How to Not Get Caught When You Launder Money on Blockchain?

Total Page:16

File Type:pdf, Size:1020Kb

How to Not Get Caught When You Launder Money on Blockchain? How to Not Get Caught When You Launder Money on Blockchain? Cuneyt G. Akcora1, Sudhanva Purusotham2, Yulia R. Gel2 Mitchell Krawiec-Thayer3, Murat Kantarcioglu2 1University of Manitoba, 2 UT Dallas, 3 Monero Research Lab 65 Chancellor Circle Winnipeg, MB, Canada R3T 2N2 [email protected], fSudhanva.Purushotham, ygl, [email protected], [email protected] Abstract transactions and circumvent existing AI-based money laun- dering techniques. Our insights, however, are intended not to The number of blockchain users has tremendously grown in assist criminals to obfuscate their malicious activities but to recent years. As an unintended consequence, e-crime trans- motivate the AI community for further research in this area actions on blockchains has been on the rise. Consequently, public blockchains have become a hotbed of research for de- of critical societal importance and, as a result, to advance veloping AI tools to detect and trace users and transactions the state of art methodology in the AI-based cryptocurrency that are related to e-crime. money laundering detection. We argue that following a few select strategies can make In the remainder of this paper, we first identify tech- money laundering on blockchain virtually undetectable with niques that can be used by criminals to launder money on most of the currently existing tools and algorithms. As a re- blockchain and then empirically show why these techniques sult, the effective combating of e-crime activities involving would be effective in hiding patterns used by potential AI cryptocurrencies requires the development of novel analytic models. methodology in AI. 2 Related Work 1 Introduction The success of Bitcoin (Nakamoto 2008) has encouraged Cryptocurrencies have emerged as an important rapidly hundreds of similar digital coins (Tschorsch and Scheuer- evolving financial tool that allows for cross-border transac- mann 2016). The underlying Blockchain technology has tions without requiring a central trusted party. Unfortunately, been adopted in many applications. With this rapidly in- the pseudo-anonymity of cryptocurrencies also continues creasing activity, there have been numerous studies analyz- to facilitate various forms of fraudulent activities. Sellers ing the blockchain technology from different perspectives. and buyers of illicit goods are matched with ease, and pay- The earliest results aimed at tracking the transaction net- ments are quickly executed. However, contrary to fiat cur- work to locate coins used in illegal activities, such as money rencies, where law enforcement agencies have access to a laundering and blackmailing (Androulaki et al. 2013; Ober, wide arsenal of analytic methods for investigation of vari- Katzenbeisser, and Hamacher 2013). These findings are ous criminal activities, from money laundering to drug deal- known as the taint analysis (Di Battista et al. 2015). ership to human trafficking, methods for detecting crime on Bitcoin provides pseudo-anonymity: although all transac- the blockchain are yet in their infancy (Foley, Karlsen, and tions are public by nature, user identification is not required Putnin¸sˇ 2019; Zhou et al. 2020). As a result, large amounts to join the network. Mixing schemes (Maxwell 2013; Ruff- of illegal transactions with cryptocurrencies remain uniden- ing, Moreno-Sanchez, and Kate 2014) exist to hide the flow tified. Given the complexity of the transaction patterns used of coins in the network. However, as shown in (Meiklejohn arXiv:2010.15082v1 [cs.CR] 22 Sep 2020 by illicit networks, simple heuristic-based techniques do not et al. 2013), some Bitcoin payments can be traced. As a allow for reliable detection of suspicious blockchain activi- result, obfuscation efforts (Narayanan and Moser¨ 2017) by ties and efficient implementation of Anti-Money Laundering malicious users have become increasingly sophisticated. (AML) rules. In ransomware analysis, Montreal (Paquet-Clouston, To address this challenge, there have been recently pro- Haslhofer, and Dupont 2019), Princeton (Huang and McCoy posed various AI techniques, e.g., (Deng et al. 2019; Ak- 2018) and Padua (Conti, Gangwal, and Ruj 2018) studies cora et al. 2020; Lee et al. 2019). In addition, in September have analyzed networks of cryptocurrency ransomware and 2020 the U.S. Government solicited proposals for AI solu- found that hacker behavior can aid identification of undis- tions in detecting money laundering activities on cryptocur- closed ransomware payments. Datasets of these three studies rencies (Franceschi-Bicchierai 2020). are publicly available. In this paper, we identify multiple techniques that can be Early studies in ransomware detection use decision rules used by the money launderers to hide illicit cryptocurrency on amounts and times of known ransomware transac- tions to locate undisclosed ransomware (CryptoLocker) pay- Copyright c 2021, All rights reserved. ments (Liao et al. 2016). More recent studies are joint ef- forts between researchers and blockchain analytics compa- them. Once the ransomware is installed, it communicates nies (Huang and McCoy 2018; Weber et al. 2019). However, with a command and control center. Although earlier ran- these studies do not disclose features used in their AI mod- somware used hard-coded IPs and domain names, newer els. variants may use anonymity networks, such as TOR, to Darknet market vendor identification has been considered reach a hidden command and control server. In the case of by Tai, Soska, and Christin (2019) where features, such as asymmetric encryption, the encryption key is delivered to shared email addresses, are extracted from market profiles the victim’s machine. In some variants, the malware cre- and used in address classifiers. Lee et al. (2019) perform a ates the encryption key on the victim’s machine and deliv- taint analysis for addresses and track cryptocurrency pay- ers it to the command center. Once resources are locked or ments to online exchanges. We glean insights from both ar- encrypted, the ransomware displays a message that asks a ticles and create a set of rules that militate against such anal- certain amount of cryptocurrency to be sent to an address. ysis. This amount may depend on the number and size of the encrypted resources. 3 Sources of Dark Coins After payment, a decryption tool is delivered to the vic- 3.1 Darknet Markets tim. However, in some cases, such as with WannaCry, the Darknet markets are online sites that can only be accessed by ransomware contained a bug that made it impossible to iden- privacy-enhancing tools such as TOR and I2P (Lamy et al. tify who paid a ransomware amount. 2020). Markets allow vendors to create online stores and match buyers to the vendors. The merchandise range from 3.3 Undisclosed Transactions real passports to heroin and guns. The market employs an Dark coins may be received from undisclosed sales of goods escrow service where a buyer is given a one-time-use ad- or services. Typically, the coins are accrued to be spent on dress to pay for a good. After the payment, the market in- the blockchain without exchanging them for fiat currency. structs the vendor to mail the goods physically. Upon the Traditionally, a notable source of undisclosed finan- delivery (from abroad as well), the market releases coins to cial transactions has been the Hawala network which al- the vendor’s account, which can cash out the coins. The es- lows transferring money through personal connections glob- crow process can take around 6 days, and researchers found ally (El Qorchi et al. 2003). Bitcoin can be used to facilitate that in the early days (i.e., 2014) the release of coins could transfers between trustless hawalas as follows. John gives affect Bitcoin price (Janze 2017). The market needs to foster $100k USD to a hawala to transfer the equivalent amount trust between vendors and buyers to convince buyers to part to a location. A second hawala in the location receives bit- with their coins. However, occasionally, the market defrauds coins in its address and pays several dollars to John’s friend vendors and disappears with coins, or similarly, vendors de- Jim. Both hawala take a fee to allow the dollar transfer. John fraud buyers. pays both bitcoin and hawala transaction fees but avoids ver- Cryptocurrencies are ideal venues for Darknet markets ifying his identity or paying tax for the transferred amount. because payments can be made anonymously and received Hawalas undertake the risk of being discovered by financial anywhere in the world. Starting with the Silk Road in 2011, authorities. Darknet markets have been gathering ever-growing amounts where illicit goods, such as fake passports and guns, are 4 Cryptocurrency Transaction Models transacted for cryptocurrencies. Law enforcement has seized multiple Darknet markets, but the ease of setting up a new We follow the adversarial model in (Androulaki et al. market has turned this into a cat-and-mouse game. Typi- 2013) and observe the Bitcoin blockchain, denoted by tx- cally, Bitcoin and Monero are used for Darknet payments. Chain, for a period of time ∆t. In this period ∆t, n en- In multiple cases, the seized markets’ data have been made tities, U = a1; a2; : : : ; anu, send or receive transaction public (Paquet-Clouston, Decary-H´ etu,´ and Morselli 2018; outputs in txChain through a set of nα addresses: A = Branwen et al. 2015) (updated regularly) where each good a1; a2; : : : ; anα where nα ≥ nu. We assume that within is recorded with its buyer, price, and time information. Iden- ∆t, nT transactions have taken place as follows: T = tifying these payments on the Bitcoin blockchain is known T1(I1 ! O1);:::; Tn(InT ! OnT ) denotes a transaction as transaction fingerprinting (Fleder and Kester 2015). Dark- with sets of outputs and inputs, respectively. We will use net market vendors accrue big amounts of coins in multiple A(oi) to denote the bitcoin amount in an output oi 2 O. Set addresses (Tai, Soska, and Christin 2019). of addresses in an output is denoted with O:A.
Recommended publications
  • Blockchain & Cryptocurrency Regulation
    Blockchain & Cryptocurrency Regulation Third Edition Contributing Editor: Josias N. Dewey Global Legal Insights Blockchain & Cryptocurrency Regulation 2021, Third Edition Contributing Editor: Josias N. Dewey Published by Global Legal Group GLOBAL LEGAL INSIGHTS – BLOCKCHAIN & CRYPTOCURRENCY REGULATION 2021, THIRD EDITION Contributing Editor Josias N. Dewey, Holland & Knight LLP Head of Production Suzie Levy Senior Editor Sam Friend Sub Editor Megan Hylton Consulting Group Publisher Rory Smith Chief Media Officer Fraser Allan We are extremely grateful for all contributions to this edition. Special thanks are reserved for Josias N. Dewey of Holland & Knight LLP for all of his assistance. Published by Global Legal Group Ltd. 59 Tanner Street, London SE1 3PL, United Kingdom Tel: +44 207 367 0720 / URL: www.glgroup.co.uk Copyright © 2020 Global Legal Group Ltd. All rights reserved No photocopying ISBN 978-1-83918-077-4 ISSN 2631-2999 This publication is for general information purposes only. It does not purport to provide comprehensive full legal or other advice. Global Legal Group Ltd. and the contributors accept no responsibility for losses that may arise from reliance upon information contained in this publication. This publication is intended to give an indication of legal issues upon which you may need advice. Full legal advice should be taken from a qualified professional when dealing with specific situations. The information contained herein is accurate as of the date of publication. Printed and bound by TJ International, Trecerus Industrial Estate, Padstow, Cornwall, PL28 8RW October 2020 PREFACE nother year has passed and virtual currency and other blockchain-based digital assets continue to attract the attention of policymakers across the globe.
    [Show full text]
  • Blockchain and Cryptocurrency in Africa a Comparative Summary of the Reception and Regulation of Blockchain and Cryptocurrency in Africa
    Blockchain and Cryptocurrency in Africa A comparative summary of the reception and regulation of Blockchain and Cryptocurrency in Africa 2018 Baker McKenzie, Johannesburg IMPORTANT DISCLAIMER: The material in this report is of the nature of general comment only. It is not offered as legal advice on any specific issue or matter and should not be taken as such. Readers should refrain from acting on the basis of any discussion contained in this report without obtaining specific legal advice on the particular facts and circumstances at issue. While the authors have made every effort to provide accurate and up-to-date information on laws and policy, these matters are continuously subject to change. Furthermore, the application of these laws depends on the particular facts and circumstances of each situation, and therefore readers should consult their lawyer before taking any action. Information contained herein is as at November 2018. CONTENTS PREFACE ............................................................................................................................................1 GEOGRAPHICAL OVERVIEW ....................................................................................................... 2 COUNTRY PROFILES ..................................................................................................................... 3 1. Botswana ................................................................................................................................................................... 3 2. Ghana .........................................................................................................................................................................4
    [Show full text]
  • Blockchain Implementation Method for Interoperability Between Cbdcs
    future internet Article Blockchain Implementation Method for Interoperability between CBDCs Hyunjun Jung and Dongwon Jeong * Department of Software Convergence Engineering, Kunsan National University, Gunsan 54150, Korea; [email protected] * Correspondence: [email protected]; Tel.: +82-(063)-469-8912 Abstract: Central Bank Digital Currency (CBDC) is a digital currency issued by a central bank. Motivated by the financial crisis and prospect of a cashless society, countries are researching CBDC. Recently, global consideration has been given to paying basic income to avoid consumer sentiment shrinkage and recession due to epidemics. CBDC is coming into the spotlight as the way to manage the public finance policy of nations comprehensively. CBDC is studied by many countries. The bank of the Bahamas released Sand Dollar. Each country’s central bank should consider the situation in which CBDCs are exchanged. The transaction of the CDDB is open data. Transaction registers CBDC exchange information of the central bank in the blockchain. Open data on currency exchange between countries will provide information on the flow of money between countries. This paper proposes a blockchain system and management method based on the ISO/IEC 11179 metadata registry for exchange between CBDCs that records transactions between registered CBDCs. Each country’s CBDC will have a different implementation and time of publication. We implement the blockchain system and experiment with the operation method, measuring the block generation time of blockchains using the proposed method. Keywords: CBDC; CBDC exchange; ISO/IEC 11179; CBDC interoperability blockchain system Citation: Jung, H.; Jeong, D. Blockchain Implementation Method for Interoperability between CBDCs. Future Internet 2021, 13, 133.
    [Show full text]
  • Blockchain Consensus: an Analysis of Proof-Of-Work and Its Applications. Amitai Porat1, Avneesh Pratap2, Parth Shah3, and Vinit Adkar4
    Blockchain Consensus: An analysis of Proof-of-Work and its applications. Amitai Porat1, Avneesh Pratap2, Parth Shah3, and Vinit Adkar4 [email protected] [email protected] [email protected] [email protected] ABSTRACT Blockchain Technology, having been around since 2008, has recently taken the world by storm. Industries are beginning to implement blockchain solutions for real world services. In our project, we build a Proof of Work based Blockchain consensus protocol and evauluate how major applications can run on the underlying platform. We also explore how varying network conditions vary the outcome of consensus among nodes. Furthermore, to demonstrate some of its capabilities we created our own application built on the Ethereum blockchain platform. While Bitcoin is by and far the first major cryptocurrency, it is limited in the capabilities of its blockchain as a peer-to-peer currency exchange. Therefore, Ethereum blockchain was the right choice for application development since it caters itself specifically to building decentralized applications that seek rapid deployment and security. 1 Introduction Blockchain technology challenges traditional shared architectures which require forms of centralized governance to assure the integrity of internet applications. It is the first truly democratized, universally accessible, shared and secure asset control architecture. The first blockchain technology was founded shortly after the US financial collapse in 2008, the idea was a decentralized peer-to-peer currency transfer network that people can rely on when the traditional financial system fails. As a result, blockchain largely took off and made its way into large public interest. We chose to investigate the power of blockchain consensus algorithms, primarily Proof of Work.
    [Show full text]
  • Slide Presentation
    A BRIEF INTRODUCTION TO BLOCKCHAIN NANCY LIAO ’05 JOHN R. RABEN/SULLIVAN & CROMWELL EXECUTIVE DIRECTOR YLS ASSOCIATE RESEARCH SCHOLAR IN LAW “BLOCKCHAIN” HAS MANY MEANINGS “To understand the power of blockchain systems, and the things they can do, it is important to distinguish between three things that are commonly muddled up, namely the bitcoin currency, the specific blockchain that underpins it and the idea of blockchains in general.” The Trust Machine, THE ECONOMIST, Oct. 31, 2015 “BLOCKCHAIN” HAS MANY MEANINGS Phone Blockchain • The idea of a • The idea of phone network blockchain • A specific phone • The specific network (e.g., blockchain that AT&T) underlies Bitcoin • A specific use of or another coin the phone network offering (e.g., fax) • Bitcoin or another cryptocurrency WHAT IS BLOCKCHAIN? A technology that: permits transactions to be gathered into blocks and recorded; cryptographically chains blocks allows the resulting ledger to be in chronological order; and accessed by different servers. WHAT IS A DISTRIBUTED LEDGER? Centralized Ledger Distributed Ledger Client A Node A Node E Node B Client Client B Bank C Client D Node D Node C • There are multiple ledgers, but Bank holds the “golden record” • There is one ledger. All Nodes have some level of access to that • Client B must reconcile its own ledger against that of Bank, and ledger. must convince Bank of the “true state” of the Bank ledger if • All Nodes agree to a protocol that determines the “true state” of discrepancies arise the ledger at any point in time. The application
    [Show full text]
  • Blockchain + Cryptocurrency: Preparing Pennsylvania for a Digital Future Monday, July 19, 2021 | 10 A.M
    House Democratic Policy Committee Virtual Hearing Blockchain + Cryptocurrency: Preparing Pennsylvania for a Digital Future Monday, July 19, 2021 | 10 a.m. Hosted by State Rep. Napoleon Nelson 10 a.m. PANEL ONE Tonya Evans, Founder Advantage Evans Academy Professor of Law, Penn State Dickinson Law Brian Knight, Director of Innovation and Governance/ Senior Research Fellow Mercatus Center at George Mason University Kevin Werbach, Professor University of Pennsylvania Q & A WITH LEGISLATORS 10:50 a.m. PANEL TWO Gerard Dache, Executive Director Founder, Government Blockchain Association – Global Scott Nissenbaum, President & CEO Ben Franklin Technology Partners of Southeastern PA Q & A WITH LEGISLATORS 11:25 a.m. PANEL THREE Andrew Bull, Esquire Founder, Bull Blockchain Law Miller Whitehouse-Levine, Director of Policy Blockchain Association Q & A WITH LEGISLATORS Testimony submitted for the record by Blockchain Innovation Group of PA’s Michelle Bohnke Tonya M. Evans Professor of Law Dickinson Law The Pennsylvania State University Lewis Katz Hall 150 South College Street Carlisle, PA 17013 Testimony before the Pennsylvania House Democratic Policy Committee On Preparing Pennsylvania for a Digital Future Submitted by Tonya M. Evans on July 19, 2021 Professor, Penn State Dickinson Law School Founder & CEO, Advantage Evans Academy Host, Tech Intersect Podcast Chair, Maker Foundation To Chairman Bizzarro and Representative Nelson: Thank you for the invitation to participate in this important conversation as Pennsylvania prepares to position itself as a leader in digital innovation to be on the leading edge of the future of work and wealth. I am an intellectual property and technology lawyer and professor at Penn State Dickinson Law School.
    [Show full text]
  • Exploring Blockchain – Technology Behind Bitcoin and Implications for Transforming Transportation Final Report
    Exploring Blockchain – Technology behind Bitcoin and Implications for Transforming Transportation Final report PRC 17-13 F Exploring Blockchain – Technology behind Bitcoin and Implications for Transforming Transportation Texas A&M Transportation Institute PRC 17-13 F January 2018 Author Rajat Rajbhandari, PhD Copies of this publication have been deposited with the Texas State Library in compliance with the State Depository Law, Texas Government Code §441.101-106. 2 Acknowledgments Adi Ben Ari, CEO, Applied Blockchain, London, UK Chris Ballinger, Toyota Research Institute, Los Altos, California, US Peter Bidewell, CMO, Applied Blockchain, London, UK Ginger Goodin, Research Engineer, Texas A&M Transportation Institute, Austin, Texas, US Gregg Hansen, General Motors, Austin, Texas, US Hudson Jameson, Cofounder, Oaken Innovations, Dallas, Texas, US Sudha Jamthe, Stanford University, Palo Alto, California, US Jane Lappin, Toyota Research Institute, Cambridge, Massachusetts, US Ahmed Mahmoud, CIO, General Motors, Austin, Texas, US Matt Milligan, CEO, Milligan and Partners, New York, New York, US Bryant Nielson, Executive Director, Blockchain Academy, New York, New York, US Steve Polunsky, Research Scientist, Texas A&M Transportation Institute, Austin, Texas, US Sweeni Ponoth, General Manager, Bristlecone Labs, San Jose, California, US Julian Smith, Founder, BlockFreight Inc., Melbourne, Australia, Daniel Spuller, Chamber of Digital Commerce, Washington DC, US Louis Stone, Co-founder, Symbiont.io, New York, New York, US Michael Yeung, CEO, Saftonhouse Consulting Group, Vancouver, Canada 3 Transforming Transportation through Blockchain Technology Blockchain is a distributed ledger of transactions, developed originally as the accounting platform for the virtual currency, Bitcoin. The technology is used to verify transactions, creating records that cannot be changed or deleted.
    [Show full text]
  • Performance Analysis of Cryptographic Hash Functions Suitable for Use in Blockchain
    I. J. Computer Network and Information Security, 2021, 2, 1-15 Published Online April 2021 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2021.02.01 Performance Analysis of Cryptographic Hash Functions Suitable for Use in Blockchain Alexandr Kuznetsov1 , Inna Oleshko2, Vladyslav Tymchenko3, Konstantin Lisitsky4, Mariia Rodinko5 and Andrii Kolhatin6 1,3,4,5,6 V. N. Karazin Kharkiv National University, Svobody sq., 4, Kharkiv, 61022, Ukraine E-mail: [email protected], [email protected], [email protected], [email protected], [email protected] 2 Kharkiv National University of Radio Electronics, Nauky Ave. 14, Kharkiv, 61166, Ukraine E-mail: [email protected] Received: 30 June 2020; Accepted: 21 October 2020; Published: 08 April 2021 Abstract: A blockchain, or in other words a chain of transaction blocks, is a distributed database that maintains an ordered chain of blocks that reliably connect the information contained in them. Copies of chain blocks are usually stored on multiple computers and synchronized in accordance with the rules of building a chain of blocks, which provides secure and change-resistant storage of information. To build linked lists of blocks hashing is used. Hashing is a special cryptographic primitive that provides one-way, resistance to collisions and search for prototypes computation of hash value (hash or message digest). In this paper a comparative analysis of the performance of hashing algorithms that can be used in modern decentralized blockchain networks are conducted. Specifically, the hash performance on different desktop systems, the number of cycles per byte (Cycles/byte), the amount of hashed message per second (MB/s) and the hash rate (KHash/s) are investigated.
    [Show full text]
  • Gemini Trust Company, Llc
    YOUR BRIDGE TO THE FUTURE OF MONEY A Next Generation Digital Asset Exchange And Custodian CONFIDENTIAL - NOT FOR DISTRIBUTION, IN WHOLE OR IN PART, WITHOUT THE EXPRESS PERMISSION OF GEMINI TRUST COMPANY, LLC. INFORMATION AS OF JANUARY 31, 2018 UNLESS OTHERWISE NOTED. LEGAL DISCLAIMER This presentation is confidential and may not be shared or copied without the express permission of Gemini Trust Company, LLC (“Gemini). Information contained herein consists of confidential information constituting the sole property of Gemini; its use is restricted accordingly. All information herein should be maintained in a confidential manner. Unless otherwise noted, information included herein is presented as of the dates indicated. Gemini is under no obligation to update this presentation. As used herein, “Digital Asset” means a digital asset (also called a “cryptocurrency,” “virtual currency,” “digital currency,” or “digital commodity”), such as bitcoin or ether, which is based on the cryptographic protocol of a computer network that may be (i) centralized or decentralized, (ii) closed or open-source, and (iii) used as a medium of exchange and/or store of value. Gemini does not sell or issue to its users any Digital Assets, but rather provides an exchange and custodian whereby Qualified Users (as defined below) may buy, sell, exchange, trade, or store Digital Assets. All Digital Assets exchanged or traded by and between our Qualified Users originate from the Qualified Users themselves. A “Qualified User” has successfully provided the required identification information pursuant to our Bank Secrecy Act (“BSA”) and Anti-Money Laundering (“AML”) Compliance Program Program (“BSA/AML Program”). Gemini has not made any representation or warranty; express or implied, with respect to fairness, correctness, accuracy, reasonableness, or completeness of any of the information contained herein (including, but not limited to, information obtained from third parties unrelated to Gemini), and expressly disclaims any responsibility or liability.
    [Show full text]
  • What Is the Distinction Between a Blockchain and a Distributed Ledger?
    Blockchain Byte R3 Research Emily Rutland The Blockchain Byte features a question from the distributed ledger space What is the distinction between a blockchain and a distributed ledger? Blockchain has a While often used interchangeably, a blockchain and a shared and replicated distributed ledger are distinct – though subtly different – technologies. ledger comprised of information stored in A distributed ledger is a record of consensus with a “blocks” and sits below cryptographic audit trail which is maintained and validated by several separate nodes*. This a distributed ledger cryptographically assured and synchronized data can be and acts as a way to spread across multiple institutions. Distributed ledgers can verify transactions be either decentralized, granting equal rights within the submitted by protocol to all participants or centralized, designating producing a new certain users particular rights. Actors typically employ “block” to the chain. distributed ledgers when they need a tool which permits the concurrent editing of a shared state while maintaining its unicity. The ledger’s state is determined through a Distributed ledger is a consensus algorithm, which can vary in its mechanics but record of consensus ultimately serves to validate information from inputs to the with cryptographic network. audit trail maintained and validated by nodes. It can be decentralized or centralized. For more Blockchain Byte posts, R3 members visit: 2 https://r3-cev.atlassian.net/wiki/x/HgEwAw What are Blocks and Why Aren’t They Necessary? Often described as the technology that underpins the Bitcoin network, a blockchain data structure has a shared, replicated ledger comprised of digitally recorded and unchangeable data in packages called blocks.
    [Show full text]
  • Decentralized Anonymous Payments
    Decentralized Anonymous Payments by Ian Miers A dissertation submitted to The Johns Hopkins University in conformity with the requirements for the degree of Doctor of Philosophy. Baltimore, Maryland August, 2017 © Ian Miers 2017 All rights reserved Abstract Decentralized payment systems such as Bitcoin record monetary transactions between pseudonyms in an append-only ledger known as a blockchain. Because the ledger is public, permanent, and readable by anyone, a user's privacy depends solely on the difficulty of linking pseudonymous transactions either to each other or to real identities. Both academic work and commercial services have shown that such linking is, in fact, very easy. Anyone at any point in the future can download a user's transaction history and analyze it. In this work, we propose and implement privacy preserving coins, payments, and payment channels that can be built atop a ledger. In particular we propose: Zerocoin A blockchain based protocol for breaking the link between a transaction that receives non-anonymous funds and the subsequent transaction that spends it. Zerocash The successor to Zerocoin, a blockchain based payment system supporting anonymous payments of arbitrary hidden value to other parties. While payments are recorded publicly in the blockchain, they reveal almost nothing else: the ii ABSTRACT recipient learns only the amount paid but not the source and anyone else learns only that a payment of some value to someone took place. Bolt A payment channel protocol that allows two parties to anonymously and se- curely make many unlinkable payments while only posting two messages to the blockchain. This protocol provides for instant payments while providing drastically improved scalability as every transaction is no longer recorded in the blockchain.
    [Show full text]
  • Huobi Partners with Global Digital Finance (GDF) to Develop the Digital Asset Industry & Improve Market Integrity
    Huobi Partners with Global Digital Finance (GDF) to develop the digital asset industry & improve market integrity In addition to serving as a GDF Patron Member and on the organization’s Advisory Council alongside Coinbase, Circle, ConsenSys, Diginex, and others, Huobi also co-chairs its Market Integrity Working Group. NEW YORK – July 31, 2019:​ Leading global digital asset service provider Huobi is pleased to announce it is partnering with industry group Global Digital Finance (GDF) to develop best practices and standards within the digital assets community. Huobi now sits on the organization’s Patron Board and Advisory Council alongside other crypto leaders like Circle, Coinbase, ConsenSys, DLA Piper, Diginex, Hogan Lovells, and R3. “As a Patron Member of Global Digital Finance, Huobi is honored and delighted to work with top institutions all over the world. Through our efforts, we have infinite faith in promoting the development of this industry while addressing major issues surrounding market integrity, compliance, practice standards and business models. Huobi believes blockchain technology could benefit our society, and we will continue to devote ourselves to this case.” says Chris Lee, CFO of Huobi. The Patron Board supports the GDF organisation in the development of its global strategy and by growing the community membership of firms who wish to adhere to GDF’s Code of Conduct. As part of its efforts on the board, Huobi now co-chairs GDF’s Market Integrity Working Group, where it will help address issues like wash trading, market manipulation, and other abusive practices. “Maintaining the public’s trust that markets are fair and transparent is crucially important if we want our industry to grow,” said Josh Goodbody, Head of Europe & the Americas, Huobi Global Sales and Institutional Business.
    [Show full text]