SlideShare a Scribd company logo
THE BLOCKCHAIN BUSINESS CLOUD
ADVANCED BLOCKCHAIN TECHNOLOGIES
ON PRIVACY AND SCALABILITY
Jim Zhang, Co-founder, Head of Protocol Engineering
Kaleido, The Blockchain Business Cloud
Agenda
• What makes Jim from Kaleido qualified for this topic?
• Privacy
• Scalability
The Blockchain Business Cloud
Full Stack Blockchain Platform for Modern Business Networks
Business Networks Made Radically Simple For the Enterprise
Kaleido sits at the intersection of world’s largest
blockchain company and the world’s leading clouds
Largest cloud infrastructure provider
61 Availability Zones across 20 Regions,
Complimentary services
A leading pure-play blockchain company
Global consulting. Deep blockchain expertise
1,200+ specialists in 30+ countries
Early Pioneer of blockchain technology
100+ datacenters across 54 regions
Complimentary services
THE BLOCKCHAIN BUSINESS CLOUD
Blockchain Projects are
Accelerating into Production Status
on Kaleido
BLOCKCHAIN NETWORK
LEDGER & SMART CONTRACTS
OFF-CHAIN STACK
DECENTRALIZED TECH
APPLICATION
APPS & MIDDLEWARE
The chain is
of a complete
blockchain solution 5%
45%
50%
Typical projects have over 40 components
Modernizing Business Networks
Enterprise IntegrationCollaboration Services
Digital Assets Cryptography API Gateway
Data Feeds B2B Messaging Connectors
Off Chain On Chain Data BusData
Full Stack blockchain for the
modern business network
Middleware
App
Blockchain Network
Privacy Blockchain First EventsTransaction
Cross-Cloud:
One Chain, Many Clouds
Kaleido’s platform offers a single, seamless experience across
participants to build and manage blockchains running across
Microsoft Azure and AWS
Multi-Region:
Start Anywhere, Grow Anywhere
Start your consortium in any available cloud region and enable
members to join from their geography of choice.
Hybrid Deployment: Run Behind Your Own
Firewall
Deploy the Kaleido stack on your own on-premise node and
integrate seamlessly into broader business network.
Only Kaleido delivers multi-region, cross-cloud,
and hybrid deployments
On-prem
Private cloud
Org C: Kaleido Private Stack
Org A: AWS Org B: Azure
10x
the APIs
Shared IT
DevOps
Privacy
Defining “Privacy”
• Confidentiality
• Hiding the “what”
• Anonymity
• Hiding the “who”
Quick Refresher on Blockchain
• Foundational properties of a blockchain:
• Shared ledger
• Shared view of transactions order
• Trustless model
• Do not trust others’ records
• Independent validation of proposed blocks (order of transactions)
• Independent execution of transactions
• Consensus
• All copies of the ledger are guaranteed to be identical (fraudulent records are easy to
discover and dispute)
Privacy is inherently challenging in blockchain
• The most valuable property of blockchain is data immutability
• Which is achieved by having multiple parties maintain a shared ledger
• Transactions are independently executed by nodes while validating
blocks
• As a result, both transaction input and state are globally shared
throughout the network participants
• How can privacy be achieved in such an architectural context?
Technique #1: Data Isolation
• Only a subset of the network participants get the transaction input,
others do not know such transactions have happened
• States are inherently partitioned: there are many separate state trees
corresponding to private transactions
• It’s also important to have a reference of commitment in the global
shared ledger to ensure security of the private transactions (eg. For
dispute resolution when private parties do not agree with private
states)
• Examples: EEA Private Transactions (Quorum, Hyperledger Besu),
Hyperledger Fabric private data collections
Technique #2: Separate Blockchains
• Most enterprise use cases dictate permissioned blockchains, such
that data is not accessible to external parties
• Setting up different instances of permissioned blockchains, among
different groups of private transactions, to keep transactions private
• Overhead can be high, although with Hyperledger Fabric’s channel
design, single node can participate in multiple networks
• Can still be a costly pattern given the number of permutations
required to satisfy privacy among a large number of participants
Technique #3: Address Generation
• Only addresses anonymity
• Use a new address for every transaction, making it impossible to link
signing keys to real world identity
• Hides trading patterns
• Typically using key derivation from a master seed to avoid tracking a
large number of signing keys
• e.g BIP32 compliant Hierarchical Deterministic wallets
Technique #3: Trusted Compute
• The idea is that:
• Transaction inputs are hidden,
• but the processing logic is public,
• such that the computations involved in the state transfer can be performed
only by the transaction participants
• but others can be convinced that the computations are done
correctly/honestly
• “I may not know what you did, but I know you did it
honestly/correctly”
Different types of Trusted Compute
• Zero Knowledge Proof (ZKP)
• Using advanced cryptography, present a proof that only the transaction
submitter can generate, and ask all participants to verify for correctness
• Trusted Execution Environment (TEE)
• Execute the transaction on a special hardware based environment, and be
assured the code involved match expected processing logic
Zero Knowledge Proof
• A cryptographic protocol
• Actors: prover, verifier
• Goal: prover to convince the verifier of the possession of knowledge
X, without disclosing what X is
ZKP – An illustrative explanation
• Alice to Prove: Knowledge of a Sudoku puzzle solution
Prover Verifier
ZKP – An illustrative explanation
• Step 1: Alice to permute the solution by using different numbers, 1-
>5, 2-> 7, 3->2, etc.
Prover Verifier
ZKP – An illustrative explanation
• Step 1: mask the solution, called a “commitment”
Prover Verifier
commitment
ZKP – An illustrative explanation
• Step 2: present the commitment to Bob
commitment
Prover Verifier
ZKP – An illustrative explanation
• Step 3: Bob randomly picks a unit (row, column or 3x3 square) and asks
Alice to reveal the (permuted) solution; Bob verifies for correctness
Prover Verifier
ZKP – An illustrative explanation
• Step 4: Alice permutes the solution again to get a different set of
numbers (still mapped from the original solution)
Prover Verifier
ZKP – An illustrative explanation
• Step 5: Bob randomly picks another unit and asks Alice to reveal the
(permuted) solution again
Prover Verifier
ZKP – An illustrative explanation
• After enough rounds, Bob is convinced that Alice must know the
correct answer to be able to nail each requested unit, randomly
decided by the verifier
• Zero Knowledge Proof is a probabilistic proof
Prover Verifier
ZKP – cryptographic components*
• Secure hashing (to produce commitments)
• Homomorphic encryption (to hide verifier’s challenge)
• Cryptographic pairing (to make the protocol non-interactive and
operate on encrypted public parameters from trusted setup)
* Based on zkSNARKs protocol
ZKP – comparing protocols
Proof
Verification
Time
Proof Size Utility Trusted Setup
zkSNARKs Short Constant (228 bytes for 128bit
security)
General purpose Needed
Bulletproof Long Logarithmic to complexity of the
arithmetic circuits
Numeric operations,
Range proofs
Not needed
zkSTARKs General purpose Not needed
Trusted Execution Environment
• Hardware based secure enclave where code and data are protected
against malicious access, even if attacker gained admin privilege
• Both confidentiality (can not steal what’s inside the enclave) and
integrity (can be ensured the right code is executed) are protected
• Provides remote attestation on the code and data inside the enclave
• Examples:
• Intel SGX (Software Guard Extension)
• IBM SSC (Secure Service Container)
• ARM TrustZone
TEE - How It Works and Why It Matters
• “Enclaves” are special regions of memory that is only accessible to
CPUs, not even system administrator can see what’s inside
• “Attestation” is equivalent to a proof in ZKP, that can convince a
verifier of correct computation
• Therefore, using TEE to process transactions and sending either the
encrypted result or hash to the blockchain, guarantees confidentiality
Enterprise Ethereum Alliance Trusted Token Dapp
– A Reference Implementation of Hyperledger
Avalon
Admin Scope
TEE
Listener
Registered WorkerUser Scope Blockchain
SGX VM Cluster
JWT
Secret
Provision
Transaction
Data
Storage
Encrypted
Tx Requests
SMS
TEE
App
Intel SGX Enclave
Kaleido Offers Wide Range of Privacy Features
• Data Isolation
• Kaleido supports EEA Compliant Private Transactions via Quorum, Hyperledger Besu
• Separate blockchains
• streamlined onboarding, same Kaleido attested organizational identifies can be re-used in many
instances of blockchains
• Address generation
• BIP32 compliant HD Wallet in Kaleido marketplace
• Zero Knowledge Proof
• Zero Knowledge Token Transfer service in Kaleido marketplace; QEDIT as a partner service
• Trusted Execution Environment
• Kaleido is a founding member of Hyperledger Avalon, the latest project to utilize trusted
compute in blockchains
Scalability
Blockchain’s Scalability Trilemma
• Vitalik Buterin:
Security
Scalability Decentralization
Decentralization in Enterprise Blockchains
• Unlike public blockchains, enterprise blockchains are almost always
built with permissioned networks, where all identities are known to
be linked to real world entities
• This gives consortiums legal tools that are not available to public
blockchains
• As such, decentralization in enterprise blockchains are not achieved
with massive number of nodes, but with competing real world
interests (thus making collusions costly)
Achieving Scalability
• Increased block size
• More efficient consensus algorithms, instead of PoW, use:
• Crash fault tolerance – Raft, Kafka (zookeeper)
• Byzantine fault tolerance – IBFT, Tendermint
• Off-chain (“layer-2”) transactions
• state channels
• Trusted Execution Environment
• Sharding
• Split smart contracts and accounts among instances of blockchains, and have
a single coordinating chain to ensure security (consensus)
• Eth2.0
Get Started With Kaleido Today
Thank You

More Related Content

What's hot

Enterprise Blockchain: Lessons from Global Innovators in Production (All Thin...
Enterprise Blockchain: Lessons from Global Innovators in Production (All Thin...Enterprise Blockchain: Lessons from Global Innovators in Production (All Thin...
Enterprise Blockchain: Lessons from Global Innovators in Production (All Thin...
Kaleido
 
Blockchain for Business
Blockchain for BusinessBlockchain for Business
Blockchain for Business
Ahmad Gohar
 
Blockchain Essentials and Blockchain on Azure
Blockchain Essentials and Blockchain on AzureBlockchain Essentials and Blockchain on Azure
Blockchain Essentials and Blockchain on Azure
Nuri Cankaya
 
How does hyperledger fabric blockchain work
How does hyperledger fabric blockchain work How does hyperledger fabric blockchain work
How does hyperledger fabric blockchain work
Blockchain Council
 
Blockchain FinTech PoC
Blockchain FinTech PoCBlockchain FinTech PoC
Blockchain FinTech PoC
Sanjeev Raman
 
Enterprise Blockchain: Lessons from Global Innovators in Production (All Thin...
Enterprise Blockchain: Lessons from Global Innovators in Production (All Thin...Enterprise Blockchain: Lessons from Global Innovators in Production (All Thin...
Enterprise Blockchain: Lessons from Global Innovators in Production (All Thin...
Peter Broadhurst
 
Enterprise Blockchain Application Development using Azure Blockchain Service
Enterprise Blockchain Application Development using Azure Blockchain ServiceEnterprise Blockchain Application Development using Azure Blockchain Service
Enterprise Blockchain Application Development using Azure Blockchain Service
Juarez Junior
 
Making blockchain real for business
Making blockchain real for businessMaking blockchain real for business
Making blockchain real for business
Medma Infomatix (P) Ltd.
 
The Emerging Role of ZKP in the Privacy Stack of Production Business Networks...
The Emerging Role of ZKP in thePrivacy Stack ofProduction Business Networks...The Emerging Role of ZKP in thePrivacy Stack ofProduction Business Networks...
The Emerging Role of ZKP in the Privacy Stack of Production Business Networks...
Peter Broadhurst
 
Introduction to Blockchain for Business
Introduction to Blockchain for BusinessIntroduction to Blockchain for Business
Introduction to Blockchain for Business
Fito Benitez
 
Blockchain on Azure
Blockchain on AzureBlockchain on Azure
Blockchain on Azure
Nuri Cankaya
 
What does it take to deploy large scale decentralized applications?
What does it take to deploy large scale decentralized applications?What does it take to deploy large scale decentralized applications?
What does it take to deploy large scale decentralized applications?
Peter Broadhurst
 
Building Blockchain Projects on Enterprise Ethereum [Webinar]
Building Blockchain Projects on Enterprise Ethereum [Webinar] Building Blockchain Projects on Enterprise Ethereum [Webinar]
Building Blockchain Projects on Enterprise Ethereum [Webinar]
Kaleido
 
The Microsoft vision for Blockchain
The Microsoft vision for BlockchainThe Microsoft vision for Blockchain
The Microsoft vision for Blockchain
ASPEX_BE
 
Microsoft blockchain vision - enterprise smart contracts, coco framework and...
Microsoft blockchain vision  - enterprise smart contracts, coco framework and...Microsoft blockchain vision  - enterprise smart contracts, coco framework and...
Microsoft blockchain vision - enterprise smart contracts, coco framework and...
Razi Rais
 
Introduction to Blockchain Business Models
Introduction to Blockchain Business ModelsIntroduction to Blockchain Business Models
Introduction to Blockchain Business Models
Gokul Alex
 
Distributed Intelligence
Distributed IntelligenceDistributed Intelligence
Distributed Intelligence
Nuri Cankaya
 
Gluecon 2016 Keynote: Deploying and Managing Blockchain Applications
Gluecon 2016 Keynote: Deploying and Managing Blockchain ApplicationsGluecon 2016 Keynote: Deploying and Managing Blockchain Applications
Gluecon 2016 Keynote: Deploying and Managing Blockchain Applications
Duncan Johnston-Watt
 
Hyperledger Sawtooth Lake Intel's OSS Contribution to Enterprise Blockchain
Hyperledger Sawtooth Lake Intel's OSS Contribution to Enterprise BlockchainHyperledger Sawtooth Lake Intel's OSS Contribution to Enterprise Blockchain
Hyperledger Sawtooth Lake Intel's OSS Contribution to Enterprise Blockchain
Altoros
 
Microsoft Accelerator event- Blockchain technology from disruptive concept to...
Microsoft Accelerator event- Blockchain technology from disruptive concept to...Microsoft Accelerator event- Blockchain technology from disruptive concept to...
Microsoft Accelerator event- Blockchain technology from disruptive concept to...
Hila Bar
 

What's hot (20)

Enterprise Blockchain: Lessons from Global Innovators in Production (All Thin...
Enterprise Blockchain: Lessons from Global Innovators in Production (All Thin...Enterprise Blockchain: Lessons from Global Innovators in Production (All Thin...
Enterprise Blockchain: Lessons from Global Innovators in Production (All Thin...
 
Blockchain for Business
Blockchain for BusinessBlockchain for Business
Blockchain for Business
 
Blockchain Essentials and Blockchain on Azure
Blockchain Essentials and Blockchain on AzureBlockchain Essentials and Blockchain on Azure
Blockchain Essentials and Blockchain on Azure
 
How does hyperledger fabric blockchain work
How does hyperledger fabric blockchain work How does hyperledger fabric blockchain work
How does hyperledger fabric blockchain work
 
Blockchain FinTech PoC
Blockchain FinTech PoCBlockchain FinTech PoC
Blockchain FinTech PoC
 
Enterprise Blockchain: Lessons from Global Innovators in Production (All Thin...
Enterprise Blockchain: Lessons from Global Innovators in Production (All Thin...Enterprise Blockchain: Lessons from Global Innovators in Production (All Thin...
Enterprise Blockchain: Lessons from Global Innovators in Production (All Thin...
 
Enterprise Blockchain Application Development using Azure Blockchain Service
Enterprise Blockchain Application Development using Azure Blockchain ServiceEnterprise Blockchain Application Development using Azure Blockchain Service
Enterprise Blockchain Application Development using Azure Blockchain Service
 
Making blockchain real for business
Making blockchain real for businessMaking blockchain real for business
Making blockchain real for business
 
The Emerging Role of ZKP in the Privacy Stack of Production Business Networks...
The Emerging Role of ZKP in thePrivacy Stack ofProduction Business Networks...The Emerging Role of ZKP in thePrivacy Stack ofProduction Business Networks...
The Emerging Role of ZKP in the Privacy Stack of Production Business Networks...
 
Introduction to Blockchain for Business
Introduction to Blockchain for BusinessIntroduction to Blockchain for Business
Introduction to Blockchain for Business
 
Blockchain on Azure
Blockchain on AzureBlockchain on Azure
Blockchain on Azure
 
What does it take to deploy large scale decentralized applications?
What does it take to deploy large scale decentralized applications?What does it take to deploy large scale decentralized applications?
What does it take to deploy large scale decentralized applications?
 
Building Blockchain Projects on Enterprise Ethereum [Webinar]
Building Blockchain Projects on Enterprise Ethereum [Webinar] Building Blockchain Projects on Enterprise Ethereum [Webinar]
Building Blockchain Projects on Enterprise Ethereum [Webinar]
 
The Microsoft vision for Blockchain
The Microsoft vision for BlockchainThe Microsoft vision for Blockchain
The Microsoft vision for Blockchain
 
Microsoft blockchain vision - enterprise smart contracts, coco framework and...
Microsoft blockchain vision  - enterprise smart contracts, coco framework and...Microsoft blockchain vision  - enterprise smart contracts, coco framework and...
Microsoft blockchain vision - enterprise smart contracts, coco framework and...
 
Introduction to Blockchain Business Models
Introduction to Blockchain Business ModelsIntroduction to Blockchain Business Models
Introduction to Blockchain Business Models
 
Distributed Intelligence
Distributed IntelligenceDistributed Intelligence
Distributed Intelligence
 
Gluecon 2016 Keynote: Deploying and Managing Blockchain Applications
Gluecon 2016 Keynote: Deploying and Managing Blockchain ApplicationsGluecon 2016 Keynote: Deploying and Managing Blockchain Applications
Gluecon 2016 Keynote: Deploying and Managing Blockchain Applications
 
Hyperledger Sawtooth Lake Intel's OSS Contribution to Enterprise Blockchain
Hyperledger Sawtooth Lake Intel's OSS Contribution to Enterprise BlockchainHyperledger Sawtooth Lake Intel's OSS Contribution to Enterprise Blockchain
Hyperledger Sawtooth Lake Intel's OSS Contribution to Enterprise Blockchain
 
Microsoft Accelerator event- Blockchain technology from disruptive concept to...
Microsoft Accelerator event- Blockchain technology from disruptive concept to...Microsoft Accelerator event- Blockchain technology from disruptive concept to...
Microsoft Accelerator event- Blockchain technology from disruptive concept to...
 

Similar to Advanced Blockchain Technologies on Privacy & Scalability (All Things Open)

Advanced Blockchain Technologies on Privacy and Scalability
Advanced Blockchain Technologies on Privacy and ScalabilityAdvanced Blockchain Technologies on Privacy and Scalability
Advanced Blockchain Technologies on Privacy and Scalability
All Things Open
 
BlockchainConf.tech - Hyperledger overview
BlockchainConf.tech - Hyperledger overviewBlockchainConf.tech - Hyperledger overview
BlockchainConf.tech - Hyperledger overview
Pad Kankipati
 
Block chain
Block chainBlock chain
Block chain
TejashBansal2
 
Block chain fundamentals and hyperledger
Block chain fundamentals and hyperledgerBlock chain fundamentals and hyperledger
Block chain fundamentals and hyperledger
sendhilkumarks
 
BlockChain-1.pptx
BlockChain-1.pptxBlockChain-1.pptx
BlockChain-1.pptx
HussainPashaShaik1
 
A Breathless Tour of Blockchain
A Breathless Tour of BlockchainA Breathless Tour of Blockchain
A Breathless Tour of Blockchain
Eoin Woods
 
BlockChain-1.pptx
BlockChain-1.pptxBlockChain-1.pptx
BlockChain-1.pptx
BiswaranjanSwain19
 
Blockchain (1).pptx
Blockchain (1).pptxBlockchain (1).pptx
Blockchain (1).pptx
MeetPBarasara
 
Block chains and crypto currencies - introduction
Block chains and crypto currencies - introductionBlock chains and crypto currencies - introduction
Block chains and crypto currencies - introduction
Initio
 
Blockchain target-share
Blockchain target-shareBlockchain target-share
Blockchain target-share
joelcrabb
 
Introduction to Blockchain Governance Models
Introduction to Blockchain Governance ModelsIntroduction to Blockchain Governance Models
Introduction to Blockchain Governance Models
Gokul Alex
 
Blockchain Fundamental_KIPMI_2022.02.26.pdf
Blockchain Fundamental_KIPMI_2022.02.26.pdfBlockchain Fundamental_KIPMI_2022.02.26.pdf
Blockchain Fundamental_KIPMI_2022.02.26.pdf
adinugroho751867
 
Blockchain and BPM - Reflections on Four Years of Research and Applications
Blockchain and BPM - Reflections on Four Years of Research and ApplicationsBlockchain and BPM - Reflections on Four Years of Research and Applications
Blockchain and BPM - Reflections on Four Years of Research and Applications
Ingo Weber
 
Blockchain in the enterprise
Blockchain in the enterpriseBlockchain in the enterprise
Blockchain in the enterprise
Jesus Rodriguez
 
Blockchain a-new-disruption-in-financial-servies - IBM
Blockchain a-new-disruption-in-financial-servies - IBMBlockchain a-new-disruption-in-financial-servies - IBM
Blockchain a-new-disruption-in-financial-servies - IBM
Diego Alberto Tamayo
 
Blockchain a-new-disruption-in-financial-servies by ibm
Blockchain a-new-disruption-in-financial-servies by ibm Blockchain a-new-disruption-in-financial-servies by ibm
Blockchain a-new-disruption-in-financial-servies by ibm
Diego Alberto Tamayo
 
Blockchain a-new-disruption-in-financial-services - IBM
Blockchain a-new-disruption-in-financial-services - IBMBlockchain a-new-disruption-in-financial-services - IBM
Blockchain a-new-disruption-in-financial-services - IBM
Diego Alberto Tamayo
 
Blockchain Application Design and Development, and the Case of Programmable M...
Blockchain Application Design and Development, and the Case of Programmable M...Blockchain Application Design and Development, and the Case of Programmable M...
Blockchain Application Design and Development, and the Case of Programmable M...
Ingo Weber
 
Blockchain on the oracle cloud, the next big thing
Blockchain on the oracle cloud, the next big thingBlockchain on the oracle cloud, the next big thing
Blockchain on the oracle cloud, the next big thing
Robert van Mölken
 
SITIST 2018 Part 1 - Blockchain and Enterprise Use Cases
SITIST 2018 Part 1 - Blockchain and Enterprise Use CasesSITIST 2018 Part 1 - Blockchain and Enterprise Use Cases
SITIST 2018 Part 1 - Blockchain and Enterprise Use Cases
sitist
 

Similar to Advanced Blockchain Technologies on Privacy & Scalability (All Things Open) (20)

Advanced Blockchain Technologies on Privacy and Scalability
Advanced Blockchain Technologies on Privacy and ScalabilityAdvanced Blockchain Technologies on Privacy and Scalability
Advanced Blockchain Technologies on Privacy and Scalability
 
BlockchainConf.tech - Hyperledger overview
BlockchainConf.tech - Hyperledger overviewBlockchainConf.tech - Hyperledger overview
BlockchainConf.tech - Hyperledger overview
 
Block chain
Block chainBlock chain
Block chain
 
Block chain fundamentals and hyperledger
Block chain fundamentals and hyperledgerBlock chain fundamentals and hyperledger
Block chain fundamentals and hyperledger
 
BlockChain-1.pptx
BlockChain-1.pptxBlockChain-1.pptx
BlockChain-1.pptx
 
A Breathless Tour of Blockchain
A Breathless Tour of BlockchainA Breathless Tour of Blockchain
A Breathless Tour of Blockchain
 
BlockChain-1.pptx
BlockChain-1.pptxBlockChain-1.pptx
BlockChain-1.pptx
 
Blockchain (1).pptx
Blockchain (1).pptxBlockchain (1).pptx
Blockchain (1).pptx
 
Block chains and crypto currencies - introduction
Block chains and crypto currencies - introductionBlock chains and crypto currencies - introduction
Block chains and crypto currencies - introduction
 
Blockchain target-share
Blockchain target-shareBlockchain target-share
Blockchain target-share
 
Introduction to Blockchain Governance Models
Introduction to Blockchain Governance ModelsIntroduction to Blockchain Governance Models
Introduction to Blockchain Governance Models
 
Blockchain Fundamental_KIPMI_2022.02.26.pdf
Blockchain Fundamental_KIPMI_2022.02.26.pdfBlockchain Fundamental_KIPMI_2022.02.26.pdf
Blockchain Fundamental_KIPMI_2022.02.26.pdf
 
Blockchain and BPM - Reflections on Four Years of Research and Applications
Blockchain and BPM - Reflections on Four Years of Research and ApplicationsBlockchain and BPM - Reflections on Four Years of Research and Applications
Blockchain and BPM - Reflections on Four Years of Research and Applications
 
Blockchain in the enterprise
Blockchain in the enterpriseBlockchain in the enterprise
Blockchain in the enterprise
 
Blockchain a-new-disruption-in-financial-servies - IBM
Blockchain a-new-disruption-in-financial-servies - IBMBlockchain a-new-disruption-in-financial-servies - IBM
Blockchain a-new-disruption-in-financial-servies - IBM
 
Blockchain a-new-disruption-in-financial-servies by ibm
Blockchain a-new-disruption-in-financial-servies by ibm Blockchain a-new-disruption-in-financial-servies by ibm
Blockchain a-new-disruption-in-financial-servies by ibm
 
Blockchain a-new-disruption-in-financial-services - IBM
Blockchain a-new-disruption-in-financial-services - IBMBlockchain a-new-disruption-in-financial-services - IBM
Blockchain a-new-disruption-in-financial-services - IBM
 
Blockchain Application Design and Development, and the Case of Programmable M...
Blockchain Application Design and Development, and the Case of Programmable M...Blockchain Application Design and Development, and the Case of Programmable M...
Blockchain Application Design and Development, and the Case of Programmable M...
 
Blockchain on the oracle cloud, the next big thing
Blockchain on the oracle cloud, the next big thingBlockchain on the oracle cloud, the next big thing
Blockchain on the oracle cloud, the next big thing
 
SITIST 2018 Part 1 - Blockchain and Enterprise Use Cases
SITIST 2018 Part 1 - Blockchain and Enterprise Use CasesSITIST 2018 Part 1 - Blockchain and Enterprise Use Cases
SITIST 2018 Part 1 - Blockchain and Enterprise Use Cases
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 

Advanced Blockchain Technologies on Privacy & Scalability (All Things Open)

  • 1. THE BLOCKCHAIN BUSINESS CLOUD ADVANCED BLOCKCHAIN TECHNOLOGIES ON PRIVACY AND SCALABILITY Jim Zhang, Co-founder, Head of Protocol Engineering Kaleido, The Blockchain Business Cloud
  • 2. Agenda • What makes Jim from Kaleido qualified for this topic? • Privacy • Scalability
  • 3. The Blockchain Business Cloud Full Stack Blockchain Platform for Modern Business Networks Business Networks Made Radically Simple For the Enterprise
  • 4. Kaleido sits at the intersection of world’s largest blockchain company and the world’s leading clouds Largest cloud infrastructure provider 61 Availability Zones across 20 Regions, Complimentary services A leading pure-play blockchain company Global consulting. Deep blockchain expertise 1,200+ specialists in 30+ countries Early Pioneer of blockchain technology 100+ datacenters across 54 regions Complimentary services THE BLOCKCHAIN BUSINESS CLOUD
  • 5. Blockchain Projects are Accelerating into Production Status on Kaleido
  • 6. BLOCKCHAIN NETWORK LEDGER & SMART CONTRACTS OFF-CHAIN STACK DECENTRALIZED TECH APPLICATION APPS & MIDDLEWARE The chain is of a complete blockchain solution 5% 45% 50% Typical projects have over 40 components Modernizing Business Networks
  • 7. Enterprise IntegrationCollaboration Services Digital Assets Cryptography API Gateway Data Feeds B2B Messaging Connectors Off Chain On Chain Data BusData Full Stack blockchain for the modern business network Middleware App Blockchain Network Privacy Blockchain First EventsTransaction
  • 8. Cross-Cloud: One Chain, Many Clouds Kaleido’s platform offers a single, seamless experience across participants to build and manage blockchains running across Microsoft Azure and AWS Multi-Region: Start Anywhere, Grow Anywhere Start your consortium in any available cloud region and enable members to join from their geography of choice. Hybrid Deployment: Run Behind Your Own Firewall Deploy the Kaleido stack on your own on-premise node and integrate seamlessly into broader business network. Only Kaleido delivers multi-region, cross-cloud, and hybrid deployments On-prem Private cloud Org C: Kaleido Private Stack Org A: AWS Org B: Azure
  • 11. Defining “Privacy” • Confidentiality • Hiding the “what” • Anonymity • Hiding the “who”
  • 12. Quick Refresher on Blockchain • Foundational properties of a blockchain: • Shared ledger • Shared view of transactions order • Trustless model • Do not trust others’ records • Independent validation of proposed blocks (order of transactions) • Independent execution of transactions • Consensus • All copies of the ledger are guaranteed to be identical (fraudulent records are easy to discover and dispute)
  • 13. Privacy is inherently challenging in blockchain • The most valuable property of blockchain is data immutability • Which is achieved by having multiple parties maintain a shared ledger • Transactions are independently executed by nodes while validating blocks • As a result, both transaction input and state are globally shared throughout the network participants • How can privacy be achieved in such an architectural context?
  • 14. Technique #1: Data Isolation • Only a subset of the network participants get the transaction input, others do not know such transactions have happened • States are inherently partitioned: there are many separate state trees corresponding to private transactions • It’s also important to have a reference of commitment in the global shared ledger to ensure security of the private transactions (eg. For dispute resolution when private parties do not agree with private states) • Examples: EEA Private Transactions (Quorum, Hyperledger Besu), Hyperledger Fabric private data collections
  • 15. Technique #2: Separate Blockchains • Most enterprise use cases dictate permissioned blockchains, such that data is not accessible to external parties • Setting up different instances of permissioned blockchains, among different groups of private transactions, to keep transactions private • Overhead can be high, although with Hyperledger Fabric’s channel design, single node can participate in multiple networks • Can still be a costly pattern given the number of permutations required to satisfy privacy among a large number of participants
  • 16. Technique #3: Address Generation • Only addresses anonymity • Use a new address for every transaction, making it impossible to link signing keys to real world identity • Hides trading patterns • Typically using key derivation from a master seed to avoid tracking a large number of signing keys • e.g BIP32 compliant Hierarchical Deterministic wallets
  • 17. Technique #3: Trusted Compute • The idea is that: • Transaction inputs are hidden, • but the processing logic is public, • such that the computations involved in the state transfer can be performed only by the transaction participants • but others can be convinced that the computations are done correctly/honestly • “I may not know what you did, but I know you did it honestly/correctly”
  • 18. Different types of Trusted Compute • Zero Knowledge Proof (ZKP) • Using advanced cryptography, present a proof that only the transaction submitter can generate, and ask all participants to verify for correctness • Trusted Execution Environment (TEE) • Execute the transaction on a special hardware based environment, and be assured the code involved match expected processing logic
  • 19. Zero Knowledge Proof • A cryptographic protocol • Actors: prover, verifier • Goal: prover to convince the verifier of the possession of knowledge X, without disclosing what X is
  • 20. ZKP – An illustrative explanation • Alice to Prove: Knowledge of a Sudoku puzzle solution Prover Verifier
  • 21. ZKP – An illustrative explanation • Step 1: Alice to permute the solution by using different numbers, 1- >5, 2-> 7, 3->2, etc. Prover Verifier
  • 22. ZKP – An illustrative explanation • Step 1: mask the solution, called a “commitment” Prover Verifier commitment
  • 23. ZKP – An illustrative explanation • Step 2: present the commitment to Bob commitment Prover Verifier
  • 24. ZKP – An illustrative explanation • Step 3: Bob randomly picks a unit (row, column or 3x3 square) and asks Alice to reveal the (permuted) solution; Bob verifies for correctness Prover Verifier
  • 25. ZKP – An illustrative explanation • Step 4: Alice permutes the solution again to get a different set of numbers (still mapped from the original solution) Prover Verifier
  • 26. ZKP – An illustrative explanation • Step 5: Bob randomly picks another unit and asks Alice to reveal the (permuted) solution again Prover Verifier
  • 27. ZKP – An illustrative explanation • After enough rounds, Bob is convinced that Alice must know the correct answer to be able to nail each requested unit, randomly decided by the verifier • Zero Knowledge Proof is a probabilistic proof Prover Verifier
  • 28. ZKP – cryptographic components* • Secure hashing (to produce commitments) • Homomorphic encryption (to hide verifier’s challenge) • Cryptographic pairing (to make the protocol non-interactive and operate on encrypted public parameters from trusted setup) * Based on zkSNARKs protocol
  • 29. ZKP – comparing protocols Proof Verification Time Proof Size Utility Trusted Setup zkSNARKs Short Constant (228 bytes for 128bit security) General purpose Needed Bulletproof Long Logarithmic to complexity of the arithmetic circuits Numeric operations, Range proofs Not needed zkSTARKs General purpose Not needed
  • 30. Trusted Execution Environment • Hardware based secure enclave where code and data are protected against malicious access, even if attacker gained admin privilege • Both confidentiality (can not steal what’s inside the enclave) and integrity (can be ensured the right code is executed) are protected • Provides remote attestation on the code and data inside the enclave • Examples: • Intel SGX (Software Guard Extension) • IBM SSC (Secure Service Container) • ARM TrustZone
  • 31. TEE - How It Works and Why It Matters • “Enclaves” are special regions of memory that is only accessible to CPUs, not even system administrator can see what’s inside • “Attestation” is equivalent to a proof in ZKP, that can convince a verifier of correct computation • Therefore, using TEE to process transactions and sending either the encrypted result or hash to the blockchain, guarantees confidentiality
  • 32. Enterprise Ethereum Alliance Trusted Token Dapp – A Reference Implementation of Hyperledger Avalon Admin Scope TEE Listener Registered WorkerUser Scope Blockchain SGX VM Cluster JWT Secret Provision Transaction Data Storage Encrypted Tx Requests SMS TEE App Intel SGX Enclave
  • 33. Kaleido Offers Wide Range of Privacy Features • Data Isolation • Kaleido supports EEA Compliant Private Transactions via Quorum, Hyperledger Besu • Separate blockchains • streamlined onboarding, same Kaleido attested organizational identifies can be re-used in many instances of blockchains • Address generation • BIP32 compliant HD Wallet in Kaleido marketplace • Zero Knowledge Proof • Zero Knowledge Token Transfer service in Kaleido marketplace; QEDIT as a partner service • Trusted Execution Environment • Kaleido is a founding member of Hyperledger Avalon, the latest project to utilize trusted compute in blockchains
  • 35. Blockchain’s Scalability Trilemma • Vitalik Buterin: Security Scalability Decentralization
  • 36. Decentralization in Enterprise Blockchains • Unlike public blockchains, enterprise blockchains are almost always built with permissioned networks, where all identities are known to be linked to real world entities • This gives consortiums legal tools that are not available to public blockchains • As such, decentralization in enterprise blockchains are not achieved with massive number of nodes, but with competing real world interests (thus making collusions costly)
  • 37. Achieving Scalability • Increased block size • More efficient consensus algorithms, instead of PoW, use: • Crash fault tolerance – Raft, Kafka (zookeeper) • Byzantine fault tolerance – IBFT, Tendermint • Off-chain (“layer-2”) transactions • state channels • Trusted Execution Environment • Sharding • Split smart contracts and accounts among instances of blockchains, and have a single coordinating chain to ensure security (consensus) • Eth2.0
  • 38. Get Started With Kaleido Today