Enhancing Bitcoin Security and Performance with Strong Consistency Via Collective Signing

Total Page:16

File Type:pdf, Size:1020Kb

Enhancing Bitcoin Security and Performance with Strong Consistency Via Collective Signing Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing Eleftherios Kokoris Kogias, Philipp Jovanovic, Nicolas Gailly, Ismail Khoffi, Linus Gasser, and Bryan Ford, École Polytechnique Fédérale de Lausanne (EPFL) https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/kogias This paper is included in the Proceedings of the 25th USENIX Security Symposium August 10–12, 2016 • Austin, TX ISBN 978-1-931971-32-4 Open access to the Proceedings of the 25th USENIX Security Symposium is sponsored by USENIX Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing Eleftherios Kokoris-Kogias, Philipp Jovanovic, Nicolas Gailly, Ismail Khoffi, Linus Gasser, and Bryan Ford EPFL Abstract total computing capacity and at least about one hour has elapsed. This high transaction-confirmation latency lim- While showing great promise, Bitcoin requires users to its Bitcoin’s suitability for real-time transactions. Later wait tens of minutes for transactions to commit, and work revealed additional vulnerabilities to transaction even then, offering only probabilistic guarantees. This reversibility, double-spending, and strategic mining at- paper introduces ByzCoin, a novel Byzantine consen- tacks [25, 31, 34, 35, 48, 3]. sus protocol that leverages scalable collective signing to The key problem is that Bitcoin’s consensus algo- commit Bitcoin transactions irreversibly within seconds. rithm provides only probabilistic consistency guarantees. ByzCoin achieves Byzantine consensus while preserv- Strong consistency could offer cryptocurrencies three ing Bitcoin’s open membership by dynamically form- important benefits. First, all miners instantly agree on ing hash power-proportionate consensus groups that rep- the validity of blocks, without wasting computational resent recently-successful block miners. ByzCoin em- power resolving inconsistencies (forks). Second, clients ploys communication trees to optimize transaction com- need not wait for extended periods to be certain that a mitment and verification under normal operation while submitted transaction is committed; as soon as it ap- guaranteeing safety and liveness under Byzantine faults, pears in the blockchain, the transaction can be consid- up to a near-optimal tolerance of f faulty group members ered confirmed. Third, strong consistency provides for- among 3 f + 2 total. ByzCoin mitigates double spend- ward security: as soon as a block has been appended ing and selfish mining attacks by producing collectively to the blockchain, it stays there forever. Although in- signed transaction blocks within one minute of trans- creasing the consistency of cryptocurrencies has been action submission. Tree-structured communication fur- suggested before [17, 19, 43, 52, 56], existing propos- ther reduces this latency to less than 30 seconds. Due als give up Bitcoin’s decentralization, and/or introduce to these optimizations, ByzCoin achieves a throughput new and non-intuitive security assumptions, and/or lack higher than Paypal currently handles, with a confirma- experimental evidence of performance and scalability. tion latency of 15-20 seconds. This work introduces ByzCoin, a Bitcoin-like cryp- tocurrency enhanced with strong consistency, based on 1 Introduction the principles of the well-studied Practical Byzantine Fault Tolerance (PBFT) [14] algorithm. ByzCoin ad- Bitcoin [47] is a decentralized cryptocurrency providing dresses four key challenges in bringing PBFT’s strong an open, self-regulating alternative to classic currencies consistency to cryptocurrencies: (1) open membership, managed by central authorities such as banks. Bitcoin (2) scalability to hundreds of replicas, (3) proof-of-work builds on a peer-to-peer network where users can sub- block conflicts, and (4) transaction commitment rate. mit transactions without intermediaries. Special nodes, PBFT was not designed for scalability to large consen- called miners, collect transactions, solve computational sus groups: deployments and experiments often employ puzzles (proof-of-work) to reach consensus, and add the the minimum of four replicas [38], and generally have transactions in form of blocks to a distributed public not explored scalability levels beyond 7 [14] or 16 repli- ledger known as the blockchain. cas [16, 32, 1]. ByzCoin builds PBFT atop CoSi [54], The original Bitcoin paper argues that transaction pro- a collective signing protocol that efficiently aggregates cessing is secure and irreversible, as long as the largest hundreds or thousands of signatures. Collective sign- colluding group of miners represents less than 50% of ing reduces both the costs of PBFT rounds and the costs 1 USENIX Association 25th USENIX Security Symposium 279 for “light” clients to verify transaction commitment. Al- action confirmation latency under one minute. though CoSi is not a consensus protocol, ByzCoin imple- We find through security analysis ( 5) that ByzCoin • § ments Byzantine consensus using CoSi signing rounds to can mitigate several known attacks on Bitcoin pro- 1 make PBFT’s prepare and commit phases scalable. vided no attacker controls more than 4 of hash power. PBFT normally assumes a well-defined, closed group of replicas, conflicting with Bitcoin’s open membership 2 Background and Motivation and use of proof-of-work to resist Sybil attacks [23]. ByzCoin addresses this conflict by forming consensus This section first outlines the three most relevant areas groups dynamically from windows of recently mined of prior work that ByzCoin builds on: cryptocurrencies blocks, giving recent miners shares or voting power such as Bitcoin and Bitcoin-NG, Byzantine fault toler- proportional to their recent commitment of hash power. ance (BFT) principles, and collective signing techniques. Lastly, to reduce transaction processing latency we adopt the idea from Bitcoin-NG [24] to decouple transaction verification from block mining. 2.1 Bitcoin and Variations Experiments with a prototype implementation of Byz- Bitcoin. At the core of Bitcoin [47] rests the so-called Coin show that a consensus group formed from approxi- blockchain, a public, append-only database maintained mately the past 24 hours of successful miners (144 min- by miners and serving as a global ledger of all transac- ers) can reach consensus in less than 20 seconds, on tions ever issued. Transactions are bundled into blocks blocks of Bitcoin’s current maximum size (1MB). A and validated by a proof-of-work. A block is valid if its larger consensus group formed from one week of suc- cryptographic hash has d leading zero bits, where the dif- cessful miners (1008) reached consensus on an 8MB ficulty parameter d is adjusted periodically such that new block in 90 seconds, showing that the systems scales blocks are mined about every ten minutes on average. both with the number of participants and with the block Each block includes a Merkle tree [44] of new transac- size. For the 144-participant consensus group, with a tions to be committed, and a cryptographic hash chaining block size of 32MB, the system handles 974 transac- to the last valid block, thereby forming the blockchain. tions per second (TPS) with a 68-second confirmation la- Upon successfully forming a new block with a valid tency. These experiments suggest that ByzCoin can han- proof-of-work, a miner broadcasts the new block to the dle loads higher than PayPal and comparable with Visa. rest of the miners, who (when behaving properly) accept ByzCoin is still a proof-of-concept with several lim- the new block, if it extends a valid chain strictly longer itations. First, ByzCoin does not improve on Bitcoin’s than any they have already seen. proof-of-work mechanism; finding a suitable replace- Bitcoin’s decentralized consensus and security derive ment [4, 28, 37, 58] is an important but orthogonal area from an assumption that a majority of the miners, mea- for future work. Like many BFT protocols in prac- sured in terms of hash power or ability to solve hash- tice [15, 32], ByzCoin is vulnerable to slowdown or tem- based proof-of-work puzzles, follows these rules and al- porary DoS attacks that Byzantine nodes can trigger. Al- ways attempts to extend the longest existing chain. As though a malicious leader cannot violate or permanently soon as a quorum of miners with the majority of the block consensus, he might temporarily exclude minority network’s hash power approves a given block by min- 1 sets (< 3 ) of victims from the consensus process, depriv- ing on top of it, the block remains embedded in any fu- ing them of rewards, and/or attempt to censor transac- ture chain [29]. Bitcoin’s security is guaranteed by the tions. ByzCoin guarantees security only against attack- fact that this majority will be extending the legitimate ers who consistently control less than a third (not 50%) chain faster than any corrupt minority that might try to of consensus group shares – though Bitcoin has analo- rewrite history or double-spend currency. However, Bit- gous weaknesses accounting for selfish mining [25]. coin’s consistency guarantee is only probabilistic, which In this paper we make the following key contributions: leads to two fundamental problems. We use collective signing [54] to scale BFT protocols First, multiple miners might find distinct blocks with • to large consensus groups and enable clients to verify the same parent before the network has reached consen- operation commitments efficiently. sus. Such a conflict is called a fork, an inconsistency that We present ( 3)
Recommended publications
  • Evaluating Inclusion, Equality, Security, and Privacy in Pseudonym Parties and Other Proofs of Personhood
    Identity and Personhood in Digital Democracy: Evaluating Inclusion, Equality, Security, and Privacy in Pseudonym Parties and Other Proofs of Personhood Bryan Ford Swiss Federal Institute of Technology in Lausanne (EPFL) November 5, 2020 Abstract of enforced physical security and privacy can address the coercion and vote-buying risks that plague today’s E- Digital identity seems at first like a prerequisite for digi- voting and postal voting systems alike. We also examine tal democracy: how can we ensure “one person, one vote” other recently-proposed approaches to proof of person- online without identifying voters? But the full gamut of hood, some of which offer conveniencessuch as all-online digital identity solutions – e.g., online ID checking, bio- participation. These alternatives currently fall short of sat- metrics, self-sovereign identity, and social/trust networks isfying all the key digital personhood goals, unfortunately, – all present severe flaws in security, privacy, and trans- but offer valuable insights into the challenges we face. parency, leaving users vulnerable to exclusion, identity loss or theft, and coercion. These flaws may be insur- mountable because digital identity is a cart pulling the Contents horse. We cannot achieve digital identity secure enough to support the weight of digital democracy, until we can 1 Introduction 2 build it on a solid foundation of digital personhood meet- ing key requirements. While identity is about distinguish- 2 Goals for Digital Personhood 4 ing one person from another through attributes or affilia- tions, personhood is about giving all real people inalien- 3 Pseudonym Parties 5 able digital participation rights independent of identity, 3.1 Thebasicidea.
    [Show full text]
  • Applicability and Appropriateness of Distributed Ledgers Consensus Protocols in Public and Private Sectors: a Systematic Review
    Received February 13, 2019, accepted February 27, 2019, date of publication March 21, 2019, date of current version April 13, 2019. Digital Object Identifier 10.1109/ACCESS.2019.2904181 Applicability and Appropriateness of Distributed Ledgers Consensus Protocols in Public and Private Sectors: A Systematic Review A. SHAHAAB 1, B. LIDGEY2, C. HEWAGE 1, AND I. KHAN1 1Cardiff School of Technologies, Cardiff Metropolitan University, Cardiff, CF5 2YB, U.K. 2Companies House, Cardiff, CF14 3UZ, U.K. Corresponding author: A. Shahaab ([email protected]) This work was supported by the Knowledge Economy Skills Scholarships through a major pan-Wales operation supported by the European Social Funds through the Welsh Government, and through Companies House, U.K., under Grant CMK219. ABSTRACT Advancement of consensus protocols in recent years has enabled distributed ledger technologies (DLTs) to find its application and value in sectors beyond cryptocurrencies. Here we reviewed 66 known consensus protocols and classified them into philosophical and architectural categories, also providing a visual representation. As a case study, we focus on the public sector and highlighted potential protocols. We have also listed these protocols against basic features and sector preference in a tabular format to facilitate selection. We argue that no protocol is a silver bullet, therefore should be selected carefully, considering the sector requirements and environment. INDEX TERMS Blockchain technology, consensus algorithms, distributed consensus protocols, distributed ledger technology, DLTs for public sector, distributed systems, Govtech, permissioned and permissionless blockchains. I. INTRODUCTION information across a distributed ledger. The objective of all Achieving consensus is a fundamental problem in distributed of these attempts is to achieve availability and consistency computing.
    [Show full text]
  • Creation and Resilience of Decentralized Brands: Bitcoin & The
    Creation and Resilience of Decentralized Brands: Bitcoin & the Blockchain Syeda Mariam Humayun A dissertation submitted to the Faculty of Graduate Studies in partial fulfillment of the requirements for the degree of Doctor of Philosophy Graduate Program in Administration Schulich School of Business York University Toronto, Ontario March 2019 © Syeda Mariam Humayun 2019 Abstract: This dissertation is based on a longitudinal ethnographic and netnographic study of the Bitcoin and broader Blockchain community. The data is drawn from 38 in-depth interviews and 200+ informal interviews, plus archival news media sources, netnography, and participant observation conducted in multiple cities: Toronto, Amsterdam, Berlin, Miami, New York, Prague, San Francisco, Cancun, Boston/Cambridge, and Tokyo. Participation at Bitcoin/Blockchain conferences included: Consensus Conference New York, North American Bitcoin Conference, Satoshi Roundtable Cancun, MIT Business of Blockchain, and Scaling Bitcoin Tokyo. The research fieldwork was conducted between 2014-2018. The dissertation is structured as three papers: - “Satoshi is Dead. Long Live Satoshi.” The Curious Case of Bitcoin: This paper focuses on the myth of anonymity and how by remaining anonymous, Satoshi Nakamoto, was able to leave his creation open to widespread adoption. - Tracing the United Nodes of Bitcoin: This paper examines the intersection of religiosity, technology, and money in the Bitcoin community. - Our Brand Is Crisis: Creation and Resilience of Decentralized Brands – Bitcoin & the Blockchain: Drawing on ecological resilience framework as a conceptual metaphor this paper maps how various stabilizing and destabilizing forces in the Bitcoin ecosystem helped in the evolution of a decentralized brand and promulgated more mainstreaming of the Bitcoin brand. ii Dedication: To my younger brother, Umer.
    [Show full text]
  • Segwit2x –
    SegWit2x – A New Statement The Overwhelming power of SegWit2x In order to safeguard the community from an undesired chain split, the upgrade should be overwhelming, but it’s not enough. It should also ‘appear’ as overwhelming. People, businesses and services needs to be certain about what is going to happen and the risks if they won’t follow. My impression is that still too many speaking english people in the western world think the upgrade will be abandoned before or immediately after block 494784 is mined, thus they are going to simply ignore it. That could lead to unprepared patch up and confusion, while naïve users risk to harm themselves. For this reason and for the sake of the Bitcoin community as a whole, we need to show again, clearly and publicly the extent of the support to SegWit2x. We also need to commit ourselves in a widespread communication campaign. I know this is not a strict technical matter, but it could help a lot avoiding technical issues in the future. What we have to do First, we need a new statement from the original NYA signers and all the business, firms and individuals who joined the cause later. That statement should be slightly different from the original NYA though, and I am explaining why. We all know that what Bitcoin is will be ultimately determined by market forces, comprehensive of all the stakeholders involved: businesses, miners, users, developers, traders, investors, holders etc. Each category has its own weight in the process, and everybody has incentives in following the market.
    [Show full text]
  • Sybil Attacks on Identity-Augmented Proof-Of-Stake
    King’s Research Portal DOI: 10.1016/j.comnet.2021.108424 Document Version Early version, also known as pre-print Link to publication record in King's Research Portal Citation for published version (APA): Platt, M., & McBurney, P. (2021). Sybil Attacks on Identity-Augmented Proof-of-Stake. COMPUTER NETWORKS , 199, [108424]. https://doi.org/10.1016/j.comnet.2021.108424 Citing this paper Please note that where the full-text provided on King's Research Portal is the Author Accepted Manuscript or Post-Print version this may differ from the final Published version. If citing, it is advised that you check and use the publisher's definitive version for pagination, volume/issue, and date of publication details. And where the final published version is provided on the Research Portal, if citing you are again advised to check the publisher's website for any subsequent corrections. General rights Copyright and moral rights for the publications made accessible in the Research Portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognize and abide by the legal requirements associated with these rights. •Users may download and print one copy of any publication from the Research Portal for the purpose of private study or research. •You may not further distribute the material or use it for any profit-making activity or commercial gain •You may freely distribute the URL identifying the publication in the Research Portal Take down policy If you believe that this document breaches copyright please contact [email protected] providing details, and we will remove access to the work immediately and investigate your claim.
    [Show full text]
  • Coins, Clubs, and Crowds: Scaling and Decentralization in Next-Generation Blockchains
    Coins, Clubs, and Crowds: Scaling and Decentralization in Next-Generation Blockchains Prof. Bryan Ford Decentralized and Distributed Systems (DEDIS) School of Information and Communications (IC) [email protected] – dedis.epfl.ch Vienna BDLT Summer School – September 3, 2019 Where there’s data, there’s risk... Access, sharing compounds risk Weakest-Link Security “You can trust us!” Shared Access Partner A Business Partner B Partner C “All of us!” A Fundamental Challenge In today’s IT systems, security is an afterthought ● Designs embody “weakest-link” security Scaling to bigger systems → weaker security ● Greater chance of any “weak link” breaking Central Databases = Attractive Targets One of three credit rating agencies in the US ● Exposed sensitive personal information about 143 million people (44% of US population) The DEDIS lab at EPFL: Mission Design, build, and deploy secure privacy-preserving Decentralized and Distributed Systems (DEDIS) • Distributed: spread widely across the Internet & world • Decentralized: independent participants, no central authority, no single points of failure or compromise Overarching theme: building decentralized systems that distribute trust widely with strongest-link security Strongest-Link Security Weakest-Link Security Turning Around the Security Game Design IT systems so that making them bigger makes their security increase instead of decrease Weakest-link Strongest-link Scalable security security Strongest-link security DEDIS Laboratory Members Bryan Ford Philipp Jovanovic Associate Professor Postdoctoral Scholar Lefteris Kokoris-Kogias Kirill Nikitin Cristina Basescu Enis Ceyhun Alp Ph.D. Student Ph.D. Student Ph.D. Student Ph.D. Student Jeff R. Allen Kelong Cong Gaylor Bosson Noémien Kocher Software Engineer Software Engineer Software Engineer Software Engineer Today’s Hot Decentralized Technology (credit: Tony Arcieri) Bitcoin (2008) First successful decentralized cryptocurrency… How to track wealth (or anything)? Things Ledgers ● Gold, beads, cash..
    [Show full text]
  • Facilitating Cross-Chain Cryptocurrency Exchanges: an Inquiry Into Blockchain Technology and Interoperability with an Emphasis on Cryptocurrency Arbitrage
    Eastern Michigan University DigitalCommons@EMU Senior Honors Theses & Projects Honors College 2020 Facilitating cross-chain cryptocurrency exchanges: An inquiry into blockchain technology and interoperability with an emphasis on cryptocurrency arbitrage Samuel Grone Follow this and additional works at: https://commons.emich.edu/honors Part of the Computer Sciences Commons Facilitating cross-chain cryptocurrency exchanges: An inquiry into blockchain technology and interoperability with an emphasis on cryptocurrency arbitrage Abstract Since the introduction and proliferation of the blockchain-based cryptocurrency Bitcoin, alternative cryptocurrencies also based on blockchain technology have exploded in number. It was once believed that one, or very few, cryptocurrencies would eventually dominate the market and drive out competitors. This assumption, however, was incorrect. Thousands of cryptocurrencies exist concurrently. The vast number of cryptocurrencies leads to a problem—what if the cryptocurrency that an individual possesses does not meet their current needs as well as another cryptocurrency might? The attempt to solve this problem has led to the rise of many cryptocurrency exchanges and exchange schemes. In this paper, we will discuss the motivations for an individual to be interested in exchanging two or more cryptocurrencies by describing and comparing various popular cryptocurrencies with different desirable attributes. While we will discuss these attributes, this paper will give special focus to arbitrage in particular. In addition, we will describe various cryptocurrency exchange schemes and their advantages and disadvantages. Finally, we contribute to the understanding of cryptocurrency exchangeability and interoperability by comparing the historical price data of several cryptocurrencies to determine how often arbitrage has been possible in the past. Degree Type Open Access Senior Honors Thesis Department Computer Science First Advisor Weitian Tong Second Advisor S.
    [Show full text]
  • Sok: Layer-Two Blockchain Protocols
    SoK: Layer-Two Blockchain Protocols Lewis Gudgeon1, Pedro Moreno-Sanchez2, Stefanie Roos3, Patrick McCorry4, and Arthur Gervais1;5;6 1 Imperial College London, United Kingdom 2 TU Wien, Austria 3 TU Delft, Netherlands 4 PISA Research, United Kingdom 5 Lucerne University of Applied Sciences and Arts, Switzerland 6 Liquidity Network, Switzerland Abstract. Blockchains have the potential to revolutionize markets and services. However, they currently exhibit high latencies and fail to handle transaction loads comparable to those managed by traditional financial systems. Layer-two protocols, built on top of (layer-one) blockchains, avoid disseminating every transaction to the whole network by exchang- ing authenticated transactions off-chain. Instead, they utilize the expen- sive and low-rate blockchain only as a recourse for disputes. The promise of layer-two protocols is to complete off-chain transactions in sub-seconds rather than minutes or hours while retaining asset security, reducing fees and allowing blockchains to scale. We systematize the evolution of layer-two protocols over the period from the inception of cryptocurrencies in 2009 until today, structuring the multifaceted body of research on layer-two transactions. Categorizing the research into payment and state channels, commit-chains and pro- tocols for refereed delegation, we provide a comparison of the protocols and their properties. We provide a systematization of the associated syn- chronization and routing protocols along with their privacy and security aspects. This Systematization of Knowledge (SoK) clears the layer-two fog, highlights the potential of layer-two solutions and identifies their unsolved challenges, indicating propitious avenues of future work. Keywords: Applied Cryptography, Blockchain Applications, Layer-Two Blockchain Protocols, Blockchain Scaling, Cryptocurrency Adoption 1 Introduction Blockchains offer a mechanism through which mutually mistrusting entities can cooperate in the absence of a trusted third party.
    [Show full text]
  • Bitcoin Mining Bitcoin
    Bitcoin Mining Explained BITCOIN MINING BITCOIN MINING Bitcoin Mining Explained Copyright © 2018 2 Table of Contents INTRODUCTION 4 WHAT IS BITCOIN MINING? 5 BITCOIN MINING TERMINOLOGY 6 WHY DO PEOPLE MINE BITCOIN? 9 GETTING STARTED MINING 12 TOP HARDWARE FOR BITCOIN MINING 13 WHAT SOFTWARE IS NEEDED? 16 MINING APPS 17 ELECTRICAL COSTS FOR MINING 22 OTHER BITCOIN MINING OPTIONS 23 CLOUD MINING 23 MINING POOLS 23 HOW TO SET UP A BITCOIN MINING OPERATION 25 HOW TO CALCULATE BITCOIN MINING PROFITS 26 RISKS AND REWARDS OF BITCOIN MINING 27 RISKS 27 REWARDS 27 CONCLUSION 29 3 Introduction It is no longer news that the adoption of digital currencies as a means of making payment is rapidly gaining momentum around the world. Bitcoin, which is the first example of the growing category of money known as the cryptocurrency, is the most popular and widely accepted of them all. Bitcoin is a peer-to-peer electronic cash system that was invented by a software developer called Satoshi Nakamoto, and it is currently taking the lead amongst other digital currencies. It is an electronic payment system based on mathematical proof that is created and held electronically. Bitcoin is also a decentralized form of cryptocurrency that is independent of any central authority – meaning, there is no single institution controlling the Bitcoin network. This eBook is going to help you go beyond a basic understanding of Bitcoin and the mining of it. When you are finished reading, you’ll be ready to get started mining Bitcoins today! 4 What is Bitcoin Mining? In traditional fiat currency systems, money is printed by the government and released into circulation whenever it is needed.
    [Show full text]
  • Trust and Verifiable Computation for Smart Contracts in Permissionless Blockchains
    DEGREE PROJECT IN INFORMATION AND COMMUNICATION TECHNOLOGY, SECOND CYCLE, 30 CREDITS STOCKHOLM, SWEDEN 2017 Trust and verifiable computation for smart contracts in permissionless blockchains DOMINIK HARZ KTH ROYAL INSTITUTE OF TECHNOLOGY SCHOOL OF INFORMATION AND COMMUNICATION TECHNOLOGY Abstract Blockchains address trust through cryptography and consensus. Bitcoin is the first digital currency without trusted agents. Ethereum extends this technology by enabling agents on a blockchain, via smart contracts. However, a systemic trust model for smart contracts in blockchains is missing. This thesis describes the ecosystem of smart contracts as an open multi-agent system. A trust model introduces social control through deposits and review agents. Trust-related attributes are quantified in 2,561 smart contracts from GitHub. Smart contracts employ a mean of three variables and functions and one in ten has a security-related issue. Moreover, blockchains restrict computation tasks. Resolving these restrictions while maintaining trust requires verifiable computation. An algorithm for verifiable computation is developed and implemented in Solidity. It uses an arbiter enforcing the algorithm, computation services providing and verifying solutions, and a judge assessing solutions. Experiments are performed with 1000 iterations for one to six verifiers with a cheater prior probability of 30%, 50%, and 70%. The algorithm shows linear complexity for integer multiplication. The verification depends on cheater prior probability and amount of verifiers. In the experiments, six verifiers are sufficient to detect all cheaters for the three prior probabilities. Keywords: blockchain; smart contract; trust; multi-agent system; verifiable compu- tation Referat Blockchains adresserar tillit genom kryptografi och konsensus. Bitcoin är den första digitala valutan utan betrodda agenter.
    [Show full text]
  • UNICORE D2.3 Platform Requirements
    H2020-ICT-2018-2-825377 UNICORE UNICORE: A Common Code Base and Toolkit for Deployment of Applications to Secure and Reliable Virtual Execution Environments Horizon 2020 - Research and Innovation Framework Programme D2.3 Platform Requirements - Final Due date of deliverable: 30 September 2019 Actual submission date: 30 September 2019 Start date of project 1 January 2019 Duration 36 months Lead contractor for this deliverable Accelleran NV Version 1.0 Confidentiality status “Public” c UNICORE Consortium 2020 Page 1 of (62) Abstract This is the final version of the UNICORE “Platform Requirements - Final” (D2.3) document. The original version (D2.1 Requirements) was published in April 2019. The differences between the two versions of this document are detailed in the Executive Summary. The goal of the EU-funded UNICORE project is to develop a common code-base and toolchain that will enable software developers to rapidly create secure, portable, scalable, high-performance solutions starting from existing applications. The key to this is to compile an application into very light-weight virtual machines - known as unikernels - where there is no traditional operating system, only the specific bits of operating system functionality that the application needs. The resulting unikernels can then be deployed and run on standard high-volume servers or cloud computing infrastructure. The technology developed by the project will be evaluated in a number of trials, spanning several applica- tion domains. This document describes the current state of the art in those application domains from the perspective of the project partners whose businesses encompass those domains. It then goes on to describe the specific target scenarios that will be used to evaluate the technology within each application domain, and how the success of each trial will be judged.
    [Show full text]
  • Altcoins, Ethereum Projects, and More – Bonus Content
    Altcoins, Ethereum projects, and More – Bonus Content Welcome to the bonus online content for Mastering Blockchain – Third Edition! This content complements the main text, with the intention to enhance the reader learning experience. The material covered here has not been included in the core book for reasons of brevity and scope, but it contains valuable information, and has thus been included here for reference and further learning. We'll list and briefly describe the topics covered in these pages here, as an idea of what will be covered in this package. The topics are best read in conjunction with the chapters specified here, but can also be accessed as a reference guide for various topics at any point! • Bitcoin forks: It is recommended that this topic is read after Chapter 7, Bitcoin Network and Payments. It covers alternative Bitcoin projects such as Bitcoin Cash and Bitcoin Unlimited. • Alternative coins: This is intended to be read in conjunction with Chapter 9, Alternative Coins. This topic covers some important cryptocurrency projects such as Zcash and Primecoin. We cover in detail, among other things, how various clients can be installed, and how mining can be performed. • Ethereum networks, trading and investment: It's recommended to read this material with Chapter 11, Ethereum 101. This topic briefly introduces the different types of Ethereum networks and some technical details. Also, we introduce some basics regarding the trading and investment of ether, the Ethereum cryptocurrency. • Ethereum EVM opcodes: This topic should be read in conjunction with Chapter 12, Further Ethereum. Here, we list all EVM opcodes, with descriptions and some technical details, such as their opcode representation and gas consumption.
    [Show full text]