DFINITY Crypto Techniques

Total Page:16

File Type:pdf, Size:1020Kb

DFINITY Crypto Techniques INTRODUCING DFINITY Crypto Techniques V1 - 19th May 2017 Threshold Relay Produce randomness that is incorruptible, unmanipulable and unpredictable BACKGROUNDER Explain “unique deterministic” threshold signatures… Usually a signer creates a signature on message data Shared seed data (“message”) 01010101010 11010111011 01010101010 10101001010 Verifier Signature SIGN σ 10101010101 Private 00101101010 Key 10010101010 10010101001 Verifier Signer’s identity Public Key Signer Verifier AUTHORIZED SIGNER SIGNATURE VERIFIERS That can be verified using the signer’s public key Shared seed data (“message”) 01010101010 11010111011 01010101010 10101001010 Verifier Signature SIGN 10101010101 Private 00101101010 Key 10010101010 10010101001 VERIFY Verifier Signer’s identity Public Key Signer Verifier AUTHORIZED SIGNER SIGNATURE VERIFIERS If scheme unique and deterministic then only 1 correct signature Shared seed data THE SIGNATURE IS A RANDOM NUMBER, AS IF (“message”) IT WERE PREDICTABLE, THE SIGNATURE SCHEME WOULD NOT BE SECURE 01010101010 11010111011 01010101010 10101001010 Verifier Signature SIGN 10101010101 DETERMINISTIC Private 00101101010 RANDOM Key 10010101010 10010101001 VERIFY NUMBER Verifier Signer’s identity Public Key Signer Verifier AUTHORIZED SIGNER SIGNATURE VERIFIERS Unique and deterministic threshold signature scheme possible GROUP MEMBERS INDEPENDENTLY SIGN THE Shared seed data MESSAGE TO CREATE “SIGNATURE SHARES”. (“message”) A THRESHOLD NUMBER ARE COMBINED TO CREATE THE OUTPUT SIGNATURE 01010101010 11010111011 01010101010 10101001010 Verifier Signature SIGN SIGN SIGN COMBINE 10101010101 DETERMINISTIC 00101101010 RANDOM 10010101010 10010101001 VERIFY NUMBER Share 1 Share 3 Share 2 Verifier Group’s identity Public Key Signer Signer Signer Verifier THRESHOLD GROUP SIGNATURE VERIFIERS Whatever subset (threshold) of group sign still same signature Shared seed data (“message”) Share 1 01010101010 Share 3 11010111011 01010101010 Signer Signer Signer 10101001010 Verifier Signature Share 4 Share 5 COMBINE 10101010101 DETERMINISTIC 00101101010 RANDOM Signer Signer Signer 10010101010 10010101001 VERIFY NUMBER Verifier Group’s identity Share 7 Share 9 Public Key Signer Signer Signer Verifier THRESHOLD GROUP SIGNATURE VERIFIERS Important observations of powerful magic 1. A group identified by its threshold public key can only produce a single valid output signature on given seed data Verifier DETERMINISTIC RANDOM NUMBER Verifier Verifier Important observations of powerful magic 1. A group identified by its threshold public key can only produce a single valid output signature on given seed data 2. A group is fault tolerant and any subset of threshold size can distribute signature shares for combination into the signature Verifier DETERMINISTIC RANDOM NUMBER Verifier Verifier Important observations of powerful magic 1. A group identified by its threshold public key can only produce a single valid output signature on given seed data 2. A group is fault tolerant and any subset of threshold size can distribute signature shares for combination into the signature Verifier 3. The resulting threshold signature can be validated by anyone who has the group’s public key and the seed data DETERMINISTIC RANDOM NUMBER Verifier Verifier Important observations of powerful magic 1. A group identified by its threshold public key can only produce a single valid output signature on given seed data 2. A group is fault tolerant and any subset of threshold size can distribute signature shares for combination into the signature Verifier 3. The resulting threshold signature can be validated by anyone who has the group’s public key and the seed data DETERMINISTIC RANDOM 4. The signature is a deterministically produced random number NUMBER Verifier Verifier Important observations of powerful magic 1. A group identified by its threshold public key can only produce a single valid output signature on given seed data 2. A group is fault tolerant and any subset of threshold size can distribute signature shares for combination into the signature Verifier 3. The resulting threshold signature can be validated by anyone who has the group’s public key and the seed data DETERMINISTIC RANDOM 4. The signature is a deterministically produced random number NUMBER Verifier 5. Given a group’s public key and the input seed data the verifiers reach immediate consensus on the random number produced without running a consensus protocol… Verifier A unique deterministic threshold signature scheme Boneh-Lynn-Shacham signatures (BLS) TIP 1 Ben Lynn is a full time member of the Key Generation DFINITY team - Secret key: x mod r - Public key: P = xQ G TIP 2 You don’t need to understand this 2 2 2 crypto to understand the remaining slides… Signing - Message hashed to H (m) G Parameters 2 1 - Signature: s = xH(m) G1 - Two groups G 1 ,G 2 of prime order r 2 (on two elliptic curves) Verification e ( s, Q 2 )= e ( H ( m ) ,P ) ? - Generators Q1 G1,Q2 G2 2 2 - Bi-linear pairing e : G1 G2 GT ⇥ 7! BLS, 2001 (Stanford University) DECENTRALIZED VERIFIABLE RANDOM FUNCTION Relay between groups to create a random sequence A vast peer-to-peer broadcast network of mining clients… Whose public keys are registered on a supporting ledger PUBKEY 0x1bd1ccf169d755306e077b38cb9aeae28e245351 DEPOSIT: 1000 DFN PUBKEY 0x9a197453dcface85be2fbe32c8cc19bd30576ee1 DEPOSIT: 1000 DFN PUBKEY 0x2b197453dcfabe85be2fbe31c8cc19bd30576ed0 DEPOSIT: 1000 DFN Each client (“process”) belongs to threshold groups Whose public keys are also registered on the supporting ledger … GRP PUBKEY GRP PUBKEY GRP PUBKEY GRP PUBKEY GRP PUBKEY 0x7de4ac5… 0x8fb251b… 0x1a7234e… 0x2b197453… 0xb6e1a33… At each height in the sequence, there is a current group… h That signs the previous group’s signature… BLS Signature Scheme Their random number selects the next group (the “relay”) Gh+1 = [σh mod ] G |G| The relaying between groups is unmanipulable and infinite This is what Threshold Relay looks like h 1 − SIGNATURE h 1 σ − The signature created at h-1 selects the group at h h =) h h 1 G = [σ − mod ] G |G| Group members at h broadcast signature shares h BROADCAST σh,p Gh { p 2 } Collect threshold of shares & create unique group signature… h SIGNATURE σh = bls( σh,p Gh ) { p 2 } That selects the next group, ad infinitum h +1 =) Gh+1 = [σh mod ] G |G| Producing a decentralized Verifiable Random Function (VRF) h 7 h 6 h 5 h 4 h 3 h 2 h 1 h σ , σ , σ , σ , σ , σ , σ , σ = − − − − − − − ) Random number sequence is Deterministic . Verifiable . Unmanipulable Next value released on agreement a threshold of the current group… Unpredictable No consensus protocol is necessary! Random numbers should not be generated with a “ method chosen at random - Donald Knuth TLDR; such unmanipulable randomness is powerful… Decentralized Protocols Decentralized Applications for “Scaling Out” with advanced features COMING UP… PSP Blockchain Designs E.g. PHI autonomous loan Validation Towers issuance and crypto “fiat” Validation Trees USCIDs Validate anything… Fair financial exchanges… Lottery Charging Lazy Validation Fault Tolerance Example NETWORK METRICS P (Faulty 200) ≥ Processes 10,000 Faulty 3,000 1e 17 (Correct) 7,000 Probability that a sufficient Group Size 400 proportion −of the group are faulty Threshold 201 that it cannot produce a signature Calculated using hypergeometric probability e.g. Note: in practice the probability 30% http://www.geneprof.org/GeneProf/tools/ of professionally run mining hypergeometric.jsp processes “just stop” is very low. Miners will generally deregister IDs Note: groups should expire to thwart to retrieve deposits when exiting. “adaptive” adversaries Communications Overhead Example MESSAGE FORMAT GROUP SIZE Process ID 20 bytes Group size 400 Threshold 201 Signature share 32 bytes Signature on comms 32 bytes COMMUNICATION OVERHEAD Total 84 bytes Expected 22 KB In order for a group to produce a 400 messages involve 34 KB of data threshold signature, its members transfer. However, only 17 KB (half must broadcast “signature shares” the messages) are required to on the message that can be construct the signature. Thereafter combined. Here is a typical packet signature shares are not relayed, so carrying a signature share. a more typical overhead is 22 KB. BACKGROUNDER How to setup groups… Clients randomly assigned to groups by randomness (VRF) … GRP PUBKEY GRP PUBKEY GRP PUBKEY GRP PUBKEY GRP PUBKEY - - - - - Need setup threshold scheme within 1000 blocks using DKG… Joint Feldman DKG … GRP PUBKEY GRP PUBKEY GRP PUBKEY GRP PUBKEY GRP PUBKEY - - - - - Successful groups register their Public Key on the ledger … GRP PUBKEY GRP PUBKEY GRP PUBKEY GRP PUBKEY GRP PUBKEY - - - 0x2b197453… - Setup is independent of blockchain progression… Joint Joint Feldman Feldman DKG DKG … GRP PUBKEY GRP PUBKEY GRP PUBKEY GRP PUBKEY GRP PUBKEY - - - 0x2b197453… - And occurs asynchronously … GRP PUBKEY GRP PUBKEY GRP PUBKEY GRP PUBKEY GRP PUBKEY 0x7de4ac5… 0x8fb251b… - 0x2b197453… - New clients and groups activated in CURRENT_EPOCH + 2 KEY FRAME KEY FRAME KEY FRAME KEY FRAME BLOCK BLOCK BLOCK BLOCK ⇠ 3 ⇠ 2 ⇠ 1 ⇠ − − − CHAIN HEAD Activation… GROUP Join tx Join tx 0x2b197453… GROUP CLIENT 0x2b197453… 0x6e22e1ba… CLIENT 0x6e22e1ba… In choosing the epoch length there are a number of considerations. For correctness, an epoch must minimally contain more blocks than may ever be present in a chain fork. However, since light clients only require key frame header copies, for reasons of efficiency, epochs may be much longer e.g. one week Probabilistic Slot Protocol Extend the Threshold Relay system to produce a more secure
Recommended publications
  • Blockchain in the Integrated Energy Transition
    dena MULTI-STAKEHOLDER STUDY Blockchain in the integrated energy transition Study findings (dena) Blockchain in the integrated energy transition energy in the integrated Blockchain dena MULTI-STAKEHOLDER STUDY STUDY dena MULTI-STAKEHOLDER Legal information Publisher: All content has been prepared with the greatest possible care Deutsche Energie-Agentur GmbH (dena) and is provided in good faith. dena provides no guarantee for German Energy Agency the currency, accuracy, or completeness of the information Chausseestrasse 128 a provided. dena shall not be liable for damages of a material 10115 Berlin, Germany or intangible nature resulting from the use or non-use of the Tel.: + 49 (0)30 66 777-0 information provided, whether indirectly or directly, unless Fax: + 49 (0)30 66 777-699 proof of intentional or grossly negligent culpability on its part www.dena.de is provided. Authors: All rights reserved. Consent from dena is required for any use. Philipp Richard (dena) Sara Mamel (dena) Lukas Vogel (dena) Scientific experts: Prof. Dr. Jens Strüker (INEWI) Dr. Ludwig Einhellig (Deloitte) Last updated: 02/2019 Conception & design: Heimrich & Hannot GmbH Content Foreword 4 Executive summary 6 The dena multi-stakeholder study “Blockchain in the integrated energy transition” 6 Recommended courses of action 8 Checklist for blockchain in the integrated energy transition 10 Technical findings 12 Economic findings 14 Regulatory findings 17 1 Blockchain in the integrated energy transition 20 2 Blockchain technology: status quo and development prospects
    [Show full text]
  • Beauty Is Not in the Eye of the Beholder
    Insight Consumer and Wealth Management Digital Assets: Beauty Is Not in the Eye of the Beholder Parsing the Beauty from the Beast. Investment Strategy Group | June 2021 Sharmin Mossavar-Rahmani Chief Investment Officer Investment Strategy Group Goldman Sachs The co-authors give special thanks to: Farshid Asl Managing Director Matheus Dibo Shahz Khatri Vice President Vice President Brett Nelson Managing Director Michael Murdoch Vice President Jakub Duda Shep Moore-Berg Harm Zebregs Vice President Vice President Vice President Shivani Gupta Analyst Oussama Fatri Yousra Zerouali Vice President Analyst ISG material represents the views of ISG in Consumer and Wealth Management (“CWM”) of GS. It is not financial research or a product of GS Global Investment Research (“GIR”) and may vary significantly from those expressed by individual portfolio management teams within CWM, or other groups at Goldman Sachs. 2021 INSIGHT Dear Clients, There has been enormous change in the world of cryptocurrencies and blockchain technology since we first wrote about it in 2017. The number of cryptocurrencies has increased from about 2,000, with a market capitalization of over $200 billion in late 2017, to over 8,000, with a market capitalization of about $1.6 trillion. For context, the market capitalization of global equities is about $110 trillion, that of the S&P 500 stocks is $35 trillion and that of US Treasuries is $22 trillion. Reported trading volume in cryptocurrencies, as represented by the two largest cryptocurrencies by market capitalization, has increased sixfold, from an estimated $6.8 billion per day in late 2017 to $48.6 billion per day in May 2021.1 This data is based on what is called “clean data” from Coin Metrics; the total reported trading volume is significantly higher, but much of it is artificially inflated.2,3 For context, trading volume on US equity exchanges doubled over the same period.
    [Show full text]
  • DFINITY Technology Overview Series Consensus System
    DFINITY Technology Overview Series Consensus System Rev.1 Timo Hanke, Mahnush Movahedi and Dominic Williams ABSTRACT Dfinity will be introduced in a series of technology overviews, The Dfinity blockchain computer provides a secure, performant each highlighting an independent innovation in Dfinity such as and flexible consensus mechanism. While first defined for a permis- the consensus backbone, smart contract language, virtual machine, sioned participation model, the consensus mechanism itself can be concurrent contract execution model, daemon contracts, peer-to- paired with any method of Sybil resistance (e.g. proof-of-work or peer networks and secure broadcast, governance mechanism and proof-of-stake) to create an open participation model. Dfinity’s scaling techniques. The present document will focus on the con- greatest strength is unfolded in the most challenging proof-of-stake sensus backbone and cryptographic randomness. case. Dfinity has an unbiasable, verifiable random function (VRF) At its core, Dfinity contains a decentralized randomness beacon built-in at the core of its protocol. The VRF not only drives the which acts as a verifiable random function (VRF) that produces a consensus, it will also be the foundation for scaling techniques such stream of outputs over time. The novel technique behind the beacon as sharding, validation towers, etc. Moreover, the VRF produced relies on the existence of a unique-deterministic, non-interactive, by the consensus layer is available to the application layer, i.e., to DKG-friendly threshold signatures scheme. The only known ex- the smart contracts and virtual machine. In this way, the consensus amples of such a scheme are pairing-based and derived from BLS backbone is intertwined with many of the other topics.
    [Show full text]
  • Initial Crypto-Asset Offerings (Icos), Tokenization and Corporate Governance Stéphane Blémus, Dominique Guegan
    Initial Crypto-asset Offerings (ICOs), tokenization and corporate governance Stéphane Blémus, Dominique Guegan To cite this version: Stéphane Blémus, Dominique Guegan. Initial Crypto-asset Offerings (ICOs), tokenization and corpo- rate governance. 2019. halshs-02079171 HAL Id: halshs-02079171 https://halshs.archives-ouvertes.fr/halshs-02079171 Submitted on 25 Mar 2019 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Documents de Travail du Centre d’Economie de la Sorbonne Initial Crypto-asset Offerings (ICOs), tokenization and corporate governance Stéphane BLEMUS, Dominique GUEGAN 2019.04 Maison des Sciences Économiques, 106-112 boulevard de L'Hôpital, 75647 Paris Cedex 13 https://centredeconomiesorbonne.univ-paris1.fr/ ISSN : 1955-611X Initial Crypto-asset Offerings (ICOs), tokenization and corporate governance Stéphane Blemus* & Dominique Guégan** * Paris 1 Panthéon-Sorbonne University, LabEx ReFi, Kalexius law firm, ChainTech ** Centre d’Economie de la Sorbonne, Paris 1 Panthéon-Sorbonne University, Labex ReFi, Ca’Foscari University, Venezia, IPAG Business School This interdisciplinary paper by a mathematician and a legal counsel, both from the Paris 1 Panthéon-Sorbonne University, discusses the potential impacts of the so-called “initial coin offerings”, and of several developments based on distributed ledger technology (“DLT”), on corporate governance.
    [Show full text]
  • The Convergence Ecosystem
    The Convergence Ecosystem Convergence 2.0 Building the Decentralised Future This document (the “Document”) has been prepared by Outlier Ventures Operations Disclaimer Limited (“Outlier Ventures”). Outlier Ventures Operations Ltd is registered in England and Wales, company registration number 10722638. Outlier Ventures Operations Ltd is an appointed representative of Sapia Partners LLP (“Sapia”) which is authorised and regulated by the Financial Conduct Authority (Firm Reference Number 550103). No undertaking, warranty or other assurance is given, and none should be implied, as to, and no reliance should be placed on, the accuracy, completeness or fairness of the information or opinions contained in this Document. The information contained in the Document is not subject to completion, alteration and verification nor should it be assumed that the information in the Document will be updated. The information contained in the Document has not been verified by Sapia, Outlier Ventures or any of its associates or affiliates. The Document should not be considered a recommendation by Sapia, Outlier Ventures or any of its directors, officers, employees, agents or advisers in connection with any purchase of or subscription for securities. Recipients should not construe the contents of this Document as legal, tax, regulatory, financial or accounting advice and are urged to consult with their own advisers in relation to such matters. The information contained in the Document has been prepared purely for informational purposes. In all cases persons should conduct their own investigation and analysis of the data in the Document. The information contained in the Document has not been approved by the Financial Conduct Authority. This Document does not constitute, or form part of, any offer of, or invitation to apply for, securities nor shall it, or the fact of its distribution, form the basis of or be relied upon in connection with any contract or commitment to acquire any securities.
    [Show full text]
  • View the Slides
    Pixel: Multi-Signatures for Consensus Manu Drijvers (DFINITY) Sergey Gorbunov (Algorand & University of Waterloo) Gregory Neven (DFINITY) Hoeteck Wee (Algorand & CNRS, ENS, PSL) 1 Permissioned/Proof-of-Stake Blockchains Consensus: nodes agree on sequence of blocks Proof of stake (PoS): nodes vote on block proposals, weighted by stake e.g., Algorand, Cardano, Ethereum Casper Permissioned: nodes vote by access structure e.g., Ripple, Hyperledger Fabric Permissioned/Proof-of-Stake Blockchains Consensus: nodes agree on sequence of blocks Proof of stake (PoS): nodes sign block proposals, weighted by stake e.g., Algorand, Cardano, Ethereum Casper Permissioned: nodes sign by access structure e.g., Ripple, Hyperledger Fabric Multi-Signatures in Blockchains single multi-signature Σ under pk1,...,pkn on m short signature, efficient verification (preferably ≈ single signature) [IN83, OO91, MOR01, BLS01, B03, BN06, BDN18, ...] The Problem of Posterior Corruption [BPS16] aka long-range attacks [B15], costless simulation [P15] Chain integrity assumption: ≤ fraction f of nodes/stake corrupt The Problem of Posterior Corruption [BPS16] aka long-range attacks [B15], costless simulation [P15] Chain integrity assumption: ≤ fraction f of nodes/stake corrupt The Problem of Posterior Corruption [BPS16] aka long-range attacks [B15], costless simulation [P15] Chain integrity assumption: ≤ fraction f of nodes/stake signing keys corrupt The Problem of Posterior Corruption [BPS16] aka long-range attacks [B15], costless simulation [P15] Chain integrity assumption:
    [Show full text]
  • The Tree of Blockchain to Shed Light on the Innovation Within Different Components
    THE TREE OF BLOCKCHAIN APREPRINT Florian Spychiger∗ Paolo Tasca School of Management and Law Centre for Blockchain Technologies Zurich University of Applied Sciences University College London Winterthur, Switzerland London, Great Britain [email protected] [email protected] Claudio J. Tessone y Business Administration University of Zurich Zurich, Switzerland [email protected] October 7, 2020 ABSTRACT This study covers the evolutionary development of blockchain technologies over the last 11 years (2009 – 2019) and sheds lights on potential areas of innovation in heretofore unexplored sub- components. For this purpose, we collected and analysed detailed data on 107 different blockchain technologies and studied their component-wise technological evolution. The diversity of their designs was captured by deconstructing the blockchains using the Tasca-Tessone taxonomy (2019) to build what we call the "tree of blockchain" composed of blockchain main and sub-components. With the support of information theory and phylogenetics, we found that most design explorations have been conducted within the components in the areas of consensus mechanisms and cryptographic primitives. We also show that some sub-components like Consensus Immutability and Failure Tolerance, Access and Control layer and Access Supply Management have predictive power over other sub-components. We finally found that few dominant design models - the genetic driving clusters of Bitcoin, Ethereum and XRP - influenced the evolutionary paths of most of the succeeding blockchains.
    [Show full text]
  • Token Frenzy
    TOKEN FRENZY The fuel of the blockchain April 2018 Dealmakers in Technology Important disclosures appear at the back of this report GP Bullhound LLP is authorised and regulated by the Financial Conduct Authority GP Bullhound Inc is a member of FINRA Subscribe to receive GP Bullhound Research and News on www.gpbullhound.com/subscribe/ GP BULLHOUND: TOKEN FRENZY 3 CONTENTS 04 THE VIEW FROM GP BULLHOUND Sebastian N. Markowsky, GP Bullhound 06 CHAPTER 1: HISTORY & OVERVIEW OF THE BLOCKCHAIN UNIVERSE 12 CHAPTER 2: FUNDING ACTIVITY IN BLOCKCHAIN - VENTURE CAPITAL & ICOS 22 CHAPTER 3: LEADING PROTOCOLS & BLOCKCHAIN ECOSYSTEMS 24 EXPERT VIEW Joseph Lubin, Co-founder Ethereum & Founder ConsenSys 26 CHAPTER 4: KEY CHALLENGES TO BE SOLVED 28 BLOCKCHAIN SCALABILITY 29 EXPERT VIEW Prof. Emin Gün Sirer, Associate Professor at Cornell University 30 DECENTRALISATION OF EXCHANGES 31 EXPERT VIEW Peter Czaban, Polkadot Contributor & CEO Web3 Foundation 32 STAYING PRIVATE 33 EXPERT VIEW MacLane Wilkison, Founder NuCypher 34 EFFECTIVE GOVERNANCE 35 EXPERT VIEW Tatu Kärki, Communications Lead Aragon 36 CONSENSUS EFFICIENCY 37 CHAPTER 5: OUTLOOK - FINAL REMARKS 42 METHODOLOGY Dealmakers in Technology 5 EXECUTIVE SUMMARY GP BULLHOUND: TOKEN FRENZY 5 THE VIEW From GP Bullhound Sebastian N. Markowsky Director Cryptographically enabled virtual currencies equivalent From these origins, few would have expected blockchain’s From its inception, the decentralisation of the blockchain to pieces of code: Can this be sustainable? Do they carry climb to the top of the global economic agenda. The ecosystem has tended to inspire an anarchic system of any value at all? Are they secure? While these questions transition that has taken place in recent years – with governance.
    [Show full text]
  • Annexes-A-4-Artificial-Intelligence-And-Data-And-Blockchain Full-Report.Pdf
    The Future of Services ANNEXES A-4 ARTIFICIAL INTELLIGENCE & DATA, AND BLOCKCHAIN Workgroup 4 Report: AI & Data, and Blockchain CONTENTS 1 INTRODUCTION & OVERVIEW ...................................................................................................... 3 2 MARKET STUDY ............................................................................................................................. 4 2.1 GLOBAL MARKET POTENTIAL OF AI ........................................................................................... 4 2.2 SINGAPORE MARKET POTENTIAL OF AI ..................................................................................... 4 2.3 GLOBAL MARKET POTENTIAL OF BLOCKCHAIN (INCLUDES OTHER DISTRIBUTED LEDGER TECHNOLOGIES) .................................................................................................................................. 5 2.4 SINGAPORE MARKET POTENTIAL OF BLOCKCHAIN ..................................................................... 5 3 TECHNOLOGY STUDY ................................................................................................................... 7 3.1 ARTIFICIAL INTELLIGENCE ......................................................................................................... 7 3.2 BLOCKCHAIN .......................................................................................................................... 18 3.3 CONVERGENCE OF AI AND DATA, AND BLOCKCHAIN ................................................................. 31 3.4 AI, DATA AND BLOCKCHAIN
    [Show full text]
  • EMERGING TRENDS What’S Next in Blockchain 2019 Table of Contents
    COVER OPTION 2 EMERGING TRENDS What’s Next In Blockchain 2019 Table of Contents CONTENTS NExTT framework 3 NECESSARY Fiat-crypto exchanges 5 Bitcoin mining 7 Custody 9 EXPERIMENTAL Decentralized exchanges 11 Consortia 13 Stablecoins 15 Security tokens 18 Non-fungible tokens 20 Data marketplaces 23 Decentralized autonomous 25 organizations (DAOs) Identity management 27 THREATENING DLT in clearance and settlement 29 Bitcoin 31 Privacy coins 34 DLT in supply chain 36 DLT in IoT 39 TRANSITORY Initial coin offerings 41 Smart contract platforms 44 2 NExTT FRAMEWORK Emerging Trends in Blockchain Technology Enterprise distributed ledger Bitcoin and cryptocurrencies (DLT) use cases Decentralized applications 3 NExTT Trends Title of NExTT Framework TRANSITORY NECESSARY TRANSITORY AdvancedNECESSARY driver High assistance Trends seeing adoption but Trends which are seeing wide- Vehicle where there is uncertainty Telematics spread industry and customer connectivity On-demand about market opportunity. implementation / adoption and Lithium-ion access Next gen HD wherebatteries market and applications As Transitoryinfotainment trends becomemapping AI processor are understood. chips & software more broadly understood, On-board they may reveal additional diagnostics For these trends, incumbents AV sensors & opportunities and markets. should have a clear,sensor articulatedfusion Mobile strategyDigital and initiatives. marketing dealership Additive Industrial internet of manufacturing Usage-based things (IIoT) insurance Industrial R&D and design EXPERIMENTAL
    [Show full text]
  • Lambda Project
    DAPPs on the blockchain require a decentralized data storage plan 1.Project Overview With the development of blockchain technologies, the concept of decentralization has been deeply rooted in the heart of people. Lambda project is dedicated to providing a data storage infrastructure for blockchains and DAPPs and based on which it intends to However, as DAPPs can save data in the centralized Internet data center (IDC) only during the software development and running, offer storage and access capabilities of the decentralized cloud database. Moreover, based on scale-out and Sharding technology, in essence, it is still a centralized system. Traditional database systems are usually managed and maintained by single institutions it enables high-speed transactions; based on the trunk chain technology and cross-chain transaction verification, it enables which have the supreme authorities over the entire database. This mode is not suitable for data management between institutions cross-chain transactions, and data access and verification within the system; based on the Bridge Control Protocol (BCP), it where a mutual trust has not been completely built, which stands out especially in the Internet application environment. As a decen- tralized, unchangeable, traceable, and multi-party maintained new distributed data management technology, the blockchain is enables the cross-chain communications with other chain systems. By providing a series of infrastructure capability services tailored for the effective data management under these non-mutual-trust scenarios. Due to the significant differences between the including block storage, file storage, object storage, KV storage, and table storage, which can be extended without limit, and fast old and new data management architectures, the blockchain data management technology must be innovated rather than copying network transmission - remote synchronization (rsync), Lambda makes it possible for DAPPs to perform data generation, comput- the original technology.
    [Show full text]
  • Technical Whitepaper
    Technical Whitepaper Harmony Team Version 2.0 1. Introduction Since the publication of the Bitcoin whitepaper in 2008, the concept of blockchain has spread across the world. While decentralized money and applications are becoming well-publicized ideas, design limitations have challenged the core aspiration of Bitcoin. The original Bitcoin blockchain was designed as a peer-to-peer payment system [13] that allows people to transfer value without intermediaries like banks or payment processors. However, as Bitcoin gained popularity, its performance bottleneck became evident due to its limited throughput of ~7 transactions per second (TPS), and its cost as a payment system became prohibitively expensive. In 2014, Buterin et. al. [27] proposed a new blockchain infrastructure called Ethereum, which enabled developers to create various kinds of blockchain applications using “smart contracts.” However, Ethereum didn’t solve the scalability problem and, with its ~15 TPS, failed to support high-throughput applications such as gaming or decentralized exchanges. Given Ethereum and Bitcoin’s performance limitations, many blockchain projects proposed various solutions [3,4,5,6,7,8,9,10,24,25] that attempt to increase transaction throughput. Various blockchains [3,4,5,6,24,25] proposed to replace Proof-of-Work (PoW) consensus with Proof-of-Stake (PoS) consensus. Other blockchains like EOS use Delegated Proof of Stake (DPoS), where block proposers are elected by voting rather than by an on-chain algorithmic process. Projects like IOTA replaced the chain-of-blocks data structure with a DAG (Directed Acyclic Graph) data structure, which breaks the limitation of sequential processing of transactions. However, these proposed solutions cannot make significant performance gains without sacrificing other critical aspects, such as security and decentralization.
    [Show full text]