SlideShare a Scribd company logo
1
Can we safely adapt the construction of
permissionless blockchain to user demand?
Emmanuelle Anceaume (CNRS)
Joint work with
Antoine Durand (IRT SystemX), Romaric Ludinard
(IMT-Atlantique), Bruno Sericola (INRIA)
Journées Futur & Ruptures - January, 31st of January 2019
2
Bitcoin is a cryptocurrency and payment system
• Fully decentralized
• No public key infrastructure
• Permissionless
 Such constraints make the general problem of consensus
impossible to solve
• Relies on rational behavior and incentives mechanisms
 To reach a consensus on the cryptocurrency state
3
Deconstructing Bitcoin
Transactions
Nakamoto consensus algorithm
Communication network
4
The state of the cryptocurrency system is represented by transactions
• Transfers currency from one user to another
• Does not contain any encrypted information nor confidential
information
Transaction 20ab3701i
Transaction 74201ab3c
UTXO
UTXO = Unspent Transaction Output
Output #2
account + ฿ + script
Output #1
account + ฿ + script
Output #1
account + ฿ + script
Output #1
account + ฿ + script
Input #1
Output ref. + script
Transaction 1206ac34e
Output #2
account + ฿ + script
Output #3
account + ฿ + script
Output #1
account + ฿ + script
Input #1
Output ref. + script
Input #2
Output ref. + script
Input #1
Output ref. + script
Input #2
Output ref. + script
Do not forget Tx fees, i.e., ฿ input  ฿ output
UTXO
5
Checking the ownership of an account
• How can anyone check that I am the legitimate owner of an
account since there are no identities in a transaction ?
• Using « public keys as identities » principle 1
• Ownership = knowing a private key that redeems an output
Account / address / UTXO = « single use » object
• debited once
• should be credited once
1. D. Chaum, « Untraceable Electronic Mail, Return Addresses, and Digital
Pseudonums », Communications of the ACM 24(2), pp :84–90,1981
6
 Signed transactions guarantee that only the owner of an
output can spend bitcoins
 However signatures do not prevent double-spending attacks
• I.e., the fact that Alice spends an output twice
A publicly, immutable, and totally ordered sequence of transactions
7
2. Nakamoto Consensus protocol : Adversary model 2
The Computational Threshold Adversary (CTA) model
• The adversary controls a minority of the total amount of
computational power
• The CTA model is also called the permissionless model
• There is no membership protocol
• Incorporates some degree of synchrony
The Stake Threshold Adversary (STA) model
• The adversary controls a minority stake in some limited
resource, i.e., the crypto-currency
• May allow to punish malicious parties via some stake deposit
2. Ittai Abraham and Dahlia Malkhi, « The blockchain consensus layer and
BFT », The distributed Computing Column, 2017
8
2. Nakamoto Consensus protocol
Two ingredients : Leader Election Oracle + Heavier Fork Strategy
1 A leader election oracle by relying on the PoW mechanism
• Each party is elected independently
• The probability of electing each party is proportional to its
relative computational power
• Each party commits to a single block
→ Synchronize the creation of blocks
→ Prevent Sybil attacks
→ Incentivize correct behavior through currency creation
9
2. Nakamoto Consensus protocol
Two ingredients : Leader Election Oracle + Heavier Fork Strategy
2 The simple and local Heavier Fork Strategy
• Select the chain which required the greatest among of work
• Random nature of the PoW + Non-faulty leaders always use
the chain which required the greatest among of work
→ One chain will be extended more than the others
→ The blockchain
B0 Bi
Bi+1
Bi+1
10
2. Nakamoto Consensus protocol
The goal of the Consensus Nakamoto protocol is to implement a
blockchain replication protocol 3
• (Uniqueness) There is a unique chain of blocks (i.e., the
blockchain) extracted from the tree
• (Liveness) The blockchain is constantly growing
• (Safety) The deeper a block is buried in the blockchain the
harder it is to abort it
• (Fairness) The proportion of blocks of non-faulty parties in the
blockchain is proportional to their computation power
3. J. Garay and A. Kiayias, The Bitcoin Backbone Protocol : Analysis and
Application, Eurocrypt 2015
11
3. Peer-to-Peer Network
• Topology formed through a randomized process
• No coordinating entity
• Broadcast is based on flooding/gossiping neighbors’ link
Tx d	-	e
Tx a	-	B
Tx a	-	B Tx a	-	B
Tx a	-	B
Tx a	-	B
Tx a	-	B
Tx a	-	B
Tx a	-	B
Tx a	-	B
Tx a	-	B
Tx d	-	e
Tx d	-	e
Tx d	-	e
Tx d	-	e
Tx d	-	e
Tx a	-	B
Tx d	-	e
Tx d	-	e
Tx a	-	B
Tx a	-	B
Tx d	-	e
12
Required properties
1. Connectivity
• Each node should receive any broadcast information
2. Low latency 4
msg. transmission time
block time interval
1
 Allows to keep the probability of fork small (i.e. 10−3)
 PoW mechanism allows this ratio to continuously hold
 Safety requires to wait one hour (i.e., no instant finality)
 No more than 7 trans/s can be permanently confirmed in
average ! !
4. J. Garay and A. Kiayias, The Bitcoin Backbone Protocol : Analysis and
Application, Eurocrypt 2015
13
Electing a leader in a permissionless setting
• Proof-of-work
 Works in practice and this is true since 2009
 Security analysis
 Environmental issues
 Diminishing returns
 Distinction between miners and crypto-currency holders (i.e.,
miners control what is inside blocks)
• Proof-of-work with useful computation, proof-of-space,
proof-of-storage, . . .
 Physical resources
• Proof-of-stake
 Abstract but limited resource : coin itself
 All the required information is already in the blockchain
 Numerous attacks
14
Proof-of-stake approaches
Proof-of-stake motto : « The probability for party p of winning the
leader election is proportional to the fraction of currency p owns »
• Eventual-consensus
• Protocols that apply some form of longest-chain rule to the
blockchain
• Immutability of a block increases gradually
• e.g. PPcoin, NXT, Ouroboros, . . .
• Blockwise-BA
• Immutability of a block is achieved by BA before working on
the next one
• e.g. Algorand
15
Proof-of-stake approaches
PoS approaches are subject to attacks 5 essentially because it costs
nothing to create blocks and because of currency transfer from
transacting parties to the parties that maintain the ledger
• Checkpointing mechanisms
• Provide newcomers with a relatively recent block (trust issue)
• Prevent to adopt a new chain that originates to much in the
past (knowledge of the honest chain)
• Key-evolving cryptography : secret keys are evolving so that
past signatures cannot be forged (does not apply to UTXO
based model)
• Enforce strict chain density statistics (knowledge of the
number of parties at any time)
• Add context in each transaction (knowledge of the honest
chain)
5. P. Gazi, A. Kiayias, A. Russel, « Stake-Bleeding Attacks on Proof-of-Stake
Blockchains », IOHK
16
Preventing conflicts as soon as possible
1. Valid blocks should never be confronted with any other
conflicting blocks
→ No fork !
→ 0-confirmation delay
2. Valid transactions should never be confronted with any other
conflicting transactions
→ No double spending attacks !
→ Fast payments feasible
17
Preventing conflicts as soon as possible 6
1. Valid blocks should never be confronted with any other
conflicting blocks
How ? Agreement on the unique block that can reference an earlier
block in the blockchain
2. Valid transactions should never be confronted with any other
conflicting transactions
How ? Agreement on the unique transaction that can redeem unspent
transaction outputs (UTXOs)
6. Joint work with Antoine Durand (IRT SystemX), Romaric Ludinard (IMT),
Bruno Sericola (Inria)
E. Anceaume, A. Guellier, R. Ludinard, UTXO as a proof of membership for
Byzantine Agreements, IEEE Blockchain 2018.
18
Model
• Permissionless system
• Partially synchronous environment
• Adversary : no more than 1/3 of the total amount of money is
held by the adversary
• Nodes have access to safe cryptographic functions (hash
function and signature scheme)
• Each object of the system (i.e., UTXO, transaction and block)
is assumed to be uniquely identified
• No public key infrastructure to establish node identities
19
Properties
Most of the permissionless blockchain-based cryptosystems
guarantee that :
Property (Safety)
If a valid transaction T is deeply confirmed at some
non-compromised node then no transaction conflicting with T will
ever be deeply confirmed by any non-compromised nodes
Property (Liveness)
Any conflict-free and valid transaction will eventually be deeply
confirmed in the blockchain of all non-compromised nodes at the
same height in the blockchain
20
Properties
We aim at strengthening both properties
Property (Strong safety)
If a valid transaction T is confirmed at some non-compromised
node then no transaction conflicting with T will ever be confirmed
by any non-compromised nodes
Property (Strong liveness)
Any valid transaction will eventually be confirmed in the blockchain
of all non-compromised nodes at the same height in the blockchain
21
Transaction validation protocol
At most one transaction is allowed to use
all the UTXOs referenced in its input set
TRANSACTION	
WITH	BOB
VALID	??
YES	!
ALICE
22
Transaction validation protocol
At most one transaction is allowed to re-
deem all the UTXOs referenced in its input set
23
Transaction validation protocol
At most one transaction is allowed to re-
deem all the UTXOs referenced in its input set
TRANSACTION	
WITH	BOB
VALID	??
YES	!
ALICE	
TRANSACTION
WITH	EVE
VALID	??
NO!
24
Block validation protocol
Any validated block has at most one
valid block as immediate successor
VALID	??
YES	!
Pred=0001001
Block	0000111
25
Block validation protocol
Any validated block has at most one
valid block as immediate successor
VALID	??
YES	!
Pred=0001001
Block	0000111
Pred=0001001
Block	0000001
NO	!
VALID	??
26
A set of ingredients
1. Byzantine Agreement (BA)
• Primitive enabling a set of committee members to agree on a
single value, each member holding a possibly different initial
value.
• Tolerate the presence of a minority of malicious members
27
2. « Public keys as identities » principle
• Users, i.e. owners of accounts (owners of UTXOs), participate
to BA 7
• Alternative to existing designs
• Rely on the unique association UTXO/identity as a proof of
membership for BA
7. E. Anceaume, A. Guellier, R. Ludinard, UTXO as a proof of membership
for Byzantine Agreements, IEEE Blockchain 2018.
28
3. Clustered-based Distributed Hash Table (DHT)
• P2P overlay whose topology approximates a structured graph
• For resiliency reasons, each vertex of the graph is a set of
nodes
• Nodes logically close to each other belong to the same cluster
• e.g., PeerCube is a clustered-based overlay 8
resilient to
adversarial behavior and robust to high churn
8. E. Anceaume, R. Ludinard and B. Sericola. Performance evaluation of large-scale
dynamic systems. ACM Sigmetrics Performance Evaluation Review, 39(4), 2012.
29
3. Clustered-based Distributed Hash Table (DHT) (cont’d)
By reaching an agreement around the objects to be validated
• Resistance to Eclipse attacks
• IDs are random, ephemeral and verifiable
• Resistance to Sybil attacks
• Participation to committees is weighted by UTXOs amount
• Resistance to Selfish attacks
• Miners cannot create a block without disclosing it
• No double-spending
• No forks
30
Sycomore : from a chain of blocks to a DAG of blocks 9
9. E. Anceaume, A. Guellier, R. Ludinard, B. Sericola, Sycomore : a
Permissionless Distributed Ledger that self-adapts to Transactions Demand,
IEEE NCA, 2018
31
Sycomore : from a chain of blocks to a DAG of blocks
• Transactions are partitioned over the blocks of the ledger -
verifiable by anyone
32
Sycomore : from a chain of blocks to a DAG of blocks
• The number of blocks and their creation rate self-adapt to
transactions demand - verifiable by anyone
33
Sycomore : from a chain of blocks to a DAG of blocks
• The predecessor of a block is not predictable - verifiable by
anyone
34
0
100
200
300
400
500
600
1 5 10 15 20 25 30 35
Meaninter-blocktime(s)
c
1/(cλ0)
• With c = 30 leaf blocks,
a block is mined every
20s (7, 000 Tx/s) with a
proba of fork of 10−6
• Bitcoin : a block every 10
mns (7 Tx/s) with a
proba of fork of 10−3
• Could even go faster by
relying on our structured
DHT
Mean inter-block time as a function
of the number of leaf blocks c.
35
Collaborations and financial support
Current collaborations
• Local : R. Ludinard (IMT Atlantique), B. Sericola and Y.
Mocquard (Dionysos), F. Tronel (Cidre).
• National : A. Durand (IRT SystemX), M. Potop-Butucaru
(LIP6), A. Del Pozzo and S. Tucci (CEA)
• International : P. Tzigas (Chalmers Univ), L. Querzoni (La
Sapienza Univ),
Financial support
• PEPS INS2I Securite 2016 and 2017 : BIPs
• Labex Cominlabs 2019 : Blockchain FM
36
Collaborations and financial support
We are looking for students, engineers, researchers to join us in this
adventure to build a nice and secure infrastructure
Thanks for your attention

More Related Content

What's hot

Intro to Blockchain Slides
Intro to Blockchain SlidesIntro to Blockchain Slides
Intro to Blockchain Slides
Shannon Wells
 
Consensus Algorithms - Nakov at CryptoBlockCon - Las Vegas (2018)
Consensus Algorithms - Nakov at CryptoBlockCon - Las Vegas (2018)Consensus Algorithms - Nakov at CryptoBlockCon - Las Vegas (2018)
Consensus Algorithms - Nakov at CryptoBlockCon - Las Vegas (2018)
Svetlin Nakov
 
Overview of Blockchain Consensus Mechanisms
Overview of Blockchain Consensus MechanismsOverview of Blockchain Consensus Mechanisms
Overview of Blockchain Consensus Mechanisms
Johannes Ahlmann
 
Blockchain Corporate Style
Blockchain Corporate StyleBlockchain Corporate Style
Blockchain Corporate Style
Narendranath Reddy
 
Blockchain consensus algorithms
Blockchain consensus algorithmsBlockchain consensus algorithms
Blockchain consensus algorithms
Anurag Dashputre
 
Proof-of-Stake & Its Improvements (San Francisco Bitcoin Devs Hackathon)
Proof-of-Stake & Its Improvements (San Francisco Bitcoin Devs Hackathon)Proof-of-Stake & Its Improvements (San Francisco Bitcoin Devs Hackathon)
Proof-of-Stake & Its Improvements (San Francisco Bitcoin Devs Hackathon)
Alex Chepurnoy
 
Vilnius blockchain club 20170413 consensus
Vilnius blockchain club 20170413 consensusVilnius blockchain club 20170413 consensus
Vilnius blockchain club 20170413 consensus
Audrius Ramoska
 
The Lightning Network - A gentle introduction
The Lightning Network - A gentle introductionThe Lightning Network - A gentle introduction
The Lightning Network - A gentle introduction
Roland Stadler
 
Consensus Algorithms - Nakov @ jProfessionals - Jan 2018
Consensus Algorithms - Nakov @ jProfessionals - Jan 2018Consensus Algorithms - Nakov @ jProfessionals - Jan 2018
Consensus Algorithms - Nakov @ jProfessionals - Jan 2018
Svetlin Nakov
 
Bitcoin, Blockchain and the Crypto Contracts - Part 2
Bitcoin, Blockchain and the Crypto Contracts - Part 2Bitcoin, Blockchain and the Crypto Contracts - Part 2
Bitcoin, Blockchain and the Crypto Contracts - Part 2
Prithwis Mukerjee
 
Bitcoin, Blockchain and Crypto Contracts - Part 3
Bitcoin, Blockchain and Crypto Contracts - Part 3Bitcoin, Blockchain and Crypto Contracts - Part 3
Bitcoin, Blockchain and Crypto Contracts - Part 3
Prithwis Mukerjee
 
The Bitcoin Lightning Network
The Bitcoin Lightning NetworkThe Bitcoin Lightning Network
The Bitcoin Lightning Network
Shun Shiku
 
How to Create AltCoin(Alternative Cryptocurrency)?
How to Create AltCoin(Alternative Cryptocurrency)?How to Create AltCoin(Alternative Cryptocurrency)?
How to Create AltCoin(Alternative Cryptocurrency)?
Abdullah Khan Zehady
 
Best practices to build secure smart contracts
Best practices to build secure smart contractsBest practices to build secure smart contracts
Best practices to build secure smart contracts
Gautam Anand
 
Getting started with quorum -101
Getting started with quorum -101  Getting started with quorum -101
Getting started with quorum -101
Chainstack
 
Connecting The Block Cointelligence Academy by Dr Vince Ming
Connecting The Block   Cointelligence Academy by Dr Vince MingConnecting The Block   Cointelligence Academy by Dr Vince Ming
Connecting The Block Cointelligence Academy by Dr Vince Ming
Cointelligence
 
Bitcoin Lightning Network - Presentation
Bitcoin Lightning Network - Presentation Bitcoin Lightning Network - Presentation
Bitcoin Lightning Network - Presentation
Jim Brysland
 
bitcoin
bitcoinbitcoin
bitcoin
AasimRasheed3
 
Introduction to Ethereum
Introduction to EthereumIntroduction to Ethereum
Introduction to Ethereum
Terek Judi
 
Lightning Network
Lightning  NetworkLightning  Network
Lightning Network
Felix Crisan
 

What's hot (20)

Intro to Blockchain Slides
Intro to Blockchain SlidesIntro to Blockchain Slides
Intro to Blockchain Slides
 
Consensus Algorithms - Nakov at CryptoBlockCon - Las Vegas (2018)
Consensus Algorithms - Nakov at CryptoBlockCon - Las Vegas (2018)Consensus Algorithms - Nakov at CryptoBlockCon - Las Vegas (2018)
Consensus Algorithms - Nakov at CryptoBlockCon - Las Vegas (2018)
 
Overview of Blockchain Consensus Mechanisms
Overview of Blockchain Consensus MechanismsOverview of Blockchain Consensus Mechanisms
Overview of Blockchain Consensus Mechanisms
 
Blockchain Corporate Style
Blockchain Corporate StyleBlockchain Corporate Style
Blockchain Corporate Style
 
Blockchain consensus algorithms
Blockchain consensus algorithmsBlockchain consensus algorithms
Blockchain consensus algorithms
 
Proof-of-Stake & Its Improvements (San Francisco Bitcoin Devs Hackathon)
Proof-of-Stake & Its Improvements (San Francisco Bitcoin Devs Hackathon)Proof-of-Stake & Its Improvements (San Francisco Bitcoin Devs Hackathon)
Proof-of-Stake & Its Improvements (San Francisco Bitcoin Devs Hackathon)
 
Vilnius blockchain club 20170413 consensus
Vilnius blockchain club 20170413 consensusVilnius blockchain club 20170413 consensus
Vilnius blockchain club 20170413 consensus
 
The Lightning Network - A gentle introduction
The Lightning Network - A gentle introductionThe Lightning Network - A gentle introduction
The Lightning Network - A gentle introduction
 
Consensus Algorithms - Nakov @ jProfessionals - Jan 2018
Consensus Algorithms - Nakov @ jProfessionals - Jan 2018Consensus Algorithms - Nakov @ jProfessionals - Jan 2018
Consensus Algorithms - Nakov @ jProfessionals - Jan 2018
 
Bitcoin, Blockchain and the Crypto Contracts - Part 2
Bitcoin, Blockchain and the Crypto Contracts - Part 2Bitcoin, Blockchain and the Crypto Contracts - Part 2
Bitcoin, Blockchain and the Crypto Contracts - Part 2
 
Bitcoin, Blockchain and Crypto Contracts - Part 3
Bitcoin, Blockchain and Crypto Contracts - Part 3Bitcoin, Blockchain and Crypto Contracts - Part 3
Bitcoin, Blockchain and Crypto Contracts - Part 3
 
The Bitcoin Lightning Network
The Bitcoin Lightning NetworkThe Bitcoin Lightning Network
The Bitcoin Lightning Network
 
How to Create AltCoin(Alternative Cryptocurrency)?
How to Create AltCoin(Alternative Cryptocurrency)?How to Create AltCoin(Alternative Cryptocurrency)?
How to Create AltCoin(Alternative Cryptocurrency)?
 
Best practices to build secure smart contracts
Best practices to build secure smart contractsBest practices to build secure smart contracts
Best practices to build secure smart contracts
 
Getting started with quorum -101
Getting started with quorum -101  Getting started with quorum -101
Getting started with quorum -101
 
Connecting The Block Cointelligence Academy by Dr Vince Ming
Connecting The Block   Cointelligence Academy by Dr Vince MingConnecting The Block   Cointelligence Academy by Dr Vince Ming
Connecting The Block Cointelligence Academy by Dr Vince Ming
 
Bitcoin Lightning Network - Presentation
Bitcoin Lightning Network - Presentation Bitcoin Lightning Network - Presentation
Bitcoin Lightning Network - Presentation
 
bitcoin
bitcoinbitcoin
bitcoin
 
Introduction to Ethereum
Introduction to EthereumIntroduction to Ethereum
Introduction to Ethereum
 
Lightning Network
Lightning  NetworkLightning  Network
Lightning Network
 

Similar to Can we safely adapt the construction of permissionless blockchain to user demand ?

01 what is blockchain
01 what is blockchain01 what is blockchain
01 what is blockchain
BastianBlankenburg
 
Blockchain - Presentacion Betabeers Galicia 10/12/2014
Blockchain - Presentacion Betabeers Galicia 10/12/2014Blockchain - Presentacion Betabeers Galicia 10/12/2014
Blockchain - Presentacion Betabeers Galicia 10/12/2014
WeKCo Coworking
 
blockchain.pptx
blockchain.pptxblockchain.pptx
blockchain.pptx
19MEB302SahilAli
 
Indjic fintech module 6
Indjic fintech module 6Indjic fintech module 6
Indjic fintech module 6
Drago Indjic
 
Understanding Blockchain: Distributed Ledger Technology
Understanding Blockchain: Distributed Ledger TechnologyUnderstanding Blockchain: Distributed Ledger Technology
Understanding Blockchain: Distributed Ledger Technology
Suraj Kumar Jana
 
crypto ppt.ppt
crypto ppt.pptcrypto ppt.ppt
crypto ppt.ppt
SakshiRawat394090
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to Blockchain
subbul
 
BCHGraz - Meetup #8 - Intro & Ethereum
 BCHGraz - Meetup #8 - Intro & Ethereum BCHGraz - Meetup #8 - Intro & Ethereum
BCHGraz - Meetup #8 - Intro & Ethereum
BlockchainHub Graz
 
A Primer on Blockchain and its Potential, with a Focus on the GCC
A Primer on Blockchain and its Potential, with a Focus on the GCCA Primer on Blockchain and its Potential, with a Focus on the GCC
A Primer on Blockchain and its Potential, with a Focus on the GCC
Zeyad T. Al Mudhaf
 
Blockchain, DLT, Tokens and ICO Introduction Course
Blockchain, DLT, Tokens and ICO Introduction CourseBlockchain, DLT, Tokens and ICO Introduction Course
Blockchain, DLT, Tokens and ICO Introduction Course
Jean-Marc Seigneur
 
Ethereum Mining How To
Ethereum Mining How ToEthereum Mining How To
Ethereum Mining How To
Nugroho Gito
 
Blockchain Ecosystem and Cryptocurrency Regulations
Blockchain Ecosystem and Cryptocurrency RegulationsBlockchain Ecosystem and Cryptocurrency Regulations
Blockchain Ecosystem and Cryptocurrency Regulations
Amir Rafati
 
Blockchain, bitcoin, ethereum and ICOs
Blockchain, bitcoin, ethereum and ICOsBlockchain, bitcoin, ethereum and ICOs
Blockchain, bitcoin, ethereum and ICOs
Bogdan Fiedur
 
Understanding Blockchain
Understanding BlockchainUnderstanding Blockchain
Understanding Blockchain
Tony Willenberg
 
Bitcoin, Banking and the Blockchain
Bitcoin, Banking and the BlockchainBitcoin, Banking and the Blockchain
Bitcoin, Banking and the Blockchain
seancarmody
 
Blockchain and Cryptocurrency for Dummies
Blockchain and Cryptocurrency for DummiesBlockchain and Cryptocurrency for Dummies
Blockchain and Cryptocurrency for Dummies
Narudom Roongsiriwong, CISSP
 
Blockchain in the Heart of Digital Transformation
Blockchain in the Heart of Digital TransformationBlockchain in the Heart of Digital Transformation
Blockchain in the Heart of Digital Transformation
Dr. Mohamed Torky
 
Blockchains 101
Blockchains 101Blockchains 101
Blockchains 101
Nikhil Krishna Nair
 
Blockchain and Cryptocurrencies
Blockchain and CryptocurrenciesBlockchain and Cryptocurrencies
Blockchain and Cryptocurrencies
nimeshQ
 
blockchain bootcamp @WCNJ
blockchain bootcamp @WCNJblockchain bootcamp @WCNJ
blockchain bootcamp @WCNJ
Ash Yadav
 

Similar to Can we safely adapt the construction of permissionless blockchain to user demand ? (20)

01 what is blockchain
01 what is blockchain01 what is blockchain
01 what is blockchain
 
Blockchain - Presentacion Betabeers Galicia 10/12/2014
Blockchain - Presentacion Betabeers Galicia 10/12/2014Blockchain - Presentacion Betabeers Galicia 10/12/2014
Blockchain - Presentacion Betabeers Galicia 10/12/2014
 
blockchain.pptx
blockchain.pptxblockchain.pptx
blockchain.pptx
 
Indjic fintech module 6
Indjic fintech module 6Indjic fintech module 6
Indjic fintech module 6
 
Understanding Blockchain: Distributed Ledger Technology
Understanding Blockchain: Distributed Ledger TechnologyUnderstanding Blockchain: Distributed Ledger Technology
Understanding Blockchain: Distributed Ledger Technology
 
crypto ppt.ppt
crypto ppt.pptcrypto ppt.ppt
crypto ppt.ppt
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to Blockchain
 
BCHGraz - Meetup #8 - Intro & Ethereum
 BCHGraz - Meetup #8 - Intro & Ethereum BCHGraz - Meetup #8 - Intro & Ethereum
BCHGraz - Meetup #8 - Intro & Ethereum
 
A Primer on Blockchain and its Potential, with a Focus on the GCC
A Primer on Blockchain and its Potential, with a Focus on the GCCA Primer on Blockchain and its Potential, with a Focus on the GCC
A Primer on Blockchain and its Potential, with a Focus on the GCC
 
Blockchain, DLT, Tokens and ICO Introduction Course
Blockchain, DLT, Tokens and ICO Introduction CourseBlockchain, DLT, Tokens and ICO Introduction Course
Blockchain, DLT, Tokens and ICO Introduction Course
 
Ethereum Mining How To
Ethereum Mining How ToEthereum Mining How To
Ethereum Mining How To
 
Blockchain Ecosystem and Cryptocurrency Regulations
Blockchain Ecosystem and Cryptocurrency RegulationsBlockchain Ecosystem and Cryptocurrency Regulations
Blockchain Ecosystem and Cryptocurrency Regulations
 
Blockchain, bitcoin, ethereum and ICOs
Blockchain, bitcoin, ethereum and ICOsBlockchain, bitcoin, ethereum and ICOs
Blockchain, bitcoin, ethereum and ICOs
 
Understanding Blockchain
Understanding BlockchainUnderstanding Blockchain
Understanding Blockchain
 
Bitcoin, Banking and the Blockchain
Bitcoin, Banking and the BlockchainBitcoin, Banking and the Blockchain
Bitcoin, Banking and the Blockchain
 
Blockchain and Cryptocurrency for Dummies
Blockchain and Cryptocurrency for DummiesBlockchain and Cryptocurrency for Dummies
Blockchain and Cryptocurrency for Dummies
 
Blockchain in the Heart of Digital Transformation
Blockchain in the Heart of Digital TransformationBlockchain in the Heart of Digital Transformation
Blockchain in the Heart of Digital Transformation
 
Blockchains 101
Blockchains 101Blockchains 101
Blockchains 101
 
Blockchain and Cryptocurrencies
Blockchain and CryptocurrenciesBlockchain and Cryptocurrencies
Blockchain and Cryptocurrencies
 
blockchain bootcamp @WCNJ
blockchain bootcamp @WCNJblockchain bootcamp @WCNJ
blockchain bootcamp @WCNJ
 

More from I MT

Colloque Healthcare 4.0 : "Soufflez, c’est dépisté"
Colloque Healthcare 4.0 : "Soufflez, c’est dépisté" Colloque Healthcare 4.0 : "Soufflez, c’est dépisté"
Colloque Healthcare 4.0 : "Soufflez, c’est dépisté"
I MT
 
Colloque Healthcare 4.0 : "Accompagnement des troubles du sommeil : la recher...
Colloque Healthcare 4.0 : "Accompagnement des troubles du sommeil : la recher...Colloque Healthcare 4.0 : "Accompagnement des troubles du sommeil : la recher...
Colloque Healthcare 4.0 : "Accompagnement des troubles du sommeil : la recher...
I MT
 
Colloque Healthcare 4.0 : "HospiT'Win"
Colloque Healthcare 4.0 : "HospiT'Win"Colloque Healthcare 4.0 : "HospiT'Win"
Colloque Healthcare 4.0 : "HospiT'Win"
I MT
 
Colloque Healthcare 4.0 : « Vous ne devriez pas autant être sur les écrans ! »
Colloque Healthcare 4.0 : « Vous ne devriez pas autant être sur les écrans ! » Colloque Healthcare 4.0 : « Vous ne devriez pas autant être sur les écrans ! »
Colloque Healthcare 4.0 : « Vous ne devriez pas autant être sur les écrans ! »
I MT
 
Colloque Healthcare 4.0 : "NeuroLife : Interfaces Cerveau Machine pour la San...
Colloque Healthcare 4.0 : "NeuroLife : Interfaces Cerveau Machine pour la San...Colloque Healthcare 4.0 : "NeuroLife : Interfaces Cerveau Machine pour la San...
Colloque Healthcare 4.0 : "NeuroLife : Interfaces Cerveau Machine pour la San...
I MT
 
Colloque Healthcare 4.0 : "La protection de données en santé"
Colloque Healthcare 4.0 : "La protection de données en santé"Colloque Healthcare 4.0 : "La protection de données en santé"
Colloque Healthcare 4.0 : "La protection de données en santé"
I MT
 
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « EIT Health : un tremplin europ...
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « EIT Health : un tremplin europ...Colloque IMT - 15/10/2019 - Healthcare 4.0 – « EIT Health : un tremplin europ...
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « EIT Health : un tremplin europ...
I MT
 
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Modélisation semi-analytique ...
Colloque IMT - 15/10/2019 - Healthcare 4.0 –  « Modélisation semi-analytique ...Colloque IMT - 15/10/2019 - Healthcare 4.0 –  « Modélisation semi-analytique ...
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Modélisation semi-analytique ...
I MT
 
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Développement de la caméra XE...
Colloque IMT - 15/10/2019 - Healthcare 4.0 –  « Développement de la caméra XE...Colloque IMT - 15/10/2019 - Healthcare 4.0 –  « Développement de la caméra XE...
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Développement de la caméra XE...
I MT
 
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Le suivi géographique des per...
Colloque IMT - 15/10/2019 - Healthcare 4.0 –  « Le suivi géographique des per...Colloque IMT - 15/10/2019 - Healthcare 4.0 –  « Le suivi géographique des per...
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Le suivi géographique des per...
I MT
 
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Pilotage intelligent du servic...
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Pilotage intelligent du servic...Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Pilotage intelligent du servic...
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Pilotage intelligent du servic...
I MT
 
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Quantification of idiopathic i...
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Quantification of idiopathic i...Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Quantification of idiopathic i...
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Quantification of idiopathic i...
I MT
 
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - "Machine...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - "Machine...Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - "Machine...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - "Machine...
I MT
 
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Contrôle...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Contrôle...Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Contrôle...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Contrôle...
I MT
 
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Interopé...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Interopé...Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Interopé...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Interopé...
I MT
 
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Machine ...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Machine ...Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Machine ...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Machine ...
I MT
 
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - TeraLab,...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - TeraLab,...Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - TeraLab,...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - TeraLab,...
I MT
 
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Session ...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Session ...Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Session ...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Session ...
I MT
 
Colloque IMT - L'IA au cœur des mutations industrielles - Session Robotique, ...
Colloque IMT - L'IA au cœur des mutations industrielles - Session Robotique, ...Colloque IMT - L'IA au cœur des mutations industrielles - Session Robotique, ...
Colloque IMT - L'IA au cœur des mutations industrielles - Session Robotique, ...
I MT
 
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Focus CE...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Focus CE...Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Focus CE...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Focus CE...
I MT
 

More from I MT (20)

Colloque Healthcare 4.0 : "Soufflez, c’est dépisté"
Colloque Healthcare 4.0 : "Soufflez, c’est dépisté" Colloque Healthcare 4.0 : "Soufflez, c’est dépisté"
Colloque Healthcare 4.0 : "Soufflez, c’est dépisté"
 
Colloque Healthcare 4.0 : "Accompagnement des troubles du sommeil : la recher...
Colloque Healthcare 4.0 : "Accompagnement des troubles du sommeil : la recher...Colloque Healthcare 4.0 : "Accompagnement des troubles du sommeil : la recher...
Colloque Healthcare 4.0 : "Accompagnement des troubles du sommeil : la recher...
 
Colloque Healthcare 4.0 : "HospiT'Win"
Colloque Healthcare 4.0 : "HospiT'Win"Colloque Healthcare 4.0 : "HospiT'Win"
Colloque Healthcare 4.0 : "HospiT'Win"
 
Colloque Healthcare 4.0 : « Vous ne devriez pas autant être sur les écrans ! »
Colloque Healthcare 4.0 : « Vous ne devriez pas autant être sur les écrans ! » Colloque Healthcare 4.0 : « Vous ne devriez pas autant être sur les écrans ! »
Colloque Healthcare 4.0 : « Vous ne devriez pas autant être sur les écrans ! »
 
Colloque Healthcare 4.0 : "NeuroLife : Interfaces Cerveau Machine pour la San...
Colloque Healthcare 4.0 : "NeuroLife : Interfaces Cerveau Machine pour la San...Colloque Healthcare 4.0 : "NeuroLife : Interfaces Cerveau Machine pour la San...
Colloque Healthcare 4.0 : "NeuroLife : Interfaces Cerveau Machine pour la San...
 
Colloque Healthcare 4.0 : "La protection de données en santé"
Colloque Healthcare 4.0 : "La protection de données en santé"Colloque Healthcare 4.0 : "La protection de données en santé"
Colloque Healthcare 4.0 : "La protection de données en santé"
 
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « EIT Health : un tremplin europ...
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « EIT Health : un tremplin europ...Colloque IMT - 15/10/2019 - Healthcare 4.0 – « EIT Health : un tremplin europ...
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « EIT Health : un tremplin europ...
 
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Modélisation semi-analytique ...
Colloque IMT - 15/10/2019 - Healthcare 4.0 –  « Modélisation semi-analytique ...Colloque IMT - 15/10/2019 - Healthcare 4.0 –  « Modélisation semi-analytique ...
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Modélisation semi-analytique ...
 
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Développement de la caméra XE...
Colloque IMT - 15/10/2019 - Healthcare 4.0 –  « Développement de la caméra XE...Colloque IMT - 15/10/2019 - Healthcare 4.0 –  « Développement de la caméra XE...
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Développement de la caméra XE...
 
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Le suivi géographique des per...
Colloque IMT - 15/10/2019 - Healthcare 4.0 –  « Le suivi géographique des per...Colloque IMT - 15/10/2019 - Healthcare 4.0 –  « Le suivi géographique des per...
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Le suivi géographique des per...
 
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Pilotage intelligent du servic...
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Pilotage intelligent du servic...Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Pilotage intelligent du servic...
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Pilotage intelligent du servic...
 
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Quantification of idiopathic i...
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Quantification of idiopathic i...Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Quantification of idiopathic i...
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Quantification of idiopathic i...
 
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - "Machine...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - "Machine...Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - "Machine...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - "Machine...
 
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Contrôle...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Contrôle...Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Contrôle...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Contrôle...
 
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Interopé...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Interopé...Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Interopé...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Interopé...
 
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Machine ...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Machine ...Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Machine ...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Machine ...
 
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - TeraLab,...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - TeraLab,...Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - TeraLab,...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - TeraLab,...
 
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Session ...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Session ...Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Session ...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Session ...
 
Colloque IMT - L'IA au cœur des mutations industrielles - Session Robotique, ...
Colloque IMT - L'IA au cœur des mutations industrielles - Session Robotique, ...Colloque IMT - L'IA au cœur des mutations industrielles - Session Robotique, ...
Colloque IMT - L'IA au cœur des mutations industrielles - Session Robotique, ...
 
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Focus CE...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Focus CE...Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Focus CE...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Focus CE...
 

Recently uploaded

weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
Kamal Acharya
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 

Recently uploaded (20)

weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 

Can we safely adapt the construction of permissionless blockchain to user demand ?

  • 1. 1 Can we safely adapt the construction of permissionless blockchain to user demand? Emmanuelle Anceaume (CNRS) Joint work with Antoine Durand (IRT SystemX), Romaric Ludinard (IMT-Atlantique), Bruno Sericola (INRIA) Journées Futur & Ruptures - January, 31st of January 2019
  • 2. 2 Bitcoin is a cryptocurrency and payment system • Fully decentralized • No public key infrastructure • Permissionless Such constraints make the general problem of consensus impossible to solve • Relies on rational behavior and incentives mechanisms To reach a consensus on the cryptocurrency state
  • 4. 4 The state of the cryptocurrency system is represented by transactions • Transfers currency from one user to another • Does not contain any encrypted information nor confidential information Transaction 20ab3701i Transaction 74201ab3c UTXO UTXO = Unspent Transaction Output Output #2 account + ฿ + script Output #1 account + ฿ + script Output #1 account + ฿ + script Output #1 account + ฿ + script Input #1 Output ref. + script Transaction 1206ac34e Output #2 account + ฿ + script Output #3 account + ฿ + script Output #1 account + ฿ + script Input #1 Output ref. + script Input #2 Output ref. + script Input #1 Output ref. + script Input #2 Output ref. + script Do not forget Tx fees, i.e., ฿ input ฿ output UTXO
  • 5. 5 Checking the ownership of an account • How can anyone check that I am the legitimate owner of an account since there are no identities in a transaction ? • Using « public keys as identities » principle 1 • Ownership = knowing a private key that redeems an output Account / address / UTXO = « single use » object • debited once • should be credited once 1. D. Chaum, « Untraceable Electronic Mail, Return Addresses, and Digital Pseudonums », Communications of the ACM 24(2), pp :84–90,1981
  • 6. 6 Signed transactions guarantee that only the owner of an output can spend bitcoins However signatures do not prevent double-spending attacks • I.e., the fact that Alice spends an output twice A publicly, immutable, and totally ordered sequence of transactions
  • 7. 7 2. Nakamoto Consensus protocol : Adversary model 2 The Computational Threshold Adversary (CTA) model • The adversary controls a minority of the total amount of computational power • The CTA model is also called the permissionless model • There is no membership protocol • Incorporates some degree of synchrony The Stake Threshold Adversary (STA) model • The adversary controls a minority stake in some limited resource, i.e., the crypto-currency • May allow to punish malicious parties via some stake deposit 2. Ittai Abraham and Dahlia Malkhi, « The blockchain consensus layer and BFT », The distributed Computing Column, 2017
  • 8. 8 2. Nakamoto Consensus protocol Two ingredients : Leader Election Oracle + Heavier Fork Strategy 1 A leader election oracle by relying on the PoW mechanism • Each party is elected independently • The probability of electing each party is proportional to its relative computational power • Each party commits to a single block → Synchronize the creation of blocks → Prevent Sybil attacks → Incentivize correct behavior through currency creation
  • 9. 9 2. Nakamoto Consensus protocol Two ingredients : Leader Election Oracle + Heavier Fork Strategy 2 The simple and local Heavier Fork Strategy • Select the chain which required the greatest among of work • Random nature of the PoW + Non-faulty leaders always use the chain which required the greatest among of work → One chain will be extended more than the others → The blockchain B0 Bi Bi+1 Bi+1
  • 10. 10 2. Nakamoto Consensus protocol The goal of the Consensus Nakamoto protocol is to implement a blockchain replication protocol 3 • (Uniqueness) There is a unique chain of blocks (i.e., the blockchain) extracted from the tree • (Liveness) The blockchain is constantly growing • (Safety) The deeper a block is buried in the blockchain the harder it is to abort it • (Fairness) The proportion of blocks of non-faulty parties in the blockchain is proportional to their computation power 3. J. Garay and A. Kiayias, The Bitcoin Backbone Protocol : Analysis and Application, Eurocrypt 2015
  • 11. 11 3. Peer-to-Peer Network • Topology formed through a randomized process • No coordinating entity • Broadcast is based on flooding/gossiping neighbors’ link Tx d - e Tx a - B Tx a - B Tx a - B Tx a - B Tx a - B Tx a - B Tx a - B Tx a - B Tx a - B Tx a - B Tx d - e Tx d - e Tx d - e Tx d - e Tx d - e Tx a - B Tx d - e Tx d - e Tx a - B Tx a - B Tx d - e
  • 12. 12 Required properties 1. Connectivity • Each node should receive any broadcast information 2. Low latency 4 msg. transmission time block time interval 1 Allows to keep the probability of fork small (i.e. 10−3) PoW mechanism allows this ratio to continuously hold Safety requires to wait one hour (i.e., no instant finality) No more than 7 trans/s can be permanently confirmed in average ! ! 4. J. Garay and A. Kiayias, The Bitcoin Backbone Protocol : Analysis and Application, Eurocrypt 2015
  • 13. 13 Electing a leader in a permissionless setting • Proof-of-work Works in practice and this is true since 2009 Security analysis Environmental issues Diminishing returns Distinction between miners and crypto-currency holders (i.e., miners control what is inside blocks) • Proof-of-work with useful computation, proof-of-space, proof-of-storage, . . . Physical resources • Proof-of-stake Abstract but limited resource : coin itself All the required information is already in the blockchain Numerous attacks
  • 14. 14 Proof-of-stake approaches Proof-of-stake motto : « The probability for party p of winning the leader election is proportional to the fraction of currency p owns » • Eventual-consensus • Protocols that apply some form of longest-chain rule to the blockchain • Immutability of a block increases gradually • e.g. PPcoin, NXT, Ouroboros, . . . • Blockwise-BA • Immutability of a block is achieved by BA before working on the next one • e.g. Algorand
  • 15. 15 Proof-of-stake approaches PoS approaches are subject to attacks 5 essentially because it costs nothing to create blocks and because of currency transfer from transacting parties to the parties that maintain the ledger • Checkpointing mechanisms • Provide newcomers with a relatively recent block (trust issue) • Prevent to adopt a new chain that originates to much in the past (knowledge of the honest chain) • Key-evolving cryptography : secret keys are evolving so that past signatures cannot be forged (does not apply to UTXO based model) • Enforce strict chain density statistics (knowledge of the number of parties at any time) • Add context in each transaction (knowledge of the honest chain) 5. P. Gazi, A. Kiayias, A. Russel, « Stake-Bleeding Attacks on Proof-of-Stake Blockchains », IOHK
  • 16. 16 Preventing conflicts as soon as possible 1. Valid blocks should never be confronted with any other conflicting blocks → No fork ! → 0-confirmation delay 2. Valid transactions should never be confronted with any other conflicting transactions → No double spending attacks ! → Fast payments feasible
  • 17. 17 Preventing conflicts as soon as possible 6 1. Valid blocks should never be confronted with any other conflicting blocks How ? Agreement on the unique block that can reference an earlier block in the blockchain 2. Valid transactions should never be confronted with any other conflicting transactions How ? Agreement on the unique transaction that can redeem unspent transaction outputs (UTXOs) 6. Joint work with Antoine Durand (IRT SystemX), Romaric Ludinard (IMT), Bruno Sericola (Inria) E. Anceaume, A. Guellier, R. Ludinard, UTXO as a proof of membership for Byzantine Agreements, IEEE Blockchain 2018.
  • 18. 18 Model • Permissionless system • Partially synchronous environment • Adversary : no more than 1/3 of the total amount of money is held by the adversary • Nodes have access to safe cryptographic functions (hash function and signature scheme) • Each object of the system (i.e., UTXO, transaction and block) is assumed to be uniquely identified • No public key infrastructure to establish node identities
  • 19. 19 Properties Most of the permissionless blockchain-based cryptosystems guarantee that : Property (Safety) If a valid transaction T is deeply confirmed at some non-compromised node then no transaction conflicting with T will ever be deeply confirmed by any non-compromised nodes Property (Liveness) Any conflict-free and valid transaction will eventually be deeply confirmed in the blockchain of all non-compromised nodes at the same height in the blockchain
  • 20. 20 Properties We aim at strengthening both properties Property (Strong safety) If a valid transaction T is confirmed at some non-compromised node then no transaction conflicting with T will ever be confirmed by any non-compromised nodes Property (Strong liveness) Any valid transaction will eventually be confirmed in the blockchain of all non-compromised nodes at the same height in the blockchain
  • 21. 21 Transaction validation protocol At most one transaction is allowed to use all the UTXOs referenced in its input set TRANSACTION WITH BOB VALID ?? YES ! ALICE
  • 22. 22 Transaction validation protocol At most one transaction is allowed to re- deem all the UTXOs referenced in its input set
  • 23. 23 Transaction validation protocol At most one transaction is allowed to re- deem all the UTXOs referenced in its input set TRANSACTION WITH BOB VALID ?? YES ! ALICE TRANSACTION WITH EVE VALID ?? NO!
  • 24. 24 Block validation protocol Any validated block has at most one valid block as immediate successor VALID ?? YES ! Pred=0001001 Block 0000111
  • 25. 25 Block validation protocol Any validated block has at most one valid block as immediate successor VALID ?? YES ! Pred=0001001 Block 0000111 Pred=0001001 Block 0000001 NO ! VALID ??
  • 26. 26 A set of ingredients 1. Byzantine Agreement (BA) • Primitive enabling a set of committee members to agree on a single value, each member holding a possibly different initial value. • Tolerate the presence of a minority of malicious members
  • 27. 27 2. « Public keys as identities » principle • Users, i.e. owners of accounts (owners of UTXOs), participate to BA 7 • Alternative to existing designs • Rely on the unique association UTXO/identity as a proof of membership for BA 7. E. Anceaume, A. Guellier, R. Ludinard, UTXO as a proof of membership for Byzantine Agreements, IEEE Blockchain 2018.
  • 28. 28 3. Clustered-based Distributed Hash Table (DHT) • P2P overlay whose topology approximates a structured graph • For resiliency reasons, each vertex of the graph is a set of nodes • Nodes logically close to each other belong to the same cluster • e.g., PeerCube is a clustered-based overlay 8 resilient to adversarial behavior and robust to high churn 8. E. Anceaume, R. Ludinard and B. Sericola. Performance evaluation of large-scale dynamic systems. ACM Sigmetrics Performance Evaluation Review, 39(4), 2012.
  • 29. 29 3. Clustered-based Distributed Hash Table (DHT) (cont’d) By reaching an agreement around the objects to be validated • Resistance to Eclipse attacks • IDs are random, ephemeral and verifiable • Resistance to Sybil attacks • Participation to committees is weighted by UTXOs amount • Resistance to Selfish attacks • Miners cannot create a block without disclosing it • No double-spending • No forks
  • 30. 30 Sycomore : from a chain of blocks to a DAG of blocks 9 9. E. Anceaume, A. Guellier, R. Ludinard, B. Sericola, Sycomore : a Permissionless Distributed Ledger that self-adapts to Transactions Demand, IEEE NCA, 2018
  • 31. 31 Sycomore : from a chain of blocks to a DAG of blocks • Transactions are partitioned over the blocks of the ledger - verifiable by anyone
  • 32. 32 Sycomore : from a chain of blocks to a DAG of blocks • The number of blocks and their creation rate self-adapt to transactions demand - verifiable by anyone
  • 33. 33 Sycomore : from a chain of blocks to a DAG of blocks • The predecessor of a block is not predictable - verifiable by anyone
  • 34. 34 0 100 200 300 400 500 600 1 5 10 15 20 25 30 35 Meaninter-blocktime(s) c 1/(cλ0) • With c = 30 leaf blocks, a block is mined every 20s (7, 000 Tx/s) with a proba of fork of 10−6 • Bitcoin : a block every 10 mns (7 Tx/s) with a proba of fork of 10−3 • Could even go faster by relying on our structured DHT Mean inter-block time as a function of the number of leaf blocks c.
  • 35. 35 Collaborations and financial support Current collaborations • Local : R. Ludinard (IMT Atlantique), B. Sericola and Y. Mocquard (Dionysos), F. Tronel (Cidre). • National : A. Durand (IRT SystemX), M. Potop-Butucaru (LIP6), A. Del Pozzo and S. Tucci (CEA) • International : P. Tzigas (Chalmers Univ), L. Querzoni (La Sapienza Univ), Financial support • PEPS INS2I Securite 2016 and 2017 : BIPs • Labex Cominlabs 2019 : Blockchain FM
  • 36. 36 Collaborations and financial support We are looking for students, engineers, researchers to join us in this adventure to build a nice and secure infrastructure Thanks for your attention