Scalable Consensus Algorithms in Distributed Ledger Technologies Habib Yajam

Total Page:16

File Type:pdf, Size:1020Kb

Scalable Consensus Algorithms in Distributed Ledger Technologies Habib Yajam Scalable Consensus Algorithms in Distributed Ledger Technologies Habib Yajam Secure Communication Lab, University of Tehran 1 Outline • Blockchains, what are them? Why we need them? And when? • A Brief History of Bitcoin. • Consensus Algorithms, Definition and Properties. • Categorizing Consensus Algorithms. • Hot Topics for Research. 2 Blockchains What are them? Why we need them? And when? 3 When do we need a Blockchain? Permissionless Is a Shared no Common Database Public Ledger needed? yes (Bitcoin) yes Can everyone no Permissioned no maintain the Are Multiple Traditional Public Ledger database Parties involved? Database (Ripple) integrity? yes yes Do Parties have no Permissioned conflicting Can everyone see no Private Ledger interests? the database? (Bankchain) yes Blockchain (DLT) 4 Blockchain Use Cases • P2P Payments • Video Games • Back Office Settlement • Supply Chain Management • Copyright Management • Reliable Log Keeping • Digital Identity Management • Decentralized Voting 5 What are the Ingredients? • P2P Network • Consensus Algorithm • Ledger Database 6 P2P Network 7 Transaction Flow in Bitcoin mempool 8 Bitcoin Blockchain 9 Generating a Valid Block (Mining) 4198659816850181691986501 Hash Function Change nonce no < 푡푎푟푔푒푡 yes Publish to Network 10 Generating a Valid Block (Mining) 1712039707102730871029375 Hash Function Change nonce no < 푡푎푟푔푒푡 yes Publish to Network 11 Generating a Valid Block (Mining) 0000961965911298498619761 Hash Function Change nonce no < 푡푎푟푔푒푡 yes Publish to Network 12 Nakamoto Consensus 13 Nakamoto Consensus 14 Nakamoto Consensus 15 Nakamoto Consensus 16 Nakamoto Consensus 17 Nakamoto Consensus 18 Forks Normal State Fork in Blockchain 19 Double Spending Attack 20 Double Spending Attack 21 Double Spending Attack 22 Double Spending Attack 23 Double Spending Attack 24 Bitcoin A Brief History 25 Bitcoin History (2009) • 01/03: (Block 1) The genesis block established by Satoshi Nakamoto. marking the creation of the cryptocurrency. • 01/09: (Block 2) Bitcoin v0.1 was released and mining began. Bitcoin History (2009) • 01/11: (Block 78) the first block mined by an individual other than Satoshi. It was Hal Finney. • 01/12: (Block 170) The first transaction occurred between Satoshi and Hal Finney. 27 Bitcoin History (2009) • 10/05: (Block ~24400) first bitcoin exchange price was determined by Libertarian Advocating Website “New Liberty Standard” (~0.0008$) • 12/10: (Block 32256) The difficulty adjusts for the first time, rising from 1 to 1.18. Bitcoin History (2010) • 02/06: (Block ~57600) dwdollar’s Bitcoin Market first bitcoin exchange was started. Used PayPal as the method of exchange. • 05/22: (Block 57043) First purchase of a tangible good using bitcoin. (0.0025$) Bitcoin History (2010) • 07/02: (Block ~65600) Bitcoin v0.3 was released. • 07/17: (Block ~67040) Mt.Gox, Second Bitcoin Exchange and most well-known exchange at the time was established. • 07/18: (Block ~67180) First time GPU Mining by pseudonymous person named ArtForz. Later he Acquired 25% of bitcoin network hashing power using a private GPU program. Bitcoin History (2010) • 12/13: (Block ~97300) Satoshi’s Last Login on BitcoinTalk. He later said he has “moved on to other things”. That was the last the world heard of the secretive Bitcoin creator. • 12/16: (Block 97834) First Pool-mined Bitcoin Block by Slush Pool. 31 Bitcoin History (2011) • 02/01: (~Block 105000) Silk road an online black market and the first modern darknet market, best known as a platform for selling illegal drugs opens. • 02/09: (~Block 107000) Dollar Parity happens on Mt.Gox. 32 Bitcoin Price History 33 Bitcoin P2P network 34 Number of Nodes 35 Orphan Rate 36 Bitcoin Mining 37 Bitcoin Mining 38 Bitcoin Mining 39 Bitcoin Mining 40 Bitcoin Mining Hashrate Distribution 41 Other Cryptocurrencies • Litecoin 2011 (PoW Scrypt) [Currency] • Ripple 2012 (BPFT) [Currency] • Dash 2014 (PoW X11 + PoS) [Privacy] • Ethereum 2015 (PoW → PoS) [DApps] • Zcash 2016 (PoW Equihash) [Privacy] • IOTA 2017 (PoW Curl) [Currency] • Cardano 2017 (PoS Provably Secure) [DApps] 42 Consensus Algorithms Definition, Goals and Properties 43 Defining Consensus • Consensus: Achieving agreement in a multi-agent system. • If communication/agents are reliable: Consensus is Trivial • Consensus Algorithms: Achieving agreement in an unreliable environment 44 Defining Consensus • Unreliability Model: Fault • Types of Fault: • Crash fault: node hangs/stops/goes offline • Byzantine fault: node violates protocol maliciously 45 Defining Consensus • Properties of Consensus Algorithms: • Safety (Consistency) • Liveness (Availability) • Throughput • Latency • Scalability • Decentralization, Transparency, Order Preserving, … 46 Consistency • A confirmed transaction in an honest node will eventually be confirmed by all honest nodes. 47 Consistency Node1 Node2 6 6 8 8 1 1 9 9 Node3 Node4 6 6 8 8 1 1 9 9 48 Consistency Node1 Node2 Change “8” 6 to “5” 6 8 8 1 1 9 9 Node3 Node4 6 6 8 8 1 1 9 9 49 Consistency Node1 Node2 Change “8” 6 to “5” 6 5 8 1 1 9 9 Node3 Node4 6 6 8 5 1 1 9 9 50 Availability • A valid transaction will eventually be confirmed by an honest node. 51 Availability Node1 Node2 6 Append “7” 6 8 8 1 1 9 9 Node3 Node4 6 6 8 8 1 1 9 9 52 Availability Node1 Node2 6 6 8 8 1 1 9 9 7 7 Node3 Node4 6 6 8 8 1 1 9 9 7 7 53 Throughput/Scalability • Throughput: Number of newly confirmed transactions per unit of time. • Latency: • Time it takes for a newly created transaction to get confirmed in an honest node. • Scalability: In a scalable consensus algorithm, increasing the number of participants does not affect performance. 54 Categorizing Consensus Algorithms Voting-based, Chain-based, DAG-based 55 Categorization of Consensus Alg. • Vote-based Consensus: • First Prominent Voting-base Protocol by Leslie Lamport 1998 • Example: PBFT, Paxos, Ripple • Fast ✓ • Not Scalable 56 Categorization of Consensus Alg. • Chain-based Consensus: 1 2 3 4 • Introduced by Satoshi Nakamoto in 2008 Txs Txs Txs Txs • Example: Bitcoin, Ethereum • Scalable ✓ • Not Fast 1 2 3 4 5 Txs Txs Txs Txs Txs 57 Categorization of Consensus Alg. • DAG-based Consensus: • Introduced by Sergio Demian Lerner in 2015 • Example: IOTA, Nano • Fast ✓ • Scalable ✓ 58 Categorization of Consensus Alg. • Permissioned Scalable • Permissionless: + • Proof-of-Work Permissionless • Proof-of-Stake + • Proof-of-Importance Byzantine Fault Tolerant • Proof-of-Activity = • Delegated-Proof-of-Stake New Form of Decentralization • ... 59 Categorization of Consensus Alg. Voting- Chain- DAG- based based based Ripple, R3 Corda, Stellar, Fabric, Multichain, Vechain Hashgraph Chain Core, Quorum Bitcoin, Etheruem, NEM, Qtum, Zilliqa, NEO IOTA OmiseGo, TRON, EOS, Cardano 60 PAXOS Bitcoin DAGcoin Most Famous Voting-based First Chain-based First DAG-based 1998 2008 2015 V C D PBFT Etheruem Tangle V Famous Byzantine First Smart Contract C D IOTA 1999 2013 2016 Zab Ripple Peercoin PHANTOM Apache Zookeeper Fast Payment First Proof-of-Stake Academic Paper 2007 2011 2012 2017 V V C D Year 1999 2000 2001 2002 2003 2004 2005 2006 2007 Year 2009 2010 2011 2012 2013 2014 2015 2016 2017 Year 2019 1998 2008 2018 61 Blockchain Scalability Solutions • Base Layer Solutions: • Decoupling Blockchain • Bitcoin-NG • Fruitchains • PRISM • DAG-based Consensus Algorithms • Spectre • Phantom GHOST-DAG • Hybrid Chain-based Voting-based Algorithms • Byzcoin • Casper: the friendly finality gadget • Thunderella • Sharding 62 Blockchain Scalability Solutions • Second Layer Solutions: • Lightening Network • Plasma Network 63 Research Topics 64 Research Topics • High-throughput, Low-latency, Scalable Consensus Algorithms. • Privacy in Blockchains both in Smart-contracts and Payments. • Multi Party Computations Using Blockchain. • Blockchain Use Cases in Internet of Things. 65 Thank you 66.
Recommended publications
  • Into the Reverie: Exploration of the Dream Market
    Into the Reverie: Exploration of the Dream Market Theo Carr1, Jun Zhuang2, Dwight Sablan3, Emma LaRue4, Yubao Wu5, Mohammad Al Hasan2, and George Mohler2 1Department of Mathematics, Northeastern University, Boston, MA 2Department of Computer & Information Science, Indiana University - Purdue University, Indianapolis, IN 3Department of Mathematics and Computer Science, University of Guam, Guam 4Department of Mathematics and Statistics, University of Arkansas at Little Rock, AK 5Department of Computer Science, Georgia State University, Atlanta, GA [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected] Abstract—Since the emergence of the Silk Road market in Onymous" in 2014, a worldwide action taken by law enforce- the early 2010s, dark web ‘cryptomarkets’ have proliferated and ment and judicial agencies aimed to put a kibosh on these offered people an online platform to buy and sell illicit drugs, illicit behaviors [5]. Law enforcement interventions such as relying on cryptocurrencies such as Bitcoin for anonymous trans- actions. However, recent studies have highlighted the potential for Onymous, along with exit scams and hacks, have successfully de-anonymization of bitcoin transactions, bringing into question shut down numerous cryptomarkets, including AlphaBay, Silk the level of anonymity afforded by cryptomarkets. We examine a Road, Dream, and more recently, Wall Street [6]. Despite these set of over 100,000 product reviews from several cryptomarkets interruptions, new markets have continued to proliferate. The collected in 2018 and 2019 and conduct a comprehensive analysis authors of [7] note that there appears to be a consistent daily of the markets, including an examination of the distribution of drug sales and revenue among vendors, and a comparison demand of about $500,000 for illicit products on the dark web, of incidences of opioid sales to overdose deaths in a US city.
    [Show full text]
  • Data Capture and Analysis of Darknet Markets
    Data Capture & Analysis of Darknet Markets Data Capture and Analysis of Darknet Markets Australian National University Cybercrime Observatory Matthew Ball, Roderic Broadhurst1, Alexander Niven, and Harshit Trivedi March 2019 Abstract Darknet markets have been studied to varying degrees of success for several years (since the original Silk Road was launched in 2011), but many obstacles are involved which prevent a complete and systematic survey. The Australian National University’s Cybercrime Observatory has developed tools to collect and analyse data captured from the darknet (illicit cryptomarkets). This report describes, at the high level, a method for collecting, and analysing, data from specific darknet marketplaces. Examples of typical results that may be obtained from darknet markets and current limitations to the automation of data capture are breifly outlined. While the proposed solution is not error-free, it is a significant step in the direction of providing a comprehensive solution tailored for data scientists, social scientists, and anyone interested in analysing trends from darknet markets. 1 Corresponding author: Professor R.G. Broadhurst, School of Regulation and Global Givernance, College of Asia and the Pacific, email; [email protected]>. We thank the Australian Federal Police division of the Australian Cyber Security Centre, the Australian Institute of Criminology, and ANU Cybercrime Observatory interns Nikita Bhatia, Paige Brown and Benjamin Donald-Wilson for their assistance with aspects of this report. 1 Introduction Illicit cryptomarkets (or darknet markets) are e-commerce style websites specializing in the sale and distribution of illicit content. Typical products offered on darknet markets include: drugs, pharmaceuticals, identity documents, malware and exploit kits, counterfeit goods, weapons, and other contraband.
    [Show full text]
  • Analyzing the Darknetmarkets Subreddit for Evolutions of Tools and Trends Using LDA Topic Modeling
    DIGITAL FORENSIC RESEARCH CONFERENCE Analyzing the DarkNetMarkets Subreddit for Evolutions of Tools and Trends Using LDA Topic Modeling By Kyle Porter From the proceedings of The Digital Forensic Research Conference DFRWS 2018 USA Providence, RI (July 15th - 18th) DFRWS is dedicated to the sharing of knowledge and ideas about digital forensics research. Ever since it organized the first open workshop devoted to digital forensics in 2001, DFRWS continues to bring academics and practitioners together in an informal environment. As a non-profit, volunteer organization, DFRWS sponsors technical working groups, annual conferences and forensic challenges to help drive the direction of research and development. https:/dfrws.org Digital Investigation 26 (2018) S87eS97 Contents lists available at ScienceDirect Digital Investigation journal homepage: www.elsevier.com/locate/diin DFRWS 2018 USA d Proceedings of the Eighteenth Annual DFRWS USA Analyzing the DarkNetMarkets subreddit for evolutions of tools and trends using LDA topic modeling Kyle Porter Department of Information Security and Communication Technology, NTNU, Gjøvik, Norway abstract Keywords: Darknet markets, which can be considered as online black markets, in general sell illegal items such as Topic modeling drugs, firearms, and malware. In July 2017, significant law enforcement operations compromised or Latent dirichlet allocation completely took down multiple international darknet markets. To quickly understand how this affected Web crawling the markets and the choice of tools utilized by users of darknet markets, we use unsupervised topic Datamining Semantic analysis modeling techniques on the DarkNetMarkets subreddit in order to determine prominent topics and Digital forensics terms, and how they have changed over a year's time.
    [Show full text]
  • Sex, Drugs, and Bitcoin: How Much Illegal Activity Is Financed Through Cryptocurrencies? *
    Sex, drugs, and bitcoin: How much illegal activity is financed through cryptocurrencies? * Sean Foley a, Jonathan R. Karlsen b, Tālis J. Putniņš b, c a University of Sydney b University of Technology Sydney c Stockholm School of Economics in Riga January, 2018 Abstract Cryptocurrencies are among the largest unregulated markets in the world. We find that approximately one-quarter of bitcoin users and one-half of bitcoin transactions are associated with illegal activity. Around $72 billion of illegal activity per year involves bitcoin, which is close to the scale of the US and European markets for illegal drugs. The illegal share of bitcoin activity declines with mainstream interest in bitcoin and with the emergence of more opaque cryptocurrencies. The techniques developed in this paper have applications in cryptocurrency surveillance. Our findings suggest that cryptocurrencies are transforming the way black markets operate by enabling “black e-commerce”. JEL classification: G18, O31, O32, O33 Keywords: blockchain, bitcoin, detection controlled estimation, illegal trade * We thank an anonymous referee, Andrew Karolyi, Maureen O’Hara, Paolo Tasca, Michael Weber, as well as the conference/seminar participants of the RFS FinTech Workshop of Registered Reports, the Behavioral Finance and Capital Markets Conference, the UBS Equity Markets Conference, and the University of Technology Sydney. Jonathan Karlsen acknowledges financial support from the Capital Markets Co-operative Research Centre. Tālis Putniņš acknowledges financial support from the Australian Research Council (ARC) under grant number DE150101889. The Online Appendix that accompanies this paper can be found at goo.gl/GvsERL Send correspondence to Tālis Putniņš, UTS Business School, University of Technology Sydney, PO Box 123 Broadway, NSW 2007, Australia; telephone: +61 2 95143088.
    [Show full text]
  • The Lightning Network - Deconstructed and Evaluated
    The Lightning Network - Deconstructed and Evaluated Anti-Money Laundering (AML) and Anti-Terrorist Financing (ATF) professionals, especially those working in the blockchain and cryptocurrency environment, may have heard of the second layer evolution of Bitcoin's blockchain - the Lightning Network, (LN). This exciting new and rapidly deploying technology offers innovative solutions to solve issues around the speed of transaction times using bitcoin currently, but expandable to other tokens. Potentially however, this technology raises regulatory concerns as it arguably makes, (based on current technical limitations), bitcoin transactions truly anonymous and untraceable, as opposed to its current status, where every single bitcoin can be traced all the way back to its coinbase transaction1 on the public blockchain. This article will break down the Lightning Network - analyzing how it works and how it compares to Bitcoin’s current system, the need for the technology, its money laundering (ML) and terrorist financing (TF) risks, and some thoughts on potential regulatory applications. Refresher on Blockchain Before diving into the Lightning Network, a brief refresher on how the blockchain works - specifically the Bitcoin blockchain (referred to as just “Bitcoin” with a capital “B” herein) - is required. For readers with no knowledge or those wishing to learn more about Bitcoin, Mastering Bitcoin by Andreas Antonopoulos2 is a must read, and for those wishing to make their knowledge official, the Cryptocurrency Certification Consortium, (C4) offers the Certified Bitcoin Professional (CBP) designation.3 Put simply, the blockchain is a growing list of records that can be visualized as a series of blocks linked by chains. Each block contains specific information - in Bitcoin’s case, a list of transactions and their data, which includes the time, date, amount, and the counterparties4 of each transaction.
    [Show full text]
  • Characteristics of Bitcoin Transactions on Cryptomarkets
    Georgia State University ScholarWorks @ Georgia State University EBCS Proceedings Evidence-Based Cybersecurity Research Group 2019 Characteristics of Bitcoin Transactions on Cryptomarkets Xucan Chen Georgia State University Mohammad Al Hasan Indiana University - Purdue University Indianapolis Paval Skums Georgia State University Xintao Wu University of Arkansas Fayetteville Mohammad Javad Feizollahi Georgia State University See next page for additional authors Follow this and additional works at: https://scholarworks.gsu.edu/ebcs_proceedings Recommended Citation Chen X. et al. (2019) Characteristics of Bitcoin Transactions on Cryptomarkets. In: Wang G., Feng J., Bhuiyan M., Lu R. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2019. Lecture Notes in Computer Science, vol 11611. Springer, Cham. This Article is brought to you for free and open access by the Evidence-Based Cybersecurity Research Group at ScholarWorks @ Georgia State University. It has been accepted for inclusion in EBCS Proceedings by an authorized administrator of ScholarWorks @ Georgia State University. For more information, please contact [email protected]. Authors Xucan Chen, Mohammad Al Hasan, Paval Skums, Xintao Wu, Mohammad Javad Feizollahi, Marie Ouellet, Eric L. Sevigny, David Maimon, and Yubao Wu This article is available at ScholarWorks @ Georgia State University: https://scholarworks.gsu.edu/ ebcs_proceedings/15 Characteristics of Bitcoin Transactions on Cryptomarkets Xucan Chen1;6, Mohammad Al Hasan2;6, Xintao Wu3;6,
    [Show full text]
  • Bitcoin Exchange Addresses Identification and Its Application in Online Drug Trading Regulation
    Association for Information Systems AIS Electronic Library (AISeL) Pacific Asia Conference on Information PACIS 2019 Proceedings Systems (PACIS) 6-15-2019 Bitcoin Exchange Addresses Identification and Its Application in Online Drug Trading Regulation Jiaqi Liang Institute of Automation, Chinese Academy of Sciences, [email protected] Linjing Li Institute of Automation,Chinese Academy of Sciences, [email protected] Daniel Zeng Institute of Automation,Chinese Academy of Sciences, [email protected] Shu Luan Institute of Automation, Chinese Academy of Sciences, [email protected] Lu Gan Institute of Automation, Chinese Academy of Sciences, [email protected] Follow this and additional works at: https://aisel.aisnet.org/pacis2019 Recommended Citation Liang, Jiaqi; Li, Linjing; Zeng, Daniel; Luan, Shu; and Gan, Lu, "Bitcoin Exchange Addresses Identification and Its Application in Online Drug Trading Regulation" (2019). PACIS 2019 Proceedings. 49. https://aisel.aisnet.org/pacis2019/49 This material is brought to you by the Pacific Asia Conference on Information Systems (PACIS) at AIS Electronic Library (AISeL). It has been accepted for inclusion in PACIS 2019 Proceedings by an authorized administrator of AIS Electronic Library (AISeL). For more information, please contact [email protected]. Bitcoin Exchange Addresses Identification Bitcoin Exchange Addresses Identification and Its Application in Online Drug Trading Regulation Research-in-Progress Jiaqi Liang 1,2, Linjing Li 1,3, Shu Luan 1, Lu Gan 1, Daniel Zeng 1,2,3 1 The State Key Laboratory
    [Show full text]
  • Ohio Resident Pleads Guilty to Operating Darknet-Based Bitcoin
    UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA UNITED STATES OF AMERICA : : v. : Criminal No. 19-cr-395 (BAH) : LARRY DEAN HARMON, : : Defendant. : STATEMENT OF THE OFFENSE AND RELATED CONDUCT I. THE ELEMENTS OF THE OFFENSES Conspiracy To Launder Monetary Instruments: The essential elements of the offense of Conspiracy To Launder Monetary Instruments, in violation of Title 18, United States Code, Section 1956(h), each of which the government must prove beyond a reasonable doubt to sustain a conviction, are: (1) that an agreement existed between two or more people to commit an act in violation of (a) Title 18, United States Code, Section 1956(a)(1)(A)(i), or (b) Title 18, United States Code, Section 1956(a)(1)(B)(i); and (2) that the defendant intentionally joined in that agreement. The essential elements of promotional money laundering, in violation of Title 18, United States Code, Section 1956(a)(1)(A)(i), are: (1) that the defendant knowingly conducted or tried to conduct a financial transaction; (2) that the defendant knew that the money or property involved in the transaction was the proceeds of some kind of unlawful activity; (3) that the money or property did come from an unlawful activity, specifically the felonious manufacture, importation, receiving, concealment, buying, selling, or otherwise dealing in a controlled substance or listed chemical, in violation of Title 21, United States Code, Sections 841(a)(1) and 846; and (4) that the defendant the defendant acted with intent to promote the carrying on of specified unlawful activity, specifically the felonious manufacture, importation, receiving, concealment, buying, selling, or otherwise dealing in a controlled substance or listed chemical, in violation of Title 21, United States Code, Sections 841(a)(1) and 846.
    [Show full text]
  • Darknet Data Mining: a Canadian Cyber-Crime Perspective
    Darknet Data Mining: A Canadian Cyber-Crime Perspective Edward Crowder Jay Lansiquot Institute of Technology and Institute of Technology and Advanced Learning Advanced Learning Sheridan College Sheridan College Oakville, Canada Oakville, Canada [email protected] [email protected] Abstract— Exploring the darknet can be a daunting task; Pacific region these same tools perceive an increase to this paper explores the application of data mining the darknet exacerbated cybercrime[19]. The project discusses the risks within a Canadian cybercrime perspective. Measuring activity associated with using the darknet as both a user and through marketplace analysis and vendor attribution has cybercrime analyst, followed by an outline of the proposed proven difficult in the past. Observing different aspects of the system design. darknet and implementing methods of monitoring and collecting data in the hopes of connecting contributions to the Considering benefits and threats that Tor may pose would darknet marketplaces to and from Canada. The significant be beneficial. There was an increase in the Tor network usage, findings include a small Canadian presence, measured the specifically in Canada[16] between 2019 and 2020. At a product categories, and attribution of one cross-marketplace minimum, this project may uncover why more Canadians turn vendor through data visualization. The results were made to the Tor network as shown in Fig. 1., and what the intended possible through a multi-stage processing pipeline, including usage is. data crawling, scraping, and parsing. The primary future works include enhancing the pipeline to include other media, such as web forums, chatrooms, and emails. Applying machine learning models like natural language processing or sentiment analysis could prove beneficial during investigations.
    [Show full text]
  • Cryptocurrency Крипто Валуте
    ЕКОНОМИКА Vol. 64, january-march 2018, № 1 ISSN 0350-137X, EISSN 2334-9190, UDK 338 (497,1) P. 95-104 Monia Milutinović1 SCIENTIFIC REVIEW ARTICLE University of Nis/Faculty of Economics doi:10.5937/ekonomika1801105M Received December, 07, 2017 Accepted: February, 23, 2018 CRYPTOCURRENCY Abstract The digital revolution is a change from analog and electronic technology to digital technology and is currently at its peak. Since we live in the digital era, it is logical that the digital form of money, that is, the cryptocurrency, had to appear. The cryptocurrency as a digital form of money functions with the help of a technique called cryptography. Cryptography is a process that translates legible information into codes that cannot be broken at all. The cryptocurrency is based on the digitized so-called. the main book of all crypto watch transactions called blockchain. Blockchain records individual transactions and ownership of all cryptocurrencies that are in circulation, and this system is managed by the so-called blockchain “miners” who have to update all transactions that have occurred and ensure the accuracy of the information. In this way, the security of the transaction is confirmed. This paper will address the theme of the cryptocurrency and their role in economic growth. Types of Cryptocurrencies will also be shown as well as their expansion in countries in transition. Among other things, we will see the market of the currency in Serbia and Switzerland. Keywords: cryptocurrency, economic growth, market, Serbia, Switzerland JELClassification: E42, M41, G35. КРИПТО ВАЛУТЕ Апстракт Дигитална револуција представља промену из аналогне и електронске техноло- гије у дигиталну технологију и тренутно је на врхунцу.
    [Show full text]
  • Characteristics of Bitcoin Transactions on Cryptomarkets
    Georgia State University ScholarWorks @ Georgia State University EBCS Proceedings Evidence-Based Cybersecurity Research Group 2019 Characteristics of Bitcoin Transactions on Cryptomarkets Xucan Chen Mohammad Al Hasan Paval Skums Xintao Wu Mohammad Javad Feizollahi See next page for additional authors Follow this and additional works at: https://scholarworks.gsu.edu/ebcs_proceedings Authors Xucan Chen, Mohammad Al Hasan, Paval Skums, Xintao Wu, Mohammad Javad Feizollahi, Marie Ouellet, Eric L. Sevigny, David Maimon, and Yubao Wu Characteristics of Bitcoin Transactions on Cryptomarkets Xucan Chen1;6, Mohammad Al Hasan2;6, Xintao Wu3;6, Pavel Skums1;6, Mohammad Javad Feizollahi4;6, Marie Ouellet5;6, Eric L. Sevigny5;6, David Maimon5;6, and Yubao Wu1;6 1 Department of Computer Science, Georgia State University, Atlanta, GA, USA 2 Department of Computer and Information Science, Indiana University - Purdue University Indianapolis, Indianapolis, IN, USA 3 Department of Computer Science and Computer Engineering, University of Arkansas, Fayetteville, AR, USA 4 Institute for Insight, Georgia State University, Atlanta, GA, USA 5 Department of Criminal Justice and Criminology, Georgia State University, Atlanta, GA, USA 6 email: [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected] Abstract. Cryptomarkets (or darknet markets) are commercial hidden-service websites that operate on The Onion Router (Tor) anonymity network. Cryptomar- kets accept primarily bitcoin as payment since bitcoin is pseudonymous. Under- standing bitcoin transaction patterns in cryptomarkets is important for analyzing vulnerabilities of privacy protection models in cryptocurrecies. It is also impor- tant for law enforcement to track illicit online crime activities in cryptomarkets.
    [Show full text]
  • Busted, but Not Broken
    BUSTED, BUT NOT BROKEN THE STATE OF SILK ROAD AND THE DARKNET MARKETPLACES A DIGITAL CITIZENS ALLIANCE INVESTIGATIVE REPORT Ten months ago, the Digital Citizens Alliance began researching illicit online marketplaces, including Silk Road (pre- and post-arrest of Ross Ulbricht, accused of being Silk Road’s notorious operator “Dread Pirate Roberts”). This report details the findings of Digital Citizens researchers, including the following key takeaways: Key takeaways: • Approximately 13,648 listings for drugs are now available on Silk Road compared to the 13,000 that were listed shortly before the FBI arrested Ulbricht and shut down the site. In comparison, Silk Road’s closest competitor, Agora, has just roughly 7,400 drug listings. • There is significantly more competition today than when the original Silk Road was seized. Silk Road 2.0 currently contains 5% more listings for drugs than its predecessor held at the time of its seizure. By comparison, the Darknet drug economy as a whole contains 75% more listings for drugs. • Silk Road and other Darknet marketplaces continue to do steady business despite the arrests of additional alleged operators who authorities say worked for Ulbricht. • A series of scam markets, which appeared as opportunists tried to fill the void while the original Silk Road was shut down, created distrust among customers after the operators allegedly stole tens of millions of dollars worth of bitcoin. It is speculated that the resulting distrust may be one of the factors helping Silk Road rebuild its user base so quickly. • In chat rooms used by both operators and customers, many believe that the fallout from Ulbricht’s arrest is complete.
    [Show full text]