Aleator: Random Beacon via Scalable Threshold Signatures
|
|
- Allison Wilcox
- 5 years ago
- Views:
Transcription
1 Aleator: Random Beacon via Scalable Threshold Signatures Robert Chen Mentored by Alin Tomescu PRIMES Computer Science Conference 10/13/18 1
2 Why Scalability? Scalable threshold signature scheme Increased security Scalable random beacon 2
3 What is a Random Beacon? A set of servers that periodically output a random number. Servers R 1 R 2 Random Output R n 3
4 What is a Random Beacon? A set of servers that periodically output a random number. Some servers could maliciously bias the output 4
5 What is a Random Beacon? A set of servers that periodically output a random number. Some servers could maliciously bias the output Need unbiasability: servers cannot influence the output in their favor 5
6 Contributions Elegant, scalable random beacon design For 100,000 participants, a random output can be produced every 20 seconds with only 3.05 MB of bandwidth (~5 minutes if many dishonest Limiting factor is bandwidth: For 33 outputs 3.05MB/output 100 MB, we can produce a random output every 0.6 to 10 seconds Participants Time Total Time Across System Bandwidth Randherd 512 6s >200s >100 MB Aleator 33,000 4s 8s 1 MB 6
7 Naive Random Beacon: Combine all Approach: Combine all random inputs to produce random output Servers 7
8 Naive Random Beacon: Combine all Approach: Combine all random inputs to produce random output Servers R 1 R 2 R n 8
9 Naive Random Beacon: Combine all Approach: Combine all random inputs to produce random output Servers R 1 R 2 Assuming they can agree on everyone s random inputs R n 9
10 Naive Random Beacon: Combine all Approach: Combine all random inputs to produce random output Servers R 1 R 2 Random Output R n 10
11 Naive Random Beacon: Combine all Approach: Combine all random inputs to produce random output Servers R 1 Cannot exclude any random inputs R 2 Random Output R n 11
12 Naive Random Beacon: Combine all Approach: Combine all random inputs to produce random output Problem: Last participant controls random output Servers R 1 R 2 Random Output R n 12
13 Naive Random Beacon: Combine all Approach: Combine all random inputs to produce random output Problem: Last participant controls random output Servers R 1 R 2 13
14 Naive Random Beacon: Combine all Approach: Combine all random inputs to produce random output Problem: Last participant controls random output Servers R 1 R 2 14
15 Naive Random Beacon: Combine all Approach: Combine all random inputs to produce random output Problem: Last participant controls random output Servers R 1 R 2 R x 15
16 Naive Random Beacon: Combine all Approach: Combine all random inputs to produce random output Problem: Last participant controls random output Servers R 1 R 2 Random Output = X R x 16
17 Naive Random Beacon: Commit-then-reveal Approach: Commit-then-reveal random inputs Compute own commitment c 1 = C(R 1 Servers c 2 = C(R 2 c n = C(R n 17
18 Naive Random Beacon: Commit-then-reveal Approach: Commit-then-reveal random inputs Servers c 1 c 2 c n 18
19 Naive Random Beacon: Commit-then-reveal Approach: Commit-then-reveal random inputs Servers c 1, c 2,, c n c 1, c 2,, c n c 1, c 2,, c n 19
20 Naive Random Beacon: Commit-then-reveal Approach: Commit-then-reveal random inputs Servers c 1, c 2,, c n R 1 c 1, c 2,, c n R 2 c 1, c 2,, c n R n 20
21 Naive Random Beacon: Commit-then-reveal Approach: Commit-then-reveal random inputs Verify all Commitments Servers c 1 = C(R 1,, c n = C(R n R 1 c 1 = C(R 1,, c n = C(R n R 2 c 1 = C(R 1,, c n = C(R n R n 21
22 Naive Random Beacon: Commit-then-reveal Approach: Commit-then-reveal random inputs Verify all Commitments Servers c 1 = C(R 1,, c n = C(R n R 1 c 1 = C(R 1,, c n = C(R n R 2 Random Output c 1 = C(R 1,, c n = C(R n R n 22
23 Naive Random Beacon: Commit-then-reveal Approach: Commit-then-reveal random inputs Problem: Dishonest participants refuse to reveal Verify all Commitments Servers c 1 = C(R 1,, c n = C(R n R 1 c 1 = C(R 1,, c n = C(R n R 2 Random Output c 1 = C(R 1,, c n = C(R n R n 23
24 Naive Random Beacon: Commit-then-reveal Approach: Commit-then-reveal random inputs Problem: Dishonest participants refuse to reveal Servers R 1 R 2 24
25 Naive Random Beacon: Commit-then-reveal Approach: Commit-then-reveal random inputs Problem: Dishonest participants refuse to reveal Servers R 1 R 2 25
26 Naive Random Beacon: Commit-then-reveal Approach: Commit-then-reveal random inputs Problem: Dishonest participants refuse to reveal Servers R 1 R 2 No Random Output Produced 26
27 Solution: Use a threshold signature scheme σ 1 σ 2 σ = random output σ n (e.g., DFINITY blockchain 27
28 Solution: Use a threshold signature scheme σ 1 σ 2 σ = random output σ n (e.g., DFINITY blockchain 28
29 Digital Signatures: Motivation Alice Bob M M = Hello, this is Alice. 29
30 Problem: Mallory can pretend to be Alice to Bob Alice Bob M Mallory M = Hello, this is Alice. 30
31 Problem: Mallory can tamper with Alice's messages Alice Bob M M = Hello, this is Alice. Mallory M M = Hello, this is John. 31
32 Solution: Digital Signatures Alice (Diffie-Hellman '76, RSA '78 Bob Alice has her own secret key Bob has Alice s public key 32
33 Solution: Digital Signatures Alice (Diffie-Hellman '76, RSA '78 Bob M = Hello, this is Alice. σ = Sign(M, SK Alice Alice has her own secret key Bob has Alice s public key 33
34 Solution: Digital Signatures Alice (Diffie-Hellman '76, RSA '78 Bob M σ M = Hello, this is Alice. σ = Sign(M, SK Alice Alice has her own secret key Bob has Alice s public key 34
35 Solution: Digital Signatures Alice (Diffie-Hellman '76, RSA '78 Bob M σ M = Hello, this is Alice. σ = Sign(M, SK Alice Alice has her own secret key Verify(σ, M, PK Alice = true Bob has Alice s public key 35
36 Naive Threshold Signatures σ 1 = Sign(M, SK 1 σ 2 = Sign(M, SK 2 σ k = Sign(M, SK k 36
37 Naive Threshold Signatures M σ 1 = Sign(M, SK 1 σ 1 M σ 2 = Sign(M, SK 2 σ 2 M σ k σ k = Sign(M, SK k 37
38 Naive Threshold Signatures M σ 1 Verify(σ 1, M, PK 1 = true σ 1 = Sign(M, SK 1 M σ 2 Verify(σ 2, M, PK 2 = true σ 2 = Sign(M, SK 2 M σ k Verify(σ k, M, PK k = true σ k = Sign(M, SK k 38
39 Naive Threshold Signatures M σ 1 Verify(σ 1, M, PK 1 = true σ 1 = Sign(M, SK 1 σ 2 = Sign(M, SK 2 M σ 2 Verify(σ 2, M, PK 2 = true Too large k signatures Too much time k verifications M σ k Verify(σ k, M, PK k = true σ k = Sign(M, SK k 39
40 Threshold Signatures (Desmedt, CRYPTO 1987 Signature Shares M σ 1 = Sign(M, SK 1 σ 2 = Sign(M, SK 2 σ 1 M σ 2 Verifies signature shares Aggregator M σ Single threshold signature M σ k σ k = Sign(M, SK k 40
41 Threshold Signatures (Desmedt, CRYPTO 1987 Signature Shares M σ 1 = Sign(M, SK 1 σ 1 Verifies signature shares M M σ 2 = Sign(M, SK 2 σ 2 Aggregator σ Single threshold signature One threshold signature One verification M Verify(σ, M, PK = true σ k σ k = Sign(M, SK k 41
42 Random Beacon via Threshold Signatures σ 1 = Sign(M, SK 1 σ 2 = Sign(M, SK 2 Signature Shares M σ 1 M σ 2 Verifies signature shares Leader (Aggregator Participants sign M = current time. M σ Random Output = Single threshold signature M σ k = Sign(M, SK k σ k 42
43 Random Beacon Throughput Random beacon throughput = signature scheme throughput (assuming good network High traffic at leader Multiple leaders more throughput more traffic :( σ 1 σ 2 σ = random output σ n 43
44 Random Beacon: Benefits of Threshold Signatures Original Problems Last participant controls random output Dishonest participants refuse to reveal Addressed using Threshold Signature Scheme Guaranteed to produce a signature, as long as k of the total n servers are honest Each message has a unique threshold signature 44
45 But We Want a Scalable Random Beacon! Servers can be compromised Crucial to have a very large set of servers Can we get a scalable threshold signature scheme? 45
46 Shamir s Secret Sharing Recover secret given k shares 46
47 Shamir s Secret Sharing Recover secret given k shares 1 Point - Point 47
48 Shamir s Secret Sharing Recover secret given k shares 1 Point - Point 2 Points - Line 48
49 Shamir s Secret Sharing Recover secret given k shares 1 Point - Point 2 Points - Line 3 Points - Quadratic 49
50 Lagrange Interpolation for Secret Sharing Current implementations are inefficient Given k points, takes O(k 2 time to recover secret We use some known mathematical tricks to speed this up to O(klog 2 k time Net result: We can aggregate a threshold signature from 100,000 participants in 20 seconds rather than 13 minutes. 50
51 Our Results: Scalable Threshold Signatures Implementation Details: Implemented in C++ Used libff and libntl 51
52 Our Results: Scalable Threshold Signatures Implementation Details: Implemented in C++ Used libff and libntl Machine Details: ASUS ZenBook Core i7-8550u 1.80Ghz 16 GB of RAM Ubuntu LTS running inside VirtualBox r
53 O(k 2 Naive Aggregation Time Time (s Participants 53
54 O(k log 2 k Efficient Aggregation Time Time (s Participants 54
55 O(k 2 Naive Aggregation Time Time (s Participants 55
56 O(k log 2 k Efficient Aggregation Time Time (s Participants 56
57 Threshold Signatures: Not just for Random Beacons Applications to: Consensus algorithms (such as the one used by Bitcoin Securing HTTPs (every time you access a webpage 57
58 Future Work Implement random beacon protocol Threshold signature implementation works Verifying signature shares is computationally expensive We speed it up using batch verification Fast when almost all shares are valid, slow when many are not More parallelization by decreasing traffic Optimistically guess subset of k honest servers 58
59 Acknowledgements I would like to thank: My mentor, Alin Tomescu, for his support and guidance Srini Devadas, for coordinating CS-PRIMES My parents and family MIT-PRIMES program 59
60 Thank you! Questions? 60
Secure Two-party Threshold ECDSA from ECDSA Assumptions. Jack Doerner, Yashvanth Kondi, Eysa Lee, and abhi shelat Northeastern University
Secure Two-party Threshold ECDSA from ECDSA Assumptions Jack Doerner, Yashvanth Kondi, Eysa Lee, and abhi shelat Northeastern University Elliptic Curve Digital Signature Algorithm Digital Signature Algorithm
More informationCompact Multi-Signatures for Smaller Blockchains
Compact Multi-Signatures for Smaller Blockchains Dan Boneh 1, Manu Drijvers 2, Gregory Neven 2 1 Stanford University 2 DFINITY Bitcoin Blockchain and transactions Input 1 Output 1 Input 2 Output 2 Pointer
More informationBitcoin. CS 161: Computer Security Prof. Raluca Ada Poipa. April 24, 2018
Bitcoin CS 161: Computer Security Prof. Raluca Ada Poipa April 24, 2018 What is Bitcoin? Bitcoin is a cryptocurrency: a digital currency whose rules are enforced by cryptography and not by a trusted party
More informationBitcoin. CS 161: Computer Security Prof. Raluca Ada Popa. April 11, 2019
Bitcoin CS 161: Computer Security Prof. Raluca Ada Popa April 11, 2019 What is Bitcoin? Bitcoin is a cryptocurrency: a digital currency whose rules are enforced by cryptography and not by a trusted party
More informationIntroduction to Blockchain Technology
Introduction to Blockchain Technology Current Trends in Artificial Intelligence Volker Strobel PhD student @ IRIDIA 23 February 2017 Part I: Bitcoin: Idea, Basics, Technology Part II: Altcoins, Use cases,
More informationComputer Security. 13. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2018
Computer Security 13. Blockchain & Bitcoin Paul Krzyzanowski Rutgers University Spring 2018 April 18, 2018 CS 419 2018 Paul Krzyzanowski 1 Bitcoin & Blockchain Bitcoin cryptocurrency system Introduced
More informationNovember 2018 Abstract
etxcoin@outlook.com November 2018 Abstract A purely peer-to-peer version of electronic cash scalable and friendly to use would allow online payments to be sent directly from one party to another without
More informationCONTENTS DISCLAIMER... 3 EXECUTIVE SUMMARY... 4 INTRO... 4 ICECHAIN... 5 ICE CHAIN TECH... 5 ICE CHAIN POSITIONING... 6 SHARDING... 7 SCALABILITY...
CONTENTS DISCLAIMER... 3 EXECUTIVE SUMMARY... 4 INTRO... 4 ICECHAIN... 5 ICE CHAIN TECH... 5 ICE CHAIN POSITIONING... 6 SHARDING... 7 SCALABILITY... 7 DECENTRALIZATION... 8 SECURITY FEATURES... 8 CROSS
More informationAnonymity of E-Cash Protocols. Erman Ayday
Anonymity of E-Cash Protocols Erman Ayday Disclaimer It is debatable that anonymous e-cash protocols are also useful for black market and money laundering 2 Bitcoin S. Nakamoto, 2008 A software-based online
More informationBitcoins and Blockchains
Bitcoins and Blockchains 1 Bitcoins? 2 Properties of money Symbolises value Substitutes value Proof of ownership Easy to transfer Agreed upon value Difficult to forge/limited supply Needs little storage
More informationThe BitShares Blockchain
The BitShares Blockchain Introduction Stichting BitShares Blockchain Foundation Zutphenseweg 6 7418 AJ Deventer Netherlands Chamber of Commerce: 66190169 http://www.bitshares.foundation info@bitshares.foundation
More informationBuilding Blockchain Solutions
Provide Authenticity and Trust to all information you create, process, store and distribute Digital Disruption Is Here The application of new digital technologies causes seismic upheavals in all markets:
More informationarxiv: v1 [q-fin.gn] 6 Dec 2016
THE BLOCKCHAIN: A GENTLE FOUR PAGE INTRODUCTION J. H. WITTE arxiv:1612.06244v1 [q-fin.gn] 6 Dec 2016 Abstract. Blockchain is a distributed database that keeps a chronologicallygrowing list (chain) of records
More informationL3. Blockchains and Cryptocurrencies
L3. Blockchains and Cryptocurrencies Alice E. Fischer September 6, 2018 Blockchains and Cryptocurrencies... 1/16 Blockchains Transactions Blockchains and Cryptocurrencies... 2/16 Blockchains, in theory
More informationIn this article, I describe the technology behind Bitcoin s blockchain, and
Blockchain Hype or Hope? RADIA PERLMAN Radia Perlman s work has had a profound impact on how computer networks function today, enabling huge networks, like the Internet, to be robust, scalable, and largely
More informationWorking with Blockchain at Proof of Concept Stage. Ildefonso Olmedo Rebecca Marvell
Working with Blockchain at Proof of Concept Stage Ildefonso Olmedo Rebecca Marvell Innovation If you search the internet for innovation you mostly get lightbulbs Problem with new is that we don t understand
More informationSATURN Blockchain is the answer What was the question again? 14 th Annual SEI Architecture Technology User Network Conference
SATURN 2018 14 th Annual SEI Architecture Technology User Network Conference MAY 7 10, 2018 PLANO, TEXAS Blockchain is the answer What was the question again? Harald Wesenberg Specialist IT Statoil 1 SATURN
More informationSurface Web/Deep Web/Dark Web
Cryptocurrency Surface Web/Deep Web/Dark Web How to Get Data? Where Hacking, Cyber Fraud, and Money Laundering Intersect How to Pay? Digital Currency What is Bitcoin? https://youtu.be/aemv9ukpazg Bitcoin
More informationAn Anonymous Bidding Protocol without Any Reliable Center
Vol. 0 No. 0 Transactions of Information Processing Society of Japan 1959 Regular Paper An Anonymous Bidding Protocol without Any Reliable Center Toru Nakanishi, Toru Fujiwara and Hajime Watanabe An anonymous
More informationThunderella: Blockchains with Optimistic Instant Confirmation. Rafael Pass and Elaine Shi Cornell Tech & Cornell University
Thunderella: Blockchains with Optimistic Instant Confirmation Rafael Pass and Elaine Shi Cornell Tech & Cornell University State-machine replication (a.k.a. linearly ordered log, consensus, blockchain)
More informationCisco Live /11/2016
1 2 3 4 5 Blockchain technology will become Like the TCP / IP for the WWW everyone uses it, but it will be transparent to them. Examples: Disrupt business models Car energy supplier can advertise where
More informationBlockchain Overview. Amr Eid Cloud Architect, Cloud Platform, MEA
Blockchain Overview Amr Eid Cloud Architect, Cloud Platform, MEA amreid@eg.ibm.com History Business / Academic 1991: The first crypto secured chain of blocks How to time-stamp a digital document Bitcoin
More informationDesigning a Dynamic Group Signature Scheme using Lattices
Designing a Dynamic Group Signature Scheme using Lattices M2 Internship Defense Fabrice Mouhartem Supervised by Benoît Libert ÉNS de Lyon, Team AriC, LIP 06/24/2015 Fabrice Mouhartem Dynamic Group Signature
More informationHOW LOW CAN YOU GO? SHORT STRUCTURE-PRESERVING SIGNATURES FOR DIFFIE-HELLMAN VECTORS
HOW LOW CAN YOU GO? SHORT STRUCTURE-PRESERVING SIGNATURES FOR DIFFIE-HELLMAN VECTORS Essam Ghadafi University of the West of England IMA International Conference on Cryptography and Coding 2017 OUTLINE
More informationOn the Balasubramanian-Koblitz Results
On the Balasubramanian-Koblitz Results Palash Sarkar Applied Statistics Unit Indian Statistical Institute, Kolkata India palash@isical.ac.in Institute of Mathematical Sciences, 22 nd February 2012 As Part
More informationDirect Anonymous Attestation & TPM2.0 Getting Provably Secure Crypto into the Real-World. Anja Lehmann IBM Research Zurich
Direct Anonymous Attestation & 2.0 Getting Provably Secure Crypto into the Real-World Anja Lehmann IBM Research Zurich Direct Anonymous Attestation & Trusted Platform Module () Secure crypto processor:
More informationFIT5124 Advanced Topics in Security. Lecture 1: Lattice-Based Crypto. I
FIT5124 Advanced Topics in Security Lecture 1: Lattice-Based Crypto. I Ron Steinfeld Clayton School of IT Monash University March 2016 Acknowledgements: Some figures sourced from Oded Regev s Lecture Notes
More informationPhysical Unclonable Functions (PUFs) and Secure Processors. Srini Devadas Department of EECS and CSAIL Massachusetts Institute of Technology
Physical Unclonable Functions (PUFs) and Secure Processors Srini Devadas Department of EECS and CSAIL Massachusetts Institute of Technology 1 Security Challenges How to securely authenticate devices at
More informationBlockchain Demystified for Business Intelligence Professionals
Blockchain Demystified for Business Intelligence Professionals Jennifer Stirrup Director Data Relish Ltd Jen Stirrup Boutique Consultancy Owner of Data Relish Postgraduate degrees in Artificial Intelligence
More informationCommercial Blockchain Application & Scalability
Commercial Blockchain Application & Scalability JH Kim @2018 theloop @2018 theloop Table of Contents 01. Considerations for blockchain application 02. Case study: KOFIA consortium blockchain 03. Expansion
More informationWIZBL WHITE PAPER 5th Generation of Blockchain Technology. v 0.8 content subject to change 2018 WIZBL. All rights reserved.
WIZBL WHITE PAPER 5th Generation of Blockchain Technology v 0.8 content subject to change 2018 WIZBL. All rights reserved. DISCLAIMER This White Paper is intended to provide general information and is
More informationIntroduction to Blockchains. John Kelsey, NIST
Introduction to Blockchains John Kelsey, NIST Overview Prologue: A chess-by-mail analogy What problem does a blockchain solve? How do they work? Hash chains Deciding what blocks are valid on the chain
More informationBitcoin Blockchain technology. Mihail Nikulin, Co-founder & CTO, Lykke
Bitcoin Blockchain technology Mihail Nikulin, Co-founder & CTO, Lykke What is money? Copy protection consensus Consensus based on top of proof of existence Mining is burning electricity Colored Coins BTC/ETH/Some
More informationApplying Secure Multiparty Computation in ATM
Applying Secure Multiparty Computation in ATM Let s go beyond Secure Information Sharing Massimiliano Zanin Principal researcher Secure Information Sharing If you secure the communication channel, and
More informationInstructor: Daniele Venturi (Slides from a series of lectures by Stefan Dziembowski)
Data Privacy and Security Instructor: Daniele Venturi (Slides from a series of lectures by Stefan Dziembowski) Master Degree in Data Science Sapienza University of Rome Academic Year 2017-2018 Part VII:
More informationDavid Chuum. Centre for Mathematics and Computer Science Kruislaan SJ Amsterdam
Online Cash Checks David Chuum Centre for Mathematics and Computer Science Kruislaan 413 1098SJ Amsterdam INTRODUCTION Savings of roughly an order of magnitude in space, storage, and bandwidth over previously
More informationBitcoin. Based on Bitcoin Tutorial presentation by Joseph Bonneau, Princeton University. Bonneau slides marked JB
Bitcoin Based on Bitcoin Tutorial presentation by Joseph Bonneau, Princeton University Bonneau slides marked JB Bitcoin Snapshot: October 2, 2015 Bitcoin is a combination of several things: a currency,
More informationLevel 2, HTLC, SegWit
Innovation and Cryptoventures Level 2, HTLC, SegWit Campbell R. Harvey Duke University and NBER February 19, 2018 2 Transactions per Second https://en.bitcoin.it/wiki/scalability Visa processes about 2,000
More informationMaking the world more predictable
Making the world more predictable Forwards & Futures Brief Overview Hedge vs. price prediction Wikipedia - A futures contract is a legal agreement, made on the trading floor of a futures exchange, to buy
More informationAuditing in the Crypto-Asset Sector
Auditing in the Crypto-Asset Sector Introduction Many of the reporting issuers in Canada s crypto-asset sector obtained material crypto-asset holdings or engaged in material crypto-mining activity during
More informationHow Blockchain Technology Changes Marketing
How Blockchain Technology Changes Marketing Campbell R. Harvey Duke University and NBER @camharvey Version: May 1, 2018 Agenda Understanding blockchain Impact on marketing Questions Campbell R. Harvey
More informationInvesting in the Blockchain Ecosystem
Introduction When investors hear the term Blockchain, most probably think of cryptocurrencies (which are digital currencies, operated independently from a central bank), with Bitcoin being the most well-known.
More informationAssessing blockchain technology for Transport Data Logger
Assessing blockchain technology for Transport Data Logger BJÖRN JOHANSSON MASTER S THESIS DEPARTMENT OF ELECTRICAL AND INFORMATION TECHNOLOGY FACULTY OF ENGINEERING LTH LUND UNIVERSITY Assessing blockchain
More informationEfficient Fully-Leakage Resilient One-More Signature Schemes Antonio Faonio
SESSION ID: CRYP-R03 Efficient Fully-Leakage Resilient One-More Signature Schemes Antonio Faonio IMDEA Software Institute 1/20 2/20 3/20 Digital Signature - Existential Unforgeability CMA 3/20 Digital
More informationParameters Optimization of Post-Quantum Cryptography Schemes
Parameters Optimization of Post-Quantum Cryptography Schemes Qing Chen ECE 646 Presentation George Mason University 12/18/2015 Problem Introduction Quantum computer, a huge threat to popular classical
More informationMonoxide Scale out Blockchains with Asynchronous Consensus Zones. Jiaping Wang, Hao Wang Sinovation Ventures ICT/CAS The Ohio State University
Monoxide Scale out Blockchains with Asynchronous Consensus Zones Jiaping Wang, Hao Wang Sinovation Ventures ICT/CAS The Ohio State University Public Blockchain State (Ledger) Block t+0 Block t+1 Block
More informationBlockchain Technology for Next Generation ICT
Blockchain Technology for Next Generation ICT Jun Kogure Ken Kamakura Tsunekazu Shima Takekiyo Kubo Blockchain technology, which supports low-cost decentralized distributed data management featuring tamper
More informationMaking Bitcoin Exchanges Transparent
Making Bitcoin Exchanges Transparent James Guthrie Christian Decker, Jochen Seidel, Roger Wattenhofer James Guthrie 24/09/15 1 Introduction James Guthrie 24/09/15 2 Introduction James Guthrie 24/09/15
More informationModified Huang-Wang s Convertible Nominative Signature Scheme
Modified Huang-Wang s Convertible Nominative Signature Scheme Wei Zhao, Dingfeng Ye State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences Beijing 100049, P. R.
More informationA.J. Bahou, LLM, MSECE Bahou Miller PLLC
A.J. Bahou, LLM, MSECE Bahou Miller PLLC AJBahou@BahouMiller.com ISACA and ISC2 December 2017 The views expressed herein are solely the presenter s and do not necessarily reflect any position of Bahou
More informationBlockchain Payments for Everyone
Blockchain Payments for Everyone 01 Mission Mission 01 Mission The Liquidity.Network is a practical blockchain micropayment system, supporting millions of users securely, reducing transaction costs significantly
More informationINTRODUCTION TO THE BLOCKCHAIN ERRIN ICT Working Group Meeting on Blockchain June 13, Javier Prieto IoT Digital Innovation Hub
INTRODUCTION TO THE BLOCKCHAIN ERRIN ICT Working Group Meeting on Blockchain June 13, 2018 Content Bitcoin Beyond bitcoin The blockchain is an incorruptible digital ledger of economic transactions that
More informationAITA. Blockchain Infrastructure Based on Reputation & Sharding. Nov AITA Foundation
AITA Blockchain Infrastructure Based on Reputation & Sharding Nov. 2018 AITA Foundation COMPAMY Fb Tw In CONTENTS. 01 02 03 04 What is AITA? What problem we How we do it? What distinguish us solve? from
More informationSoft Response Generation and Thresholding Strategies for Linear and Feed-Forward MUX PUFs
Soft Response Generation and Thresholding Strategies for Linear and Feed-Forward MUX PUFs Chen Zhou, SarojSatapathy, YingjieLao, KeshabK. Parhiand Chris H. Kim Department of ECE University of Minnesota
More informationA Lattice-Based Group Signature Scheme with Message-Dependent Opening
A Lattice-Based Group Signature Scheme with Message-Dependent Opening Benoît Libert Fabrice Mouhartem Khoa Nguyen École Normale Supérieure de Lyon, France Nanyang Technological University, Singapore ACNS,
More informationMaking Blockchain Real for Business Explained
Making Blockchain Real for Business Explained Jennifer Foley foleyje@us.ibm.com Integration Architect WW Client Center for Systems Innovation V4.0, 14 March 2017 1 Contents is Blockchain? is it relevant
More informationwhitepaper Abstract Introduction Features Special Functionality Roles in DiQi network Application / Use cases Conclusion
whitepaper Abstract Introduction Features Special Functionality Roles in DiQi network Application / Use cases Conclusion Abstract DiQi (pronounced Dee Chi) is a decentralized platform for smart property.
More informationA reprint from American Scientist
A reprint from American Scientist the magazine of Sigma Xi, The Scientific Research Honor Society This reprint is provided for personal and noncommercial use. For any other use, please send a request to
More informationBusiness Primer Last updated: October 27th, 2017
Business Primer Last updated: October 27th, 2017 Table of Contents Background.... 3 Introducing Keep... 4 Applications... 5 Incentives & Token mechanics.. 8 Keep providers... 9 Staking...... 10 Development
More informationDemocratic Cryptocurrency Unity
Democratic Cryptocurrency Unity Cryptocurrencies came to the world in the recent decade and attempted to put a new order where the financial system is not governed by a centralized entity, and where you
More informationBlockchain: Where are We and Where are We Heading?
Blockchain: Where are We and Where are We Heading? Objectives Define the underlying technologies of blockchain Describe some shortcomings of blockchain Describe the accounting profession s interest in
More informationOn a Possible Privacy Flaw in Direct Anonymous Attestation (DAA)
On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA) Adrian Leung 1, Liqun Chen 2, and Chris J. Mitchell 1 1 Information Security Group Royal Holloway, University of London Egham, Surrey, TW20
More informationSignature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions
Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions Benoît Libert 1,2 San Ling 3 Fabrice Mouhartem 1 Khoa Nguyen 3 Huaxiong Wang 3 1 É.N.S. de Lyon, France
More informationBitcoin and why it will change the world
Bitcoin and why it will change the world Luv Khemani What is Bitcoin? Brief History of Bitcoin - Bitcoin Design paper released in 2008 by an annonymous programmer calling himself Satoshi Nakamoto - Bitcoin
More informationA Simple Overview of Blockchains
A Simple Overview of Blockchains Why They Are Important to the Cable Industry A Technical Paper prepared for SCTE/ISBE by Steve Goeringer Principal Architect CableLabs 858 Coal Creek Circle Louisville,
More informationZero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures without Trapdoors
Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures without Trapdoors Benoît Libert 1 San Ling 2 Khoa Nguyen 2 Huaxiong Wang 2 1 Ecole Normale
More informationKatherine, I gave him the code. He verified the code. But did you verify him? The Numbers Station (2013)
Is a forged signature the same sort of thing as a genuine signature, or is it a different sort of thing? Gilbert Ryle (1900 1976), The Concept of Mind (1949) Katherine, I gave him the code. He verified
More informationThe Blockchain Technology
The Blockchain Technology Mooly Sagiv Tel Aviv University http://www.cs.tau.ac.il/~msagiv/courses/blockchain.html msagiv@acm.org Advisory Board Shelly Grossman Noam Rinetzky Ittai Abraham Guy Golan-Gueta
More informationBlockchain and the Maritime Industry
MARCH 2018 Blockchain and the Maritime Industry An introduction We will look at A review of the current transactional ecosystem The blockchain concept Smart contracts Q&A Current Shipping Transactional
More informationRepublic Protocol. A decentralized dark pool exchange providing atomic swaps for Ethereum-based assets and Bitcoin.
Republic Protocol A decentralized dark pool exchange providing atomic swaps for Ethereum-based assets and Bitcoin. December 18, 2017 Taiyang Zhang, Loong Wang Abstract The market capitalization and trading
More informationHow We Can Expand the Utilization of Blockchain Technology: Security and Use Case Perspective
How We Can Expand the Utilization of Blockchain Technology: Security and Use Case Perspective June 22, 2018 Toshiya Cho Senior Evangelist / Managing Director Financial Information Systems Sales Management
More informationProduct Overview. A technical overview of xcurrent. October 2017
Product Overview A technical overview of xcurrent October 2017 4 Product Overview 6 How It Works 15 Reference Architecture 17 About Ripple One frictionless experience to send money globally A consistent
More informationTable of contents. 2
Whitepaper Table of contents Table of contents... 2 Overview... 3 TrillionToken... 3 Sports Betting Platform... 3 Cryptocurrency... 3 Blockchain technology... 3 Ethereum network... 5 TrillionToken token...
More informationThe Blockchain Trevor Hyde
The Blockchain Trevor Hyde Bitcoin I Bitcoin is a cryptocurrency introduced in 2009 by the mysterious Satoshi Nakomoto. I Satoshi Nakomoto has never been publicly identified. Bitcoin Over the past year
More informationA FINANCIAL ENGINE [ A DECENTRALIZED FINANCIAL SYSTEM ]
A FINANCIAL ENGINE [ A DECENTRALIZED FINANCIAL SYSTEM ] ABSTRACT A purely peer-to-peer mechanism to structure contractual relationships would allow mutually distrusting parties to draft contracts without
More informationMcKesson Radiology 12.0 Web Push
McKesson Radiology 12.0 Web Push The scenario Your institution has radiologists who interpret studies using various personal computers (PCs) around and outside your enterprise. The PC might be in one of
More informationBitcoin & Blockchains. Landscape & Future Directions Jeremy Clark
Bitcoin & Blockchains Landscape & Future Directions Jeremy Clark Jeremy Clark Assistant Professor at the Concordia Institute for Information Systems Engineering (CIISE) in Montreal PhD from the University
More informationUniversal Payment Channels
Universal Payment Channels Jehan Tremback, Zack Hess jehan.tremback@gmail.com, zack.bitcoin@gmail.com November 2015 v0.5 Abstract This paper concerns a payment network called Universal Payment Channels,
More informationBlockchain made Simple
Blockchain made Simple Rhonda Okamoto, Blockchain & Cryptocurrency Enthusiast rhondaokamoto@gmail.com 609-433-1442 What is Blockchain? When and Where is Blockchain useful? What is the difference between
More informationSecure E-Auction For Mobile Users With Low-Capability Devices In Wireless Network
Secure E-Auction For Mobile Users With Low-Capability Devices In Wireless Network Kun Peng Institute for Infocomm Research Abstract. The existing secure e-auction schemes are shown to be too costly for
More informationCSCI 1800 Cybersecurity and International Relations. Bitcoins and Blockchains John E. Savage
CSCI 1800 Cybersecurity and International Relations Bitcoins and Blockchains John E. Savage Overview of the Talk We describe the bitcoin system, which supports monetary exchange without a central authority
More informationTHE LEGAL BACKBONE FOR THE INTERNET OF AGREEMENTS
THE LEGAL BACKBONE FOR THE INTERNET OF AGREEMENTS MATTEREUM IS A BLOCKCHAIN PLATFORM, SUPPORTED BY INDEPENDENT ARBITRATION, FOR THE AUTOMATION OF COMMERCIAL AGREEMENTS USING LEGALLY ENFORCEABLE SMART CONTRACTS.
More informationAnne Bracy CS 3410 Computer Science Cornell University
Anne Bracy CS 3410 Computer Science Cornell University These slides are the product of many rounds of teaching CS 3410 by Professors Weatherspoon, Bala, Bracy, and Sirer. Complex question How fast is the
More informationBlockchain for the Enterprise. BTL Interbit Interbit: Blockchain for the Enterprise 1
Blockchain for the Enterprise BTL Interbit Interbit: Blockchain for the Enterprise 1 This introductory paper aims to help demystify blockchain technology and describe how BTL Group s enterprise-grade blockchain
More informationBlockchains in a Big Data World. Trent McConaghy
Blockchains in a Big Data World Trent McConaghy The modern cloud application stack Applications Processing File System Database Along came Bitcoin The modern cloud application stack with Bitcoin Partly-Decentralized
More informationA NEW STRONG PROACTIVE VERIFIABLE SECRET SHARING SCHEME WITH UNCONDITIONAL SECURITY
A NEW STRONG PROACTIVE VERIFIABLE SECRET SHARING SCHEME WITH UNCONDITIONAL SECURITY A THESIS IN Computer Science Presented to the Faculty of the University of Missouri-Kansas City in partial fulfillment
More informationAnthony O Dowd IBM Blockchain Labs V3.3, 12 July 16
Making Blockchain Real for Business Explained Anthony O Dowd IBM Blockchain Labs V3.3, 12 July 16 Page 1 Contents is Blockchain? is it relevant for our business? can IBM help us apply Blockchain? Page
More informationSignature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions
Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions Benoît Libert 1,2 San Ling 3 Fabrice Mouhartem 1 Khoa Nguyen 3 Huaxiong Wang 3 1 É.N.S. de Lyon, France
More informationBlockchain 2.0: Smart Contracts
Blockchain 2.0: Smart Contracts Karan Bharadwaj August 7, 2016 The relevance of blockchain technology to the financial world has grown substantially over the last few years. An important aspect of the
More informationBlockchain and Risk ISACA Northern UK, April 20 th, Mike Small CEng, FBCS, CITP Senior Analyst Kuppinger Cole
Blockchain and Risk ISACA Northern UK, April 20 th, 2016 Mike Small CEng, FBCS, CITP Senior Analyst Kuppinger Cole Mike.Small@kuppingercole.com Agenda Mike Small KuppingerCole Trust and Integrity The Bitcoin
More informationNew Kids on the Blockchain: RIM Blockchain Applications Today & Tomorrow
New Kids on the Blockchain: RIM Blockchain Applications Today & Tomorrow Q. Scott Kaye, Partner, Rimon Law John Isaza, Information Governance Solutions, LLC AGENDA What is Blockchain? How it works Forming
More informationBitcoin Lightening Network: a Distributed Network for Scalability of Bitcoin. Shahla Atapoor
Bitcoin Lightening Network: a Distributed Network for Scalability of Bitcoin Shahla Atapoor Supervised by Prof. Eero Vainikko University of Tartu, Estonia shahla.atapoor@ut.ee January 3, 2019 Abstract
More informationBlockchain in Healthcare
Blockchain in Healthcare Presented to the Kentucky HFMA Chapter Tom Skoog, Principal July 19, 2018 What are Blockchain and Bitcoin and How Can They Be Used? Bitcoin and Blockchain - - what s the difference
More informationBlockchain and the possible impact on testing. New technology needs new testing?
Specialisten in vooruitgang Blockchain and the possible impact on testing. New technology needs new testing? Jeroen Rosink TestCon Vilnius October 18 th 2018 Software testen Business Process Transformation
More informationResearch Faculty Summit Systems Fueling future disruptions
Research Faculty Summit 2018 Systems Fueling future disruptions BlockchainDB Towards a Shared Database on Blockchains Carsten Binnig Data Management Lab, TU Darmstadt Blockchains: A Shared Database? Client
More informationPractical Divisible E-Cash
Practical Divisible E-Cash Patrick Märtens Mathematisches Institut, Justus-Liebig-Universität Gießen patrickmaertens@gmx.de April 9, 2015 Abstract. Divisible e-cash systems allow a user to withdraw a wallet
More information21 st Geneva Report on the World Economy. Peterson Institute Presentation September 26, 2018
21 st Geneva Report on the World Economy Peterson Institute Presentation September 26, 2018 1 Satoshi Nakamoto: Bitcoin P2P e-cash paper October 31, 2008 I've been working on a new electronic cash system
More informationTransforming Industries Through Blockchain Innovations
Transforming Industries Through Blockchain Innovations MARC TAVERNER BITFURY GLOBAL AMBASSADOR BLOCKCHAINEXPO, Oman, May 2 nd 2018 GLOBAL BLOCKCHAIN TECHNOLOGY COMPANY WITH A REALLY SIMPLE PURPOSE MAKE
More informationBlockchain and Bitcoin: Impact on Insurance Industry
Blockchain and Bitcoin: Impact on Insurance Industry ACLI Financial & Investment Roundtable Sea Island, Georgia Edmund J. Zaharewicz Shareholder Carlton Fields Jorden Burt, P.A. March 19, 2018 The views
More informationUse of the Proof-of-Stake Algorithm for Distributed Consensus in Blockchain Protocol for Cryptocurrency
University of Connecticut OpenCommons@UConn Honors Scholar Theses Honors Scholar Program Spring 4-27-2018 Use of the Proof-of-Stake Algorithm for Distributed Consensus in Blockchain Protocol for Cryptocurrency
More information