Tesseract: Real-Time Cryptocurrency

Total Page:16

File Type:pdf, Size:1020Kb

Tesseract: Real-Time Cryptocurrency Session 7B: Blockchain III CCS ’19, November 11–15, 2019, London, United Kingdom Tesseract: Real-Time Cryptocurrency Exchange Using Trusted Hardware Iddo Bentov Yan Ji Fan Zhang Cornell Tech Cornell Tech Cornell Tech Lorenz Breidenbach Philip Daian Ari Juels ETH Zürich and Cornell Tech Cornell Tech Cornell Tech ABSTRACT are executed. Such exchanges support real-time trading of various We propose Tesseract, a secure real-time cryptocurrency exchange cryptocurrencies and fat currencies. They are vulnerable, however, service. Existing centralized exchange designs are vulnerable to to theft of traders’ funds (cf. Appendix A.1). In a number of high- theft of funds, while decentralized exchanges cannot ofer real-time profle incidents, funds have been stolen when exchanges were cross-chain trades. All currently deployed exchanges are also vul- breached or other forms of malfeasance took place [21, 46, 67, 76]. nerable to frontrunning attacks. Tesseract overcomes these faws Permissionless blockchains, however, are designed specifcally to and achieves a best-of-both-worlds design by using a trusted exe- eliminate trust assumptions between transacting parties by avoid- cution environment. The task of committing the recent trade data ing centralization. A trust-free cryptocurrency exchange can be to independent cryptocurrency systems presents an all-or-nothing realized for transactions across such blockchains in the form of fairness problem, to which we present ideal theoretical solutions, atomic intra-chain or cross-chain swaps (ACCSs) [31, 59], transac- as well as practical solutions. Tesseract supports not only real-time tions that exchange cryptocurrencies between pairs of users in a cross-chain cryptocurrency trades, but also secure tokenization of fair, all-or-nothing manner. ACCSs, though, require users to wait assets pegged to cryptocurrencies. For instance, Tesseract-tokenized many minutes (in fact, often hours) for a trade to execute. Addition- bitcoins can circulate on the Ethereum blockchain for use in smart ally, atomic swaps in general aren’t sufcient to realize an exchange: contracts. We provide a demo implementation of Tesseract that a mechanism for matching orders or otherwise performing price supports Bitcoin, Ethereum, and similar cryptocurrencies. discovery is also necessary. Since ACCSs serve as a useful reference point, we elaborate on the concept and its limitations in Appendix B. KEYWORDS The systemic risk of theft in centralized exchanges has led to the rising popularity of exchanges such as EtherDelta [92], Cryptocurrency Exchanges; Frontrunning; Trusted Hardware decentralized 0x [107], and Kyber Network [70]. These systems hold traders’ funds ACM Reference Format: and settle transactions in smart contracts, eliminating the risk of Iddo Bentov, Yan Ji, Fan Zhang, Lorenz Breidenbach, Philip Daian, and Ari theft in centralized exchanges. Unfortunately, they have other draw- Juels. 2019. Tesseract: Real-Time Cryptocurrency Exchange Using Trusted backs. Their on-chain settlement means that they cannot support Hardware. In 2019 ACM SIGSAC Conference on Computer and Communi- real-time trading. Moreover, while their use of smart contracts cations Security (CCS ’19), November 11–15, 2019, London, United Kingdom. conveys an appearance of trustworthiness, they are vulnerable to ACM, New York, NY, USA, 19 pages. https://doi:org/10:1145/3319535:3363221 various frontrunning attacks by miners and other users [40]. 1 INTRODUCTION Achieving the best of both worlds has been a standing challenge, but a seemingly elusive one. An ideal cryptocurrency exchange The rise of Bitcoin [81] has spawned many hundreds of other cryp- would be like a centralized exchange, meaning that par- tocurrencies as well as application-specifc units of value known as real-time ticipants can respond to price fuctuations and alter their positions crypto “tokens.” This diverse ecosystem of assets has in turn led to with low latency. It would support even traders that utilize auto- a large and dynamic array of cryptocurrency , platforms exchanges mated programs for high frequency trading and arbitrage (cf. [22]), that allow users to trade diferent cryptocurrencies against one who may wish to modify their positions in fractions of a second. another and/or for fat currencies. At the time of writing, the ag- At the same time, such an exchange would be , protecting gregate daily trading volume of cryptocurrency exchanges exceeds trust-free against theft in the way that decentralized exchanges do, but also $10 billion. eliminating frontrunning attacks that exploit blockchain latencies. Unfortunately, cryptocurrency exchanges sufer from a variety In this work, we present Tesseract, a cryptocurrency exchange of security problems. Currently, the most popular exchanges are that achieves this ideal set of properties. Tesseract is . , meaning that they hold traders’ assets while trades real time centralized Traders can rapidly observe the alterations in the buy (a.k.a. “bid”) Permission to make digital or hard copies of all or part of this work for personal or and sell (a.k.a. “ask”) orders on the exchange, as well as external classroom use is granted without fee provided that copies are not made or distributed events (e.g., [112]), then modify their trading positions in millisec- for proft or commercial advantage and that copies bear this notice and the full citation on the frst page. Copyrights for components of this work owned by others than ACM onds. By performing fast price discovery, they can drive price con- must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, vergence so that the gap (a.k.a. “spread”) between bids and asks to post on servers or to redistribute to lists, requires prior specifc permission and/or a fee. Request permissions from [email protected]. is small, leading to efcient markets like those in major fnancial CCS ’19, November 11–15, 2019, London, United Kingdom systems. Tesseract also prevents theft of users’ funds by exchange © 2019 Association for Computing Machinery. operators and hackers as well as a variety of frontrunning attacks ACM ISBN 978-1-4503-6747-9/19/11...$15.00 present in centralized and decentralized exchanges. https://doi:org/10:1145/3319535:3363221 1521 Session 7B: Blockchain III CCS ’19, November 11–15, 2019, London, United Kingdom Tesseract supports cross-chain trading in which assets are ex- within-enclave blockchain monitoring to prevent eclipse attacks changed across distinct blockchains. Trades within a single block- and use of a consensus group of TEE-backed nodes that can chain, e.g., exchange of tokens and Ether within Ethereum, can also enforce and/or cancel transactions in the case that the main be important (cf. [36, 37, 88, 93]). While this use case can be achieved (asset-holding) exchange node becomes unavailable. at least in part using smart contracts, a signifcantly simplifed vari- • We implement proof-of-concept of Tesseract, describing our pa- ant of Tesseract can ofer the added beneft of real-time trading, rameter and design choices. which smart contracts cannot support. Tesseract also supports a tokenization scheme that allows pegged tokens to circulate across 2 THE TESSERACT DESIGN blockchains, without relying on a human element for security (see In this section we frst specify our assumptions and then present an Appendix E). overview of the operation of Tesseract, describing how it achieves Tesseract relies on a trusted execution environment (TEE, cf. [87, its security and performance goals. Specifcally, Section 2.3 presents 115]). This technology allows applications to execute within a pro- defense against powerful network adversaries that can eclipse the tected environment called an enclave, that ensures confdentiality host; Section 2.4 gives the mechanism that prevents malicious ad- and software integrity. It enables Tesseract to behave like a trusted ministrators from mounting frontrunning attacks; Section 2.5 gives third party, controlling funds without exposing them to theft while a defense-in-depth mitigation to TEE attestation failures. preventing frontrunning by the exchange operator. Our security and trust assumptions are quite conservative, cf. Section 2.1. Our reference implementation is built using SGX, which provides 2.1 Threat Model a TEE via an instruction-set architecture extension in recent-model The Tesseract exchange achieves its security and performance goals Intel CPUs [14, 60, 61, 75]. While side-channel attackss [110] on SGX by relying on a trusted execution environment (TEE), i.e., a hardware have been demonstrated, prominently Foreshadow [106] (that was architecture that enables code execution in an isolated, tamper-free later patched [39]), TEE technologies evolve as well. In particular, environment. The TEE can also attest [61] that an output represents the Keystone project [62] is developing an open-source TEE. the result of such an execution, and allows remote users to make The main challenge in the design of Tesseract is dealing with sure that the attestation is correct. The remote attestation feature is powerful network adversaries. Such adversaries can perform an essential for Tesseract, for reasons that will soon become clear. We assume a strong network adversary (potentially the exchange eclipse attack in which an exchange is presented with fake block- chain data. We show how to address this problem by checkpointing operator) that can gain complete physical access to the host in trustworthy blocks within the Tesseract application
Recommended publications
  • Virtual Currencies and Terrorist Financing : Assessing the Risks And
    DIRECTORATE GENERAL FOR INTERNAL POLICIES POLICY DEPARTMENT FOR CITIZENS' RIGHTS AND CONSTITUTIONAL AFFAIRS COUNTER-TERRORISM Virtual currencies and terrorist financing: assessing the risks and evaluating responses STUDY Abstract This study, commissioned by the European Parliament’s Policy Department for Citizens’ Rights and Constitutional Affairs at the request of the TERR Committee, explores the terrorist financing (TF) risks of virtual currencies (VCs), including cryptocurrencies such as Bitcoin. It describes the features of VCs that present TF risks, and reviews the open source literature on terrorist use of virtual currencies to understand the current state and likely future manifestation of the risk. It then reviews the regulatory and law enforcement response in the EU and beyond, assessing the effectiveness of measures taken to date. Finally, it provides recommendations for EU policymakers and other relevant stakeholders for ensuring the TF risks of VCs are adequately mitigated. PE 604.970 EN ABOUT THE PUBLICATION This research paper was requested by the European Parliament's Special Committee on Terrorism and was commissioned, overseen and published by the Policy Department for Citizens’ Rights and Constitutional Affairs. Policy Departments provide independent expertise, both in-house and externally, to support European Parliament committees and other parliamentary bodies in shaping legislation and exercising democratic scrutiny over EU external and internal policies. To contact the Policy Department for Citizens’ Rights and Constitutional Affairs or to subscribe to its newsletter please write to: [email protected] RESPONSIBLE RESEARCH ADMINISTRATOR Kristiina MILT Policy Department for Citizens' Rights and Constitutional Affairs European Parliament B-1047 Brussels E-mail: [email protected] AUTHORS Tom KEATINGE, Director of the Centre for Financial Crime and Security Studies, Royal United Services Institute (coordinator) David CARLISLE, Centre for Financial Crime and Security Studies, Royal United Services Institute, etc.
    [Show full text]
  • Bitcoin Tumbles As Miners Face Crackdown - the Buttonwood Tree Bitcoin Tumbles As Miners Face Crackdown
    6/8/2021 Bitcoin Tumbles as Miners Face Crackdown - The Buttonwood Tree Bitcoin Tumbles as Miners Face Crackdown By Haley Cafarella - June 1, 2021 Bitcoin tumbles as Crypto miners face crackdown from China. Cryptocurrency miners, including HashCow and BTC.TOP, have halted all or part of their China operations. This comes after Beijing intensified a crackdown on bitcoin mining and trading. Beijing intends to hammer digital currencies amid heightened global regulatory scrutiny. This marks the first time China’s cabinet has targeted virtual currency mining, which is a sizable business in the world’s second-biggest economy. Some estimates say China accounts for as much as 70 percent of the world’s crypto supply. Cryptocurrency exchange Huobi suspended both crypto-mining and some trading services to new clients from China. The plan is that China will instead focus on overseas businesses. BTC.TOP, a crypto mining pool, also announced the suspension of its China business citing regulatory risks. On top of that, crypto miner HashCow said it would halt buying new bitcoin mining rigs. Crypto miners use specially-designed computer equipment, or rigs, to verify virtual coin transactions. READ MORE: Sustainable Mineral Exploration Powers Electric Vehicle Revolution This process produces newly minted crypto currencies like bitcoin. “Crypto mining consumes a lot of energy, which runs counter to China’s carbon neutrality goals,” said Chen Jiahe, chief investment officer of Beijing-based family office Novem Arcae Technologies. Additionally, he said this is part of China’s goal of curbing speculative crypto trading. As result, bitcoin has taken a beating in the stock market.
    [Show full text]
  • Cryptocurrency: the Economics of Money and Selected Policy Issues
    Cryptocurrency: The Economics of Money and Selected Policy Issues Updated April 9, 2020 Congressional Research Service https://crsreports.congress.gov R45427 SUMMARY R45427 Cryptocurrency: The Economics of Money and April 9, 2020 Selected Policy Issues David W. Perkins Cryptocurrencies are digital money in electronic payment systems that generally do not require Specialist in government backing or the involvement of an intermediary, such as a bank. Instead, users of the Macroeconomic Policy system validate payments using certain protocols. Since the 2008 invention of the first cryptocurrency, Bitcoin, cryptocurrencies have proliferated. In recent years, they experienced a rapid increase and subsequent decrease in value. One estimate found that, as of March 2020, there were more than 5,100 different cryptocurrencies worth about $231 billion. Given this rapid growth and volatility, cryptocurrencies have drawn the attention of the public and policymakers. A particularly notable feature of cryptocurrencies is their potential to act as an alternative form of money. Historically, money has either had intrinsic value or derived value from government decree. Using money electronically generally has involved using the private ledgers and systems of at least one trusted intermediary. Cryptocurrencies, by contrast, generally employ user agreement, a network of users, and cryptographic protocols to achieve valid transfers of value. Cryptocurrency users typically use a pseudonymous address to identify each other and a passcode or private key to make changes to a public ledger in order to transfer value between accounts. Other computers in the network validate these transfers. Through this use of blockchain technology, cryptocurrency systems protect their public ledgers of accounts against manipulation, so that users can only send cryptocurrency to which they have access, thus allowing users to make valid transfers without a centralized, trusted intermediary.
    [Show full text]
  • Blockchain & Cryptocurrency Regulation
    Blockchain & Cryptocurrency Regulation Third Edition Contributing Editor: Josias N. Dewey Global Legal Insights Blockchain & Cryptocurrency Regulation 2021, Third Edition Contributing Editor: Josias N. Dewey Published by Global Legal Group GLOBAL LEGAL INSIGHTS – BLOCKCHAIN & CRYPTOCURRENCY REGULATION 2021, THIRD EDITION Contributing Editor Josias N. Dewey, Holland & Knight LLP Head of Production Suzie Levy Senior Editor Sam Friend Sub Editor Megan Hylton Consulting Group Publisher Rory Smith Chief Media Officer Fraser Allan We are extremely grateful for all contributions to this edition. Special thanks are reserved for Josias N. Dewey of Holland & Knight LLP for all of his assistance. Published by Global Legal Group Ltd. 59 Tanner Street, London SE1 3PL, United Kingdom Tel: +44 207 367 0720 / URL: www.glgroup.co.uk Copyright © 2020 Global Legal Group Ltd. All rights reserved No photocopying ISBN 978-1-83918-077-4 ISSN 2631-2999 This publication is for general information purposes only. It does not purport to provide comprehensive full legal or other advice. Global Legal Group Ltd. and the contributors accept no responsibility for losses that may arise from reliance upon information contained in this publication. This publication is intended to give an indication of legal issues upon which you may need advice. Full legal advice should be taken from a qualified professional when dealing with specific situations. The information contained herein is accurate as of the date of publication. Printed and bound by TJ International, Trecerus Industrial Estate, Padstow, Cornwall, PL28 8RW October 2020 PREFACE nother year has passed and virtual currency and other blockchain-based digital assets continue to attract the attention of policymakers across the globe.
    [Show full text]
  • Coinbase Explores Crypto ETF (9/6) Coinbase Spoke to Asset Manager Blackrock About Creating a Crypto ETF, Business Insider Reports
    Crypto Week in Review (9/1-9/7) Goldman Sachs CFO Denies Crypto Strategy Shift (9/6) GS CFO Marty Chavez addressed claims from an unsubstantiated report earlier this week that the firm may be delaying previous plans to open a crypto trading desk, calling the report “fake news”. Coinbase Explores Crypto ETF (9/6) Coinbase spoke to asset manager BlackRock about creating a crypto ETF, Business Insider reports. While the current status of the discussions is unclear, BlackRock is said to have “no interest in being a crypto fund issuer,” and SEC approval in the near term remains uncertain. Looking ahead, the Wednesday confirmation of Trump nominee Elad Roisman has the potential to tip the scales towards a more favorable cryptoasset approach. Twitter CEO Comments on Blockchain (9/5) Twitter CEO Jack Dorsey, speaking in a congressional hearing, indicated that blockchain technology could prove useful for “distributed trust and distributed enforcement.” The platform, given its struggles with how best to address fraud, harassment, and other misuse, could be a prime testing ground for decentralized identity solutions. Ripio Facilitates Peer-to-Peer Loans (9/5) Ripio began to facilitate blockchain powered peer-to-peer loans, available to wallet users in Argentina, Mexico, and Brazil. The loans, which utilize the Ripple Credit Network (RCN) token, are funded in RCN and dispensed to users in fiat through a network of local partners. Since all details of the loan and payments are recorded on the Ethereum blockchain, the solution could contribute to wider access to credit for the unbanked. IBM’s Payment Protocol Out of Beta (9/4) Blockchain World Wire, a global blockchain based payments network by IBM, is out of beta, CoinDesk reports.
    [Show full text]
  • A Probe Survey of Bitcoin Transactions Through Analysis of Advertising in an On-Line Discussion Forum
    Acta Informatica Pragensia, 2019, 8(2), 112–131 DOI: 10.18267/j.aip.127 Original Article A Probe Survey of Bitcoin Transactions Through Analysis of Advertising in an On-Line Discussion Forum Zoltan Ban 1, Jan Lansky 1, Stanislava Mildeova 1, Petr Tesar 1 Abstract Cryptocurrencies have become a major phenomenon in recent years. For IT, a breakthrough is both the cryptocurrency itself as a commodity and the technology that cryptocurrency development has brought. The article focuses on the bitcoin cryptocurrency as the most important cryptocurrency. A relatively unexplored topic is what goods or services are purchased for bitcoins. To track what bitcoins are spent on, it is necessary to look for places that are dedicated to trading cryptocurrencies. The bitcointalk.org forum was chosen as a source for our data mining. The aim of the article is to find an answer to the research question: What are bitcoins on the discussion forum bitcointalk.org planned to be spent on? As part of the research, an application was developed using a PHP script to gather information from the discussion forum (bitcointalk.org). There is some evidence which suggests what types of products or services people spend cryptocurrencies on. This research has proven that cryptocurrencies are used to buy and sell goods or services in the electronics and computer world segments. Today, these segments are widespread, which may speed up the integration of cryptocurrencies into everyday life. This applies, of course, only if the risks associated with cryptocurrencies do not increase. Keywords: Cryptocurrency, Bitcoin, On-Line Advertisement, Text Mining, Cybersecurity, Discussion Forum.
    [Show full text]
  • Download Criminal Complaint Filed in the Eastern District of California
    AO 91 (Rev. 11/11) Criminal Complaint UNITED STATES DISTRICT COURT for the Eastern District of California United States of America ) V. ) MARCOS PAULO DE OLIVEIRA­ ) Case No. ANNIBALE, ) aka "Med3lin," ) aka "Med3lln," ) aka "Med3lln WSM" ) Defendant(s) CRIMINAL COMPLAINT I, the complainant in this case, state that the following is true to the best of my knowledge and belief. On or about the date( s) of October 2017 through April 2019__ in the county of Sacramento in the Eastern District of California , and elsewhere, the defendant(s) violated: Code Section Offense Description 21 U.S.C. §§ 841 and 846 Distribution and Conspiracy to Distribute Controlled Substances 18 U.S.C. §§ 1956 and 1957 Money Laundering This criminal complaint is based on these facts: (see attachment) IX! Continued on the attached sheet. -j- ;1 ·) / , / l 1 - • / L ',;;;_ . _/__I-- / Complainant's signature JAY D. DIAL, Jr., Special Agent Dl'llg Enforcem~_11t Ad111inistration Printed name and title Sworn to before me and signed in my presence. ;]t "-" ' Date: l.2 _/,_ I ---=- (.___ ,,--- "'-~ Judge 's signature City and state: Sacramento, CA Allls__on Claire, U_.§~ Magi~trate__.J__udge Printed name and title AO 91 (Rev. 11/11) Criminal Complaint UNITED STATES DISTRICT COURT for the Eastern District of California United States of America ) V. ) MARCOS PAULO DE OLIVEIRA­ ) Case No. ANNIBALE, ) aka "Med3lin," ) aka "Med3l1n," ) aka "Med3lln_WSM" ) Defendant(s) CRIMINAL COMPLAINT I, the complainant in this case, state that the following is true to the best of my knowledge and belief. On or about the date(s) of ~tober 20 I 7 through April 2019_ in the county of .
    [Show full text]
  • Tenx Whitepaper
    PAYMENT PLATFORM WHITEPAPER Final Version: June 21st 2017 1 IMPORTANT NOTICE PLEASE READ THIS SECTION AND THE FOLLOWING SECTIONS ENTITLED “DISCLAIMER OF LIABILITY”, “NO REPRESENTATIONS AND WARRANTIES”, “REPRESENTATIONS AND WARRANTIES BY YOU”, “CAUTIONARY NOTE ON FORWARD-LOOKING STATEMENTS”, “MARKET AND INDUSTRY INFORMATION AND NO CONSENT OF OTHER PERSONS”, “NO ADVICE”, “NO FURTHER INFORMATION OR UPDATE”, “RESTRICTIONS ON DISTRIBUTION AND DISSEMINATION”, “NO OFFER OF SECURITIES OR REGISTRATION” AND “RISKS AND UNCERTAINTIES” CAREFULLY. IF YOU ARE IN ANY DOUBT AS TO THE ACTION YOU SHOULD TAKE, YOU SHOULD CONSULT YOUR LEGAL, FINANCIAL, TAX OR OTHER PROFESSIONAL ADVISOR(S). The PAY tokens are not intended to constitute securities in any jurisdiction. This Whitepaper does not constitute a prospectus or offer document of any sort and is not intended to constitute an offer of securities or a solicitation for investment in securities in any jurisdiction. This Whitepaper does not constitute or form part of any opinion on any advice to sell, or any solicitation of any offer by the distributor/vendor of the PAY tokens (the “Distributor”) to purchase any PAY tokens nor shall it or any part of it nor the fact of its presentation form the basis of, or be relied upon in connection with, any contract or investment decision. The Distributor will be an affiliate of TenX Pte. Ltd. (“TenX”), and will deploy all proceeds of sale of the PAY tokens to fund TenX’s cryptocurrency project, businesses and operations. No person is bound to enter into any contract or binding legal commitment in relation to the sale and purchase of the PAY tokens and no cryptocurrency or other form of payment is to be accepted on the basis of this Whitepaper.
    [Show full text]
  • An Investigative Study of Cryptocurrency Abuses in the Dark Web
    Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web Seunghyeon Leeyz Changhoon Yoonz Heedo Kangy Yeonkeun Kimy Yongdae Kimy Dongsu Hany Sooel Sony Seungwon Shinyz yKAIST zS2W LAB Inc. {seunghyeon, kangheedo, yeonk, yongdaek, dhan.ee, sl.son, claude}@kaist.ac.kr {cy}@s2wlab.com Abstract—The Dark Web is notorious for being a major known as one of the major drug trading sites [13], [22], and distribution channel of harmful content as well as unlawful goods. WannaCry malware, one of the most notorious ransomware, Perpetrators have also used cryptocurrencies to conduct illicit has actively used the Dark Web to operate C&C servers [50]. financial transactions while hiding their identities. The limited Cryptocurrency also presents a similar situation. Apart from coverage and outdated data of the Dark Web in previous studies a centralized server, cryptocurrencies (e.g., Bitcoin [58] and motivated us to conduct an in-depth investigative study to under- Ethereum [72]) enable people to conduct peer-to-peer trades stand how perpetrators abuse cryptocurrencies in the Dark Web. We designed and implemented MFScope, a new framework which without central authorities, and thus it is hard to identify collects Dark Web data, extracts cryptocurrency information, and trading peers. analyzes their usage characteristics on the Dark Web. Specifically, Similar to the case of the Dark Web, cryptocurrencies MFScope collected more than 27 million dark webpages and also provide benefits to our society in that they can redesign extracted around 10 million unique cryptocurrency addresses for Bitcoin, Ethereum, and Monero. It then classified their usages to financial trading mechanisms and thus motivate new business identify trades of illicit goods and traced cryptocurrency money models, but are also adopted in financial crimes (e.g., money flows, to reveal black money operations on the Dark Web.
    [Show full text]
  • Transparent and Collaborative Proof-Of-Work Consensus
    StrongChain: Transparent and Collaborative Proof-of-Work Consensus Pawel Szalachowski, Daniël Reijsbergen, and Ivan Homoliak, Singapore University of Technology and Design (SUTD); Siwei Sun, Institute of Information Engineering and DCS Center, Chinese Academy of Sciences https://www.usenix.org/conference/usenixsecurity19/presentation/szalachowski This paper is included in the Proceedings of the 28th USENIX Security Symposium. August 14–16, 2019 • Santa Clara, CA, USA 978-1-939133-06-9 Open access to the Proceedings of the 28th USENIX Security Symposium is sponsored by USENIX. StrongChain: Transparent and Collaborative Proof-of-Work Consensus Pawel Szalachowski1 Daniel¨ Reijsbergen1 Ivan Homoliak1 Siwei Sun2;∗ 1Singapore University of Technology and Design (SUTD) 2Institute of Information Engineering and DCS Center, Chinese Academy of Sciences Abstract a cryptographically-protected append-only list [2] is intro- duced. This list consists of transactions grouped into blocks Bitcoin is the most successful cryptocurrency so far. This and is usually referred to as a blockchain. Every active pro- is mainly due to its novel consensus algorithm, which is tocol participant (called a miner) collects transactions sent based on proof-of-work combined with a cryptographically- by users and tries to solve a computationally-hard puzzle in protected data structure and a rewarding scheme that incen- order to be able to write to the blockchain (the process of tivizes nodes to participate. However, despite its unprece- solving the puzzle is called mining). When a valid solution dented success Bitcoin suffers from many inefficiencies. For is found, it is disseminated along with the transactions that instance, Bitcoin’s consensus mechanism has been proved to the miner wishes to append.
    [Show full text]
  • 3Rd Global Cryptoasset Benchmarking Study
    3RD GLOBAL CRYPTOASSET BENCHMARKING STUDY Apolline Blandin, Dr. Gina Pieters, Yue Wu, Thomas Eisermann, Anton Dek, Sean Taylor, Damaris Njoki September 2020 supported by Disclaimer: Data for this report has been gathered primarily from online surveys. While every reasonable effort has been made to verify the accuracy of the data collected, the research team cannot exclude potential errors and omissions. This report should not be considered to provide legal or investment advice. Opinions expressed in this report reflect those of the authors and not necessarily those of their respective institutions. TABLE OF CONTENTS FOREWORDS ..................................................................................................................................................4 RESEARCH TEAM ..........................................................................................................................................6 ACKNOWLEDGEMENTS ............................................................................................................................7 EXECUTIVE SUMMARY ........................................................................................................................... 11 METHODOLOGY ........................................................................................................................................ 14 SECTION 1: INDUSTRY GROWTH INDICATORS .........................................................................17 Employment figures ..............................................................................................................................................................................................................17
    [Show full text]
  • EY Study: Initial Coin Offerings (Icos) the Class of 2017 – One Year Later
    EY study: Initial Coin Offerings (ICOs) The Class of 2017 – one year later October 19, 2018 In December 2017, we analyzed the top ICOs that represented 87% ICO funding in 2017. In that report, we found high risks of fraud, theft and major problems with the accuracy of representations made by start-ups seeking funding. In this follow-up study, we revisit the same group of companies to analyze their progress and investment return: ► The performance of ICOs from The Class of 2017 did little to inspire confidence.1 ► 86% are now below their listing2 price; 30% have lost substantially all value. Executive An investor purchasing a portfolio of The Class of 2017 ICOs on 1 January 2018 would most likely have lost 66% of their investment. ► Of the ICO start-ups we looked at from The Class of 2017, only 29% (25) have summary working products or prototypes, up by just 13% from the end of last year. Of those 25, seven companies accept payment in both traditional fiat currency (dollars) as well as ICO tokens, a decision that reduces the value of the tokens to the holders. ► There were gains among The Class of 2017, concentrated in 10 ICO tokens, most of which are in the blockchain infrastructure category. However, there is no sign that these new projects have had any success in reducing the dominance of Ethereum as the industry’s main platform. • 1 See methodology in appendix. • 2 Defined as when first available to trade on a cryptocurrency exchange. 02 ICO performance update ICOs broke out in 2017.
    [Show full text]