Stealthsend Whitepaper Brief

Similar documents
Prelude. The notes within this Whitepaper publication are intended to formally document the concepts and features of the Aegeus cryptocurrency.

I. Introduction. II. Security, Coinage and Attacks

Proof-of-Stake Protocol v3.0

TOPPERCASH TOPPERCASH WHITEPAPER REFORM THE BEST OF BLOCKCHAIN

Ergo platform. Dmitry Meshkov

Elphyrecoin (ELPH) a Private, Untraceable, ASIC-Resistant CryptoCurrency Based on CryptoNote

Blockchain Beyond Bitcoin. Mark O Connell

ECC: Peer-to-Peer Electronic Cash with Trustless Network Services

CS 251: Bitcoin and Cryptocurrencies Fall 2016

ICS 421 & ICS 690. Bitcoin & Blockchain. Assoc. Prof. Lipyeow Lim Information & Computer Sciences Department University of Hawai`i at Mānoa

Bitcoin, a decentralized and trustless protocol

University of Duisburg-Essen Bismarckstr Duisburg Germany HOW BITCOIN WORKS. Matthäus Wander. June 29, 2011

DEV. Deviant Coin, Innovative Anonymity. A PoS/Masternode cr yptocurrency developed with POS proof of stake.

Lecture 9. Anonymity in Cryptocurrencies

An analysis of the applicability of blockchain to secure IP addresses allocation, delegation and bindings draft-paillisse-sidrops-blockchain-01

Chapter 13. Digital Cash. Information Security/System Security p. 570/626

Key concepts of blockchain

Lecture 12. Algorand

As a 3rd generation currency, not only are transactions secured, private and fast, you actually get paid for holding DigitalPrice coins.

EECS 498 Introduction to Distributed Systems

LEOcoin Private Chat wallet

Whitepaper Rcoin Global

Burstcoin Technical information about mining and block forging

An efficient implementation of Monero subaddresses. 1 Introduction. Sarang Noether and Brandon Goodell Monero Research Lab October 3, 2017

INTRODUCTION WHY DAPS?

STELLITE A MODERN, SECURE AND DECENTRALIZED CRYPTOCURRENCY. JAN 2018 WHITE PAPER STELLITE WHITE PAPER 1

GENESIS VISION NETWORK

SpaceMint Overcoming Bitcoin s waste of energy

DigitalNote XDN-project

Introduc)on to Bitcoin

Blockchain! What consultants should know about it. Daniel

Transactions as Proof-of-Stake! by Daniel Larimer!

WHITEPAPER 1.0 Boostx, Lead Developer BoxyCoin

CRUDE COINS.

Neel Gupte. Index Terms Bitcoin, Cryptocurreny, Block Chain, Hashing, Proof-of-Work, Double-spending, Momentum Method, Proof of Stake.

Introduction to Bitcoin I

Using Chains for what They re Good For

Introduction to Cryptocurrency Ecosystem. By Raj Thimmiah

PYTHIA SERVICE BY VIRGIL SECURITY WHITE PAPER

BLOCKCHAIN The foundation behind Bitcoin

OpenbankIT: a banking platform for e- money management based on blockchain technology

Bitcoin (Part I) Ken Calvert Keeping Current Seminar 22 January Keeping Current 1

Viacoin Whitepaper. Viacoin Dev Team September 12, Abstract

Technical White Paper. Cube Engine Version 1.0

Blockchain Certification Protocol (BCP)

Smalltalk 3/30/15. The Mathematics of Bitcoin Brian Heinold

NIX Platform whitepaper v1.0

Technical White Paper of. MOAC Mother of All Chains. June 8 th, 2017

Securing Bitcoin wallets: A new DSA threshold signature scheme that is usable in the real world

Technical Specifications for Platform Development

Information Security. message M. fingerprint f = H(M) one-way hash. 4/19/2006 Information Security 1

Introduction to Cryptography in Blockchain Technology. December 23, 2018

Problem: Equivocation!

hard to perform, easy to verify

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric

Darkcoin: Peer to Peer Crypto Currency with Anonymous Blockchain Transactions and an Improved Proof of Work System

KDC COIN WHITEPAPER KDC COIN WHITEPAPER.

What is Proof of Work?

DTB001: Decred Technical Brief

Pretty Good Privacy (PGP)

A Review on Blockchain Application for Decentralized Decision of Ownership of IoT Devices

An (Almost) Constant-Effort Solution-Verification. Proof-of-Work Protocol based on Merkle Trees. Fabien Coelho

Summary on Crypto Primitives and Protocols

Lecture 9: Public-Key Cryptography CS /05/2018

International Journal of Computer Engineering and Applications, Volume XIII, Issue II, Feb. 19, ISSN

STELLITE A MODERN, SECURE AND DECENTRALIZED CRYPTOCURRENCY. May 2018

CybCSec Coin. Cyber Crypto Security. Revision 3.1. The New Standard in Privacy an Unrivalled Combination of Anonymity, Security, and Speed.

Hyperledger Quilt and Interledger Protocol. Nathan Aw - Technical Ambassador Edmund To - Organizer of Hyperledger Meetup Hong Kong

Scriptless Scripts. Scriptless Scripts. Andrew Poelstra. March 4, 2017

About cryptocurrencies and blockchains part 1. Jyväskylä 17th of April 2018 Henri Heinonen

Analysis, demands, and properties of pseudorandom number generators

Data Consistency and Blockchain. Bei Chun Zhou (BlockChainZ)

DisLedger - Distributed Concurrence Ledgers 12 August, 2017

CS 251: Bitcoin and Crypto Currencies Fall 2015

This tutorial is aimed to give you a crisp understanding of the process of building your own blockchain.

Security (and finale) Dan Ports, CSEP 552

Distributed Concurrence Ledgers 16 May, 2016

Herbivore: An Anonymous Information Sharing System

OUROBOROS PRAOS: AN ADAPTIVELY-SECURE, SEMI-SYNCHRONOUS

TWIST: Revolutionising Blockchain Accessibility

Bitcoin: A Peer-to-Peer Electronic Cash System

-3- Additionally or alternatively, the invention may comprise a method of controlling access to a digital wallet, the method comprising the steps:

Realization and Addressing Analysis In Blockchain Bitcoin

Valence Blockchain Applications v1.0

Information Security CS526

DAVID ANDREWS, FOUNDER RYATTA BLOCKCHAIN FOUNDATIONS

Token White Paper. Global marketplace based on Block chain for small-scale business I ver P a g e

Computer Security. 14. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2019

Biomedical and Healthcare Applications for Blockchain. Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs

Proof-of-Work & Bitcoin

BYZANTINE CONSENSUS THROUGH BITCOIN S PROOF- OF-WORK

An honest cryptocurrency for everybody, minable by the CPU. Yenten is a cryptocurrency of the cpu, by the cpu, for the cpu. No ASIC.

Vladimir Groshev. COO, Project Coordinator.

LEOcoin Private Chat wallet FAQ V 1

Concurrency and Privacy with Payment Channel Networks

Security Analysis of Bitcoin. Dibyojyoti Mukherjee Jaswant Katragadda Yashwant Gazula

Privacy Enhancing Technologies CSE 701 Fall 2017

Jan Møller Co-founder, CTO Chainalysis

Stealth Address. and Key Management Techniques in Blockchain Systems. Nicolas T. Courtois 1 and Rebekah Mercer 1,2. University College London, UK

ENEE 457: E-Cash and Bitcoin

Transcription:

Stealthsend Whitepaper Brief HONDO stealthcoin September 09, 2014

Abstract Here, I describe the essential theory and properties of stealthsend. A more detailed description will accompany its launch. Hondo ABSTRACT I

1 Introduction CryptoNote provides exceptional anonymity for cyrpto-currencies. Its system of ring signatures removes certainty about the sending address, with the uncertainty being inversely proportional to the number of keys in the ring. In short, if there are N keys in a ring, then any key in the ring has a 1/N probability of ownership of the transaction, where ownership means the ownership of the private key authorized to sign the payment. For example, if 100 keys comprise a ring, then the probability that any key in the ring signed the transaction is 1%. Despite the extraordinary technical achievement that CryptoNote represents, the ring signature system it utilizes poses serious limitations to its long term usefulness. Importantly, to validate a ring signature, the equivalent of one signature per key must be stored in the block chain so that the ring signature may be later validated. Additionally, the signing keys must be stored with the signature. For base64 encoded data, these requirements equate to 97 bytes per key. For example, if 100 keys are used in the ring, the storage burden for a transaction with a single input and single output is 9.5 kb (where 1 kb equals 1024 bytes). INTRODUCTION II

2 Chandran Signatures Undoubtedly, some refinements to the CryptoNote ring signature system could reduce this storage burden. To address the problem of block chain bloat, stealthsend will use a signature system described by Nishanth Chandran, et al. [1], which is termed herein as Chandran signatures". Chandran signatures reduce the storage burden from O(N ) to O ((N + 12 p N )/3). For example, instead of requiring 9.5 kb, a 100 key Chandran signature (with no further optimizations) would would require about 7 kb. Chandran signatures achieve this space savings by including non-interactive witness-indistinguishable (NIWI) proofs in the signature. These proofs commit to only a subset of the complete multisignature, requiring storage for just the subset. For each signature, the proofs require about 6º storage, where º = p N. CHANDRAN SIGNATURES III 3

3 Nonce Key Selection Although Chandran signatures provide a significant savings in storage compared to CryptoNote ring signatures, it is possible to achieve further savings by selecting keys using a system of random nonces. In the stealthsend system, two nonces are needed. The first nonce Á is used to establish the start of a range of public keys and the second, Ã, is used to select the desired number of keys from the range. Beyond these two nonces, requiring only eight bytes each, the size J (8 bytes) of the range needs to be specified, as well as N (8 bytes). This system, described in more detail below, reduces the storage requirements for the signature keys from O(N/3) to essentially O(0). Thus, the overall storage requirements from CryptoNote ring signatures reduces from O(N) to O(4 p N ). For example, a 100 key stealthsend signature requires only about 3.8 kb, compared to 9.5 kb for CryptoNote ring signatures. Thus, for a typical multisignature of 100 keys, stealthsend signatures require about 1/3 of the space of CryptoNote signatures. To select the keys, a cryptographically random nonce, Á, is generated to seed a deterministic random number generator (PRNG), such as the Mersenne twister. The PRNG selects a number between 0 and the size of the entire keyspace (all the public keys found in the stealthsend blockchain). The range has boundries of this index I and I+J, where J is the size of the desired range. Keys are selected from the block chain by indices assigned according to their first appearance in the block chain. If the sender's public key, K p is within the range, the nonce Á is kept along with J. If the K p is not within this range, a new random nonce Á is generated. Once an acceptable Á has been found, a second cryptographically random nonce à is generated and used to seed the PRNG. This PRNG is then used to select a set of N keys from the range specified by the nonce Á. If K p is in this set, then the nonces, J, and N are stored with the signature created from them, otherwise a new nonce à is generated. NONCE KEY SELECTION IV

3 StealthSend Specifications Although stealthcoin is a proof-of-stake (PoS) coin, stealthsend can not be PoS because PoS requires proof of ownership for the stake, which compromises anonymity unless memory expensive proofs are included with every staking transaction. Although such proofs are theoretically possible, they are unnecessarily impractical for a crypto-currency. Therefore, stealthsend will be a proof-of-work coin, which will most likely use the low energy scrypt hashing algorithm. Holders of stealthcoin will be able to convert to stealthsend at a ratio of 1:1 using a proof-of-burn conversion. This conversion will account for 85% of the StealthSend money supply. The other 15% of the stealthsend money supply will be emitted using a smooth emission algorithm, such that 1/2 of the remaining money supply is emitted every 2 years. The total money supply will depend on how much StealthCoin is converted to stealthsend. Finally, stealthsend will have a six minute block time. [1] Chandran, N, et al. Ring Signatures of Sub-linear Size without Random Oracles. STEALTHSEND SPECIFICATIONS V

2014 STEALTHCOIN HONDO PAHLKE MEDIA www.pahlkemedia.de