Aleator: Random Beacon via Scalable Threshold Signatures

Size: px
Start display at page:

Download "Aleator: Random Beacon via Scalable Threshold Signatures"

Transcription

1 Aleator: Random Beacon via Scalable Threshold Signatures Robert Chen Mentored by Alin Tomescu PRIMES Computer Science Conference 10/13/18 1

2 Why Scalability? Scalable threshold signature scheme Increased security Scalable random beacon 2

3 What is a Random Beacon? A set of servers that periodically output a random number. Servers R 1 R 2 Random Output R n 3

4 What is a Random Beacon? A set of servers that periodically output a random number. Some servers could maliciously bias the output 4

5 What is a Random Beacon? A set of servers that periodically output a random number. Some servers could maliciously bias the output Need unbiasability: servers cannot influence the output in their favor 5

6 Contributions Elegant, scalable random beacon design For 100,000 participants, a random output can be produced every 20 seconds with only 3.05 MB of bandwidth (~5 minutes if many dishonest Limiting factor is bandwidth: For 33 outputs 3.05MB/output 100 MB, we can produce a random output every 0.6 to 10 seconds Participants Time Total Time Across System Bandwidth Randherd 512 6s >200s >100 MB Aleator 33,000 4s 8s 1 MB 6

7 Naive Random Beacon: Combine all Approach: Combine all random inputs to produce random output Servers 7

8 Naive Random Beacon: Combine all Approach: Combine all random inputs to produce random output Servers R 1 R 2 R n 8

9 Naive Random Beacon: Combine all Approach: Combine all random inputs to produce random output Servers R 1 R 2 Assuming they can agree on everyone s random inputs R n 9

10 Naive Random Beacon: Combine all Approach: Combine all random inputs to produce random output Servers R 1 R 2 Random Output R n 10

11 Naive Random Beacon: Combine all Approach: Combine all random inputs to produce random output Servers R 1 Cannot exclude any random inputs R 2 Random Output R n 11

12 Naive Random Beacon: Combine all Approach: Combine all random inputs to produce random output Problem: Last participant controls random output Servers R 1 R 2 Random Output R n 12

13 Naive Random Beacon: Combine all Approach: Combine all random inputs to produce random output Problem: Last participant controls random output Servers R 1 R 2 13

14 Naive Random Beacon: Combine all Approach: Combine all random inputs to produce random output Problem: Last participant controls random output Servers R 1 R 2 14

15 Naive Random Beacon: Combine all Approach: Combine all random inputs to produce random output Problem: Last participant controls random output Servers R 1 R 2 R x 15

16 Naive Random Beacon: Combine all Approach: Combine all random inputs to produce random output Problem: Last participant controls random output Servers R 1 R 2 Random Output = X R x 16

17 Naive Random Beacon: Commit-then-reveal Approach: Commit-then-reveal random inputs Compute own commitment c 1 = C(R 1 Servers c 2 = C(R 2 c n = C(R n 17

18 Naive Random Beacon: Commit-then-reveal Approach: Commit-then-reveal random inputs Servers c 1 c 2 c n 18

19 Naive Random Beacon: Commit-then-reveal Approach: Commit-then-reveal random inputs Servers c 1, c 2,, c n c 1, c 2,, c n c 1, c 2,, c n 19

20 Naive Random Beacon: Commit-then-reveal Approach: Commit-then-reveal random inputs Servers c 1, c 2,, c n R 1 c 1, c 2,, c n R 2 c 1, c 2,, c n R n 20

21 Naive Random Beacon: Commit-then-reveal Approach: Commit-then-reveal random inputs Verify all Commitments Servers c 1 = C(R 1,, c n = C(R n R 1 c 1 = C(R 1,, c n = C(R n R 2 c 1 = C(R 1,, c n = C(R n R n 21

22 Naive Random Beacon: Commit-then-reveal Approach: Commit-then-reveal random inputs Verify all Commitments Servers c 1 = C(R 1,, c n = C(R n R 1 c 1 = C(R 1,, c n = C(R n R 2 Random Output c 1 = C(R 1,, c n = C(R n R n 22

23 Naive Random Beacon: Commit-then-reveal Approach: Commit-then-reveal random inputs Problem: Dishonest participants refuse to reveal Verify all Commitments Servers c 1 = C(R 1,, c n = C(R n R 1 c 1 = C(R 1,, c n = C(R n R 2 Random Output c 1 = C(R 1,, c n = C(R n R n 23

24 Naive Random Beacon: Commit-then-reveal Approach: Commit-then-reveal random inputs Problem: Dishonest participants refuse to reveal Servers R 1 R 2 24

25 Naive Random Beacon: Commit-then-reveal Approach: Commit-then-reveal random inputs Problem: Dishonest participants refuse to reveal Servers R 1 R 2 25

26 Naive Random Beacon: Commit-then-reveal Approach: Commit-then-reveal random inputs Problem: Dishonest participants refuse to reveal Servers R 1 R 2 No Random Output Produced 26

27 Solution: Use a threshold signature scheme σ 1 σ 2 σ = random output σ n (e.g., DFINITY blockchain 27

28 Solution: Use a threshold signature scheme σ 1 σ 2 σ = random output σ n (e.g., DFINITY blockchain 28

29 Digital Signatures: Motivation Alice Bob M M = Hello, this is Alice. 29

30 Problem: Mallory can pretend to be Alice to Bob Alice Bob M Mallory M = Hello, this is Alice. 30

31 Problem: Mallory can tamper with Alice's messages Alice Bob M M = Hello, this is Alice. Mallory M M = Hello, this is John. 31

32 Solution: Digital Signatures Alice (Diffie-Hellman '76, RSA '78 Bob Alice has her own secret key Bob has Alice s public key 32

33 Solution: Digital Signatures Alice (Diffie-Hellman '76, RSA '78 Bob M = Hello, this is Alice. σ = Sign(M, SK Alice Alice has her own secret key Bob has Alice s public key 33

34 Solution: Digital Signatures Alice (Diffie-Hellman '76, RSA '78 Bob M σ M = Hello, this is Alice. σ = Sign(M, SK Alice Alice has her own secret key Bob has Alice s public key 34

35 Solution: Digital Signatures Alice (Diffie-Hellman '76, RSA '78 Bob M σ M = Hello, this is Alice. σ = Sign(M, SK Alice Alice has her own secret key Verify(σ, M, PK Alice = true Bob has Alice s public key 35

36 Naive Threshold Signatures σ 1 = Sign(M, SK 1 σ 2 = Sign(M, SK 2 σ k = Sign(M, SK k 36

37 Naive Threshold Signatures M σ 1 = Sign(M, SK 1 σ 1 M σ 2 = Sign(M, SK 2 σ 2 M σ k σ k = Sign(M, SK k 37

38 Naive Threshold Signatures M σ 1 Verify(σ 1, M, PK 1 = true σ 1 = Sign(M, SK 1 M σ 2 Verify(σ 2, M, PK 2 = true σ 2 = Sign(M, SK 2 M σ k Verify(σ k, M, PK k = true σ k = Sign(M, SK k 38

39 Naive Threshold Signatures M σ 1 Verify(σ 1, M, PK 1 = true σ 1 = Sign(M, SK 1 σ 2 = Sign(M, SK 2 M σ 2 Verify(σ 2, M, PK 2 = true Too large k signatures Too much time k verifications M σ k Verify(σ k, M, PK k = true σ k = Sign(M, SK k 39

40 Threshold Signatures (Desmedt, CRYPTO 1987 Signature Shares M σ 1 = Sign(M, SK 1 σ 2 = Sign(M, SK 2 σ 1 M σ 2 Verifies signature shares Aggregator M σ Single threshold signature M σ k σ k = Sign(M, SK k 40

41 Threshold Signatures (Desmedt, CRYPTO 1987 Signature Shares M σ 1 = Sign(M, SK 1 σ 1 Verifies signature shares M M σ 2 = Sign(M, SK 2 σ 2 Aggregator σ Single threshold signature One threshold signature One verification M Verify(σ, M, PK = true σ k σ k = Sign(M, SK k 41

42 Random Beacon via Threshold Signatures σ 1 = Sign(M, SK 1 σ 2 = Sign(M, SK 2 Signature Shares M σ 1 M σ 2 Verifies signature shares Leader (Aggregator Participants sign M = current time. M σ Random Output = Single threshold signature M σ k = Sign(M, SK k σ k 42

43 Random Beacon Throughput Random beacon throughput = signature scheme throughput (assuming good network High traffic at leader Multiple leaders more throughput more traffic :( σ 1 σ 2 σ = random output σ n 43

44 Random Beacon: Benefits of Threshold Signatures Original Problems Last participant controls random output Dishonest participants refuse to reveal Addressed using Threshold Signature Scheme Guaranteed to produce a signature, as long as k of the total n servers are honest Each message has a unique threshold signature 44

45 But We Want a Scalable Random Beacon! Servers can be compromised Crucial to have a very large set of servers Can we get a scalable threshold signature scheme? 45

46 Shamir s Secret Sharing Recover secret given k shares 46

47 Shamir s Secret Sharing Recover secret given k shares 1 Point - Point 47

48 Shamir s Secret Sharing Recover secret given k shares 1 Point - Point 2 Points - Line 48

49 Shamir s Secret Sharing Recover secret given k shares 1 Point - Point 2 Points - Line 3 Points - Quadratic 49

50 Lagrange Interpolation for Secret Sharing Current implementations are inefficient Given k points, takes O(k 2 time to recover secret We use some known mathematical tricks to speed this up to O(klog 2 k time Net result: We can aggregate a threshold signature from 100,000 participants in 20 seconds rather than 13 minutes. 50

51 Our Results: Scalable Threshold Signatures Implementation Details: Implemented in C++ Used libff and libntl 51

52 Our Results: Scalable Threshold Signatures Implementation Details: Implemented in C++ Used libff and libntl Machine Details: ASUS ZenBook Core i7-8550u 1.80Ghz 16 GB of RAM Ubuntu LTS running inside VirtualBox r

53 O(k 2 Naive Aggregation Time Time (s Participants 53

54 O(k log 2 k Efficient Aggregation Time Time (s Participants 54

55 O(k 2 Naive Aggregation Time Time (s Participants 55

56 O(k log 2 k Efficient Aggregation Time Time (s Participants 56

57 Threshold Signatures: Not just for Random Beacons Applications to: Consensus algorithms (such as the one used by Bitcoin Securing HTTPs (every time you access a webpage 57

58 Future Work Implement random beacon protocol Threshold signature implementation works Verifying signature shares is computationally expensive We speed it up using batch verification Fast when almost all shares are valid, slow when many are not More parallelization by decreasing traffic Optimistically guess subset of k honest servers 58

59 Acknowledgements I would like to thank: My mentor, Alin Tomescu, for his support and guidance Srini Devadas, for coordinating CS-PRIMES My parents and family MIT-PRIMES program 59

60 Thank you! Questions? 60

Secure Two-party Threshold ECDSA from ECDSA Assumptions. Jack Doerner, Yashvanth Kondi, Eysa Lee, and abhi shelat Northeastern University

Secure Two-party Threshold ECDSA from ECDSA Assumptions. Jack Doerner, Yashvanth Kondi, Eysa Lee, and abhi shelat Northeastern University Secure Two-party Threshold ECDSA from ECDSA Assumptions Jack Doerner, Yashvanth Kondi, Eysa Lee, and abhi shelat Northeastern University Elliptic Curve Digital Signature Algorithm Digital Signature Algorithm

More information

Compact Multi-Signatures for Smaller Blockchains

Compact Multi-Signatures for Smaller Blockchains Compact Multi-Signatures for Smaller Blockchains Dan Boneh 1, Manu Drijvers 2, Gregory Neven 2 1 Stanford University 2 DFINITY Bitcoin Blockchain and transactions Input 1 Output 1 Input 2 Output 2 Pointer

More information

Bitcoin. CS 161: Computer Security Prof. Raluca Ada Poipa. April 24, 2018

Bitcoin. CS 161: Computer Security Prof. Raluca Ada Poipa. April 24, 2018 Bitcoin CS 161: Computer Security Prof. Raluca Ada Poipa April 24, 2018 What is Bitcoin? Bitcoin is a cryptocurrency: a digital currency whose rules are enforced by cryptography and not by a trusted party

More information

Bitcoin. CS 161: Computer Security Prof. Raluca Ada Popa. April 11, 2019

Bitcoin. CS 161: Computer Security Prof. Raluca Ada Popa. April 11, 2019 Bitcoin CS 161: Computer Security Prof. Raluca Ada Popa April 11, 2019 What is Bitcoin? Bitcoin is a cryptocurrency: a digital currency whose rules are enforced by cryptography and not by a trusted party

More information

Introduction to Blockchain Technology

Introduction to Blockchain Technology Introduction to Blockchain Technology Current Trends in Artificial Intelligence Volker Strobel PhD student @ IRIDIA 23 February 2017 Part I: Bitcoin: Idea, Basics, Technology Part II: Altcoins, Use cases,

More information

Computer Security. 13. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2018

Computer Security. 13. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2018 Computer Security 13. Blockchain & Bitcoin Paul Krzyzanowski Rutgers University Spring 2018 April 18, 2018 CS 419 2018 Paul Krzyzanowski 1 Bitcoin & Blockchain Bitcoin cryptocurrency system Introduced

More information

November 2018 Abstract

November 2018 Abstract etxcoin@outlook.com November 2018 Abstract A purely peer-to-peer version of electronic cash scalable and friendly to use would allow online payments to be sent directly from one party to another without

More information

CONTENTS DISCLAIMER... 3 EXECUTIVE SUMMARY... 4 INTRO... 4 ICECHAIN... 5 ICE CHAIN TECH... 5 ICE CHAIN POSITIONING... 6 SHARDING... 7 SCALABILITY...

CONTENTS DISCLAIMER... 3 EXECUTIVE SUMMARY... 4 INTRO... 4 ICECHAIN... 5 ICE CHAIN TECH... 5 ICE CHAIN POSITIONING... 6 SHARDING... 7 SCALABILITY... CONTENTS DISCLAIMER... 3 EXECUTIVE SUMMARY... 4 INTRO... 4 ICECHAIN... 5 ICE CHAIN TECH... 5 ICE CHAIN POSITIONING... 6 SHARDING... 7 SCALABILITY... 7 DECENTRALIZATION... 8 SECURITY FEATURES... 8 CROSS

More information

Anonymity of E-Cash Protocols. Erman Ayday

Anonymity of E-Cash Protocols. Erman Ayday Anonymity of E-Cash Protocols Erman Ayday Disclaimer It is debatable that anonymous e-cash protocols are also useful for black market and money laundering 2 Bitcoin S. Nakamoto, 2008 A software-based online

More information

Bitcoins and Blockchains

Bitcoins and Blockchains Bitcoins and Blockchains 1 Bitcoins? 2 Properties of money Symbolises value Substitutes value Proof of ownership Easy to transfer Agreed upon value Difficult to forge/limited supply Needs little storage

More information

The BitShares Blockchain

The BitShares Blockchain The BitShares Blockchain Introduction Stichting BitShares Blockchain Foundation Zutphenseweg 6 7418 AJ Deventer Netherlands Chamber of Commerce: 66190169 http://www.bitshares.foundation info@bitshares.foundation

More information

Building Blockchain Solutions

Building Blockchain Solutions Provide Authenticity and Trust to all information you create, process, store and distribute Digital Disruption Is Here The application of new digital technologies causes seismic upheavals in all markets:

More information

arxiv: v1 [q-fin.gn] 6 Dec 2016

arxiv: v1 [q-fin.gn] 6 Dec 2016 THE BLOCKCHAIN: A GENTLE FOUR PAGE INTRODUCTION J. H. WITTE arxiv:1612.06244v1 [q-fin.gn] 6 Dec 2016 Abstract. Blockchain is a distributed database that keeps a chronologicallygrowing list (chain) of records

More information

L3. Blockchains and Cryptocurrencies

L3. Blockchains and Cryptocurrencies L3. Blockchains and Cryptocurrencies Alice E. Fischer September 6, 2018 Blockchains and Cryptocurrencies... 1/16 Blockchains Transactions Blockchains and Cryptocurrencies... 2/16 Blockchains, in theory

More information

In this article, I describe the technology behind Bitcoin s blockchain, and

In this article, I describe the technology behind Bitcoin s blockchain, and Blockchain Hype or Hope? RADIA PERLMAN Radia Perlman s work has had a profound impact on how computer networks function today, enabling huge networks, like the Internet, to be robust, scalable, and largely

More information

Working with Blockchain at Proof of Concept Stage. Ildefonso Olmedo Rebecca Marvell

Working with Blockchain at Proof of Concept Stage. Ildefonso Olmedo Rebecca Marvell Working with Blockchain at Proof of Concept Stage Ildefonso Olmedo Rebecca Marvell Innovation If you search the internet for innovation you mostly get lightbulbs Problem with new is that we don t understand

More information

SATURN Blockchain is the answer What was the question again? 14 th Annual SEI Architecture Technology User Network Conference

SATURN Blockchain is the answer What was the question again? 14 th Annual SEI Architecture Technology User Network Conference SATURN 2018 14 th Annual SEI Architecture Technology User Network Conference MAY 7 10, 2018 PLANO, TEXAS Blockchain is the answer What was the question again? Harald Wesenberg Specialist IT Statoil 1 SATURN

More information

Surface Web/Deep Web/Dark Web

Surface Web/Deep Web/Dark Web Cryptocurrency Surface Web/Deep Web/Dark Web How to Get Data? Where Hacking, Cyber Fraud, and Money Laundering Intersect How to Pay? Digital Currency What is Bitcoin? https://youtu.be/aemv9ukpazg Bitcoin

More information

An Anonymous Bidding Protocol without Any Reliable Center

An Anonymous Bidding Protocol without Any Reliable Center Vol. 0 No. 0 Transactions of Information Processing Society of Japan 1959 Regular Paper An Anonymous Bidding Protocol without Any Reliable Center Toru Nakanishi, Toru Fujiwara and Hajime Watanabe An anonymous

More information

Thunderella: Blockchains with Optimistic Instant Confirmation. Rafael Pass and Elaine Shi Cornell Tech & Cornell University

Thunderella: Blockchains with Optimistic Instant Confirmation. Rafael Pass and Elaine Shi Cornell Tech & Cornell University Thunderella: Blockchains with Optimistic Instant Confirmation Rafael Pass and Elaine Shi Cornell Tech & Cornell University State-machine replication (a.k.a. linearly ordered log, consensus, blockchain)

More information

Cisco Live /11/2016

Cisco Live /11/2016 1 2 3 4 5 Blockchain technology will become Like the TCP / IP for the WWW everyone uses it, but it will be transparent to them. Examples: Disrupt business models Car energy supplier can advertise where

More information

Blockchain Overview. Amr Eid Cloud Architect, Cloud Platform, MEA

Blockchain Overview. Amr Eid Cloud Architect, Cloud Platform, MEA Blockchain Overview Amr Eid Cloud Architect, Cloud Platform, MEA amreid@eg.ibm.com History Business / Academic 1991: The first crypto secured chain of blocks How to time-stamp a digital document Bitcoin

More information

Designing a Dynamic Group Signature Scheme using Lattices

Designing a Dynamic Group Signature Scheme using Lattices Designing a Dynamic Group Signature Scheme using Lattices M2 Internship Defense Fabrice Mouhartem Supervised by Benoît Libert ÉNS de Lyon, Team AriC, LIP 06/24/2015 Fabrice Mouhartem Dynamic Group Signature

More information

HOW LOW CAN YOU GO? SHORT STRUCTURE-PRESERVING SIGNATURES FOR DIFFIE-HELLMAN VECTORS

HOW LOW CAN YOU GO? SHORT STRUCTURE-PRESERVING SIGNATURES FOR DIFFIE-HELLMAN VECTORS HOW LOW CAN YOU GO? SHORT STRUCTURE-PRESERVING SIGNATURES FOR DIFFIE-HELLMAN VECTORS Essam Ghadafi University of the West of England IMA International Conference on Cryptography and Coding 2017 OUTLINE

More information

On the Balasubramanian-Koblitz Results

On the Balasubramanian-Koblitz Results On the Balasubramanian-Koblitz Results Palash Sarkar Applied Statistics Unit Indian Statistical Institute, Kolkata India palash@isical.ac.in Institute of Mathematical Sciences, 22 nd February 2012 As Part

More information

Direct Anonymous Attestation & TPM2.0 Getting Provably Secure Crypto into the Real-World. Anja Lehmann IBM Research Zurich

Direct Anonymous Attestation & TPM2.0 Getting Provably Secure Crypto into the Real-World. Anja Lehmann IBM Research Zurich Direct Anonymous Attestation & 2.0 Getting Provably Secure Crypto into the Real-World Anja Lehmann IBM Research Zurich Direct Anonymous Attestation & Trusted Platform Module () Secure crypto processor:

More information

FIT5124 Advanced Topics in Security. Lecture 1: Lattice-Based Crypto. I

FIT5124 Advanced Topics in Security. Lecture 1: Lattice-Based Crypto. I FIT5124 Advanced Topics in Security Lecture 1: Lattice-Based Crypto. I Ron Steinfeld Clayton School of IT Monash University March 2016 Acknowledgements: Some figures sourced from Oded Regev s Lecture Notes

More information

Physical Unclonable Functions (PUFs) and Secure Processors. Srini Devadas Department of EECS and CSAIL Massachusetts Institute of Technology

Physical Unclonable Functions (PUFs) and Secure Processors. Srini Devadas Department of EECS and CSAIL Massachusetts Institute of Technology Physical Unclonable Functions (PUFs) and Secure Processors Srini Devadas Department of EECS and CSAIL Massachusetts Institute of Technology 1 Security Challenges How to securely authenticate devices at

More information

Blockchain Demystified for Business Intelligence Professionals

Blockchain Demystified for Business Intelligence Professionals Blockchain Demystified for Business Intelligence Professionals Jennifer Stirrup Director Data Relish Ltd Jen Stirrup Boutique Consultancy Owner of Data Relish Postgraduate degrees in Artificial Intelligence

More information

Commercial Blockchain Application & Scalability

Commercial Blockchain Application & Scalability Commercial Blockchain Application & Scalability JH Kim @2018 theloop @2018 theloop Table of Contents 01. Considerations for blockchain application 02. Case study: KOFIA consortium blockchain 03. Expansion

More information

WIZBL WHITE PAPER 5th Generation of Blockchain Technology. v 0.8 content subject to change 2018 WIZBL. All rights reserved.

WIZBL WHITE PAPER 5th Generation of Blockchain Technology. v 0.8 content subject to change 2018 WIZBL. All rights reserved. WIZBL WHITE PAPER 5th Generation of Blockchain Technology v 0.8 content subject to change 2018 WIZBL. All rights reserved. DISCLAIMER This White Paper is intended to provide general information and is

More information

Introduction to Blockchains. John Kelsey, NIST

Introduction to Blockchains. John Kelsey, NIST Introduction to Blockchains John Kelsey, NIST Overview Prologue: A chess-by-mail analogy What problem does a blockchain solve? How do they work? Hash chains Deciding what blocks are valid on the chain

More information

Bitcoin Blockchain technology. Mihail Nikulin, Co-founder & CTO, Lykke

Bitcoin Blockchain technology. Mihail Nikulin, Co-founder & CTO, Lykke Bitcoin Blockchain technology Mihail Nikulin, Co-founder & CTO, Lykke What is money? Copy protection consensus Consensus based on top of proof of existence Mining is burning electricity Colored Coins BTC/ETH/Some

More information

Applying Secure Multiparty Computation in ATM

Applying Secure Multiparty Computation in ATM Applying Secure Multiparty Computation in ATM Let s go beyond Secure Information Sharing Massimiliano Zanin Principal researcher Secure Information Sharing If you secure the communication channel, and

More information

Instructor: Daniele Venturi (Slides from a series of lectures by Stefan Dziembowski)

Instructor: Daniele Venturi (Slides from a series of lectures by Stefan Dziembowski) Data Privacy and Security Instructor: Daniele Venturi (Slides from a series of lectures by Stefan Dziembowski) Master Degree in Data Science Sapienza University of Rome Academic Year 2017-2018 Part VII:

More information

David Chuum. Centre for Mathematics and Computer Science Kruislaan SJ Amsterdam

David Chuum. Centre for Mathematics and Computer Science Kruislaan SJ Amsterdam Online Cash Checks David Chuum Centre for Mathematics and Computer Science Kruislaan 413 1098SJ Amsterdam INTRODUCTION Savings of roughly an order of magnitude in space, storage, and bandwidth over previously

More information

Bitcoin. Based on Bitcoin Tutorial presentation by Joseph Bonneau, Princeton University. Bonneau slides marked JB

Bitcoin. Based on Bitcoin Tutorial presentation by Joseph Bonneau, Princeton University. Bonneau slides marked JB Bitcoin Based on Bitcoin Tutorial presentation by Joseph Bonneau, Princeton University Bonneau slides marked JB Bitcoin Snapshot: October 2, 2015 Bitcoin is a combination of several things: a currency,

More information

Level 2, HTLC, SegWit

Level 2, HTLC, SegWit Innovation and Cryptoventures Level 2, HTLC, SegWit Campbell R. Harvey Duke University and NBER February 19, 2018 2 Transactions per Second https://en.bitcoin.it/wiki/scalability Visa processes about 2,000

More information

Making the world more predictable

Making the world more predictable Making the world more predictable Forwards & Futures Brief Overview Hedge vs. price prediction Wikipedia - A futures contract is a legal agreement, made on the trading floor of a futures exchange, to buy

More information

Auditing in the Crypto-Asset Sector

Auditing in the Crypto-Asset Sector Auditing in the Crypto-Asset Sector Introduction Many of the reporting issuers in Canada s crypto-asset sector obtained material crypto-asset holdings or engaged in material crypto-mining activity during

More information

How Blockchain Technology Changes Marketing

How Blockchain Technology Changes Marketing How Blockchain Technology Changes Marketing Campbell R. Harvey Duke University and NBER @camharvey Version: May 1, 2018 Agenda Understanding blockchain Impact on marketing Questions Campbell R. Harvey

More information

Investing in the Blockchain Ecosystem

Investing in the Blockchain Ecosystem Introduction When investors hear the term Blockchain, most probably think of cryptocurrencies (which are digital currencies, operated independently from a central bank), with Bitcoin being the most well-known.

More information

Assessing blockchain technology for Transport Data Logger

Assessing blockchain technology for Transport Data Logger Assessing blockchain technology for Transport Data Logger BJÖRN JOHANSSON MASTER S THESIS DEPARTMENT OF ELECTRICAL AND INFORMATION TECHNOLOGY FACULTY OF ENGINEERING LTH LUND UNIVERSITY Assessing blockchain

More information

Efficient Fully-Leakage Resilient One-More Signature Schemes Antonio Faonio

Efficient Fully-Leakage Resilient One-More Signature Schemes Antonio Faonio SESSION ID: CRYP-R03 Efficient Fully-Leakage Resilient One-More Signature Schemes Antonio Faonio IMDEA Software Institute 1/20 2/20 3/20 Digital Signature - Existential Unforgeability CMA 3/20 Digital

More information

Parameters Optimization of Post-Quantum Cryptography Schemes

Parameters Optimization of Post-Quantum Cryptography Schemes Parameters Optimization of Post-Quantum Cryptography Schemes Qing Chen ECE 646 Presentation George Mason University 12/18/2015 Problem Introduction Quantum computer, a huge threat to popular classical

More information

Monoxide Scale out Blockchains with Asynchronous Consensus Zones. Jiaping Wang, Hao Wang Sinovation Ventures ICT/CAS The Ohio State University

Monoxide Scale out Blockchains with Asynchronous Consensus Zones. Jiaping Wang, Hao Wang Sinovation Ventures ICT/CAS The Ohio State University Monoxide Scale out Blockchains with Asynchronous Consensus Zones Jiaping Wang, Hao Wang Sinovation Ventures ICT/CAS The Ohio State University Public Blockchain State (Ledger) Block t+0 Block t+1 Block

More information

Blockchain Technology for Next Generation ICT

Blockchain Technology for Next Generation ICT Blockchain Technology for Next Generation ICT Jun Kogure Ken Kamakura Tsunekazu Shima Takekiyo Kubo Blockchain technology, which supports low-cost decentralized distributed data management featuring tamper

More information

Making Bitcoin Exchanges Transparent

Making Bitcoin Exchanges Transparent Making Bitcoin Exchanges Transparent James Guthrie Christian Decker, Jochen Seidel, Roger Wattenhofer James Guthrie 24/09/15 1 Introduction James Guthrie 24/09/15 2 Introduction James Guthrie 24/09/15

More information

Modified Huang-Wang s Convertible Nominative Signature Scheme

Modified Huang-Wang s Convertible Nominative Signature Scheme Modified Huang-Wang s Convertible Nominative Signature Scheme Wei Zhao, Dingfeng Ye State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences Beijing 100049, P. R.

More information

A.J. Bahou, LLM, MSECE Bahou Miller PLLC

A.J. Bahou, LLM, MSECE Bahou Miller PLLC A.J. Bahou, LLM, MSECE Bahou Miller PLLC AJBahou@BahouMiller.com ISACA and ISC2 December 2017 The views expressed herein are solely the presenter s and do not necessarily reflect any position of Bahou

More information

Blockchain Payments for Everyone

Blockchain Payments for Everyone Blockchain Payments for Everyone 01 Mission Mission 01 Mission The Liquidity.Network is a practical blockchain micropayment system, supporting millions of users securely, reducing transaction costs significantly

More information

INTRODUCTION TO THE BLOCKCHAIN ERRIN ICT Working Group Meeting on Blockchain June 13, Javier Prieto IoT Digital Innovation Hub

INTRODUCTION TO THE BLOCKCHAIN ERRIN ICT Working Group Meeting on Blockchain June 13, Javier Prieto IoT Digital Innovation Hub INTRODUCTION TO THE BLOCKCHAIN ERRIN ICT Working Group Meeting on Blockchain June 13, 2018 Content Bitcoin Beyond bitcoin The blockchain is an incorruptible digital ledger of economic transactions that

More information

AITA. Blockchain Infrastructure Based on Reputation & Sharding. Nov AITA Foundation

AITA. Blockchain Infrastructure Based on Reputation & Sharding. Nov AITA Foundation AITA Blockchain Infrastructure Based on Reputation & Sharding Nov. 2018 AITA Foundation COMPAMY Fb Tw In CONTENTS. 01 02 03 04 What is AITA? What problem we How we do it? What distinguish us solve? from

More information

Soft Response Generation and Thresholding Strategies for Linear and Feed-Forward MUX PUFs

Soft Response Generation and Thresholding Strategies for Linear and Feed-Forward MUX PUFs Soft Response Generation and Thresholding Strategies for Linear and Feed-Forward MUX PUFs Chen Zhou, SarojSatapathy, YingjieLao, KeshabK. Parhiand Chris H. Kim Department of ECE University of Minnesota

More information

A Lattice-Based Group Signature Scheme with Message-Dependent Opening

A Lattice-Based Group Signature Scheme with Message-Dependent Opening A Lattice-Based Group Signature Scheme with Message-Dependent Opening Benoît Libert Fabrice Mouhartem Khoa Nguyen École Normale Supérieure de Lyon, France Nanyang Technological University, Singapore ACNS,

More information

Making Blockchain Real for Business Explained

Making Blockchain Real for Business Explained Making Blockchain Real for Business Explained Jennifer Foley foleyje@us.ibm.com Integration Architect WW Client Center for Systems Innovation V4.0, 14 March 2017 1 Contents is Blockchain? is it relevant

More information

whitepaper Abstract Introduction Features Special Functionality Roles in DiQi network Application / Use cases Conclusion

whitepaper Abstract Introduction Features Special Functionality Roles in DiQi network Application / Use cases Conclusion whitepaper Abstract Introduction Features Special Functionality Roles in DiQi network Application / Use cases Conclusion Abstract DiQi (pronounced Dee Chi) is a decentralized platform for smart property.

More information

A reprint from American Scientist

A reprint from American Scientist A reprint from American Scientist the magazine of Sigma Xi, The Scientific Research Honor Society This reprint is provided for personal and noncommercial use. For any other use, please send a request to

More information

Business Primer Last updated: October 27th, 2017

Business Primer Last updated: October 27th, 2017 Business Primer Last updated: October 27th, 2017 Table of Contents Background.... 3 Introducing Keep... 4 Applications... 5 Incentives & Token mechanics.. 8 Keep providers... 9 Staking...... 10 Development

More information

Democratic Cryptocurrency Unity

Democratic Cryptocurrency Unity Democratic Cryptocurrency Unity Cryptocurrencies came to the world in the recent decade and attempted to put a new order where the financial system is not governed by a centralized entity, and where you

More information

Blockchain: Where are We and Where are We Heading?

Blockchain: Where are We and Where are We Heading? Blockchain: Where are We and Where are We Heading? Objectives Define the underlying technologies of blockchain Describe some shortcomings of blockchain Describe the accounting profession s interest in

More information

On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA)

On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA) On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA) Adrian Leung 1, Liqun Chen 2, and Chris J. Mitchell 1 1 Information Security Group Royal Holloway, University of London Egham, Surrey, TW20

More information

Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions

Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions Benoît Libert 1,2 San Ling 3 Fabrice Mouhartem 1 Khoa Nguyen 3 Huaxiong Wang 3 1 É.N.S. de Lyon, France

More information

Bitcoin and why it will change the world

Bitcoin and why it will change the world Bitcoin and why it will change the world Luv Khemani What is Bitcoin? Brief History of Bitcoin - Bitcoin Design paper released in 2008 by an annonymous programmer calling himself Satoshi Nakamoto - Bitcoin

More information

A Simple Overview of Blockchains

A Simple Overview of Blockchains A Simple Overview of Blockchains Why They Are Important to the Cable Industry A Technical Paper prepared for SCTE/ISBE by Steve Goeringer Principal Architect CableLabs 858 Coal Creek Circle Louisville,

More information

Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures without Trapdoors

Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures without Trapdoors Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures without Trapdoors Benoît Libert 1 San Ling 2 Khoa Nguyen 2 Huaxiong Wang 2 1 Ecole Normale

More information

Katherine, I gave him the code. He verified the code. But did you verify him? The Numbers Station (2013)

Katherine, I gave him the code. He verified the code. But did you verify him? The Numbers Station (2013) Is a forged signature the same sort of thing as a genuine signature, or is it a different sort of thing? Gilbert Ryle (1900 1976), The Concept of Mind (1949) Katherine, I gave him the code. He verified

More information

The Blockchain Technology

The Blockchain Technology The Blockchain Technology Mooly Sagiv Tel Aviv University http://www.cs.tau.ac.il/~msagiv/courses/blockchain.html msagiv@acm.org Advisory Board Shelly Grossman Noam Rinetzky Ittai Abraham Guy Golan-Gueta

More information

Blockchain and the Maritime Industry

Blockchain and the Maritime Industry MARCH 2018 Blockchain and the Maritime Industry An introduction We will look at A review of the current transactional ecosystem The blockchain concept Smart contracts Q&A Current Shipping Transactional

More information

Republic Protocol. A decentralized dark pool exchange providing atomic swaps for Ethereum-based assets and Bitcoin.

Republic Protocol. A decentralized dark pool exchange providing atomic swaps for Ethereum-based assets and Bitcoin. Republic Protocol A decentralized dark pool exchange providing atomic swaps for Ethereum-based assets and Bitcoin. December 18, 2017 Taiyang Zhang, Loong Wang Abstract The market capitalization and trading

More information

How We Can Expand the Utilization of Blockchain Technology: Security and Use Case Perspective

How We Can Expand the Utilization of Blockchain Technology: Security and Use Case Perspective How We Can Expand the Utilization of Blockchain Technology: Security and Use Case Perspective June 22, 2018 Toshiya Cho Senior Evangelist / Managing Director Financial Information Systems Sales Management

More information

Product Overview. A technical overview of xcurrent. October 2017

Product Overview. A technical overview of xcurrent. October 2017 Product Overview A technical overview of xcurrent October 2017 4 Product Overview 6 How It Works 15 Reference Architecture 17 About Ripple One frictionless experience to send money globally A consistent

More information

Table of contents. 2

Table of contents. 2 Whitepaper Table of contents Table of contents... 2 Overview... 3 TrillionToken... 3 Sports Betting Platform... 3 Cryptocurrency... 3 Blockchain technology... 3 Ethereum network... 5 TrillionToken token...

More information

The Blockchain Trevor Hyde

The Blockchain Trevor Hyde The Blockchain Trevor Hyde Bitcoin I Bitcoin is a cryptocurrency introduced in 2009 by the mysterious Satoshi Nakomoto. I Satoshi Nakomoto has never been publicly identified. Bitcoin Over the past year

More information

A FINANCIAL ENGINE [ A DECENTRALIZED FINANCIAL SYSTEM ]

A FINANCIAL ENGINE [ A DECENTRALIZED FINANCIAL SYSTEM ] A FINANCIAL ENGINE [ A DECENTRALIZED FINANCIAL SYSTEM ] ABSTRACT A purely peer-to-peer mechanism to structure contractual relationships would allow mutually distrusting parties to draft contracts without

More information

McKesson Radiology 12.0 Web Push

McKesson Radiology 12.0 Web Push McKesson Radiology 12.0 Web Push The scenario Your institution has radiologists who interpret studies using various personal computers (PCs) around and outside your enterprise. The PC might be in one of

More information

Bitcoin & Blockchains. Landscape & Future Directions Jeremy Clark

Bitcoin & Blockchains. Landscape & Future Directions Jeremy Clark Bitcoin & Blockchains Landscape & Future Directions Jeremy Clark Jeremy Clark Assistant Professor at the Concordia Institute for Information Systems Engineering (CIISE) in Montreal PhD from the University

More information

Universal Payment Channels

Universal Payment Channels Universal Payment Channels Jehan Tremback, Zack Hess jehan.tremback@gmail.com, zack.bitcoin@gmail.com November 2015 v0.5 Abstract This paper concerns a payment network called Universal Payment Channels,

More information

Blockchain made Simple

Blockchain made Simple Blockchain made Simple Rhonda Okamoto, Blockchain & Cryptocurrency Enthusiast rhondaokamoto@gmail.com 609-433-1442 What is Blockchain? When and Where is Blockchain useful? What is the difference between

More information

Secure E-Auction For Mobile Users With Low-Capability Devices In Wireless Network

Secure E-Auction For Mobile Users With Low-Capability Devices In Wireless Network Secure E-Auction For Mobile Users With Low-Capability Devices In Wireless Network Kun Peng Institute for Infocomm Research Abstract. The existing secure e-auction schemes are shown to be too costly for

More information

CSCI 1800 Cybersecurity and International Relations. Bitcoins and Blockchains John E. Savage

CSCI 1800 Cybersecurity and International Relations. Bitcoins and Blockchains John E. Savage CSCI 1800 Cybersecurity and International Relations Bitcoins and Blockchains John E. Savage Overview of the Talk We describe the bitcoin system, which supports monetary exchange without a central authority

More information

THE LEGAL BACKBONE FOR THE INTERNET OF AGREEMENTS

THE LEGAL BACKBONE FOR THE INTERNET OF AGREEMENTS THE LEGAL BACKBONE FOR THE INTERNET OF AGREEMENTS MATTEREUM IS A BLOCKCHAIN PLATFORM, SUPPORTED BY INDEPENDENT ARBITRATION, FOR THE AUTOMATION OF COMMERCIAL AGREEMENTS USING LEGALLY ENFORCEABLE SMART CONTRACTS.

More information

Anne Bracy CS 3410 Computer Science Cornell University

Anne Bracy CS 3410 Computer Science Cornell University Anne Bracy CS 3410 Computer Science Cornell University These slides are the product of many rounds of teaching CS 3410 by Professors Weatherspoon, Bala, Bracy, and Sirer. Complex question How fast is the

More information

Blockchain for the Enterprise. BTL Interbit Interbit: Blockchain for the Enterprise 1

Blockchain for the Enterprise. BTL Interbit Interbit: Blockchain for the Enterprise 1 Blockchain for the Enterprise BTL Interbit Interbit: Blockchain for the Enterprise 1 This introductory paper aims to help demystify blockchain technology and describe how BTL Group s enterprise-grade blockchain

More information

Blockchains in a Big Data World. Trent McConaghy

Blockchains in a Big Data World. Trent McConaghy Blockchains in a Big Data World Trent McConaghy The modern cloud application stack Applications Processing File System Database Along came Bitcoin The modern cloud application stack with Bitcoin Partly-Decentralized

More information

A NEW STRONG PROACTIVE VERIFIABLE SECRET SHARING SCHEME WITH UNCONDITIONAL SECURITY

A NEW STRONG PROACTIVE VERIFIABLE SECRET SHARING SCHEME WITH UNCONDITIONAL SECURITY A NEW STRONG PROACTIVE VERIFIABLE SECRET SHARING SCHEME WITH UNCONDITIONAL SECURITY A THESIS IN Computer Science Presented to the Faculty of the University of Missouri-Kansas City in partial fulfillment

More information

Anthony O Dowd IBM Blockchain Labs V3.3, 12 July 16

Anthony O Dowd IBM Blockchain Labs V3.3, 12 July 16 Making Blockchain Real for Business Explained Anthony O Dowd IBM Blockchain Labs V3.3, 12 July 16 Page 1 Contents is Blockchain? is it relevant for our business? can IBM help us apply Blockchain? Page

More information

Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions

Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions Benoît Libert 1,2 San Ling 3 Fabrice Mouhartem 1 Khoa Nguyen 3 Huaxiong Wang 3 1 É.N.S. de Lyon, France

More information

Blockchain 2.0: Smart Contracts

Blockchain 2.0: Smart Contracts Blockchain 2.0: Smart Contracts Karan Bharadwaj August 7, 2016 The relevance of blockchain technology to the financial world has grown substantially over the last few years. An important aspect of the

More information

Blockchain and Risk ISACA Northern UK, April 20 th, Mike Small CEng, FBCS, CITP Senior Analyst Kuppinger Cole

Blockchain and Risk ISACA Northern UK, April 20 th, Mike Small CEng, FBCS, CITP Senior Analyst Kuppinger Cole Blockchain and Risk ISACA Northern UK, April 20 th, 2016 Mike Small CEng, FBCS, CITP Senior Analyst Kuppinger Cole Mike.Small@kuppingercole.com Agenda Mike Small KuppingerCole Trust and Integrity The Bitcoin

More information

New Kids on the Blockchain: RIM Blockchain Applications Today & Tomorrow

New Kids on the Blockchain: RIM Blockchain Applications Today & Tomorrow New Kids on the Blockchain: RIM Blockchain Applications Today & Tomorrow Q. Scott Kaye, Partner, Rimon Law John Isaza, Information Governance Solutions, LLC AGENDA What is Blockchain? How it works Forming

More information

Bitcoin Lightening Network: a Distributed Network for Scalability of Bitcoin. Shahla Atapoor

Bitcoin Lightening Network: a Distributed Network for Scalability of Bitcoin. Shahla Atapoor Bitcoin Lightening Network: a Distributed Network for Scalability of Bitcoin Shahla Atapoor Supervised by Prof. Eero Vainikko University of Tartu, Estonia shahla.atapoor@ut.ee January 3, 2019 Abstract

More information

Blockchain in Healthcare

Blockchain in Healthcare Blockchain in Healthcare Presented to the Kentucky HFMA Chapter Tom Skoog, Principal July 19, 2018 What are Blockchain and Bitcoin and How Can They Be Used? Bitcoin and Blockchain - - what s the difference

More information

Blockchain and the possible impact on testing. New technology needs new testing?

Blockchain and the possible impact on testing. New technology needs new testing? Specialisten in vooruitgang Blockchain and the possible impact on testing. New technology needs new testing? Jeroen Rosink TestCon Vilnius October 18 th 2018 Software testen Business Process Transformation

More information

Research Faculty Summit Systems Fueling future disruptions

Research Faculty Summit Systems Fueling future disruptions Research Faculty Summit 2018 Systems Fueling future disruptions BlockchainDB Towards a Shared Database on Blockchains Carsten Binnig Data Management Lab, TU Darmstadt Blockchains: A Shared Database? Client

More information

Practical Divisible E-Cash

Practical Divisible E-Cash Practical Divisible E-Cash Patrick Märtens Mathematisches Institut, Justus-Liebig-Universität Gießen patrickmaertens@gmx.de April 9, 2015 Abstract. Divisible e-cash systems allow a user to withdraw a wallet

More information

21 st Geneva Report on the World Economy. Peterson Institute Presentation September 26, 2018

21 st Geneva Report on the World Economy. Peterson Institute Presentation September 26, 2018 21 st Geneva Report on the World Economy Peterson Institute Presentation September 26, 2018 1 Satoshi Nakamoto: Bitcoin P2P e-cash paper October 31, 2008 I've been working on a new electronic cash system

More information

Transforming Industries Through Blockchain Innovations

Transforming Industries Through Blockchain Innovations Transforming Industries Through Blockchain Innovations MARC TAVERNER BITFURY GLOBAL AMBASSADOR BLOCKCHAINEXPO, Oman, May 2 nd 2018 GLOBAL BLOCKCHAIN TECHNOLOGY COMPANY WITH A REALLY SIMPLE PURPOSE MAKE

More information

Blockchain and Bitcoin: Impact on Insurance Industry

Blockchain and Bitcoin: Impact on Insurance Industry Blockchain and Bitcoin: Impact on Insurance Industry ACLI Financial & Investment Roundtable Sea Island, Georgia Edmund J. Zaharewicz Shareholder Carlton Fields Jorden Burt, P.A. March 19, 2018 The views

More information

Use of the Proof-of-Stake Algorithm for Distributed Consensus in Blockchain Protocol for Cryptocurrency

Use of the Proof-of-Stake Algorithm for Distributed Consensus in Blockchain Protocol for Cryptocurrency University of Connecticut OpenCommons@UConn Honors Scholar Theses Honors Scholar Program Spring 4-27-2018 Use of the Proof-of-Stake Algorithm for Distributed Consensus in Blockchain Protocol for Cryptocurrency

More information