ECC: Peer-to-Peer Electronic Cash with Trustless Network Services

Similar documents
Bitcoin, a decentralized and trustless protocol

I. Introduction. II. Security, Coinage and Attacks

TOPPERCASH TOPPERCASH WHITEPAPER REFORM THE BEST OF BLOCKCHAIN

Proof of Stake Made Simple with Casper

ENEE 457: E-Cash and Bitcoin

An analysis of the applicability of blockchain to secure IP addresses allocation, delegation and bindings draft-paillisse-sidrops-blockchain-01

Ensimag - 4MMSR Network Security Student Seminar. Bitcoin: A peer-to-peer Electronic Cash System Satoshi Nakamoto

Radix - Public Node Incentives

Bitcoin (Part I) Ken Calvert Keeping Current Seminar 22 January Keeping Current 1

Darkcoin: Peer to Peer Crypto Currency with Anonymous Blockchain Transactions and an Improved Proof of Work System

Whitepaper Rcoin Global

What is Bitcoin? How Bitcoin Works. Outline. Outline. Bitcoin. Problems with Centralization

University of Duisburg-Essen Bismarckstr Duisburg Germany HOW BITCOIN WORKS. Matthäus Wander. June 29, 2011

BLOCKCHAIN The foundation behind Bitcoin

ILCOIN White Paper. In ILCOIN We Trust ILCOIN

BITCOIN PROTOCOL & CONSENSUS: A HIGH LEVEL OVERVIEW

A HASH-CASH BASED MUSIC STREAMING PAYMENT SYSTEM. Timothy Chen San Jose State University Fall 2014

Proof-of-Stake Protocol v3.0

Biomedical Security. Some Security News 10/5/2018. Erwin M. Bakker

BYZANTINE CONSENSUS THROUGH BITCOIN S PROOF- OF-WORK

Smalltalk 3/30/15. The Mathematics of Bitcoin Brian Heinold

Transactions as Proof-of-Stake! by Daniel Larimer!

Who wants to be a millionaire? A class in creating your own cryptocurrency

New Cryptocurrency Protocol without Proof of Work

ICS 421 & ICS 690. Bitcoin & Blockchain. Assoc. Prof. Lipyeow Lim Information & Computer Sciences Department University of Hawai`i at Mānoa

Key concepts of blockchain

International Journal of Computer Engineering and Applications, Volume XIII, Issue II, Feb. 19, ISSN

Consensus & Blockchain

Biomedical Security. Cipher Block Chaining and Applications

Neel Gupte. Index Terms Bitcoin, Cryptocurreny, Block Chain, Hashing, Proof-of-Work, Double-spending, Momentum Method, Proof of Stake.

Introduce A mobile and decentral Proof-of-Transaction crypto coin

Problem: Equivocation!

Blockchain Certification Protocol (BCP)

Introduction to Bitcoin I

Blockchains & Cryptocurrencies

Jan Møller Co-founder, CTO Chainalysis

VEE: Blockchain Database and Apps Platform

Security Analysis of Bitcoin. Dibyojyoti Mukherjee Jaswant Katragadda Yashwant Gazula

A Lightweight Blockchain Consensus Protocol

Blockchain. CS 240: Computing Systems and Concurrency Lecture 20. Marco Canini

Chapter 13. Digital Cash. Information Security/System Security p. 570/626

Technical White Paper of. MOAC Mother of All Chains. June 8 th, 2017

EVALUATION OF PROOF OF WORK (POW) BLOCKCHAINS SECURITY NETWORK ON SELFISH MINING

Distributed Ledger Technology & Fintech Applications. Hart Montgomery, NFIC 2017

Radix - Tempo. Dan Hughes

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University

Computer Security. 14. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2019

Bitcoin, Security for Cloud & Big Data

Wormhole: A Smart Contract Solution for Bitcoin Cash

Blockchain (a.k.a. the slowest, most fascinating database you ll ever see)

Bitcoin: A Peer-to-Peer Electronic Cash System

BitBill: Scalable, Robust, Verifiable Peer-to-Peer Billing for Cloud Computing

DAVID ANDREWS, FOUNDER RYATTA BLOCKCHAIN FOUNDATIONS

Introduction to Blockchain

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric

BLOCKCHAIN Blockchains and Transactions Part II A Deeper Dive

As a 3rd generation currency, not only are transactions secured, private and fast, you actually get paid for holding DigitalPrice coins.

The security and insecurity of blockchains and smart contracts

CCP: Conflicts Check Protocol for Bitcoin Block Security 1

Bitcoin. Arni Par ov. December 17, 2013

P2P BitCoin: Technical details

BlockFin A Fork-Tolerant, Leaderless Consensus Protocol April

Ergo platform. Dmitry Meshkov

Blockchain without Bitcoin. Muralidhar Gopinath October 19, 2017 University at Albany

Privacy based Public Key Infrastructure (PKI) using Smart Contract in Blockchain Technology

Security: Focus of Control

Bitcoin: A Peer-to-Peer Electronic Cash System

A Gentle Introduction To Bitcoin Mining

DEV. Deviant Coin, Innovative Anonymity. A PoS/Masternode cr yptocurrency developed with POS proof of stake.

Marker addresses: Adding identification information to Bitcoin transactions to leverage existing trust relationships

Realization and Addressing Analysis In Blockchain Bitcoin

DISTRIBUTED RESOURCE SHARING USING THE BLOCKCHAIN TECHNOLOGY ETHEREUM. A Project. California State University, Sacramento

Formal Expression of BBc-1 Mechanism and Its Security Analysis

Radix - Tempo. Dan Hughes Abstract

Biomedical and Healthcare Applications for Blockchain. Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs

Bitcoin and Blockchain

Reliability, distributed consensus and blockchain COSC412

Introduction to Cryptoeconomics

Bitcoin. CS6450: Distributed Systems Lecture 20 Ryan Stutsman

Blockchain Bitcoin & Ethereum

Burstcoin Technical information about mining and block forging

Brown University. Yana Hrytsenko. Final Project: Blockchain for PKI: Using Blockchain data structure for Public Key. Infrastructure.

A Decentralized Trusted Timestamping Based on Blockchains

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University

Let's build a blockchain!

Set: Hub-and-Spoke Cryptographic Payment Channels

Bitcoin Candy A Peer-to-Peer Electronic Cash System

Introducing Cloud Currencies

Matt Howard and Ajay Patel CIS 556: Cryptography University of Pennsylvania Fall DriveCoin: A Proof of Space Cryptocurrency

Smart Transactions: An In-To-Out Manageable Transaction System

Security Analysis of the Lightning Network

What is Bitcoin? Consensus technology has the power to do for economics what the internet did for information - Dan Larimer

Introduc)on to Bitcoin

The Technology behind Smart Contracts

EECS 498 Introduction to Distributed Systems

SpaceMint Overcoming Bitcoin s waste of energy

INTRODUCTION WHY DAPS?

Analyzing Bitcoin Security. Philippe Camacho

Stealthsend Whitepaper Brief

XYO Network: Network Implementation

Transcription:

ECC: Peer-to-Peer Electronic Cash with Trustless Network Services Greg Griffith October 2017 (griffith@cryptounited.io) https://www.ecc.network ECC: Peer-to-Peer Electronic Cash with Trustless Network Services 1

Abstract Common network services are typically managed by a single entity with which a user must request information from using the client-server model. Single entity management can lead to heavy censorship if the entity in charge decides that it wants to restrict the flow of information to the users. We propose a solution to the issue of censorship using a peer-to-peer network in which information is publicly declared and verified by everyone on the network. Under this design, services and information are provided based on a consensus of valid events witnessed by the entire peer-to-peer node network and are only altered or added through a network-wide consensus. The state of a networks consensus is recorded in a hash-based proof-of-work or coin age based proof-of-stake unique to that service. Each service s sequence of events is validated through a different consensus network. A given node is not required to connect to all services available and will accept the longest chain when joining a service as proof of what happened while said node was disconnected from said service. Any given node is required, at a minimum, to connect to the electronic cash transaction network that operates at the core of all other service networks as their monetary exchange network. Introduction Since the creation of Bitcoin in 2009, it has been realized that trustless global networks can do more than replace current electronic payment systems. A peer-topeer global network providing information and services designed around a trustless electronic cash protocol derived from Satoshi Nakamoto s Bitcoin utilizing proof-ofstake derived from Sunny King and Scott Nadal s Peercoin can be used as the foundation on which to operate trustless common network services. Using multiple consensus mechanisms built around a single peer-to-peer electronic cash system, we can expand transaction and network functionality to create a mesh network with multiple network services that are capable of replacing their centralized counterparts. The project created to complete this task has been given the name ECC. ECC: Peer-to-Peer Electronic Cash with Trustless Network Services 2

Peer-to-Peer Electronic Cash Before creating trustless network services, we must first define the electronic cash protocol at the core of the network that is to be used as a monetary system by every service. Our basis is the peer-to-peer electronic cash protocol Bitcoin as written by Satoshi Nakamoto [1] with the addition of the concept of proof-of-stake as written by Sunny Kind and Scott Nadal [2]. We have, however, included a few minor changes to the proof-of-stake system and proof-of-work hashing algorithm used. The proof-ofstake system now multiplies the coin age with the value of the input of the coinstake transaction to calculate a reduction value for the coinstake transactions proof-of-stake hash. This reduction is used to check if the hash meets a difficulty constraint similar to the difficulty constraint with proof-of-work mining. Only if the hash is below the target difficulty is the block considered valid. The proof-of-work hashing algorithm has been changed from SHA-256 to Scrypt. Network Services Having defined the core transaction network that will be used within the ECC project, we can begin to address how we can use additional consensus mechanisms in combination with the core transaction network to provide trustless common network services. All services would require their own consensus mechanism and should operate independently of one another. For our purposes, we will use a hash-based proof-of-work or coin age based proof-of-stake chain as consensus mechanism for each network service. Separate chains will allow for easier data pruning and enable a given node to only keep track data that it needs. Any node trying to perform an action on a chain that is not the transaction chain, where payment to a peer is needed to complete said action, should include a reference hash to a transaction made on the payment transaction network. ECC: Peer-to-Peer Electronic Cash with Trustless Network Services 3

Figure 1: Visual example of multiple service networks working with payment network Depending on the number of services a user chooses to subscribe to, the amount of storage space on disk can vary a significant amount. It is important to note that for the transaction chain, the added fields in the transaction will add no more than 256 bits to a transaction size that references a service action. Not all transactions will reference a service action so the average size increase in a transaction on the transaction network will be much less than this. Expanding Transaction Functionality Given that our system uses electronic transactions without relying on trust, we can prove that any additional information provided with a transaction must also have originated from the same owner as the signature used to sign the transaction. A given node can use this property to broadcast a transaction containing service data on a service network while simultaneously proving the authenticity and origin of the transaction. Transactions in service networks will use the same hashing function as the transactions on the payment network. New fields in non-payment network transactions include: 1. Service Identifier 2. Operation Code 3. Instruction Data 4. Payment Reference Hash ECC: Peer-to-Peer Electronic Cash with Trustless Network Services 4

Figure 2: Service network transaction New fields in a payment network transaction include: 5. Service Reference Hash Figure 3: Payment network transaction ECC: Peer-to-Peer Electronic Cash with Trustless Network Services 5

1. Service Identifier The service identifier is a 2-byte unsigned field that holds the id number of the service being used. This can be expanded to a larger number of bits if more than 65,536 id numbers are needed by forking to a larger number of bytes field. 2. Operation Code The operation code is a 2-byte unsigned field that holds the operation code of the instruction being performed. This can be expanded to a larger number of bits if more than 65,536 operation codes are needed by forking to a larger number of bytes field. 3. Instruction Data The instruction data is an optional variable length field that contains additional data that the operation code might need. This data should be in raw byte form. The more information that is added to this field, the more expensive the operation becomes. It is best to not add more than needed. 4. Payment Reference Hash The payment reference hash is an optional field that is used to reference a payment on the transaction network that pays for the action specified in this transaction. This hash is a 256-bit unsigned integer that should be the exact value of the transaction id in the service network that it is referencing. 5. Service Reference Hash The service reference hash is an optional field that is used to reference a service action on a network that is not the transaction network. This signifies that this transaction should pay for that action specified in the referenced service action. This hash is a 256-bit unsigned integer that should be the exact value of the transaction id in the payment transaction network that is paying for this operation. ECC: Peer-to-Peer Electronic Cash with Trustless Network Services 6

Cross Chain Agreements and Contracts We cannot ensure that agreements across the different network chains are honored by the node on the receiving end of the payment if the service involves an action that is not stored on a chain. All payments for services should only be redeemable once the state change of the service being utilized has changed to include the agreed upon operation. The payment for a service must include the service transaction s id in the service reference hash field and the service transaction must include payment transaction s id in the payment reference hash field. Figure 4: Payment network (top) transacting with service network (bottom) Payments for a service should be redeemable for a set time predetermined by the sender before expiring. Once expired, the transaction can be abandoned by the sender and the containing funds returned to their original address. This expiration on payment validity can be embedded in any transactions script code to prevent redemption after the valid period of time has come and gone. ECC: Peer-to-Peer Electronic Cash with Trustless Network Services 7

Conclusion We have proposed a system for common network services without relying on trust. We started with a core peer-to-peer electronic cash network defined by Satoshi Nakamoto, implemented a customized proof-of-stake originally defined by Sunny King and Scott Nadal, and added additional chains to be used as consensus mechanisms for common network services. Cross chain service contracts can be completed or canceled without the need for a 3rd party or centralized regulator. Nodes can subscribe to the services they want to use to prevent storing extra data. Nodes can leave and join any service network at will, accepting the longest chain for a given service as proof of what happened while they were gone. All states on the network can be enforced with their chain as a consensus mechanism. References [1] Nakamoto, S. (2008, October 31). Bitcoin: A Peer-to-Peer Electronic Cash System. Retrieved from https://bitcoin.org/bitcoin.pdf [2] King, S. & Nadal. S (2012, August 19). PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake. Retrieved from https://peercoin.net/assets/paper/peercoin-paper.pdf ECC: Peer-to-Peer Electronic Cash with Trustless Network Services 8