Will Martino (me) Kadena

Similar documents
Who wants to be a millionaire? A class in creating your own cryptocurrency

Hyperledger fabric: towards scalable blockchain for business

ENEE 457: E-Cash and Bitcoin

Version 0.7. GoldCoin Patch Announcement. What is a 51% attack. The impossible made possible

Hyperledger Fabric v1:

Blockchain & Distributed Internet Infrastructure

Problem: Equivocation!

SpaceMint Overcoming Bitcoin s waste of energy

Blockchain. CS 240: Computing Systems and Concurrency Lecture 20. Marco Canini

Ergo platform. Dmitry Meshkov

Bitcoin and Blockchain

Ergo platform: from prototypes to a survivable cryptocurrency

Computer Security. 14. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2019

Bitcoin (Part I) Ken Calvert Keeping Current Seminar 22 January Keeping Current 1

The Blockchain. Josh Vorick

BitBill: Scalable, Robust, Verifiable Peer-to-Peer Billing for Cloud Computing

BBc-1 : Beyond Blockchain One - An Architecture for Promise-Fixation Device in the Air -

Biomedical and Healthcare Applications for Blockchain. Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs

Blockchain Frameworks

Bitcoin, a decentralized and trustless protocol

Ergo platform overview

BaFin-Tech 2018 BlockChain & Security (from #developerview)

ICS 421 & ICS 690. Bitcoin & Blockchain. Assoc. Prof. Lipyeow Lim Information & Computer Sciences Department University of Hawai`i at Mānoa

Adapting Blockchain Technology for Scientific Computing. Wei Li

What is Bitcoin? How Bitcoin Works. Outline. Outline. Bitcoin. Problems with Centralization

Technical Analysis of Established Blockchain Systems

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University

EECS 498 Introduction to Distributed Systems

Burstcoin Technical information about mining and block forging

Key concepts of blockchain

ECC: Peer-to-Peer Electronic Cash with Trustless Network Services

Adapting Blockchain Technology for Scientific Computing. Wei Li

Whitepaper Rcoin Global

CONSENSUS PROTOCOLS & BLOCKCHAINS. Techruption Lecture March 16 th, 2017 Maarten Everts (TNO & University of Twente)

Biomedical Security. Cipher Block Chaining and Applications

Set: Hub-and-Spoke Cryptographic Payment Channels

SCP: A Computationally Scalable Byzantine Consensus Protocol for Blockchains

Ethereum in Enterprise Context

Design Book of TRON Architecture

(Some details might be added) CREDITS

Blockchain, Cryptocurrency, Smart Contracts and Initial Coin Offerings: A Technical Perspective

Technical White Paper. (Some details might be added) Decentralized financial system CREDITS. Version 1.6/26 nov 2017

Bitcoin Mining. A high-level technical introduction. Konstantinos Karasavvas

Technical White Paper of. MOAC Mother of All Chains. June 8 th, 2017

Enhanced Immutability of Permissioned Blockchain Networks by Tethering Provenance with a Public Blockchain Network

SmartPool: practical decentralized pool mining. Loi Luu, Yaron Velner, Jason Teutsch, and Prateek Saxena August 18, 2017

Introduction to Bitcoin I

Viacoin Whitepaper. Viacoin Dev Team September 12, Abstract

Wormhole: A Smart Contract Solution for Bitcoin Cash

Blockchains & Cryptocurrencies

Bitcoin. CS6450: Distributed Systems Lecture 20 Ryan Stutsman

Introduction to Cryptography in Blockchain Technology. December 23, 2018

Matt Howard and Ajay Patel CIS 556: Cryptography University of Pennsylvania Fall DriveCoin: A Proof of Space Cryptocurrency

An analysis of the applicability of blockchain to secure IP addresses allocation, delegation and bindings draft-paillisse-sidrops-blockchain-01

Resource-Efficient Mining (REM) with Proofs of Useful Work (PoUW)

Catena: Preventing Lies with

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric

Using Blockchain Technology and Smart Contracts for Access Management in IoT devices

Security Analysis of the Lightning Network

EVALUATION OF PROOF OF WORK (POW) BLOCKCHAINS SECURITY NETWORK ON SELFISH MINING

University of Duisburg-Essen Bismarckstr Duisburg Germany HOW BITCOIN WORKS. Matthäus Wander. June 29, 2011

Decentralized Database for Developers. White Paper v March 31,2018

Decentralized prediction game platform, powered by public

Blockstack, a New Internet for Decentralized Apps. Muneeb Ali

A scalable value transfer protocol for the digital economy

MINIATURE WORLD: MEASURING AND REPLICATING REAL-WORLD BLOCKCHAIN DEPLOYMENTS

aelf - A Multi-Chain Parallel Computing Blockchain Framework V 1.6

Distributed Ledger Technology & Fintech Applications. Hart Montgomery, NFIC 2017

What is Proof of Work?

Lecture 6. Mechanics of Bitcoin

Sharding. Making blockchains scalable, decentralized and secure.

The objectives of this project include the following. Note that students are expected to choose a subset of goals to fulfill:

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University

ZILLIQA / ZILIKƏ/ NEXT GEN HIGH-THROUGHPUT BLOCKCHAIN PLATFORM DONG XINSHU, CEO JIA YAOQI, BLOCKCHAIN ZILLIQA.

BLOCKCHAIN Blockchains and Transactions Part II A Deeper Dive

BigchainDB: A Scalable Blockchain Database. Trent McConaghy

Consensus & Blockchain

Jan Møller Co-founder, CTO Chainalysis

Formally Specifying Blockchain Protocols

Privacy-Enabled NFTs: User-Mintable, Non-Fungible Tokens With Private Off-Chain Data

Biomedical Security. Some Security News 10/5/2018. Erwin M. Bakker

International Journal of Computer Engineering and Applications, Volume XIII, Issue II, Feb. 19, ISSN

Blockchain (a.k.a. the slowest, most fascinating database you ll ever see)

Algorand: Scaling Byzantine Agreements for Cryptocurrencies

Introduction to Blockchain

Accelerating Blockchain Search of Full Nodes Using GPUs

Prabhat Kumar Singh (TIM)

DEV. Deviant Coin, Innovative Anonymity. A PoS/Masternode cr yptocurrency developed with POS proof of stake.

Data Consistency and Blockchain. Bei Chun Zhou (BlockChainZ)

Ethereum Consortium Blockchain in Azure Marketplace Christine Avanessians Senior Program Manager

Security Analysis of Bitcoin. Dibyojyoti Mukherjee Jaswant Katragadda Yashwant Gazula

Introducing. Bitcoin. A dilettante s guide to Bitcoin scalability. BIP-9000 (self-assigned) Quote It s kind of fun to do the impossible.

Blockchain! What consultants should know about it. Daniel

PARALLEL CONSENSUS PROTOCOL

A Lightweight Blockchain Consensus Protocol

Digital Currencies: Algorithms and Protocols

Ethereum Consortium Network Deployments Made Easy Christine Avanessians Senior Program Manager

The security and insecurity of blockchains and smart contracts

BLOCKCHAIN ARCHITECT Certification. Blockchain Architect

Elphyrecoin (ELPH) a Private, Untraceable, ASIC-Resistant CryptoCurrency Based on CryptoNote

Transcription:

Background Will Martino (me) Focus mostly on consensus + formal verification At JPM: Juno Lead SEC: Founding Tech Lead for the Distributed Ledger Technology Working Group Kadena Founded in 2016 by the former Lead Engineers for JP Morgan Blockchain group Announcing our public blockchain project (Launch ETA Q4 18) 1

Kadena Stack Public Blockchain Enterprise Blockchain Consensus Mechanism Chainweb ScalableBFT Smart Contracts Development Tooling Pact Smart Contract Language Atom/Emacs Integration Unit Tests Local Dev Server Opt-In Hindley-Milner Type Interference Formal Verification 2

Chainweb Overview Chainweb Parallel-, egalitarian-chain PoW protocol Same energy, higher throughput, lower latency Key Features 1. Peer chains cross reference each other s previous Merkle roots 2. Trustless destructive cross-chain coin transfers through SPV at the smart contract level 3

Background Similar/Prior Art Blockrope/Betacoin Cross-referencing chains twisted together GHOST/Decor+ Including orphaned header s for increased security/lower confirmation times 4

Chainweb Trustless Cross- Chain Destructive Coin Transfers Two-Step Delete coins on Chain A. Specify: Delete Acct on Chain 1 & Amount Create Chain & Create Acct Create requires a Merkle proof of deletion Smart contract runs SPV, gets Amount and Acct from proof Consume Delete s Transaction ID 5

Cross-Chain Destructive Coin Transfers Create Chain Fork Point A Fork Point B Fork Point C Fork Point D CREATE Existing Header Reference CREATE DELETE SPV Path Delete Chain DELETE Block Height 0 1 2 3 Chain 1 (Create Chain) Chain 2 (Delete Chain) Alice: 0 Alice: 0 Alice: 0 Alice: 10 Alice: 10 Alice: 0 Alice: 0 Alice: 0 6

Chainweb Valid Peer Header Reference My parent and my peer reference refer to my grandparent Chain 1' Chain 1 Chain 2 My parent and my peer reference refer to my peer s grandparent Chain 1 Chain 2 Chain 2' 7

Traditional Blockchain 8

Two Chain Configuration 9

Three Chain Configuration 10

Chainweb Graph Theory Terms Vertex: node in the graph Edge: path in the graph Degree: number of edges a vertex has Order: number of vertices in a graph Diameter: the length of the longest, shortest path between vertices 11

Chainweb Braiding Parallel Chains Base Graph as Braid Pattern Every vertex is a chain Every edge dictates what peer s previous Merkle roots are required, in addition to their own previous root, when constructing a new header We use known solutions to the degree-diameter problem for our base graphs 12

Ten Chain Configuration 13

Twenty Chain Configurations 14

Chainweb Throughput All Known Degree-Diameter Solutions Work Assuming 10 tx per sec per chain Range from 10 to 10,000,000,000 chains We aim to launch between 1k-10k tx per sec Congestion Free Crypto Kitties only clogs a subset of chains 15

Past and Future Merkle Cones 16

Chainweb Network Advancement Merkle Cones What a reorg impacts Dictate the limit of how far ahead/behind chains can get Hashrate naturally pools to the lagging chain Merkle Mass (" # ) Merkle cones have mass, buries a block in cryptographic assurance Increases exponentially from 1 to order 17

Chainweb Security Hypothesis Graph degree (d) 3 diameter (Δ) 2 order (Ω) 10 degree (d) 3 diameter (Δ) 3 order (Ω) 20 degree (d) 4 diameter (Δ) 7 order (Ω) 1320 Full Braid Attack q=0.2 z=δ 1.743 10-6 q=0.3 z=δ 0.00248 q=0.2 z=δ 1.11 10-16 q=0.3 z=δ 3.7 10-8 q=0.2 z=δ 9.992 10-15 q=0.3 z=δ 4.519 10-14 Once a block s future Merkle cone is formed, a transaction is confirmed Calculations Work in progress & looking for collaborators: Attacking the full braid Closed Form Merkle Cone Attack Monte Carlo Simulation 18

Chainweb Considerations Configurable Confirmation Latency Block Time * Base Graph Diameter Bandwidth Heavy: Whole Chainweb Block Stream Light: Single Chain Block Stream Light: Chainweb Network Headers Stream Assurance is captured in the header stream 19

Chainweb Considerations Subset Replication and Mining Possible to mine a subset of the network The Role of Large Mining Pools Hashrate load balancers Header stream network providers Layer consensus providers 20

Chainweb Considerations Cross-Chain Account to Account Transfers Take the same amount of time (diameter) as a same-chain transfer Well formed Delete is enough, Create at your leisure Load Balancing Smart Contracts Cross-chain transfer tools work for contract assets as well 21

Thank You! Will Martino will@kadena.io http://kadena.io 22