SlideShare a Scribd company logo
1 of 21
Download to read offline
Improving Authenticated Dynamic Dictionaries,
with Applications to Cryptocurrencies
Leonid Reyzin1
, Dmitry Meshkov2
,
Alexander Chepurnoy3
, Sasha Ivanov4
1.Boston University, http://www.cs.bu.edu/faculty/reyzin.
Research supported by the Waves platform.
2.IOHK Research and N. N. Semenov Institute of Chemical Physics, RAS,
dmitry.meshkov@iohk.io
3.IOHK Research, alex.chepurnoy@iohk.io
4.Waves platform, sasha@wavesplatform.com
Motivation
Transactions validation has 2 parts:
● Stateless validation: fee is positive,
signature is valid, ...
Requires only data kept in the transaction
● State validation: sender has enough coins.
Requires full state (1.5Gb in Bitcoin)
State
PubKey 1 3→
PubKey 2 6→
…
PubKey N 4→
Motivation
Transactions validation:
● Requires full state (even bigger problem for
multi-asset blockchains)
Multi-asset blockchain state
Asset 1 State
PubKey 1 3→
PubKey 2 6→
…
PubKey M 4→
Asset 2 State
PubKey 1 8→
PubKey 2 7→
…
PubKey L 2→
Asset N State
PubKey 1 3→
PubKey 2 7→
…
PubKey K 5→
Motivation
Where to store this big state?:
● HDD => slow validation => DoS
● RAM => only powerful computers => centralization
Authenticated Dictionaries to the Rescue
Header
Consensus data
Transactions
Merkle tree
Tx_root
Header
Consensus data
Transactions
Merkle tree
Tx_root Tx_proofs_root
Transaction
proofs
Our proposal
White, Bill. "A Theory for Lightweight Cryptocurrency Ledgers." (2015).
Authenticated Dictionaries: Merkle Tree
Authenticated Dictionaries: Merkle Tree
Proofs: authenticated state
● Make state authenticated
● Easy: proof of a sender's balance (standard
Merkle tree proof with respect to the root).
● More complicated: ensuring the prover changed
the balances correctly.
● Important: we do not wish to trust the prover!
Merkle RootAsset 1 State
PubKey 1 3→
PubKey 2 6→
…
PubKey M 4→
Pk1: 3 Pk2: 6 PkN: 4
Proofs: two-party
● Proof of a sender balance AND tree changes
● Should be enough to calculate new root hash
● Verifier keeps root hash only
Root N-1
Pk1: 3
Root N
Pk2Pk1
Pk2: 6 PkN: 4 Pk2: 2 Pk1: 7 PkN: 4
Proofs: two-party
● Prover
● Full verifier
● Light verifier
Root N-1
Pk1: 3
Root NTransactions
Pk2: 6 PkN: 4 Pk2: 2 Pk1: 7 PkN: 4
Asset 1 State
Asset 1 State
PubKey 1 3→
PubKey 2 6→
PubKey N 4→
Transactions
Asset 1 State
Asset 1 State
PubKey 1 2→
PubKey 2 7→
PubKey N 4→
Txs + proofsRoot N-1 Root N
Prior work
Skiplist1
Lookup proof size 1.5 log2
N
Insert proof size 1.5 log2
N
1) Papamanthou and Tamassia. "Time and space efficient algorithms for two-party
authenticated data structures." 2007.
Ms.
s
Prior work
Skiplist1
Red-black tree2
Lookup proof size 1.5 log2
N 1.7 log2
N
Insert proof size 1.5 log2
N 5 log2
N
1) Papamanthou and Tamassia. "Time and space efficient algorithms for two-party
authenticated data structures." 2007.
2)Miller, Hicks, Katz, Shi. "Authenticated data structures, generically." 2014.
Prior work
Skiplist1
Red-black tree2
Ethereum trie3
Lookup proof size 1.5 log2
N 1.7 log2
N 3 log2
N
Insert proof size 1.5 log2
N 5 log2
N ???
1) Papamanthou and Tamassia. "Time and space efficient algorithms for two-party
authenticated data structures." 2007.
2)Miller, Hicks, Katz, Shi. "Authenticated data structures, generically." 2014.
3)Wood. "Ethereum: A secure decentralised generalised transaction ledger." 2014.
Our improvements: AVL
Skiplist1
Red-black tree2
Ethereum trie3
Our AVL+ tree
Lookup proof size 1.5 log2
N 1.7 log2
N 3 log2
N log2
N
Insert proof size 1.5 log2
N 5 log2
N ??? log2
N
1) Papamanthou and Tamassia. "Time and space efficient algorithms for two-party
authenticated data structures." 2007.
2)Miller, Hicks, Katz, Shi. "Authenticated data structures, generically." 2014.
3)Wood. "Ethereum: A secure decentralised generalised transaction ledger." 2014.
Our improvements: AVL
Skiplist1
Red-black tree2
Ethereum trie3
Our AVL+ tree
Lookup proof size 1.5 log2
N 1.7 log2
N 3 log2
N log2
N
Insert proof size 1.5 log2
N 5 log2
N ??? log2
N
Deterministic
1) Papamanthou and Tamassia. "Time and space efficient algorithms for two-party
authenticated data structures." 2007.
2)Miller, Hicks, Katz, Shi. "Authenticated data structures, generically." 2014.
3)Wood. "Ethereum: A secure decentralised generalised transaction ledger." 2014.
Our improvements: AVL
Main ideas:
● AVL tree paths are shorter than skiplist paths
● Use deterministic rebalancing operations that
don't look off the main path
● For N=106
, proof size = 753 bytes
(32-byte hashes, 26-byte keys, 8-byte values)
Single operation proof size
Our improvements: batching
Root
● Transactions may change same public key
● Multiple proofs can be combined together
pk1 pk2 pk3 pk4 pk5 pk6 pk7 pk8
Root
pk1 pk2 pk3 pk4 pk5 pk6 pk7 pk8
Multiple operations proof size
● For tree N=106
and batch B=103
, compressed
proof size is 400 bytes, plain – 750 bytes
Simulated blockchain
● Verification on commodity hardware
● Mining on commodity hardware!
Thank you!
● Paper: http://ia.cr/2016/994
● Code: https://github.com/input-output-hk/scrypto
● Slides: http://www.slideshare.net/DmitryMeshkov
● Twitter: https://twitter.com/DmitryMeshkov
● Email: dmitry.meshkov@iohk.io

More Related Content

Similar to Improving Authenticated Dynamic Dictionaries, with Application to Cryptocurrencies

Demystifying Parallel and Distributed Deep Learning: An In-Depth Concurrency ...
Demystifying Parallel and Distributed Deep Learning: An In-Depth Concurrency ...Demystifying Parallel and Distributed Deep Learning: An In-Depth Concurrency ...
Demystifying Parallel and Distributed Deep Learning: An In-Depth Concurrency ...inside-BigData.com
 
NANO266 - Lecture 12 - High-throughput computational materials design
NANO266 - Lecture 12 - High-throughput computational materials designNANO266 - Lecture 12 - High-throughput computational materials design
NANO266 - Lecture 12 - High-throughput computational materials designUniversity of California, San Diego
 
Machine Learning and Data Mining: 15 Data Exploration and Preparation
Machine Learning and Data Mining: 15 Data Exploration and PreparationMachine Learning and Data Mining: 15 Data Exploration and Preparation
Machine Learning and Data Mining: 15 Data Exploration and PreparationPier Luca Lanzi
 
An overview of Peer-to-Peer technology new
An overview of Peer-to-Peer technology newAn overview of Peer-to-Peer technology new
An overview of Peer-to-Peer technology newchizhangufl
 
ELK-Stack-Essential-Concepts-TheELKStack-LunchandLearn.pdf
ELK-Stack-Essential-Concepts-TheELKStack-LunchandLearn.pdfELK-Stack-Essential-Concepts-TheELKStack-LunchandLearn.pdf
ELK-Stack-Essential-Concepts-TheELKStack-LunchandLearn.pdfcadejaumafiq
 
Large Scale Data Clustering: an overview
Large Scale Data Clustering: an overviewLarge Scale Data Clustering: an overview
Large Scale Data Clustering: an overviewVahid Mirjalili
 
Massively Parallel K-Nearest Neighbor Computation on Distributed Architectures
Massively Parallel K-Nearest Neighbor Computation on Distributed Architectures Massively Parallel K-Nearest Neighbor Computation on Distributed Architectures
Massively Parallel K-Nearest Neighbor Computation on Distributed Architectures Intel® Software
 
Introduction to search engine-building with Lucene
Introduction to search engine-building with LuceneIntroduction to search engine-building with Lucene
Introduction to search engine-building with LuceneKai Chan
 
ACT Talk, Giuseppe Totaro: High Performance Computing for Distributed Indexin...
ACT Talk, Giuseppe Totaro: High Performance Computing for Distributed Indexin...ACT Talk, Giuseppe Totaro: High Performance Computing for Distributed Indexin...
ACT Talk, Giuseppe Totaro: High Performance Computing for Distributed Indexin...Advanced-Concepts-Team
 
Computation and Knowledge
Computation and KnowledgeComputation and Knowledge
Computation and KnowledgeIan Foster
 
Introduction to search engine-building with Lucene
Introduction to search engine-building with LuceneIntroduction to search engine-building with Lucene
Introduction to search engine-building with LuceneKai Chan
 
Internet of Things Data Science
Internet of Things Data ScienceInternet of Things Data Science
Internet of Things Data ScienceAlbert Bifet
 
The Web of Data: do we actually understand what we built?
The Web of Data: do we actually understand what we built?The Web of Data: do we actually understand what we built?
The Web of Data: do we actually understand what we built?Frank van Harmelen
 
tezos_hands-on-training.pdf
tezos_hands-on-training.pdftezos_hands-on-training.pdf
tezos_hands-on-training.pdfNeven6
 
Encode x Tezos Hack: Hands-on dApp Training
Encode x Tezos Hack: Hands-on dApp Training Encode x Tezos Hack: Hands-on dApp Training
Encode x Tezos Hack: Hands-on dApp Training KlaraOrban
 
University of Oxford: building a next generation SIEM
University of Oxford: building a next generation SIEMUniversity of Oxford: building a next generation SIEM
University of Oxford: building a next generation SIEMElasticsearch
 
Data Mining to Discovery for Inorganic Solids: Software Tools and Applications
Data Mining to Discovery for Inorganic Solids: Software Tools and ApplicationsData Mining to Discovery for Inorganic Solids: Software Tools and Applications
Data Mining to Discovery for Inorganic Solids: Software Tools and Applicationsaimsnist
 

Similar to Improving Authenticated Dynamic Dictionaries, with Application to Cryptocurrencies (20)

Demystifying Parallel and Distributed Deep Learning: An In-Depth Concurrency ...
Demystifying Parallel and Distributed Deep Learning: An In-Depth Concurrency ...Demystifying Parallel and Distributed Deep Learning: An In-Depth Concurrency ...
Demystifying Parallel and Distributed Deep Learning: An In-Depth Concurrency ...
 
NANO266 - Lecture 12 - High-throughput computational materials design
NANO266 - Lecture 12 - High-throughput computational materials designNANO266 - Lecture 12 - High-throughput computational materials design
NANO266 - Lecture 12 - High-throughput computational materials design
 
Machine Learning and Data Mining: 15 Data Exploration and Preparation
Machine Learning and Data Mining: 15 Data Exploration and PreparationMachine Learning and Data Mining: 15 Data Exploration and Preparation
Machine Learning and Data Mining: 15 Data Exploration and Preparation
 
An overview of Peer-to-Peer technology new
An overview of Peer-to-Peer technology newAn overview of Peer-to-Peer technology new
An overview of Peer-to-Peer technology new
 
ELK-Stack-Essential-Concepts-TheELKStack-LunchandLearn.pdf
ELK-Stack-Essential-Concepts-TheELKStack-LunchandLearn.pdfELK-Stack-Essential-Concepts-TheELKStack-LunchandLearn.pdf
ELK-Stack-Essential-Concepts-TheELKStack-LunchandLearn.pdf
 
Large Scale Data Clustering: an overview
Large Scale Data Clustering: an overviewLarge Scale Data Clustering: an overview
Large Scale Data Clustering: an overview
 
HPC_NIST_SHA3
HPC_NIST_SHA3HPC_NIST_SHA3
HPC_NIST_SHA3
 
Massively Parallel K-Nearest Neighbor Computation on Distributed Architectures
Massively Parallel K-Nearest Neighbor Computation on Distributed Architectures Massively Parallel K-Nearest Neighbor Computation on Distributed Architectures
Massively Parallel K-Nearest Neighbor Computation on Distributed Architectures
 
Introduction to search engine-building with Lucene
Introduction to search engine-building with LuceneIntroduction to search engine-building with Lucene
Introduction to search engine-building with Lucene
 
UNIT V.pdf
UNIT V.pdfUNIT V.pdf
UNIT V.pdf
 
ACT Talk, Giuseppe Totaro: High Performance Computing for Distributed Indexin...
ACT Talk, Giuseppe Totaro: High Performance Computing for Distributed Indexin...ACT Talk, Giuseppe Totaro: High Performance Computing for Distributed Indexin...
ACT Talk, Giuseppe Totaro: High Performance Computing for Distributed Indexin...
 
Computation and Knowledge
Computation and KnowledgeComputation and Knowledge
Computation and Knowledge
 
Introduction to search engine-building with Lucene
Introduction to search engine-building with LuceneIntroduction to search engine-building with Lucene
Introduction to search engine-building with Lucene
 
Internet of Things Data Science
Internet of Things Data ScienceInternet of Things Data Science
Internet of Things Data Science
 
The Web of Data: do we actually understand what we built?
The Web of Data: do we actually understand what we built?The Web of Data: do we actually understand what we built?
The Web of Data: do we actually understand what we built?
 
tezos_hands-on-training.pdf
tezos_hands-on-training.pdftezos_hands-on-training.pdf
tezos_hands-on-training.pdf
 
Encode x Tezos Hack: Hands-on dApp Training
Encode x Tezos Hack: Hands-on dApp Training Encode x Tezos Hack: Hands-on dApp Training
Encode x Tezos Hack: Hands-on dApp Training
 
University of Oxford: building a next generation SIEM
University of Oxford: building a next generation SIEMUniversity of Oxford: building a next generation SIEM
University of Oxford: building a next generation SIEM
 
Data Mining to Discovery for Inorganic Solids: Software Tools and Applications
Data Mining to Discovery for Inorganic Solids: Software Tools and ApplicationsData Mining to Discovery for Inorganic Solids: Software Tools and Applications
Data Mining to Discovery for Inorganic Solids: Software Tools and Applications
 
SISAP17
SISAP17SISAP17
SISAP17
 

More from Dmitry Meshkov

Dymmax Protocol overview
Dymmax Protocol overviewDymmax Protocol overview
Dymmax Protocol overviewDmitry Meshkov
 
Ergo platform overview
Ergo platform overviewErgo platform overview
Ergo platform overviewDmitry Meshkov
 
The New Generation Of Blockchains – What Is It Capable Of?
The New Generation Of Blockchains – What Is It Capable Of?The New Generation Of Blockchains – What Is It Capable Of?
The New Generation Of Blockchains – What Is It Capable Of?Dmitry Meshkov
 
Ergo platform's approach
Ergo platform's approachErgo platform's approach
Ergo platform's approachDmitry Meshkov
 
Блокчейн - проблемы и потенциальные решения
Блокчейн - проблемы и потенциальные решенияБлокчейн - проблемы и потенциальные решения
Блокчейн - проблемы и потенциальные решенияDmitry Meshkov
 
On Space-Scarce Economy In Blockchain Systems
On Space-Scarce Economy In Blockchain SystemsOn Space-Scarce Economy In Blockchain Systems
On Space-Scarce Economy In Blockchain SystemsDmitry Meshkov
 
Исследовательские задачи в области блокчейна
Исследовательские задачи в области блокчейнаИсследовательские задачи в области блокчейна
Исследовательские задачи в области блокчейнаDmitry Meshkov
 
Real world blockchains
Real world blockchainsReal world blockchains
Real world blockchainsDmitry Meshkov
 
Blockchain introduction
Blockchain introductionBlockchain introduction
Blockchain introductionDmitry Meshkov
 
Real world blockchains
Real world blockchainsReal world blockchains
Real world blockchainsDmitry Meshkov
 
Blockchain: under the hood
Blockchain: under the hoodBlockchain: under the hood
Blockchain: under the hoodDmitry Meshkov
 
Real world blockchains
Real world blockchainsReal world blockchains
Real world blockchainsDmitry Meshkov
 

More from Dmitry Meshkov (17)

Dymmax Protocol overview
Dymmax Protocol overviewDymmax Protocol overview
Dymmax Protocol overview
 
Ergo details
Ergo detailsErgo details
Ergo details
 
Ergo Hong Kong meetup
Ergo Hong Kong meetupErgo Hong Kong meetup
Ergo Hong Kong meetup
 
Ergo platform overview
Ergo platform overviewErgo platform overview
Ergo platform overview
 
The New Generation Of Blockchains – What Is It Capable Of?
The New Generation Of Blockchains – What Is It Capable Of?The New Generation Of Blockchains – What Is It Capable Of?
The New Generation Of Blockchains – What Is It Capable Of?
 
Ergo platform's approach
Ergo platform's approachErgo platform's approach
Ergo platform's approach
 
Блокчейн - проблемы и потенциальные решения
Блокчейн - проблемы и потенциальные решенияБлокчейн - проблемы и потенциальные решения
Блокчейн - проблемы и потенциальные решения
 
On Space-Scarce Economy In Blockchain Systems
On Space-Scarce Economy In Blockchain SystemsOn Space-Scarce Economy In Blockchain Systems
On Space-Scarce Economy In Blockchain Systems
 
Исследовательские задачи в области блокчейна
Исследовательские задачи в области блокчейнаИсследовательские задачи в области блокчейна
Исследовательские задачи в области блокчейна
 
Real world blockchains
Real world blockchainsReal world blockchains
Real world blockchains
 
Blockchain introduction
Blockchain introductionBlockchain introduction
Blockchain introduction
 
Real world blockchains
Real world blockchainsReal world blockchains
Real world blockchains
 
Blockchain: under the hood
Blockchain: under the hoodBlockchain: under the hood
Blockchain: under the hood
 
Blockchain comparison
Blockchain comparisonBlockchain comparison
Blockchain comparison
 
Scrypto designed 4
Scrypto designed 4Scrypto designed 4
Scrypto designed 4
 
Real world blockchains
Real world blockchainsReal world blockchains
Real world blockchains
 
Scorex framework
Scorex frameworkScorex framework
Scorex framework
 

Recently uploaded

Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 

Recently uploaded (20)

Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 

Improving Authenticated Dynamic Dictionaries, with Application to Cryptocurrencies

  • 1. Improving Authenticated Dynamic Dictionaries, with Applications to Cryptocurrencies Leonid Reyzin1 , Dmitry Meshkov2 , Alexander Chepurnoy3 , Sasha Ivanov4 1.Boston University, http://www.cs.bu.edu/faculty/reyzin. Research supported by the Waves platform. 2.IOHK Research and N. N. Semenov Institute of Chemical Physics, RAS, dmitry.meshkov@iohk.io 3.IOHK Research, alex.chepurnoy@iohk.io 4.Waves platform, sasha@wavesplatform.com
  • 2. Motivation Transactions validation has 2 parts: ● Stateless validation: fee is positive, signature is valid, ... Requires only data kept in the transaction ● State validation: sender has enough coins. Requires full state (1.5Gb in Bitcoin) State PubKey 1 3→ PubKey 2 6→ … PubKey N 4→
  • 3. Motivation Transactions validation: ● Requires full state (even bigger problem for multi-asset blockchains) Multi-asset blockchain state Asset 1 State PubKey 1 3→ PubKey 2 6→ … PubKey M 4→ Asset 2 State PubKey 1 8→ PubKey 2 7→ … PubKey L 2→ Asset N State PubKey 1 3→ PubKey 2 7→ … PubKey K 5→
  • 4. Motivation Where to store this big state?: ● HDD => slow validation => DoS ● RAM => only powerful computers => centralization
  • 5. Authenticated Dictionaries to the Rescue Header Consensus data Transactions Merkle tree Tx_root Header Consensus data Transactions Merkle tree Tx_root Tx_proofs_root Transaction proofs Our proposal White, Bill. "A Theory for Lightweight Cryptocurrency Ledgers." (2015).
  • 8. Proofs: authenticated state ● Make state authenticated ● Easy: proof of a sender's balance (standard Merkle tree proof with respect to the root). ● More complicated: ensuring the prover changed the balances correctly. ● Important: we do not wish to trust the prover! Merkle RootAsset 1 State PubKey 1 3→ PubKey 2 6→ … PubKey M 4→ Pk1: 3 Pk2: 6 PkN: 4
  • 9. Proofs: two-party ● Proof of a sender balance AND tree changes ● Should be enough to calculate new root hash ● Verifier keeps root hash only Root N-1 Pk1: 3 Root N Pk2Pk1 Pk2: 6 PkN: 4 Pk2: 2 Pk1: 7 PkN: 4
  • 10. Proofs: two-party ● Prover ● Full verifier ● Light verifier Root N-1 Pk1: 3 Root NTransactions Pk2: 6 PkN: 4 Pk2: 2 Pk1: 7 PkN: 4 Asset 1 State Asset 1 State PubKey 1 3→ PubKey 2 6→ PubKey N 4→ Transactions Asset 1 State Asset 1 State PubKey 1 2→ PubKey 2 7→ PubKey N 4→ Txs + proofsRoot N-1 Root N
  • 11. Prior work Skiplist1 Lookup proof size 1.5 log2 N Insert proof size 1.5 log2 N 1) Papamanthou and Tamassia. "Time and space efficient algorithms for two-party authenticated data structures." 2007. Ms. s
  • 12. Prior work Skiplist1 Red-black tree2 Lookup proof size 1.5 log2 N 1.7 log2 N Insert proof size 1.5 log2 N 5 log2 N 1) Papamanthou and Tamassia. "Time and space efficient algorithms for two-party authenticated data structures." 2007. 2)Miller, Hicks, Katz, Shi. "Authenticated data structures, generically." 2014.
  • 13. Prior work Skiplist1 Red-black tree2 Ethereum trie3 Lookup proof size 1.5 log2 N 1.7 log2 N 3 log2 N Insert proof size 1.5 log2 N 5 log2 N ??? 1) Papamanthou and Tamassia. "Time and space efficient algorithms for two-party authenticated data structures." 2007. 2)Miller, Hicks, Katz, Shi. "Authenticated data structures, generically." 2014. 3)Wood. "Ethereum: A secure decentralised generalised transaction ledger." 2014.
  • 14. Our improvements: AVL Skiplist1 Red-black tree2 Ethereum trie3 Our AVL+ tree Lookup proof size 1.5 log2 N 1.7 log2 N 3 log2 N log2 N Insert proof size 1.5 log2 N 5 log2 N ??? log2 N 1) Papamanthou and Tamassia. "Time and space efficient algorithms for two-party authenticated data structures." 2007. 2)Miller, Hicks, Katz, Shi. "Authenticated data structures, generically." 2014. 3)Wood. "Ethereum: A secure decentralised generalised transaction ledger." 2014.
  • 15. Our improvements: AVL Skiplist1 Red-black tree2 Ethereum trie3 Our AVL+ tree Lookup proof size 1.5 log2 N 1.7 log2 N 3 log2 N log2 N Insert proof size 1.5 log2 N 5 log2 N ??? log2 N Deterministic 1) Papamanthou and Tamassia. "Time and space efficient algorithms for two-party authenticated data structures." 2007. 2)Miller, Hicks, Katz, Shi. "Authenticated data structures, generically." 2014. 3)Wood. "Ethereum: A secure decentralised generalised transaction ledger." 2014.
  • 16. Our improvements: AVL Main ideas: ● AVL tree paths are shorter than skiplist paths ● Use deterministic rebalancing operations that don't look off the main path ● For N=106 , proof size = 753 bytes (32-byte hashes, 26-byte keys, 8-byte values)
  • 18. Our improvements: batching Root ● Transactions may change same public key ● Multiple proofs can be combined together pk1 pk2 pk3 pk4 pk5 pk6 pk7 pk8 Root pk1 pk2 pk3 pk4 pk5 pk6 pk7 pk8
  • 19. Multiple operations proof size ● For tree N=106 and batch B=103 , compressed proof size is 400 bytes, plain – 750 bytes
  • 20. Simulated blockchain ● Verification on commodity hardware ● Mining on commodity hardware!
  • 21. Thank you! ● Paper: http://ia.cr/2016/994 ● Code: https://github.com/input-output-hk/scrypto ● Slides: http://www.slideshare.net/DmitryMeshkov ● Twitter: https://twitter.com/DmitryMeshkov ● Email: dmitry.meshkov@iohk.io