D7.1 Distributed Ledger State-Of-The-Art Report
Total Page:16
File Type:pdf, Size:1020Kb
Ref. Ares(2019)652909 - 05/02/2019 D7.1 Distributed ledger state-of-the-art report Advanced Cyber-Threat Intelligence, Detection, and Mitigation Platform for a Trusted Internet of Things Grant Agreement: 786698 D7.1 Distributed Ledger state-of-the-art report Work Package 7: Distributed ledger technology for enhanced accountability Document Dissemination Level P Public ☒ C Confidential, only for members of the Consortium (including the Commission Services) Ο ☐ Document Due Date: 31/01/2019 Document Submission Date: 31/01/2019 Co-funded by the Horizon 2020 Framework Programme of the European Union Copyright Cyber-Trust Consortium. All rights reserved. 1 D7.1 Distributed ledger state-of-the-art report Document Information Deliverable number: D7.1 Deliverable title: Distributed ledger state-of-the-art report Deliverable version: 1.0 Work Package number: WP7 Work Package title: Distributed ledger technology for enhanced accountability Due Date of delivery: 31/01/2019 Actual date of delivery: 31/01/2019 Dissemination level: PU Editor(s): Pierre Gerard (SCHAIN) Laurent Kratz (SCHAIN) Grégoire Marchal (SCHAIN) Clément Pavué (SCHAIN) Contributor(s): Nicholas Kolokotronis, Nicholas Kalouptsidis, Konstantinos LimnIoTis, Konstantinos Ntemos, Sotirios Brotsis (UOP) Reviewer(s): Olga Gkotsopoulou (VUB) Bogdan Ghita (CSCAN) Project name: Advanced Cyber-Threat Intelligence, Detection, and Mitigation Platform for a Trusted Internet of Things Project Acronym Cyber-Trust Project starting date: 01/05/2018 Project duration: 36 months Rights: Cyber-Trust Consortium Version History Version Date Beneficiary Description 0.1 15/10/2018 SCHAIN Proposed deliverable’s outline 0.2 10/12/2018 SCHAIN Intermediate version 0.3 17/12/2018 SCHAIN Amendment of the Table Of Content based on UoP feedback 0.4 01/01/2019 UoP Contribution to Blockchain Security 0.5 18/01/2019 SCHAIN Intermediate version 27/02/2019 UoP Contribution to Blockchain applications, key technical evolutions, Privacy preserving protocols, Quantum resistant-protocol, blockchain security, blockchain and Cyber-Trust. 0.7 28/02/2019 SCHAIN Intermediate version for reviewers 0.8 30/01/2019 UOP Unify the referencing style 0.9 31/01/2019 SCHAIN Update of the documents according to the feedback from the reviewers 1.0 31/01/2019 KEMEA Quality review and submission Copyright Cyber-Trust Consortium. All rights reserved. 2 D7.1 Distributed ledger state-of-the-art report Acronyms and terminologies ACRONYM EXPLANATION [1] ABS Attribute-Based Signatures AMI Advanced Measurement Infrastructure AML Anti-Money Laundering refers to a set of practices including procedures, laws, and regulations to prevent income through illegal actions. API Application programming interface. ARP Address Resolution Protocol ASIC Application-Specific Integrated Circuit Bitcoin Bitcoin with capital “B” refers to the network. bitcoin bitcoin with lower case “b” refers to the currency. Blockchain A Blockchain is an implementation of a “distributed ledger” using a list of chained blocks. Each block encapsulating validated transactions. BPQS Blockchained Post-Quantum Signatures BSS Business Support Systems CA Certificate Authority CIDN Collaborative Intrusion Detection Networks CoC Chain of Custody Consensus A Blockchain is a distributed ledger that relies on nodes to store independently a copy of a ledger representing the state of a system. Users can read or write to the ledger without the control of a trusted third party. The state of the system is the result of an agreement of the nodes, also called consensus. CRS Common Reference String CSPs Communications service providers CVP Closest Vector Problem DSA Digital Signature Algorithm ECC Elliptic Curve Cryptography ECDSA Elliptic Curve Digital Signature Algorithm. ECDSA is a Digital Signature Algorithm which uses elliptic curve cryptography. EHRs Electronic Health Records FDIA False Data Injection Attack Fee (transaction fees) Transaction fee is a fee that the initiator of a transaction includes for on-chain transaction. The fee is collected by the node that includes the transaction in a blockchain block. FHIR Fast Healthcare Interoperability Resources GPS Global Positioning System Hard fork A hard fork is a blockchain rule change such that the old rules of validation for the software will see the blocks produced according to the new rules as invalid. Hardware wallet A hardware wallet is a special type of wallet which stores the user's private keys in a secure hardware element. HIDS Host based Intrusion Detection System IDS Intrusion Detection System IoT Internet of Things KYC Know Your Customer refers to a set of business practices to verify the identity of its clients and assessing potential risks of illegal intentions. Lightning network The Lightning Network (also called state channel) is a "second layer" payment protocol that operates on top of a cryptocurrency. It enables off-chain fast transactions between participating nodes while preserving the underlying blockchain security model. State channel is a solution for blockchain scalability. LPN Learning Parity with Noise Copyright Cyber-Trust Consortium. All rights reserved. 3 D7.1 Distributed ledger state-of-the-art report LWE Learning with Errors MEC Mobile Edge Computing Merkle tree A hash tree or Merkle tree is a tree in which every leaf node is labelled with the hash of a data block and every non-leaf node is labelled with the cryptographic hash of the labels of its child nodes. Hash trees allow efficient and secure verification of the contents of large data structures. A Merkle tree is recursively defined as a binary tree of hash lists where the parent node is the hash of its children, and the leaf nodes are hashes of the original data blocks. MitM Man-in-the-Middle MQ Multivariate Quadratic polynomial NIDS Network based Intrusion Detection System NIST National Institute of Standards and Technology OSS Operational Support Systems OTS One Time Signature PKI Public Key Infrastructure PMUs Phasor Measurement Units PoW Proof-of-Work PPR Patient-Provider Relationship PPT Probabilistic Polynomial-Time Proof-of-Stake Proof of Stake (PoS) is a type of consensus algorithm by which a cryptocurrency blockchain network aims to achieve distributed consensus. In PoS-based cryptocurrencies, the creator of the next block is chosen via various combinations of random selection and wealth or age (i.e. the stake). Proof-of-Work Proof of Work (PoW) is a type of consensus algorithm by which a cryptocurrency blockchain network aims to achieve distributed consensus. In PoW-based cryptocurrencies, the creator of the next block is selected probabilistically according to some work (processing time) that it can furnish with respect to the total work furnished in the network. PoW is a protection mechanism against Denial Of Service attacks. RSA RSA (Rivest–Shamir–Adleman), from the name of the three inventors, is one of the first public-private key pair cryptographic systems. RSA Rivest-Shamir-Adleman (cryptographic algorithm) SP Service Provider SPoF Single Point of Failure Transaction A transaction is an operation that can be executed on a distributed ledger. This operation is either a “read” or “write” of the ledger. Transaction Processing a transaction means controlling the validity of the transaction and Processing reading or writing it to the distributed ledger. Turing completeness A Turing Complete system is a system that in principle could be used to solve any [2] computation problem. Non-Turing completeness blockchain such as Bitcoin lacks some computer instruction like looping instruction as opposed to the Ethereum blockchain. Wallet A wallet stores the private and the public keys. A private key can be used to sign a transaction, for instance, spend cryptocurrency. A public key can be used to receive cryptocurrency. XMSS extended Merkle signature scheme ZK Zero-Knowledge zk-SNARK Zero-Knowledge Succinct Non-Interactive Argument of Knowledge Copyright Cyber-Trust Consortium. All rights reserved. 4 D7.1 Distributed ledger state-of-the-art report Table of Contents Executive summary .............................................................................................................................. 15 1. Introduction ................................................................................................................................. 16 1.1 Purpose of the document ................................................................................................................ 16 1.2 Structure of the document .............................................................................................................. 16 2. Blockchain foundations ................................................................................................................. 17 2.1 History overview .............................................................................................................................. 17 2.1.1 Early proposals of electronic money ....................................................................................... 17 2.1.1.1 Money, from salt to bit protocols........................................................................................ 17 2.1.1.2 Commodity money to fiat currency..................................................................................... 17 2.1.1.3 Fiat currency to electronic money ....................................................................................... 18 2.1.1.4 E-gold ..................................................................................................................................