Alternative Consensus Algorithms. Murat Osmanoglu

Size: px
Start display at page:

Download "Alternative Consensus Algorithms. Murat Osmanoglu"

Transcription

1 Alternative Consensus Algorithms Murat Osmanoglu

2 Bitcoin Block i-1 Block i Block i+1 Hash i-2 Nonce i-1 Hash i-1 Nonce i Hash i Nonce i+1 tx tx tx tx tx tx tx tx tx tx tx tx

3 Do you really need a Blockchain? Do you need a shared, consistent data store? Does more than one entity need to contribute the data? Data records, once written, are never updated or deleted? Sensitive identifiers wont be written to the data store? BC provides a historically consistent data store. If you don t need that, use or spreadsheets If your data comes from a single entity, use a database Blockchains don t allow modifications of historical data, if you don t need, use database Blockchain is not the proper place to write sensitive information, even if it s encrypted, Encrypted database Are the entities having a hard time deciding who controls the data? Do you want a tamperproof log of all writes to data store? You may have a blockchain! If there are no trust or control issues over who runs the data, use managed database If you don t need to audit what happened and when it happened use a database

4 Forms of Government Democracy Autocracy rule of the one Oligarchy rule of the few Democracy rule of the majority

5 Democracy Forms of Government Autocracy rule of the one autos(self) + kratos(to rule) Oligarchy rule of the few oligos(few) + arkho(to rule) Democracy rule of the majority demos(people) + kratos(to rule)

6 Democracy best way to ensure that an organization serves the interests of all its members fairly and equitably is to spread the ultimate power of decision and action evenly among all of its members but how the agreement be achieved on making rules or taking actions in the case of inevitable disagreements, conflict of interest, and varying levels of time, knowledge, and abilities among members voting is the key component in decision-making voting used for the purpose of making decisions or electing representatives? direct democracy and representative democracy

7 Democracy Direct Democracy to ensure maximum equality and fairness, all members for an organization should directly get involved in all important decision-making processes may not be possible for big organizations such as state or country Even if is feasible, it may not be desirable there is a wide variance in knowledge, interests, and abilities among the members of an organization. if the influence of each member is equal, the effective wisdom of collective may not be better than the average even it can be worse than average if that is the aggregation of conflicting policies

8 Representative Democracy Democracy relatively small number of people are elected by the members to make decisions on their behalf it creates stability or cohesiveness of policy but a powerful minority may take over the power for a long period of time it may promise proportional representation along certain lines (geographic), but may also incline disproportionalities along different lines (ethnic, racial, gender) full-time positions for the representatives (nothing for the losers), smaller body is less costly to maintain, and more efficient to act larger body is better to establish close relationship between the members and the representatives, and better in terms of reflecting the overall decision

9 Democracy Delegative Democracy (or Liquid Democracy) The members of the organization should have the widest possible direct choice of representatives They may build close relationships with their representatives No specific limit on the number of representatives Delegates don t have to compete with each other as in representative democracy They may compete to get votes from the members, but they don t win or loose seats As a member, there is no need to study candidates or party programs, just delegating your vote to someone you trust

10 Democracy Delegative Democracy (or Liquid Democracy) is there any upper bound for the number of members a delegate can represent? How do we maintain such body?(the cost of the maintenance?) How do we implement the voting process? How do we implement the decision-making process among the delegates?

11 Delegated Proof of Stake (Ouroboros) to be able to create blocks, stakeholders must be online, but this is not attractive for the one having small stake to be able generate fresh randomness for the leader election, majority of the elected stakeholders should participate in MPC protocol, that creates a strain on the network stakeholders will authorize other stakeholders to create blocks on their behalf and to represent them in leader election a delegate may join in the protocol only if he represents a number of stakeholders whose stake exceeds a given threshold Setting a threshold value avoids the fragmentation attack that aims to increase the delegate population in order to damage the performance

12 Delegated Proof of Stake (Ouroboros) any stakeholder can authorize a delegate to generate blocks on his behalf by utilizing a proxy signature scheme proxy signature enables someone (original signer) to delegate another one (proxy signer) to sign messages on his behalf, in case of temporal absence, lack of time, or computational power to limit the block generation power of the delegate to a certain range (slots or epoch), the stakeholder can put a limit on the message space the proxy can only sign the message ending with a slot number sl j

13 Delegated Proof of Stake (Larimer) every participant may delegate his voting power to a representative. top 100 representatives holding the total votes take turns to generate the next 100 blocks on defined schedule all representatives earn equal amount of money which is 10% of the transaction fees included in the average block if one of the representatives do not produce block, then this slot is skipped, and the protocol will continue with the next representative

14 Delegated Proof of Stake (Larimer) every wallet has a preference window that enables users to choose one or more representatives to vote once decided, user creates a transaction to transfer votes to the representative without a fee users can also monitor their representatives through their wallet, and change them according to the performance as long as more than half of the scheduled 100 blocks are produced after a transaction is broadcasted, then this transaction assumed to be on the majority fork.

15 Delegated Proof of Stake (Larimer) any transaction approved by even one of the representative can be included in the ledger in less than 30 min (block produced in 30 seconds) so none of the representatives can benefit by excluding transactions that for the other representatives top 100 are given equal weight regardless of votes delegated to them. One representative may control multiple representatives, even more than half since the votes may not be distributed equally. it can quickly be identified, and eliminated

16 Proof of Space (SpaceMint) to create a block, miners invest disk space instead of computing power dedicating more disk space means higher chance to create a block once the dedicated space is initialized, the cost of mining is marjinal a few disk accesses with minimal computation even if the reward is much smaller than the cost of buying disk space for mining, space still be dedicated towards mining unused disk space is available on many personal computers most mining is currently done by specialized ASICs, and they have no use other than Bitcoin mining. No such devices required for PoSpace a simple idea can be applied to Bitcoin to avoid mining pools : instead of applying the hash function to a nonce directly, it will be applied to the signature of the nonce (similar idea can be adapted to SpaceMint)

17 Proof of Space (SpaceMint) Prover At the initialization, prover stores some data F of size N Verifier At the initialization, verifier keeps only small piece of information S about F At any time later, verifier initialize a proof execution phase At the end, verifier outputs reject or accept we demand that verifier is highly efficient in both phases, and prover is highly efficient in the execution (generating the proof) and in the access to F be careful; a cheating prover can delete F after initialization

18 Graph Pebbling Proof of Space (SpaceMint) consider a directed acyclic graph G = (V E) every vertex is associated with a value w(v) in {0,1} L v 1 v 2 w(v 2 ) = H(v 2, w(v 1 )) v 5 w(v 5 ) = H(v 5, w(v 2 ), w(v 3 ), w(v 4 )) w(v 1 ) = H(v 1 ) v 3 v 4 w(v 3 ) = H(v 3, w(v 1 )) w(v 4 ) = H(v 4, w(v 2 ), w(v 3 )) Parameter : G = (V, E) s.t. lvl=n, D is efficiently samplable distribution over vertices First prover creates S=w(V) and a short proof λ from S, then keeps the graph and gives λ to verifier Verifier samples a subset CçD, and gives C to P Prover creates an answer A=w(C) for C Verifier accepts if A is compatible with λ

19 Hash Trees for Graph Pebbling Proof of Space (SpaceMint) v 1 v 2 v 3 v 4 v 5 v 6 v 7 v 8 x 1 x 2 x 3 x 4 x 5 x 12 x 34 x 56 x 1234 λ x a = H(v a ) x ab =H(x a,x b ) x abcd =H(x ab, x cd ) λ = H(x 1234,x 5678 ) x 6 x 7 x 78 x 5678 Prover creates hash tree and sends λ to verifier Verifier sends a challenge, for instance v 3, to prover Prover sends x 3 together with x 8 {x 4,x 12,x 5678 } to verifier Verifier accepts if If H is collusion-resistant, then prover must keep all the data to be able to provide valid proof λ=h(h(x 12,H(x 3,x 4 )),x 5678 )

20 Challenges Proof of Space (SpaceMint) Proof of Space requires interactions, it s hard to adapt it to the blockchain settings Generating a PoSpace is computationally cheap. It needs some clever way to decide which of many proof wins a miner should learn if he is a winner without any interaction nothing-at-stake : if mining is computationally cheap, then miners can mine on multiple chains, or try to create many different blocks with a single proof slows down consensus gives chance to cheating miners to get a greater reward enables double-spending attacks by someone controlling less than 50% of the space

21 Construction Proof of Space (SpaceMint) a miner joins the network by announcing its space commitment (pk, λ) via a special transaction. Genè(pk,sk), Init(pk,N)è(S,λ) where N is the size of the space in terms of bits that the miner contributes to the mining effort PC SC Block i Block i+1 Hash i Sig i Tran i Hash i+1 Sig i+1 Tran i+1 Hash i : current block index i miner s signature on Hash i-1 a space proof that contains pk Sig i : current block index i miner s signature on Tran i miner s signature on Sig i-1 Tran i : current block index i list of transactions Once an honest miner adds a new block to the chain, the transactions up to this block cannot be changed, even by someone that holds all secret keys of the miners that added all the previous blocks.

22 Construction three types of transactions : Proof of Space (SpaceMint) - regular payments : has the form tx = (payment, txid, in, out) where txid is a unique ID (no two tx in the blockchain can have same ID in is a list of input coins, in = (in 1,,in n ) where in j = (txid j,k j,sig j ) such that k j is an index that indicates the sender of txid j out is a list of output coins, out = (out 1,,out m ) where out i =(pk i,v i ) such that - space commitments : has the form tx = (commit, txid, (pk, λ)) where Init(pk,N) è(pk, λ) - penalties : has the form tx = (penalty, txid, pk, prf) pk is the public key of the transaction creator prf is the proof indicating that two blocks of same index signed by the same signer For regular payments; all signatures must be valid, any subsequent transaction must be used only one time in the blockchain(double-spendin), and the sum of the input values should be at least the sum of the output for the acceptance of tx

23 Construction Proof of Space (SpaceMint) Mining : - extract the hash value of the last block in the best chain so far, and a challenge c which is used to derive two long random strings C u, C v - compute challenges Chal(n,u,C u ) = (c 1,,c u ) - compute the proof of space a = (a 1,,a u ) - compute the quality Q(pk,λ,c,a) of the proof - if the quality is high enough (there is a realistic chance to be the best proof in that period), compute the proof of correct commitment b = (b 1,,b v ), create a block, send the block to the network

24 Construction Proof of Space (SpaceMint) Mining : - extract the hash value of the last block in the best chain so far, and a challenge c which is used to derive two long random strings C u, C v - compute challenges Chal(n,u,C u ) = (c 1,,c u ) How do we create this challenge? - (i-1)th compute block the can proof be of used space to derive a = (a 1,,a that u ) challenge, but it can slow down the consensus. - compute there may the quality be many Q(pk,λ,c,a) chains; rational of the miners proof can create different challenges for different chains, and try to create - if proofs the quality for different is high enough chains (there since it is is a easy realistic to do chance it to be the best proof in that period), compute the proof of correct commitment b = (b 1, Derive the challenge from the hash of block i Δ,b v ), create a block, send the block to the network the probability of multiple chains surviving for more than Δ blocks decreases exponentially

25 Construction Proof of Space (SpaceMint) Mining For : a set of valid proofs π 1 =(pk 1,λ 1,c 1, a 1 ),, π m =(pk m,λ m,c m, a m ), Q(π i ) should be defined in a way that the probability that π i has - extract the best the quality hash among value πof 1,, the π m last corresponds block in the to ith best miner s chain so far, and a challenge fraction of c which the total is used space to in derive the network, long which random is strings C u, C v N i / (N N m ) - compute where N challenges Chal(n,u,C u ) = (c 1,,c u ) i is the space committed to λ i - compute the proof of space a = (a 1,,a u ) - compute the quality Q(pk,λ,c,a) of the proof - if the quality is high enough (there is a realistic chance to be the best proof in that period), compute the proof of correct commitment b = (b 1,,b v ), create a block, send the block to the network

26 Nothing-at-Stake Grinding: Proof of Space (SpaceMint) - In PoSpace, it s computationally easy to generate proofs. So, miners can work on many different blocks (just try different transactions) till finding a good one that will allow them to generate good proofs for future - the challenge is derived from proof chain that does not contain transactions. Thus, a prover can create at most one valid proof per challenge Mining on mutiple chains: - In PoSpace, it s computationally easy to generate proofs. So, miners can work on all known chains in parallel to increase their profits, even to try double-spending and selfish-mining. - the challenge is derived the hash of block i Δ, and for any challenge there is a single proof. Besides, the protocol imposes a penalty via the penalty transactions (half of the reward for bad block is given to the creator of the penalty transaction, and other half is diminished)

SpaceMint Overcoming Bitcoin s waste of energy

SpaceMint Overcoming Bitcoin s waste of energy Bitcoin Overcoming Bitcoin s waste of energy Georg Fuchsbauer joint work with S Park, A Kwon, K Pietrzak, J Alwen and P Gaži Digital currency Decentralized (no bank issuing coins) Pseudonymous Controled

More information

Formally Specifying Blockchain Protocols

Formally Specifying Blockchain Protocols Formally Specifying Blockchain Protocols 1 IOHK company building blockchain applications research focused invested in functional programming built Cardano network, Ada cryptocurrency 2 Blockchain Protocols

More information

Transactions as Proof-of-Stake! by Daniel Larimer!

Transactions as Proof-of-Stake! by Daniel Larimer! Transactions as Proof-of-Stake by Daniel Larimer dlarimer@invictus-innovations.com November, 28 th 2013 Abstract The concept behind Proof-of-Stake is that a block chain should be secured by those with

More information

ENEE 457: E-Cash and Bitcoin

ENEE 457: E-Cash and Bitcoin ENEE 457: E-Cash and Bitcoin Charalampos (Babis) Papamanthou cpap@umd.edu Money today Any problems? Cash is cumbersome and can be forged Credit card transactions require centralized online bank are not

More information

Chapter 13. Digital Cash. Information Security/System Security p. 570/626

Chapter 13. Digital Cash. Information Security/System Security p. 570/626 Chapter 13 Digital Cash Information Security/System Security p. 570/626 Introduction While cash is used in illegal activities such as bribing money laundering tax evasion it also protects privacy: not

More information

Problem: Equivocation!

Problem: Equivocation! Bitcoin: 10,000 foot view Bitcoin and the Blockchain New bitcoins are created every ~10 min, owned by miner (more on this later) Thereafter, just keep record of transfers e.g., Alice pays Bob 1 BTC COS

More information

Introduction to Cryptoeconomics

Introduction to Cryptoeconomics Introduction to Cryptoeconomics What is cryptoeconomics? Cryptoeconomics is about... Building systems that have certain desired properties Use cryptography to prove properties about messages that happened

More information

Computer Security. 14. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2019

Computer Security. 14. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2019 Computer Security 14. Blockchain & Bitcoin Paul Krzyzanowski Rutgers University Spring 2019 April 15, 2019 CS 419 2019 Paul Krzyzanowski 1 Bitcoin & Blockchain Bitcoin cryptocurrency system Introduced

More information

Alternatives to Blockchains. Sarah Meiklejohn (University College London)

Alternatives to Blockchains. Sarah Meiklejohn (University College London) Alternatives to Blockchains Sarah Meiklejohn (University College London) fully decentralized cryptocurrencies 2 fully decentralized cryptocurrencies tx tx(addra addrb) 2 fully decentralized cryptocurrencies

More information

OUROBOROS PRAOS: AN ADAPTIVELY-SECURE, SEMI-SYNCHRONOUS

OUROBOROS PRAOS: AN ADAPTIVELY-SECURE, SEMI-SYNCHRONOUS OUROBOROS PRAOS: AN ADAPTIVELY-SECURE, SEMI-SYNCHRONOUS PROOF-OF-STAKE BLOCKCHAIN Bernardo David Tokyo Tech & IOHK Peter Gaži IOHK Aggelos Kiayias U. Edinburgh & IOHK Eurocrypt 2018 Alexander Russell U.

More information

Bitcoin. CS6450: Distributed Systems Lecture 20 Ryan Stutsman

Bitcoin. CS6450: Distributed Systems Lecture 20 Ryan Stutsman Bitcoin CS6450: Distributed Systems Lecture 20 Ryan Stutsman Material taken/derived from Princeton COS-418 materials created by Michael Freedman and Kyle Jamieson at Princeton University. Licensed for

More information

As a 3rd generation currency, not only are transactions secured, private and fast, you actually get paid for holding DigitalPrice coins.

As a 3rd generation currency, not only are transactions secured, private and fast, you actually get paid for holding DigitalPrice coins. Introduction With the circulation of cryptocurrency becoming common, there is a need for additional information. The scope of this white paper is to provide that information. If you are under the impression

More information

Blockchain. CS 240: Computing Systems and Concurrency Lecture 20. Marco Canini

Blockchain. CS 240: Computing Systems and Concurrency Lecture 20. Marco Canini Blockchain CS 240: Computing Systems and Concurrency Lecture 20 Marco Canini Credits: Michael Freedman and Kyle Jamieson developed much of the original material. Bitcoin: 10,000 foot view New bitcoins

More information

On the impact of propogation delay on mining rewards in Bitcoin. Xuan Wen 1. Abstract

On the impact of propogation delay on mining rewards in Bitcoin. Xuan Wen 1. Abstract On the impact of propogation delay on mining rewards in Bitcoin Xuan Wen 1 Abstract Bitcoin 2 is a decentralized digital currency that is rapidly gaining in popularity. The Bitcoin system relies on miners

More information

Smalltalk 3/30/15. The Mathematics of Bitcoin Brian Heinold

Smalltalk 3/30/15. The Mathematics of Bitcoin Brian Heinold Smalltalk 3/30/15 The Mathematics of Bitcoin Brian Heinold What is Bitcoin? Created by Satoshi Nakamoto in 2008 What is Bitcoin? Created by Satoshi Nakamoto in 2008 Digital currency (though not the first)

More information

EECS 498 Introduction to Distributed Systems

EECS 498 Introduction to Distributed Systems EECS 498 Introduction to Distributed Systems Fall 2017 Harsha V. Madhyastha Today Bitcoin: A peer-to-peer digital currency Spark: In-memory big data processing December 4, 2017 EECS 498 Lecture 21 2 December

More information

Introduction to Cryptocurrency Ecosystem. By Raj Thimmiah

Introduction to Cryptocurrency Ecosystem. By Raj Thimmiah Introduction to Cryptocurrency Ecosystem By Raj Thimmiah How does a normal payment system work? Normal payment systems (generally) use ledgers Easy for servers to then check if someone is committing double

More information

Proof-of-Stake Protocol v3.0

Proof-of-Stake Protocol v3.0 Proof-of-Stake Protocol v3.0 Abstract Proof of Stake's security has proven itself reliable & effective over years of testing while at the same time solving Bitcoin s issues caused by the Proof of Work

More information

CONSENSUS PROTOCOLS & BLOCKCHAINS. Techruption Lecture March 16 th, 2017 Maarten Everts (TNO & University of Twente)

CONSENSUS PROTOCOLS & BLOCKCHAINS. Techruption Lecture March 16 th, 2017 Maarten Everts (TNO & University of Twente) CONSENSUS PROTOCOLS & BLOCKCHAINS Techruption Lecture March 16 th, 2017 Maarten Everts (TNO & University of Twente) 2 Consensus protocols & blockchain 3 Consensus protocols & blockchain 4 Consensus protocols

More information

Blockchain, Cryptocurrency, Smart Contracts and Initial Coin Offerings: A Technical Perspective

Blockchain, Cryptocurrency, Smart Contracts and Initial Coin Offerings: A Technical Perspective SESSION ID: LAB3-R09 Blockchain, Cryptocurrency, Smart Contracts and Initial Coin Offerings: A Technical Perspective Tom Plunkett Consulting Solutions Director Oracle Captain Brittany Snelgrove United

More information

What is Proof of Work?

What is Proof of Work? What is Proof of Work? Educational Series September 18, 2018 Overview There are many protocols that regulate how nodes on a blockchain achieve consensus, and currently the most popular is proof-of-work.

More information

Bitcoin and Blockchain

Bitcoin and Blockchain Bitcoin and Blockchain COS 418: Distributed Systems Lecture 18 Zhenyu Song [Credit: Selected content adapted from Michael Freedman. Slides refined by Chris Hodsdon and Theano Stavrinos] Why Bitcoin? All

More information

A Gentle Introduction To Bitcoin Mining

A Gentle Introduction To Bitcoin Mining A Gentle Introduction To Bitcoin Mining Table of Contents Title...3 How Do Bitcoin Transactions Work?...4 Why Is Mining Needed In Bitcoin?...5 Why Do Miners Mine?...6 What Is This Computationally Expensive

More information

Ergo platform: from prototypes to a survivable cryptocurrency

Ergo platform: from prototypes to a survivable cryptocurrency January 2019 Dmitry Meshkov Ergo platform: from prototypes to a survivable cryptocurrency Outline Ergo Consensus Light Storage vision protocol clients fee Voting Smart Monetary Roadmap system contracts

More information

Blockchains & Cryptocurrencies

Blockchains & Cryptocurrencies 1 Blockchains & Cryptocurrencies A Technical Introduction Lorenz Breidenbach ETH Zürich Cornell Tech The Initiative for CryptoCurrencies & Contracts (IC3) 2 Cryptocurrency Mania Market cap as of yesterday:

More information

The security and insecurity of blockchains and smart contracts

The security and insecurity of blockchains and smart contracts The security and insecurity of blockchains and smart contracts Jean-Pierre Flori, expert in cryptography, Agence Nationale de la Sécurité des Systèmes d Information (ANSSI) In J.P. Dardayrol, editor of

More information

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University CS 4770: Cryptography CS 6750: Cryptography and Communication Security Alina Oprea Associate Professor, CCIS Northeastern University April 9 2018 Schedule HW 4 Due on Thu 04/12 Programming project 3 Due

More information

Whitepaper Rcoin Global

Whitepaper Rcoin Global Whitepaper Rcoin Global SUMMARY 1. Introduction 2. What is Rcoin Global? 3. Transactions 4. Hybrid Network Concept 5. Keepers 6. Incentive 7. Smart Contract Token 8. Token Distribution 9. Rcoin Global

More information

SCP: A Computationally Scalable Byzantine Consensus Protocol for Blockchains

SCP: A Computationally Scalable Byzantine Consensus Protocol for Blockchains SCP: A Computationally Scalable Byzantine Consensus Protocol for Blockchains Loi Luu, Viswesh Narayanan, Kunal Baweja, Chaodong Zheng, Seth Gilbert, Prateek Saxena National University of Singapore Bitcoin

More information

A Lightweight Blockchain Consensus Protocol

A Lightweight Blockchain Consensus Protocol A Lightweight Blockchain Consensus Protocol Keir Finlow-Bates keir@chainfrog.com Abstract A lightweight yet deterministic and objective consensus protocol would allow blockchain systems to be maintained

More information

Bitcoin, Security for Cloud & Big Data

Bitcoin, Security for Cloud & Big Data Bitcoin, Security for Cloud & Big Data CS 161: Computer Security Prof. David Wagner April 18, 2013 Bitcoin Public, distributed, peer-to-peer, hash-chained audit log of all transactions ( block chain ).

More information

CS 251: Bitcoin and Crypto Currencies Fall 2015

CS 251: Bitcoin and Crypto Currencies Fall 2015 CS 251: Bitcoin and Crypto Currencies Fall 2015 Final Exam The exam is open book and open notes. You have 2 hours. Please answer all five questions. All questions are weighted equally. You may use course

More information

Cryptocurrency and Blockchain Research

Cryptocurrency and Blockchain Research Cryptocurrency and Blockchain Research CHANATHIP NAMPREMPRE, PH.D. 1 Agenda Recall bitcoin consensus protocol Components of bitcoin consensus protocol Variations on the same theme Beware of snake oil Solution:

More information

Ergo platform overview

Ergo platform overview December 2018 Dmitry Meshkov Ergo platform overview Outline Ergo vision Decentralization Survivability Applicability Roadmap 2 Part 1 Ergo vision 3 History Research and Scorex framework development Testnet

More information

The game If you listen very carefully during the first 4 cards (or use the cheat sheet) you will get an advantage on the last 5 cards

The game If you listen very carefully during the first 4 cards (or use the cheat sheet) you will get an advantage on the last 5 cards The blockchain game GAMEMASTER NOTES Time: 10 minutes The game: up to 9 info/question cards + a short test with 7 questions Reward: The game If you listen very carefully during the first 4 cards (or use

More information

University of Duisburg-Essen Bismarckstr Duisburg Germany HOW BITCOIN WORKS. Matthäus Wander. June 29, 2011

University of Duisburg-Essen Bismarckstr Duisburg Germany HOW BITCOIN WORKS. Matthäus Wander. June 29, 2011 University of Duisburg-Essen Bismarckstr. 90 47057 Duisburg Germany HOW BITCOIN WORKS June 29, 2011 Overview Electronic currency system Decentralized No trusted third party involved Unstructured peer-to-peer

More information

Consensus & Blockchain

Consensus & Blockchain Consensus & Blockchain S P Suresh Chennai Mathematical Institute Formal Methods Update Meeting IIT Mandi July 17, 2017 The Bitcoin revolution is upon us What is Bitcoin? Bitcoin: an exciting new currency

More information

Technical White Paper of. MOAC Mother of All Chains. June 8 th, 2017

Technical White Paper of. MOAC Mother of All Chains. June 8 th, 2017 Technical White Paper of MOAC Mother of All Chains June 8 th, 2017 [Abstract] MOAC is to design a scalable and resilient Blockchain that supports transactions, data access, control flow in a layered structure.

More information

Blockchain Beyond Bitcoin. Mark O Connell

Blockchain Beyond Bitcoin. Mark O Connell Mark O Connell mark@mkoconnell.com SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may use this material

More information

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University CS 4770: Cryptography CS 6750: Cryptography and Communication Security Alina Oprea Associate Professor, CCIS Northeastern University March 30 2017 Outline Digital currencies Advantages over paper cash

More information

Bitcoin, a decentralized and trustless protocol

Bitcoin, a decentralized and trustless protocol Bitcoin, a decentralized and trustless protocol Thomas Sibut-Pinote Inria Saclay February 12, 2015 Thomas Sibut-Pinote Bitcoin, a decentralized and trustless protocol 1 / 42 Introduction Questions 1 Introduction

More information

BlockFin A Fork-Tolerant, Leaderless Consensus Protocol April

BlockFin A Fork-Tolerant, Leaderless Consensus Protocol April BlockFin A Fork-Tolerant, Leaderless Consensus Protocol April 2018 @storecoin What are the most desirable features in a blockchain? Scalability (throughput) and decentralization (censorship resistance),

More information

DEV. Deviant Coin, Innovative Anonymity. A PoS/Masternode cr yptocurrency developed with POS proof of stake.

DEV. Deviant Coin, Innovative Anonymity. A PoS/Masternode cr yptocurrency developed with POS proof of stake. DEV Deviant Coin, Innovative Anonymity A PoS/Masternode cr yptocurrency developed with POS proof of stake. CONTENTS 03 Overview 06 Pre-mine phase 07 Privacy 08 Basic parameters 09 Proof-of-stake The benefits

More information

I. Introduction. II. Security, Coinage and Attacks

I. Introduction. II. Security, Coinage and Attacks Abstract Proof of Stake's security has proven itself over years of testing. Advances in this technology in Blackcoin's Proof-of-Stake 3.0 have solved the issues faced with Coin-Age, Block Reward and Blockchain

More information

SmartPool: practical decentralized pool mining. Loi Luu, Yaron Velner, Jason Teutsch, and Prateek Saxena August 18, 2017

SmartPool: practical decentralized pool mining. Loi Luu, Yaron Velner, Jason Teutsch, and Prateek Saxena August 18, 2017 SmartPool: practical decentralized pool mining Loi Luu, Yaron Velner, Jason Teutsch, and Prateek Saxena August 18, 2017 Mining pools Miners role in cryptocurrencies Definition: A cryptocurrency is a decentralized

More information

Lecture 12. Algorand

Lecture 12. Algorand Lecture 12 Algorand Proof-of-Stake Virtual Mining Proof of Stake Bitcoin uses proof of work to address sybil attacks and implement consensus Philosophy: Chance of winning in a block mining round proportional

More information

Algorand: Scaling Byzantine Agreements for Cryptocurrencies

Algorand: Scaling Byzantine Agreements for Cryptocurrencies Algorand: Scaling Byzantine Agreements for Cryptocurrencies Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, Nickolai Zeldovich Presented by: Preet Patel and Umang Lathia Outline Overview of Distributed

More information

How Bitcoin achieves Decentralization. How Bitcoin achieves Decentralization

How Bitcoin achieves Decentralization. How Bitcoin achieves Decentralization Centralization vs. Decentralization Distributed Consensus Consensus without Identity, using a Block Chain Incentives and Proof of Work Putting it all together Centralization vs. Decentralization Distributed

More information

BYZANTINE CONSENSUS THROUGH BITCOIN S PROOF- OF-WORK

BYZANTINE CONSENSUS THROUGH BITCOIN S PROOF- OF-WORK Informatiemanagement: BYZANTINE CONSENSUS THROUGH BITCOIN S PROOF- OF-WORK The aim of this paper is to elucidate how Byzantine consensus is achieved through Bitcoin s novel proof-of-work system without

More information

Hyperledger fabric: towards scalable blockchain for business

Hyperledger fabric: towards scalable blockchain for business Marko Vukolić, IBM Research - Zurich Hyperledger fabric: towards scalable blockchain for business Trust in Digital Life The Hague, Netherlands, June 17 2016 Blockchain shared, replicated, ledger Consensus

More information

Radix - Public Node Incentives

Radix - Public Node Incentives Radix - Public Node Incentives Dan Hughes Piers Ridyard www.radix.global December 2017 Abstract In this paper we present a novel method for implementing a mechanism to reward work carried out across a

More information

Burstcoin Technical information about mining and block forging

Burstcoin Technical information about mining and block forging Burstcoin Technical information about mining and block forging Table of contents 1. Introduction 2. Algorithms and Acronyms 3. Mining process 4. Block forging process Introduction With most cryptocurrencies

More information

Data Consistency and Blockchain. Bei Chun Zhou (BlockChainZ)

Data Consistency and Blockchain. Bei Chun Zhou (BlockChainZ) Data Consistency and Blockchain Bei Chun Zhou (BlockChainZ) beichunz@cn.ibm.com 1 Data Consistency Point-in-time consistency Transaction consistency Application consistency 2 Strong Consistency ACID Atomicity.

More information

Reliability, distributed consensus and blockchain COSC412

Reliability, distributed consensus and blockchain COSC412 Reliability, distributed consensus and blockchain COSC412 Learning objectives Encourage you to always design for failure Appreciate how decentralised consensus is useful to support principles of security

More information

Design Patterns which Facilitate Message Digest Collision Attacks on Blockchains

Design Patterns which Facilitate Message Digest Collision Attacks on Blockchains Symposium on Distributed Ledger Technology SDLT'2017 Gold Coast Campus, Griffith University June 13, 2017 Design Patterns which Facilitate Message Digest Collision Attacks on Blockchains Peter Robinson,

More information

Proof of Stake Made Simple with Casper

Proof of Stake Made Simple with Casper Proof of Stake Made Simple with Casper Olivier Moindrot ICME, Stanford University olivierm@stanford.edu Charles Bournhonesque ICME, Stanford University cbournho@stanford.edu Abstract We study the recent

More information

Bitcoin (and why it uses SO much energy)

Bitcoin (and why it uses SO much energy) Bitcoin (and why it uses SO much energy) David Malone Hamilton Institute / Dept Maths&Stats Maynooth University. 2018-11-08 Bitcoin Background Bitcoin is a cryptocurrency that started around 2008 2009.

More information

Biomedical Security. Cipher Block Chaining and Applications

Biomedical Security. Cipher Block Chaining and Applications 1 Biomedical Security Erwin M. Bakker 2 Cipher Block Chaining and Applications Slides and figures are adapted from: W. Stallings, Cryptography and Network Security 4 th Edition and 7 th Edition 1 3 Block

More information

Ergo platform. Dmitry Meshkov

Ergo platform. Dmitry Meshkov Ergo platform Dmitry Meshkov Prehistory Motivation Theory Practice Provably secure 1000 currencies New features Ad-hoc solutions Impractical Security issues Motivation Theory Provably secure New features

More information

GENESIS VISION NETWORK

GENESIS VISION NETWORK GENESIS VISION NETWORK Contents 1. Description of the problem 7 11. Trust management 15 2. The problem with smart contracts 8 12. GVN Token 16 3. Centralised exchanges against decentralised 8 13. Deposit

More information

Analyzing Bitcoin Security. Philippe Camacho

Analyzing Bitcoin Security. Philippe Camacho Analyzing Bitcoin Security Philippe Camacho philippe.camacho@dreamlab.net Universidad Católica, Santiago de Chile 15 of June 2016 Bitcoin matters Map Blockchain Design Known Attacks Security Models Double

More information

Hijacking Bitcoin: Routing Attacks on Cryptocurrencies

Hijacking Bitcoin: Routing Attacks on Cryptocurrencies Maria Apostolaki 1, Aviv Zohar 2, Laurent Vanbever 1 Presented by Pascal Blöchlinger 1 ETH Zürich, 2 The Hebrew University Motivation Money Security Rising interest Lacking knowledge of participants Overview

More information

Bitcoin. Arni Par ov. December 17, 2013

Bitcoin. Arni Par ov. December 17, 2013 Bitcoin Arni Par ov December 17, 2013 Abstract Bitcoin is a distributed, peer-to-peer cryptocurrency that functions without any central authority and in recent years has gained large popularity. This paper

More information

Bitcoin (Part I) Ken Calvert Keeping Current Seminar 22 January Keeping Current 1

Bitcoin (Part I) Ken Calvert Keeping Current Seminar 22 January Keeping Current 1 Bitcoin (Part I) Ken Calvert Keeping Current Seminar 22 January 2014 2014.01.22 Keeping Current 1 Questions What problem is Bitcoin solving? Where did it come from? How does the system work? What makes

More information

Neel Gupte. Index Terms Bitcoin, Cryptocurreny, Block Chain, Hashing, Proof-of-Work, Double-spending, Momentum Method, Proof of Stake.

Neel Gupte. Index Terms Bitcoin, Cryptocurreny, Block Chain, Hashing, Proof-of-Work, Double-spending, Momentum Method, Proof of Stake. International Journal of Scientific & Engineering Research, Volume 6, Issue 9, September-2015 259 An Analysis of the Hash-Based Proof-of-Work Chain in the Bitcoin Network Neel Gupte Abstract A Bitcoin

More information

The power of Blockchain: Smart Contracts. Foteini Baldimtsi

The power of Blockchain: Smart Contracts. Foteini Baldimtsi The power of Blockchain: Smart Contracts Foteini Baldimtsi The Blockchain at the heart of a cryptocurrency Alice sends 2 John sends 1 Dave sends 5 to Bob to Eve to Alice Bob sends 1 Eve sends 4 to Dave

More information

OpenbankIT: a banking platform for e- money management based on blockchain technology

OpenbankIT: a banking platform for e- money management based on blockchain technology OpenbankIT: a banking platform for e- money management based on blockchain technology Dr. Pavel Kravchenko, Sergiy Vasilchuk, Bohdan Skriabin pavel@distributedlab.com, vsv@atticlab.net, bohdan@distributedlab.com

More information

Applied cryptography

Applied cryptography Applied cryptography Electronic Cash Andreas Hülsing 29 November 2016 1 / 61 Classical Cash - Life Cycle Mint produces money (coins / bank notes) Sent to bank User withdraws money (reduces account balance)

More information

Biomedical and Healthcare Applications for Blockchain. Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs

Biomedical and Healthcare Applications for Blockchain. Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs Biomedical and Healthcare Applications for Blockchain Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs Network Analysis Working Group 01.25.2018 Outline Introduction to bitcoin + blockchain

More information

Adapting Blockchain Technology for Scientific Computing. Wei Li

Adapting Blockchain Technology for Scientific Computing. Wei Li Adapting Blockchain Technology for Scientific Computing Wei Li weili@weililab.org Abstract Blockchain stores information into a chain of s, whose integrity is usually guaranteed by Proof of Work (PoW).

More information

Adapting Blockchain Technology for Scientific Computing. Wei Li

Adapting Blockchain Technology for Scientific Computing. Wei Li Adapting Blockchain Technology for Scientific Computing Wei Li weili@weililab.org Abstract Blockchain stores information into a chain of s, whose integrity is usually guaranteed by Proof of Work (PoW).

More information

Securing Distributed Computation via Trusted Quorums. Yan Michalevsky, Valeria Nikolaenko, Dan Boneh

Securing Distributed Computation via Trusted Quorums. Yan Michalevsky, Valeria Nikolaenko, Dan Boneh Securing Distributed Computation via Trusted Quorums Yan Michalevsky, Valeria Nikolaenko, Dan Boneh Setting Distributed computation over data contributed by users Communication through a central party

More information

ICS 421 & ICS 690. Bitcoin & Blockchain. Assoc. Prof. Lipyeow Lim Information & Computer Sciences Department University of Hawai`i at Mānoa

ICS 421 & ICS 690. Bitcoin & Blockchain. Assoc. Prof. Lipyeow Lim Information & Computer Sciences Department University of Hawai`i at Mānoa ICS 421 & ICS 690 Bitcoin & Blockchain Assoc. Prof. Lipyeow Lim Information & Computer Sciences Department University of Hawai`i at Mānoa Accepted by: Overstock.com Expedia.com Newegg.com Tigerdirect.com

More information

Version 0.7. GoldCoin Patch Announcement. What is a 51% attack. The impossible made possible

Version 0.7. GoldCoin Patch Announcement. What is a 51% attack. The impossible made possible Version 0.7 www.gldcoin.com www.gldtalk.org October 11 2013 GoldCoin Patch Announcement Welcome to the GoldCoin minor version 7 announcement. We have some fantastic news for you folks today. We have at

More information

Introduction to Bitcoin I

Introduction to Bitcoin I Introduction to Bitcoin I P Peterlongo 1 A Tomasi 1 1 University of Trento Department of Mathematics June 10, 2013 Outline 1 Fiat and online payments Functions of Online payments and cost of clearing 2

More information

Sharder Consensus. v1.0 CONTENTS 1 SHARDER CONSENSUS NODES DPOS SHARDER POOL DPOS REALIZATION POC...

Sharder Consensus. v1.0 CONTENTS 1 SHARDER CONSENSUS NODES DPOS SHARDER POOL DPOS REALIZATION POC... Sharder Consensus v1.0 CONTENTS 1 SHARDER CONSENSUS... 1 2 NODES... 2 3 DPOS... 3 3.1 SHARDER POOL... 3 3.2 DPOS REALIZATION... 4 4 POC... 4 4.1 POC REALIZATION... 5 4.2 POC WEIGHTED TABLE... 6 4.3 POC

More information

Anupam Datta CMU. Fall 2015

Anupam Datta CMU. Fall 2015 Anupam Datta CMU Fall 2015 A rational reconstruction of Bitcoin 1. Start with straw man design 2. Identify weaknesses 3. Augment design and iterate Alice: I, Alice, am giving Bob one coin Alice digitally

More information

Table of contents. Technical Features. Our approach. Technical Overview. Stage 1 (Using Ethereum blockchain) Participants. Data Owner.

Table of contents. Technical Features. Our approach. Technical Overview. Stage 1 (Using Ethereum blockchain) Participants. Data Owner. Table of contents Technical Features Our approach Technical Overview Stage 1 (Using Ethereum blockchain) Participants Data Owner Data Verifier Marketplace Data Buyer Creditor Data Platform Architecture

More information

DAG based DLT Network

DAG based DLT Network DAG based DLT Network DAG based DLTs What is a DAG ledger? DAG (Directed Acyclic Graph) based DLTs are ambitious alternatives to blockchain. They re designed to offer all the advantages of blockchain technology,

More information

What is Bitcoin? How Bitcoin Works. Outline. Outline. Bitcoin. Problems with Centralization

What is Bitcoin? How Bitcoin Works. Outline. Outline. Bitcoin. Problems with Centralization What is Bitcoin? How Bitcoin Works Kai Brünnler Research Institute for Security in the Information Society Bern University of Applied Sciences Bitcoin an open-source software a peer-to-peer network a decentralized

More information

Security Analysis of Bitcoin. Dibyojyoti Mukherjee Jaswant Katragadda Yashwant Gazula

Security Analysis of Bitcoin. Dibyojyoti Mukherjee Jaswant Katragadda Yashwant Gazula Security Analysis of Bitcoin Dibyojyoti Mukherjee Jaswant Katragadda Yashwant Gazula Security Analysis of Bitcoin Introduction How Bitcoin works? Similar peer-to-peer systems Vulnerabilities and solutions

More information

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Elli Androulaki Staff member, IBM Research, Zurich Workshop on cryptocurrencies Athens, 06.03.2016 Blockchain systems

More information

Biomedical Security. Some Security News 10/5/2018. Erwin M. Bakker

Biomedical Security. Some Security News 10/5/2018. Erwin M. Bakker Biomedical Security Erwin M. Bakker Some Security News October 03, 2018 - Hackers attacking healthcare through remote access systems and disrupting operations is the number one patient safety risk, according

More information

Ensimag - 4MMSR Network Security Student Seminar. Bitcoin: A peer-to-peer Electronic Cash System Satoshi Nakamoto

Ensimag - 4MMSR Network Security Student Seminar. Bitcoin: A peer-to-peer Electronic Cash System Satoshi Nakamoto Ensimag - 4MMSR Network Security Student Seminar Bitcoin: A peer-to-peer Electronic Cash System Satoshi Nakamoto wafa.mbarek@ensimag.fr halima.myesser@ensimag.fr 1 Table of contents: I- Introduction: Classic

More information

Decentralized prediction game platform, powered by public

Decentralized prediction game platform, powered by public Decentralized prediction game platform, powered by public Table of Contents Overview 3 1.Secured Scalability 3 1.1.Blockchain network delay and Blockbuster attack 3 1.2.Blockchain Transaction Monitoring

More information

Lecture 3. Introduction to Cryptocurrencies

Lecture 3. Introduction to Cryptocurrencies Lecture 3 Introduction to Cryptocurrencies Public Keys as Identities public key := an identity if you see sig such that verify(pk, msg, sig)=true, think of it as: pk says, [msg] to speak for pk, you must

More information

Introduction to Cryptography in Blockchain Technology. December 23, 2018

Introduction to Cryptography in Blockchain Technology. December 23, 2018 Introduction to Cryptography in Blockchain Technology December 23, 2018 What is cryptography? The practice of developing protocols that prevent third parties from viewing private data. Modern cryptography

More information

BLOCKCHAIN Blockchains and Transactions Part II A Deeper Dive

BLOCKCHAIN Blockchains and Transactions Part II A Deeper Dive BLOCKCHAIN Blockchains and Transactions Part II A Deeper Dive www.blockchaintrainingalliance.com Blockchain Page 3 Blockchain is NOT Bitcoin Page 4 Transactions Page 5 Multi-Signature Addresses An Address

More information

The ZILLIQA Technical Whitepaper

The ZILLIQA Technical Whitepaper The ZILLIQA Technical Whitepaper [Version 0.1] August 10, 2017 The ZILLIQA Team www.zilliqa.com enquiry@zilliqa.com @zilliqa Abstract Existing cryptocurrencies and smart contract platforms are known to

More information

Blockchain! What consultants should know about it. Daniel

Blockchain! What consultants should know about it. Daniel Blockchain! What consultants should know about it. Daniel Karzel @ Workshop Overview Quick overview of what is planned for the workshop. What you get out of this workshop Workshop goals Understand what

More information

Node Incentives: An autonomous decentralised incentive and donation system.

Node Incentives: An autonomous decentralised incentive and donation system. Node Incentives: An autonomous decentralised incentive and donation system. Abstract In this document I propose a autonomous decentralised incentive and donation system using the security of the blockchain

More information

What is Bitcoin? Consensus technology has the power to do for economics what the internet did for information - Dan Larimer

What is Bitcoin? Consensus technology has the power to do for economics what the internet did for information - Dan Larimer What is Bitcoin? Consensus technology has the power to do for economics what the internet did for information - Dan Larimer Ross Rydman 2014 For Academic Use Only The 30 second description Bitcoin is the

More information

Enhanced Immutability of Permissioned Blockchain Networks by Tethering Provenance with a Public Blockchain Network

Enhanced Immutability of Permissioned Blockchain Networks by Tethering Provenance with a Public Blockchain Network Enhanced Immutability of Permissioned Blockchain Networks by Tethering Provenance with a Public Blockchain Network Abstract Azeem Ahmed (azeem.ahmed@consensys.net) Jim Zhang (jim.zhang@consensys.net) Permissioned

More information

A Blockchain-based Mapping System

A Blockchain-based Mapping System A Blockchain-based Mapping System IETF 98 Chicago March 2017 Jordi Paillissé, Albert Cabellos, Vina Ermagan, Fabio Maino jordip@ac.upc.edu http://openoverlayrouter.org 1 A short Blockchain tutorial 2 Blockchain

More information

This tutorial is aimed to give you a crisp understanding of the process of building your own blockchain.

This tutorial is aimed to give you a crisp understanding of the process of building your own blockchain. i About the Tutorial Blockchain is the current buzz that is dominating the software development trends. The development and designing of Blockchain involves three major components: client, miner and blockchain.

More information

Cardano Transaction Fees

Cardano Transaction Fees Cardano Transaction Fees Lars Brünjes May 2017 1 Introduction From the point of view of us, the creators of Cardano, we have two motivations for fees: Prevention of DDoS (distributed denial of service)

More information

Part 2. Use Cases (40 points). Consider examples of such signed records R (as in Part 1) from systems we discussed.

Part 2. Use Cases (40 points). Consider examples of such signed records R (as in Part 1) from systems we discussed. CPS 512 midterm exam #1, 10/5/17 Your name please: NetID: Sign for your honor: Part 1. Digital Signatures (25 points). Suppose that a principal Alice (A) signs a message/record (R) that is received by

More information

P2P BitCoin: Technical details

P2P BitCoin: Technical details ELT-53206 Peer-to-Peer Networks P2P BitCoin: Technical details Mathieu Devos Tampere University of Technology Department of Electronics & Communications Engineering mathieu.devos@tut.fi TG406 2 Outline

More information

Sharding. Making blockchains scalable, decentralized and secure.

Sharding. Making blockchains scalable, decentralized and secure. Sharding Making blockchains scalable, decentralized and secure. The Scalability Triangle Scalability Decentralization Semi-formally defining these properties Assume the total computational/bandwidth capacity

More information

Matt Howard and Ajay Patel CIS 556: Cryptography University of Pennsylvania Fall DriveCoin: A Proof of Space Cryptocurrency

Matt Howard and Ajay Patel CIS 556: Cryptography University of Pennsylvania Fall DriveCoin: A Proof of Space Cryptocurrency CIS 556: Cryptography University of Pennsylvania Fall 2015 : A Proof of Space Cryptocurrency Abstract We present an implementation of a cryptocurrency based on the newlytheorized and studied Proof of Space

More information