DFINITY Technology Overview Series Consensus System

Total Page:16

File Type:pdf, Size:1020Kb

DFINITY Technology Overview Series Consensus System DFINITY Technology Overview Series Consensus System Rev.1 Timo Hanke, Mahnush Movahedi and Dominic Williams ABSTRACT Dfinity will be introduced in a series of technology overviews, The Dfinity blockchain computer provides a secure, performant each highlighting an independent innovation in Dfinity such as and flexible consensus mechanism. While first defined for a permis- the consensus backbone, smart contract language, virtual machine, sioned participation model, the consensus mechanism itself can be concurrent contract execution model, daemon contracts, peer-to- paired with any method of Sybil resistance (e.g. proof-of-work or peer networks and secure broadcast, governance mechanism and proof-of-stake) to create an open participation model. Dfinity’s scaling techniques. The present document will focus on the con- greatest strength is unfolded in the most challenging proof-of-stake sensus backbone and cryptographic randomness. case. Dfinity has an unbiasable, verifiable random function (VRF) At its core, Dfinity contains a decentralized randomness beacon built-in at the core of its protocol. The VRF not only drives the which acts as a verifiable random function (VRF) that produces a consensus, it will also be the foundation for scaling techniques such stream of outputs over time. The novel technique behind the beacon as sharding, validation towers, etc. Moreover, the VRF produced relies on the existence of a unique-deterministic, non-interactive, by the consensus layer is available to the application layer, i.e., to DKG-friendly threshold signatures scheme. The only known ex- the smart contracts and virtual machine. In this way, the consensus amples of such a scheme are pairing-based and derived from BLS backbone is intertwined with many of the other topics. [3, 10]. The Dfinity blockchain is layered on top of the Dfinity beacon 2 INTRODUCTION and uses the beacon as its source of randomness for leader selec- Dfinity’s consensus mechanism has four layers as depicted in tion and leader ranking. A "weight" is attributed to a chain based Fig. 1. The first layer provides registered and Sybil-resistant client on the ranks of the leaders who propose the blocks in the chain, identities. On the second layer is a decentralized random beacon. and that weight is used to select between competing chains. The On the third layer is a blockchain that is driven by the random bea- Dfinity blockchain is further hardened by a notarization process con through a probabilistic mechanism for leader ranking. On the which dramatically improves the time to finality and eliminates the fourth layer is a decentralized notary that provides timestamping nothing-at-stake and selfish mining attacks. and publication guarantees, and is ultimately responsible for near- Dfinity’s consensus algorithm is made to scale through contin- instant finality. Dfinity’s consensus layers and other key aspects uous quorum selections driven by the random beacon. In practice, of the consensus mechanism can be summarized in the following Dfinity achieves block times of a few seconds and transaction fi- main categories. nality after only two confirmations. The system gracefully handles temporary losses of network synchrony including network splits, while it is provably secure under synchrony. Notary Layer s r Observe e y Observers s a r L o t 1 PROLOGUE l c o Blockchain Layer Transaction A c l o DFINITY is a decentralized network design whose protocols gen- t Users a o n r r e erate a reliable "virtual blockchain computer" running on top of a P t s x u peer-to-peer network upon which software can be installed and Random Beacon Layer E s n can operate in the tamperproof mode of smart contracts. The goal e s n is for the virtual computer to finalize computations quickly (using o C Register short block times and by requiring only a small number of blocks as Identity Layer "confirmations"), to provide predictable performance (by keeping New Clients the time between confirmations approximately constant), and for computational and storage capacity to scale up without bounds as Figure 1: Dfinity’s consensus mechanism layers. 1. Identity layer: demand for its services increases (using novel validation mecha- provides a registry of all clients. 2. Random Beacon layer: provides nisms and sharding systems discussed in our other papers). The the source of randomness (VRF) for all higher layers including ap- protocols must be secure against an adversary controlling less than plications (smart contracts). 3. Blockchain layer: builds a blockchain a certain critical proportion of its nodes, must generate crypto- from validated transactions via the Probabilistic Slot Protocol driven graphic randomness (which is required by advanced decentralized by the random beacon. 4. Notarization layer: provides fast finality applications) and must maintain a decentralized nature as it grows guarantees to clients and external observers. in size to millions of nodes. 1 Technology Overviews, Jan. 23, 2018, DFINITY Stiftung Timo Hanke, Mahnush Movahedi and Dominic Williams 1st layer: Identities and Registry. The active participants in the the block candidates that are presented to a client for notarization, Dfinity network are called clients. All clients in Dfinity are reg- the client only notarizes the highest-ranked one with respect to a istered, i.e., have permanent, pseudonymous identities. The regis- publicly verifiable ranking algorithm driven by the random beacon. tration of clients has advantages over the typical proof-of-work It is important to emphasize that notarization is not consensus blockchains where it is impossible to link different blocks to the because it is possible, due to adverse timing, for more than one same miner. For example, if registration requires a security deposit, block to get notarized at a given height. This is explicitly tolerated a misbehaving client would lose its entire deposit, whereas a miner and an important difference to other proof-of-stake proposals that in a typical proof-of-work blockchain would only forego the block apply full Byzantine agreement at every block. Dfinity achieves reward during the time of misbehavior. As a result, the penalty for its high speed and short block times exactly because notarization is misbehavior can be magnitudes larger for registered identities than not full consensus. However, notarization can be seen as optimistic it can be for unregistered identities. This is particularly important consensus because it will frequently be the case that only one as blockchains can track unbounded external value that exceeds block gets notarized. Whether this is the case can be detected after the value of the native token itself. Moreover, Dfinity supports one subsequent block plus a relay time (cf. Theorem 9.3). Hence, open membership by providing a protocol to register new clients whenever the broadcast network functions normally a transaction via a stake deposit with a lock-up period. This is the responsibility is final in the Dfinity consensus after two notarized confirmations of the first layer. plus a network traversal time. We like to emphasize that a notarization in Dfinity is not pri- 2nd layer: Random Beacon. The random beacon in the second marily a validity guarantee but rather a timestamp plus a proof layer is an unbiasable, verifiable random function (VRF) that is of publication. The notarization step makes it impossible for the produced jointly by registered clients. Each random output of the adversary to build and sustain a chain of linked, notarized blocks VRF is unpredictable by anyone until just before it becomes avail- in secret. For this reason, Dfinity does not suffer from the selfish able to everyone. This is a key technology of the Dfinity system mining attack [4] or the nothing-at-stake problem. which relies on a threshold signature scheme with the properties of uniqueness and non-interactivity. The BLS signature scheme is the Threshold Relay and Network Scalability. Dfinity’s consensus only practical1 scheme that can provide these features, and Dfinity is designed to operate on a network of millions of clients. To en- has a particularly optimized implementation of BLS built in [2, 11]. able scalability to this extent, the random beacon and notarization Using a threshold mechanism for randomness creation solves the protocols are designed such that they can be safely and efficiently fundamental "last actor" problem. Any decentralized protocol for delegated to a committee. A committee is a randomly sampled sub- creating public randomness without a threshold mechanism suffers set of all registered clients that deploys a threshold mechanism (for from the problem that the last actor in that protocol knows the next safety) that is moreover non-interactive (for efficiency). random value and can decide to abort the protocol. In Dfinity, the active committee changes regularly. After having temporarily executed the protocol on behalf of all clients, the com- 3rd layer: Blockchain and fork resolution. The third layer deploys mittee relays the execution to another pre-configured committee. the "probabilistic slot protocol" (PSP). This protocol ranks the clients We call this technique "Threshold Relay" in Dfinity. for each height of the chain, in an order that is derived determin- istically from the unbiased output of the random beacon for that Consistency vs availability. It is worth noting that network splits height. A weight is then assigned to block proposals based on the are implicitly detectable by Dfinity and are handled conservatively. proposer’s rank such that blocks from clients at the top of the list This is a consequence of the random sampling of committees. If receive a higher weight. Forks are resolved by giving favor to the the network splits in two halves of more or less the same size, "heaviest" chain in terms of accumulated block weight – quite sim- this will automatically cause the random beacon to pause within ilar to how traditional proof-of-work consensus is based on the a few blocks so that none of the sides can continue.
Recommended publications
  • Blockchain in the Integrated Energy Transition
    dena MULTI-STAKEHOLDER STUDY Blockchain in the integrated energy transition Study findings (dena) Blockchain in the integrated energy transition energy in the integrated Blockchain dena MULTI-STAKEHOLDER STUDY STUDY dena MULTI-STAKEHOLDER Legal information Publisher: All content has been prepared with the greatest possible care Deutsche Energie-Agentur GmbH (dena) and is provided in good faith. dena provides no guarantee for German Energy Agency the currency, accuracy, or completeness of the information Chausseestrasse 128 a provided. dena shall not be liable for damages of a material 10115 Berlin, Germany or intangible nature resulting from the use or non-use of the Tel.: + 49 (0)30 66 777-0 information provided, whether indirectly or directly, unless Fax: + 49 (0)30 66 777-699 proof of intentional or grossly negligent culpability on its part www.dena.de is provided. Authors: All rights reserved. Consent from dena is required for any use. Philipp Richard (dena) Sara Mamel (dena) Lukas Vogel (dena) Scientific experts: Prof. Dr. Jens Strüker (INEWI) Dr. Ludwig Einhellig (Deloitte) Last updated: 02/2019 Conception & design: Heimrich & Hannot GmbH Content Foreword 4 Executive summary 6 The dena multi-stakeholder study “Blockchain in the integrated energy transition” 6 Recommended courses of action 8 Checklist for blockchain in the integrated energy transition 10 Technical findings 12 Economic findings 14 Regulatory findings 17 1 Blockchain in the integrated energy transition 20 2 Blockchain technology: status quo and development prospects
    [Show full text]
  • Beauty Is Not in the Eye of the Beholder
    Insight Consumer and Wealth Management Digital Assets: Beauty Is Not in the Eye of the Beholder Parsing the Beauty from the Beast. Investment Strategy Group | June 2021 Sharmin Mossavar-Rahmani Chief Investment Officer Investment Strategy Group Goldman Sachs The co-authors give special thanks to: Farshid Asl Managing Director Matheus Dibo Shahz Khatri Vice President Vice President Brett Nelson Managing Director Michael Murdoch Vice President Jakub Duda Shep Moore-Berg Harm Zebregs Vice President Vice President Vice President Shivani Gupta Analyst Oussama Fatri Yousra Zerouali Vice President Analyst ISG material represents the views of ISG in Consumer and Wealth Management (“CWM”) of GS. It is not financial research or a product of GS Global Investment Research (“GIR”) and may vary significantly from those expressed by individual portfolio management teams within CWM, or other groups at Goldman Sachs. 2021 INSIGHT Dear Clients, There has been enormous change in the world of cryptocurrencies and blockchain technology since we first wrote about it in 2017. The number of cryptocurrencies has increased from about 2,000, with a market capitalization of over $200 billion in late 2017, to over 8,000, with a market capitalization of about $1.6 trillion. For context, the market capitalization of global equities is about $110 trillion, that of the S&P 500 stocks is $35 trillion and that of US Treasuries is $22 trillion. Reported trading volume in cryptocurrencies, as represented by the two largest cryptocurrencies by market capitalization, has increased sixfold, from an estimated $6.8 billion per day in late 2017 to $48.6 billion per day in May 2021.1 This data is based on what is called “clean data” from Coin Metrics; the total reported trading volume is significantly higher, but much of it is artificially inflated.2,3 For context, trading volume on US equity exchanges doubled over the same period.
    [Show full text]
  • Initial Crypto-Asset Offerings (Icos), Tokenization and Corporate Governance Stéphane Blémus, Dominique Guegan
    Initial Crypto-asset Offerings (ICOs), tokenization and corporate governance Stéphane Blémus, Dominique Guegan To cite this version: Stéphane Blémus, Dominique Guegan. Initial Crypto-asset Offerings (ICOs), tokenization and corpo- rate governance. 2019. halshs-02079171 HAL Id: halshs-02079171 https://halshs.archives-ouvertes.fr/halshs-02079171 Submitted on 25 Mar 2019 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Documents de Travail du Centre d’Economie de la Sorbonne Initial Crypto-asset Offerings (ICOs), tokenization and corporate governance Stéphane BLEMUS, Dominique GUEGAN 2019.04 Maison des Sciences Économiques, 106-112 boulevard de L'Hôpital, 75647 Paris Cedex 13 https://centredeconomiesorbonne.univ-paris1.fr/ ISSN : 1955-611X Initial Crypto-asset Offerings (ICOs), tokenization and corporate governance Stéphane Blemus* & Dominique Guégan** * Paris 1 Panthéon-Sorbonne University, LabEx ReFi, Kalexius law firm, ChainTech ** Centre d’Economie de la Sorbonne, Paris 1 Panthéon-Sorbonne University, Labex ReFi, Ca’Foscari University, Venezia, IPAG Business School This interdisciplinary paper by a mathematician and a legal counsel, both from the Paris 1 Panthéon-Sorbonne University, discusses the potential impacts of the so-called “initial coin offerings”, and of several developments based on distributed ledger technology (“DLT”), on corporate governance.
    [Show full text]
  • The Convergence Ecosystem
    The Convergence Ecosystem Convergence 2.0 Building the Decentralised Future This document (the “Document”) has been prepared by Outlier Ventures Operations Disclaimer Limited (“Outlier Ventures”). Outlier Ventures Operations Ltd is registered in England and Wales, company registration number 10722638. Outlier Ventures Operations Ltd is an appointed representative of Sapia Partners LLP (“Sapia”) which is authorised and regulated by the Financial Conduct Authority (Firm Reference Number 550103). No undertaking, warranty or other assurance is given, and none should be implied, as to, and no reliance should be placed on, the accuracy, completeness or fairness of the information or opinions contained in this Document. The information contained in the Document is not subject to completion, alteration and verification nor should it be assumed that the information in the Document will be updated. The information contained in the Document has not been verified by Sapia, Outlier Ventures or any of its associates or affiliates. The Document should not be considered a recommendation by Sapia, Outlier Ventures or any of its directors, officers, employees, agents or advisers in connection with any purchase of or subscription for securities. Recipients should not construe the contents of this Document as legal, tax, regulatory, financial or accounting advice and are urged to consult with their own advisers in relation to such matters. The information contained in the Document has been prepared purely for informational purposes. In all cases persons should conduct their own investigation and analysis of the data in the Document. The information contained in the Document has not been approved by the Financial Conduct Authority. This Document does not constitute, or form part of, any offer of, or invitation to apply for, securities nor shall it, or the fact of its distribution, form the basis of or be relied upon in connection with any contract or commitment to acquire any securities.
    [Show full text]
  • View the Slides
    Pixel: Multi-Signatures for Consensus Manu Drijvers (DFINITY) Sergey Gorbunov (Algorand & University of Waterloo) Gregory Neven (DFINITY) Hoeteck Wee (Algorand & CNRS, ENS, PSL) 1 Permissioned/Proof-of-Stake Blockchains Consensus: nodes agree on sequence of blocks Proof of stake (PoS): nodes vote on block proposals, weighted by stake e.g., Algorand, Cardano, Ethereum Casper Permissioned: nodes vote by access structure e.g., Ripple, Hyperledger Fabric Permissioned/Proof-of-Stake Blockchains Consensus: nodes agree on sequence of blocks Proof of stake (PoS): nodes sign block proposals, weighted by stake e.g., Algorand, Cardano, Ethereum Casper Permissioned: nodes sign by access structure e.g., Ripple, Hyperledger Fabric Multi-Signatures in Blockchains single multi-signature Σ under pk1,...,pkn on m short signature, efficient verification (preferably ≈ single signature) [IN83, OO91, MOR01, BLS01, B03, BN06, BDN18, ...] The Problem of Posterior Corruption [BPS16] aka long-range attacks [B15], costless simulation [P15] Chain integrity assumption: ≤ fraction f of nodes/stake corrupt The Problem of Posterior Corruption [BPS16] aka long-range attacks [B15], costless simulation [P15] Chain integrity assumption: ≤ fraction f of nodes/stake corrupt The Problem of Posterior Corruption [BPS16] aka long-range attacks [B15], costless simulation [P15] Chain integrity assumption: ≤ fraction f of nodes/stake signing keys corrupt The Problem of Posterior Corruption [BPS16] aka long-range attacks [B15], costless simulation [P15] Chain integrity assumption:
    [Show full text]
  • DFINITY Crypto Techniques
    INTRODUCING DFINITY Crypto Techniques V1 - 19th May 2017 Threshold Relay Produce randomness that is incorruptible, unmanipulable and unpredictable BACKGROUNDER Explain “unique deterministic” threshold signatures… Usually a signer creates a signature on message data Shared seed data (“message”) 01010101010 11010111011 01010101010 10101001010 Verifier Signature SIGN σ 10101010101 Private 00101101010 Key 10010101010 10010101001 Verifier Signer’s identity Public Key Signer Verifier AUTHORIZED SIGNER SIGNATURE VERIFIERS That can be verified using the signer’s public key Shared seed data (“message”) 01010101010 11010111011 01010101010 10101001010 Verifier Signature SIGN 10101010101 Private 00101101010 Key 10010101010 10010101001 VERIFY Verifier Signer’s identity Public Key Signer Verifier AUTHORIZED SIGNER SIGNATURE VERIFIERS If scheme unique and deterministic then only 1 correct signature Shared seed data THE SIGNATURE IS A RANDOM NUMBER, AS IF (“message”) IT WERE PREDICTABLE, THE SIGNATURE SCHEME WOULD NOT BE SECURE 01010101010 11010111011 01010101010 10101001010 Verifier Signature SIGN 10101010101 DETERMINISTIC Private 00101101010 RANDOM Key 10010101010 10010101001 VERIFY NUMBER Verifier Signer’s identity Public Key Signer Verifier AUTHORIZED SIGNER SIGNATURE VERIFIERS Unique and deterministic threshold signature scheme possible GROUP MEMBERS INDEPENDENTLY SIGN THE Shared seed data MESSAGE TO CREATE “SIGNATURE SHARES”. (“message”) A THRESHOLD NUMBER ARE COMBINED TO CREATE THE OUTPUT SIGNATURE 01010101010 11010111011 01010101010 10101001010 Verifier
    [Show full text]
  • The Tree of Blockchain to Shed Light on the Innovation Within Different Components
    THE TREE OF BLOCKCHAIN APREPRINT Florian Spychiger∗ Paolo Tasca School of Management and Law Centre for Blockchain Technologies Zurich University of Applied Sciences University College London Winterthur, Switzerland London, Great Britain [email protected] [email protected] Claudio J. Tessone y Business Administration University of Zurich Zurich, Switzerland [email protected] October 7, 2020 ABSTRACT This study covers the evolutionary development of blockchain technologies over the last 11 years (2009 – 2019) and sheds lights on potential areas of innovation in heretofore unexplored sub- components. For this purpose, we collected and analysed detailed data on 107 different blockchain technologies and studied their component-wise technological evolution. The diversity of their designs was captured by deconstructing the blockchains using the Tasca-Tessone taxonomy (2019) to build what we call the "tree of blockchain" composed of blockchain main and sub-components. With the support of information theory and phylogenetics, we found that most design explorations have been conducted within the components in the areas of consensus mechanisms and cryptographic primitives. We also show that some sub-components like Consensus Immutability and Failure Tolerance, Access and Control layer and Access Supply Management have predictive power over other sub-components. We finally found that few dominant design models - the genetic driving clusters of Bitcoin, Ethereum and XRP - influenced the evolutionary paths of most of the succeeding blockchains.
    [Show full text]
  • Token Frenzy
    TOKEN FRENZY The fuel of the blockchain April 2018 Dealmakers in Technology Important disclosures appear at the back of this report GP Bullhound LLP is authorised and regulated by the Financial Conduct Authority GP Bullhound Inc is a member of FINRA Subscribe to receive GP Bullhound Research and News on www.gpbullhound.com/subscribe/ GP BULLHOUND: TOKEN FRENZY 3 CONTENTS 04 THE VIEW FROM GP BULLHOUND Sebastian N. Markowsky, GP Bullhound 06 CHAPTER 1: HISTORY & OVERVIEW OF THE BLOCKCHAIN UNIVERSE 12 CHAPTER 2: FUNDING ACTIVITY IN BLOCKCHAIN - VENTURE CAPITAL & ICOS 22 CHAPTER 3: LEADING PROTOCOLS & BLOCKCHAIN ECOSYSTEMS 24 EXPERT VIEW Joseph Lubin, Co-founder Ethereum & Founder ConsenSys 26 CHAPTER 4: KEY CHALLENGES TO BE SOLVED 28 BLOCKCHAIN SCALABILITY 29 EXPERT VIEW Prof. Emin Gün Sirer, Associate Professor at Cornell University 30 DECENTRALISATION OF EXCHANGES 31 EXPERT VIEW Peter Czaban, Polkadot Contributor & CEO Web3 Foundation 32 STAYING PRIVATE 33 EXPERT VIEW MacLane Wilkison, Founder NuCypher 34 EFFECTIVE GOVERNANCE 35 EXPERT VIEW Tatu Kärki, Communications Lead Aragon 36 CONSENSUS EFFICIENCY 37 CHAPTER 5: OUTLOOK - FINAL REMARKS 42 METHODOLOGY Dealmakers in Technology 5 EXECUTIVE SUMMARY GP BULLHOUND: TOKEN FRENZY 5 THE VIEW From GP Bullhound Sebastian N. Markowsky Director Cryptographically enabled virtual currencies equivalent From these origins, few would have expected blockchain’s From its inception, the decentralisation of the blockchain to pieces of code: Can this be sustainable? Do they carry climb to the top of the global economic agenda. The ecosystem has tended to inspire an anarchic system of any value at all? Are they secure? While these questions transition that has taken place in recent years – with governance.
    [Show full text]
  • Annexes-A-4-Artificial-Intelligence-And-Data-And-Blockchain Full-Report.Pdf
    The Future of Services ANNEXES A-4 ARTIFICIAL INTELLIGENCE & DATA, AND BLOCKCHAIN Workgroup 4 Report: AI & Data, and Blockchain CONTENTS 1 INTRODUCTION & OVERVIEW ...................................................................................................... 3 2 MARKET STUDY ............................................................................................................................. 4 2.1 GLOBAL MARKET POTENTIAL OF AI ........................................................................................... 4 2.2 SINGAPORE MARKET POTENTIAL OF AI ..................................................................................... 4 2.3 GLOBAL MARKET POTENTIAL OF BLOCKCHAIN (INCLUDES OTHER DISTRIBUTED LEDGER TECHNOLOGIES) .................................................................................................................................. 5 2.4 SINGAPORE MARKET POTENTIAL OF BLOCKCHAIN ..................................................................... 5 3 TECHNOLOGY STUDY ................................................................................................................... 7 3.1 ARTIFICIAL INTELLIGENCE ......................................................................................................... 7 3.2 BLOCKCHAIN .......................................................................................................................... 18 3.3 CONVERGENCE OF AI AND DATA, AND BLOCKCHAIN ................................................................. 31 3.4 AI, DATA AND BLOCKCHAIN
    [Show full text]
  • EMERGING TRENDS What’S Next in Blockchain 2019 Table of Contents
    COVER OPTION 2 EMERGING TRENDS What’s Next In Blockchain 2019 Table of Contents CONTENTS NExTT framework 3 NECESSARY Fiat-crypto exchanges 5 Bitcoin mining 7 Custody 9 EXPERIMENTAL Decentralized exchanges 11 Consortia 13 Stablecoins 15 Security tokens 18 Non-fungible tokens 20 Data marketplaces 23 Decentralized autonomous 25 organizations (DAOs) Identity management 27 THREATENING DLT in clearance and settlement 29 Bitcoin 31 Privacy coins 34 DLT in supply chain 36 DLT in IoT 39 TRANSITORY Initial coin offerings 41 Smart contract platforms 44 2 NExTT FRAMEWORK Emerging Trends in Blockchain Technology Enterprise distributed ledger Bitcoin and cryptocurrencies (DLT) use cases Decentralized applications 3 NExTT Trends Title of NExTT Framework TRANSITORY NECESSARY TRANSITORY AdvancedNECESSARY driver High assistance Trends seeing adoption but Trends which are seeing wide- Vehicle where there is uncertainty Telematics spread industry and customer connectivity On-demand about market opportunity. implementation / adoption and Lithium-ion access Next gen HD wherebatteries market and applications As Transitoryinfotainment trends becomemapping AI processor are understood. chips & software more broadly understood, On-board they may reveal additional diagnostics For these trends, incumbents AV sensors & opportunities and markets. should have a clear,sensor articulatedfusion Mobile strategyDigital and initiatives. marketing dealership Additive Industrial internet of manufacturing Usage-based things (IIoT) insurance Industrial R&D and design EXPERIMENTAL
    [Show full text]
  • Lambda Project
    DAPPs on the blockchain require a decentralized data storage plan 1.Project Overview With the development of blockchain technologies, the concept of decentralization has been deeply rooted in the heart of people. Lambda project is dedicated to providing a data storage infrastructure for blockchains and DAPPs and based on which it intends to However, as DAPPs can save data in the centralized Internet data center (IDC) only during the software development and running, offer storage and access capabilities of the decentralized cloud database. Moreover, based on scale-out and Sharding technology, in essence, it is still a centralized system. Traditional database systems are usually managed and maintained by single institutions it enables high-speed transactions; based on the trunk chain technology and cross-chain transaction verification, it enables which have the supreme authorities over the entire database. This mode is not suitable for data management between institutions cross-chain transactions, and data access and verification within the system; based on the Bridge Control Protocol (BCP), it where a mutual trust has not been completely built, which stands out especially in the Internet application environment. As a decen- tralized, unchangeable, traceable, and multi-party maintained new distributed data management technology, the blockchain is enables the cross-chain communications with other chain systems. By providing a series of infrastructure capability services tailored for the effective data management under these non-mutual-trust scenarios. Due to the significant differences between the including block storage, file storage, object storage, KV storage, and table storage, which can be extended without limit, and fast old and new data management architectures, the blockchain data management technology must be innovated rather than copying network transmission - remote synchronization (rsync), Lambda makes it possible for DAPPs to perform data generation, comput- the original technology.
    [Show full text]
  • Technical Whitepaper
    Technical Whitepaper Harmony Team Version 2.0 1. Introduction Since the publication of the Bitcoin whitepaper in 2008, the concept of blockchain has spread across the world. While decentralized money and applications are becoming well-publicized ideas, design limitations have challenged the core aspiration of Bitcoin. The original Bitcoin blockchain was designed as a peer-to-peer payment system [13] that allows people to transfer value without intermediaries like banks or payment processors. However, as Bitcoin gained popularity, its performance bottleneck became evident due to its limited throughput of ~7 transactions per second (TPS), and its cost as a payment system became prohibitively expensive. In 2014, Buterin et. al. [27] proposed a new blockchain infrastructure called Ethereum, which enabled developers to create various kinds of blockchain applications using “smart contracts.” However, Ethereum didn’t solve the scalability problem and, with its ~15 TPS, failed to support high-throughput applications such as gaming or decentralized exchanges. Given Ethereum and Bitcoin’s performance limitations, many blockchain projects proposed various solutions [3,4,5,6,7,8,9,10,24,25] that attempt to increase transaction throughput. Various blockchains [3,4,5,6,24,25] proposed to replace Proof-of-Work (PoW) consensus with Proof-of-Stake (PoS) consensus. Other blockchains like EOS use Delegated Proof of Stake (DPoS), where block proposers are elected by voting rather than by an on-chain algorithmic process. Projects like IOTA replaced the chain-of-blocks data structure with a DAG (Directed Acyclic Graph) data structure, which breaks the limitation of sequential processing of transactions. However, these proposed solutions cannot make significant performance gains without sacrificing other critical aspects, such as security and decentralization.
    [Show full text]