Page Total

Similar documents
ENEE 457: E-Cash and Bitcoin

CS 251: Bitcoin and Crypto Currencies Fall 2015

INSE 6110 Midterm LAST NAME FIRST NAME. Fall 2016 Duration: 80 minutes ID NUMBER. QUESTION Total GRADE. Notes:

Lecture 10. A2 - will post tonight - due in two weeks

CS 251: Bitcoin and Cryptocurrencies Fall 2016

Bitcoin, Security for Cloud & Big Data

Who wants to be a millionaire? A class in creating your own cryptocurrency

Radix - Public Node Incentives

Multiparty Computation (MPC) protocols

The power of Blockchain: Smart Contracts. Foteini Baldimtsi

ETHEREUM META. Whitepaper 2018/2019. A decentralized token with privacy features. Ethereum Meta team

Computer Security. 14. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2019

Class A Calendar Raffle Gaming Licence Application Guide

Smalltalk 3/30/15. The Mathematics of Bitcoin Brian Heinold

Concurrency and Privacy with Payment Channel Networks

University of Duisburg-Essen Bismarckstr Duisburg Germany HOW BITCOIN WORKS. Matthäus Wander. June 29, 2011

Bitcoin and Blockchain

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric

An Analysis of Atomic Swaps on and between Ethereum Blockchains Research Project I

How to buy LIVE Token with Ethereum and Bitcoin step by step

Problem: Equivocation!

Using Chains for what They re Good For

Biomedical and Healthcare Applications for Blockchain. Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs

BLOCKCHAIN Blockchains and Transactions Part II A Deeper Dive

How to use Fusioncoin Wallet

Privacy-Enabled NFTs: User-Mintable, Non-Fungible Tokens With Private Off-Chain Data

Chapter 13. Digital Cash. Information Security/System Security p. 570/626

Token Sale. Participation guide

The Blockchain. Josh Vorick

Gnosis Safe Documentation. Gnosis

How to use Fusioncoin Wallet

Blockchains & Cryptocurrencies

Biomedical Security. Some Security News 10/5/2018. Erwin M. Bakker

BITCOIN PROTOCOL & CONSENSUS: A HIGH LEVEL OVERVIEW

Upgrading Bitcoin: Segregated Witness. Dr. Johnson Lau Bitcoin Core Contributor Co-author of Segregated Witness BIPs March-2016

Once the required number of encrypted random numbers have been commited,

Bitcoin, a decentralized and trustless protocol

Security Analysis of Bitcoin. Dibyojyoti Mukherjee Jaswant Katragadda Yashwant Gazula

Class C One Day Regular Series Gaming Licence Application Guide

DTX Token. Starter guide

Class D Calendar Raffle Gaming Licence Application Guide

DIGITAL ASSET RESEARCH

EECS 498 Introduction to Distributed Systems

GENESIS VISION NETWORK

DIGITAL TICKETING GUIDE

POLAR INTERNET SHARING, A CONNECTION OF CONSTELLATIONS

TWEX Platform User Guide

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University

a new cryptocurrency STK GLOBAL PAYMENTS USER GUIDE USER GUIDE: PARTICIPATING IN IN STK STK TOKEN TOKEN SALE USING SALE MYETHERWALLET

BLOCKCHAIN CADEC Pär Wenåker & Peter Larsson

BUYING ELECTRONEUM VIA KRAKEN

Token sale is live now

Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. Yashar Dehkan Asl

FAQ. Use the links below to find detailed tutorials on using MSA.

Active Planning Committee John Lindsay, Patent Attorney Tony Schuman, Investment Advisor Todd Russell, Gov t Contract Opportunities

Alg. 1 Unit 3 Notes Unit 3 Day 1: Represent Relations and Functions (O.C. 1-5)

What is Bitcoin? Consensus technology has the power to do for economics what the internet did for information - Dan Larimer

More crypto and security

Vladimir Groshev. COO, Project Coordinator.

Discreet Log Contracts

Technical Analysis of Established Blockchain Systems

The Technology behind Smart Contracts

Mental Math. Grade 9 Mathematics (10F) General Questions. 2. What is the volume of a pool that measures 7 m by 3 m by 2 m? 42 m 3

Ethereum. Campbell R. Harvey* Duke University and NBER. Ashwin Ramachandran Duke University. Brent Xu ConsenSys. Innovation and Cryptoventures

squid transit purse guidance notes

Set: Hub-and-Spoke Cryptographic Payment Channels

P2P BitCoin: Technical details

Ergo platform overview

OW TO PARTICIPAT HOW TO PARTICIPATE

Sharding. Making blockchains scalable, decentralized and secure.

TABLE OF CONTENTS 1.0 TOKEN SALE SUMMARY INTRODUCTION HOW TO BUY LION HOW TO BUY LION WITH METAMASK

The promise and peril of smart contracts

CS 161 Computer Security

TOKEN SWAP FAQ. For action before July 23, 2018.

GRADUBIQUE: AN ACADEMIC TRANSCRIPT DATABASE USING BLOCKCHAIN ARCHITECTURE

Discrete Mathematics and Probability Theory Fall 2013 Midterm #2

Hi this is Anna Jarrett, I am here to present today s Digital Cookie online training.

Your Guide to Mobile Ticketing

Page

A New Internet for Decentralized Apps

PUP (People U Pay) FREQUENTLY ASKED QUESTIONS

Ethereum Consortium Blockchain in Azure Marketplace Christine Avanessians Senior Program Manager

Lecture 9. Anonymity in Cryptocurrencies

Blockchain Certification Protocol (BCP)

Algebra II 1 st Trimester Learning Targets

Consensus & Blockchain

Your Guide to Mobile Ticketing

SmartPool: practical decentralized pool mining. Loi Luu, Yaron Velner, Jason Teutsch, and Prateek Saxena August 18, 2017

TOKENSALE PARTICIPATION GUIDE

Popmoney FAQs. To send money, log in to your PATROL Online Banking account and click Transfers, then click on Popmoney.

Biomedical Security. Cipher Block Chaining and Applications

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

Blockchain. CS 240: Computing Systems and Concurrency Lecture 20. Marco Canini

Bitcoin. CS6450: Distributed Systems Lecture 20 Ryan Stutsman

Popmoney FAQs. What is Popmoney?

Reliability, distributed consensus and blockchain COSC412

Newcomer Finances Toolkit. Fraud. Worksheets

Smart Contract Vulnerabilities The most interesting transactions on the Ethereum network

P2P Instructions. 4. Select Person to Person

I. How to Purchase Cryptfunder CFND Tokens

Transcription:

Page 2 3 4 5 6 7 8 9 Total Mark FIRST NAME LAST (FAMILY) NAME STUDENT NUMBER INSE 6630 Fall 2017 Duration: 3 hours One single-sided letter-sized reference sheet of paper is allowed Write answers in the provided space Clearly mark answers that continue on the back of the following page INSE 6630 - Fall 2017 Page! 1 of 9!

Each of the following applications are proposed for implementation in Solidity on Ethereum. For each, say whether the functionality that the designer wants is possible to achieve with Ethereum or not and state a (short) reason. (2 marks) Eve wants to develop a decentralized application that has Alice s public key and pays a bounty to the first user that submits Alice s private key (encouraging someone to hack Alice). The app knows a submitted private key value is correct by computing the public key from it and matching it to Alice s. (2 marks) Alice wants a decentralized game that can only be played by users who have one of five Ethereum addresses specified in the contract. INSE 6630 - Fall 2017 Page! 2 of 9!

(2 marks) Alice wants a decentralized voting application that collects votes. When users submit votes, she wants to pay the gas costs from her own account and not have the users pay. (2 marks) Alice wants a gift application that holds 1 Ether and automatically transfers this money to Bob s Ethereum address on New Year s Day. (2 marks) Alice wants an application that generates a log entry each time a payment is sent to the address of this application. INSE 6630 - Fall 2017 Page! 3 of 9!

(2 marks) Alice wants a decentralized lottery application that will let users buy tickets: the tickets are issued with sequential ticket numbers. Alice can then call a function to stop selling tickets, choose a random number from the set of issued tickets, and payout the winning ticket with Ether that is in the contract. (2 marks) Alice s application tips the miner who mines the block constructing it. (2 marks) Alice s contract can return all Ether it holds to Alice s personal address but she can only receive it if she calls the function after the end of the fiscal year (March 1, 2018). INSE 6630 - Fall 2017 Page! 4 of 9!

This question is a midterm Re- hash (4 marks) A recent bitcoin transaction from Alice to Bob contains two inputs: In1=1.55 BTC and In2=0.84. It has three outputs: Out1=1.00 and Out2=1.00 and Out3=0.38.How does the UTXO pool change, with respect to the two inputs and three outputs, from before this transaction is broadcast to after it is confirmed in a block? (2 mark) Does the fact that Alice left the miner a tip also change the UTXO pool? INSE 6630 - Fall 2017 Page! 5 of 9!

(4 marks) Alice is mining Bitcoin. She frequently finds a winning block before she hears of any other winning block, and yet the network tends to build on the other block instead of her s. Assume her block is valid. Provide two realistic reasons why this might be the case. Reason 1: Reason 2: (2 marks) Do all miners in Bitcoin have the same mempool? Circle one: Yes No INSE 6630 - Fall 2017 Page! 6 of 9!

(3 marks) Alice lends Bob 1 Ether. Bob is supposed to repay the loan in 1 year with interest. What is the present value of this loan? Give one reason why this loan could become worth more than 1 Ether is worth today, and two reasons why it might become worth less than 1 Ether today. Reason the loan is worth more than 1 Ether: Reason the loan is worth less than 1 Ether: Reason the loan is worth less than 1 Ether: (3 marks) Carol starts an Ethereum exchange service with $1000 and 2 Ether. Bob deposits 2 Ether, Alice deposits $400, and Bob sells 1 Ether to Alice for $400. Mallory hacks into the exchange and steals 1 Ether from its hot wallet. (a) Draw the balance sheet of the exchange service. (b) Is it solvent? INSE 6630 - Fall 2017 Page! 7 of 9!

Alice has received 5 BTC at a donation address she has published on the web. She wishes to donate some of it to Bob s donation address but does not want Bob to know it was from her. (2 marks) Alice creates two new accounts: A1 and A2. She sends 4 BTC to account A1 and 1 BTC to account A2. She then sends 1 BTC from A2 to Bob. Can Bob determine this payment is from Alice? (2 marks) Alice finds her friends Carol and David. The three of them create a transaction to which they each input 1 BTC. They output 1 BTC to three new addresses, including an address owned by Alice called A3. Alice then pays Bob from A3. Can Bob determine this payment is from Alice? INSE 6630 - Fall 2017 Page! 8 of 9!

A smart contract is constructed with an instance variable of: uint x = 0; It contains the following two functions: function test1(address addr){ addr.transfer(10); x=1; } function test2(address addr){ addr.send(10); x=2; } (1 mark) What does test1 do? (1 mark) What is contained in the variable x after calling test1 on a contract address where the fallback function consumes too much gas for transfer()? x = (1 mark) What is contained in the variable x after calling test2 on a contract address where the fallback function consumes too much gas for send()? x = INSE 6630 - Fall 2017 Page! 9 of 9!