationSecurity Analysis of Bitcoin. Dibyojyoti Mukherjee Jaswant Katragadda Yashwant Gazula
Security Analysis of Bitcoin Dibyojyoti Mukherjee Jaswant Katragadda Yashwant Gazula Security Analysis of Bitcoin Introduction How Bitcoin works? Similar peer-to-peer systems Vulnerabilities and solutions
More informationBlockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric
Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Elli Androulaki Staff member, IBM Research, Zurich Workshop on cryptocurrencies Athens, 06.03.2016 Blockchain systems
More informationBiomedical Security. Some Security News 10/5/2018. Erwin M. Bakker
Biomedical Security Erwin M. Bakker Some Security News October 03, 2018 - Hackers attacking healthcare through remote access systems and disrupting operations is the number one patient safety risk, according
More informationEnsimag - 4MMSR Network Security Student Seminar. Bitcoin: A peer-to-peer Electronic Cash System Satoshi Nakamoto
Ensimag - 4MMSR Network Security Student Seminar Bitcoin: A peer-to-peer Electronic Cash System Satoshi Nakamoto wafa.mbarek@ensimag.fr halima.myesser@ensimag.fr 1 Table of contents: I- Introduction: Classic
More informationDecentralized prediction game platform, powered by public
Decentralized prediction game platform, powered by public Table of Contents Overview 3 1.Secured Scalability 3 1.1.Blockchain network delay and Blockbuster attack 3 1.2.Blockchain Transaction Monitoring
More informationLecture 3. Introduction to Cryptocurrencies
Lecture 3 Introduction to Cryptocurrencies Public Keys as Identities public key := an identity if you see sig such that verify(pk, msg, sig)=true, think of it as: pk says, [msg] to speak for pk, you must
More informationIntroduction to Cryptography in Blockchain Technology. December 23, 2018
Introduction to Cryptography in Blockchain Technology December 23, 2018 What is cryptography? The practice of developing protocols that prevent third parties from viewing private data. Modern cryptography
More informationBLOCKCHAIN Blockchains and Transactions Part II A Deeper Dive
BLOCKCHAIN Blockchains and Transactions Part II A Deeper Dive www.blockchaintrainingalliance.com Blockchain Page 3 Blockchain is NOT Bitcoin Page 4 Transactions Page 5 Multi-Signature Addresses An Address
More informationThe ZILLIQA Technical Whitepaper
The ZILLIQA Technical Whitepaper [Version 0.1] August 10, 2017 The ZILLIQA Team www.zilliqa.com enquiry@zilliqa.com @zilliqa Abstract Existing cryptocurrencies and smart contract platforms are known to
More informationBlockchain! What consultants should know about it. Daniel
Blockchain! What consultants should know about it. Daniel Karzel @ Workshop Overview Quick overview of what is planned for the workshop. What you get out of this workshop Workshop goals Understand what
More informationNode Incentives: An autonomous decentralised incentive and donation system.
Node Incentives: An autonomous decentralised incentive and donation system. Abstract In this document I propose a autonomous decentralised incentive and donation system using the security of the blockchain
More informationWhat is Bitcoin? Consensus technology has the power to do for economics what the internet did for information - Dan Larimer
What is Bitcoin? Consensus technology has the power to do for economics what the internet did for information - Dan Larimer Ross Rydman 2014 For Academic Use Only The 30 second description Bitcoin is the
More informationEnhanced Immutability of Permissioned Blockchain Networks by Tethering Provenance with a Public Blockchain Network
Enhanced Immutability of Permissioned Blockchain Networks by Tethering Provenance with a Public Blockchain Network Abstract Azeem Ahmed (azeem.ahmed@consensys.net) Jim Zhang (jim.zhang@consensys.net) Permissioned
More informationA Blockchain-based Mapping System
A Blockchain-based Mapping System IETF 98 Chicago March 2017 Jordi Paillissé, Albert Cabellos, Vina Ermagan, Fabio Maino jordip@ac.upc.edu http://openoverlayrouter.org 1 A short Blockchain tutorial 2 Blockchain
More informationThis tutorial is aimed to give you a crisp understanding of the process of building your own blockchain.
i About the Tutorial Blockchain is the current buzz that is dominating the software development trends. The development and designing of Blockchain involves three major components: client, miner and blockchain.
More informationCardano Transaction Fees
Cardano Transaction Fees Lars Brünjes May 2017 1 Introduction From the point of view of us, the creators of Cardano, we have two motivations for fees: Prevention of DDoS (distributed denial of service)
More informationPart 2. Use Cases (40 points). Consider examples of such signed records R (as in Part 1) from systems we discussed.
CPS 512 midterm exam #1, 10/5/17 Your name please: NetID: Sign for your honor: Part 1. Digital Signatures (25 points). Suppose that a principal Alice (A) signs a message/record (R) that is received by
More informationP2P BitCoin: Technical details
ELT-53206 Peer-to-Peer Networks P2P BitCoin: Technical details Mathieu Devos Tampere University of Technology Department of Electronics & Communications Engineering mathieu.devos@tut.fi TG406 2 Outline
More informationSharding. Making blockchains scalable, decentralized and secure.
Sharding Making blockchains scalable, decentralized and secure. The Scalability Triangle Scalability Decentralization Semi-formally defining these properties Assume the total computational/bandwidth capacity
More informationMatt Howard and Ajay Patel CIS 556: Cryptography University of Pennsylvania Fall DriveCoin: A Proof of Space Cryptocurrency
CIS 556: Cryptography University of Pennsylvania Fall 2015 : A Proof of Space Cryptocurrency Abstract We present an implementation of a cryptocurrency based on the newlytheorized and studied Proof of Space
More information