The Mathematics of Bitcoin Cyril Grunspan, Ricardo Pérez-Marco
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Beauty Is Not in the Eye of the Beholder
Insight Consumer and Wealth Management Digital Assets: Beauty Is Not in the Eye of the Beholder Parsing the Beauty from the Beast. Investment Strategy Group | June 2021 Sharmin Mossavar-Rahmani Chief Investment Officer Investment Strategy Group Goldman Sachs The co-authors give special thanks to: Farshid Asl Managing Director Matheus Dibo Shahz Khatri Vice President Vice President Brett Nelson Managing Director Michael Murdoch Vice President Jakub Duda Shep Moore-Berg Harm Zebregs Vice President Vice President Vice President Shivani Gupta Analyst Oussama Fatri Yousra Zerouali Vice President Analyst ISG material represents the views of ISG in Consumer and Wealth Management (“CWM”) of GS. It is not financial research or a product of GS Global Investment Research (“GIR”) and may vary significantly from those expressed by individual portfolio management teams within CWM, or other groups at Goldman Sachs. 2021 INSIGHT Dear Clients, There has been enormous change in the world of cryptocurrencies and blockchain technology since we first wrote about it in 2017. The number of cryptocurrencies has increased from about 2,000, with a market capitalization of over $200 billion in late 2017, to over 8,000, with a market capitalization of about $1.6 trillion. For context, the market capitalization of global equities is about $110 trillion, that of the S&P 500 stocks is $35 trillion and that of US Treasuries is $22 trillion. Reported trading volume in cryptocurrencies, as represented by the two largest cryptocurrencies by market capitalization, has increased sixfold, from an estimated $6.8 billion per day in late 2017 to $48.6 billion per day in May 2021.1 This data is based on what is called “clean data” from Coin Metrics; the total reported trading volume is significantly higher, but much of it is artificially inflated.2,3 For context, trading volume on US equity exchanges doubled over the same period. -
State of the Art in Lightweight Symmetric Cryptography
State of the Art in Lightweight Symmetric Cryptography Alex Biryukov1 and Léo Perrin2 1 SnT, CSC, University of Luxembourg, [email protected] 2 SnT, University of Luxembourg, [email protected] Abstract. Lightweight cryptography has been one of the “hot topics” in symmetric cryptography in the recent years. A huge number of lightweight algorithms have been published, standardized and/or used in commercial products. In this paper, we discuss the different implementation constraints that a “lightweight” algorithm is usually designed to satisfy. We also present an extensive survey of all lightweight symmetric primitives we are aware of. It covers designs from the academic community, from government agencies and proprietary algorithms which were reverse-engineered or leaked. Relevant national (nist...) and international (iso/iec...) standards are listed. We then discuss some trends we identified in the design of lightweight algorithms, namely the designers’ preference for arx-based and bitsliced-S-Box-based designs and simple key schedules. Finally, we argue that lightweight cryptography is too large a field and that it should be split into two related but distinct areas: ultra-lightweight and IoT cryptography. The former deals only with the smallest of devices for which a lower security level may be justified by the very harsh design constraints. The latter corresponds to low-power embedded processors for which the Aes and modern hash function are costly but which have to provide a high level security due to their greater connectivity. Keywords: Lightweight cryptography · Ultra-Lightweight · IoT · Internet of Things · SoK · Survey · Standards · Industry 1 Introduction The Internet of Things (IoT) is one of the foremost buzzwords in computer science and information technology at the time of writing. -
Cryptocurrency and Bitcoin: a Possible Foundation of Future Currency Why It Has Value, What Is Its History and Its Future Outlook
B.Sc. Essay in Business Cryptocurrency and Bitcoin: A possible foundation of future currency why it has value, what is its history and its future outlook. Sindri Leó Árnason Leiðbeinandi: Guðrún Johnsen Faculty of Business Administration June 2015 Cryptocurrency and Bitcoin: A possible foundation of future currency Why it has value, what is its history and its future outlook. This is a bachelor’s of science essay that counts for 6 ECT credits in the School of Social Sciences, Faculty of Business Administration, at the University of Iceland © 2015 Sindri Leó Árnason Printing: Verslunarfélag Reykjavíkur Reykjavík, 2015 2 | P a g e Preface This is a bachelor’s of science essay that counts for 6 ECT credits in the School of Social Sciences, Faculty of Business Administration, at the University of Iceland. I chose this topic because I had become interested in Bitcoin and cryptocurrencies in 2013-2014 when their media coverage boomed. I had already done some research on this topic beforehand and as I am studying finance at the University of Iceland I wanted to research what Bitcoin’s future impact on the business world could possibly be. I would like to thank Guðrún Johnsen who is a lecturer at the School of Social Sciences, who helped guide me through writing this essay and my father, Árni Leósson, who helped read over my essay, fixing spelling and grammar mistakes as well as helping me develop essential arguments. 3 | P a g e Summary The goal of this project was to find out what exactly cryptocurrency, such as Bitcoin, is and why it has value, what its future outlook is and if it could become the mainstream currency of the future. -
Trading and Arbitrage in Cryptocurrency Markets
Trading and Arbitrage in Cryptocurrency Markets Igor Makarov1 and Antoinette Schoar∗2 1London School of Economics 2MIT Sloan, NBER, CEPR December 15, 2018 ABSTRACT We study the efficiency, price formation and segmentation of cryptocurrency markets. We document large, recurrent arbitrage opportunities in cryptocurrency prices relative to fiat currencies across exchanges, which often persist for weeks. Price deviations are much larger across than within countries, and smaller between cryptocurrencies. Price deviations across countries co-move and open up in times of large appreciations of the Bitcoin. Countries that on average have a higher premium over the US Bitcoin price also see a bigger widening of arbitrage deviations in times of large appreciations of the Bitcoin. Finally, we decompose signed volume on each exchange into a common and an idiosyncratic component. We show that the common component explains up to 85% of Bitcoin returns and that the idiosyncratic components play an important role in explaining the size of the arbitrage spreads between exchanges. ∗Igor Makarov: Houghton Street, London WC2A 2AE, UK. Email: [email protected]. An- toinette Schoar: 62-638, 100 Main Street, Cambridge MA 02138, USA. Email: [email protected]. We thank Yupeng Wang and Yuting Wang for outstanding research assistance. We thank seminar participants at the Brevan Howard Center at Imperial College, EPFL Lausanne, European Sum- mer Symposium in Financial Markets 2018 Gerzensee, HSE Moscow, LSE, and Nova Lisbon, as well as Anastassia Fedyk, Adam Guren, Simon Gervais, Dong Lou, Peter Kondor, Gita Rao, Norman Sch¨urhoff,and Adrien Verdelhan for helpful comments. Andreas Caravella, Robert Edstr¨omand Am- bre Soubiran provided us with very useful information about the data. -
Blockchain for Recordkeeping: Help Or Hype?
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/309414363 Blockchain for Recordkeeping: Help or Hype? Technical Report · October 2016 DOI: 10.13140/RG.2.2.21736.67842 CITATIONS READS 0 1,928 1 author: Victoria Lemieux University of British Columbia - Vancouver 47 PUBLICATIONS 151 CITATIONS SEE PROFILE Some of the authors of this publication are also working on these related projects: Blockchain technology for record keeping: Help or Hype? View project Records in the Cloud View project All content following this page was uploaded by Victoria Lemieux on 25 October 2016. The user has requested enhancement of the downloaded file. Blockchain Technology for Recordkeeping Help or Hype? A Background Paper “Blockchain Technology for Recordkeeping – Help or Hype?” a SSHRC Knowledge Synthesis Grant Study on “How can emerging technologies be leveraged to benefit Canadians?” Investigator Dr. Victoria L. Lemieux [email protected] Volume 2: Appendices This research was supported by the Social Sciences and Humanities Research Council of Canada Blockchain Technology for 33 Recordkeeping Table of Contents Report………………………………………………………………………..Volume 1 Appendix A – Background Paper..................................................................34 Appendix B - Terminology Report …………………………………………….103 Appendix C – Blockchain Companies ……………………………………….142 Appendix D – Blockchain Research Initiatives ………………………………155 Appendix E – Consultation Collaborators……………………………………..160 Appendix F – Dissemination Coverage ………………………………………..161 Appendix G - A Primer on Records and Recordkeeping…………………..162 Appendix H - A Primer on the Blockchain and how it operates…………..165 33 Blockchain Technology for 34 Recordkeeping Appendix A – Background Papers The papers in this appendix should be viewed as works in progress and not as polished reports representing the final views of the project team. -
Privacy-Enhancing Technologies for the Internet
Privacy-enhancing technologies for the Internet Ian Goldberg David Wagner Eric Brewer University of California, Berkeley iang,daw,brewer ¡ @cs.berkeley.edu Abstract ing privacy issues on the Internet, and Section 3 provides some relevant background. We then discuss Internet pri- The increased use of the Internet for everyday activi- vacy technology chronologically, in three parts: Section 4 ties is bringing new threats to personal privacy. This pa- describes the technology of yesterday, Section 5 explains per gives an overview of existing and potential privacy- today’s technology, and Section 6 explores the technology enhancing technologies for the Internet, as well as moti- of tomorrow. Finally, we conclude in Section 7. vation and challenges for future work in this field. 2. Motivation 1. Introduction The threats to one’s privacy on the Internet are two-fold: your online actions could be (1) monitored by unauthorized Recently the Internet has seen tremendous growth, with parties and (2) logged and preserved for future access many the ranks of new users swelling at ever-increasing rates. years later. You might not realize that your personal infor- This expansion has catapulted it from the realm of academic mation has been monitored, logged, and subsequently dis- research towards new-found mainstream acceptance and in- closed; those who would compromise your privacy have no creased social relevance for the everyday individual. Yet incentive to warn you. this suddenly increased reliance on the Internet has the po- The threat of long-term storage and eventual disclosure tential to erode personal privacies we once took for granted. of personal information is especially acute on the Internet. -
Blockchain and The
NOTES ACKNOWLEDGMENTS INDEX Notes Introduction 1. The manifesto dates back to 1988. See Timothy May, “The Crypto Anarchist Manifesto” (1992), https:// www . activism . net / cypherpunk / crypto - anarchy . html. 2. Ibid. 3. Ibid. 4. Ibid. 5. Ibid. 6. Timothy May, “Crypto Anarchy and Virtual Communities” (1994), http:// groups . csail . mit . edu / mac / classes / 6 . 805 / articles / crypto / cypherpunks / may - virtual - comm . html. 7. Ibid. 8. For example, as we wi ll describe in more detail in Chapter 1, the Bitcoin blockchain is currently stored on over 6,000 computers in eighty- nine jurisdictions. See “Global Bitcoin Node Distribution,” Bitnodes, 21 . co, https:// bitnodes . 21 . co / . Another large blockchain- based network, Ethereum, has over 12,000 nodes, also scattered across the globe. See Ethernodes, https:// www . ethernodes . org / network / 1. 9. See note 8. 10. Some blockchains are not publicly accessible (for more on this, see Chapter 1). These blockchains are referred to as “private blockchains” and are not the focus of this book. 11. See Chapter 1. 12. The Eu ro pean Securities and Market Authority, “Discussion Paper: The Dis- tributed Ledger Technology Applied to Securities Markets,” ESMA / 2016 / 773, June 2, 2016: at 17, https:// www . esma . europa . eu / sites / default / files / library / 2016 - 773 _ dp _ dlt . pdf. 213 214 NOTES TO PAGES 5–13 13. The phenomena of order without law also has been described in other con- texts, most notably by Robert Ellickson in his seminal work Order without Law (Cambridge, MA: Harvard University Press, 1994). 14. Joel Reidenberg has used the term “lex informatica” to describe rules imple- mented by centralized operators online. -
Pdf-Fulltext (142
IRIE International Review of Information Ethics Vol. XY (MM/YYYY) Breilla Zanon: Transparency for institutions, privacy for individuals: the globalized citi- zen and power relations in a postmodern democracy Abstract: The aim of this article is to observe how technologies of communication, especially the Internet - allow extensive and intensive connections between several global territories and how they begin to influence the formation of demands and the organization and participation of individuals/citizens around local and global causes. For this, the below article uses Wikileaks and the cypherpunk philosophy to exemplify how information can be both used and abused in the common space of the internet, allowing new citizenship developments as well as government control strategies. Agenda: Introduction .................................................................................................................................. 56 An information paradox ................................................................................................................ 56 Wikileaks and the lesson of transparency ............................................................................................. 57 Free and controlled information: a philosophical reflection on the conduction of practices ....................... 58 Conclusion ..................................................................................................................................... 59 Author: Breilla Zanon: Federal University of Uberlândia, João Naves -
CRYPTO CURRENCY Technical Competence & Rules of Professional Responsibility
CRYPTO CURRENCY Technical Competence & Rules of Professional Responsibility Marc J. Randazza Rule 1.1 Comment 8 To maintain the requisite knowledge and skill, a lawyer should keep abreast of changes in the law and its practice, including the benefits and risks associated with relevant technology, engage in continuing study and education and comply with all continuing legal education requirements to which the lawyer is subject. Crypto Currency 1. What is Crypto Currency? 2. How does it work? 3. How could you screw this up? Blockchain •Decentralized •Transparent •Immutable Blockchain Blockchain • Time-stamped series of immutable records of data • Managed by a cluster of de-centralized computers • Each block is secured and bound to another, cryptographically • Shared • Immutable • Open for all to see – how you keep it honest Blockchain Blockchain • Transparent but also pseudonymous • If you look on the ledger, you will not see “Darren sent 1 BTC to Trixie” • Instead you will see “1MF1bhsFLkBzzz9vpFYEmvwT2TbyCt7NZJ sent 1 BTC” • But, if you know someone’s wallet ID, you could trace their transactions Crypto Roller Coaster – 5 years Crypto Roller Coaster – 1 day How can you screw this up? Quadriga You can lose it & Bankruptcy Your mind • C$190 million turned to digital dust • Thrown away with no back up • Death of CEO turned death of • $127 million in the trash – gone business • 7,500 BTC – Fluctuates WILDLY Ethical Considerations You might be surprised at what violates Rule 1.8 Which Rules? Rule 1.2 (d) – Criminal or Fraudulent Activity Rule 1.5 (a) – Reasonable Fee Rule 1.6 – Confidentiality Rule 1.8 (a) – Business Dealings With Clients Rule 1.8(f) – Compensation From Other Than Your Client Rule 1.15 (a) – Safekeeping Property Rule 1.15 (c) – Trust Accounts Rule 1.2(d) – Criminal or Fraudulent Activity • Crypto *can* be used for criminal activity • Tends to be difficult, but not A lawyer shall not .. -
How Bitcoin Functions As Property Law Eric D
College of William & Mary Law School William & Mary Law School Scholarship Repository Faculty Publications Faculty and Deans 2019 How Bitcoin Functions As Property Law Eric D. Chason William & Mary Law School, [email protected] Repository Citation Chason, Eric D., "How Bitcoin Functions As Property Law" (2019). Faculty Publications. 1896. https://scholarship.law.wm.edu/facpubs/1896 Copyright c 2019 by the authors. This article is brought to you by the William & Mary Law School Scholarship Repository. https://scholarship.law.wm.edu/facpubs How Bitcoin Functions As Property Law Eric D. Chason* Bitcoin replicates many of the formal aspects of real estate transactions. Bitcoin transactions have features that closely resemble grantor names, grantee names, legal descriptions, and signatures found in real property deeds. While these “Bitcoin deeds” may be interesting, they are not profound. Bitcoin goes beyond creating simple digital deeds, however, and replicates important institutional aspects of real estate transactions, in particular recordation and title assurance. Deeds to real property are recorded in a central repository (e.g., the public records office), which the parties (and the public) can search to determine title. When one grantor executes more than one deed covering the same property, recordation acts (race, notice, and race-notice) determine which grantee wins. The Bitcoin blockchain replicates the public records office, giving anyone with a computer the ability to see any Bitcoin transaction. Bitcoin mining replicates the recording of deeds, a process by which formally valid transactions between two parties become essentially a public record. When one grantor executes more than one transaction covering the same Bitcoin, a miner determines which grantee wins simply by moving one transaction to the blockchain before the others. -
Blockchain Technology for Recordkeeping
Blockchain Technology for Recordkeeping Help or Hype? A Background Paper “Blockchain Technology for Recordkeeping – Help or Hype?” a SSHRC Knowledge Synthesis Grant Study on “How can emerging technologies be leveraged to benefit Canadians?” Investigator Dr. Victoria L. Lemieux [email protected] Volume 2: Appendices This research was supported by the Social Sciences and Humanities Research Council of Canada Blockchain Technology for 33 Recordkeeping Table of Contents Report………………………………………………………………………..Volume 1 Appendix A – Background Paper..................................................................34 Appendix B - Terminology Report …………………………………………….103 Appendix C – Blockchain Companies ……………………………………….142 Appendix D – Blockchain Research Initiatives ………………………………155 Appendix E – Consultation Collaborators……………………………………..160 Appendix F – Dissemination Coverage ………………………………………..161 Appendix G - A Primer on Records and Recordkeeping…………………..162 Appendix H - A Primer on the Blockchain and how it operates…………..165 33 Blockchain Technology for 34 Recordkeeping Appendix A – Background Papers The papers in this appendix should be viewed as works in progress and not as polished reports representing the final views of the project team. 34 Blockchain Technology for 35 Recordkeeping The Law Beyond Trust: Legal Implications of Blockchain Technology for Records Management A Background Paper “Blockchain Technology for Recordkeeping – Help or Hype?” a SSHRC Knowledge Synthesis Grant Study on “How can emerging technologies be leveraged to benefit -
Bitcoin Yongdae Kim
EE817/IS893 Blockchain and Cryptocurrency Bitcoin Yongdae Kim 1 Cypherpunk v 1970년대 암호는 군과 스파이 기관의 전유물 v 1980년 경부터 큰 변화 – Data Encryption Standard (DES) by NIST – “New DirectionS in Cryptography” by Diffie-Hellman – David Chaum: ecaSh, pSeudonym, reputation, … v 1992년: Gilmore 등이 작은 그룹을 만듬 – Cypherpunk: cipher + cyberpunk, Cypherpunk mailing liSt v A Cypherpunk’S ManifeSto "Privacy iS neceSSary for an open Society in the electronic age. Privacy iS not Secrecy. A private matter iS Something one doeSn't want the whole world to know, but a Secret matter iS something one doesn't want anybody to know. Privacy is the power to selectively reveal oneSelf to the world.” – “Privacy”는 잘못된 것을 숨기는게 아님! 커텐은 집안에 나쁜게 있어서? 주목할 만한 Cypherpunk들 v Jacob Appelbaum: Tor v Paul Kocher: SSL 3.0 v Julian Assange: WikiLeaks v Moxie Marlinspike: Signal v Adam Back: Hashcash v Zooko Wilcox-O'Hearn: v Bram Cohen: BitTorrent DigiCash, Zcash v Hal Finney: PGP 2.0, v Philip Zimmermann: PGP 1.0 Reusable PoW v Matt Blaze: Clipper chip, v Tim Hudson: SSLeay, the crypto export control precursor to OpenSSL 3 Cypherpunk와 블록체인 v David Chaum (1980s) – "Security without Identification: Transaction Systems to Make Big Brother Obsolete” – Anonymous Digital Cash, Pseudonymous Reputation System v Adam Back (1997) – Hash cash: Anti-spam mechanism requiring cost to send email v Wei Dai (1998) – B-money: Enforcing contractual agreement between two anons – 1. Every participant maintain separate DB: Bitcoin – 2. deposit some money as potential fines or rewards: PoS v Hal Finney (2004) – Reusable PoW: Double spending detection was centralized v Nick Szabo (2005) – “Bit Gold”: Values based on amount of computational work – Concept of “Smart Contract” 4 What is Bitcoin? v Satoshi Nakamoto, who published the invention in 2008 and released it as open-source software in 2009.