Zero-Knowledge proof of knowledge transfer. Perm summer school on blockchain 2018

Similar documents
SpaceMint Overcoming Bitcoin s waste of energy

Chapter 13. Digital Cash. Information Security/System Security p. 570/626

Computer Security. 14. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2019

Smalltalk 3/30/15. The Mathematics of Bitcoin Brian Heinold

ENEE 457: E-Cash and Bitcoin

ICT 6541 Applied Cryptography Lecture 8 Entity Authentication/Identification

CS 161 Computer Security

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University

How Bitcoin achieves Decentralization. How Bitcoin achieves Decentralization

Cryptography and Cryptocurrencies. Intro to Cryptography and Cryptocurrencies

Bitcoin, Security for Cloud & Big Data

Public Chain for Digital Asset Escrow

The power of Blockchain: Smart Contracts. Foteini Baldimtsi

Crypto tricks: Proof of work, Hash chaining

Privacy Enhancing Technologies CSE 701 Fall 2017

Ensimag - 4MMSR Network Security Student Seminar. Bitcoin: A peer-to-peer Electronic Cash System Satoshi Nakamoto

Bitcoin. CS6450: Distributed Systems Lecture 20 Ryan Stutsman

As a 3rd generation currency, not only are transactions secured, private and fast, you actually get paid for holding DigitalPrice coins.

Lecture 10, Zero Knowledge Proofs, Secure Computation

POLAR INTERNET SHARING, A CONNECTION OF CONSTELLATIONS

BITCOIN PROTOCOL & CONSENSUS: A HIGH LEVEL OVERVIEW

Incentivized Delivery Network of IoT Software Updates Based on Proofs-of-Distribution

Using Chains for what They re Good For

EECS 498 Introduction to Distributed Systems

Problem: Equivocation!

Security Analysis of Bitcoin. Dibyojyoti Mukherjee Jaswant Katragadda Yashwant Gazula

Biomedical and Healthcare Applications for Blockchain. Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs

Blockchains & Cryptocurrencies

P2P BitCoin: Technical details

Bitcoin, a decentralized and trustless protocol

Bitcoin and Blockchain

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University

Let's build a blockchain!

CS 251: Bitcoin and Crypto Currencies Fall 2015

Digital Cash Systems

Transactions as Proof-of-Stake! by Daniel Larimer!

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric

Blockchain Certification Protocol (BCP)

Lecture 3. Introduction to Cryptocurrencies

Key Security Issues for implementation of Digital Currency, including ITU-T SG17 activities

Security (and finale) Dan Ports, CSEP 552

Upgrading Bitcoin: Segregated Witness. Dr. Johnson Lau Bitcoin Core Contributor Co-author of Segregated Witness BIPs March-2016

REM: Resource Efficient Mining for Blockchains

Micropayments, Now! Probabilistic Micropayments in Bitcoin

E-cash. Cryptography. Professor: Marius Zimand. e-cash. Benefits of cash: anonymous. difficult to copy. divisible (you can get change)

Previous Name: D3. Fourth Estate. A secure, decentralized news data storing and sharing solution for journalists

APPLICATIONS AND PROTOCOLS. Mihir Bellare UCSD 1

An efficient implementation of Monero subaddresses. 1 Introduction. Sarang Noether and Brandon Goodell Monero Research Lab October 3, 2017

Executive Summary. (The Abridged Version of The White Paper) BLOCKCHAIN OF THINGS, INC. A Delaware Corporation

Bitcoin (Part I) Ken Calvert Keeping Current Seminar 22 January Keeping Current 1

Gregory Magarshak November 20, Eliminating Double-Spending without Global Consensus Community Coin Technology Whitepaper ABSTRACT

Set: Hub-and-Spoke Cryptographic Payment Channels

OpenbankIT: a banking platform for e- money management based on blockchain technology

Blockchain. CS 240: Computing Systems and Concurrency Lecture 20. Marco Canini

STELLITE A MODERN, SECURE AND DECENTRALIZED CRYPTOCURRENCY. JAN 2018 WHITE PAPER STELLITE WHITE PAPER 1

Enigma v1.0. A private, secure and untraceable transaction system for CloakCoin. 18th February 2017

Introduction to Bitcoin I

Concurrency and Privacy with Payment Channel Networks

NKN is a new kind of network connectivity protocol & ecosystem powered by blockchain for an open, decentralized, and shared Internet.

CPSC 467b: Cryptography and Computer Security

Radix - Tempo. Dan Hughes Abstract

TOPPERCASH TOPPERCASH WHITEPAPER REFORM THE BEST OF BLOCKCHAIN

Radix - Tempo. Dan Hughes

Zero Knowledge Protocol

ח'/סיון/תשע "א. RSA: getting ready. Public Key Cryptography. Public key cryptography. Public key encryption algorithms

Blockchain, Cryptocurrency, Smart Contracts and Initial Coin Offerings: A Technical Perspective

An Introduction to How PGP Works

Cryptographic proof of custody for incentivized file-sharing

Brown University. Yana Hrytsenko. Final Project: Blockchain for PKI: Using Blockchain data structure for Public Key. Infrastructure.

Lecture 10. A2 - will post tonight - due in two weeks

Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. Yashar Dehkan Asl

Kurose & Ross, Chapters (5 th ed.)

Privacy-Enabled NFTs: User-Mintable, Non-Fungible Tokens With Private Off-Chain Data

The Blockchain. Josh Vorick

COIN. Secure and Anonymous Decentralized Bitcoin Mixing PARTY

University of Duisburg-Essen Bismarckstr Duisburg Germany HOW BITCOIN WORKS. Matthäus Wander. June 29, 2011

Yada. A blockchain-based social graph

UNIT - IV Cryptographic Hash Function 31.1

Whitepaper Rcoin Global

CS 161 Computer Security

Proof of Stake Made Simple with Casper

Algorand: Scaling Byzantine Agreements for Cryptocurrencies

1 A Tale of Two Lovers

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L

Homework 2 CS161 Computer Security, Spring 2008 Assigned 2/13/08 Due 2/25/08

CSE 5852, Modern Cryptography: Foundations Fall Lecture 26. pk = (p,g,g x ) y. (p,g,g x ) xr + y Check g xr +y =(g x ) r.

Discreet Log Contracts

Applied cryptography

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

Public-key Cryptography: Theory and Practice

CISC859: Topics in Advanced Networks & Distributed Computing: Network & Distributed System Security. A Brief Overview of Security & Privacy Issues

Catena: Preventing Lies with

Formal Expression of BBc-1 Mechanism and Its Security Analysis

Radix - Public Node Incentives

SOME OF THE PROBLEMS IN BLOCKCHAIN TODAY

Introduction to Blockchain

Introduction to Cryptography in Blockchain Technology. December 23, 2018

Biomedical Security. Cipher Block Chaining and Applications

Security: Focus of Control

NIX Platform whitepaper v1.0

Transcription:

Zero-Knowledge proof of knowledge transfer

Teleport Teleport was born in 2016 from the idea to bring the power of peer-to-peer traffic distribution technology like BitTorrent to the solution of traffic bottleneck problem that each video streaming service and each of their customers familiar with. Teleport in 2018 is the running business with the top-notch online video streaming platforms as the paying customers, and with the solution that is capable of building p2p network in real-time supporting "heavy" video traffic delivery to millions of simultaneous viewers with the unprecedented quality. Teleport by 2023 is the Filecoin of CDN, the decentralized analogue of AWS or Akamai. Decentralized CDN software runs on top of millions of devices such as PC, smartphone, internet router, smart TV, and many more, letting their owners lease the internet bandwidth that is unused by the device owner and earn cryptocurrency for that.

Traffic delivery set-up

Traffic delivery set-up

Traffic delivery set-up

Traffic delivery set-up

Traffic delivery set-up

Traffic delivery set-up

Double spending of coin? Double spending of file?

Double spending of coin Double spending of file!

Zero-Knowledge I know the secret.

Zero-Knowledge I know the secret. Prove it!

Zero-Knowledge I know the secret. Prove it! Zub daiyu!* * the promise of terrifying body self-injury, eternal physical and moral suffering in case of malicious behaviour

Zero-Knowledge Zero-knowledge proof is the statement that shall prove that Prover knows something without disclosure anything about the knowledge, except the fact that Prover actually know it.

Zero-Knowledge Zero-knowledge proof is the statement that shall prove that Prover knows something without disclosure anything about the knowledge, except the fact that Prover actually know it. Key requirements: Completeness is the assurance that if the Prover truly know something, then the Verifier must become sure of that fact from the proof.

Zero-Knowledge Zero-knowledge proof is the statement that shall prove that Prover knows something without disclosure anything about the knowledge, except the fact that Prover actually know it. Key requirements: Completeness is the assurance that if the Prover truly know something, then the Verifier must become sure of that fact from the proof. Soundness is the assurance that the knowledge corresponds to certain proof is unable to forge

Zero-Knowledge Zero-knowledge proof is the statement that shall prove that Prover knows something without disclosure anything about the knowledge, except the fact that Prover actually know it. Key requirements: Completeness is the assurance that if the Prover truly know something, then the Verifier must become sure of that fact from the proof. Soundness is the assurance that the knowledge corresponds to certain proof is unable to forge or at least it is deadly hard to forge

Zero-Knowledge Cryptographic signature verification Alice possesses private key PrK Alice wants the whole world to know that she s agree with the certain message M Alice process her message M through function S (M, H(M), PrK)

Zero-Knowledge Cryptographic signature verification Alice possesses private key PrK Alice wants the whole world to know that she s agree with the certain message M Alice process her message M through function S (M, H(M), PrK) Anyone can learn Alice s public key PbK Anyone can run verification function V (S, H(M), PbK)

Zero-Knowledge Cryptographic signature verification Alice possesses private key PrK Alice wants the whole world to know that she agrees with the certain message M Alice process her message M through function S (M, H(M), PrK) Anyone can learn Alice s public key PbK Anyone can run verification function V (S, H(M), PbK) Function releases two statements: 1 the message with the H(M) has been signed by private key which is the pair to PbK 0 the message with the H(M) has not been signed with the private key which is the pair to PbK

ZKP in my heart @blockchain

Proof of knowledge I know M! Proof: F(M) M Try it with s Proof: F(M, s) Verify: V(F, s) -> 1

Proof of knowledge I know M! Proof: F(M) M* Try it with s Proof: F*(M*, s) Verify: V(F*, s) -> 0

Threats of Decentralized CDN Sybil attack Assume the networks stores multiple files. How organize files search in such network? IPFS hash of file is the search index Each Alice shall produce H(M) Each Bob will search files with H(M) Malicious Alice may sniff all H(M) and pretend she s distributing everything. Many such Alices paralyze the network

Threats of Decentralized CDN Mitigating Sybil attack Bob shall not search by true hash of file, using keys instead. Alice shall prove that she knows the true file using ZKP

Threats of Decentralized CDN We all know M!

Threats of Decentralized CDN Proof: H(M, s) Verify: V(H, s) -> 1

Proof of knowledge in Teleport Serverless conditional access system K(M,B) = F (H(M), PbB) 1. Alice produce CryptoHave = F (K(M,B), PbB) = F (H(M), PbB, PbB) = CH 2. Bob may use all his K(M,B) to produce all possible CryptoHaves and compare it to Alice s. Thus Bob may be sure Alice may produce K of M (or at least knows K) 3. Bob produce CryptoMatch = F (CH, K, PbA) 4. Alice may use all her CH to produce all possible CM and compare it to Bob s. Thus Alice may be sure Bob knows K

Proof of knowledge transfer in Teleport Serverless conditional access system 5. Once Bob have downloaded the file he produces CryptoConfirm CryptoConfirm = F (CM, H(M))

Threats of Decentralized CDN M Honest Alice and Bob

Threats of Decentralized CDN M M Honest Alice and Bob

Threats of Decentralized CDN Did you get M? M Proof: F(M) M Honest Alice and Bob

Threats of Decentralized CDN M* Malicious Alice / Honest Bob

Threats of Decentralized CDN Hey! This is M* not M! M* M* Malicious Alice / Honest Bob

Threats of Decentralized CDN M Honest Alice / Malicious Bob

Threats of Decentralized CDN Hey! This is M* not M! M M Honest Alice / Malicious Bob

Proof of knowledge transfer in Teleport Financial solution The price of delivery 1 Gb varies from $0.1 to $0.005. Let s just break file into chunks of 10Mb. The honest Bob may just disconnect when discovers malicious behaviour. The profit of Alice from one such Bob would be just a fraction of US cent. The honest Alice may not continue file transfer if Bob hasn t signed the previous transaction. Then Bob would not download the complete file. Looks more or less like Lightning channels in Bitcoin

Traffic-to-coin channel

Traffic-to-coin channel

Traffic-to-coin channel

Traffic-to-coin channel?

Traffic-to-coin channel

Traffic-to-coin channel

Traffic-to-coin channel

Traffic-to-coin channel

Proof of knowledge transfer in Teleport Financial solution When Alice is dishonest, she will not get coins since Bob will not confirm this payment. In the worst case scenario, Alice will send all correct chunks except the last one and will have signed receipts to publish on blockchain to get coins. Bob will not have the last chunk that he can download elsewhere Bob s money is secure. When Bob is dishonest, Alice will not send the following chunks. In the worst case scenario, Alice will transfer one chunk for free. Alice may lose one revenue opportunity for one chunk

Psst Bob! Let s form a group and sign whatever we need to sign

Traffic delivery witness

Traffic delivery witness

Traffic delivery witness

I have a single file that is so unique

Proof of knowledge transfer in Teleport Cryptographical solution When network gets controversial information for Alice and Bob, they have to enter the special protocol of traffic delivery that must show who is lying. If Alice or Bob refuses to do so the network punishes them.

Proof of knowledge transfer in Teleport Cryptographical solution When the network gets controversial information from Alice and Bob, they have to engage in the special protocol of traffic delivery that must show who is lying. If Alice or Bob refuses to do so the network punishes them. 1. Start the protocol 2. Transfer the same file 3. 4. Profit!

Proof of knowledge transfer in Teleport Cryptographical solution Oblivious transfer Secure multi-party computation

Proof of knowledge transfer

Proof of knowledge transfer

Proof of knowledge transfer

Proof of knowledge transfer

Proof of knowledge transfer

Proof of knowledge transfer

Proof of knowledge transfer

Proof of knowledge transfer + =

Zero-Knowledge proof of knowledge transfer