Sidechains allow the transfer of assets between blockchains through a two-way peg mechanism. This mechanism uses cryptographic proofs to lock assets on one blockchain and unlock equivalent assets on another blockchain. It provides properties like atomic transfers without counterparty risk. There are challenges around complexity, potential for fraudulent transfers through deep reorganizations, and risks of centralization for sidechains with mining. Applications include experimentation with new features on separate blockchains and issuing new blockchain-based assets.
Presentation of sidechains as Blockstream currently defines them (December 2014).
LaTeX sources : https://www.dropbox.com/sh/yoz9mmfsom6b4yx/AAD1FK6xhFuyohbxdanXOEz0a?dl=0
Ethereum cryptocurrency. Source: http://vur.me/cobb/adscash
Cryptocurrency for digital marketing. Cash coins for: advertising agencies, marketing companies, online marketers, network and email marketers, mobile advertisers, seo companies, startups, and other cryptocurrencies exchanges.
Cryptocurrency is a digital currency in which cryptography techniques are used to regulate the generation of units of currency and verify the transfer of funds.
- Cryptocurrency operates independent of any central authority or individual.
- The supply of money is regulated by software and the agreement of users of the system.
- Trust based on peer to peer consensus.
- Transactions are irreversible.
Overview-
1. What is cryptocurrency?
2. The Difference
The tabular comparison between Fiat or conventional currency and Cryptocurrency on parameters like durability, portability, type, security etc.
3. Why use cryptocurrency?
Fast and cheap.
Easy to use.
Free to transfer and hold.
Decentralized control- users are the only owner of cryptocurrency.
Central government can’t take it away and there are no chargebacks.
Privacy and Security – Anonymous payments
Due to no intermediary (such as Bank or Credit Card Company) users have freedom to transact.
Transparency is maintained through public ledger system.
Reduced Fraud – eliminates cases of credit card frauds.
4. Evolution of cryptocurrency
Evolution of cryptocurrency from 2009 to 2015. Major Cryptocurrencies include are Bitcoin, Namecoin, Litecoin, Peercoin, Monero and Capricoin.
5. Categories of cryptocurrency
Cryptocurrencies are divide into various categories based on what type of algorithm used, type of community, investor involved, according to usage and on speed of transaction.
6. Major Cryptocurrencies
List of major Cryptocurrencies Bitcoin, Litecoin, Ripple, Peercoin, Mastercoin, NXT, Namecoin, Quarkcoin, Worldcoin and Megacoin
7. Bitcoin
First popular Cryptocurrency Bitcoin founded by Satoshi comprehensive details.
8. Technology
Bitcoin utilizes the following technologies which are Distributed ledger technology, Mining, Mining hardware, Mining Software, Blockchain and Bitcoin wallets.
9. Transaction Process
A typical transaction process of a Cryptocurrency namely Bitcoin involving concepts like wallet, block, transaction block-chain and proof-of-work algorithm. It gives step by step procedure on how the transaction is carried out in the case of Bitcoin.
10. Benefits
Fast, Safe and cheap
Ease of use and highly portable
Untraceable (pseudo-anonymous transactions)
Transparent and neutral
Decentralized nature
Active involvement of users
Fewer risks for merchants
Freedom to transact
Low inflation and collapse risk
11. Risks
- Problems in implementation- Hardware restrictions (Computational inefficiency), Instability, Deflation, Lack of Replicability and Growing centrality.
- Risk and failure in policy- Money Laundering, Purchase of illegal goods
- Supporting criminal activity- BTC Theft, Malware, Scams
- Risk for consumers- Fewer Protections, Cost, Lack of awareness and understanding and Still Developing.
This is an academic presentation by Sameer Satyam.
Where we explain how the concept of a crypto currency can lead to the creation of a new kind of autonomous corporation. This one part of a three part slide deck. For the full deck and the context please visit http://bit.ly/pm-bbc
Bitcoin, Blockchain and the Crypto Contracts - Part 2Prithwis Mukerjee
Where we explain how the cryptographic ideas are used to create a crypto asset on the block chain. This one part of a three part slide deck. For the full deck and the context please visit http://bit.ly/pm-bbc
Presentation of sidechains as Blockstream currently defines them (December 2014).
LaTeX sources : https://www.dropbox.com/sh/yoz9mmfsom6b4yx/AAD1FK6xhFuyohbxdanXOEz0a?dl=0
Ethereum cryptocurrency. Source: http://vur.me/cobb/adscash
Cryptocurrency for digital marketing. Cash coins for: advertising agencies, marketing companies, online marketers, network and email marketers, mobile advertisers, seo companies, startups, and other cryptocurrencies exchanges.
Cryptocurrency is a digital currency in which cryptography techniques are used to regulate the generation of units of currency and verify the transfer of funds.
- Cryptocurrency operates independent of any central authority or individual.
- The supply of money is regulated by software and the agreement of users of the system.
- Trust based on peer to peer consensus.
- Transactions are irreversible.
Overview-
1. What is cryptocurrency?
2. The Difference
The tabular comparison between Fiat or conventional currency and Cryptocurrency on parameters like durability, portability, type, security etc.
3. Why use cryptocurrency?
Fast and cheap.
Easy to use.
Free to transfer and hold.
Decentralized control- users are the only owner of cryptocurrency.
Central government can’t take it away and there are no chargebacks.
Privacy and Security – Anonymous payments
Due to no intermediary (such as Bank or Credit Card Company) users have freedom to transact.
Transparency is maintained through public ledger system.
Reduced Fraud – eliminates cases of credit card frauds.
4. Evolution of cryptocurrency
Evolution of cryptocurrency from 2009 to 2015. Major Cryptocurrencies include are Bitcoin, Namecoin, Litecoin, Peercoin, Monero and Capricoin.
5. Categories of cryptocurrency
Cryptocurrencies are divide into various categories based on what type of algorithm used, type of community, investor involved, according to usage and on speed of transaction.
6. Major Cryptocurrencies
List of major Cryptocurrencies Bitcoin, Litecoin, Ripple, Peercoin, Mastercoin, NXT, Namecoin, Quarkcoin, Worldcoin and Megacoin
7. Bitcoin
First popular Cryptocurrency Bitcoin founded by Satoshi comprehensive details.
8. Technology
Bitcoin utilizes the following technologies which are Distributed ledger technology, Mining, Mining hardware, Mining Software, Blockchain and Bitcoin wallets.
9. Transaction Process
A typical transaction process of a Cryptocurrency namely Bitcoin involving concepts like wallet, block, transaction block-chain and proof-of-work algorithm. It gives step by step procedure on how the transaction is carried out in the case of Bitcoin.
10. Benefits
Fast, Safe and cheap
Ease of use and highly portable
Untraceable (pseudo-anonymous transactions)
Transparent and neutral
Decentralized nature
Active involvement of users
Fewer risks for merchants
Freedom to transact
Low inflation and collapse risk
11. Risks
- Problems in implementation- Hardware restrictions (Computational inefficiency), Instability, Deflation, Lack of Replicability and Growing centrality.
- Risk and failure in policy- Money Laundering, Purchase of illegal goods
- Supporting criminal activity- BTC Theft, Malware, Scams
- Risk for consumers- Fewer Protections, Cost, Lack of awareness and understanding and Still Developing.
This is an academic presentation by Sameer Satyam.
Where we explain how the concept of a crypto currency can lead to the creation of a new kind of autonomous corporation. This one part of a three part slide deck. For the full deck and the context please visit http://bit.ly/pm-bbc
Bitcoin, Blockchain and the Crypto Contracts - Part 2Prithwis Mukerjee
Where we explain how the cryptographic ideas are used to create a crypto asset on the block chain. This one part of a three part slide deck. For the full deck and the context please visit http://bit.ly/pm-bbc
Metadata in the Blockchain: The OP_RETURN ExplosionCoin Sciences Ltd
With the addition of OP_RETURN outputs in version 0.9, it became possible to attach arbitrary pieces of information to bitcoin transactions. This turns bitcoin into a low-level communications protocol, just like TCP/IP, on which many new applications can be built.
Despite its powerful features, bitcoin is also limited, costly and inefficient compared to TCP/IP. After discussing which sorts of applications make this trade-off worthwhile, we talk about CoinSpark, a new open source protocol for enhancing bitcoin transactions, which makes extensive use of OP_RETURNs.
A basic overview of what blockchain is with step-by-step easy to follow explanation of its core concepts. It should be easy for anyone with zero knowledge of blockchain to follow through the slides
Introduction to blockchain and cryptocurrency technologiesPaweł Wacławczyk
Introduction to cryptography primitives and fundamental data structures. Discuss the process of achieving distributed consensus, proof-of-work and potential attacks on network.
Intro to Blockchain - And, by the way, what the heck is proof-of-work?Jim Flynn
An overview of bitcoin and the blockchain with a more in-depth description of proof of work (POW). Conde samples used to demonstrate the concepts behind POW are available at http://jamespflynn.com.
A Complete Beginners Guide to Blockchain Technology Part 2 of 6. Slides from the #StartingBlock2015 tour by @blockstrap
Part 1: http://www.slideshare.net/Blockstrap/cbgtbt-part-1-workshop-introduction-primer
Part 2: http://www.slideshare.net/Blockstrap/02-blockchains-101
Part 3: http://www.slideshare.net/Blockstrap/03-transactions-101
Part 4: http://www.slideshare.net/Blockstrap/cbgtbt-part-4-mining
Part 5: http://www.slideshare.net/Blockstrap/05-blockchains-102
Part 6: http://www.slideshare.net/Blockstrap/06-transactions-102
Blockchain overview, use cases, implementations and challengesSébastien Tandel
Most know about Bitcoin, the well-known crypto-currency. Less know the details about the underlying and enabling technology, Blockchain.
Hopefully, this presentation provides enough insights to understand blockchain concepts and why it's perceived to potentially disrupt many market segments, from retail to governments, from finance to health care. At last, I hope to brush fairly the many challenges of this rather new technology.
This slidedeck was used at the second Blockchain Vlaanderen meetup in Antwerp. It was given as a general introduction into Blockchain to enable newcomers to follow the presentations that followed.
I am sending you 1π! Pi is a new digital currency developed by Stanford PhDs, with over 9 million members worldwide. To claim your Pi, follow this link https://minepi.com/krishvikram and use my username (krishvikram) as your invitation code.
Step 1. Install the Pi app with above link
Step 2 verify the profile
Step 3 tap on earnings and share your link and increase your earnings
Step 4 verification type the referral code which is mandatory.
Referral code is : krishvikram
Bitcoin lightning network and ethereum protocolsSUSMIT LAVANIA
These slides explore mechanics Bitcoin Lightning Network as Layer 2 scaling solution in detail . We have also discussed 0x protocol used as recipe for decentralized exchanges and Matic network as scaling solution for ethereum.
A Complete Beginners Guide to Blockchain Technology Part 3 of 6. Slides from the #StartingBlock2015 tour by @blockstrap
Part 1: http://www.slideshare.net/Blockstrap/cbgtbt-part-1-workshop-introduction-primer
Part 2: http://www.slideshare.net/Blockstrap/02-blockchains-101
Part 3: http://www.slideshare.net/Blockstrap/03-transactions-101
Part 4: http://www.slideshare.net/Blockstrap/cbgtbt-part-4-mining
Part 5: http://www.slideshare.net/Blockstrap/05-blockchains-102
Part 6: http://www.slideshare.net/Blockstrap/06-transactions-102
Metadata in the Blockchain: The OP_RETURN ExplosionCoin Sciences Ltd
With the addition of OP_RETURN outputs in version 0.9, it became possible to attach arbitrary pieces of information to bitcoin transactions. This turns bitcoin into a low-level communications protocol, just like TCP/IP, on which many new applications can be built.
Despite its powerful features, bitcoin is also limited, costly and inefficient compared to TCP/IP. After discussing which sorts of applications make this trade-off worthwhile, we talk about CoinSpark, a new open source protocol for enhancing bitcoin transactions, which makes extensive use of OP_RETURNs.
A basic overview of what blockchain is with step-by-step easy to follow explanation of its core concepts. It should be easy for anyone with zero knowledge of blockchain to follow through the slides
Introduction to blockchain and cryptocurrency technologiesPaweł Wacławczyk
Introduction to cryptography primitives and fundamental data structures. Discuss the process of achieving distributed consensus, proof-of-work and potential attacks on network.
Intro to Blockchain - And, by the way, what the heck is proof-of-work?Jim Flynn
An overview of bitcoin and the blockchain with a more in-depth description of proof of work (POW). Conde samples used to demonstrate the concepts behind POW are available at http://jamespflynn.com.
A Complete Beginners Guide to Blockchain Technology Part 2 of 6. Slides from the #StartingBlock2015 tour by @blockstrap
Part 1: http://www.slideshare.net/Blockstrap/cbgtbt-part-1-workshop-introduction-primer
Part 2: http://www.slideshare.net/Blockstrap/02-blockchains-101
Part 3: http://www.slideshare.net/Blockstrap/03-transactions-101
Part 4: http://www.slideshare.net/Blockstrap/cbgtbt-part-4-mining
Part 5: http://www.slideshare.net/Blockstrap/05-blockchains-102
Part 6: http://www.slideshare.net/Blockstrap/06-transactions-102
Blockchain overview, use cases, implementations and challengesSébastien Tandel
Most know about Bitcoin, the well-known crypto-currency. Less know the details about the underlying and enabling technology, Blockchain.
Hopefully, this presentation provides enough insights to understand blockchain concepts and why it's perceived to potentially disrupt many market segments, from retail to governments, from finance to health care. At last, I hope to brush fairly the many challenges of this rather new technology.
This slidedeck was used at the second Blockchain Vlaanderen meetup in Antwerp. It was given as a general introduction into Blockchain to enable newcomers to follow the presentations that followed.
I am sending you 1π! Pi is a new digital currency developed by Stanford PhDs, with over 9 million members worldwide. To claim your Pi, follow this link https://minepi.com/krishvikram and use my username (krishvikram) as your invitation code.
Step 1. Install the Pi app with above link
Step 2 verify the profile
Step 3 tap on earnings and share your link and increase your earnings
Step 4 verification type the referral code which is mandatory.
Referral code is : krishvikram
Bitcoin lightning network and ethereum protocolsSUSMIT LAVANIA
These slides explore mechanics Bitcoin Lightning Network as Layer 2 scaling solution in detail . We have also discussed 0x protocol used as recipe for decentralized exchanges and Matic network as scaling solution for ethereum.
A Complete Beginners Guide to Blockchain Technology Part 3 of 6. Slides from the #StartingBlock2015 tour by @blockstrap
Part 1: http://www.slideshare.net/Blockstrap/cbgtbt-part-1-workshop-introduction-primer
Part 2: http://www.slideshare.net/Blockstrap/02-blockchains-101
Part 3: http://www.slideshare.net/Blockstrap/03-transactions-101
Part 4: http://www.slideshare.net/Blockstrap/cbgtbt-part-4-mining
Part 5: http://www.slideshare.net/Blockstrap/05-blockchains-102
Part 6: http://www.slideshare.net/Blockstrap/06-transactions-102
Can we safely adapt the construction of permissionless blockchain to user dem...I MT
"Can we safely adapt the construction of permissionless blockchain to user demand ?" par Emmanuelle ANCEAUME (CNRS), lors de la journée Futur & Ruptures du 31 janvier 2019.
Yao Yao, Jack Rasmus-Vorrath, Ivelin Angelov
https://github.com/yaowser/basic_blockchain
https://www.academia.edu/35646619/Blockchain_Security_and_Demonstration
https://www.slideshare.net/YaoYao44/blockchain-security-and-demonstration-86062973
Distributed ledger technology over a network of computers, which provides an alternative to the centralized system
Distributed Database
Peer-to-Peer Transmission
Transparency with Pseudonymity
Records are immutable
Computational Logic
https://www.youtube.com/watch?v=5ArZxRdhyPc
Yao Yao, Jack Rasmus-Vorrath, Ivelin Angelov
https://github.com/yaowser/basic_blockchain
https://www.slideshare.net/YaoYao44/blockchain-security-and-demonstration/
Distributed ledger technology over a network of computers, which provides an alternative to the centralized system
Distributed Database
Peer-to-Peer Transmission
Transparency with Pseudonymity
Records are immutable
Computational Logic
https://www.youtube.com/watch?v=5ArZxRdhyPc
Blockchain Ecosystem and Cryptocurrency RegulationsAmir Rafati
A blockchain is a general digital ledger of transactions that are executed on the network, e.g. using Bitcoin to buy a cup of coffee is a transaction.
All users of the network, ‘Nodes’, have a copy of the transaction records and can access them freely, a role previously played by centralized institutions. Therefore, the blockchain network is ‘decentralized’.
Simone Bronzini - Weaknesses of blockchain applications - Codemotion Milan 2018Codemotion
Due to the immutability of the ledger and the difficulty to update their consensus rules, Blockchain applications have many critical layers where a bug can cause huge, irreversible fund losses. This talk will shed some light on why and how Blockchain applications are so critical and will discuss past events that led to fund loss or consensus failures due to bugs in critical parts of the code of Bitcoin and Ethereum applications.
Journey to Blockchain Scalability: A Close Look at Complete Scaling Solutions...Zeeve
In this webinar, Ravi Chamria, the CEO and Co-founder of Zeeve, dives deep into the topic of blockchain scalability. Discover the complete scaling solutions for L1 and L2 chains as Ravi breaks down the challenges and trade-offs associated with scalability, security, and decentralization.
Ravi gives an overview of the topics covered in this insightful webinar. Starting the webinar, he explains the basics of scalability in blockchain and introduces the Scalability Trilemma, which highlights the trade-offs developers face when designing a blockchain.
Explore the three parts of the Blockchain Scalability solutions at the beginning, which include L1 Solutions (On-Chain), L2 Solutions (Off-Chain), and App-Chains.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
3. Background information
Bitcoin blockheaders can be regarded as example of DDMS
DDMS (Dynamic membership multi-party signature)
◦ Digital signature formed by a set of signers which has no fixed size
Similarity
◦ any one can contribute with no enrolment process; contribution is weighted by computational power
rather than one threshold signature contribution per party
Difference
◦ Blockchain use of DDMS as a signature of computational power rather than a signature of knowledge
◦ Blockchain signers prove computational work, rather than proving secret knowledge as is typical for
digital signature.
4. Pegged Sidechain(two-way peg) design
idea
Interoperable blockchains
◦ Allow movement of asserts between blockchains, new systems could be developed which users could adopt
by simply reusing the existing bitcoin currency.
Designed Properties
1. Assets which are moved between sidechains should be able to be moved back by whomever their current
holder is, and nobody else (including previous holders).
2. Assets should be moved without counterparty risk; that is, there should be no ability for a dishonest party
to prevent the transfer occurring
3. Transfers should be atomic, i.e. happen entirely or not at all. There should not be failure modes that result
in loss or allow fraudulent creation of assets.
4. Sidechains should be firewalled: a bug in one sidechain enabling creation (or theft) of assets in that chain
should not result in creation or theft of assets on any other chain.
5. Blockchain reorganisations should be handled cleanly, even during transfers; any disruption should be
localised to the sidechain on which it occurs. In general, sidechains should ideally be fully independent, with
users providing any necessary data from other chains. Validators of a sidechain should only be required to
track another chain if that is an explicit consensus rule of the sidechain itself.
6. Users should not be required to track sidechains that they are not actively using.
5. Proposed method
Transfer assets by providing proofs of possession in the transferring transaction themselves
Break down:
◦ Chain 1 transfer asset to Chain 2
◦ Chain 1: create a transaction, locking the assets
◦ Chain 2:create a transaction with input contain a cryptographic proof that lock was done correctly.
Inputs tagged with an asset type(the genesis hash of its originating blockchain)
◦ Chain 1 can transfer to chain 2 and vice versa
6. Definitions
Sidechain
◦ is a blockchain that validates data from other blockchains.
Two-way peg
◦ refers to the mechanism by which coins are transferred between sidechains and back at a fixed or
otherwise deterministic exchange rate.
A pegged sidechain
◦ is a sidechain whose assets can be imported from and returned to other chains; that is, a sidechain that
supports two-way pegged assets.
A simplified payment verification proof (or SPV proof )
◦ is a DMMS that an action occurred on a Bitcoin-like proof-of-work blockchain.
7. Symmetric two-way peg
This works as follows: to transfer parent chain coins into sidechain coins, the parent chain coins are
sent to a special output on the parent chain that can only be unlocked by an SPV proof of possession
on the sidechain. To synchronise the two chains, we need to define two waiting periods:
◦ The confirmation period of a transfer between sidechains is a duration for which a coin must be locked on the
parent chain before it can be transferred to the sidechain. A typical confirmation period would be on the order
of a day or two.
◦ After creating the special output on the parent chain, the user waits out the confirmation period, then creates a transaction on the sidechain
referencing this output, providing an SPV proof that it was created and buried under sufficient work on the the parent chain.
◦ The confirmation period is a per-sidechain security parameter, which trades cross-chain transfer speed for security.
◦ The user must then wait for the contest period. This is a duration in which a newly-transferred coin may not
be spent on the sidechain.
◦ The purpose of a contest period is to prevent double- 240 spending by transferring previously-locked coins during a reorganisation. If at any
point during this delay, a new proof is published containing a chain with more aggregate work which does not include the block in which the
lock output was created, the conversion is retroactively invalidated. We call this a reorganisation proof.
◦ All users of the sidechain have an incentive to produce reorganisation proofs if possible, as the consequence of a bad proof being admitted is
a dilution in the value of all coins. A typical contest period would also be on the order of a day or two. To avoid these delays, users will likely
use atomic swaps (described in Appendix C) for most transfers, as long as a liquid market is available.
9. Drawbacks of sidechain
Complexity
◦ Network level:multiple independent unsynchronized blockchain supporting transfers between each other.
Must support transaction scripts which can be invalidate by a later reorganization proof.
◦ Software needed to detect misbehaviors, and produce and publish proofs.
◦ Assets level: each chain may support arbitrarily many assets
◦ Each of these assets is labelled with the chain it was transferred from
◦ User interface: need to have wallets that adapt and support multiple chains and transfers of assets between
chains
Fraudulent transfers
◦ Reorganisation of arbitrary depth in principle possible, which could allow attacker to completely transfer coins
between sidechains before causing a reorganisation longer than the contest period on the sending chain to
undo its half of the transfer.
◦ Reaction design
◦ No reaction: the sidechain is a “fractional reserve” of the assets it is storing from other chains
◦ The peg and all dependent transactions could be reversed.
◦ The amount of all coins could be reduced, while leaving the exchange rate intact.
10. Drawbacks of sidechain
Risk of centralisation of mining
◦ Sidechain with mining fee may place resource pressure on miners, creating bitcoin centralisation risks
Risk of soft-fork
11. Applications
Altchain experiments
◦ Technical experiment
◦ Fixing undesired transaction malleability
◦ Improved payer privacy
◦ Script extensions
◦ Many ideas for extending bitcoin in incompatible way
◦ Economic experimentation
Issued assets
◦ Side chains can have their own assets and currencies
12. SPV proof
composed of (a) a list of blockheaders demonstrating proof-of work, and (b) a cryptographic
proof that an output was created in one of the blocks in the list.
This allows verifiers to check that some amount of work has been committed to the existence of
an output. Such a proof may be invalidated by another proof demonstrating the existence of a
chain with more work which does not include the block which created the output.
Using SPV proofs to determine history, implicitly trusting that the longest blockchain is also the
longest correct blockchain, is done by so-called SPV clients in Bitcoin.
Only a dishonest collusion with greater than 50% of the hashpower can persistently fool an SPV
client (unless the client is under a long-term Sybil attack, preventing it from seeing the actual
longest chain), since the honest hashpower will not contribute work to an invalid chain
Editor's Notes
The purpose of this confirmation period is to allow for sufficient work to be created such that a denial of service attack in the next waiting period becomes more difficult.