Abstract --
GIST Blockchain-Economy Center (BEC, Director Heung-No Lee) aims to introduce the Decentralized Secure(DeSecure) blockchains it has been developing since 2018. They aim to resolve the re-centralization problem of today’s mining market. One of the key ideas is to have the proof-of-work (PoW) puzzle time-varying from block-to-block, using the error-correction-codes (ECC). Two new blockchains based on Bitcoin and Ethereum are to be developed using new consensus algorithm based on this new ECC-PoW. Time-varying puzzles make it very difficult to develop an ASIC mining chips. As the result, with the size of network growing, the difficulty level needs not be growing as well. As such, energy spent for mining can be controlled. The proposed ECC-PoW mechanism is to be explained in details. In addition, our plan to hardfork Bitcoin and Ethereum, by replacing the SHA based PoW with the proposed ECC-PoW, and by developing two new DeSecure blockchains, i.e. BTC-ECC and ETH-ECC, is discussed. The two DeSecure blockchains will be openly shared under an open source license at Github. We address how DeSecure blockchains can be used to resolving the issue of scalability. Our schedule to release the cores (C++ and Go) and technical meet-ups will be addressed.
DaoLiName-Decentralized Identity as Public KeyDaoliCloud Ltd
We present DaoLiName (道立名, Taoism Establishing Name) blockchain. It has a uniquely novel and useful decentralized consensus algorithm to establish an authentication assertion that a human-meaningfully low-entropy bit string is a public key.
Blockchain Scalability - Architectures and AlgorithmsGokul Alex
My presentation on 'Blockchain Scalability - Architectures and Algorithms' for the TechAthena Digital Community Webinar.
Blockchain Scalability is one of the most significant concern for Minimum Viable Blockchain Implementation. It is one of the key aspects determining the relevance and feasibility of Blockchain Technology for a particular use case.This session will cover the fundamental aspects of distributed computing that determine the contours of scalability.
Subsequently, the session will outline the parameters and metrics related to Blockchain Scalability in detail. In this context, the session will deep dive into architectural and algorithmic techniques that enables a scalable Blockchain.Architectural techniques such as vertical scaling and horizontal scaling will be explained in detail. Design techniques such as State Channels, Sharding, SideChains, Off chain computations, Block Size and Time Optimization etc. will be explained.
In summary, this session will conclude with the implications and trade-off between Blockchain Scalability, Security, Simplicity and Interoperability. Looking forward to your views and thoughts !
The Fabric platform is intended as a foundation for developing blockchain applications, products or solutions. The fabric is a Private and Permissioned system which delivers a high degree of confidentiality, resiliency, flexibility, and scalability. It adopted a modular architecture and supports pluggable implementations of different components like consensus, membership services etc. Like other blockchain technologies, Fabric has a ledger, smart contracts, and it is a system by which participants manage their transactions. The smart contract in the fabric is known as chaincode and it is in the chaincode the business logic is embedded. The following features impart high degree of security and privacy for the fabric framewor
Blockchain Scalability - Themes, Tools and TechniquesGokul Alex
This presentation is a deep dive on Blockchain Scalability Challenges, Constraints with a narrative on promising techniques such as State Channel, Side Chains, Simple Payment Vehicles, Consensus Algorithms and Directed Acyclic Graphs. The presentation starts with analysing the scalability cube.
DaoLiName-Decentralized Identity as Public KeyDaoliCloud Ltd
We present DaoLiName (道立名, Taoism Establishing Name) blockchain. It has a uniquely novel and useful decentralized consensus algorithm to establish an authentication assertion that a human-meaningfully low-entropy bit string is a public key.
Blockchain Scalability - Architectures and AlgorithmsGokul Alex
My presentation on 'Blockchain Scalability - Architectures and Algorithms' for the TechAthena Digital Community Webinar.
Blockchain Scalability is one of the most significant concern for Minimum Viable Blockchain Implementation. It is one of the key aspects determining the relevance and feasibility of Blockchain Technology for a particular use case.This session will cover the fundamental aspects of distributed computing that determine the contours of scalability.
Subsequently, the session will outline the parameters and metrics related to Blockchain Scalability in detail. In this context, the session will deep dive into architectural and algorithmic techniques that enables a scalable Blockchain.Architectural techniques such as vertical scaling and horizontal scaling will be explained in detail. Design techniques such as State Channels, Sharding, SideChains, Off chain computations, Block Size and Time Optimization etc. will be explained.
In summary, this session will conclude with the implications and trade-off between Blockchain Scalability, Security, Simplicity and Interoperability. Looking forward to your views and thoughts !
The Fabric platform is intended as a foundation for developing blockchain applications, products or solutions. The fabric is a Private and Permissioned system which delivers a high degree of confidentiality, resiliency, flexibility, and scalability. It adopted a modular architecture and supports pluggable implementations of different components like consensus, membership services etc. Like other blockchain technologies, Fabric has a ledger, smart contracts, and it is a system by which participants manage their transactions. The smart contract in the fabric is known as chaincode and it is in the chaincode the business logic is embedded. The following features impart high degree of security and privacy for the fabric framewor
Blockchain Scalability - Themes, Tools and TechniquesGokul Alex
This presentation is a deep dive on Blockchain Scalability Challenges, Constraints with a narrative on promising techniques such as State Channel, Side Chains, Simple Payment Vehicles, Consensus Algorithms and Directed Acyclic Graphs. The presentation starts with analysing the scalability cube.
Distributed Consensus: Making Impossible PossibleHeidi Howard
In this talk, we explore how to construct resilient distributed systems on top of unreliable components. Starting, almost two decades ago, with Leslie Lamport’s work on organising parliament for a Greek island. We will take a journey to today’s datacenters and the systems powering companies like Google, Amazon and Microsoft. Along the way, we will face interesting impossibility results, machines acting maliciously and the complexity of today’s networks. Ultimately, we will discover how to reach agreement between many parties and from this, how to construct new fault-tolerance systems that we can depend upon everyday.
Smart Card technology is the emerging technology which is developing among
common masses in our culture and widely used in the sectors of banking and industries.
Many research works are undergoing in this area to provide highly confidential data
transmission. Existing Scheme provides a security against offline attack for the lost Smart
Card using Elliptic Curve Cryptography (ECC) but it requires more communication and
computation overhead with higher key length. To overcome this limitation, DNA based
Password authentication using Hyper Elliptic Curve Cryptography (HECC) scheme is
proposed. It provides more security than existing system which allows server and smartcard
to exchange the generated password and verify each other. This system exploits the
advantages of Hyperelliptic Curve Cryptography (HECC) technique which is having lesser
key size, less communication and computation overhead for Password generation and
signature verification process.
MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...IJNSA Journal
The sensor network is a wireless network environment that consists of the many sensors of lightweight and
low-power. Authentication between nodes is very vital for network reliability and the integrity of
information collected by these nodes. Therefore, encryption algorithm for the implementation of reliable
sensor network environments is required to the applicable sensor network. This paper gives a new
proposed cryptosystem (MREBC) that is designed for 8 bits microcontroller systems. MREBC uses the
concept of rotor enhanced block cipher which was initially proposed by the author in [NRSC 2002] on the
first version of REBC. MREBC uses rotors to achieve two basic cryptographic operations; permutation,
and substitution. Round key is generated using rotor too, which is used to achieve ciphertext key
dependency. Rotors implemented using 8 bits successive affine transformation, which achieves memoryless,
normalized ciphertext statistics, and small processing speed trend. The strength of this system is
compared with the RIJNDAEL (AES) cipher. MREBC cipher gives excellent results from security
characteristics and statistical point of view of. communication efficiency of MREBC is compared with AES
through measuring performance by plaintext size, and cost of operation per hop according to the network
scale. Arduino microcontroller board is used to implement both MREBC, and AES in order to compare the
performance of algorithms. Authors suggests to use MREBC to implement a reliable sensor network
environments.
Blockchain technology is being touted as the Next Big Thing, seemingly capable of great feats of strength and perhaps even curing the common cold. But what exactly is it and how could it contribute to a security program? This session will describe how blockchain works, define its value proposition, and identify specific use cases where blockchain makes sense and some where it doesn't. Along the way, we will discuss similar capabilities and technologies that accomplish the objectives.
Bitcoin has been a hot topic in the technology industry since its boom in 2017. The underlying technology of bitcoin is the blockchain that has impressed many of the onlookers due to its transparency and usability in this globalized world. In cryptocurrencies, a ledger is operated which contains all the data regarding the transactions and contracts that are to be executed. These ledgers are maintained on multiple nodes around the world. Every node has to maintain a full copy of the ledger which currently is 15 GB for bitcoin. As more and more transactions are carried on the blockchain, this approach becomes slow. Scaling is the only solution to counter this problem, that's where the sharding technology comes into play. In sharding, rather than each node maintaining the full ledger, the ledger is divided or sharded into multiple fragments. So, in short, each node consists of a small part of the ledger rather than the whole ledger which is easy to maintain and in turn helps in scaling the blockchain. So rather than a full blockchain, we have shard chains that consist of multiple node or validator networks which are then assigned multiple tasks like verifying transactions or operations.
Scaling is one of the most interesting areas of innovation for blockchain. In this survey we took a first pass at a market landscape survey. We would love any edits/suggestions you may nave.
Distributed Consensus: Making Impossible PossibleHeidi Howard
In this talk, we explore how to construct resilient distributed systems on top of unreliable components. Starting, almost two decades ago, with Leslie Lamport’s work on organising parliament for a Greek island. We will take a journey to today’s datacenters and the systems powering companies like Google, Amazon and Microsoft. Along the way, we will face interesting impossibility results, machines acting maliciously and the complexity of today’s networks. Ultimately, we will discover how to reach agreement between many parties and from this, how to construct new fault-tolerance systems that we can depend upon everyday.
Smart Card technology is the emerging technology which is developing among
common masses in our culture and widely used in the sectors of banking and industries.
Many research works are undergoing in this area to provide highly confidential data
transmission. Existing Scheme provides a security against offline attack for the lost Smart
Card using Elliptic Curve Cryptography (ECC) but it requires more communication and
computation overhead with higher key length. To overcome this limitation, DNA based
Password authentication using Hyper Elliptic Curve Cryptography (HECC) scheme is
proposed. It provides more security than existing system which allows server and smartcard
to exchange the generated password and verify each other. This system exploits the
advantages of Hyperelliptic Curve Cryptography (HECC) technique which is having lesser
key size, less communication and computation overhead for Password generation and
signature verification process.
MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...IJNSA Journal
The sensor network is a wireless network environment that consists of the many sensors of lightweight and
low-power. Authentication between nodes is very vital for network reliability and the integrity of
information collected by these nodes. Therefore, encryption algorithm for the implementation of reliable
sensor network environments is required to the applicable sensor network. This paper gives a new
proposed cryptosystem (MREBC) that is designed for 8 bits microcontroller systems. MREBC uses the
concept of rotor enhanced block cipher which was initially proposed by the author in [NRSC 2002] on the
first version of REBC. MREBC uses rotors to achieve two basic cryptographic operations; permutation,
and substitution. Round key is generated using rotor too, which is used to achieve ciphertext key
dependency. Rotors implemented using 8 bits successive affine transformation, which achieves memoryless,
normalized ciphertext statistics, and small processing speed trend. The strength of this system is
compared with the RIJNDAEL (AES) cipher. MREBC cipher gives excellent results from security
characteristics and statistical point of view of. communication efficiency of MREBC is compared with AES
through measuring performance by plaintext size, and cost of operation per hop according to the network
scale. Arduino microcontroller board is used to implement both MREBC, and AES in order to compare the
performance of algorithms. Authors suggests to use MREBC to implement a reliable sensor network
environments.
Blockchain technology is being touted as the Next Big Thing, seemingly capable of great feats of strength and perhaps even curing the common cold. But what exactly is it and how could it contribute to a security program? This session will describe how blockchain works, define its value proposition, and identify specific use cases where blockchain makes sense and some where it doesn't. Along the way, we will discuss similar capabilities and technologies that accomplish the objectives.
Bitcoin has been a hot topic in the technology industry since its boom in 2017. The underlying technology of bitcoin is the blockchain that has impressed many of the onlookers due to its transparency and usability in this globalized world. In cryptocurrencies, a ledger is operated which contains all the data regarding the transactions and contracts that are to be executed. These ledgers are maintained on multiple nodes around the world. Every node has to maintain a full copy of the ledger which currently is 15 GB for bitcoin. As more and more transactions are carried on the blockchain, this approach becomes slow. Scaling is the only solution to counter this problem, that's where the sharding technology comes into play. In sharding, rather than each node maintaining the full ledger, the ledger is divided or sharded into multiple fragments. So, in short, each node consists of a small part of the ledger rather than the whole ledger which is easy to maintain and in turn helps in scaling the blockchain. So rather than a full blockchain, we have shard chains that consist of multiple node or validator networks which are then assigned multiple tasks like verifying transactions or operations.
Scaling is one of the most interesting areas of innovation for blockchain. In this survey we took a first pass at a market landscape survey. We would love any edits/suggestions you may nave.
Understanding Proof of Work (PoW) and Proof of Stake (PoS) AlgorithmsGautam Anand
We will focus on understanding "Proof of Stake (PoS)" Algorithm, how it different from "Proof of Work" algorithm, the performance benefits and security overview. We will also discuss the upcoming blockchain protocols that are planning to move to PoS.
Most PoS blockchains let you stake coins on your own. In many cases, however, that won’t let you make the most out of your stake. Your stake must remain connected to the network around the clock. Even a brief misconnection could disrupt your earning potential by sending you to the back of the line. Joining a staking pool offers some significant advantages - let us look at them here.
Witnessing explosive immense growth over the past few years, we have realized many new emerging blockchains started making a move in competition with Binance Smart Chain commonly known as BSC. Like other DAO projects, Upcomings Chain is a genuine follower of this popular blockchain overcoming the shortcomings of the existing blockchain.
Upcomings Chain is introduced to solidify its position to begin a journey to be the most popular DeFi ecosystem to reach an account of more than $20 billion in terms of assets and become a successful DeFi protocol.
Presenting the utmost benefits right from low transaction fees, exceptional high throughput, and rapid transaction completion times, UPC intends to be a low-cost alternative to other hyped blockchains out there.
The team plans to hire hundreds or thousands of crypto projects and assets in collaboration with this new platform recently deployed on official protocols. By leveraging the complete power of blockchain technology as well as smart contracts, Upcomings DAO developed its own blockchain in the name of UPC to create a safer, transparent, reliable, open to all and decentralized internet platform for empowering the individuals and communities around the space.
This blockchain platform portrays an entire suite of DeFi applications such as prediction markets, exchange, yield farms, staking platforms, an NFT marketplace, Metaverse, and much more.
The native asset for Upcomings Chain called as UPCG coins offers a wide variety of use cases and terms to reduce the high inflation being one of the primary source reward assets for participants in the entire ecosystem.
UPC is a decentralized blockchain platform that supports different DApps and many large-scale applications belonging to GameFi, SocialFi, and the Metaverse domains. Upcomings Chain is a proof-of-authority-based blockchain quite compatible with the network protocols which allows common users and developers to build DApps and feasibly migrate to the core chain.
Features of the Upcomings Chain
· UVM compatible
· Consensus Layer
· Core hub to multi-chains
· Offers high transaction volume
· Deployed on the Proof-of-Authority consensus mechanism
We believe that Upcomings Blockchain will be the next big thing in the crypto industry sketching out the growth this network has started experiencing. It is currently the faster and cheaper on-spot platform with advanced smart contracts providing developers with major factors that other projects lack.
Upcomings Chain
Upcomings Chain is an innovative blockchain developed on a Proof of Authority (PoA) based solution to eliminate the increasing gas fee concerns and to support the short block time. It is a virtual machine deployed on a blockchain network operating on 2 modes of the mainnet and testnet and POA algorithm.
Moreover, this chain primarily emphasizes a user-developer-friendly ecosystem offering a transaction confirmation ratio of over 7 secs and low fees of around $0.01.
Blockchain technology, initially the backbone of cryptocurrencies like Bitcoin, has evolved beyond its original purpose to become a transformative force in the digital world. It’s no longer just a ledger for financial transactions; blockchain is a foundational technology with potential applications across various sectors, from finance to healthcare and beyond.
This evolution has been marked by significant advancements that address blockchain’s initial limitations, such as scalability, interoperability, and privacy. These improvements are catalyzing a shift in how blockchain is utilized, paving the way for more efficient and user-centric decentralized applications (dApps) and platforms.
This report provides a brief yet comprehensive exploration of these technological breakthroughs. We aim to dissect how each development contributes to the evolving landscape of blockchain, highlighting its potential to revolutionize diverse sectors. Our focus will cover a spectrum of advancements: scalability solutions and consensus mechanisms to privacy enhancements, smart contract innovations, tokenization, and the burgeoning field of Decentralized Finance (DeFi).
Censorship resistance is a requirement for building a safer future with #AI. In the presentation from our meetup in Zug (Jul 2018) we are explaining why it is so and how Pandora Boxchain team develops such technology.
Sing up on the future meetups on http://meetu.ps/e/Fwg7Z/jKDhn/a and #FreeAI!
Similar to Ethcon seoul 2019 presentation final (20)
Plenary Talk at ICEIC 2019
Pullman Auckland Hotel, Auckland, New Zealand
Jan. 23th (Wed) 2019, 11:00 ~ 12:30
http://iceic.org/2019/
Abstract
In the year 2018, we have witnessed the surge and the fall of crypto-currencies. With the surge, blockchain the new technology behind cryptocurrencies, and its idealistic footprint of advanced thoughts, blockchainism it can be perhaps called, came to enthrall our minds. Thousands of new ambitious projects have been conceived and fast activated with the worldwide frenzy of new funding through initial coin offerings a novel funding mechanism in the blockchain world. Decentralized societies, equal accesses to valuable resources, reducing the cost of middleman, freed individuals from hierarchical organizations, and reducing the spread in inequalities are some of those advanced thoughts. But the fall came; the market value for Bitcoin has collapsed more than 7 times from its peak-value; that of Ethereum has plummeted more than 12 times. These two power houses which have supported those progressive projects are now torn apart. Recent New York Times report reads, “Blockchain: What’s it good for? Absolutely nothing, report finds.” Another one reads, The Blockchain Is a Reminder of the Internet’s Failure. The same utopian promises that bloomed during the Internet’s early days are back. Be afraid.“ Should this be the end of our pursue to change and make a better world with blockchains? Obviously not. In this presentation, I would like to talk about the reality of blockchain technology and how distant it is from the ideals. With this accessment, I would like to present some of novel research progresses we made in year 2018 and talk about further research ideas to pursue in year 2019.
Blockchain and CryptoEconomic Policy -- IEEE Tencon Tutorial, Jeju, Oct. 28th...Heung-No Lee
Abstract -- Bitcoin is a peer-to-peer electronic cash transfer system without a bank in the middle. The e-cash can be sent to anyone in the internet as if it was an in-person transfer of money. To meet such an end, Bitcoin introduces a novel idea, blockchain. Blockchain maintains a group of “cryptographically chained” digital documents, a ledger. Cryptographic chain is required to record in an unforgeable way transactions such as coin transfers from one to the other. The ledger is published and left open in the internet. The open chained ledger makes electronic transfer of money possible over the internet without the authority in the middle. Since 2009 Bitcoin was introduced, it has made tremendous strides. Market value has been created, capitalization surpassing more than 20 Billion USD in 2017. Thousands of follow-up systems have been created. World Economic Forum has forecasted that 10% of global GDP will be stored in blockchains by 2025. In this tutorial, we aim to review Bitcoin and Ethereum for their program architectures and operations. Ethereum is believed to have made the e-cash system to the next level by inclusion of “smart contracts” in its function. Smart contracts enable formation of contractual relations between two or more parties and the terms specified in the contract are executed automatically when prescribed conditions are met. In this tutorial, we also aim to shed light on technical sides of blockchain technology such as privacy, security and autonomy which are sensitive to regulations and policies. Many initial coin offerings has been made amassing a large amount of crowd funding. While it is a revolutionary invention, blockchain and cryptocurrency systems are at its infancy stage. In order to foster continued healthy development, it is imperative for us to see the core of the technology and be able to evaluate the short and long term impacts of this technology based on scientific facts. This shall help us avoid any unwanted act of fear and road blocks to development. Regulations should be kept at its minimal. There are obvious ones: price manipulation practices and fraudulent investment operations should be prevented and punished heavily when caught. But more importance should be developing a policy to fostering researches, startups and funding to help uncover new opportunities. Blockchain can be useful in many future applications such as transfer of lands and houses, bank accounts to people in underdeveloped nations, and low cost maintenance of valuable records such as patents and copyrights. If some of them are indeed realizable, blockchain is sure to make the society clearer and more expectable. Protection of rights for underprivileged people can be improved; disputes and conflicts in the society lessened; transaction costs reduced and healthy interaction among people encouraged. Who knows that it shall lead us a step closer to the society of genuine trust!
Blockchain and Cryptoeconomic Policy IEEE Tencon 2018 Tutorial Oct. 28th, 2018Heung-No Lee
Abstract - Bitcoin is a peer-to-peer electronic cash transfer system without a bank in the middle. The e-cash can be sent to anyone in the internet as if it was an in-person transfer of money. To meet such an end, Bitcoin introduces a novel idea, blockchain. Blockchain maintains a group of “cryptographically chained” digital documents, a ledger. Cryptographic chain is required to record in an unforgeable way transactions such as coin transfers from one to the other. The ledger is published and left open in the internet. The open chained ledger makes electronic transfer of money possible over the internet without the authority in the middle. Since 2009 Bitcoin was introduced, it has made tremendous strides. Market value has been created, capitalization surpassing more than 20 Billion USD in 2017. Thousands of follow-up systems have been created. World Economic Forum has forecasted that 10% of global GDP will be stored in blockchains by 2025. In this tutorial, we aim to review Bitcoin and Ethereum for their program architectures and operations. Ethereum is believed to have made the e-cash system to the next level by inclusion of “smart contracts” in its function. Smart contracts enable formation of contractual relations between two or more parties and the terms specified in the contract are executed automatically when prescribed conditions are met. In this tutorial, we also aim to shed light on technical sides of blockchain technology such as privacy, security and autonomy which are sensitive to regulations and policies. Many initial coin offerings has been made amassing a large amount of crowd funding. While it is a revolutionary invention, blockchain and cryptocurrency systems are at its infancy stage. In order to foster continued healthy development, it is imperative for us to see the core of the technology and be able to evaluate the short and long term impacts of this technology based on scientific facts. This shall help us avoid any unwanted act of fear and road blocks to development. Regulations should be kept at its minimal. There are obvious ones: price manipulation practices and fraudulent investment operations should be prevented and punished heavily when caught. But more importance should be developing a policy to fostering researches, startups and funding to help uncover new opportunities. Blockchain can be useful in many future applications such as transfer of lands and houses, bank accounts to people in underdeveloped nations, and low cost maintenance of valuable records such as patents and copyrights. If some of them are indeed realizable, blockchain is sure to make the society clearer and more expectable. Protection of rights for underprivileged people can be improved; disputes and conflicts in the society lessened; transaction costs reduced and healthy interaction among people encouraged. Who knows that it shall lead us a step closer to the society of genuine trust!
Blockchain and future -- SNU Hospital InvitationHeung-No Lee
ABSTRACT
인류는 컴퓨터 망과 함께 빠르게 진화하고 있습니다. 인터넷과 모바일의 출현으로 인류는 정보를 실시간으로 언제 어디서나 주고 받을 수 있게 되었습니다. 이젠 블록체인의 출현으로 정보의 파편뿐만이 아니라 가치 있는 디지털 형태의 자산까지도 주고 받을 수 있게 되었습니다. 국경을 초월한 개인과 개인간 송금과 현금거래를 할 수 있고, 개인과 개인간 비대면 계약까지도 가능해 지게 되었습니다. 이는 거래비용을 크게 떨어뜨리고 인류가 보다 더 쉽게 서로 협력할 수 있는 사회로 진보하는 것을 의미합니다. 관습화된 중앙집권 형 정치, 경제, 사회 시스템으로부터 인간의 본연의 모습이 보다 자유롭게 표현 될 수 있는 사회로의 진보를 의미합니다. 예전에는 조직 속에서 존재하는 개인과 조직이 부여한 지위에 따라서 행동해야 하는 개인이 있었습니다. 이제는 보다 자유롭고 주체적으로 개인의 행복을 추구하는 블록체이니즘이라는 새로운 사조의 탄생까지 예고 되고 있습니다. 본 강의에서는 블록체인이 무엇인지 정의 해 보고, 현재의 연구 및 산업의 현재 상황을 살펴 보겠습니다. 우리의 미래를 보다 긍정적으로 바꿀 수 있도록 하기 위해서, 블록체인을 어떻게 활용할 것인지 생각해 보는 시간을 갖도록 하겠습니다.
BIOGRAPH
이흥노 교수는 GIST EECS 전기전자컴퓨터 공학부 교수입니다. 현재까지 210 여편이 넘는 국제학술 및 저널 논문을 게재 하였습니다 (국제 SCI논문 62편 포함). 주요 경력으로는 대한전자공학회 통신소사이어티 회장(현), 과기정통부 연구개발특구위원회 위원(현), 국토부 국가스마트도시위원회 빅데터분야 전문위원(현), 미래과학기술지수㈜ 상임이사(역임), GIST연구원장(역임), 등이 있습니다. 주요 수상경력은 2016년 GIST연구상, 2014년 1월 이달의 과학자 상(한국연구재단), 2013년 기초연구 우수성과 50 선(한국연구재단) 등이 있습니다. 미국 UCLA Electrical Engineering 공학부에서 1993년에 (cum laude) 학사학위를, 1994년에 석사학위를, 1999년에 박사학위를 취득하였습니다.
초청자
Prof. 김성완 (sungwan@snu.ac.kr)
& Prof. 윤형진 (hjyoon@snu.ac.kr)
서울대학교 의과대학 의공학교실 BMC Lab.
& Medical Big Data Research Center (MBRC)
THis ppt explains what the blockchain internet economy is. How bitcoin was borne and how it can help make the world a better place to live. 블록체인이란 무엇인가? 금융위기는 왜 오는가? 블록체인인터넷 이란 블록체인인터넷 경제란 무엇인가?
Blockchain phenonmenon why young people love it?Heung-No Lee
“왜 젊은이들이 블록체인과 암호화폐에 열광하는가?”라는 질문을 던지고, 이해해 보고자 함.
이를 통해 대한민국의 미래 발전 방안을 모색해 보고자 함.
블록체인 혹은 암호화폐에 대한 대중의 이해도를 높이고, 블록체인이 가져올 새로운 미래에 대하여 생각해보는 시간을 갖고자 함.
블록체인관련 정책 및 입법 현황을 살펴보고, 창업을 하고자 하는 기업이 꼭 알아야 할 법과 규제에 대해 알아봄.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
3. Abstract
GIST Blockchain-Economy Center (BEC, Director Heung-No Lee) aims to
introduce the Decentralized Secure(DeSecure) blockchains it has been
developing since 2018. They aim to resolve the re-centralization problem of
today’s mining market. One of the key ideas is to have the proof-of-work (PoW)
puzzle time-varying from block-to-block, using the error-correction-codes (ECC).
Two new blockchains based on Bitcoin and Ethereum are to be developed
using new consensus algorithm based on this new ECC-PoW. Time-varying
puzzles make it very difficult to develop an ASIC mining chips. As the result,
with the size of network growing, the difficulty level needs not be growing as
well. As such, energy spent for mining can be controlled. The proposed ECC-
PoW mechanism is to be explained in details. In addition, our plan to hardfork
Bitcoin and Ethereum, by replacing the SHA based PoW with the proposed
ECC-PoW, and by developing two new DeSecure blockchains, i.e. BTC-ECC
and ETH-ECC, is discussed. The two DeSecure blockchains will be openly
shared under an open source license at Github. We address how DeSecure
blockchains can be used to resolving the issue of scalability. Our schedule to
release the cores (C++ and Go) and technical meet-ups will be addressed.
4. Heung-No Lee graduated from University of California, Los Angeles (UCLA), U.S.A.
with Ph.D., M.S., and B.S. degrees all in Electrical Engineering, 1999, 1994 and
1993 respectively. He has written more than 270 journal and conference
publications. In the past, he worked at HRL Laboratory, Malibu, California, U.S.A., as
Research Staff Member and as Assistant Professor at the University of Pittsburgh,
Pittsburgh, Pennsylvania, U.S.A. He is currently a full tenured professor at Gwangju
Institute of Science and Technology (GIST), Republic of Korea.
His research lies in the areas of Information Theory, Signal Processing Theory and
their application to Communications and Networking systems, Biomedical systems,
and Signal Processing systems.
Awards he has received recently include Top 50 R&D Achievements of
Fundamental Research in 2013 (National Research Foundation), Top 100 National
R&D Research Award in 2012 (the Ministry of Science, ICT and Future Planning) and
This Month Scientist/ Engineer Award (National Research Foundation) in January
2014.
He was the Director of Electrical Engineering and Computer Science within GIST
College in 2014. Administrative positions he has held at GIST include the Dean of
Research and the Director of GIST Research Institute.
Short Bio of Dr. Heung-No Lee
5. Talk today
DeSecure Blockchains
Error Correction Codes based PoW
Fast transaction enabled by novel DSanalysis
Release Plan
6. Gwangju Institute of
Science and Technology
Blockchain Economy Center
Value Exchange
Block Chain
DeSecure Chain
Global
Slow
Local
Fast
DS Chain DS Chain
DS Chain DS Chain DS Chain
DeSecure chains are
1) Highly secure
2) Highly Decentralized
3) TPS Adjustable
The aim is
to build and distribute the
DeSecure chains
under GIST OSL.
Please contact us via
https://infonet.gist.ac.kr/
heungno@gist.ac.kr
7. Bitcoin’s Ideals
Since birth in 2009, Bitcoin has never stopped breathing and alive currency system.
It is a global digital currency which works beyond national boundaries.
It was the time when trust on the banks and governments were severely degraded.
Ideals around bitcoin are
Decentralization
Reforming Wall street
Unbundling big corporations
Reduction of inequality
7
8. Ethereum’s Ideals
Ethereum network allows not only coin TXs, but also doc files and computer codes.
A decentralized app (Dapp) runs a front end code; a backend code runs in the Eth Net.
cf) For an ordinary app, the backend code is running on a centralized server.
Smart contracts
A computer code can be executed and advanced to the next stage each time a
contractual term matures.
Decentralized autonomous organization has its bylaw written in smart contracts.
The organization spends tokens and makes governance decisions w.r.t. smart
contracts.
Lex Cryptographia!
Uprooting capitalism and democracy for a just society!
Sharing Economy! 8
9. Novel DeSecure Blockchains
• BTC and ETH are great BUT they are
• Re-Centralized
• Scalability Issue
• We aim to approach these two issues with DeSecure blockchains
• Anti-ASIC ECC PoW
• Ecosystem of DeSecure blockchains
• DeSecure blockchains uses novel Error-Correction Code PoW.
• We aim to provide two DeSecure blockchains, ETH-ECC and BTC-ECC.
10. Complaints today
• PoW based blockchains are the most secure;
But they are
• Too slow, not supporting fast transactions
• Spending too much energy in mining
• Re-centralized
11. They Have Sought Alternatives to SHA-PoW, BUT
PoW
(Proof-of-
Work)
PoS
(Proof-of-
Stake)
DPoS
(Delegated
PoS)
• Strong security
- Difficult to produce
- Easy to verify
Pros Cons Coins within top 50 rank
• Extreme computing power
• 51% attacks
• Transaction speed / Transaction
throughput
• Energy & hardware efficiency
• Much more expensive 51% attacks
• Recentralization
• The rich-get-richer
• “Noting at stake” problem
• Scalability and speed
• Energy & hardware efficiency
• Encouraging good behavior by real-
time voting
• Recentralization
• DDoSattacks
PoA
(Proof-of-
Activity)
• Much more expensive 51% attacks
• Decentralization
- Validators are randomly selected.
• Recentralization
• Extreme computing power
• The rich-get-richer
12. Comparison to Existing Scalability Solutions
12
DeSecure Blockchain aims to resolve the re-centralization problem without sacrificing the securedness
and decentralization!
Type DeSecure Bitcoin Ethereum
Name
Multi-level,
multiple chains
Seg-Wit Lightening Network Plasma Sharding
How
Many ECCPoW based chains
can talk to each other via
value-exchange service
Realize by modifying
a block data structure
Allow off-chain
transactions and record
the end result of these
transactions into the main
blockchain
Allow transactions in child
chains, TX records end up
at the main chain are
limited.
Divide BC DB with
multiple shards
Pro
Many different services and levels
of chains can co-work.
Easy to realize
Faster transactions
Small TX fees
Faster transactions
Small TX fees
Faster transaction
Con
No single chain solution
Requires an ecosystem
Small improvement
The content of off-chain
transactions lost
Some TX content lost
Only full node can run this
Increased
SW complexity
13. We aim to Replacing SHA-PoW with ECC-PoW!
Three key parts
1. Web server interface networking of peers
Node registration, get-address, give-address
Full node or light node
Communication among the wallets and the miners
2. Wallet for TX generations
Make private and public keys, address, store UTXOs, make TX, put signature, announce it to
the neighbor, check to see if the TX is supported by the blockchain.
3. Consensus Mechanism
Data: Genesis block + regular blocks, one block every 10 min, block-size 1Mbyte
Protocol: consensus, block header, difficulty level adjustment, …
Mining: Get the longest chain, validate it and all transactions within it, get transactions from
mempool and form a block, run SHA repeatedly until you hit a good hash, put the proof into
the block header, and attach the proofed block to the longest chain, and make announcement
ASAP.
Program Suite
C++, Python, Go, Java, Flask, http
Download and run, then you have a blockchain server.
13
Consensus Engine
Blockchain Core Program
14. #520763
AB 2BTC
nonce1
hash0
M. hash1
#520764
nonce 2
hash1
M. hash2
#520765
nonce3
hash2
M. hash3
#520766
nonce4
hash3
M. hash4
BC 1BTC
CD 0.5BTC
M. hash1
changes
hash 1
changes
hash 2
changes
hash3
changes
Pow is fundamental to OPEN blockchains!
What happens when any alteration is made?
Proof-of-Work (PoW)
Immutability and openness allow transactions.
A B 2 BTC
B C 1BTC
C D .5 BTC
15. ECC-PoW aims to resolve Recentralization Issue.
15
ASIC Mining Moguls Discourage Average Miners
Prone to Collusion, Censorship
Recentralized
Decentralized again
1. ASIC resistant
2. Vulnerability to DS attacks reduced
16. There are items to consider a new PoW!
A new puzzle generation system is capable of varying puzzles from block
to block with the following properties:
P1: Easy to verify but difficult to prove
P2: Robust to detect block modification attacks
P3: Controllable in changing the difficulty level
P4: Open to anyone with a CPU
P5: Unfixed and changeable from block to block
The re-centralized problem can be resolved thanks to P5.
17. Novel Error Correction Codes PoW (ECCPoW)
There are many one-way functions in Inverse Problems such as Error Correction Codes, Sparse-Signal
Recovery, Space-Time Coding, Sphere-Decoding, Digital Communications Receiver algorithms.
In these problems, encoding is easy but decoding is time-consuming!
We combine a Error Correcting Code framework with SHA-xxx.
The decision of mining success is made with the output of the above decoder.
Nonce generator
(incremental or
random)
SHA-xxx
functionInput of
SHA-xxx
Output of
SHA-xxx
Decoder in the
Error Cording
Code Framework Output of
decoder
18. Novel ECCPoW Consensus mechanism, how!
18
▣ ECCPoW Engine
• Compound code of SHA and LDPC decoder.
• Variable size of Parity Check Matrix (PCM) Amt of resource (mem, comp) varies.
• PCM is varied by the hash of the previous block.
Nonce
Generat
or
Variable
nodes n
Check
nodes m
Low Density Parity Check (LDPC) Decoder
Secure Hash
Algorithm 256
The nodes are connected using a parity check matrix H of size m × n.
This H is randomly constructed from a previous hash value.
Current Block
Header
(CBH)
A hash vector of size n is constructed using all of the outputs of Sha256
Secure Hash
Algorithm 256
Secure Hash
Algorithm 256
( )1:=Sha256 nonce,CBHs ( )2:=Sha256 1s s ( )256
256
1: Sha256 n
n
+ =
s s
nonce
CBH
Decision
No YesT
m=Hn 0
An output vector
n of size n
1s 2s
256
n
s
※ 국제 학술지 IEEE trans. Information Forensics and Security에 제출예정
19. ● Wrongapproach!
● Not in asingleblockchain,can it beachieved!
● Weshall promotemany decentralized secure(DeSecure)
blockchainsand approach thescalability problem!
19
Blockchain Trilemma?
“blockchain systems can only at most have two
of the following three properties
- Vitalik Buterin, Sharding FAQ
https://github.com/ethereum/wiki/wiki/Sharding-FAQ
”
Scalability
Decentralized Security
21. 21
※ 국제 학술지 IEEE trans.
Information Forensics and
Security에 제출됨
https://arxiv.org/ftp/arxiv/
papers/1903/1903.0171
1.pdf
※ Jahyuk will
present
tomorrow
afternoon!
22. Provision of DeSecure chains, use ecosystem to solve
Scalability issue!
22
▣ Global chains national chains local chains
▣ One chain is designed to hold only up to 20 DApps
Chain 0
Chain 2-
3
Value
Exchange
Block Chain
Chain 2-
2
Chain 2-
1
Chain 1-
1
Chain 1-
2
Low TPS
Global Nets
High Delay
High TPS
Local Nets
Low Delay
Large Tx (Assets)
Small Tx
(Utility Coins)
<Multi-level DeSecure chains>
23. Block code
A block code C(N, Rate, G, F, ENC, DEC, GF(q)) is well defined as a collection of codewords. When, q = 2, it
is a binary system.
N is the dimension of the code (e.g. N = 512)
Rate = (N – M)/ N is the rate of the code, where M < N.
For example, with N = 1024 and M = 256, Rate = 3/ 4.
G is the Generator matrix with dimension N × (N – M).
F is the Check matrix with dimension, M × N.
G and F are orthogonal to each other, i.e., FG = 0.
A message vector m is an (N – M) × 1vector.
A codeword c, an N x 1 vector, is an element of the code and can be generated by multiplying a message
vector m to the Generator matrix G, i.e., c = Gm.
Galois Field of size q, GF(q), is used for addition and multiplication operations and storage of numbers in the
system.
24. Block code, encoder and decoder
ENC implies the encoder function, i.e., ENC takes the message vector m as the input and produces a
codeword vector corresponding to it, e.g. c = ENC(G, m).
DEC implies the decoding function; DEC takes an arbitrary vector e and returns a closest codeword 𝐜𝐜 ̂ , i.e.,
𝐜𝐜 ̂ = DEC(F, e).
1
( )M
GF q ×
∈s
( )M N
GF q ×
∈F
1
( )N
GF q ×
∈e
Encoder : Given , find ( , )
ˆDecoder : Given , find ( , )
Enc
Dec
=
=
e s e G
s c s F
s F
e
=
M N<
25. Decoder
DEC is to find a codeword 𝐜𝐜 ̂ most close to the input word e.
For the concept of distance, the Hamming distance can be used.
For example, DH(e, 𝐜𝐜 ̂ ) = ||e – 𝐜𝐜 ̂ ||0 is the number of non-zero values in the (e – 𝐜𝐜 ̂ ) vector.
There are many ways to find 𝐜𝐜 ̂ satisfying F𝐜𝐜 ̂ = 0.
We propose to use the message passing graph decoder for its excellency in accuracy and superiority in
decoding speed.
This is to prevent a cheating attack in which a smart miner comes up with a new decoder algorithm of his
own developed and outpaces the regular miners using the designated decoder. If this is allowed, a hidden
advantage goes to the smart miner.
26. Geometrical Explanation
DEC( ) =
2256 vectors
Rate ¼code
= 264
Condition set
Nearest codeword
mapping of e to ̂𝐜𝐜 .
̂𝐜𝐜 = e - 𝐜𝐜
is the sparse
error pattern.
27. Diagram of ECCPoW
Nonce generator
(incremental or random)
Merkle
function
A set of transactions
SHA-xxx
functionNonce
Version,
difficulty,
timestamp,
…
Condition
check
No
Yes
Block generation &
Broadcast
Previous hash value Generate a check matrix
𝐅𝐅 ∈ {𝟎𝟎, 𝟏𝟏} 𝑀𝑀×𝑁𝑁
Generate an input
set
Input set S
vector e
Graph Codeword
Mapping
̂𝐜𝐜=Dec(e, F)
Detected codeword ̂𝐜𝐜 and �𝐞𝐞
기존의 bitcoin 시스템
새롭게 추가된 부분
Merkle tree value
Pre. hash
Merkle root
28. Generate a Check Matrix
Parameter set St = {ht-1, code parameters};
GenCheckMatrix(St) = Ft
Generate a check matrix Ft w.r.t. previous hash ht-1.
Takes the previous hash ht-1as the input to this routine.
That is, Ft changes from block to block.
Previous hash
value
Generate a check matrix
𝐅𝐅𝒕𝒕 ∈ {𝟎𝟎, 𝟏𝟏} 𝑀𝑀×𝑁𝑁
Ft
29. Pseudo Code of the Decoder
Input:
Hard decision of a priori LLR:
Iteration: repeat until converse
Update variable-to-check node messages for t = 1, 2, …, N and :
Update check-to-variable node messages for l = 1, 2, …, M and :
Output
Hard decision of a posteriori LLR:
[ ]t
aL t= e
2( )
l t t l
t Q l t
L L′→ →
′∈
= ⊕∑
( )1( )
( ) 1t l t l t
al Q t l
L L L j′→ →
′∈
= ⊕ −
∑
1( )l Q t∀ ∈
2( )t Q l∀ ∈
1( )
ˆ[ ]t l t l t
a l Q t
L L L j t′→ →
′∈
= ⊕
∑ c
31. Verifiers
SHA-xxx
function
Condition
check
No
Yes
Block accept
Generate a check
matrix
𝐅𝐅 ∈ {𝟎𝟎, 𝟏𝟏} 𝑴𝑴×𝑵𝑵
vector e
Nearest codeword
mapping
̂𝐜𝐜=Dec(e, F)
Detected codeword ̂𝐜𝐜
and �𝐞𝐞
Block reject
Block header
Version, difficulty,
timestamp, nonce,
previous hash
value ....
Previous hash value
Diagram of New Verifiers
32. New Functions in ECCPoW
New functions
1. int **H = GenCheckMatrix(int n, int wc, int wr,
int seed);
2. bool DEC(int **H, int *e, int n, int wc, int wr,
int *c);
3. void Dec_Difficulty(int &n, int &wc, int &wr,
int level);
These functions are the key parts of the proposed
solution.
1. They are implemented in C++.
2. They are used to implement a mining
routine
An example of mining
1. generate block header with zero nonce.
2. Dec_Difficulty(&n,&wc,&wr,difficulty)
3. Seed = f(phv)
4. H = GenCheckMatrix(n, wc, wr, seed)
5. nonce = nonce + 1
6. e = SHA256(version, time, difficulty, nonce,
mtv)
7. flag = DEC(H,e,n,wc,wr)
8. If flag == 0; go to step 4
9. Update chv and nonce.
10. Generate block and broadcast.
33. ECCPoW Hardfork
New ECCPoW
A new structure of the block header has been
introduced and,
three new functions are also have been
introduced.
We aim to link these functions to existing the
blockchain. For example,
mining function,
chain validation function,
consensus function and so on.
SHA-xxx
LDPC DECODER
Generate H
H of size
(n – n×wc/ wr) × n
Block hash of
the previous
block
HTc = 0?
Message Passing
c of size n
Nonce
Generator
Nonce
Bloch Header
No
Yes
Block Generation &
Broadcast
e of size n
Implemented
parts
Parts connected to
the Blockchain.core for
creating the block
header
Parts connected to
the Blockchain.core
for generating &
broadcasting block
34. DeSecure Blockchain Release Plan
34
ECC PoW
Version 0.5
• Coarse & manual difficulty control
• Algorithm only
• Fine & automated difficulty control
• Practical algorithm mounted on real
blockchain (hardfork)
Github Open Source Code Development
ECC PoW
Version 1.0
2019
ECC PoW
Version 2.0
• Controls the security by adjusting
the factor based on probability analysis
2020
Experts invited Onther
Blockchain
Enthusiasts
35. Impact of ECCPoW 1:
It is easier to start a new blockchain network.
A large blockchain network is stable and not easy to disrupt.
Today there are mining equipment renting sites.
A new borne blockchain network needs to grow, but newbies are much more vulnerable to 51% attacks.
DeSecure blockchain networks with ECCPoW do not suffer from such problems since there are no mining
equipment available for ECCPoW.
36. Impact of ECCPoW 2:
One can make multiple blockchain networks
It is easy to make a new blockchain with ECCPoW.
Suppose hardforking a Bitcoin, and an Ethereum, with ECCPoW.
Let us call them BTC-ECC and ETH-ECC protocols.
Make the first blockchain network by running ETH-ECC over a network (Pusan coin)
Make the second blockchain network by running BTC-ECC over other network (Gwangju coin)
Make the third blockchain network by running ETH-ECC over another network (Seoul coin)
Make the fourth blockchain network by running BTH-ECC over yet another network (Korea coin)
Each cryptocurrency is independent with its own genesis block and random starting seed, and can be
adjusted sufficiently strong for its regional requirement in the sense of scalability, security and
decentralization.
These blockchains are inter-connected at the local, regional, and national, transnational level.
37. Impact of ECCPoW 3:
Resolving the Scalability Trilemma
Trilemma by V. Buterin is well known: Only up to two out of the three virtues such as Scalibility,
Decentralization and Security can be achieved simultaneously.
With ECC, each blockchain is already very strong in decentralization.
Each EEC blockchain is flexible enough to fit into various settings of transaction speeds and security levels.
Campus ECC blockchain networks can be set to work very fast allowing up to 100s of thousands of TXs per
second since the delay of the underlying communications network is very small.
Regional ECC blockchain networks can be set to work fast, i.e. allowing up to 10s of thousands of TXs per sec.
National ECC blockchain networks can be set sufficiently fast for covering inter-regional transactions.
Transnational ECC blockchain networks shall be set to work slow due to large delays.
All these DeSecure chains started up with its own seed and decentralized levels are mutually independent
and each one can be set to work at the required level of security and speed to serve its purpose.
These DeSecure chains can be inter-connected via distributed value-exchange networks.
The connected ECC blockchains can be named the ECC Blockchain International.
ECC Blockchain International as a whole can serve to resolve the Scalability Trilemma.
38. Impact of ECCPoW 4:
It is safe to use a time-proven blockchain protocol.
Bitcoin protocol has withstood the tough test of time.
Thus, the networking part and the wallet part are robust enough.
PoW is problem. Yes.
But it is not the problem of PoW.
It is the fixedness of the PoW puzzle.
ECCPoW puzzles can be made to vary over time.
The problematic consensus part with a fixed PoW can be replaced with the new ECC PoW consensus.
39. Impact of ECCPoW 5:
The complexity of ECCPoW puzzles can be set to grow very
large; thus the cost for hardware acceleration is boundless.
ECCPoW is a computer algorithm!
Thus it is not impossible to find a hardware acceleration solution for it.
ECCPoW puzzle can be represented as a randomly connected bipartite graph.
In order to parallelize the algorithm, more memory and computation resource need to be allocated.
The size of ECCPoW puzzle can grow very large.
As the size of the puzzle grows, the more needed is the memory and computation resource.
With ECCPoW puzzles, therefore, one can easily deter the emergence of hardware acceleration solution.
Deterrence to hardware acceleration offers a blockchain network with small power consumption
requirement.
40. Development Schedule
● Open research platform
○ Source codes github uploaded
○ Open development
● 2019 plan
○ ECCPoW 0.5 Version
○ Ethereum and Bitcoin Hardforks with ECCPoW 0.5v
○ Develop them into Ethereum ECCPoW 1.0v and Bitcoin ECCPow 1.0v
● 2020 plan
○ Network growth at least by 10,000 nodes worldwide
○ Co-working with Bitcoin and Ethereum communities
41. Plan to Offer DeSecure
Chains and Meet-Ups
● May 28th, Tuesday, 2019
● Place: Startup Alliance
● 주소: Teheran-Ro 423, 7th floor of
Hyundai Tower, 701Ho, Gangnam-Gu,
Seoul (선릉역 10번 출구와 삼성역 7번
출구 사이)
● 시간: 15:00 ~ 17:00
● Anyone can attend, notify us at 정현준
junghj85@gmail.com appreciated.
42. Concluding Remarks
PoW is fundamental for blockchains’ immutability.
• You put PoW to a block, you get the benefit of data immutability.
• Recentralization issue is problem due to fixeness of PoW puzzles, not due to PoW itself.
Trilemma by V. Buterin is well known. We seek to get two Security and Decentralization.
• Flexible puzzles enabled by ECCPoW can resolve the recentralization problem;
• PoW has shown to be the most secure.
Scalability is left to the ecosystem of DeSecure blockchains.
• Multiple layers of ECCPoW blockchains can operate simultaneously resolving the issues of scalability and thus breaking the
trilemma.
ECCPoW blockchains can play a crucial role in ushering in the ideals of blockchains and
advance our society to the next level!
43. Thank you!
Q&A
We are actively looking for programmers to join us.
Send me an e-mail!
Heung-No Lee, GIST, South Korea
Home page: http:/ / infonet.gist.ac.kr
Facebook/ Publication ID: Heung-No Lee
E-mail: heungno@gist.ac.kr