SlideShare a Scribd company logo
1 of 28
Download to read offline
‫م‬‫حی‬‫ر‬‫ل‬‫ا‬‫ن‬
‫حم‬
‫ر‬‫ل‬‫ا‬‫اهلل‬‫م‬
‫بس‬
‫م‬‫حی‬‫ر‬‫ل‬‫ا‬‫ن‬
‫حم‬
‫ر‬‫ل‬‫ا‬‫اهلل‬‫م‬
‫بس‬
Tarbiat Modares
University
Varieties of BlockchainsVarieties of Blockchains
E-Commerce SecurityE-Commerce Security
Instructor: Sadegh Dorri N.Instructor: Sadegh Dorri N.
http://www.modares.ac.ir/~dorrihttp://www.modares.ac.ir/~dorri
Spring 2019 (1398)Spring 2019 (1398)
Video: https://www.aparat.com/sdorri
Slides: https://www.slideshare.net/SadeghD1/
Podcast: https://shenoto.com/sdorri
Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 2
OutlineOutline
· DefinitionsDefinitions
· Overview of Some OptionsOverview of Some Options
- Governance, permissions, ledger structure, block config
· Consensus MechanismsConsensus Mechanisms
- Proof of Work and other mechanisms
- ASIC-resistance
- Nonoutsourceable puzzles
· Auxiliary BlockchainsAuxiliary Blockchains
- Sidechains, and sharding
Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 3
Definitions (1)Definitions (1)
Fundamental Properties: immutability, non-repudiation, integrity, transparency,
and equal rights
[ArchBook]
Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 4
Definitions (2)Definitions (2)
[ArchBook]
Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 5
Definitions (3)Definitions (3)
[ArchBook]
Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 6
Definitions (4)Definitions (4)
[ArchBook]
Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 7
GovernanceGovernance
· Public blockchain (Public blockchain (‫می‬‫م‬‫عمو‬‫می‬‫م‬‫عمو‬))
· Consortium/community blockchain (Consortium/community blockchain (‫مجمنی‬‫ن‬‫م‬‫ا‬‫مجمنی‬‫ن‬‫م‬‫ا‬))
- Used across multiple organizations
- Controlled by pre-authorized nodes
· Private blockchain (Private blockchain (‫موصی‬‫ص‬‫خ‬‫موصی‬‫ص‬‫خ‬))
- Governed and hosted by a single organization (possibly multiple
divisions)
- Cost-effective, high performance, and flexible
[ArchBook]
Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 8
PermissionsPermissions
· Permission-less public blockchainsPermission-less public blockchains
· Permissioned miners (write) and permission-less normalPermissioned miners (write) and permission-less normal
nodes (read)nodes (read)
· Permissions for fine-grained operations on the tx level (e.g.Permissions for fine-grained operations on the tx level (e.g.
creating assets)creating assets)
[ArchBook]
Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 9
Ledger StructureLedger Structure
· Global list of blocksGlobal list of blocks
- e.g in Bitcoin, Ethereum
· Global directed acyclic graph (DAG)Global directed acyclic graph (DAG)
- e.g. in Hashgraph (blocks), IOTA (tx’s)
· Restricted shared ledgersRestricted shared ledgers
- Many small ledgers shared only between authorized parties of
interest.
- e.g. in Corda, Hyperledger Fabric
[ArchBook]
Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 10
Block ConfigurationBlock Configuration
· Block sizeBlock size
- Control the number/complexity of transactions
- More tx’s → more tx processing and communication overhead
+ increased risk of empty blocks!
· Block generation frequencyBlock generation frequency
- Shorter inter-block time → more forks → longer confirmation
time!
[ArchBook]
Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 11
Blockchain PlatformsBlockchain Platforms
· Hyperledger by The Linux FoundationHyperledger by The Linux Foundation
- An open source collaborative effort created to advance cross-industry
blockchain technologies.
- It is a global collaboration among 185 members, hosted by The Linux
Foundation, including leaders in finance, banking, IoT, supply chains,
manufacturing and Technology.
- 13 ongoing projects including Fabric, Sawtooth, and Iroha blockchain
platforms.
· Corda (DLT; not blockchain) by R3Corda (DLT; not blockchain) by R3
· Tendermint (Open source) by All In Bits IncTendermint (Open source) by All In Bits Inc
· Blockchain on the cloud (Amazon AWS, Microsoft Azure, etc.)Blockchain on the cloud (Amazon AWS, Microsoft Azure, etc.)
- Corda, Hyperledger Fabric, Ethereum etc on the cloud.
Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 12
Consensus MechanismsConsensus Mechanisms
Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 13
Consensus ProtocolConsensus Protocol
· Distributed consensus protocolDistributed consensus protocol
- There are n nodes that each have an input value.
- Some of these nodes are faulty or malicious.
- It must terminate with all honest nodes in agreement on the value.
- The value must have been generated by an honest node.
· Consensus mechanism in a blockchainConsensus mechanism in a blockchain
- Miners may propose different next blocks.
- Consensus…
●
Determines the validating process of blocks,
●
Controls malicious behavior
●
Resolves conflicts
[Princeton-Book]
Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 14
Proof of WorkProof of Work
· Bitcoin’s Proof-of-Work (PoW)Bitcoin’s Proof-of-Work (PoW)
- Nodes (miners) solve a complicated mathematical puzzle and
earn rewards.
- The first node which succeeds is the winner of the current block.
- The other nodes validate the work.
· Proof-of-Useful-Work (uPoW) [uPoW, PrimeCoin]Proof-of-Useful-Work (uPoW) [uPoW, PrimeCoin]
- PoWs whose hardness is based on a wide array of computational
problems including deciding any graph property that is statable
in first-order logic. [uPoW]
- PrimeCoin implementation: miners find long chains of prime
numbers.
Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 15
Bitcoin Mining PuzzleBitcoin Mining Puzzle
· Fast verificationFast verification
- Every node on the network validates every puzzle solution
· Adjustable difficultyAdjustable difficulty
- The difficulty of the puzzle can be changed over time as new
contributors join
- Puzzle solutions should be found in a fairly steady rate
· Progress‐freenessProgress‐freeness
- The odds of solving the puzzle must be independent of how much work
you have already spent trying to solve it, instead the chance of winning
a puzzle solution in any unit of time should be roughly proportional to
the hash power used. → memoryless, time is exponentially distributed.
- One vote one cpu → resistant to Sybil attacks.
[Princeton-Book]
Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 16
ASIC-Resistant PuzzlesASIC-Resistant Puzzles
· Now, Bitcoin is almost exclusively mined by very powerful optimizedNow, Bitcoin is almost exclusively mined by very powerful optimized
ASIC chips!ASIC chips!
- Mining Bitcoin on an ordinary PC (or even old ASICs) is not profitable! →
most individuals do not mine in the Bitcoin net.
· Goal: disincentivize the use of custom‐built hardware for mining.Goal: disincentivize the use of custom‐built hardware for mining.
- More realistic: a puzzle that reduces the gap between the most cost‐effective
customized hardware and what most general‐purpose computers can do.
· Solutions:Solutions:
- Memory-hard puzzles → what to do with verification cost?
- X11 → uses 11 hash algorithms, costly to implement on HW, not profitable
yet!
· Would ASIC-resistance be a good property, anyway?Would ASIC-resistance be a good property, anyway?
[Princeton-Book]
Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 17
Nonoutsourceable PuzzlesNonoutsourceable Puzzles
· A few large pools represent most of the Bitcoin mining power.A few large pools represent most of the Bitcoin mining power.
- Most Bitcoin miners mine as part of a pool, and each pool is operated
by a central pool administrator.
- A possible threat to decentralization of Bitcoin + block discarding
attacks between pools
· Goal: Preventing the formation of mining poolsGoal: Preventing the formation of mining pools
· One solution: Require that the miner know the private key ofOne solution: Require that the miner know the private key of
the coinbase txthe coinbase tx
- E.g. “hash of the block is below a certain target” → “hash of a
signature on the block is below a certain target”
· PreventingPreventing allall pools may lead to more centralization, doesn’t it?pools may lead to more centralization, doesn’t it?
[Princeton-Book]
Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 18
Alternative Consensus MechanismsAlternative Consensus Mechanisms
· Practical Byzantine Fault Tolerance (PBFT) [PBFT]Practical Byzantine Fault Tolerance (PBFT) [PBFT]
- A leader node broadcasts a block proposal to other (backup) nodes. The block is
added to the blockchain upon approval of at least 2/3 of nodes.
- Nodes become the leader in a round-robin fashion.
- Pros: transaction finality, higher energy efficiency, more even payout
- Cons: Sybil attack, scalability (communication, integrity checking) → suitable for
permissioned blockchains
- Used by Hyperledger (incomplete), Zilliqa (PBFT + PoW every ~100 blocks)
· Proof-of-Elapsed-Time (PoET) [PoET]Proof-of-Elapsed-Time (PoET) [PoET]
- Utilizes a “trusted execution environment” (Intel SGX)
- Each node is given a random timer object and the first timer to expire “wakes up”
that node who becomes the block leader and produces a new block.
- Can replace the round-robin selection of leader in PBFT.
- Pro: efficiency, Con: based on Intel HW.
- Implemented in Hyperledger Sawtooth
Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 19
Alternative Consensus Mechanisms (2)Alternative Consensus Mechanisms (2)
· Proof-of-Stake (PoS) by PeercoinProof-of-Stake (PoS) by Peercoin
- In each round, the winner (miner) is chosen based on node’s stake value →
Wealthier nodes have higher chances to be chosen.
- The miner is rewarded by proposing a block which is validated by other nodes.
- Reduces the computational power needed in comparison with PoW.
- Delegated PoS (DpoS): Only a subset group of nodes (selected by
stakeholders) participate in the block production process.
· Proof-of-Importance (PoI) [NEM-PoI]Proof-of-Importance (PoI) [NEM-PoI]
- Accounts with higher importance have higher chance to attach a new block.
- Importance rating is based on graph theoretic metrics, and interactions wih the
blockchain improves importance.
· And many other proposals!And many other proposals!
Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 20
Side Note: Execution of Smart ContractsSide Note: Execution of Smart Contracts
· Sequential executionSequential execution
- Short smart contracts, longest validation time
· Parallel executionParallel execution
- Multiple contracts execute in parallel.
- Conflicting changes must result in deterministic result
- Resolution: report the followed runtime schedule to other miners
· Non-blocking executionNon-blocking execution
- Separating execution from the process of building blocks
- Accelerate block building and validating process
· Performance analysis toolsPerformance analysis tools
- [Blockbench], [Realtime-Perf]
[RD19]
Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 21
Auxiliary ChainsAuxiliary Chains
Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 22
Auxiliary Chains for Improved SecurityAuxiliary Chains for Improved Security
· Merged miningMerged mining
- Reuse miners of an established blockchain network to mine on a
new network.
- E.g. Namecoin (based on Bitcoin)
· Hook into a popular blockchainHook into a popular blockchain
- Periodically add hashes of the new blockchain into blocks of a
popular blockchain
- E.g. Factom (its current hash is submitted to Bitcoin b.c.)
· Proof-of-burnProof-of-burn
- To irreversibly ‘transfer’ tokens from one blockchain to another.
- E.g. Counterparty tokens bootstrapped from Bitcoin tokens.
[ArchBook]
Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 23
SidechainsSidechains
· Build an ecosystem based on a popular main blockchain withoutBuild an ecosystem based on a popular main blockchain without
significantly increasing the load on it.significantly increasing the load on it.
- Plus, the main chain is protected from damages to sidechains
- Tokens of one blockchain (main chain) be securely transferred and used in
another one (sidechain), and possibly move back to the original chain.
· Two typesTwo types
- One-way: interaction is only from the main chain to the sidechain (e.g.
proof-of-burn)
- Two-way: bidirectional interaction
· Some people believe sidechains are a feature of 3Some people believe sidechains are a feature of 3rdrd
generation ofgeneration of
blockchainsblockchains
- Bitcoin → 1st, Ethereum (smart contracts) → 2nd, Corda/HLFabric → 3rd
[ArchBook]
Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 24
Example: The Lightning NetworkExample: The Lightning Network
· Lightning is a protocol for making fast payments with Bitcoin using a network ofLightning is a protocol for making fast payments with Bitcoin using a network of
channels.channels.
- Lightning allows for two parties to conduct transactions off-chain by giving each of the
parties a cross-signed commitment transaction, which describes the current state of the
channel (basically, the current balance).
- This commitment transaction is updated every time a new payment is made and is
spendable at all times.
· There are three ways a channel can end:There are three ways a channel can end:
- Mutual close: They generate a closing transaction and publish it on the blockchain
- Unilateral close: One side publishes its latest commitment transaction.
- Revoked transaction close: one of the parties deliberately tries to cheat, by publishing an
outdated commitment transaction (presumably, a prior version, which is more in its favor)
→ will not succeed.
· Lightning is designed to be trustlessLightning is designed to be trustless
- there is no risk of loss of funds in any of these three cases
Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 25
ShardingSharding
· Concept: Divide the blockchain into pieces.Concept: Divide the blockchain into pieces.
- Nodes only hold data of some shards instead of the full chain.
· State sharding (Ethereum 2.0)State sharding (Ethereum 2.0)
- grouping subsets of nodes into shards which in turn process
transactions specific to that shard.
· Transaction sharding (Zilliqa)Transaction sharding (Zilliqa)
- The network is automatically split into “shards,” or parallel sub-
committees.
- Each of these shards will process its given micro-block
- All micro-blocks merge to create the final one.
Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 26
Questions?Questions?
Sadegh Dorri N.Sadegh Dorri N.
dorri@modares.ac.ir
http://www.modares.ac.ir/~dorri
Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 27
ReferencesReferences
· [ArchBook] X. Xu et al., “Varieties of Blockchains,” in Architecture for Blockchain Applications,
Springer Nature Switzerland, 2019, Chapter 3, pp. 45-59.
· [Princeton-Book] A. Narayanan, et al., Bitcoin and Cryptocurrency Technologies, Princeton
University Press, Jul. 2016, Chapter 8.
· [RD19] S. Rouhani and R. Deters, "Security, Performance, and Applications of Smart Contracts: A
Systematic Survey," in IEEE Access, vol. 7, pp. 50759-50779, 2019.
· [PoS] V. Buterin, “What Proof of Stake Is And Why It Matters,” Bitcoin Magazine, Aug. 2013,
Link: https://bitcoinmagazine.com/articles/what-proof-of-stake-is-and-why-it-matters-1377531463/
· [DPoS] BitShares Blockchain Foundation, “Delegated Proof of Stake (DPOS),” BitShares
Documentation, Aug. 2018, Link: http://docs.bitshares.org/en/master/technology/dpos.html
GitHub:https://github.com/bitshares/how.bitshares.works/blob/master/docs/technology/dpos.rst
· [NEM-PoI] NEM Technical Reference v1.2.1, Feb. 2018, Link:
https://nem.io/wp-content/themes/nem/files/NEM_techRef.pdf
· [PBFT] L. Seeley, “Introduction to Sawtooth PBFT,” Hyperledger Sawtooth Blog, Feb. 2019, Link:
https://www.hyperledger.org/blog/2019/02/13/introduction-to-sawtooth-pbft
Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 28
ReferencesReferences
· [PoET] Intel Corporation, “PoET 1.0 Specification,” Hyperledger Sawtooth Documentation v1.0.5,
Jul. 2017. Link: https://sawtooth.hyperledger.org/docs/core/releases/1.0/architecture/poet.html
· [uPoW] M. Ball et al., “Proofs of Useful Work,” Cryptology ePrint Archive, Report 2017/203, Feb.
2017. Link: https://eprint.iacr.org/2017/203
· [PrimeCoin] V Buterin, “Primecoin: The Cryptocurrency Whose Mining is Actually Useful,” Bitcoin
Magazine, Jul. 2013, Link:
https://bitcoinmagazine.com/articles/primecoin-the-cryptocurrency-whose-mining-is-actually-useful
-1373298534/
· B. Curran, “What is Sharding? Guide to this Ethereum Scaling Concept Explained,” Blockonomi
Web Site, Mar. 2019, Link: https://blockonomi.com/sharding/
· [Blockbench] T. T. A. Dinh, J. Wang, G. Chen, R. Liu, B. C. Ooi, K.-L. Tan, "Blockbench: A
framework for analyzing private blockchains", Proc. ACM Int. Conf. Manage. Data, pp. 1085-1100,
May 2017. Link: https://github.com/ooibc88/blockbench
· [Realtime-Perf] P. Zheng, Z. Zheng, X. Luo, X. Chen, X. Liu, "A detailed and real-time
performance monitoring framework for blockchain systems", Proc. 40th Int. Conf. Softw. Eng.
Softw. Eng. Pract., pp. 134-143, Jun. 2018.

More Related Content

What's hot

Event Itnig - Smart Contracts by MarketPay, Juan Ignacio Pérez Sacristán
Event Itnig - Smart Contracts by MarketPay, Juan Ignacio Pérez SacristánEvent Itnig - Smart Contracts by MarketPay, Juan Ignacio Pérez Sacristán
Event Itnig - Smart Contracts by MarketPay, Juan Ignacio Pérez SacristánJuan Ignacio Pérez Sacristán
 
The best smart contract platforms in 2021
The best smart contract platforms in 2021The best smart contract platforms in 2021
The best smart contract platforms in 2021OliviaJune1
 
IRJET- Smart Contracts using Blockchain
IRJET- Smart Contracts using BlockchainIRJET- Smart Contracts using Blockchain
IRJET- Smart Contracts using BlockchainIRJET Journal
 
Blockchain and Virtual Currency - Technical issues -
Blockchain and Virtual Currency- Technical issues -Blockchain and Virtual Currency- Technical issues -
Blockchain and Virtual Currency - Technical issues -Kindai University
 
How Bitcoin 2.0 Will Shape the Future of Business
How Bitcoin 2.0 Will Shape the Future of BusinessHow Bitcoin 2.0 Will Shape the Future of Business
How Bitcoin 2.0 Will Shape the Future of Businessclark800
 
Paradigm shift: from the bitcoin Blockchain to Networked Computing
Paradigm shift: from the bitcoin Blockchain to Networked ComputingParadigm shift: from the bitcoin Blockchain to Networked Computing
Paradigm shift: from the bitcoin Blockchain to Networked Computingkumar641
 
آموزش پرایس اکشن (price action)
آموزش پرایس اکشن (price action)آموزش پرایس اکشن (price action)
آموزش پرایس اکشن (price action)price act
 
Blockchain analysis: 2016-11-23 MeetUp FinTech Marketpay.io - LemonPay.me
Blockchain analysis: 2016-11-23 MeetUp FinTech Marketpay.io - LemonPay.meBlockchain analysis: 2016-11-23 MeetUp FinTech Marketpay.io - LemonPay.me
Blockchain analysis: 2016-11-23 MeetUp FinTech Marketpay.io - LemonPay.meJuan Ignacio Pérez Sacristán
 
State Smart Contract Technologies
State Smart Contract TechnologiesState Smart Contract Technologies
State Smart Contract TechnologiesFederico Tenga
 
How Secure is your blockchain
How Secure is your blockchainHow Secure is your blockchain
How Secure is your blockchainKaren Martin
 
Smart Contractjp 1st section about
Smart Contractjp 1st section aboutSmart Contractjp 1st section about
Smart Contractjp 1st section aboutTomoaki Sato
 
W24717 economic limit of bitcoin dan blockhain
W24717 economic limit of bitcoin dan blockhainW24717 economic limit of bitcoin dan blockhain
W24717 economic limit of bitcoin dan blockhainRein Mahatma
 
A framework for improving the efficiency of the transparency in financial dom...
A framework for improving the efficiency of the transparency in financial dom...A framework for improving the efficiency of the transparency in financial dom...
A framework for improving the efficiency of the transparency in financial dom...Dr. C.V. Suresh Babu
 
Privacy-preserving techniques using zero knowledge proof in public Ethereum
Privacy-preserving techniques using zero knowledge proof in public EthereumPrivacy-preserving techniques using zero knowledge proof in public Ethereum
Privacy-preserving techniques using zero knowledge proof in public EthereumNagib Aouini
 
Introduction to blockchain and crypto currencies
Introduction to blockchain and crypto currenciesIntroduction to blockchain and crypto currencies
Introduction to blockchain and crypto currenciesRohas Nagpal
 
20190316 - CLBFest - Blockchain & the law - Willem Van de Wiele
20190316 - CLBFest - Blockchain & the law - Willem Van de Wiele20190316 - CLBFest - Blockchain & the law - Willem Van de Wiele
20190316 - CLBFest - Blockchain & the law - Willem Van de WieleBrussels Legal Hackers
 
Futuro coin white-paper-en-31.01.18
Futuro coin white-paper-en-31.01.18Futuro coin white-paper-en-31.01.18
Futuro coin white-paper-en-31.01.18리움 네
 
What is tokenization in blockchain - BCS London
What is tokenization in blockchain - BCS LondonWhat is tokenization in blockchain - BCS London
What is tokenization in blockchain - BCS LondonUlf Mattsson
 
TDC2018FLN | Trilha Blockchain - BlockChain Casos de Usos alem das CryptoMoedas
TDC2018FLN | Trilha Blockchain - BlockChain Casos de Usos alem das CryptoMoedasTDC2018FLN | Trilha Blockchain - BlockChain Casos de Usos alem das CryptoMoedas
TDC2018FLN | Trilha Blockchain - BlockChain Casos de Usos alem das CryptoMoedastdc-globalcode
 

What's hot (20)

Event Itnig - Smart Contracts by MarketPay, Juan Ignacio Pérez Sacristán
Event Itnig - Smart Contracts by MarketPay, Juan Ignacio Pérez SacristánEvent Itnig - Smart Contracts by MarketPay, Juan Ignacio Pérez Sacristán
Event Itnig - Smart Contracts by MarketPay, Juan Ignacio Pérez Sacristán
 
The best smart contract platforms in 2021
The best smart contract platforms in 2021The best smart contract platforms in 2021
The best smart contract platforms in 2021
 
IRJET- Smart Contracts using Blockchain
IRJET- Smart Contracts using BlockchainIRJET- Smart Contracts using Blockchain
IRJET- Smart Contracts using Blockchain
 
Blockchain and Virtual Currency - Technical issues -
Blockchain and Virtual Currency- Technical issues -Blockchain and Virtual Currency- Technical issues -
Blockchain and Virtual Currency - Technical issues -
 
How Bitcoin 2.0 Will Shape the Future of Business
How Bitcoin 2.0 Will Shape the Future of BusinessHow Bitcoin 2.0 Will Shape the Future of Business
How Bitcoin 2.0 Will Shape the Future of Business
 
Paradigm shift: from the bitcoin Blockchain to Networked Computing
Paradigm shift: from the bitcoin Blockchain to Networked ComputingParadigm shift: from the bitcoin Blockchain to Networked Computing
Paradigm shift: from the bitcoin Blockchain to Networked Computing
 
آموزش پرایس اکشن (price action)
آموزش پرایس اکشن (price action)آموزش پرایس اکشن (price action)
آموزش پرایس اکشن (price action)
 
Blockchain analysis: 2016-11-23 MeetUp FinTech Marketpay.io - LemonPay.me
Blockchain analysis: 2016-11-23 MeetUp FinTech Marketpay.io - LemonPay.meBlockchain analysis: 2016-11-23 MeetUp FinTech Marketpay.io - LemonPay.me
Blockchain analysis: 2016-11-23 MeetUp FinTech Marketpay.io - LemonPay.me
 
State Smart Contract Technologies
State Smart Contract TechnologiesState Smart Contract Technologies
State Smart Contract Technologies
 
How Secure is your blockchain
How Secure is your blockchainHow Secure is your blockchain
How Secure is your blockchain
 
Smart Contractjp 1st section about
Smart Contractjp 1st section aboutSmart Contractjp 1st section about
Smart Contractjp 1st section about
 
W24717 economic limit of bitcoin dan blockhain
W24717 economic limit of bitcoin dan blockhainW24717 economic limit of bitcoin dan blockhain
W24717 economic limit of bitcoin dan blockhain
 
A framework for improving the efficiency of the transparency in financial dom...
A framework for improving the efficiency of the transparency in financial dom...A framework for improving the efficiency of the transparency in financial dom...
A framework for improving the efficiency of the transparency in financial dom...
 
Privacy-preserving techniques using zero knowledge proof in public Ethereum
Privacy-preserving techniques using zero knowledge proof in public EthereumPrivacy-preserving techniques using zero knowledge proof in public Ethereum
Privacy-preserving techniques using zero knowledge proof in public Ethereum
 
Introduction to blockchain and crypto currencies
Introduction to blockchain and crypto currenciesIntroduction to blockchain and crypto currencies
Introduction to blockchain and crypto currencies
 
20190316 - CLBFest - Blockchain & the law - Willem Van de Wiele
20190316 - CLBFest - Blockchain & the law - Willem Van de Wiele20190316 - CLBFest - Blockchain & the law - Willem Van de Wiele
20190316 - CLBFest - Blockchain & the law - Willem Van de Wiele
 
Futuro coin white-paper-en-31.01.18
Futuro coin white-paper-en-31.01.18Futuro coin white-paper-en-31.01.18
Futuro coin white-paper-en-31.01.18
 
What is tokenization in blockchain - BCS London
What is tokenization in blockchain - BCS LondonWhat is tokenization in blockchain - BCS London
What is tokenization in blockchain - BCS London
 
TDC2018FLN | Trilha Blockchain - BlockChain Casos de Usos alem das CryptoMoedas
TDC2018FLN | Trilha Blockchain - BlockChain Casos de Usos alem das CryptoMoedasTDC2018FLN | Trilha Blockchain - BlockChain Casos de Usos alem das CryptoMoedas
TDC2018FLN | Trilha Blockchain - BlockChain Casos de Usos alem das CryptoMoedas
 
Bitcoin
BitcoinBitcoin
Bitcoin
 

Similar to Varieties of Blockchains

Blockchain-based Applications
Blockchain-based ApplicationsBlockchain-based Applications
Blockchain-based ApplicationsSadegh Dorri N.
 
Ethereum Blockchain and DApps - Workshop at Software University
Ethereum Blockchain and DApps  - Workshop at Software UniversityEthereum Blockchain and DApps  - Workshop at Software University
Ethereum Blockchain and DApps - Workshop at Software UniversityOpen Source University
 
IRJET- Blockchain Technology a Literature Survey
IRJET- Blockchain Technology a Literature SurveyIRJET- Blockchain Technology a Literature Survey
IRJET- Blockchain Technology a Literature SurveyIRJET Journal
 
Uses of Blockchain Technology in the agrifood system
Uses of Blockchain Technology in the agrifood systemUses of Blockchain Technology in the agrifood system
Uses of Blockchain Technology in the agrifood systemChristopher Brewster
 
Cryptographically Secured Communication With Extraterrestrial Intelligence Us...
Cryptographically Secured Communication With Extraterrestrial Intelligence Us...Cryptographically Secured Communication With Extraterrestrial Intelligence Us...
Cryptographically Secured Communication With Extraterrestrial Intelligence Us...IRJET Journal
 
Cardano for Laymen (Sept 2022).pptx
Cardano for Laymen (Sept 2022).pptxCardano for Laymen (Sept 2022).pptx
Cardano for Laymen (Sept 2022).pptxKingsley Choo
 
Blockchain and Its Applications in the Real World
Blockchain and Its Applications in the Real WorldBlockchain and Its Applications in the Real World
Blockchain and Its Applications in the Real WorldIRJET Journal
 
IRJET- An Overview of the Security of Blockchain
IRJET- An Overview of the Security of BlockchainIRJET- An Overview of the Security of Blockchain
IRJET- An Overview of the Security of BlockchainIRJET Journal
 
IRJET- Probabilistic Stress Distribution in Thick Cylindrical Pipe using Fini...
IRJET- Probabilistic Stress Distribution in Thick Cylindrical Pipe using Fini...IRJET- Probabilistic Stress Distribution in Thick Cylindrical Pipe using Fini...
IRJET- Probabilistic Stress Distribution in Thick Cylindrical Pipe using Fini...IRJET Journal
 
Understanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
Understanding Proof of Work (PoW) and Proof of Stake (PoS) AlgorithmsUnderstanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
Understanding Proof of Work (PoW) and Proof of Stake (PoS) AlgorithmsGautam Anand
 
IRJET - A Detailed Study on Cryptocurrency
IRJET -  	  A Detailed Study on CryptocurrencyIRJET -  	  A Detailed Study on Cryptocurrency
IRJET - A Detailed Study on CryptocurrencyIRJET Journal
 
IRJET- Consensus Mechanism on Secure Challenges in Blockchain Networks
IRJET-  	  Consensus Mechanism on Secure Challenges in Blockchain NetworksIRJET-  	  Consensus Mechanism on Secure Challenges in Blockchain Networks
IRJET- Consensus Mechanism on Secure Challenges in Blockchain NetworksIRJET Journal
 
Blockchain - Beyond the Hype
Blockchain - Beyond the HypeBlockchain - Beyond the Hype
Blockchain - Beyond the HypeSalman Baset
 
BlockChain for the Banker
BlockChain for the BankerBlockChain for the Banker
BlockChain for the BankerBohdan Szymanik
 
2019 blockchain economy
2019 blockchain economy2019 blockchain economy
2019 blockchain economyHeung-No Lee
 
Innovation potential of the blockchain, and of decentralized applications
Innovation potential of the blockchain, and of decentralized applicationsInnovation potential of the blockchain, and of decentralized applications
Innovation potential of the blockchain, and of decentralized applicationsJan Brejcha
 
Introduction to Blockchain Development
Introduction to Blockchain DevelopmentIntroduction to Blockchain Development
Introduction to Blockchain DevelopmentLightstreams
 
StarkNet ERC20 + ERC721
StarkNet ERC20 + ERC721StarkNet ERC20 + ERC721
StarkNet ERC20 + ERC721TinaBregovi
 
Blockchain mechanism for IET Mauritius Network
Blockchain mechanism for IET Mauritius NetworkBlockchain mechanism for IET Mauritius Network
Blockchain mechanism for IET Mauritius Networkcharles okaformbah
 

Similar to Varieties of Blockchains (20)

Blockchain-based Applications
Blockchain-based ApplicationsBlockchain-based Applications
Blockchain-based Applications
 
Ethereum Blockchain and DApps - Workshop at Software University
Ethereum Blockchain and DApps  - Workshop at Software UniversityEthereum Blockchain and DApps  - Workshop at Software University
Ethereum Blockchain and DApps - Workshop at Software University
 
IRJET- Blockchain Technology a Literature Survey
IRJET- Blockchain Technology a Literature SurveyIRJET- Blockchain Technology a Literature Survey
IRJET- Blockchain Technology a Literature Survey
 
Uses of Blockchain Technology in the agrifood system
Uses of Blockchain Technology in the agrifood systemUses of Blockchain Technology in the agrifood system
Uses of Blockchain Technology in the agrifood system
 
Cryptographically Secured Communication With Extraterrestrial Intelligence Us...
Cryptographically Secured Communication With Extraterrestrial Intelligence Us...Cryptographically Secured Communication With Extraterrestrial Intelligence Us...
Cryptographically Secured Communication With Extraterrestrial Intelligence Us...
 
Cardano for Laymen (Sept 2022).pptx
Cardano for Laymen (Sept 2022).pptxCardano for Laymen (Sept 2022).pptx
Cardano for Laymen (Sept 2022).pptx
 
Blockchain and Its Applications in the Real World
Blockchain and Its Applications in the Real WorldBlockchain and Its Applications in the Real World
Blockchain and Its Applications in the Real World
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
 
IRJET- An Overview of the Security of Blockchain
IRJET- An Overview of the Security of BlockchainIRJET- An Overview of the Security of Blockchain
IRJET- An Overview of the Security of Blockchain
 
IRJET- Probabilistic Stress Distribution in Thick Cylindrical Pipe using Fini...
IRJET- Probabilistic Stress Distribution in Thick Cylindrical Pipe using Fini...IRJET- Probabilistic Stress Distribution in Thick Cylindrical Pipe using Fini...
IRJET- Probabilistic Stress Distribution in Thick Cylindrical Pipe using Fini...
 
Understanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
Understanding Proof of Work (PoW) and Proof of Stake (PoS) AlgorithmsUnderstanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
Understanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
 
IRJET - A Detailed Study on Cryptocurrency
IRJET -  	  A Detailed Study on CryptocurrencyIRJET -  	  A Detailed Study on Cryptocurrency
IRJET - A Detailed Study on Cryptocurrency
 
IRJET- Consensus Mechanism on Secure Challenges in Blockchain Networks
IRJET-  	  Consensus Mechanism on Secure Challenges in Blockchain NetworksIRJET-  	  Consensus Mechanism on Secure Challenges in Blockchain Networks
IRJET- Consensus Mechanism on Secure Challenges in Blockchain Networks
 
Blockchain - Beyond the Hype
Blockchain - Beyond the HypeBlockchain - Beyond the Hype
Blockchain - Beyond the Hype
 
BlockChain for the Banker
BlockChain for the BankerBlockChain for the Banker
BlockChain for the Banker
 
2019 blockchain economy
2019 blockchain economy2019 blockchain economy
2019 blockchain economy
 
Innovation potential of the blockchain, and of decentralized applications
Innovation potential of the blockchain, and of decentralized applicationsInnovation potential of the blockchain, and of decentralized applications
Innovation potential of the blockchain, and of decentralized applications
 
Introduction to Blockchain Development
Introduction to Blockchain DevelopmentIntroduction to Blockchain Development
Introduction to Blockchain Development
 
StarkNet ERC20 + ERC721
StarkNet ERC20 + ERC721StarkNet ERC20 + ERC721
StarkNet ERC20 + ERC721
 
Blockchain mechanism for IET Mauritius Network
Blockchain mechanism for IET Mauritius NetworkBlockchain mechanism for IET Mauritius Network
Blockchain mechanism for IET Mauritius Network
 

More from Sadegh Dorri N.

فناوری زنجیره بلوک و کاربردهای آن در زنجیره تأمین (شانزدهمین کنفرانس مهندسی ص...
فناوری زنجیره بلوک و کاربردهای آن در زنجیره تأمین (شانزدهمین کنفرانس مهندسی ص...فناوری زنجیره بلوک و کاربردهای آن در زنجیره تأمین (شانزدهمین کنفرانس مهندسی ص...
فناوری زنجیره بلوک و کاربردهای آن در زنجیره تأمین (شانزدهمین کنفرانس مهندسی ص...Sadegh Dorri N.
 
معرفی آزمایشگاه زنجیره بلوک و زمینه‌های پژوهشی
معرفی آزمایشگاه زنجیره بلوک و زمینه‌های پژوهشیمعرفی آزمایشگاه زنجیره بلوک و زمینه‌های پژوهشی
معرفی آزمایشگاه زنجیره بلوک و زمینه‌های پژوهشیSadegh Dorri N.
 
فناوری زنجیره بلوک و کاربردهای آن در زنجیره تأمین
فناوری زنجیره بلوک و کاربردهای آن در زنجیره تأمینفناوری زنجیره بلوک و کاربردهای آن در زنجیره تأمین
فناوری زنجیره بلوک و کاربردهای آن در زنجیره تأمینSadegh Dorri N.
 
ارزیابی سامانه‌های رایانه‌ای با کمک شبیه‌سازی
ارزیابی سامانه‌های رایانه‌ای با کمک شبیه‌سازیارزیابی سامانه‌های رایانه‌ای با کمک شبیه‌سازی
ارزیابی سامانه‌های رایانه‌ای با کمک شبیه‌سازیSadegh Dorri N.
 
Logic Programming and Prolog
Logic Programming and PrologLogic Programming and Prolog
Logic Programming and PrologSadegh Dorri N.
 
Trust in the Virtual World
Trust in the Virtual WorldTrust in the Virtual World
Trust in the Virtual WorldSadegh Dorri N.
 
Uncertainty in Probabilistic Trust Models
Uncertainty in Probabilistic Trust ModelsUncertainty in Probabilistic Trust Models
Uncertainty in Probabilistic Trust ModelsSadegh Dorri N.
 
حریم خصوصی در دنیای مدرن: خواسته‌ها، چالش‌ها، و راه‌حل‌ها
حریم خصوصی در دنیای مدرن: خواسته‌ها، چالش‌ها، و راه‌حل‌هاحریم خصوصی در دنیای مدرن: خواسته‌ها، چالش‌ها، و راه‌حل‌ها
حریم خصوصی در دنیای مدرن: خواسته‌ها، چالش‌ها، و راه‌حل‌هاSadegh Dorri N.
 
Lightweight Virtualization in Linux
Lightweight Virtualization in LinuxLightweight Virtualization in Linux
Lightweight Virtualization in LinuxSadegh Dorri N.
 
کنترل دسترسی بر مبنای اعتماد و آگاه از مخاطره در توری
کنترل دسترسی بر مبنای اعتماد و آگاه از مخاطره در توریکنترل دسترسی بر مبنای اعتماد و آگاه از مخاطره در توری
کنترل دسترسی بر مبنای اعتماد و آگاه از مخاطره در توریSadegh Dorri N.
 
مهندسی حریم خصوصی
مهندسی حریم خصوصیمهندسی حریم خصوصی
مهندسی حریم خصوصیSadegh Dorri N.
 

More from Sadegh Dorri N. (11)

فناوری زنجیره بلوک و کاربردهای آن در زنجیره تأمین (شانزدهمین کنفرانس مهندسی ص...
فناوری زنجیره بلوک و کاربردهای آن در زنجیره تأمین (شانزدهمین کنفرانس مهندسی ص...فناوری زنجیره بلوک و کاربردهای آن در زنجیره تأمین (شانزدهمین کنفرانس مهندسی ص...
فناوری زنجیره بلوک و کاربردهای آن در زنجیره تأمین (شانزدهمین کنفرانس مهندسی ص...
 
معرفی آزمایشگاه زنجیره بلوک و زمینه‌های پژوهشی
معرفی آزمایشگاه زنجیره بلوک و زمینه‌های پژوهشیمعرفی آزمایشگاه زنجیره بلوک و زمینه‌های پژوهشی
معرفی آزمایشگاه زنجیره بلوک و زمینه‌های پژوهشی
 
فناوری زنجیره بلوک و کاربردهای آن در زنجیره تأمین
فناوری زنجیره بلوک و کاربردهای آن در زنجیره تأمینفناوری زنجیره بلوک و کاربردهای آن در زنجیره تأمین
فناوری زنجیره بلوک و کاربردهای آن در زنجیره تأمین
 
ارزیابی سامانه‌های رایانه‌ای با کمک شبیه‌سازی
ارزیابی سامانه‌های رایانه‌ای با کمک شبیه‌سازیارزیابی سامانه‌های رایانه‌ای با کمک شبیه‌سازی
ارزیابی سامانه‌های رایانه‌ای با کمک شبیه‌سازی
 
Logic Programming and Prolog
Logic Programming and PrologLogic Programming and Prolog
Logic Programming and Prolog
 
Trust in the Virtual World
Trust in the Virtual WorldTrust in the Virtual World
Trust in the Virtual World
 
Uncertainty in Probabilistic Trust Models
Uncertainty in Probabilistic Trust ModelsUncertainty in Probabilistic Trust Models
Uncertainty in Probabilistic Trust Models
 
حریم خصوصی در دنیای مدرن: خواسته‌ها، چالش‌ها، و راه‌حل‌ها
حریم خصوصی در دنیای مدرن: خواسته‌ها، چالش‌ها، و راه‌حل‌هاحریم خصوصی در دنیای مدرن: خواسته‌ها، چالش‌ها، و راه‌حل‌ها
حریم خصوصی در دنیای مدرن: خواسته‌ها، چالش‌ها، و راه‌حل‌ها
 
Lightweight Virtualization in Linux
Lightweight Virtualization in LinuxLightweight Virtualization in Linux
Lightweight Virtualization in Linux
 
کنترل دسترسی بر مبنای اعتماد و آگاه از مخاطره در توری
کنترل دسترسی بر مبنای اعتماد و آگاه از مخاطره در توریکنترل دسترسی بر مبنای اعتماد و آگاه از مخاطره در توری
کنترل دسترسی بر مبنای اعتماد و آگاه از مخاطره در توری
 
مهندسی حریم خصوصی
مهندسی حریم خصوصیمهندسی حریم خصوصی
مهندسی حریم خصوصی
 

Recently uploaded

US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONjhunlian
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solidnamansinghjarodiya
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Coursebim.edu.pl
 
GSK & SEAMANSHIP-IV LIFE SAVING APPLIANCES .pptx
GSK & SEAMANSHIP-IV LIFE SAVING APPLIANCES .pptxGSK & SEAMANSHIP-IV LIFE SAVING APPLIANCES .pptx
GSK & SEAMANSHIP-IV LIFE SAVING APPLIANCES .pptxshuklamittt0077
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptMadan Karki
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingBootNeck1
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfChristianCDAM
 
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdfDEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdfAkritiPradhan2
 
Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxStephen Sitton
 
chpater16.pptxMMMMMMMMMMMMMMMMMMMMMMMMMMM
chpater16.pptxMMMMMMMMMMMMMMMMMMMMMMMMMMMchpater16.pptxMMMMMMMMMMMMMMMMMMMMMMMMMMM
chpater16.pptxMMMMMMMMMMMMMMMMMMMMMMMMMMMNanaAgyeman13
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfalene1
 
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdfPaper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdfNainaShrivastava14
 
Crushers to screens in aggregate production
Crushers to screens in aggregate productionCrushers to screens in aggregate production
Crushers to screens in aggregate productionChinnuNinan
 
Cooling Tower SERD pH drop issue (11 April 2024) .pptx
Cooling Tower SERD pH drop issue (11 April 2024) .pptxCooling Tower SERD pH drop issue (11 April 2024) .pptx
Cooling Tower SERD pH drop issue (11 April 2024) .pptxmamansuratman0253
 
OOP concepts -in-Python programming language
OOP concepts -in-Python programming languageOOP concepts -in-Python programming language
OOP concepts -in-Python programming languageSmritiSharma901052
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdfCaalaaAbdulkerim
 

Recently uploaded (20)

US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solid
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Course
 
GSK & SEAMANSHIP-IV LIFE SAVING APPLIANCES .pptx
GSK & SEAMANSHIP-IV LIFE SAVING APPLIANCES .pptxGSK & SEAMANSHIP-IV LIFE SAVING APPLIANCES .pptx
GSK & SEAMANSHIP-IV LIFE SAVING APPLIANCES .pptx
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdf
 
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdfDEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
 
Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptx
 
chpater16.pptxMMMMMMMMMMMMMMMMMMMMMMMMMMM
chpater16.pptxMMMMMMMMMMMMMMMMMMMMMMMMMMMchpater16.pptxMMMMMMMMMMMMMMMMMMMMMMMMMMM
chpater16.pptxMMMMMMMMMMMMMMMMMMMMMMMMMMM
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
 
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdfPaper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
 
Crushers to screens in aggregate production
Crushers to screens in aggregate productionCrushers to screens in aggregate production
Crushers to screens in aggregate production
 
Cooling Tower SERD pH drop issue (11 April 2024) .pptx
Cooling Tower SERD pH drop issue (11 April 2024) .pptxCooling Tower SERD pH drop issue (11 April 2024) .pptx
Cooling Tower SERD pH drop issue (11 April 2024) .pptx
 
Designing pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptxDesigning pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptx
 
OOP concepts -in-Python programming language
OOP concepts -in-Python programming languageOOP concepts -in-Python programming language
OOP concepts -in-Python programming language
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdf
 

Varieties of Blockchains

  • 1. ‫م‬‫حی‬‫ر‬‫ل‬‫ا‬‫ن‬ ‫حم‬ ‫ر‬‫ل‬‫ا‬‫اهلل‬‫م‬ ‫بس‬ ‫م‬‫حی‬‫ر‬‫ل‬‫ا‬‫ن‬ ‫حم‬ ‫ر‬‫ل‬‫ا‬‫اهلل‬‫م‬ ‫بس‬ Tarbiat Modares University Varieties of BlockchainsVarieties of Blockchains E-Commerce SecurityE-Commerce Security Instructor: Sadegh Dorri N.Instructor: Sadegh Dorri N. http://www.modares.ac.ir/~dorrihttp://www.modares.ac.ir/~dorri Spring 2019 (1398)Spring 2019 (1398) Video: https://www.aparat.com/sdorri Slides: https://www.slideshare.net/SadeghD1/ Podcast: https://shenoto.com/sdorri
  • 2. Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 2 OutlineOutline · DefinitionsDefinitions · Overview of Some OptionsOverview of Some Options - Governance, permissions, ledger structure, block config · Consensus MechanismsConsensus Mechanisms - Proof of Work and other mechanisms - ASIC-resistance - Nonoutsourceable puzzles · Auxiliary BlockchainsAuxiliary Blockchains - Sidechains, and sharding
  • 3. Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 3 Definitions (1)Definitions (1) Fundamental Properties: immutability, non-repudiation, integrity, transparency, and equal rights [ArchBook]
  • 4. Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 4 Definitions (2)Definitions (2) [ArchBook]
  • 5. Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 5 Definitions (3)Definitions (3) [ArchBook]
  • 6. Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 6 Definitions (4)Definitions (4) [ArchBook]
  • 7. Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 7 GovernanceGovernance · Public blockchain (Public blockchain (‫می‬‫م‬‫عمو‬‫می‬‫م‬‫عمو‬)) · Consortium/community blockchain (Consortium/community blockchain (‫مجمنی‬‫ن‬‫م‬‫ا‬‫مجمنی‬‫ن‬‫م‬‫ا‬)) - Used across multiple organizations - Controlled by pre-authorized nodes · Private blockchain (Private blockchain (‫موصی‬‫ص‬‫خ‬‫موصی‬‫ص‬‫خ‬)) - Governed and hosted by a single organization (possibly multiple divisions) - Cost-effective, high performance, and flexible [ArchBook]
  • 8. Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 8 PermissionsPermissions · Permission-less public blockchainsPermission-less public blockchains · Permissioned miners (write) and permission-less normalPermissioned miners (write) and permission-less normal nodes (read)nodes (read) · Permissions for fine-grained operations on the tx level (e.g.Permissions for fine-grained operations on the tx level (e.g. creating assets)creating assets) [ArchBook]
  • 9. Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 9 Ledger StructureLedger Structure · Global list of blocksGlobal list of blocks - e.g in Bitcoin, Ethereum · Global directed acyclic graph (DAG)Global directed acyclic graph (DAG) - e.g. in Hashgraph (blocks), IOTA (tx’s) · Restricted shared ledgersRestricted shared ledgers - Many small ledgers shared only between authorized parties of interest. - e.g. in Corda, Hyperledger Fabric [ArchBook]
  • 10. Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 10 Block ConfigurationBlock Configuration · Block sizeBlock size - Control the number/complexity of transactions - More tx’s → more tx processing and communication overhead + increased risk of empty blocks! · Block generation frequencyBlock generation frequency - Shorter inter-block time → more forks → longer confirmation time! [ArchBook]
  • 11. Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 11 Blockchain PlatformsBlockchain Platforms · Hyperledger by The Linux FoundationHyperledger by The Linux Foundation - An open source collaborative effort created to advance cross-industry blockchain technologies. - It is a global collaboration among 185 members, hosted by The Linux Foundation, including leaders in finance, banking, IoT, supply chains, manufacturing and Technology. - 13 ongoing projects including Fabric, Sawtooth, and Iroha blockchain platforms. · Corda (DLT; not blockchain) by R3Corda (DLT; not blockchain) by R3 · Tendermint (Open source) by All In Bits IncTendermint (Open source) by All In Bits Inc · Blockchain on the cloud (Amazon AWS, Microsoft Azure, etc.)Blockchain on the cloud (Amazon AWS, Microsoft Azure, etc.) - Corda, Hyperledger Fabric, Ethereum etc on the cloud.
  • 12. Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 12 Consensus MechanismsConsensus Mechanisms
  • 13. Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 13 Consensus ProtocolConsensus Protocol · Distributed consensus protocolDistributed consensus protocol - There are n nodes that each have an input value. - Some of these nodes are faulty or malicious. - It must terminate with all honest nodes in agreement on the value. - The value must have been generated by an honest node. · Consensus mechanism in a blockchainConsensus mechanism in a blockchain - Miners may propose different next blocks. - Consensus… ● Determines the validating process of blocks, ● Controls malicious behavior ● Resolves conflicts [Princeton-Book]
  • 14. Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 14 Proof of WorkProof of Work · Bitcoin’s Proof-of-Work (PoW)Bitcoin’s Proof-of-Work (PoW) - Nodes (miners) solve a complicated mathematical puzzle and earn rewards. - The first node which succeeds is the winner of the current block. - The other nodes validate the work. · Proof-of-Useful-Work (uPoW) [uPoW, PrimeCoin]Proof-of-Useful-Work (uPoW) [uPoW, PrimeCoin] - PoWs whose hardness is based on a wide array of computational problems including deciding any graph property that is statable in first-order logic. [uPoW] - PrimeCoin implementation: miners find long chains of prime numbers.
  • 15. Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 15 Bitcoin Mining PuzzleBitcoin Mining Puzzle · Fast verificationFast verification - Every node on the network validates every puzzle solution · Adjustable difficultyAdjustable difficulty - The difficulty of the puzzle can be changed over time as new contributors join - Puzzle solutions should be found in a fairly steady rate · Progress‐freenessProgress‐freeness - The odds of solving the puzzle must be independent of how much work you have already spent trying to solve it, instead the chance of winning a puzzle solution in any unit of time should be roughly proportional to the hash power used. → memoryless, time is exponentially distributed. - One vote one cpu → resistant to Sybil attacks. [Princeton-Book]
  • 16. Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 16 ASIC-Resistant PuzzlesASIC-Resistant Puzzles · Now, Bitcoin is almost exclusively mined by very powerful optimizedNow, Bitcoin is almost exclusively mined by very powerful optimized ASIC chips!ASIC chips! - Mining Bitcoin on an ordinary PC (or even old ASICs) is not profitable! → most individuals do not mine in the Bitcoin net. · Goal: disincentivize the use of custom‐built hardware for mining.Goal: disincentivize the use of custom‐built hardware for mining. - More realistic: a puzzle that reduces the gap between the most cost‐effective customized hardware and what most general‐purpose computers can do. · Solutions:Solutions: - Memory-hard puzzles → what to do with verification cost? - X11 → uses 11 hash algorithms, costly to implement on HW, not profitable yet! · Would ASIC-resistance be a good property, anyway?Would ASIC-resistance be a good property, anyway? [Princeton-Book]
  • 17. Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 17 Nonoutsourceable PuzzlesNonoutsourceable Puzzles · A few large pools represent most of the Bitcoin mining power.A few large pools represent most of the Bitcoin mining power. - Most Bitcoin miners mine as part of a pool, and each pool is operated by a central pool administrator. - A possible threat to decentralization of Bitcoin + block discarding attacks between pools · Goal: Preventing the formation of mining poolsGoal: Preventing the formation of mining pools · One solution: Require that the miner know the private key ofOne solution: Require that the miner know the private key of the coinbase txthe coinbase tx - E.g. “hash of the block is below a certain target” → “hash of a signature on the block is below a certain target” · PreventingPreventing allall pools may lead to more centralization, doesn’t it?pools may lead to more centralization, doesn’t it? [Princeton-Book]
  • 18. Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 18 Alternative Consensus MechanismsAlternative Consensus Mechanisms · Practical Byzantine Fault Tolerance (PBFT) [PBFT]Practical Byzantine Fault Tolerance (PBFT) [PBFT] - A leader node broadcasts a block proposal to other (backup) nodes. The block is added to the blockchain upon approval of at least 2/3 of nodes. - Nodes become the leader in a round-robin fashion. - Pros: transaction finality, higher energy efficiency, more even payout - Cons: Sybil attack, scalability (communication, integrity checking) → suitable for permissioned blockchains - Used by Hyperledger (incomplete), Zilliqa (PBFT + PoW every ~100 blocks) · Proof-of-Elapsed-Time (PoET) [PoET]Proof-of-Elapsed-Time (PoET) [PoET] - Utilizes a “trusted execution environment” (Intel SGX) - Each node is given a random timer object and the first timer to expire “wakes up” that node who becomes the block leader and produces a new block. - Can replace the round-robin selection of leader in PBFT. - Pro: efficiency, Con: based on Intel HW. - Implemented in Hyperledger Sawtooth
  • 19. Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 19 Alternative Consensus Mechanisms (2)Alternative Consensus Mechanisms (2) · Proof-of-Stake (PoS) by PeercoinProof-of-Stake (PoS) by Peercoin - In each round, the winner (miner) is chosen based on node’s stake value → Wealthier nodes have higher chances to be chosen. - The miner is rewarded by proposing a block which is validated by other nodes. - Reduces the computational power needed in comparison with PoW. - Delegated PoS (DpoS): Only a subset group of nodes (selected by stakeholders) participate in the block production process. · Proof-of-Importance (PoI) [NEM-PoI]Proof-of-Importance (PoI) [NEM-PoI] - Accounts with higher importance have higher chance to attach a new block. - Importance rating is based on graph theoretic metrics, and interactions wih the blockchain improves importance. · And many other proposals!And many other proposals!
  • 20. Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 20 Side Note: Execution of Smart ContractsSide Note: Execution of Smart Contracts · Sequential executionSequential execution - Short smart contracts, longest validation time · Parallel executionParallel execution - Multiple contracts execute in parallel. - Conflicting changes must result in deterministic result - Resolution: report the followed runtime schedule to other miners · Non-blocking executionNon-blocking execution - Separating execution from the process of building blocks - Accelerate block building and validating process · Performance analysis toolsPerformance analysis tools - [Blockbench], [Realtime-Perf] [RD19]
  • 21. Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 21 Auxiliary ChainsAuxiliary Chains
  • 22. Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 22 Auxiliary Chains for Improved SecurityAuxiliary Chains for Improved Security · Merged miningMerged mining - Reuse miners of an established blockchain network to mine on a new network. - E.g. Namecoin (based on Bitcoin) · Hook into a popular blockchainHook into a popular blockchain - Periodically add hashes of the new blockchain into blocks of a popular blockchain - E.g. Factom (its current hash is submitted to Bitcoin b.c.) · Proof-of-burnProof-of-burn - To irreversibly ‘transfer’ tokens from one blockchain to another. - E.g. Counterparty tokens bootstrapped from Bitcoin tokens. [ArchBook]
  • 23. Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 23 SidechainsSidechains · Build an ecosystem based on a popular main blockchain withoutBuild an ecosystem based on a popular main blockchain without significantly increasing the load on it.significantly increasing the load on it. - Plus, the main chain is protected from damages to sidechains - Tokens of one blockchain (main chain) be securely transferred and used in another one (sidechain), and possibly move back to the original chain. · Two typesTwo types - One-way: interaction is only from the main chain to the sidechain (e.g. proof-of-burn) - Two-way: bidirectional interaction · Some people believe sidechains are a feature of 3Some people believe sidechains are a feature of 3rdrd generation ofgeneration of blockchainsblockchains - Bitcoin → 1st, Ethereum (smart contracts) → 2nd, Corda/HLFabric → 3rd [ArchBook]
  • 24. Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 24 Example: The Lightning NetworkExample: The Lightning Network · Lightning is a protocol for making fast payments with Bitcoin using a network ofLightning is a protocol for making fast payments with Bitcoin using a network of channels.channels. - Lightning allows for two parties to conduct transactions off-chain by giving each of the parties a cross-signed commitment transaction, which describes the current state of the channel (basically, the current balance). - This commitment transaction is updated every time a new payment is made and is spendable at all times. · There are three ways a channel can end:There are three ways a channel can end: - Mutual close: They generate a closing transaction and publish it on the blockchain - Unilateral close: One side publishes its latest commitment transaction. - Revoked transaction close: one of the parties deliberately tries to cheat, by publishing an outdated commitment transaction (presumably, a prior version, which is more in its favor) → will not succeed. · Lightning is designed to be trustlessLightning is designed to be trustless - there is no risk of loss of funds in any of these three cases
  • 25. Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 25 ShardingSharding · Concept: Divide the blockchain into pieces.Concept: Divide the blockchain into pieces. - Nodes only hold data of some shards instead of the full chain. · State sharding (Ethereum 2.0)State sharding (Ethereum 2.0) - grouping subsets of nodes into shards which in turn process transactions specific to that shard. · Transaction sharding (Zilliqa)Transaction sharding (Zilliqa) - The network is automatically split into “shards,” or parallel sub- committees. - Each of these shards will process its given micro-block - All micro-blocks merge to create the final one.
  • 26. Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 26 Questions?Questions? Sadegh Dorri N.Sadegh Dorri N. dorri@modares.ac.ir http://www.modares.ac.ir/~dorri
  • 27. Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 27 ReferencesReferences · [ArchBook] X. Xu et al., “Varieties of Blockchains,” in Architecture for Blockchain Applications, Springer Nature Switzerland, 2019, Chapter 3, pp. 45-59. · [Princeton-Book] A. Narayanan, et al., Bitcoin and Cryptocurrency Technologies, Princeton University Press, Jul. 2016, Chapter 8. · [RD19] S. Rouhani and R. Deters, "Security, Performance, and Applications of Smart Contracts: A Systematic Survey," in IEEE Access, vol. 7, pp. 50759-50779, 2019. · [PoS] V. Buterin, “What Proof of Stake Is And Why It Matters,” Bitcoin Magazine, Aug. 2013, Link: https://bitcoinmagazine.com/articles/what-proof-of-stake-is-and-why-it-matters-1377531463/ · [DPoS] BitShares Blockchain Foundation, “Delegated Proof of Stake (DPOS),” BitShares Documentation, Aug. 2018, Link: http://docs.bitshares.org/en/master/technology/dpos.html GitHub:https://github.com/bitshares/how.bitshares.works/blob/master/docs/technology/dpos.rst · [NEM-PoI] NEM Technical Reference v1.2.1, Feb. 2018, Link: https://nem.io/wp-content/themes/nem/files/NEM_techRef.pdf · [PBFT] L. Seeley, “Introduction to Sawtooth PBFT,” Hyperledger Sawtooth Blog, Feb. 2019, Link: https://www.hyperledger.org/blog/2019/02/13/introduction-to-sawtooth-pbft
  • 28. Spring 2019 (1398) E-Commerce Security - Varieties of Blockchains 28 ReferencesReferences · [PoET] Intel Corporation, “PoET 1.0 Specification,” Hyperledger Sawtooth Documentation v1.0.5, Jul. 2017. Link: https://sawtooth.hyperledger.org/docs/core/releases/1.0/architecture/poet.html · [uPoW] M. Ball et al., “Proofs of Useful Work,” Cryptology ePrint Archive, Report 2017/203, Feb. 2017. Link: https://eprint.iacr.org/2017/203 · [PrimeCoin] V Buterin, “Primecoin: The Cryptocurrency Whose Mining is Actually Useful,” Bitcoin Magazine, Jul. 2013, Link: https://bitcoinmagazine.com/articles/primecoin-the-cryptocurrency-whose-mining-is-actually-useful -1373298534/ · B. Curran, “What is Sharding? Guide to this Ethereum Scaling Concept Explained,” Blockonomi Web Site, Mar. 2019, Link: https://blockonomi.com/sharding/ · [Blockbench] T. T. A. Dinh, J. Wang, G. Chen, R. Liu, B. C. Ooi, K.-L. Tan, "Blockbench: A framework for analyzing private blockchains", Proc. ACM Int. Conf. Manage. Data, pp. 1085-1100, May 2017. Link: https://github.com/ooibc88/blockbench · [Realtime-Perf] P. Zheng, Z. Zheng, X. Luo, X. Chen, X. Liu, "A detailed and real-time performance monitoring framework for blockchain systems", Proc. 40th Int. Conf. Softw. Eng. Softw. Eng. Pract., pp. 134-143, Jun. 2018.