SlideShare a Scribd company logo
Fundamentals of Cryptoeconomics
Pranay Prateek
Why?
Why do Bitcoin miners follow the protocol rather
than include transactions benefiting them?
Afterall, no one directly controls them - No governance
Incentives
Outline
● What is Cryptoeconomics?
● Features of cryptoeconomic systems
● Modelling a cryptoeconomic system
● Mechanism Design
● Discussion of Casper protocol
● Mechanism design in blockchain projects
● Q&A
What is Cryptoeconomics?
Crypto Economics is the application of incentive
mechanism design to information security problems
Bitcoin as an instance of cryptoeconomic system
What is the information security problem?
Transfer of value in a trustless and decentralised manner
Design
● Need to agree on a universal - Nakamoto consensus
● Uses tokens (BTC) to incentivise miners to keep the system running
● Proof-of-work as an anti-Sybil mechanism
● Following the protocol should be the equilibrium
Bitcoin Mining
https://www.slideshare.net/wenyingng/bitcoin-20-47421199
Features of a cryptoeconomic system
Stability - Is following the protocol an equilibrium
Persistence - If the system falls out of equilibrium, does it recover
Optimality - Does following the protocol maximise the quality of outcomes
Robustness - Can the protocol withstand perturbations in player’s incentives
Efficiency - Is the incentive mechanism economically efficient? Is it efficiently
computable?
[Vlad Zamfir, BIP’001]
Modelling a cryptoeconomic system
1. Level of coordination of participants
2. Budget and cost of attacks
3. Incentives
4. Attack Models
5. Consensus mechanism
Coordination Level and Cost
Traditional Fault Tolerance Research (in context of distributed systems)
Honest majority model - assumes at least 51% of participants are honest.
Cryptoeconomic systems are more complex
Parameters for examining fault tolerance
1. The level of coordination between participants
2. The budget of the attacker (maximum amount the attacker would have to pay)
3. The cost of the attacker (the actual cost incurred by the attacker)
Incentives
1. Payments, such as mining rewards
2. Privileges, which allow their holders to extract rents, such
as transaction fees.
Incentives dictate the behavior of the participants of
the decentralised system
Attack Models
Uncoordinated majority models
● Participants make independent choice
● No player controls more than given % of the network
● Participants are self-interested
● Not necessarily honest
Coordinated choice models
● Actors are colluding
Bribing attacker model
Schelling Coin game
Property: provide the “true answer” to a given question
eg. who won the election?
Algorithm:
● Everyone votes 1 or 0
● Majority answer is taken as correct
● Everyone who voted with majority given reward of P, all
others get nothing
[Vitalik Buterin, Cryptoeconomics]
Uncoordinated choice model
Uncoordinated choice: you have the incentive to vote the truth, because everyone
else will vote the truth and you only get a reward of P if you agree with them
Why will everyone else vote the truth? Because they are reasoning in the same way
that you are!
You vote 0 You vote 1
Others vote 0 P 0
Others vote 1 0 P
Example : Bribing attacker model
A model that starts off with an uncoordinated choice assumption, but also assumes
that there is an attacker capable of making payments to actors conditional of them
taking certain actions
● Suppose there are 2 outcomes 0 and 1
● Briber asks everyone to vote for 1. If 1 is not the majority vote, then he will pay
them P+e, otherwise nothing.
[Vitalik Buterin, Cryptoeconomics]
P + epsilon attack
Base Game With bribe
A bribing attacker can corrupt the Schelling coin game with a budget of P + ε and
zero cost!
You vote 0 You vote 1
Others vote 0 P 0
Others vote 1 0 P
You vote 0 You vote 1
Others vote 0 P P+ε
Others vote 1 0 P
Possible attacks on Bitcoin network
1. 51% attack - Censorship
2. Selfish Mining attack - Needs only 25% collusion
3. Zeitgeist attack - This is a 51% attack where the attacker
sets the block timestamps artificially to lower the difficulty
Consensus types
Nakamoto Consensus - Doesn’t reach finality. There is always a chance of
blockchain getting forked
Practical BFT Consensus - Hyperledger, Stellar and Ripple
Proof of Stake Consensus - e.g. Casper
● Slashing conditions
● Forfeiture of deposits
● Fully and partially attributable faults
Mechanism Design
Key Question
How do you design systems, that have strategic participants, so that the end result
is something you want.
● Reverse Game Theory
● Auction theory is an application of mechanism design
Examples of Mechanism Design
Auction Design - Objective is to give the item to players who has highest
valuation for the item on sale. Sealed bidding
What should be the auction rule?
1. The highest bidder wins. The price they win is equal to the amount they bid.
2. The highest bidder wins. The price they pay is equal to the 2nd highest bid.
Ethereum - Casper
Casper is a PoS consensus algorithm designed for Ethereum blockchain
Proof of Stake (PoS) is a category of consensus algorithms for public blockchains
that depend on a validator's economic stake in the network
Slashing conditions - Penalising violators
Build on both chain - Nothing at Stake
https://github.com/ethereum/wiki/wiki/Proof-of-Stake-FAQ
Proof of Work
https://github.com/ethereum/wiki/wiki/Proof-of-Stake-FAQ
Penalizing violators - Slasher
https://github.com/ethereum/wiki/wiki/Proof-of-Stake-FAQ
Token Design
A token is nothing but a term denoting a unit of value issued by a project or
company.
● This unit of value can be used to reward users who participate in the
project and perform particular actions
● It can be used as transaction fees for getting a specific service on the
network
How to design a token mechanism which serves the objective of the
platform?
Token Design Example
Content Portal - CP token
Objective - To create good content on different topics
People who are interested in different topics can back them.
3 Topics
e.g CRYPTOCURRENCY, POLITICS, INDIA
- Curators assigned to each topic - Other people back these curators
- You get reward in CP token if more people like your topic. The reward is
proportional to number of tokens you back a post with
Truth is not necessarily the schelling point. So people will stake money
which people will find more attractive
So, the platform becomes useless as a good source of content and only acts
as a way for people to increase sensationalization.
https://steemit.com/trending/cryptocurrency
Topic 1
Post 1 Post 2 Post 3
5 1 2
Topic 2
Post 1 Post 2 Post 3
4 1 3
How can we fix this?
Summary
● Incentives are a powerful tool
● Following the protocol should be an equilibrium
● The protocol should be robust to external
incentives
● Following the protocol should achieve the
intended objective
Further Readings
1. Course on Mechanism design - https://theory.stanford.edu/~tim/f13/f13.html
2. Proof of Stake FAQ - https://github.com/ethereum/wiki/wiki/Proof-of-Stake-FAQ
3. Cryptoeconomics reading list -
https://github.com/ethereummadrid/cryptoeconomics-reading-list
Thanks!
@pranay01 pranay01.com

More Related Content

What's hot

Blockchain in Banking, Business and Beyond
Blockchain in Banking, Business and BeyondBlockchain in Banking, Business and Beyond
Blockchain in Banking, Business and Beyond
Michael Novak
 
Chatbot Testing
Chatbot TestingChatbot Testing
Chatbot Testing
VodqaBLR
 
Genetic Algorithm (GA) Optimization - Step-by-Step Example
Genetic Algorithm (GA) Optimization - Step-by-Step ExampleGenetic Algorithm (GA) Optimization - Step-by-Step Example
Genetic Algorithm (GA) Optimization - Step-by-Step Example
Ahmed Gad
 
Graph coloring problem(DAA).pptx
Graph coloring problem(DAA).pptxGraph coloring problem(DAA).pptx
Graph coloring problem(DAA).pptx
Home
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber security
Prateek Panda
 
Fully Homomorphic Encryption (1).pptx
Fully Homomorphic Encryption (1).pptxFully Homomorphic Encryption (1).pptx
Fully Homomorphic Encryption (1).pptx
ssuser1716c81
 
TP / Traitement d'image : Discrimination de Texture
TP / Traitement d'image : Discrimination de TextureTP / Traitement d'image : Discrimination de Texture
TP / Traitement d'image : Discrimination de Texture
Ahmed EL ATARI
 
Blockchains and Smart Contracts: Architecture Design and Model-Driven Develop...
Blockchains and Smart Contracts: Architecture Design and Model-Driven Develop...Blockchains and Smart Contracts: Architecture Design and Model-Driven Develop...
Blockchains and Smart Contracts: Architecture Design and Model-Driven Develop...
Ingo Weber
 
data structures- back tracking
data structures- back trackingdata structures- back tracking
data structures- back tracking
Abinaya B
 
Artificial intelligence(04)
Artificial intelligence(04)Artificial intelligence(04)
Artificial intelligence(04)
Nazir Ahmed
 
Petri Nets: Properties, Analysis and Applications
Petri Nets: Properties, Analysis and ApplicationsPetri Nets: Properties, Analysis and Applications
Petri Nets: Properties, Analysis and Applications
Dr. Mohamed Torky
 
Blockchain concepts
Blockchain conceptsBlockchain concepts
Blockchain concepts
Murughan Palaniachari
 
Memetic algorithms
Memetic algorithmsMemetic algorithms
Memetic algorithms
MohammedAlKazal
 
Dynamic programming
Dynamic programmingDynamic programming
Dynamic programming
Amit Kumar Rathi
 
Ethereum
EthereumEthereum
Chat bot technologies overview
Chat bot technologies overviewChat bot technologies overview
Chat bot technologies overview
durga subburaman
 
Carte Conceptuelle du Module.pdf
Carte Conceptuelle du Module.pdfCarte Conceptuelle du Module.pdf
Carte Conceptuelle du Module.pdf
zakinygma
 
Bitcoin powerpoint
Bitcoin powerpointBitcoin powerpoint
Bitcoin powerpoint
dcarro11
 
Backtracking
Backtracking  Backtracking
Backtracking
Vikas Sharma
 
Backtracking-N Queens Problem-Graph Coloring-Hamiltonian cycle
Backtracking-N Queens Problem-Graph Coloring-Hamiltonian cycleBacktracking-N Queens Problem-Graph Coloring-Hamiltonian cycle
Backtracking-N Queens Problem-Graph Coloring-Hamiltonian cycle
varun arora
 

What's hot (20)

Blockchain in Banking, Business and Beyond
Blockchain in Banking, Business and BeyondBlockchain in Banking, Business and Beyond
Blockchain in Banking, Business and Beyond
 
Chatbot Testing
Chatbot TestingChatbot Testing
Chatbot Testing
 
Genetic Algorithm (GA) Optimization - Step-by-Step Example
Genetic Algorithm (GA) Optimization - Step-by-Step ExampleGenetic Algorithm (GA) Optimization - Step-by-Step Example
Genetic Algorithm (GA) Optimization - Step-by-Step Example
 
Graph coloring problem(DAA).pptx
Graph coloring problem(DAA).pptxGraph coloring problem(DAA).pptx
Graph coloring problem(DAA).pptx
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber security
 
Fully Homomorphic Encryption (1).pptx
Fully Homomorphic Encryption (1).pptxFully Homomorphic Encryption (1).pptx
Fully Homomorphic Encryption (1).pptx
 
TP / Traitement d'image : Discrimination de Texture
TP / Traitement d'image : Discrimination de TextureTP / Traitement d'image : Discrimination de Texture
TP / Traitement d'image : Discrimination de Texture
 
Blockchains and Smart Contracts: Architecture Design and Model-Driven Develop...
Blockchains and Smart Contracts: Architecture Design and Model-Driven Develop...Blockchains and Smart Contracts: Architecture Design and Model-Driven Develop...
Blockchains and Smart Contracts: Architecture Design and Model-Driven Develop...
 
data structures- back tracking
data structures- back trackingdata structures- back tracking
data structures- back tracking
 
Artificial intelligence(04)
Artificial intelligence(04)Artificial intelligence(04)
Artificial intelligence(04)
 
Petri Nets: Properties, Analysis and Applications
Petri Nets: Properties, Analysis and ApplicationsPetri Nets: Properties, Analysis and Applications
Petri Nets: Properties, Analysis and Applications
 
Blockchain concepts
Blockchain conceptsBlockchain concepts
Blockchain concepts
 
Memetic algorithms
Memetic algorithmsMemetic algorithms
Memetic algorithms
 
Dynamic programming
Dynamic programmingDynamic programming
Dynamic programming
 
Ethereum
EthereumEthereum
Ethereum
 
Chat bot technologies overview
Chat bot technologies overviewChat bot technologies overview
Chat bot technologies overview
 
Carte Conceptuelle du Module.pdf
Carte Conceptuelle du Module.pdfCarte Conceptuelle du Module.pdf
Carte Conceptuelle du Module.pdf
 
Bitcoin powerpoint
Bitcoin powerpointBitcoin powerpoint
Bitcoin powerpoint
 
Backtracking
Backtracking  Backtracking
Backtracking
 
Backtracking-N Queens Problem-Graph Coloring-Hamiltonian cycle
Backtracking-N Queens Problem-Graph Coloring-Hamiltonian cycleBacktracking-N Queens Problem-Graph Coloring-Hamiltonian cycle
Backtracking-N Queens Problem-Graph Coloring-Hamiltonian cycle
 

Similar to Fundamentals of Cryptoeconomics

Blockchain Intro + Myths
Blockchain Intro + MythsBlockchain Intro + Myths
Blockchain Intro + Myths
APIGarage
 
Managing Initial Coin Offerings
Managing Initial Coin OfferingsManaging Initial Coin Offerings
Managing Initial Coin Offerings
Dr. Nikolaus Lipusch
 
Ico processes n_li
Ico processes n_liIco processes n_li
Ico processes n_li
nikinew1
 
Blockchain Projects - Core Pillars of Shipping Product, Feb 2018
Blockchain Projects - Core Pillars of Shipping Product, Feb 2018Blockchain Projects - Core Pillars of Shipping Product, Feb 2018
Blockchain Projects - Core Pillars of Shipping Product, Feb 2018
🔗Audrey Chaing
 
Crypto Token Economy Design for Disruptive BM
Crypto Token Economy Design for Disruptive BMCrypto Token Economy Design for Disruptive BM
Crypto Token Economy Design for Disruptive BM
Jongseung Kim
 
Bitcoin 2.0
Bitcoin 2.0 Bitcoin 2.0
Week 4 - DApps, Smart Contracts, and Decentralized Incentive Systems
Week 4 - DApps, Smart Contracts, and Decentralized Incentive SystemsWeek 4 - DApps, Smart Contracts, and Decentralized Incentive Systems
Week 4 - DApps, Smart Contracts, and Decentralized Incentive Systems
Roger Royse
 
Designing Blockchain Incentive Systems
Designing Blockchain Incentive SystemsDesigning Blockchain Incentive Systems
Designing Blockchain Incentive Systems
Paulo Fonseca
 
What is Blockchain?
What is Blockchain?What is Blockchain?
What is Blockchain?
CharanKawalSinghBhat
 
What is Blockchain
What is BlockchainWhat is Blockchain
What is Blockchain
CharanKawalSinghBhat
 
Blockchain tutorial for MBA
Blockchain tutorial for MBABlockchain tutorial for MBA
Blockchain tutorial for MBA
Blokcert
 
Ethereum Mining How To
Ethereum Mining How ToEthereum Mining How To
Ethereum Mining How To
Nugroho Gito
 
Application of machine learning algorithms for Bitcoin Automated Trading.
Application of machine learning algorithms for Bitcoin Automated Trading.Application of machine learning algorithms for Bitcoin Automated Trading.
Application of machine learning algorithms for Bitcoin Automated Trading.
PranavGarg36
 
Introduction to Blockchain and BitCoin New Business Opportunties
Introduction to Blockchain and BitCoin New Business OpportuntiesIntroduction to Blockchain and BitCoin New Business Opportunties
Introduction to Blockchain and BitCoin New Business Opportunties
Value Amplify Consulting
 
BitCoin Price Predictor.pptx
BitCoin Price Predictor.pptxBitCoin Price Predictor.pptx
BitCoin Price Predictor.pptx
Irfan Anjum
 
01 what is blockchain
01 what is blockchain01 what is blockchain
01 what is blockchain
BastianBlankenburg
 
Governance for public Blockchains and DAOs - by Vitalik Buterin
Governance for public Blockchains and DAOs - by Vitalik ButerinGovernance for public Blockchains and DAOs - by Vitalik Buterin
Governance for public Blockchains and DAOs - by Vitalik Buterin
Martin Köppelmann
 
Token(ed) meetup jan 31st
Token(ed) meetup jan 31stToken(ed) meetup jan 31st
Token(ed) meetup jan 31st
Propulsive
 
crypto ppt.ppt
crypto ppt.pptcrypto ppt.ppt
crypto ppt.ppt
SakshiRawat394090
 
Can we safely adapt the construction of permissionless blockchain to user dem...
Can we safely adapt the construction of permissionless blockchain to user dem...Can we safely adapt the construction of permissionless blockchain to user dem...
Can we safely adapt the construction of permissionless blockchain to user dem...
I MT
 

Similar to Fundamentals of Cryptoeconomics (20)

Blockchain Intro + Myths
Blockchain Intro + MythsBlockchain Intro + Myths
Blockchain Intro + Myths
 
Managing Initial Coin Offerings
Managing Initial Coin OfferingsManaging Initial Coin Offerings
Managing Initial Coin Offerings
 
Ico processes n_li
Ico processes n_liIco processes n_li
Ico processes n_li
 
Blockchain Projects - Core Pillars of Shipping Product, Feb 2018
Blockchain Projects - Core Pillars of Shipping Product, Feb 2018Blockchain Projects - Core Pillars of Shipping Product, Feb 2018
Blockchain Projects - Core Pillars of Shipping Product, Feb 2018
 
Crypto Token Economy Design for Disruptive BM
Crypto Token Economy Design for Disruptive BMCrypto Token Economy Design for Disruptive BM
Crypto Token Economy Design for Disruptive BM
 
Bitcoin 2.0
Bitcoin 2.0 Bitcoin 2.0
Bitcoin 2.0
 
Week 4 - DApps, Smart Contracts, and Decentralized Incentive Systems
Week 4 - DApps, Smart Contracts, and Decentralized Incentive SystemsWeek 4 - DApps, Smart Contracts, and Decentralized Incentive Systems
Week 4 - DApps, Smart Contracts, and Decentralized Incentive Systems
 
Designing Blockchain Incentive Systems
Designing Blockchain Incentive SystemsDesigning Blockchain Incentive Systems
Designing Blockchain Incentive Systems
 
What is Blockchain?
What is Blockchain?What is Blockchain?
What is Blockchain?
 
What is Blockchain
What is BlockchainWhat is Blockchain
What is Blockchain
 
Blockchain tutorial for MBA
Blockchain tutorial for MBABlockchain tutorial for MBA
Blockchain tutorial for MBA
 
Ethereum Mining How To
Ethereum Mining How ToEthereum Mining How To
Ethereum Mining How To
 
Application of machine learning algorithms for Bitcoin Automated Trading.
Application of machine learning algorithms for Bitcoin Automated Trading.Application of machine learning algorithms for Bitcoin Automated Trading.
Application of machine learning algorithms for Bitcoin Automated Trading.
 
Introduction to Blockchain and BitCoin New Business Opportunties
Introduction to Blockchain and BitCoin New Business OpportuntiesIntroduction to Blockchain and BitCoin New Business Opportunties
Introduction to Blockchain and BitCoin New Business Opportunties
 
BitCoin Price Predictor.pptx
BitCoin Price Predictor.pptxBitCoin Price Predictor.pptx
BitCoin Price Predictor.pptx
 
01 what is blockchain
01 what is blockchain01 what is blockchain
01 what is blockchain
 
Governance for public Blockchains and DAOs - by Vitalik Buterin
Governance for public Blockchains and DAOs - by Vitalik ButerinGovernance for public Blockchains and DAOs - by Vitalik Buterin
Governance for public Blockchains and DAOs - by Vitalik Buterin
 
Token(ed) meetup jan 31st
Token(ed) meetup jan 31stToken(ed) meetup jan 31st
Token(ed) meetup jan 31st
 
crypto ppt.ppt
crypto ppt.pptcrypto ppt.ppt
crypto ppt.ppt
 
Can we safely adapt the construction of permissionless blockchain to user dem...
Can we safely adapt the construction of permissionless blockchain to user dem...Can we safely adapt the construction of permissionless blockchain to user dem...
Can we safely adapt the construction of permissionless blockchain to user dem...
 

Recently uploaded

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 

Recently uploaded (20)

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 

Fundamentals of Cryptoeconomics

  • 3. Why do Bitcoin miners follow the protocol rather than include transactions benefiting them? Afterall, no one directly controls them - No governance
  • 5. Outline ● What is Cryptoeconomics? ● Features of cryptoeconomic systems ● Modelling a cryptoeconomic system ● Mechanism Design ● Discussion of Casper protocol ● Mechanism design in blockchain projects ● Q&A
  • 6. What is Cryptoeconomics? Crypto Economics is the application of incentive mechanism design to information security problems
  • 7. Bitcoin as an instance of cryptoeconomic system What is the information security problem? Transfer of value in a trustless and decentralised manner Design ● Need to agree on a universal - Nakamoto consensus ● Uses tokens (BTC) to incentivise miners to keep the system running ● Proof-of-work as an anti-Sybil mechanism ● Following the protocol should be the equilibrium
  • 9. Features of a cryptoeconomic system Stability - Is following the protocol an equilibrium Persistence - If the system falls out of equilibrium, does it recover Optimality - Does following the protocol maximise the quality of outcomes Robustness - Can the protocol withstand perturbations in player’s incentives Efficiency - Is the incentive mechanism economically efficient? Is it efficiently computable? [Vlad Zamfir, BIP’001]
  • 10. Modelling a cryptoeconomic system 1. Level of coordination of participants 2. Budget and cost of attacks 3. Incentives 4. Attack Models 5. Consensus mechanism
  • 11. Coordination Level and Cost Traditional Fault Tolerance Research (in context of distributed systems) Honest majority model - assumes at least 51% of participants are honest. Cryptoeconomic systems are more complex Parameters for examining fault tolerance 1. The level of coordination between participants 2. The budget of the attacker (maximum amount the attacker would have to pay) 3. The cost of the attacker (the actual cost incurred by the attacker)
  • 12. Incentives 1. Payments, such as mining rewards 2. Privileges, which allow their holders to extract rents, such as transaction fees. Incentives dictate the behavior of the participants of the decentralised system
  • 13. Attack Models Uncoordinated majority models ● Participants make independent choice ● No player controls more than given % of the network ● Participants are self-interested ● Not necessarily honest Coordinated choice models ● Actors are colluding Bribing attacker model
  • 14. Schelling Coin game Property: provide the “true answer” to a given question eg. who won the election? Algorithm: ● Everyone votes 1 or 0 ● Majority answer is taken as correct ● Everyone who voted with majority given reward of P, all others get nothing [Vitalik Buterin, Cryptoeconomics]
  • 15. Uncoordinated choice model Uncoordinated choice: you have the incentive to vote the truth, because everyone else will vote the truth and you only get a reward of P if you agree with them Why will everyone else vote the truth? Because they are reasoning in the same way that you are! You vote 0 You vote 1 Others vote 0 P 0 Others vote 1 0 P
  • 16. Example : Bribing attacker model A model that starts off with an uncoordinated choice assumption, but also assumes that there is an attacker capable of making payments to actors conditional of them taking certain actions ● Suppose there are 2 outcomes 0 and 1 ● Briber asks everyone to vote for 1. If 1 is not the majority vote, then he will pay them P+e, otherwise nothing. [Vitalik Buterin, Cryptoeconomics]
  • 17. P + epsilon attack Base Game With bribe A bribing attacker can corrupt the Schelling coin game with a budget of P + ε and zero cost! You vote 0 You vote 1 Others vote 0 P 0 Others vote 1 0 P You vote 0 You vote 1 Others vote 0 P P+ε Others vote 1 0 P
  • 18. Possible attacks on Bitcoin network 1. 51% attack - Censorship 2. Selfish Mining attack - Needs only 25% collusion 3. Zeitgeist attack - This is a 51% attack where the attacker sets the block timestamps artificially to lower the difficulty
  • 19. Consensus types Nakamoto Consensus - Doesn’t reach finality. There is always a chance of blockchain getting forked Practical BFT Consensus - Hyperledger, Stellar and Ripple Proof of Stake Consensus - e.g. Casper ● Slashing conditions ● Forfeiture of deposits ● Fully and partially attributable faults
  • 20. Mechanism Design Key Question How do you design systems, that have strategic participants, so that the end result is something you want. ● Reverse Game Theory ● Auction theory is an application of mechanism design
  • 21. Examples of Mechanism Design Auction Design - Objective is to give the item to players who has highest valuation for the item on sale. Sealed bidding What should be the auction rule? 1. The highest bidder wins. The price they win is equal to the amount they bid. 2. The highest bidder wins. The price they pay is equal to the 2nd highest bid.
  • 22. Ethereum - Casper Casper is a PoS consensus algorithm designed for Ethereum blockchain Proof of Stake (PoS) is a category of consensus algorithms for public blockchains that depend on a validator's economic stake in the network Slashing conditions - Penalising violators
  • 23. Build on both chain - Nothing at Stake https://github.com/ethereum/wiki/wiki/Proof-of-Stake-FAQ
  • 25. Penalizing violators - Slasher https://github.com/ethereum/wiki/wiki/Proof-of-Stake-FAQ
  • 26. Token Design A token is nothing but a term denoting a unit of value issued by a project or company. ● This unit of value can be used to reward users who participate in the project and perform particular actions ● It can be used as transaction fees for getting a specific service on the network How to design a token mechanism which serves the objective of the platform?
  • 27. Token Design Example Content Portal - CP token Objective - To create good content on different topics People who are interested in different topics can back them. 3 Topics e.g CRYPTOCURRENCY, POLITICS, INDIA - Curators assigned to each topic - Other people back these curators - You get reward in CP token if more people like your topic. The reward is proportional to number of tokens you back a post with
  • 28. Truth is not necessarily the schelling point. So people will stake money which people will find more attractive So, the platform becomes useless as a good source of content and only acts as a way for people to increase sensationalization. https://steemit.com/trending/cryptocurrency Topic 1 Post 1 Post 2 Post 3 5 1 2 Topic 2 Post 1 Post 2 Post 3 4 1 3
  • 29. How can we fix this?
  • 30. Summary ● Incentives are a powerful tool ● Following the protocol should be an equilibrium ● The protocol should be robust to external incentives ● Following the protocol should achieve the intended objective
  • 31. Further Readings 1. Course on Mechanism design - https://theory.stanford.edu/~tim/f13/f13.html 2. Proof of Stake FAQ - https://github.com/ethereum/wiki/wiki/Proof-of-Stake-FAQ 3. Cryptoeconomics reading list - https://github.com/ethereummadrid/cryptoeconomics-reading-list