SlideShare a Scribd company logo
Sidechains
Sidechain in a nutshell
Background information
Bitcoin blockheaders can be regarded as example of DDMS
DDMS (Dynamic membership multi-party signature)
◦ Digital signature formed by a set of signers which has no fixed size
Similarity
◦ any one can contribute with no enrolment process; contribution is weighted by computational power
rather than one threshold signature contribution per party
Difference
◦ Blockchain use of DDMS as a signature of computational power rather than a signature of knowledge
◦ Blockchain signers prove computational work, rather than proving secret knowledge as is typical for
digital signature.
Pegged Sidechain(two-way peg) design
idea
Interoperable blockchains
◦ Allow movement of asserts between blockchains, new systems could be developed which users could adopt
by simply reusing the existing bitcoin currency.
Designed Properties
1. Assets which are moved between sidechains should be able to be moved back by whomever their current
holder is, and nobody else (including previous holders).
2. Assets should be moved without counterparty risk; that is, there should be no ability for a dishonest party
to prevent the transfer occurring
3. Transfers should be atomic, i.e. happen entirely or not at all. There should not be failure modes that result
in loss or allow fraudulent creation of assets.
4. Sidechains should be firewalled: a bug in one sidechain enabling creation (or theft) of assets in that chain
should not result in creation or theft of assets on any other chain.
5. Blockchain reorganisations should be handled cleanly, even during transfers; any disruption should be
localised to the sidechain on which it occurs. In general, sidechains should ideally be fully independent, with
users providing any necessary data from other chains. Validators of a sidechain should only be required to
track another chain if that is an explicit consensus rule of the sidechain itself.
6. Users should not be required to track sidechains that they are not actively using.
Proposed method
Transfer assets by providing proofs of possession in the transferring transaction themselves
Break down:
◦ Chain 1 transfer asset to Chain 2
◦ Chain 1: create a transaction, locking the assets
◦ Chain 2:create a transaction with input contain a cryptographic proof that lock was done correctly.
Inputs tagged with an asset type(the genesis hash of its originating blockchain)
◦ Chain 1 can transfer to chain 2 and vice versa
Definitions
Sidechain
◦ is a blockchain that validates data from other blockchains.
Two-way peg
◦ refers to the mechanism by which coins are transferred between sidechains and back at a fixed or
otherwise deterministic exchange rate.
A pegged sidechain
◦ is a sidechain whose assets can be imported from and returned to other chains; that is, a sidechain that
supports two-way pegged assets.
A simplified payment verification proof (or SPV proof )
◦ is a DMMS that an action occurred on a Bitcoin-like proof-of-work blockchain.
Symmetric two-way peg
This works as follows: to transfer parent chain coins into sidechain coins, the parent chain coins are
sent to a special output on the parent chain that can only be unlocked by an SPV proof of possession
on the sidechain. To synchronise the two chains, we need to define two waiting periods:
◦ The confirmation period of a transfer between sidechains is a duration for which a coin must be locked on the
parent chain before it can be transferred to the sidechain. A typical confirmation period would be on the order
of a day or two.
◦ After creating the special output on the parent chain, the user waits out the confirmation period, then creates a transaction on the sidechain
referencing this output, providing an SPV proof that it was created and buried under sufficient work on the the parent chain.
◦ The confirmation period is a per-sidechain security parameter, which trades cross-chain transfer speed for security.
◦ The user must then wait for the contest period. This is a duration in which a newly-transferred coin may not
be spent on the sidechain.
◦ The purpose of a contest period is to prevent double- 240 spending by transferring previously-locked coins during a reorganisation. If at any
point during this delay, a new proof is published containing a chain with more aggregate work which does not include the block in which the
lock output was created, the conversion is retroactively invalidated. We call this a reorganisation proof.
◦ All users of the sidechain have an incentive to produce reorganisation proofs if possible, as the consequence of a bad proof being admitted is
a dilution in the value of all coins. A typical contest period would also be on the order of a day or two. To avoid these delays, users will likely
use atomic swaps (described in Appendix C) for most transfers, as long as a liquid market is available.
Symmetric two-way peg
Drawbacks of sidechain
Complexity
◦ Network level:multiple independent unsynchronized blockchain supporting transfers between each other.
Must support transaction scripts which can be invalidate by a later reorganization proof.
◦ Software needed to detect misbehaviors, and produce and publish proofs.
◦ Assets level: each chain may support arbitrarily many assets
◦ Each of these assets is labelled with the chain it was transferred from
◦ User interface: need to have wallets that adapt and support multiple chains and transfers of assets between
chains
Fraudulent transfers
◦ Reorganisation of arbitrary depth in principle possible, which could allow attacker to completely transfer coins
between sidechains before causing a reorganisation longer than the contest period on the sending chain to
undo its half of the transfer.
◦ Reaction design
◦ No reaction: the sidechain is a “fractional reserve” of the assets it is storing from other chains
◦ The peg and all dependent transactions could be reversed.
◦ The amount of all coins could be reduced, while leaving the exchange rate intact.
Drawbacks of sidechain
Risk of centralisation of mining
◦ Sidechain with mining fee may place resource pressure on miners, creating bitcoin centralisation risks
Risk of soft-fork
Applications
Altchain experiments
◦ Technical experiment
◦ Fixing undesired transaction malleability
◦ Improved payer privacy
◦ Script extensions
◦ Many ideas for extending bitcoin in incompatible way
◦ Economic experimentation
Issued assets
◦ Side chains can have their own assets and currencies
SPV proof
composed of (a) a list of blockheaders demonstrating proof-of work, and (b) a cryptographic
proof that an output was created in one of the blocks in the list.
This allows verifiers to check that some amount of work has been committed to the existence of
an output. Such a proof may be invalidated by another proof demonstrating the existence of a
chain with more work which does not include the block which created the output.
Using SPV proofs to determine history, implicitly trusting that the longest blockchain is also the
longest correct blockchain, is done by so-called SPV clients in Bitcoin.
Only a dishonest collusion with greater than 50% of the hashpower can persistently fool an SPV
client (unless the client is under a long-term Sybil attack, preventing it from seeing the actual
longest chain), since the honest hashpower will not contribute work to an invalid chain

More Related Content

What's hot

Cryptocurrencies 101 v5 public
Cryptocurrencies 101 v5 publicCryptocurrencies 101 v5 public
Cryptocurrencies 101 v5 public
Brett Colbert
 
Girl Develop It - Intro To Blockchain And Cryptocurrencies
Girl Develop It - Intro To Blockchain And CryptocurrenciesGirl Develop It - Intro To Blockchain And Cryptocurrencies
Girl Develop It - Intro To Blockchain And Cryptocurrencies
magnachef
 
Blockchain, bitcoin
Blockchain, bitcoinBlockchain, bitcoin
Blockchain, bitcoin
Sathish VJ
 
Metadata in the Blockchain: The OP_RETURN Explosion
Metadata in the Blockchain: The OP_RETURN ExplosionMetadata in the Blockchain: The OP_RETURN Explosion
Metadata in the Blockchain: The OP_RETURN Explosion
Coin Sciences Ltd
 
cryptocurrency mining and digital currencies Bitcoin, Ethereum underlying te...
cryptocurrency mining and digital currencies  Bitcoin, Ethereum underlying te...cryptocurrency mining and digital currencies  Bitcoin, Ethereum underlying te...
cryptocurrency mining and digital currencies Bitcoin, Ethereum underlying te...
rsiyengar.com
 
Economías criptográficas
Economías criptográficasEconomías criptográficas
Economías criptográficasnavajanegra
 
Blockchain - a basic overview
Blockchain - a basic overviewBlockchain - a basic overview
Blockchain - a basic overview
Syed Rakib Al Hasan
 
A quick introduction to Consensus Models
A quick introduction to Consensus ModelsA quick introduction to Consensus Models
A quick introduction to Consensus Models
Oded Noam
 
Introduction to blockchain and cryptocurrency technologies
Introduction to blockchain and cryptocurrency technologiesIntroduction to blockchain and cryptocurrency technologies
Introduction to blockchain and cryptocurrency technologies
Paweł Wacławczyk
 
Intro to Blockchain - And, by the way, what the heck is proof-of-work?
Intro to Blockchain - And, by the way, what the heck is proof-of-work?Intro to Blockchain - And, by the way, what the heck is proof-of-work?
Intro to Blockchain - And, by the way, what the heck is proof-of-work?
Jim Flynn
 
From bitcoin to_algorand_
From bitcoin to_algorand_From bitcoin to_algorand_
From bitcoin to_algorand_
JitendraNaik16
 
CBGTBT - Part 2 - Blockchains 101
CBGTBT - Part 2 - Blockchains 101CBGTBT - Part 2 - Blockchains 101
CBGTBT - Part 2 - Blockchains 101
Blockstrap.com
 
Blockchain 101
Blockchain 101Blockchain 101
Blockchain 101
Oded Noam
 
Blockchain overview, use cases, implementations and challenges
Blockchain overview, use cases, implementations and challengesBlockchain overview, use cases, implementations and challenges
Blockchain overview, use cases, implementations and challenges
Sébastien Tandel
 
Intro into blockchain
Intro into blockchainIntro into blockchain
Intro into blockchain
Roderik van der Veer
 
Altcoins
AltcoinsAltcoins
Altcoins
sameezahur
 
Pi network
Pi networkPi network
Bitcoin lightning network and ethereum protocols
Bitcoin lightning network and ethereum protocolsBitcoin lightning network and ethereum protocols
Bitcoin lightning network and ethereum protocols
SUSMIT LAVANIA
 
CBGTBT - Part 3 - Transactions 101
CBGTBT - Part 3 - Transactions 101CBGTBT - Part 3 - Transactions 101
CBGTBT - Part 3 - Transactions 101
Blockstrap.com
 
Overview of bitcoin
Overview of bitcoinOverview of bitcoin
Overview of bitcoin
Abdul Nasir
 

What's hot (20)

Cryptocurrencies 101 v5 public
Cryptocurrencies 101 v5 publicCryptocurrencies 101 v5 public
Cryptocurrencies 101 v5 public
 
Girl Develop It - Intro To Blockchain And Cryptocurrencies
Girl Develop It - Intro To Blockchain And CryptocurrenciesGirl Develop It - Intro To Blockchain And Cryptocurrencies
Girl Develop It - Intro To Blockchain And Cryptocurrencies
 
Blockchain, bitcoin
Blockchain, bitcoinBlockchain, bitcoin
Blockchain, bitcoin
 
Metadata in the Blockchain: The OP_RETURN Explosion
Metadata in the Blockchain: The OP_RETURN ExplosionMetadata in the Blockchain: The OP_RETURN Explosion
Metadata in the Blockchain: The OP_RETURN Explosion
 
cryptocurrency mining and digital currencies Bitcoin, Ethereum underlying te...
cryptocurrency mining and digital currencies  Bitcoin, Ethereum underlying te...cryptocurrency mining and digital currencies  Bitcoin, Ethereum underlying te...
cryptocurrency mining and digital currencies Bitcoin, Ethereum underlying te...
 
Economías criptográficas
Economías criptográficasEconomías criptográficas
Economías criptográficas
 
Blockchain - a basic overview
Blockchain - a basic overviewBlockchain - a basic overview
Blockchain - a basic overview
 
A quick introduction to Consensus Models
A quick introduction to Consensus ModelsA quick introduction to Consensus Models
A quick introduction to Consensus Models
 
Introduction to blockchain and cryptocurrency technologies
Introduction to blockchain and cryptocurrency technologiesIntroduction to blockchain and cryptocurrency technologies
Introduction to blockchain and cryptocurrency technologies
 
Intro to Blockchain - And, by the way, what the heck is proof-of-work?
Intro to Blockchain - And, by the way, what the heck is proof-of-work?Intro to Blockchain - And, by the way, what the heck is proof-of-work?
Intro to Blockchain - And, by the way, what the heck is proof-of-work?
 
From bitcoin to_algorand_
From bitcoin to_algorand_From bitcoin to_algorand_
From bitcoin to_algorand_
 
CBGTBT - Part 2 - Blockchains 101
CBGTBT - Part 2 - Blockchains 101CBGTBT - Part 2 - Blockchains 101
CBGTBT - Part 2 - Blockchains 101
 
Blockchain 101
Blockchain 101Blockchain 101
Blockchain 101
 
Blockchain overview, use cases, implementations and challenges
Blockchain overview, use cases, implementations and challengesBlockchain overview, use cases, implementations and challenges
Blockchain overview, use cases, implementations and challenges
 
Intro into blockchain
Intro into blockchainIntro into blockchain
Intro into blockchain
 
Altcoins
AltcoinsAltcoins
Altcoins
 
Pi network
Pi networkPi network
Pi network
 
Bitcoin lightning network and ethereum protocols
Bitcoin lightning network and ethereum protocolsBitcoin lightning network and ethereum protocols
Bitcoin lightning network and ethereum protocols
 
CBGTBT - Part 3 - Transactions 101
CBGTBT - Part 3 - Transactions 101CBGTBT - Part 3 - Transactions 101
CBGTBT - Part 3 - Transactions 101
 
Overview of bitcoin
Overview of bitcoinOverview of bitcoin
Overview of bitcoin
 

Similar to Sidechains introduction

Introduction to Blockchain Technology
Introduction to Blockchain TechnologyIntroduction to Blockchain Technology
Introduction to Blockchain Technology
Md. Hasan Basri (Angel)
 
Blockchain development from concept to reality.docx
Blockchain development from concept to reality.docxBlockchain development from concept to reality.docx
Blockchain development from concept to reality.docx
AfifSayyad
 
Can we safely adapt the construction of permissionless blockchain to user dem...
Can we safely adapt the construction of permissionless blockchain to user dem...Can we safely adapt the construction of permissionless blockchain to user dem...
Can we safely adapt the construction of permissionless blockchain to user dem...
I MT
 
Blockchain Security and Demonstration
Blockchain Security and DemonstrationBlockchain Security and Demonstration
Blockchain Security and Demonstration
Yao Yao
 
IRJET- Transaction based Block Chain Cryptocurrency
IRJET-  	  Transaction based Block Chain CryptocurrencyIRJET-  	  Transaction based Block Chain Cryptocurrency
IRJET- Transaction based Block Chain Cryptocurrency
IRJET Journal
 
Bitcoin 2.0
Bitcoin 2.0 Bitcoin 2.0
Blockchain
BlockchainBlockchain
Ethereum Mining How To
Ethereum Mining How ToEthereum Mining How To
Ethereum Mining How To
Nugroho Gito
 
chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxchapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptx
AschalewAyele2
 
chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxchapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptx
AschalewAyele2
 
cryptocurrencypresentation-230421194204-104e58ee.pdf
cryptocurrencypresentation-230421194204-104e58ee.pdfcryptocurrencypresentation-230421194204-104e58ee.pdf
cryptocurrencypresentation-230421194204-104e58ee.pdf
Yash52326
 
Cryptocurrency Presentation.pptx
Cryptocurrency Presentation.pptxCryptocurrency Presentation.pptx
Cryptocurrency Presentation.pptx
DhruvJha39
 
Blockchain Security and Demonstration
Blockchain Security and DemonstrationBlockchain Security and Demonstration
Blockchain Security and Demonstration
Yao Yao
 
Blockchain Ecosystem and Cryptocurrency Regulations
Blockchain Ecosystem and Cryptocurrency RegulationsBlockchain Ecosystem and Cryptocurrency Regulations
Blockchain Ecosystem and Cryptocurrency Regulations
Amir Rafati
 
Understanding Blockchain
Understanding BlockchainUnderstanding Blockchain
Understanding Blockchain
Amey Ratnakar Prabhu
 
STREAKK - 3rd Generation Blockchain
STREAKK - 3rd Generation BlockchainSTREAKK - 3rd Generation Blockchain
STREAKK - 3rd Generation Blockchain
Earn.World
 
Simone Bronzini - Weaknesses of blockchain applications - Codemotion Milan 2018
Simone Bronzini - Weaknesses of blockchain applications - Codemotion Milan 2018Simone Bronzini - Weaknesses of blockchain applications - Codemotion Milan 2018
Simone Bronzini - Weaknesses of blockchain applications - Codemotion Milan 2018
Codemotion
 
BlockChain Techonology - Unit 1.pptx
BlockChain Techonology   -   Unit 1.pptxBlockChain Techonology   -   Unit 1.pptx
BlockChain Techonology - Unit 1.pptx
os3558995
 
blockchain.pptx
blockchain.pptxblockchain.pptx
blockchain.pptx
19MEB302SahilAli
 
Journey to Blockchain Scalability: A Close Look at Complete Scaling Solutions...
Journey to Blockchain Scalability: A Close Look at Complete Scaling Solutions...Journey to Blockchain Scalability: A Close Look at Complete Scaling Solutions...
Journey to Blockchain Scalability: A Close Look at Complete Scaling Solutions...
Zeeve
 

Similar to Sidechains introduction (20)

Introduction to Blockchain Technology
Introduction to Blockchain TechnologyIntroduction to Blockchain Technology
Introduction to Blockchain Technology
 
Blockchain development from concept to reality.docx
Blockchain development from concept to reality.docxBlockchain development from concept to reality.docx
Blockchain development from concept to reality.docx
 
Can we safely adapt the construction of permissionless blockchain to user dem...
Can we safely adapt the construction of permissionless blockchain to user dem...Can we safely adapt the construction of permissionless blockchain to user dem...
Can we safely adapt the construction of permissionless blockchain to user dem...
 
Blockchain Security and Demonstration
Blockchain Security and DemonstrationBlockchain Security and Demonstration
Blockchain Security and Demonstration
 
IRJET- Transaction based Block Chain Cryptocurrency
IRJET-  	  Transaction based Block Chain CryptocurrencyIRJET-  	  Transaction based Block Chain Cryptocurrency
IRJET- Transaction based Block Chain Cryptocurrency
 
Bitcoin 2.0
Bitcoin 2.0 Bitcoin 2.0
Bitcoin 2.0
 
Blockchain
BlockchainBlockchain
Blockchain
 
Ethereum Mining How To
Ethereum Mining How ToEthereum Mining How To
Ethereum Mining How To
 
chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxchapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptx
 
chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxchapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptx
 
cryptocurrencypresentation-230421194204-104e58ee.pdf
cryptocurrencypresentation-230421194204-104e58ee.pdfcryptocurrencypresentation-230421194204-104e58ee.pdf
cryptocurrencypresentation-230421194204-104e58ee.pdf
 
Cryptocurrency Presentation.pptx
Cryptocurrency Presentation.pptxCryptocurrency Presentation.pptx
Cryptocurrency Presentation.pptx
 
Blockchain Security and Demonstration
Blockchain Security and DemonstrationBlockchain Security and Demonstration
Blockchain Security and Demonstration
 
Blockchain Ecosystem and Cryptocurrency Regulations
Blockchain Ecosystem and Cryptocurrency RegulationsBlockchain Ecosystem and Cryptocurrency Regulations
Blockchain Ecosystem and Cryptocurrency Regulations
 
Understanding Blockchain
Understanding BlockchainUnderstanding Blockchain
Understanding Blockchain
 
STREAKK - 3rd Generation Blockchain
STREAKK - 3rd Generation BlockchainSTREAKK - 3rd Generation Blockchain
STREAKK - 3rd Generation Blockchain
 
Simone Bronzini - Weaknesses of blockchain applications - Codemotion Milan 2018
Simone Bronzini - Weaknesses of blockchain applications - Codemotion Milan 2018Simone Bronzini - Weaknesses of blockchain applications - Codemotion Milan 2018
Simone Bronzini - Weaknesses of blockchain applications - Codemotion Milan 2018
 
BlockChain Techonology - Unit 1.pptx
BlockChain Techonology   -   Unit 1.pptxBlockChain Techonology   -   Unit 1.pptx
BlockChain Techonology - Unit 1.pptx
 
blockchain.pptx
blockchain.pptxblockchain.pptx
blockchain.pptx
 
Journey to Blockchain Scalability: A Close Look at Complete Scaling Solutions...
Journey to Blockchain Scalability: A Close Look at Complete Scaling Solutions...Journey to Blockchain Scalability: A Close Look at Complete Scaling Solutions...
Journey to Blockchain Scalability: A Close Look at Complete Scaling Solutions...
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 

Sidechains introduction

  • 2. Sidechain in a nutshell
  • 3. Background information Bitcoin blockheaders can be regarded as example of DDMS DDMS (Dynamic membership multi-party signature) ◦ Digital signature formed by a set of signers which has no fixed size Similarity ◦ any one can contribute with no enrolment process; contribution is weighted by computational power rather than one threshold signature contribution per party Difference ◦ Blockchain use of DDMS as a signature of computational power rather than a signature of knowledge ◦ Blockchain signers prove computational work, rather than proving secret knowledge as is typical for digital signature.
  • 4. Pegged Sidechain(two-way peg) design idea Interoperable blockchains ◦ Allow movement of asserts between blockchains, new systems could be developed which users could adopt by simply reusing the existing bitcoin currency. Designed Properties 1. Assets which are moved between sidechains should be able to be moved back by whomever their current holder is, and nobody else (including previous holders). 2. Assets should be moved without counterparty risk; that is, there should be no ability for a dishonest party to prevent the transfer occurring 3. Transfers should be atomic, i.e. happen entirely or not at all. There should not be failure modes that result in loss or allow fraudulent creation of assets. 4. Sidechains should be firewalled: a bug in one sidechain enabling creation (or theft) of assets in that chain should not result in creation or theft of assets on any other chain. 5. Blockchain reorganisations should be handled cleanly, even during transfers; any disruption should be localised to the sidechain on which it occurs. In general, sidechains should ideally be fully independent, with users providing any necessary data from other chains. Validators of a sidechain should only be required to track another chain if that is an explicit consensus rule of the sidechain itself. 6. Users should not be required to track sidechains that they are not actively using.
  • 5. Proposed method Transfer assets by providing proofs of possession in the transferring transaction themselves Break down: ◦ Chain 1 transfer asset to Chain 2 ◦ Chain 1: create a transaction, locking the assets ◦ Chain 2:create a transaction with input contain a cryptographic proof that lock was done correctly. Inputs tagged with an asset type(the genesis hash of its originating blockchain) ◦ Chain 1 can transfer to chain 2 and vice versa
  • 6. Definitions Sidechain ◦ is a blockchain that validates data from other blockchains. Two-way peg ◦ refers to the mechanism by which coins are transferred between sidechains and back at a fixed or otherwise deterministic exchange rate. A pegged sidechain ◦ is a sidechain whose assets can be imported from and returned to other chains; that is, a sidechain that supports two-way pegged assets. A simplified payment verification proof (or SPV proof ) ◦ is a DMMS that an action occurred on a Bitcoin-like proof-of-work blockchain.
  • 7. Symmetric two-way peg This works as follows: to transfer parent chain coins into sidechain coins, the parent chain coins are sent to a special output on the parent chain that can only be unlocked by an SPV proof of possession on the sidechain. To synchronise the two chains, we need to define two waiting periods: ◦ The confirmation period of a transfer between sidechains is a duration for which a coin must be locked on the parent chain before it can be transferred to the sidechain. A typical confirmation period would be on the order of a day or two. ◦ After creating the special output on the parent chain, the user waits out the confirmation period, then creates a transaction on the sidechain referencing this output, providing an SPV proof that it was created and buried under sufficient work on the the parent chain. ◦ The confirmation period is a per-sidechain security parameter, which trades cross-chain transfer speed for security. ◦ The user must then wait for the contest period. This is a duration in which a newly-transferred coin may not be spent on the sidechain. ◦ The purpose of a contest period is to prevent double- 240 spending by transferring previously-locked coins during a reorganisation. If at any point during this delay, a new proof is published containing a chain with more aggregate work which does not include the block in which the lock output was created, the conversion is retroactively invalidated. We call this a reorganisation proof. ◦ All users of the sidechain have an incentive to produce reorganisation proofs if possible, as the consequence of a bad proof being admitted is a dilution in the value of all coins. A typical contest period would also be on the order of a day or two. To avoid these delays, users will likely use atomic swaps (described in Appendix C) for most transfers, as long as a liquid market is available.
  • 9. Drawbacks of sidechain Complexity ◦ Network level:multiple independent unsynchronized blockchain supporting transfers between each other. Must support transaction scripts which can be invalidate by a later reorganization proof. ◦ Software needed to detect misbehaviors, and produce and publish proofs. ◦ Assets level: each chain may support arbitrarily many assets ◦ Each of these assets is labelled with the chain it was transferred from ◦ User interface: need to have wallets that adapt and support multiple chains and transfers of assets between chains Fraudulent transfers ◦ Reorganisation of arbitrary depth in principle possible, which could allow attacker to completely transfer coins between sidechains before causing a reorganisation longer than the contest period on the sending chain to undo its half of the transfer. ◦ Reaction design ◦ No reaction: the sidechain is a “fractional reserve” of the assets it is storing from other chains ◦ The peg and all dependent transactions could be reversed. ◦ The amount of all coins could be reduced, while leaving the exchange rate intact.
  • 10. Drawbacks of sidechain Risk of centralisation of mining ◦ Sidechain with mining fee may place resource pressure on miners, creating bitcoin centralisation risks Risk of soft-fork
  • 11. Applications Altchain experiments ◦ Technical experiment ◦ Fixing undesired transaction malleability ◦ Improved payer privacy ◦ Script extensions ◦ Many ideas for extending bitcoin in incompatible way ◦ Economic experimentation Issued assets ◦ Side chains can have their own assets and currencies
  • 12. SPV proof composed of (a) a list of blockheaders demonstrating proof-of work, and (b) a cryptographic proof that an output was created in one of the blocks in the list. This allows verifiers to check that some amount of work has been committed to the existence of an output. Such a proof may be invalidated by another proof demonstrating the existence of a chain with more work which does not include the block which created the output. Using SPV proofs to determine history, implicitly trusting that the longest blockchain is also the longest correct blockchain, is done by so-called SPV clients in Bitcoin. Only a dishonest collusion with greater than 50% of the hashpower can persistently fool an SPV client (unless the client is under a long-term Sybil attack, preventing it from seeing the actual longest chain), since the honest hashpower will not contribute work to an invalid chain

Editor's Notes

  1. The purpose of this confirmation period is to allow for sufficient work to be created such that a denial of service attack in the next waiting period becomes more difficult.