The Aventus Solution to the Digital Asset Problem
Total Page:16
File Type:pdf, Size:1020Kb
The Aventus solution to the digital asset problem A number of industries and participants have adopted platforms like IBM’s Hyperledger over Ethereum because they cannot sacrifice scale or privacy. However, at least in the proof-of-concept stage, they are prepared to sacrifice independence and accept lower levels of security than that afforded by Ethereum. With the Aventus Protocol, there is no trade-off. Organisations are free to benefit from the combination of private and public Blockchains without the drawbacks. The following chapter will introduce Aventus’ solution to the current problems of Blockchain technology. It will give you a high-level overview of the Aventus Protocol’s system architecture, how it is used, and how it will benefit digital asset issuers, managers, and owners. The Aventus Protocol The Aventus Protocol is a Blockchain solution that combines the scale and privacy of private Blockchains with the security and independence of public chains. It solves issues with scalability by taking transaction processing off-chain and uses cutting-edge ‘zero-knowledge proofs’ for privacy. The ultimate goal of the Aventus Protocol is to improve standardisation, trust, and security across value chains. It does this while lowering costs, reducing friction, and generating entirely new asset services. The following section will explain the protocol’s key functions and how they work. A Layer 2 solution The Aventus Protocol is what is known as a ‘Layer 2 Solution’. This means that it is built on top of an existing public Blockchain network, in this case Ethereum. This layer 2 Solution processes transactions ‘off-chain’. The purpose for this is to solve the scalability problems of Ethereum, while maintaining the benefits of security and independence. This in itself is not new. To address the shortcomings of public Blockchains, various developer communities have moved to creating ‘Layer 2’ or, more accurately, ‘Execution Layer’ solutions. In the case of Bitcoin, for example, Lightning has become the de-facto scaling solution. Initial implementations of these solutions tend to either be suboptimal rehashes of the base Blockchain, or are too specific to be commercially viable. Furthermore, a trade-off is evident between preserving the full security of the base Blockchain and transaction finality with high throughput. The Aventus Protocol, however, is a cutting-edge Layer 2 solution with privacy considerations. Description Example A Layer 2 Solution is built on top of an Imagine Sally buys her Ed Sheeran tickets existing Blockchain to improve immediately upon launch. scalability. The tickets she buys are transacted across the The Aventus Protocol is a secondary hypothetical Aventus Protocol in which the Layer 2 Blockchain solution which lets Aventus Solution does not exist. process transactions more efficiently, independent of the Ethereum Tickets usually sell out in minutes. Blockchain. This is known as ‘off-chain’ processing. But this time, Ed Sheeran’s team are panicking, how can it be that they have only sold 10% of tickets? Transactions are processed and verified more efficiently by Aventus Nodes (see Well, without the Layer 2 Solution to process section 3.2.2.1 Aventus Nodes). transactions through nodes ‘off-chain’, the entire network could only process 100 tickets per second. They are then batched together into Aventus Blocks and sent to the That means fans would have to wait hours for their Ethereum Blockchain where they are tickets to be processed. made public. However, with the Layer 2 Solution, transactions are In this sense, Aventus is a Blockchain batched by Aventus Nodes and then sent to the within a Blockchain. Ethereum Blockchain. This way, fans can buy tickets at true scale. Summary Off-chain processing allows the Aventus Protocol to more quickly verify transactions while still benefiting from the security of the public Ethereum Blockchain. The processing is handled by Aventus Nodes, which batch transactions together before making them public. More information: https://www.ibm.com/blogs/systems/storage-for-blockchain-and-modern- distributed-database-processing/ https://media.consensys.net/the-state-of-ethereum-layer-2-protocol-development-2- f22b2603abd6 This means the Aventus Protocol can process transactions faster than a public Blockchain, while still preserving the properties of Ethereum where transactional information is made public. This is where zero-knowledge proofs come in. Zero-knowledge proofs and Sigma protocol for privacy All transactions on the Aventus network can contain a private piece of information that can be verified, without disclosure, using a Sigma Protocol. This can be anything the user wants to remain confidential. It can be as simple as their identity information, or a secret piece of information given from the vendor to the owner for the purpose of proving ownership. What’s more, the Sigma Protocol can let customers redeem their assets with a different vendor, e.g. in the case of loyalty cards. The implementation of zero knowledge also minimises attack vectors concerning Aventus nodes, and asset distributors attempting to manipulate digital asset transactions. In the case of tickets, we use zero knowledge proofs so that a ticket owner can prove they have the “barcode for entrance the door” data without having to show the barcode. This means you can prove you are the legitimate ticket owner without having to show the ticket. This helps ticket owners prove ownership without having to reveal private information. To achieve this, we use cryptographic primitives to link an owner to an asset in one direction. Description Example The Aventus Protocol leverages zero- Imagine the Ed Sheeran concert is 18+ due to knowledge proofs (ZKPs) to address the explicit content. Sally needs to add her problem of privacy on the Ethereum identity to the ticket she just bought as well Blockchain. as prove her age. The goal is to prove a statement without Naturally, he does not wish to share her leaking extra information. name, address, and date of birth information publicly. ZKP lets you prove you know something to someone without actually revealing the So she uses zero-knowledge proof over the information. The term ‘zero knowledge’ Aventus Protocol. originates from the fact that zero information about the secret is revealed, but the second Using zero-knowledge proof cryptography, verifier is rightfully convinced that the first she can prove to the verifier who she is and party holds the information. authenticate the transaction using a cryptographic fingerprint without having to Why would you need to prove you know a reveal her age or identity information. secret without revealing it? If Sally decides to sell the ticket, she can do When you do not trust the other party but so on a ticket reseller website. still need to persuade them that you know it. Here, the ticket reseller and new ticket owner On the Aventus Protocol, a user can choose will require proof of Sally’s identity. to make certain parts of their transactions private by using a ZKP. Using a zkp, Sally can prove her identity without having to reveal her driving licence, This could include, but is not limited to: passport, or sensitive information directly. • Identity information • Transaction value • Asset details, etc. The implementation of zero-knowledge also If Sally decides to sell the ticket, she can do minimises possible ways that the network so on a ticket reseller website. could be attacked, and prevents asset distributors from manipulating digital asset Here, the ticket reseller and new ticket owner transactions by obscuring key information. will require proof of Sally’s identity. The decision to opt for the Sigma Protocol is Using a zkp, Sally can prove her identity because the Aventus use case is narrow without having to reveal her driving licence, enough such that generality is not required. It passport, or sensitive information directly. also allows for faster proof generation, which has allowed us to create a proof on a smartphone in less than one second. Our previous implementation of zk-SNARKs resulted in proof generation that was too slow on mobile devices, and produced expensive verification. We will continue to explore other zero knowledge proofs as development of the Aventus Protocol advances. Zero-knowledge proofs are an advanced form of cryptography that allows a ‘prover’ to prove a piece of information is true to a ‘verifier’ without revealing anything about the information. On the Aventus Protocol, ZKPs are used to protect the privacy of transactions, and add another layer of security. By employing this system, the protocol allows users to transact assets secretly, while still ensuring that all transactions can be validated on the Blockchain. More information on Sigma protocols: http://www.cs.au.dk/~ivan/Sigma.pdf Aventus combines the scale and privacy of permissioned Blockchains without trading off the security and independence benefits of public chains. We achieve this by employing a Layer 2 Solution that solves for scale, and uses cutting-edge zero knowledge proofs to solve for privacy. Today, the Aventus Protocol can scale to thousands of transactions per second, and is completely GDPR compliant. In its current state, it preserves key components of decentralisation, with certain elements made open source. A future, full-release will be entirely decentralised and wholly open source. With Aventus, myriad unknown participants can interact with each other without significant compromise on transaction finality and speed. We have done this by restricting our problem domain solely to digital asset exchange (issuance, transfer, and communication), which allows us to take shortcuts in computing and finalising state. Recap • The Aventus Protocol is a Layer 2 Solution. • This means it processes transactions via its own nodes, and then adds them to the Ethereum Blockchain. • The reason it does this is to overcome the problem of scalability on Ethereum, while still benefiting from its security and independence. • The problem of privacy is addressed by employing a type of cryptography known as zero- knowledge proofs.