Basic Manual on the Detection and Investigation of the Laundering of Crime Proceeds Using Virtual Currencies

Total Page:16

File Type:pdf, Size:1020Kb

Basic Manual on the Detection and Investigation of the Laundering of Crime Proceeds Using Virtual Currencies а Basic Manual on the Detection And Investigation of the Laundering of Crime Proceeds Using Virtual Currencies June 2014 The designations employed and the presentation of the material in this publication do not imply the expression of any opinion whatsoever on the part of the Secretariat of the United Nations concerning the legal status of any country, territory, city or area, or of its authorities, or concerning the delimitation of its frontiers or boundaries. Countries and areas are referred to by the names that were in official use at the time the relevant data were collected. Any trademarks used throughout this manual are the property of their respective owners. This publication was produced with the financial support of the U.S. Department of State, Bureau for International Narcotics and Law Enforcement Affairs. Opinions, conclusions and recommendations expressed in the publication belong to the author(s) and do not necessarily reflect the view of the Department of State. This publication has not been formally edited. Cover photo: Antoaneta Petrova. 1 1 Introduction As a custodian of the UN Convention against Illicit Traffic in Narcotic Drugs and Psychotropic Substances, the UN Convention against Transnational Organized Crime and the UN Convention against Corruption, UNODC possesses significant comparative advantages for delivering assistance in the anti money-laundering and asset forfeiture areas. The UNODC mandate in these areas was strengthened by ECOSOC resolution 2004/29, which specifically states that UNODC should “continue its work against money-laundering, subject to the availability of extra budgetary resources and in cooperation with relevant regional and international organizations participating in activities designed to give effect to applicable international instruments and relevant standards for combating money-laundering, through the provision to Member States, upon request, of training, advisory assistance and long term technical assistance”. In 2012, at the request of the GUAM Secretariat, and with the financial support of the Bureau for International Law Enforcement and Narcotics Affairs of the US Department of State, the UNODC Regional Office for Central Asia launched the project “Strengthening capacities of the GUAM Member States to cooperate at the national and regional levels in combating money-laundering as well as in seizing and confiscating crime proceeds”. The project seeks to promote a regional approach to counter money-laundering in the GUAM Member States (Georgia, Ukraine, Azerbaijan and Moldova) and, at the same time, to strengthen inter-agency cooperation of these States at the national levels. The purpose of this manual, which has been drafted in the framework of the above mentioned project, is to provide practical information for investigators and prosecutors on the detection, investigation, prosecution and seizure of crime proceeds laundered through the use of virtual currencies. 2 2 Acknowledgements The authors would like to thank all of those who provided input, advice and feedback on the content of the manual. The manual has been drafted under the technical guidance of the UNODC Global Programme against Money Laundering, Proceeds of Crime and the Financing of Terrorism (GPML) and Global Programme on Cybercrime. Expert contributions were provided by the UNODC consultants Messrs. David O’Reilly, Giorgi Jokhadze and Yevheniy Umanets. Contributions were also provided by representatives from the GUAM states. 3 3 Table of Contents Module 1: Introduction to Virtual Currencies ……………………………………………… 5 Module 2: The Challenges Presented by Virtual Currencies ….…………………… 37 Module 3: Detection and Investigation of Laundering Crime Proceeds Using Virtual Currencies ……………………………………………………..……. 73 Module 4: Seizure of Virtual Currencies ………………………………………….……… 133 Annex 1: Bibliography ……………………………………………………………………….…… 157 Annex 2: Glossary …………………………………………………………………………..………. 167 Annex 3: Examples and Analysis Pertaining to the GUAM Countries …………. 176 Annex 4: List of Designated Agencies in the GUAM Countries ……………...……. 187 Annex 5: Samples Answers to Self-Assessment Questions ………………...……… 201 Basic Manual on the Detection And Investigation of the Laundering of Crime Proceeds Using Virtual Currencies Module 1 Introduction to Virtual Currencies Module 1 : Introduction to Virtual Currencies 6 1 Summary The purpose of this module is to provide a general overview of the history and concepts of electronic money and virtual currencies. The information contained in this module is important background material that forms the basis and context for the modules that follow. To understand the genesis of virtual currencies, a brief history of virtual currencies is provided, including some of the most famous examples of virtual currencies and virtual currency exchanges. This is followed by definitions of the key terms that will be used throughout these modules, as well as relevant legal definitions. Providing clear definitions helps to refine the scope of the discussion, as well as preventing miscommunication and confusion. A description of some of the more common types of electronic money and virtual currencies is then provided, including a categorisation model for virtual currencies. It is very important from an investigative point of view to understand the interfaces between electronic money, virtual currencies and the traditional financial system. Some of the most common interfaces are discussed and finally, the current state of legal regulation of virtual currencies is provided. Several case studies of virtual currencies are included, with particular attention paid to the Bitcoin network, considering its topical nature and the particular challenges raised by this technology. 2 Learning Objectives By the end of this module you will: Know the key terms in the area of electronic money and virtual currencies. Be aware of the main types of electronic money and virtual currencies. Understand the interface between virtual currencies and the traditional financial system. Know the current state of legal regulation of electronic money and virtual currencies. Know what bitcoins are and how they work, as an example of a cryptocurrency. Module 1 : Introduction to Virtual Currencies 7 3 History of Virtual Currencies Virtual currencies are not a new concept, with multiple virtual currencies having come and gone over the past decade. This section provides a brief summary of some of the most famous virtual currencies and currency exchanges. One of the first popular virtual currencies was E-Gold. First established in 19961, E-Gold allowed users to open an account with a value denominated in grams of gold (or other precious metals) and the ability to make instant transfers of value to other E-Gold accounts. It was reported that in 2005 E-Gold had 2.5 million account holders, performing daily transactions with a typical value of US$6.3 million. In 2007, E-Gold was indicted by a grand jury in the US, accusing the company of money-laundering, conspiracy and operating an unlicensed money transmitting business, ultimately leading to the shut down of E-Gold by the US courts2, 3. E-Gold spawned a range of imitators such as e-Bullion.com, Pecunix.com and others. In 1998, WebMoney was established and continues to experience significant growth, with almost 25 million users at the time of writing4. The WebMoney system is based on providing its users with the ability to control individual property rights for valuables (assets) stored by other participants of the system (known as Guarantors)5. Liberty Reserve, established in 2006, and operating until 2013, allowed users to register and transfer money to other users with only a name, email address and date of birth. No efforts were made to verify the identities of its users. In 2013 the US Department of Justice charged Liberty Reserve with operating an unregistered money transmitter business and money-laundering for facilitating the movement of more than $6 billion in illicit proceeds6. Bitcoin is a decentralised, peer-to-peer payment network that is powered by its users with no central authority or middlemen. Satoshi Nakamoto published the 1 “Feds accuse E-Gold of helping cybercrooks”, NBC News, May 2007. (Source: http://redtape.nbcnews.com/_news/2007/05/02/6346006-feds-accuse-e-gold-of-helping- cybercrooks) 2 “Internet currency firm pleads guilty to money laundering”, The Industry Standard, July 2008. (Source: http://web.archive.org/web/20090414185759/http://www.thestandard.com/news/2008/0 7/22/internet-currency-firm-pleads-guilty-money-laundering) 3 http://en.wikipedia.org/wiki/E-gold 4 http://www.wmtransfer.com/eng/about/statistics/index.shtml, WebMoney statistics retrieved April 2014. 5 http://en.wikipedia.org/wiki/WebMoney 6 “’Black Market Bank’ Accused of Laundering $6B in Criminal Proceeds”, ABC News, May 2013. (Source: http://abcnews.go.com/US/black-market-bank-accused-laundering-6b- criminal-proceeds/story?id=19275887) Module 1 : Introduction to Virtual Currencies 8 first Bitcoin specification and proof of concept to a cryptography mailing list in 20097. Since that time, the value of bitcoins has fluctuated wildly, ranging from approximately US$0.30 in 2011 to US$1135 in 20138. The operation of the Bitcoin network is discussed in detail in the Bitcoin case study below. 4 Definition of Terms The definition of terms is important to prevent duplication of effort and unintended confusion. This is particularly relevant in the area of virtual currencies where numerous related
Recommended publications
  • Enforcement Trends in Cryptocurrency
    Latham & Watkins Financial Institutions Group & White Collar December 9, 2015 | Number 1904 Defense & Investigations Practice Enforcement Trends in Cryptocurrency Cryptocurrency is on the rise...and so are enforcement actions. In less than a decade, cyptocurrencies have grown from a novelty reserved for those dealing in the illicit into a robust platform embraced by financial institutions and businesses alike. Wall Street and strategic investors have increasingly taken note, working to adapt their technology, streamline market trading and integrate cryptocurrency into everyday financial transactions. The rapid adoption of cryptocurrencies has also led to increased government enforcement activity. These actions evidence US regulators’ appetite to investigate fraud and other violations linked to cryptocurrency — often using traditional laws and regulations. Given this increased government scrutiny, financial institutions and traders should understand how regulators have policed the virtual world in the past in order to be prepared for the future. Government Enforcement Actions in the Cryptocurrency Space Unsurprisingly, government regulators, including the Securities and Exchange Commission (SEC), the Department of Justice (DOJ), the Commodities Futures Trading Commission (CFTC), the Federal Trade Commission (FTC) and the Financial Crimes Enforcement Network (FinCEN), have become increasingly active in policing the cryptocurrency space. The below enforcement actions provide a bird’s-eye view of how the enforcement framework for cryptocurrencies
    [Show full text]
  • The Advantages and Disadvantages of Bitcoin Payments in the New Economy Carina-Elena Stegăroiu, Lecturer Phd, „Constantin Br
    Annals of the „Constantin Brâncuşi” University of Târgu Jiu, Economy Series, Issue 1/2018 THE ADVANTAGES AND DISADVANTAGES OF BITCOIN PAYMENTS IN THE NEW ECONOMY CARINA-ELENA STEGĂROIU, LECTURER PHD, „CONSTANTIN BRÂNCUŞI” UNIVERSITY, TÂRGU JIU, ROMANIA [email protected] Abstract In the Internet economy, with the help of cryptography, a branch of mathematics dealing with the security of information, as well as authentication and restriction of access to a computer system, a new digital coin as an alternative to national currencies appeared. In accomplishing this, using both mathematical methods (taking advantage of, for example, the difficulty of factorizing very large numbers), and quantum encryption methods. Throughout the world, information technology companies are focusing on information protection, inventing day-to-day methods with greater durability. In the horizon of Information Security, Quantum Cryptography has emerged, generating new possibilities in that field, hoping that data will be better protected and that the digital currency will resist over time and eventually evolve in the future, although Kurzweil, Bitcoin's pioneering technology is unlikely to be used in this respect. The idea of virtual alternatives to national currencies is not new, with advantages and disadvantages. The advantages of this coin are high payment freedom, transparency of information, high security, reduced risks for traders. Among the disadvantages we highlight the risk and volatility, the lack of notification and understanding, with incomplete functions, but which are developing, so Bitcoin is not perfect. Keywords: bitcoin, criptografie, methodology, economic growth, economic agent, branch production, virtual economy, monedă digitală Classification JEL: F60, F61. F62, F63 1. Introduction The idea of virtual alternatives to national currencies is not a new one, Iceland being a country that in April issued its own virtual modular Auroracoin, distributing it to the population.
    [Show full text]
  • YEUNG-DOCUMENT-2019.Pdf (478.1Kb)
    Useful Computation on the Block Chain The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation Yeung, Fuk. 2019. Useful Computation on the Block Chain. Master's thesis, Harvard Extension School. Citable link https://nrs.harvard.edu/URN-3:HUL.INSTREPOS:37364565 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Other Posted Material, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#LAA 111 Useful Computation on the Block Chain Fuk Yeung A Thesis in the Field of Information Technology for the Degree of Master of Liberal Arts in Extension Studies Harvard University November 2019 Copyright 2019 [Fuk Yeung] Abstract The recent growth of blockchain technology and its usage has increased the size of cryptocurrency networks. However, this increase has come at the cost of high energy consumption due to the processing power needed to maintain large cryptocurrency networks. In the largest networks, this processing power is attributed to wasted computations centered around solving a Proof of Work algorithm. There have been several attempts to address this problem and it is an area of continuing improvement. We will present a summary of proposed solutions as well as an in-depth look at a promising alternative algorithm known as Proof of Useful Work. This solution will redirect wasted computation towards useful work. We will show that this is a viable alternative to Proof of Work. Dedication Thank you to everyone who has supported me throughout the process of writing this piece.
    [Show full text]
  • Money Laundering Using Cryptocurrency: the Case of Bitcoin!
    Athens Journal of Law - Volume 7, Issue 2, April 2021 – Pages 253-264 Money Laundering using Cryptocurrency: The Case of Bitcoin! By Gaspare Jucan Sicignano* The bitcoin, one of the most discussed topics in recent years, is a virtual currency with enormous potential and can be used almost immediately with no intervention from financial institutions. It has spread rapidly over the last few years, and all financial and governmental institutions have warned of the risk of its use for money laundering. The paper focuses on this aspect in order to understand if any purchases of bitcoins, using illicit money, can come under the anti-money laundering criminal law. Keywords: Bitcoin; Money laundering; Italian law; Cryptocurrency. Introduction The bitcoin1 is a virtual, decentralised and partially anonymous currency based on cryptography and peer-to-peer technology2. With bitcoins it is possible to buy any type of good or service securely and rapidly. Transactions need not be authorised by a central entity; rather, they are validated by all users of the platform. The system is totally secure, since it is practically impossible to hack the protocol3. Bitcoin has been much criticised over the last few years; it has quickly become public enemy number one for everything from financing terrorism to drug dealing to money laundering. It has also recently been said that bitcoin would pollute the planet due to the resources required for mining4. This paper will attempt to analyse in depth the relationship between the bitcoin and money laundering in Italian law. It will analyse the warnings issued by authorities in various sectors, as well as the opinions expressed in Italian legal literature regarding the possibility of committing money laundering and self- laundering crimes in various operations carried out using virtual currency.
    [Show full text]
  • Linking Wallets and Deanonymizing Transactions in the Ripple Network
    Proceedings on Privacy Enhancing Technologies ; 2016 (4):436–453 Pedro Moreno-Sanchez*, Muhammad Bilal Zafar, and Aniket Kate* Listening to Whispers of Ripple: Linking Wallets and Deanonymizing Transactions in the Ripple Network Abstract: The decentralized I owe you (IOU) transac- 1 Introduction tion network Ripple is gaining prominence as a fast, low- cost and efficient method for performing same and cross- In recent years, we have observed a rather unexpected currency payments. Ripple keeps track of IOU credit its growth of IOU transaction networks such as Ripple [36, users have granted to their business partners or friends, 40]. Its pseudonymous nature, ability to perform multi- and settles transactions between two connected Ripple currency transactions across the globe in a matter of wallets by appropriately changing credit values on the seconds, and potential to monetize everything [15] re- connecting paths. Similar to cryptocurrencies such as gardless of jurisdiction have been pivotal to their suc- Bitcoin, while the ownership of the wallets is implicitly cess so far. In a transaction network [54, 55, 59] such as pseudonymous in Ripple, IOU credit links and transac- Ripple [10], users express trust in each other in terms tion flows between wallets are publicly available in an on- of I Owe You (IOU) credit they are willing to extend line ledger. In this paper, we present the first thorough each other. This online approach allows transactions in study that analyzes this globally visible log and charac- fiat money, cryptocurrencies (e.g., bitcoin1) and user- terizes the privacy issues with the current Ripple net- defined currencies, and improves on some of the cur- work.
    [Show full text]
  • Het Juridisch Statuut Van Virtuele Munteenheden
    KU LEUVEN FACULTEIT RECHTSGELEERDHEID Academiejaar 2014 - 2015 Het juridisch statuut van virtuele munteenheden Bitcoin’s pragmatic legal vacuum Promotor : Prof. Dr. M.E. Storme Masterscriptie, ingediend door Begeleider: Drs. F. Helsen Cedric Hauben bij het eindexamen voor de graad van MASTER IN DE RECHTEN “There are few things more fascinating in our jurisprudence than the organization of what comes, almost immediately, to be perceived as a new field of law” - Grant GILMORE, 1974 Sterling professor of Law, Yale Univesity 2 Inhoudstafel Inhoudstafel ...................................................................................................................................... 3 Samenvatting .................................................................................................................................... 7 Dankwoord ........................................................................................................................................ 8 Inleiding ............................................................................................................................................. 9 Hoofdstuk 1: Situering ............................................................................................................... 11 §1.1. Wat is geld? ...................................................................................................................... 11 1.1.1. Definitie ........................................................................................................................................
    [Show full text]
  • Piecework: Generalized Outsourcing Control for Proofs of Work
    (Short Paper): PieceWork: Generalized Outsourcing Control for Proofs of Work Philip Daian1, Ittay Eyal1, Ari Juels2, and Emin G¨unSirer1 1 Department of Computer Science, Cornell University, [email protected],[email protected],[email protected] 2 Jacobs Technion-Cornell Institute, Cornell Tech [email protected] Abstract. Most prominent cryptocurrencies utilize proof of work (PoW) to secure their operation, yet PoW suffers from two key undesirable prop- erties. First, the work done is generally wasted, not useful for anything but the gleaned security of the cryptocurrency. Second, PoW is natu- rally outsourceable, leading to inegalitarian concentration of power in the hands of few so-called pools that command large portions of the system's computation power. We introduce a general approach to constructing PoW called PieceWork that tackles both issues. In essence, PieceWork allows for a configurable fraction of PoW computation to be outsourced to workers. Its controlled outsourcing allows for reusing the work towards additional goals such as spam prevention and DoS mitigation, thereby reducing PoW waste. Meanwhile, PieceWork can be tuned to prevent excessive outsourcing. Doing so causes pool operation to be significantly more costly than today. This disincentivizes aggregation of work in mining pools. 1 Introduction Distributed cryptocurrencies such as Bitcoin [18] rely on the equivalence \com- putation = money." To generate a batch of coins, clients in a distributed cryp- tocurrency system perform an operation called mining. Mining requires solving a computationally intensive problem involving repeated cryptographic hashing. Such problem and its solution is called a Proof of Work (PoW) [11]. As currently designed, nearly all PoWs suffer from one of two drawbacks (or both, as in Bitcoin).
    [Show full text]
  • Printpdf/Libra-3
    LIBRA drishtiias.com/printpdf/libra-3 Why in News? Facebook has announced the launch of a cryptocurrency called Libra by 2020. While this signals facebook’s plans to expand into the global digital currency market, it has also raised privacy concerns. Digi Currency: Facebook’s cryptocurrency Libra will allow smartphone users to buy services digitally from their phone. Digital Wallet: Libra will be stored in a digital wallet called Calibra. Calibra is a standalone app on a user's smartphone or housed within Facebook-owned services such as WhatsApp and Messenger. How can users buy Libra? Users will need to sign up for an account using a government-issued ID to use Calibra wallet. Users will then be able to convert their money into Libra and add it to their digital wallet. Once in place, the currency can be used to pay for everyday transactions. 1/5 Libra Association: The cryptocurrency will be run by the Libra Association, a Geneva-based entity that has founding partners, including Facebook, Mastercard, Visa, Uber, and the Vodafone group. Libra Reserve: Libra will be backed by a reserve of assets in the form of securities (bank deposits and short-term government securities) and fiat currencies (like dollar, pound) to give it an intrinsic value and ensure stability. Anyone with Libra will have an assurance that they can convert their digital currency into local fiat currency based on an exchange rate. Libra Blockchain: Every Libra payment is permanently written into the Libra blockchain which is a cryptographically authenticated database and acts as a public online ledger designed to handle 1,000 transactions per second.
    [Show full text]
  • Blocksci: Design and Applications of a Blockchain Analysis Platform
    BlockSci: Design and applications of a blockchain analysis platform Harry Kalodner Steven Goldfeder Alishah Chator [email protected] [email protected] [email protected] Princeton University Princeton University Johns Hopkins University Malte Möser Arvind Narayanan [email protected] [email protected] Princeton University Princeton University ABSTRACT to partition eectively. In fact, we conjecture that the use of a tra- Analysis of blockchain data is useful for both scientic research ditional, distributed transactional database for blockchain analysis and commercial applications. We present BlockSci, an open-source has innite COST [5], in the sense that no level of parallelism can software platform for blockchain analysis. BlockSci is versatile in outperform an optimized single-threaded implementation. its support for dierent blockchains and analysis tasks. It incorpo- BlockSci comes with batteries included. First, it is not limited rates an in-memory, analytical (rather than transactional) database, to Bitcoin: a parsing step converts a variety of blockchains into making it several hundred times faster than existing tools. We a common, compact format. Currently supported blockchains in- describe BlockSci’s design and present four analyses that illustrate clude Bitcoin, Litecoin, Namecoin, and Zcash (Section 2.1). Smart its capabilities. contract platforms such as Ethereum are outside our scope. Second, This is a working paper that accompanies the rst public release BlockSci includes a library of useful analytic and visualization tools, of BlockSci, available at github.com/citp/BlockSci. We seek input such as identifying special transactions (e.g., CoinJoin) and linking from the community to further develop the software and explore addresses to each other based on well-known heuristics (Section other potential applications.
    [Show full text]
  • Merged Mining: Curse Or Cure?
    Merged Mining: Curse or Cure? Aljosha Judmayer, Alexei Zamyatin, Nicholas Stifter, Artemios Voyiatzis, Edgar Weippl SBA Research, Vienna, Austria (firstletterfirstname)(lastname)@sba-research.org Abstract: Merged mining refers to the concept of mining more than one cryp- tocurrency without necessitating additional proof-of-work effort. Although merged mining has been adopted by a number of cryptocurrencies already, to this date lit- tle is known about the effects and implications. We shed light on this topic area by performing a comprehensive analysis of merged mining in practice. As part of this analysis, we present a block attribution scheme for mining pools to assist in the evaluation of mining centralization. Our findings disclose that mining pools in merge-mined cryptocurrencies have operated at the edge of, and even beyond, the security guarantees offered by the underlying Nakamoto consensus for ex- tended periods. We discuss the implications and security considerations for these cryptocurrencies and the mining ecosystem as a whole, and link our findings to the intended effects of merged mining. 1 Introduction The topic of merged mining has received little attention from the scientific community, despite having been actively employed by a number of cryptocurrencies for several years. New and emerging cryptocurrencies such as Rootstock continue to consider and expand on the concept of merged mining in their designs to this day [19]. Merged min- ing refers to the process of searching for proof-of-work (PoW) solutions for multiple cryptocurrencies concurrently without requiring additional computational resources. The rationale behind merged mining lies in leveraging on the computational power of different cryptocurrencies by bundling their resources instead of having them stand in direct competition, and also to serve as a bootstrapping mechanism for small and fledgling networks [27, 33].
    [Show full text]
  • Does the Hashrate Affect the Bitcoin Price?
    Journal of Risk and Financial Management Article Does the Hashrate Affect the Bitcoin Price? Dean Fantazzini 1,* and Nikita Kolodin 2 1 Moscow School of Economics, Moscow State University, Leninskie Gory, 1, Building 61, Moscow 119992, Russia 2 Higher School of Economics, Moscow 109028, Russia; [email protected] * Correspondence: [email protected]; Tel.: +7-4955105267; Fax: +7-4955105256 Received: 30 September 2020; Accepted: 27 October 2020; Published: 30 October 2020 Abstract: This paper investigates the relationship between the bitcoin price and the hashrate by disentangling the effects of the energy efficiency of the bitcoin mining equipment, bitcoin halving, and of structural breaks on the price dynamics. For this purpose, we propose a methodology based on exponential smoothing to model the dynamics of the Bitcoin network energy efficiency. We consider either directly the hashrate or the bitcoin cost-of-production model (CPM) as a proxy for the hashrate, to take any nonlinearity into account. In the first examined subsample (01/08/2016–04/12/2017), the hashrate and the CPMs were never significant, while a significant cointegration relationship was found in the second subsample (11/12/2017–24/02/2020). The empirical evidence shows that it is better to consider the hashrate directly rather than its proxy represented by the CPM when modeling its relationship with the bitcoin price. Moreover, the causality is always unidirectional going from the bitcoin price to the hashrate (or its proxies), with lags ranging from one week up to six weeks later. These findings are consistent with a large literature in energy economics, which showed that oil and gas returns affect the purchase of the drilling rigs with a delay of up to three months, whereas the impact of changes in the rig count on oil and gas returns is limited or not significant.
    [Show full text]
  • Alternative Mining Puzzles
    Cryptocurrency Technologies Alternative Mining Puzzles Alternative Mining Puzzles • Essential Puzzle Requirements • ASIC-Resistant Puzzles • Proof-of-Useful-Work • Non-outsourceable Puzzles • Proof-of-Stake “Virtual Mining” Puzzles (recap) Incentive system steers participants Basic features of Bitcoin’s puzzle The puzzle is difficult to solve, so attacks are costly … but not too hard, so honest miners are compensated Q: What other features could a puzzle have? 1 Cryptocurrency Technologies Alternative Mining Puzzles On today’s menu . Alternative puzzle designs Used in practice, and speculative Variety of possible goals ASIC resistance, pool resistance, intrinsic benefits, etc. Essential security requirements Alternative Mining Puzzles • Essential Puzzle Requirements • ASIC-Resistant Puzzles • Proof-of-Useful-Work • Non-outsourceable Puzzles • Proof-of-Stake “Virtual Mining” 2 Cryptocurrency Technologies Alternative Mining Puzzles Puzzle Requirements A puzzle should ... – be cheap to verify – have adjustable difficulty – <other requirements> – have a chance of winning that is proportional to hashpower • Large player get only proportional advantage • Even small players get proportional compensation Bad Puzzle: a sequential Puzzle Consider a puzzle that takes N steps to solve a “Sequential” Proof of Work N Solution Found! 3 Cryptocurrency Technologies Alternative Mining Puzzles Bad Puzzle: a sequential Puzzle Problem: fastest miner always wins the race! Solution Found! Good Puzzle => Weighted Sample This property is sometimes called progress free. 4 Cryptocurrency Technologies Alternative Mining Puzzles Alternative Mining Puzzles • Essential Puzzle Requirements • ASIC-Resistant Puzzles • Proof-of-Useful-Work • Non-outsourceable Puzzles • Proof-of-Stake “Virtual Mining” ASIC Resistance – Why?! Goal: Ordinary people with idle laptops, PCs, or even mobile phones can mine! Lower barrier to entry! Approach: Reduce the gap between custom hardware and general purpose equipment.
    [Show full text]