Blockchain without Bitcoin. Muralidhar Gopinath October 19, 2017 University at Albany

Size: px
Start display at page:

Download "Blockchain without Bitcoin. Muralidhar Gopinath October 19, 2017 University at Albany"

Transcription

1 Blockchain without Bitcoin Muralidhar Gopinath October 19, 2017 University at Albany

2 What is Blockchain? Contains records (blocks) that are linked (chained) to one another using cryptography Each block contains transactional data, timestamp and a hash pointer to the previous block Communication regarding the transactions are done on a peer-to-peer network It is a decentralized model Conceptualized by an anonymous group or person called Satoshi Nakamoto who published a paper in October 2008 called Bitcoin: A Peerto-Peer Electronic Cash System

3 What is Blockchain? (Contd..) Due to the structure and organization of the blocks and the security measure built into the system they are resistant to changes They can be used as an open and distributed ledger Every time a transaction occurs between two parties it is broadcasted to all the nodes in the system

4 Illustration

5 Illustration - Peer to peer broadcast - Transactional information - Transactional signature - Series of blocks

6 Blockchain in other industries Supply chain IoT Insurance Ride sharing Data storage Healthcare And more (Donations, Music, Retail, E-wallets etc.)

7 Supply chain For a company to be profitable it needs to be able to manufacture and distribute its products efficiently The management of this productions and distribution involves software (inventory management, ERP tools etc), paperwork (invoices, purchase orders etc) and bank transactions While the use of the software has a fee attached to them, the paper work is prone to human error and misrepresentation Due to the elaborate process involved in getting a product from the manufacturer to the consumer the distribution is often slow Blockchain induces trust factor (rating system) and visibility into the system It can also help identify and avoid counterfeit products ex skuchain, blockverify

8 Internet of Things IBM and Samsung presented a proof of concept called ADEPT (Autonomous Decentralized Peer-to-peer Telemetry) in CES 2015 BitTorrent, Ethereum and TeleHash protocols were used for ADEPT The paper that was published spoke of the possibility of using ADEPT as a form of Blockchain at homes A network of devices which would autonomously maintain themselves, request for security patch and updates depending on the issues related to its operations The devices would also be able to communicate amongst each other to barter power

9 Insurance Aeternity is a blockchain technology which claims to solve the current problems in the blockchain technology related to privacy, scalability and transaction speed It uses what is called a smart contract which is agreed upon two parties Users can transact with each other privately using state channels Business transactions and smart contracts are kept off channel, there by not exposing them to the outside world This enables limitless simultaneous transaction processing Oracle enables connection of real world data to smart contracts which is useful for insurances that depend on real world data

10 Ride sharing arcade city is founded by team of former uber drivers lead by Christopher David It is peer-to-peer Not governed by a central corporation lets the driver connect with the customer directly, set the price of the ride and transact with the customers They aim to pay the drivers in Arcade Tokens in the future which is a blockchain based crypto currency Users can participate in the growth of the Arcade network by reviewing drivers, referring drivers and customers and get Arcade tokens la zooz is a similar ride sharing application where the community decides reward for driver, rider, programmers and designers according to the contributions based on a fair share model

11 Data storage

12 Data storage Data stored on traditional could storage is prone to security breach and system breakdown Blockchain based cloud storage technology like Storj is a community based could storage where the storage space is provided by the participants in the community Each file is broken down, encrypted, distributed and stored across the network The amount of storage allocated to each user depends on the amount of storage shared by the user with the community Each user is authenticated to gain access to the files owned by them and them alone

13 Healthcare Healthcare institutions today lack infrastructure to store and share sensitive health information in a secure manner Blockchain helps get rid of the closed-off approach of keeping medical records practised by many healthcare providers today It can help share medical records with authorized doctors/patients and healthcare institution bettering data security and speed of diagnosis GEM and TIERION are two services that store sensitive information in an encrypted, immutable form

14 Other Industries Donations Music Retail E-wallets

15 Pros and cons of Blockchain Pros Decentralized Impervious to full system breakdown Not controlled by a single entity Transparent Trust is built into the system Secure All participants have access to the data in the network Cons Decentralized Difficult to provide support and maintenance to the software Transparent Lack of privacy The number of blocks in the blockchain keeps increasing Error produced by a buggy code stays in the system forever

16 References

Health Data & Blockchain: The New Sharing Frontier. Michael Dillhyon, CCO, Graftworx

Health Data & Blockchain: The New Sharing Frontier. Michael Dillhyon, CCO, Graftworx Health Data & Blockchain: The New Sharing Frontier Michael Dillhyon, CCO, Graftworx Twitter: @SwissGator Overview Who? Background Why? Enterprise & Consumer Benefit What? (Blockchain of course) Value Prop

More information

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Elli Androulaki Staff member, IBM Research, Zurich Workshop on cryptocurrencies Athens, 06.03.2016 Blockchain systems

More information

ENEE 457: E-Cash and Bitcoin

ENEE 457: E-Cash and Bitcoin ENEE 457: E-Cash and Bitcoin Charalampos (Babis) Papamanthou cpap@umd.edu Money today Any problems? Cash is cumbersome and can be forged Credit card transactions require centralized online bank are not

More information

The power of Blockchain: Smart Contracts. Foteini Baldimtsi

The power of Blockchain: Smart Contracts. Foteini Baldimtsi The power of Blockchain: Smart Contracts Foteini Baldimtsi The Blockchain at the heart of a cryptocurrency Alice sends 2 John sends 1 Dave sends 5 to Bob to Eve to Alice Bob sends 1 Eve sends 4 to Dave

More information

Biomedical and Healthcare Applications for Blockchain. Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs

Biomedical and Healthcare Applications for Blockchain. Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs Biomedical and Healthcare Applications for Blockchain Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs Network Analysis Working Group 01.25.2018 Outline Introduction to bitcoin + blockchain

More information

Key concepts of blockchain

Key concepts of blockchain Advisory A brief history of blockchains 2008 The mysterious Satoshi Nakamoto publishes his Bitcoin white paper 2014 2017 Nov. 23 rd Ethereum crowd sale Number of crypto tokens: 1.172 BTC $8.216 The first

More information

Smalltalk 3/30/15. The Mathematics of Bitcoin Brian Heinold

Smalltalk 3/30/15. The Mathematics of Bitcoin Brian Heinold Smalltalk 3/30/15 The Mathematics of Bitcoin Brian Heinold What is Bitcoin? Created by Satoshi Nakamoto in 2008 What is Bitcoin? Created by Satoshi Nakamoto in 2008 Digital currency (though not the first)

More information

Biomedical Security. Cipher Block Chaining and Applications

Biomedical Security. Cipher Block Chaining and Applications 1 Biomedical Security Erwin M. Bakker 2 Cipher Block Chaining and Applications Slides and figures are adapted from: W. Stallings, Cryptography and Network Security 4 th Edition and 7 th Edition 1 3 Block

More information

Distributed Ledger Technology & Fintech Applications. Hart Montgomery, NFIC 2017

Distributed Ledger Technology & Fintech Applications. Hart Montgomery, NFIC 2017 Distributed Ledger Technology & Fintech Applications Hart Montgomery, NFIC 2017 Let s consider a common scenario: Banks want to trade some asset class Participants in the market want to be able to efficiently

More information

Prelude. The notes within this Whitepaper publication are intended to formally document the concepts and features of the Aegeus cryptocurrency.

Prelude. The notes within this Whitepaper publication are intended to formally document the concepts and features of the Aegeus cryptocurrency. Prelude The notes within this Whitepaper publication are intended to formally document the concepts and features of the Aegeus cryptocurrency. This document will explain methodically, the details of the

More information

IoT security based on the DPK platform

IoT security based on the DPK platform Zz S E C U M O B I. WHITE PAPER IoT security based on the DPK platform Powered by Ethereum David Khoury Elie Kfoury ABSTRACT Public key distribution remains one of the main security weaknesses in many

More information

Security Analysis of Bitcoin. Dibyojyoti Mukherjee Jaswant Katragadda Yashwant Gazula

Security Analysis of Bitcoin. Dibyojyoti Mukherjee Jaswant Katragadda Yashwant Gazula Security Analysis of Bitcoin Dibyojyoti Mukherjee Jaswant Katragadda Yashwant Gazula Security Analysis of Bitcoin Introduction How Bitcoin works? Similar peer-to-peer systems Vulnerabilities and solutions

More information

IEEE-SA Internet of Things - Security & Standards

IEEE-SA Internet of Things - Security & Standards IEEE-SA Internet of Things - Security & Standards Srikanth Chandrasekaran IEEE Standards Association MOBILE WORLD CONGRESS, SHANGHAI JUNE 2018 What does the IEEE Standards Association (IEEE-SA) do? Vision:

More information

Token White Paper. Global marketplace based on Block chain for small-scale business I ver P a g e

Token White Paper. Global marketplace based on Block chain for small-scale business I ver P a g e Token White Paper Global marketplace based on Block chain for small-scale business 1 P a g e 2018 I ver. 1.0 Contents Qatar Coin Token 3 Contents 4 1. What is QatarCoin 5 2. What is a digital currency

More information

What is Bitcoin? Consensus technology has the power to do for economics what the internet did for information - Dan Larimer

What is Bitcoin? Consensus technology has the power to do for economics what the internet did for information - Dan Larimer What is Bitcoin? Consensus technology has the power to do for economics what the internet did for information - Dan Larimer Ross Rydman 2014 For Academic Use Only The 30 second description Bitcoin is the

More information

Privacy based Public Key Infrastructure (PKI) using Smart Contract in Blockchain Technology

Privacy based Public Key Infrastructure (PKI) using Smart Contract in Blockchain Technology 2 nd Advanced Workshop on Blockchain, IIT Bombay Privacy based Public Key Infrastructure (PKI) using Smart Contract in Blockchain Technology Sivakumar.P M.Tech (CSE), Sem-III, NIT Trichy Guide:- Dr Kunwar

More information

Biomedical Security. Some Security News 10/5/2018. Erwin M. Bakker

Biomedical Security. Some Security News 10/5/2018. Erwin M. Bakker Biomedical Security Erwin M. Bakker Some Security News October 03, 2018 - Hackers attacking healthcare through remote access systems and disrupting operations is the number one patient safety risk, according

More information

A Blockchain-based Mapping System

A Blockchain-based Mapping System A Blockchain-based Mapping System IETF 98 Chicago March 2017 Jordi Paillissé, Albert Cabellos, Vina Ermagan, Fabio Maino jordip@ac.upc.edu http://openoverlayrouter.org 1 A short Blockchain tutorial 2 Blockchain

More information

Blockchain and Additive Manufacturing

Blockchain and Additive Manufacturing Blockchain and Additive Manufacturing January 10, 2019 Presentation to the South Texas Section, AIChE Lisa M. Smith Chief Corporate Development Officer Data Gumbo Corporation Blockchain Basics Data Gumbo

More information

Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. Yashar Dehkan Asl

Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. Yashar Dehkan Asl Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts Yashar Dehkan Asl Chapter I Introduction Decentralized Cryptocurrencies: Such as Bitcoin and altcoins are getting more

More information

Bitcoin (Part I) Ken Calvert Keeping Current Seminar 22 January Keeping Current 1

Bitcoin (Part I) Ken Calvert Keeping Current Seminar 22 January Keeping Current 1 Bitcoin (Part I) Ken Calvert Keeping Current Seminar 22 January 2014 2014.01.22 Keeping Current 1 Questions What problem is Bitcoin solving? Where did it come from? How does the system work? What makes

More information

IOTA Decentralized and Public Platform. Ledger of Things/Economy of Things

IOTA Decentralized and Public Platform. Ledger of Things/Economy of Things IOTA Decentralized and Public Platform Ledger of Things/Economy of Things The Team David Sønstebø Sergey Ivancheglo Serguei Popov, Ph.D Dominik Schiener Management & Strategy Development & Cryptography

More information

BITCOIN PROTOCOL & CONSENSUS: A HIGH LEVEL OVERVIEW

BITCOIN PROTOCOL & CONSENSUS: A HIGH LEVEL OVERVIEW BITCOIN PROTOCOL & CONSENSUS: A HIGH LEVEL OVERVIEW Rustie Lin Wang Move the area1 over the image a little inside and then right click, replace image to change the background. (and delete this box while

More information

Chapter 13. Digital Cash. Information Security/System Security p. 570/626

Chapter 13. Digital Cash. Information Security/System Security p. 570/626 Chapter 13 Digital Cash Information Security/System Security p. 570/626 Introduction While cash is used in illegal activities such as bribing money laundering tax evasion it also protects privacy: not

More information

Radix - Public Node Incentives

Radix - Public Node Incentives Radix - Public Node Incentives Dan Hughes Piers Ridyard www.radix.global December 2017 Abstract In this paper we present a novel method for implementing a mechanism to reward work carried out across a

More information

Blockchain! What consultants should know about it. Daniel

Blockchain! What consultants should know about it. Daniel Blockchain! What consultants should know about it. Daniel Karzel @ Workshop Overview Quick overview of what is planned for the workshop. What you get out of this workshop Workshop goals Understand what

More information

On the design of a Blockchain-based system to facilitate Healthcare Data Sharing

On the design of a Blockchain-based system to facilitate Healthcare Data Sharing On the design of a Blockchain-based system to facilitate Healthcare Data Sharing Anastasia Theodouli, Stelios Arakliotis, Konstantinos Moschou, Konstantinos Votis, Dimitrios Tzovaras CERTH / ITI Thessaloniki,

More information

SOME OF THE PROBLEMS IN BLOCKCHAIN TODAY

SOME OF THE PROBLEMS IN BLOCKCHAIN TODAY BLOCKCHAIN EVOLVED THE PROBLEM SOME OF THE PROBLEMS IN BLOCKCHAIN TODAY An overall lack of governance is one of the most challenging facets of current blockchain ecosystems Controversy regarding scalability

More information

BaFin-Tech 2018 BlockChain & Security (from #developerview)

BaFin-Tech 2018 BlockChain & Security (from #developerview) BaFin-Tech 2018 BlockChain & Security (from #developerview) DLT Lab 10 th April 2018 sven.lehnert@main-incubator.com, @itnext_de Experiences from practice Agenda: Blockchain Security 1 Theory: Blockchain

More information

Table Of Contents. Introduction Blockchain and Cryptocurrency...1. Stellar (payment network)...2. Internet and its issues...3. LocalXpose...

Table Of Contents. Introduction Blockchain and Cryptocurrency...1. Stellar (payment network)...2. Internet and its issues...3. LocalXpose... Table Of Contents Introduction... 1 Blockchain and Cryptocurrency...1 Stellar (payment network)...2 Internet and its issues...3 LocalXpose... 5 How LocalXpose Actually works?...6 Why to use LocalXpose?...7

More information

White Paper. Blockchain alternatives: The case for CRAQ

White Paper. Blockchain alternatives: The case for CRAQ White Paper Blockchain alternatives: The case for CRAQ Blockchain technology continues to gain attention as the foundation of the bitcoin economy. Given the rapid gain in popularity of bitcoin, it s no

More information

Reliability, distributed consensus and blockchain COSC412

Reliability, distributed consensus and blockchain COSC412 Reliability, distributed consensus and blockchain COSC412 Learning objectives Encourage you to always design for failure Appreciate how decentralised consensus is useful to support principles of security

More information

Elphyrecoin (ELPH) a Private, Untraceable, ASIC-Resistant CryptoCurrency Based on CryptoNote

Elphyrecoin (ELPH) a Private, Untraceable, ASIC-Resistant CryptoCurrency Based on CryptoNote Elphyrecoin (ELPH) a Private, Untraceable, ASIC-Resistant CryptoCurrency Based on CryptoNote This is the First Version of the Elphyrecoin s White Paper Please Check the Website for Future Updates White

More information

Table of contents. Technical Features. Our approach. Technical Overview. Stage 1 (Using Ethereum blockchain) Participants. Data Owner.

Table of contents. Technical Features. Our approach. Technical Overview. Stage 1 (Using Ethereum blockchain) Participants. Data Owner. Table of contents Technical Features Our approach Technical Overview Stage 1 (Using Ethereum blockchain) Participants Data Owner Data Verifier Marketplace Data Buyer Creditor Data Platform Architecture

More information

Analyzing Bitcoin Security. Philippe Camacho

Analyzing Bitcoin Security. Philippe Camacho Analyzing Bitcoin Security Philippe Camacho philippe.camacho@dreamlab.net Universidad Católica, Santiago de Chile 15 of June 2016 Bitcoin matters Map Blockchain Design Known Attacks Security Models Double

More information

DAVID ANDREWS, FOUNDER RYATTA BLOCKCHAIN FOUNDATIONS

DAVID ANDREWS, FOUNDER RYATTA BLOCKCHAIN FOUNDATIONS DAVID ANDREWS, FOUNDER RYATTA GROUP, CRYPTOGRAPHY IS THE STUDY OF TECHNIQUES FOR SECURE COMMUNICATION cryptography is defined as the practice and study of techniques for secure communication in the early

More information

Blockchain (de)constructed

Blockchain (de)constructed Blockchain (de)constructed Fritz Henglein Department of Computer Science, University of Copenhagen (DIKU) DIKU Business Club meeting on blockchain January 11th, 2016 Fritz Henglein Professor of programming

More information

As a 3rd generation currency, not only are transactions secured, private and fast, you actually get paid for holding DigitalPrice coins.

As a 3rd generation currency, not only are transactions secured, private and fast, you actually get paid for holding DigitalPrice coins. Introduction With the circulation of cryptocurrency becoming common, there is a need for additional information. The scope of this white paper is to provide that information. If you are under the impression

More information

Computer Security. 14. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2019

Computer Security. 14. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2019 Computer Security 14. Blockchain & Bitcoin Paul Krzyzanowski Rutgers University Spring 2019 April 15, 2019 CS 419 2019 Paul Krzyzanowski 1 Bitcoin & Blockchain Bitcoin cryptocurrency system Introduced

More information

Introduc)on to Bitcoin

Introduc)on to Bitcoin Introduc)on to Bitcoin CONTENTS What is Bitcoin Who created it? Who prints it? How does Bitcoin work? The characteris5cs of Bitcoin WHAT IS BITCOIN Bitcoin is a form of digital currency, created and held

More information

BLOCKCHAIN The foundation behind Bitcoin

BLOCKCHAIN The foundation behind Bitcoin BLOCKCHAIN The foundation behind Bitcoin Sourav Sen Gupta Indian Statistical Institute, Kolkata CRYPTOGRAPHY Backbone of Blockchain Technology Component 1 : Cryptographic Hash Functions HASH FUNCTIONS

More information

An analysis of the applicability of blockchain to secure IP addresses allocation, delegation and bindings draft-paillisse-sidrops-blockchain-01

An analysis of the applicability of blockchain to secure IP addresses allocation, delegation and bindings draft-paillisse-sidrops-blockchain-01 An analysis of the applicability of blockchain to secure IP addresses allocation, delegation and bindings draft-paillisse-sidrops-blockchain-01 OPSEC - IETF 101 - London March 2018 Jordi Paillissé, Albert

More information

neblio Next Generation Enterprise Blockchain Solutions v

neblio Next Generation Enterprise Blockchain Solutions v neblio Next Generation Enterprise Blockchain Solutions v20170726 contents Neblio Blockchain 3 4 6 7 14 16 18 19 Abstract Blockchain What is the Neblio Blockchain? Enterprise Adoption & Next Generation

More information

BBc-1 : Beyond Blockchain One - An Architecture for Promise-Fixation Device in the Air -

BBc-1 : Beyond Blockchain One - An Architecture for Promise-Fixation Device in the Air - BBc-1 : Beyond Blockchain One - An Architecture for Promise-Fixation Device in the Air - Kenji Saito and Takeshi Kubo {ks91 t-kubo}@beyond-blockchain.org Revision 0.1 October 31, 2017 1 Introduction Blockchain

More information

Problem: Equivocation!

Problem: Equivocation! Bitcoin: 10,000 foot view Bitcoin and the Blockchain New bitcoins are created every ~10 min, owned by miner (more on this later) Thereafter, just keep record of transfers e.g., Alice pays Bob 1 BTC COS

More information

Fujitsu World Tour 2018

Fujitsu World Tour 2018 Fujitsu World Tour 2018 May 30, 2018 #FujitsuWorldTour 1 Copyright 2018 FUJITSU Security and Privacy of Big Data A NIST Perspective Arnab Roy Fujitsu Laboratories of America Co-Chair, NIST Big Data WG:

More information

Key Security Issues for implementation of Digital Currency, including ITU-T SG17 activities

Key Security Issues for implementation of Digital Currency, including ITU-T SG17 activities ITU Workshop on FG DFC Workshop on Standards for Digital Fiat Currency (DFC) () Key Issues for implementation of Digital Currency, including ITU-T SG17 activities Heung Youl Youm, PhD. Chairman of ITU-T

More information

International Journal of Computer Engineering and Applications, Volume XIII, Issue II, Feb. 19, ISSN

International Journal of Computer Engineering and Applications, Volume XIII, Issue II, Feb. 19,   ISSN BLOCK-CHAIN: SURVEY ON PRIVACY, SECURITY AND CHALLENGES Monalisha Sinha ABSTRACT: Department of computer science & engineering Birla institute of technology Ranchi, India Blockchain has gained wide attention

More information

SOLUTION ARCHITECTURE AND TECHNICAL OVERVIEW. Decentralized platform for coordination and administration of healthcare and benefits

SOLUTION ARCHITECTURE AND TECHNICAL OVERVIEW. Decentralized platform for coordination and administration of healthcare and benefits SOLUTION ARCHITECTURE AND TECHNICAL OVERVIEW Decentralized platform for coordination and administration of healthcare and benefits ENABLING TECHNOLOGIES Blockchain Distributed ledgers Smart Contracts Relationship

More information

About & Beyond PKI. Blockchain and PKI. André Clerc Dipl. Inf.-Ing. FH, CISSP, CAS PM TEMET AG, Zürich. February 9, 2017

About & Beyond PKI. Blockchain and PKI. André Clerc Dipl. Inf.-Ing. FH, CISSP, CAS PM TEMET AG, Zürich. February 9, 2017 About & Beyond PKI Blockchain and PKI André Clerc Dipl. Inf.-Ing. FH, CISSP, CAS PM TEMET AG, Zürich February 9, 2017 1 Agenda Does blockchain secure PKIs in the longterm? Disadvantages of classic PKIs

More information

Decentralized Database for Developers. White Paper v March 31,2018

Decentralized Database for Developers. White Paper v March 31,2018 Decentralized Database for Developers White Paper v 1.01 March 31,2018 Content Introduction 3 Problem 3 Solution 4 Solutions Landscape 5 The Xuma Benefits 6 Market Opportunity 6 Database Evolution 7 Xuma

More information

A SYSTEM FOR ENABLING SHORT-TERM FINANCING

A SYSTEM FOR ENABLING SHORT-TERM FINANCING A SYSTEM FOR ENABLING SHORT-TERM FINANCING 5 The present invention relates generally to a system and method for enabling short-term financing, and finds particular, although not exclusive, utility in invoice

More information

VERSION: 1

VERSION: 1 HELLO@WEB3.FOUNDATION 20-09-2017 ERSION: 1 Introducing Table of Contents 3 The Existing Blockchain Landscape 5 The Polkadot Mission: Connect Blockchains 6 Interoperability 7 Scalability 8 Shared 9 The

More information

Using Blockchain for Consent and Access to Private and Sensitive Data in the GDPR Environment

Using Blockchain for Consent and Access to Private and Sensitive Data in the GDPR Environment Using Blockchain for Consent and Access to Private and Sensitive Data in the GDPR Environment Gary Leeming, Chief Technology Officer Connected Health Cities, University of Manchester 1 Connected Health

More information

Not ACID, not BASE, but SALT A Transaction Processing Perspective on Blockchains

Not ACID, not BASE, but SALT A Transaction Processing Perspective on Blockchains Not ACID, not BASE, but SALT A Transaction Processing Perspective on Blockchains Authors: Stefan Tai, Jacob Eberhardt and Markus Klems Presentation by: Georgiou Zacharias and Paschalides Demetris 1 Overview

More information

Vladimir Groshev. COO, Project Coordinator.

Vladimir Groshev. COO, Project Coordinator. Vladimir Groshev COO, Project Coordinator If absolute anonymity and complete security is what you are looking for, Then SISHUB is what you need! 1. Anonymous STEEL Messenger 2. Built-in cryptocurrency

More information

BLOCKCHAIN CADEC Pär Wenåker & Peter Larsson

BLOCKCHAIN CADEC Pär Wenåker & Peter Larsson BLOCKCHAIN CADEC 2018 - Pär Wenåker & Peter Larsson BITCOIN BITCOIN PAPER Posted 31/10 2008 Bitcoin v0.1 released Satoshi Nakamoto satoshi at vistomail.com Thu Jan 8 14:27:40 EST 2009 Previous message:

More information

Trustworthy user authentication, authorization, data integrity AND consent management

Trustworthy user authentication, authorization, data integrity AND consent management RapidQube Solutions Trustworthy user authentication, authorization, data integrity AND consent management I D E N T I T Y A N D A CC E S S M A N A G E M E N T S O L U T I O N RapidQube Solutions 2 IDENTITY

More information

Consensus & Blockchain

Consensus & Blockchain Consensus & Blockchain S P Suresh Chennai Mathematical Institute Formal Methods Update Meeting IIT Mandi July 17, 2017 The Bitcoin revolution is upon us What is Bitcoin? Bitcoin: an exciting new currency

More information

ECC: Peer-to-Peer Electronic Cash with Trustless Network Services

ECC: Peer-to-Peer Electronic Cash with Trustless Network Services ECC: Peer-to-Peer Electronic Cash with Trustless Network Services Greg Griffith October 2017 (griffith@cryptounited.io) https://www.ecc.network ECC: Peer-to-Peer Electronic Cash with Trustless Network

More information

A Review on Blockchain Application for Decentralized Decision of Ownership of IoT Devices

A Review on Blockchain Application for Decentralized Decision of Ownership of IoT Devices Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 10, Number 8 (2017) pp. 2449-2456 Research India Publications http://www.ripublication.com A Review on Blockchain Application for

More information

Security: Focus of Control

Security: Focus of Control Security: Focus of Control Three approaches for protection against security threats a) Protection against invalid operations b) Protection against unauthorized invocations c) Protection against unauthorized

More information

HELIX a Framework For The Future of Healthcare EKG Example. Frank Luijckx 4th-IR

HELIX a Framework For The Future of Healthcare EKG Example. Frank Luijckx 4th-IR HELIX a Framework For The Future of Healthcare EKG Example Frank Luijckx 4th-IR The Symbiotic Application of Machine Intelligence and Blockchain 8/27/18 2 base Architecture RawPatient Record EKG, MRI,

More information

Decentralized Identity for a Decentralized World. Alex Simons Partner Director Program Management, Identity Division Microsoft

Decentralized Identity for a Decentralized World. Alex Simons Partner Director Program Management, Identity Division Microsoft Decentralized Identity for a Decentralized World Alex Simons Partner Director Program Management, Identity Division Microsoft Today Your Identity == App(username, password) However u s e r n a m e Your

More information

Ensimag - 4MMSR Network Security Student Seminar. Bitcoin: A peer-to-peer Electronic Cash System Satoshi Nakamoto

Ensimag - 4MMSR Network Security Student Seminar. Bitcoin: A peer-to-peer Electronic Cash System Satoshi Nakamoto Ensimag - 4MMSR Network Security Student Seminar Bitcoin: A peer-to-peer Electronic Cash System Satoshi Nakamoto wafa.mbarek@ensimag.fr halima.myesser@ensimag.fr 1 Table of contents: I- Introduction: Classic

More information

Privacy-Enabled NFTs: User-Mintable, Non-Fungible Tokens With Private Off-Chain Data

Privacy-Enabled NFTs: User-Mintable, Non-Fungible Tokens With Private Off-Chain Data Privacy-Enabled NFTs: User-Mintable, Non-Fungible Tokens With Private Off-Chain Data Philip Stehlik Lucas Vogelsang August 8, 2018 1 Abstract Privacy-enabled NFTs (non-fungible tokens) are user-mintable

More information

Cyber-Physical Chain (CPChain) Light Paper

Cyber-Physical Chain (CPChain) Light Paper Cyber-Physical Chain (CPChain) Light Paper Decentralized Infrastructure for Next Generation Internet of Things Cyber-Physical Chain (CPChain) Team December 10, 2017 Abstract Deeply integrating blockchain

More information

LECTURE 2 BLOCKCHAIN TECHNOLOGY EVOLUTION

LECTURE 2 BLOCKCHAIN TECHNOLOGY EVOLUTION LECTURE 2 BLOCKCHAIN TECHNOLOGY EVOLUTION THE PAST: THE VENDING MACHINE DAYS NEW USE CASES Namecoin 2011 Bytecoin 2012 Dogecoin 2013 Decentralized domain name service Privacy, first to use the CryptoNote

More information

Bitcoin, a decentralized and trustless protocol

Bitcoin, a decentralized and trustless protocol Bitcoin, a decentralized and trustless protocol Thomas Sibut-Pinote Inria Saclay February 12, 2015 Thomas Sibut-Pinote Bitcoin, a decentralized and trustless protocol 1 / 42 Introduction Questions 1 Introduction

More information

OpenbankIT: a banking platform for e- money management based on blockchain technology

OpenbankIT: a banking platform for e- money management based on blockchain technology OpenbankIT: a banking platform for e- money management based on blockchain technology Dr. Pavel Kravchenko, Sergiy Vasilchuk, Bohdan Skriabin pavel@distributedlab.com, vsv@atticlab.net, bohdan@distributedlab.com

More information

The Technology behind Smart Contracts

The Technology behind Smart Contracts The Technology behind Smart Contracts Florian Glaser, Chair of E-Finance, Information Systems Department Goethe University 01.09.2016 > Agenda Transactions in detail

More information

Founder of NKN & Co-Founder of Onchain. Open source guru, Linux Kernel network subsystem code contributor.

Founder of NKN & Co-Founder of Onchain. Open source guru, Linux Kernel network subsystem code contributor. Biography Yanbo Li Founder of NKN & Co-Founder of Onchain Open source guru, Linux Kernel network subsystem code contributor. Founded and led Onchain Beijing office and developed open source blockchain

More information

Introduction to Bitcoin I

Introduction to Bitcoin I Introduction to Bitcoin I P Peterlongo 1 A Tomasi 1 1 University of Trento Department of Mathematics June 10, 2013 Outline 1 Fiat and online payments Functions of Online payments and cost of clearing 2

More information

ABOUT SOME OF THE BLOCKCHAIN PROBLEMS

ABOUT SOME OF THE BLOCKCHAIN PROBLEMS ABOUT SOME OF THE BLOCKCHAIN PROBLEMS A.V. Bogdanov 1, A.B. Degtyarev 1, V.V. Korkhov 1, M. Kamande 1, O.O. Iakushkin 1, V. Khvatov 2 1 Saint Petersburg State University, 7/9 Universitetskaya nab., St.

More information

CSE 5852, Modern Cryptography: Foundations Fall Lecture 26. pk = (p,g,g x ) y. (p,g,g x ) xr + y Check g xr +y =(g x ) r.

CSE 5852, Modern Cryptography: Foundations Fall Lecture 26. pk = (p,g,g x ) y. (p,g,g x ) xr + y Check g xr +y =(g x ) r. CSE 5852, Modern Cryptography: Foundations Fall 2016 Lecture 26 Prof. enjamin Fuller Scribe: Tham Hoang 1 Last Class Last class we introduce the Schnorr identification scheme [Sch91]. The scheme is to

More information

A Public Database for the Planet

A Public Database for the Planet A Public Database for the Planet Trent McConaghy @trentmc0 Motivation Here s your personal data My conclusion is that whatever you put on the internet you lose it. Maybe keep the rights, but lose the

More information

White Paper. The FaceCoin Network. Introduction

White Paper. The FaceCoin Network. Introduction Introduction White Paper The FaceCoin Network FaceCoin (FC) - Cryptocurrency for the decentralized social network. Decentralized peer-to-peer technologies have evolved to replace conventional services

More information

Blockchain. CS 240: Computing Systems and Concurrency Lecture 20. Marco Canini

Blockchain. CS 240: Computing Systems and Concurrency Lecture 20. Marco Canini Blockchain CS 240: Computing Systems and Concurrency Lecture 20 Marco Canini Credits: Michael Freedman and Kyle Jamieson developed much of the original material. Bitcoin: 10,000 foot view New bitcoins

More information

Principals of Blockchain technology - Digital Business Ecosystem Kick of meeting Helsinki

Principals of Blockchain technology - Digital Business Ecosystem Kick of meeting Helsinki Principals of Blockchain technology - Digital Business Ecosystem Kick of meeting 25.2.2016 Helsinki Dr. Kari Korpela, Information Logistics Integration School of Business and Management Lappeenranta University

More information

QUADCORECHAIN. White Paper ver.1

QUADCORECHAIN. White Paper ver.1 QUADCORECHAIN White Paper ver.1 INTRO QuadCoreChain is designed to be a smart contract, crypto currency platform, decentralizing Live Streaming of Video. The platform ecosystem is to create favorable conditions

More information

Incentivized Delivery Network of IoT Software Updates Based on Proofs-of-Distribution

Incentivized Delivery Network of IoT Software Updates Based on Proofs-of-Distribution Incentivized Delivery Network of IoT Software Updates Based on Proofs-of-Distribution Oded Leiba, Yechiav Yitzchak, Ron Bitton, Asaf Nadler, Asaf Shabtai Ben-Gurion University of the Negev IoT Units (billions)

More information

Why is blockchain exciting? Data Sharing.

Why is blockchain exciting? Data Sharing. Blockchain Basics 2 Why is blockchain exciting? Data Sharing. Most of the excitement about blockchain is really just excitement about the possibility of sharing data across company lines For some entire

More information

P2P BitCoin: Technical details

P2P BitCoin: Technical details ELT-53206 Peer-to-Peer Networks P2P BitCoin: Technical details Mathieu Devos Tampere University of Technology Department of Electronics & Communications Engineering mathieu.devos@tut.fi TG406 2 Outline

More information

ETHERNITY DECENTRALIZED CLOUD COMPUTING

ETHERNITY DECENTRALIZED CLOUD COMPUTING ETHERNITY DECENTRALIZED CLOUD COMPUTING Whitepaper 4 August 2013 v1.3 HODL UG crowdsale@ethernity.cloud DISCLAIMER: The ETHERNITY Tokens are a crypto asset that is currently being developed by the ETHERNITY

More information

Distributed Ledger With Secure Data Deletion

Distributed Ledger With Secure Data Deletion Distributed Ledger With Secure Data Deletion Vitalii Demianets (norbloc AB), Astyanax Kanakakis (norbloc AB) Revision 1.4, November 2016 Abstract One of the core attributes of distributed ledgers, the

More information

DEV. Deviant Coin, Innovative Anonymity. A PoS/Masternode cr yptocurrency developed with POS proof of stake.

DEV. Deviant Coin, Innovative Anonymity. A PoS/Masternode cr yptocurrency developed with POS proof of stake. DEV Deviant Coin, Innovative Anonymity A PoS/Masternode cr yptocurrency developed with POS proof of stake. CONTENTS 03 Overview 06 Pre-mine phase 07 Privacy 08 Basic parameters 09 Proof-of-stake The benefits

More information

The security and insecurity of blockchains and smart contracts

The security and insecurity of blockchains and smart contracts The security and insecurity of blockchains and smart contracts Jean-Pierre Flori, expert in cryptography, Agence Nationale de la Sécurité des Systèmes d Information (ANSSI) In J.P. Dardayrol, editor of

More information

Synapse: Decentralized Intelligence

Synapse: Decentralized Intelligence Synapse: Decentralized Intelligence A Decentralized Data and Machine Learning Network Dan P. Gailey Version 1.0 Abstract Discusses the architecture and protocol specifications for building the infrastructure

More information

Blockchain & Distributed Internet Infrastructure

Blockchain & Distributed Internet Infrastructure Blockchain & Distributed Internet Infrastructure Dirk Kutscher NEC Laboratories Europe 1 Purpose of this Meeting Discuss blockchain-based and Distributed Internet Infrastructure concepts, state of the

More information

Blockchain-enabled peer-to-peer marketplaces

Blockchain-enabled peer-to-peer marketplaces Blockchain-enabled peer-to-peer marketplaces Creating the infrastructure and UX to enable mainstream commercial transactions on Ethereum Matthew Liu Cofounder Company Overview 2 Origin will enable decentralized

More information

ICO Review: Raiden Network (RDN)

ICO Review: Raiden Network (RDN) ICO Review: Raiden Network (RDN) Scalable Transfers for Ethereum October 10, 2017 What is Raiden Network? Raiden is an payment network built on top of the Ethereum network. PAYMENT CHANNEL NETWORK It aims

More information

Using Chains for what They re Good For

Using Chains for what They re Good For Using Chains for what They re Good For Andrew Poelstra usingchainsfor@wpsoftware.net Scaling Bitcoin, November 5, 2017 1 / 14 On-Chain Smart Contracting Bitcoin (and Ethereum, etc.) uses a scripting language

More information

Bitcoin and Blockchain

Bitcoin and Blockchain Bitcoin and Blockchain COS 418: Distributed Systems Lecture 18 Zhenyu Song [Credit: Selected content adapted from Michael Freedman. Slides refined by Chris Hodsdon and Theano Stavrinos] Why Bitcoin? All

More information

Whitepaper Rcoin Global

Whitepaper Rcoin Global Whitepaper Rcoin Global SUMMARY 1. Introduction 2. What is Rcoin Global? 3. Transactions 4. Hybrid Network Concept 5. Keepers 6. Incentive 7. Smart Contract Token 8. Token Distribution 9. Rcoin Global

More information

GENESIS VISION NETWORK

GENESIS VISION NETWORK GENESIS VISION NETWORK Contents 1. Description of the problem 7 11. Trust management 15 2. The problem with smart contracts 8 12. GVN Token 16 3. Centralised exchanges against decentralised 8 13. Deposit

More information

Blockchain, cryptography, and consensus

Blockchain, cryptography, and consensus ITU Workshop on Security Aspects of Blockchain (Geneva, Switzerland, 21 March 2017) Blockchain, cryptography, and consensus Dr. Christian Cachin IBM Research - Zurich www.zurich.ibm.com/~cca/ Geneva, Switzerland,

More information

BEYOND TRADITIONAL PASSWORD AUTHENTICATION: PKI & BLOCKCHAIN

BEYOND TRADITIONAL PASSWORD AUTHENTICATION: PKI & BLOCKCHAIN SESSION ID: GPS-R09B BEYOND TRADITIONAL PASSWORD AUTHENTICATION: PKI & BLOCKCHAIN Sid Desai Head of Business Development Remme.io @skd_desai Agenda Our relationship to our digital-selves Evolution of Authentication

More information

Blockchain Frameworks

Blockchain Frameworks TechWatch Report Blockchain Frameworks Date: March 2018 Contributors: Hemant Sachdeva, Subhrojit Nag Contents 1 Objective... 3 2 Capabilities... 3 2.1 Consensus and Incentive Mechanism... 3 2.2 Limitation

More information

Technical Analysis of Established Blockchain Systems

Technical Analysis of Established Blockchain Systems Technical Analysis of Established Blockchain Systems Florian Haffke, 20.11.2017, Munich Chair of Software Engineering for Business Information Systems (sebis) Faculty of Informatics Technische Universität

More information

TC307 SG3 - SECURITY & PRIVACY

TC307 SG3 - SECURITY & PRIVACY TC307 SG3 - SECURITY & PRIVACY 6 layers of security 1. Cryptography 2. Blockchain protocol 3. Application 4. Privacy mechanisms 5. Implementation 6. Operation Security issues Cryptography Lots of understanding

More information