A Standalone FPGA-Based Miner for Lyra2rev2 Cryptocurrencies

Total Page:16

File Type:pdf, Size:1020Kb

A Standalone FPGA-Based Miner for Lyra2rev2 Cryptocurrencies 1 A Standalone FPGA-based Miner for Lyra2REv2 Cryptocurrencies Jean-Franc¸ois Tetuˆ ∗, Louis-Charles Trudeau∗, Michiel Van Beirendonck∗, Alexios Balatsoukas-Stimming, Member, IEEE, and Pascal Giard, Senior Member, IEEE Abstract—Lyra2REv2 is a hashing algorithm that consists of a resource was used to construct them before they get accepted chain of individual hashing algorithms, and it is used as a proof- into the chain. For example, the employed function can be of-work function in several cryptocurrencies. The most crucial limited by the available processing power, the available mem- and exotic hashing algorithm in the Lyra2REv2 chain is a specific instance of the general Lyra2 algorithm. This work presents ory, or the network bandwidth and latency. Cryptocurrencies the first hardware implementation of the specific instance of typically use functions that are limited by the available pro- Lyra2 that is used in Lyra2REv2. Several properties of the cessing power, the most common approach being that random aforementioned algorithm are exploited in order to optimize the numbers are appended to a block until its cryptographic hash design. In addition, an FPGA-based hardware implementation of meets a certain condition (e.g., some of its most-significant a standalone miner for Lyra2REv2 on a Xilinx Multi-Processor System on Chip is presented. The proposed Lyra2REv2 miner is bits are equal to 0). The chain with the most cumulative PoW shown to be significantly more energy efficient than both a GPU is accepted as the correct one, so that an attacker must control and a commercially available FPGA-based miner. Finally, we also more than half of the active processing power on the network explain how the simplified Lyra2 and Lyra2REv2 architectures to perform a double-spend attack. This is unlikely to happen can be modified with minimal effort to also support the recent in practice if the processing power is large enough and is Lyra2REv3 chained hashing algorithm. owned by non-colluding entities. Processing nodes that help Index Terms—Lyra2, Lyra2REv2, Lyra2REv3, hardware to compute the hashes of new blocks are called miners, and miner, FPGA miner, MPSoC miner, cryptocurrency are rewarded with a fraction of the cryptocurrency when a new block is accepted into the blockchain. I. INTRODUCTION The first cryptocurrency, i.e., Bitcoin [2], was initially mined ECENTLY, there has been a surge in the popularity of using desktop CPUs. Then, GPUs were used to significantly R cryptocurrencies, which are digital currencies that enable increase the hashing speed. Eventually, GPU mining was out- transactions through a decentralized consensus mechanism. paced by FPGA miners, which were in turn surpassed by ASIC Most cryptocurrencies are based on a blockchain, which is an miners. Nowadays, the majority of the computing power on the ever-growing list of transactions that are grouped in blocks. Bitcoin network is found in large ASIC farms, each operated Individual blocks in the chain are linked together using a by a single entity, which makes the decentralized nature of cryptographic hash of the previous block, which ensures resis- Bitcoin debatable. To solve this issue, new PoW algorithms tance against modifications, and every transaction is digitally have been proposed that aim to be ASIC-resistant. ASIC signed, typically by using public-key cryptography. Various resistance is achieved by using hashing algorithms that are mechanisms are used in order to deter denial-of-service attacks highly serial, memory-intensive, and parameterizable so that a and, in particular, double-spending attacks where the same manufactured ASIC can easily be made obsolete by changing digital coin is used in multiple concurrent transactions. Many some of the parameters. Since the cost of manufacturing new ASICs whenever some parameters change is prohibitive, arXiv:1905.08792v2 [cs.CR] 29 Jan 2020 popular cryptocurrencies, incuding Bitcoin [2], use a proof-of- work (PoW) mechanism, which was first proposed in [3] to GPU mining of ASIC-resistant cryptocurrencies is generally combat the problem of junk mail. The proof-of-stake (PoS) and much more low-risk and cost-effective. A prime example of proof-of-burn (PoB) mechanisms are other notable proposals. an ASIC-resistant hashing algorithm is Lyra2REv2 (and its The PoW system requires that new blocks provide proof recently introduced Lyra2REv3 modification), which is used that a function that requires a significant amount of a limited by MonaCoin [4], Verge [5], Vertcoin [6], and some smaller cryptocurrencies. The chained structures of Lyra2REv2 and ∗Equally contributing authors presented in alphabetical order. Lyra2REv3 are shown in Fig. 1 and Fig. 2, respectively. J.-F. Tetuˆ and L.-C. Trudeau were with and P. Giard is with the LaCIME, The BLAKE [7], Keccak [8], Skein [9], Blue Midnight Wish Ecole´ de technologie superieure´ (ETS), Montreal, QC, Canada (e-mails: [email protected], [email protected], [email protected]). (BMW) [10], and CubeHash [11] hashing algorithms are well- M. Van Beirendonck is with imec-COSIC KU Leuven, Leuven, Belgium known and have been studied heavily, both from theoretical (e-mail: [email protected]). and hardware-implementation perspectives (e.g., [12]–[15]), A. Balatsoukas-Stimming is with the Telecommunications Circuits Lab- oratory, Ecole´ polytechnique fed´ erale´ de Lausanne (EPFL), Lausanne, VD, as they were all candidates in the SHA-3 competition. On Switzerland and with the Department of Electrical Engineering, Eind- the other hand, to the best of our knowledge, apart from hoven University of Technology, Eindhoven, The Netherlands (e-mail: our own previous work [1], no hardware implementation of [email protected]). Parts of this work were presented at the 2019 IEEE International Sympo- the simplified Lyra2 and Lyra2MOD versions of Lyra2 [16], sium on Circuits and Systems in Sapporo, Japan [1]. [17] as used in the Lyra2REv2 and Lyra2REv3 algorithms, 2 BLAKE-256 Keccak-256 CubeHash-256 BLAKE-256 Lyra2MOD Lyra2 CubeHash-256 BMW-256 CubeHash-256 Skein-256 BMW-256 Lyra2MOD Fig. 1. The Lyra2REv2 chained hashing algorithm. Fig. 2. The Lyra2REv3 chained hashing algorithm. respectively, have been reported in the literature. One potential issue with ASIC-resistant cryptocurrencies TABLE I CONTENTS OF THE BITCOIN BLOCK HEADER is that GPUs are generally much less energy efficient than ASICs, meaning that a massive adoption of ASIC-resistant Bytes Name cryptocurrencies would significantly increase the (already very 4 version high) energy consumption of cryptocurrency mining. FPGA- 32 previous block header hash 32 merkle root hash based miners, on the other hand, are flexible, energy efficient, 4 time and readily available to the general public at reasonable prices. 4 nBits Thus, provided that public and user-friendly FPGA-based 4 nonce miners become available, we believe that FPGAs are in fact an attractive platform for ASIC-resistant cryptocurrencies that should not be shunned by the community. A. Proof of Work Contributions: This work presents the first FPGA im- In order to explain the PoW concept in more detail, plementation of the simplified Lyra2 hashing algorithm as we use Bitcoin as an example [18], but it is important to used in Lyra2REv2. Moreover, contrary to our previous work note that many other Bitcoin-derived cryptocurrencies, such [1] which only contained an implementation of the Lyra2 as MonaCoin and Vertcoin, use the same structure. Each core, in this work we describe an FPGA-based hardware block in the Bitcoin blockchain has an 80-byte (or 640-bit) implementation of a fully functional standalone Lyra2REv2 header that contains information about the block, as shown miner on a Xilinx Multi-Processor System on Chip (MPSoC). in Table I. The version field dictates which version of the While we do not provide explicit implementation results for block validation rules needs to be followed. The previous Lyra2MOD or for a Lyra2REv3 chain, which is currently only block header hash and merkle root hash contain used by the (somewhat less popular) Vertcoin cryptocurrency, hashes of the headers of previous blocks to ensure that no we explain in detail how the presented architecture can be previous transaction in the blockchain can be modified without modified correspondingly. We present post-layout results for a also modifying the header of the current block. The time Xilinx MPSoC for the complete standalone Lyra2REv2 miner field contains the Unix epoch at which each miner started as well as for the individual hashing cores. These results performing the PoW, which must be strictly greater than the show that the proposed Lyra2REv2 hardware architecture can median time of the previous 11 blocks. The nBits and achieve a hashing throughput of 31.25 MHash/s with an energy nonce fields are the most relevant to the PoW. Specifically, efficiency that is up to 4.3 times better than existing solutions nBits defines a 256-bit numerical value using an encoding at 0.80 µJ/Hash, while requiring approximately 85% of the explained in [18], while nonce can be chosen freely by programmable logic (PL) resources of the MPSoC. the miner. The PoW that each miner performs amounts to Outline: The remainder of this paper is organized as fol- finding a value for nonce so that a (chained) hash function lows. Section II provides the necessary background for the of the header has a numerical value that is strictly smaller than PoW concept and for the Lyra2 algorithm. Section III gives an the target threshold defined by nBits. Since hash functions in-depth explanation of the simplifications that Lyra2REv2 and possess the property of preimage resistance, i.e., they are not Lyra2REv3 make to the generic Lyra2 algorithm. The hard- invertible, this can only be achieved by testing a very large ware implementations of the simplified Lyra2 and Lyra2MOD number of nonce values until the target threshold is satisfied.
Recommended publications
  • Coinbase Explores Crypto ETF (9/6) Coinbase Spoke to Asset Manager Blackrock About Creating a Crypto ETF, Business Insider Reports
    Crypto Week in Review (9/1-9/7) Goldman Sachs CFO Denies Crypto Strategy Shift (9/6) GS CFO Marty Chavez addressed claims from an unsubstantiated report earlier this week that the firm may be delaying previous plans to open a crypto trading desk, calling the report “fake news”. Coinbase Explores Crypto ETF (9/6) Coinbase spoke to asset manager BlackRock about creating a crypto ETF, Business Insider reports. While the current status of the discussions is unclear, BlackRock is said to have “no interest in being a crypto fund issuer,” and SEC approval in the near term remains uncertain. Looking ahead, the Wednesday confirmation of Trump nominee Elad Roisman has the potential to tip the scales towards a more favorable cryptoasset approach. Twitter CEO Comments on Blockchain (9/5) Twitter CEO Jack Dorsey, speaking in a congressional hearing, indicated that blockchain technology could prove useful for “distributed trust and distributed enforcement.” The platform, given its struggles with how best to address fraud, harassment, and other misuse, could be a prime testing ground for decentralized identity solutions. Ripio Facilitates Peer-to-Peer Loans (9/5) Ripio began to facilitate blockchain powered peer-to-peer loans, available to wallet users in Argentina, Mexico, and Brazil. The loans, which utilize the Ripple Credit Network (RCN) token, are funded in RCN and dispensed to users in fiat through a network of local partners. Since all details of the loan and payments are recorded on the Ethereum blockchain, the solution could contribute to wider access to credit for the unbanked. IBM’s Payment Protocol Out of Beta (9/4) Blockchain World Wire, a global blockchain based payments network by IBM, is out of beta, CoinDesk reports.
    [Show full text]
  • A Survey on Volatility Fluctuations in the Decentralized Cryptocurrency Financial Assets
    Journal of Risk and Financial Management Review A Survey on Volatility Fluctuations in the Decentralized Cryptocurrency Financial Assets Nikolaos A. Kyriazis Department of Economics, University of Thessaly, 38333 Volos, Greece; [email protected] Abstract: This study is an integrated survey of GARCH methodologies applications on 67 empirical papers that focus on cryptocurrencies. More sophisticated GARCH models are found to better explain the fluctuations in the volatility of cryptocurrencies. The main characteristics and the optimal approaches for modeling returns and volatility of cryptocurrencies are under scrutiny. Moreover, emphasis is placed on interconnectedness and hedging and/or diversifying abilities, measurement of profit-making and risk, efficiency and herding behavior. This leads to fruitful results and sheds light on a broad spectrum of aspects. In-depth analysis is provided of the speculative character of digital currencies and the possibility of improvement of the risk–return trade-off in investors’ portfolios. Overall, it is found that the inclusion of Bitcoin in portfolios with conventional assets could significantly improve the risk–return trade-off of investors’ decisions. Results on whether Bitcoin resembles gold are split. The same is true about whether Bitcoins volatility presents larger reactions to positive or negative shocks. Cryptocurrency markets are found not to be efficient. This study provides a roadmap for researchers and investors as well as authorities. Keywords: decentralized cryptocurrency; Bitcoin; survey; volatility modelling Citation: Kyriazis, Nikolaos A. 2021. A Survey on Volatility Fluctuations in the Decentralized Cryptocurrency Financial Assets. Journal of Risk and 1. Introduction Financial Management 14: 293. The continuing evolution of cryptocurrency markets and exchanges during the last few https://doi.org/10.3390/jrfm years has aroused sparkling interest amid academic researchers, monetary policymakers, 14070293 regulators, investors and the financial press.
    [Show full text]
  • BGX Bluepaper MOCK
    ABSTRACT V 1.0 2018.03.27 BGX Blue Paper, v 3.0 Breaking Down of the BGX Platform Technology BGX_BLUEPAPER_3.0 0 ABSTRACT V 3.0 2019.01.09 ABSTRACT This document describes the technological understanding of the BGX Platform, the integrative distributed ledger for a new generation of business networks. The first open- source distributed ledger focusing on digital assets, BGX provides a seamless and easy integration between businesses – using decentralization to construct shared economic mini-ecosystems. The core differentiators of the transformative BGX distributed network is the hierar- chal topology of nodes, the ability to exchange digital assets in reloadable transactions, not just currency, the anchoring of the system, its unique API capabilities, and the dual token system. Among particular importance is the F-BFT Consensus that enables the hierarchal topology, as well as unlimited horizontal and vertical scalability of the network’s through- put. The data processed by the network is placed in a special structure of the DAG (Di- rected Acyclic Graph) instead of blocks; it has the ability to grow in several directions simultaneously, unlike a blockchain. The main theses of the presented model: • Commitment to open and decentralized solutions that allow the use of tech- nology for the benefit of society, aimed at safety and free use; • The main technological solutions essentially depend on the business model and the customer value proposition, the technology and architecture should be maximally harmonized with business priorities; • There is no universal panacea for building the architecture of a modern dis- tributed technological system; to build sustainable solutions, it is necessary to find a compromise between scaling, security, decentralization and the cost of the solution; • The blockchain revolution continues, in addition to popular first-generation networks such as Ethereum and Blockchain, advanced solutions such as IOTA, HASHGRAPH / HEDERA and STELLAR appear.
    [Show full text]
  • List of Cryptoassets That Can Be Legally Traded in Indonesia
    List of Cryptoassets That Can Be Legally Traded in Indonesia Approved cryptoassets under Bappebti Regulation No. 7 of 2020 regarding the Stipulation of the List of Cryptoassets that Are Allowed to Be Traded in the Cryptoasset Physical Market. 1. Bitcoin 81. Verge 161. Storm 2. Ethereum 82. Pax gold 162. Vertcoin 3. Tether 83. Matic network 163. Ttc 4. Xrp/ripple 84. Kava 164. Metadium 5. Bitcoin cash 85. Komodo 165. Pumapay 6. Binance coin 86. Steem 166. Nav coin 7. Polkadot 87. Aelf 167. Dmarket 8. Chainlink 88. Fantom 168. Spendcoin 9. Lightcoin 89. Horizen 169. Tael 10. Bitcoin sv 90. Ardor 170. Burst 11. Litecoin 91. Hive 171. Gifto 12. Crypto.com coin 92. Enigma 172. Sentinel protocol 13. Usd coin 93. V. Systems 173. Quantum resistant ledger 14. Eos 94. Z coin 174. Digix gold token 15. Tron 95. Wax 175. Blocknet 16. Cardano 96. Stratis 176. District0x 17. Tezos 97. Ankr 177. Propy 18. Stellar 98. Ark 178. Eminer 19. Neo 99. Syscoin 179. Ost 20. Nem 100. Power ledger 180. Steamdollar 21. Cosmos 101. Stasis euro 181. Particl 22. Wrapped bitcoin 102. Harmony 182. Data 23. Iota 103. Pundi x 183. Sirinlabs 24. Vechain 104. Solve.care 184. Tokenomy 25. Dash 105. Gxchain 185. Digitalnote 26. Ehtereum classic 106. Coti 186. Abyss token 27. Yearn.finance 107. Origin protokol 187. Cake 28. Theta 108. Xinfin network 188. Veriblock 29. Binance usd 109. Btu protocol 189. Hydro 30. Omg network 110. Dad 190. Viberate 31. Maker 111. Orion protocol 191. Rupiahtoken 32. Ontology 112. Cortex 192.
    [Show full text]
  • How Global Is the Cryptocurrency Market?
    How Global Is The Cryptocurrency Market? Gina C. Pieters Trinity University, Economics Department, San Antonio, Texas, USA University of Cambridge, Judge Business School|Cambridge Centre for Alternative Finance, UK Abstract Despite the size and global reach of crypto-markets we dont know how much individual countries have invested in cryptos (market exposure), what share of the market individual countries account for (market power), or how those two measures are related. Movements originating in high market power countries will impact high exposure countries, representing a new channel for financial contagion. This paper constructs multiple estimates of exposure and power, using purchases by state-issued currencies and including adjustments to account for the purchase of cryptocurrencies by other cryptocurrencies. All measures find that the market is highly concentrated in just three currencies|the US dollar, the South Korean Won, and the Japanese Yen account for over 90% of all crypto transactions. Market expo- sure and market power cannot be explained by economic size, income, financial openness, domestic stock market size, or internet access. This analysis also reveals that a country's Bitcoin market share is not representative of a country's crypto-market share: a warning for regulators or researchers focused exclusively on Bitcoin markets. Keywords: Bitcoin; Cryptocurrencies; International Asset Market. JEL Codes: E50, F20, F33, G15 Email address: [email protected] ( Gina C. Pieters) 1. Introduction The FSB's initial assessment is that crypto-assets do not pose risks to global financial stability at this time. This is in part because they are small relative to the financial system. Even at their recent peak, their combined global market value was less than 1% of global GDP.
    [Show full text]
  • Next Steps in the Evolution of Decentralized Oracle Networks
    Chainlink 2.0: Next Steps in the Evolution of Decentralized Oracle Networks Lorenz Breidenbach1 Christian Cachin2 Benedict Chan1 Alex Coventry1 Steve Ellis1 Ari Juels3 Farinaz Koushanfar4 Andrew Miller5 Brendan Magauran1 Daniel Moroz6 Sergey Nazarov1 Alexandru Topliceanu1 Florian Tram`er7 Fan Zhang8 15 April 2021 v1.0 1Chainlink Labs 2The author is a faculty member at University of Bern. He co-authored this work in his separate capacity as an advisor to Chainlink Labs. 3The author is a faculty member at Cornell Tech. He co-authored this work in his separate capacity as Chief Scientist at Chainlink Labs. 4The author is a faculty member at University of California, San Diego. She co-authored this work in her separate capacity as an advisor to Chainlink Labs. 5The author is a faculty member at University of Illinois Urbana-Champaign. He co-authored this work in his separate capacity as an advisor on Chainlink. 6The author is a PhD candidate at Harvard University. He co-authored this work while on leave from Harvard, in his capacity as a researcher at Chainlink Labs. 7The author is a PhD candidate at Stanford University. He co-authored this work in his separate capacity as an advisor to Chainlink Labs. 8The author will be joining the faculty of Duke University in fall 2021. He co-authored this work in his current capacity as a researcher at Chainlink Labs. 1 Abstract In this whitepaper, we articulate a vision for the evolution of Chainlink be- yond its initial conception in the original Chainlink whitepaper. We foresee an increasingly expansive role for oracle networks, one in which they comple- ment and enhance existing and new blockchains by providing fast, reliable, and confidentiality-preserving universal connectivity and off-chain computation for smart contracts.
    [Show full text]
  • A General Taxonomy for Cryptographic Assets
    bravenewcoin.com Table of contents 3 About 4 Foreword 5 Author Profile 6 General Taxonomy: An Overview 7 General Taxonomy Structure 8 Section I: Cryptographic Assets – The new ‘Superclass’ 14 Section II: General Taxonomy Key Metrics for General Crypto Assets 19 Section III: General Taxonomy for Cryptographic Assets Visualization 24 References 25 Contact About Brave New Coin Brave New Coin’s mission is to be the leader in delivering the most accurate, accessible, and comprehensive blockchain data solutions and insights, in ways that anticipate and respond to the needs of an evolving market. BNC is committed to providing the type of trusted information, technical analysis and research that will empower and inform stakeholders across the cryptographic asset marketplace. To that end, The General Taxonomy for Cryptographic Assets has been curated to deliver on the goal of a comprehensive asset classification system which provides a common frame-of-reference for all sector participants. Foreword Today the cryptographic asset sector’s market capitalization is in the hundreds of billions, with a rapidly evolving user community. Since establishing Brave New Coin in 2014 it has been our goal to provide the data, tools and insights needed to support this market as it matures into a dominant asset class. BNC has created the General Taxonomy in response to community requests for greater sector transparency and a uniform classification system for the ever-expanding universe of cryptographic assets. Its intended audience is: Asset Managers Regulators Product Owners Researchers Developers Industry Executives At BNC we want to support an engaged user community and we encourage you to explore, share and utilize the General Taxonomy you see fit.* Finally, I want to add that this document is just the beginning and we welcome your feedback on how we can continue to improve the taxonomy and its relevance to you and your industry sector.
    [Show full text]
  • Momentum/Contrarian Strategy and Volatility of Cryptocurrencies
    Erasmus School of Economics Bachelor Thesis International Bachelor of Economics and Business Economics Momentum/Contrarian Strategy and Volatility of Cryptocurrencies Li Huang, B.Sc. Candidate, CFA Level I Passed Student ID: 428126lh Supervisor: Assistant Professor Laurens Swinkels, Ph.D. Co-assessor: Jorn Zenhorst, Ph.D. 28/08/2018 1 Contents 1. Introduction ............................................................................................................. 3 2. Literature Review .................................................................................................. 10 3. Data and Methodology ......................................................................................... 16 3.1 Cross-Sectional Momentum and Contrarian...................................................... 16 3.2 Time Series Momentum and Contrarian ......................................................... 21 i). Basic Regression .............................................................................................. 21 ii). Sign Regression .............................................................................................. 24 iii). Historical Profitability .................................................................................... 25 3.3 Variance Determination ..................................................................................... 27 3.4 Factors for Variance Prediction .......................................................................... 33 4. Results .....................................................................................................................
    [Show full text]
  • Blockchain Characteristics and the Cross-Section of Cryptocurrency Returns
    DISCUSSION PAPER SERIES DP13724 (v. 8) Blockchain Characteristics and the Cross-Section of Cryptocurrency Returns Siddharth Bhambhwani, Stefanos Delikouras and George Korniotis FINANCIAL ECONOMICS ISSN 0265-8003 Blockchain Characteristics and the Cross-Section of Cryptocurrency Returns Siddharth Bhambhwani, Stefanos Delikouras and George Korniotis Discussion Paper DP13724 First Published 09 May 2019 This Revision 23 July 2021 Centre for Economic Policy Research 33 Great Sutton Street, London EC1V 0DX, UK Tel: +44 (0)20 7183 8801 www.cepr.org This Discussion Paper is issued under the auspices of the Centre’s research programmes: Financial Economics Any opinions expressed here are those of the author(s) and not those of the Centre for Economic Policy Research. Research disseminated by CEPR may include views on policy, but the Centre itself takes no institutional policy positions. The Centre for Economic Policy Research was established in 1983 as an educational charity, to promote independent analysis and public discussion of open economies and the relations among them. It is pluralist and non-partisan, bringing economic research to bear on the analysis of medium- and long-run policy questions. These Discussion Papers often represent preliminary or incomplete work, circulated to encourage discussion and comment. Citation and use of such a paper should take account of its provisional character. Copyright: Siddharth Bhambhwani, Stefanos Delikouras and George Korniotis Blockchain Characteristics and the Cross-Section of Cryptocurrency Returns Abstract We show that cryptocurrency returns relate to asset pricing factors derived from two blockchain characteristics, growth in aggregate computing power and network size. Consistent with theoretical models, cryptocurrency returns have positive risk exposures to these blockchain-based factors, which carry positive risk prices.
    [Show full text]
  • Blockchain Consensus Algorithms: a Survey
    1 Blockchain Consensus Algorithms: A Survey Md Sadek Ferdous, Member, IEEE, Mohammad Jabed Morshed Chowdhury, Mohammad A. Hoque, Member, IEEE, and Alan Colman F Abstract—In recent years, blockchain technology has received unpar- of Bitcoin [1] that was introduced in 2008. While crypto- alleled attention from academia, industry, and governments all around currencies have emerged as the principal and the most pop- the world. It is considered a technological breakthrough anticipated to ular application of blockchain technology, many enthusiasts disrupt several application domains touching all spheres of our lives. from different disciplines have identified and proposed a The sky-rocket anticipation of its potential has caused a wide-scale plethora of applications of blockchain in a multitude of exploration of its usage in different application domains. This has resul- ted in a plethora of blockchain systems for various purposes. However, application domains [2], [3]. The possibility of exploiting many of these blockchain systems suffer from serious shortcomings blockchain in so many areas has created huge anticipation related to their performance and security, which need to be addressed surrounding blockchain systems. Indeed, it is regarded as before any wide-scale adoption can be achieved. A crucial component one of the fundamental technologies to revolutionise the of any blockchain system is its underlying consensus algorithm, which landscapes of the identified application domains. in many ways, determines its performance and security. Therefore, to A blockchain system is, fundamentally, a distributed address the limitations of different blockchain systems, several existing system that relies on a consensus algorithm that ensures as well novel consensus algorithms have been introduced.
    [Show full text]
  • Working Papers No
    UNIVERSITY OF WARSAW FACULTY OF ECONOMIC SCIENCES Working Papers No. 15/2019 (300) LÉVY PROCESSES ON THE CRYPTOCURRENCY MARKET DAMIAN ZIĘBA Warsaw 2019 WORKING PAPERS 15/2019 (300) Lévy processes on the cryptocurrency market Damian Zięba University of Warsaw, Faculty of Economic Sciences [email protected] Abstract: Lévy processes are very often used in financial modelling since they address various characteristics of financial data. One of those characteristics is the heavy-tailedness of probability density functions - a very common empirical stylized fact on the cryptocurrency market. The aim of this study was to determine which type of Lévy motion fits the data of cryptocurrencies better, namely Alpha-Stable distribution or one of distributions from the family of generalized hyperbolic motions. The log-returns of 227 cryptocurrencies, standardized by the realized volatility estimated with the GARCH (1,1), were fitted to 11 types of distributions. The results show that the generalized hyperbolic motions fit the cryptocurrency data much more accurately than the Alpha-Stable distribution, similarly as in the case of TOP100 NASDAQ stocks. In the further stage of the analysis, it is shown how the distribution of cryptocurrency data varies over time, i.e. before, during, and after the ‘boom-period’ of 2017/2018. Keywords: cryptocurrency market, distribution fitting, Generalized Hyperbolic distribution, Alpha-Stable distribution, Lévy process JEL codes: C10, C30, G15 Acknowledgments: I would like to gratefully acknowledge prof. Wojciech Charemza for his meaningful comments which helped to improve the paper. Working Papers contain preliminary research results. Please consider this when citing the paper. Please contact the authors to give comments or to obtain revised version.
    [Show full text]
  • Stealth Address, Ring Signatures, Monero Comparison to Zero.Cash
    Anonymous Crypto Currency Stealth Address, Ring Signatures, Monero Comparison to Zero.Cash 60 M$ Nicolas T. Courtois 17 B$ with help of Rebekah Mercer, Huanyu Ma, Mary Maller 300 M$ - University College London, UK Crypto Coin Privacy Topics $ Bitcoin vs. Monero vs. ZCash Chaum e-cash Privacy / anonymity: – for senders [Ring Signatures,ZK proofs] – for receivers [Stealth Address methods] – for the transaction amount [CT]X CT=Confidential Transactions, not studied here 2 Nicolas T. Courtois 2013-2016 PK-based currencies blockchain says: 1 coin belongs to pkA t t+1 t+2 blockchain …. ….………………. 5 Crypto Coin Privacy Pb In Bitcoin Q: Does Monero/ZCash remove this problem???? 4 Nicolas T. Courtois 2009-2016 **Bitcoin vs. Monero private key = b spend key b view key v public PK= b.G spend pub B=b.G view pub V=v.G H(PK) => 01… One Time Destination key H(r.V).G+B, R same user? PK1 PK random R=r.G 2 Tracking 0.29394 BTC 1.74582 BTC publish R with tx key v, B Transaction 1OO MNR to D21… H(PK3) H(PK4) 1.99 BTC same user? 1OO MNR to 2A7… 1OOO MNR 1OO MNR to Z93… 1OO MNR to P32… Advanced Crypto Magic 5 Commitments are used to Shield Coins: , 6 nobody can see what is inside. only the owner can open , they NEVER actually get opened 6 ZCash = a Large Scale Mixer “normal” yellow coins are “destroyed” and they exist as a mix of coins “normal” coins or “shielded” coins like in bitcoin many coins one of the coins that from many ? is on the ledger is pk_i are placed “re-born” and sent on the ledger to , but it is (via an algorithm called ) “normal” coin impossible to tell like in bitcoin which one? 5 Double Spending? cannot be done twice! S is revealed , r remains secret 6 Digital Signatures Zero-Knowledge 0.
    [Show full text]