SlideShare a Scribd company logo
Squaring Zooko's Triangle
Blockchain Authentication
for Smart Dusts
DaoliName Service
May 2019
Authentication for Smart Dusts?
May I know your name dust?
• Once upon a time, ..., family name, ..., Tel no, library study, postcode,
inventory, ..., domain names, email address, URL, ..., You name it!
• 1992: DARPA-CNRI proposed “Handle System”
• 1994: DOI (Digital Object Identifiers) implementation
• 2003: IETF Handle System RFCs
– RFC-3650 Handle System Overview
– RFC-3651 Handle System Namespace and Service Definition
– RFC-3652 Handle System Protocol (ver 2.1) Specification
• 2017: Chinese IoT Name Resolution Whitepaper
What's in common: GoodIDs = universally uniquely identifiable,
structured, meaningful for human, scalably manageable
2DaoliName All Rights Reserved ©2019
Peer-to-Peer Connection Multiply2
One phone is useless
Two phones are very useful,
no wonder cryptographers
are so addicted to study
Alice and Bob
Metcalfe's Law: n phones
p2p connected = n2 multiply
revenue for, e.g., “The
Phone Company”
However unless phone
numbers are structurally
organized, line plugging girls
would have been in
nightmarish job
3DaoliName All Rights Reserved ©2019
With dusts already smart, crypto does authentication
Public Key: n nodes authentication complexity = n
• With random private key → random public key, in
a close system, e.g., BTC, blockchain, peer
nodes having random ID features anonymity!
Who is Nakamoto? p2p = r2r (r = random)
• PKI: CA binds a GoodID to a random public key.
A cert may be huge to have all revoked certs.
PKI has never won clients, let alone mobiles
( Trust CA, not the figure in the right! )
• PGP: 1st Amendment free export RSA!
• Identity Based Crypto: GoodID is public key!
Need Private Key Generator (PKG). Centralized
gravity for attacks! Why no semblance of impact
since a promising proposal in 20 years ago?
Mandate From 2019: Smart Dusts
Must Know Each Other in Authentication
4DaoliName All Rights Reserved ©2019
Zooko's Triangle for ID Authentication
My WeChat ID binding to an address can ONLY
enjoy 2 out of the following 3 usefulness:
http://wechat.com/f6b9ef03e8b...f71c3:
Putting this ID = address to a public
blockchain, the (ID, address) binding is
decentralize secured, but the ID is not
human meaningful, i.e., not a GoodID
http://wechat.com/wenbo_mao:
Signing to bind this GoodID to an
address, with a certificate issued by, e.g.,
DNSSEC, (ID, address) binding is secure
but must trust a centralized CA root
DNS no SEC can also binds the above
GoodID to an insecure address
Zcash founder Zooko Wilcox-O'Hearn
made this “Pick 2 only” conjecture
5DaoliName All Rights Reserved ©2019
An Awesome Example of
Managing GoodIDs
Domain Names: Well
structured, global scale
searchable, DNS binds
DN as a GoodID to a
more random looking IP
DNS is an interactive
query-answer system,
pyramid sale structure
and management
efficiency, and the
service enjoys natural
monopoly
6DaoliName All Rights Reserved ©2019
GoodID as a Public Key (IDPK)
Inspiration from Interaction
• Consider a DN = public key, a client
can verify binding ( DN, IP ). IBC can
offer a good DNS security solution
• Observe, a returned IP can also be a
public key, though looking random,
bilinear pairing can verify the binding
• Q: What is one more IDPK for?
• Eureka! The private key behind this
IDPK needn't be generated by PKG
anymore!
• Centralized gravity for attacks and
single point failure is dispersed
7DaoliName All Rights Reserved ©2019
Trustlessly Agreeable Diffie-Hellman
Quadruple Membership Decision
DaoliName All Rights Reserved ©2019 8
( Alice1, Alice2, [kAlice]Alice1, [kAlice]Alice2 ) is called Trustlessly
Agreeable Diffie-Hellman Quadruple (TADHQ). Publicly decidability of
TADHQ means it contains ONLY GoodID. Entering TADHQ in a public
blockchain service, GoodID is publicly agreeable being cryptography
worthy public key(s).
Bilinear Pairing, bilinearity easily computable
),(ˆ),(ˆ),(ˆ
),(ˆ),(ˆ),(ˆ
VUeUUeVUUe
UVeUUeUVUe


)Alice,Alice]([ˆ)Alice][,Alice(ˆ 21Alice2Alice1 keke 
Let Alice1, Alice2 be “pairing friendly elliptic curve”
points which are deterministically derived from
Alice's GoodID. The following pairing equation is
publicly decidable, i.e., Trustlessly Agreeable.
Decision making does not need to know Alice's private key kAlice
Zooko's Triangle: No More a Trilemma
DaoliName All Rights Reserved ©2019 9
Version 1
Let Alice have a blockchain wallet,
with the wallet's private key being kAlice
Using her wallet's private key and
GoodID, Alice can construct TADHQ:
(Alice1, Alice2, [kAlice]Alice1, [kAlice]Alice2)
By destroying anonymity for her blockchain address,
Alice gains advantage of enjoying “squaring” Zooko's Triangle!
Alice's blockchain wallet provides authentication for binding
her GoodID and her blockchain address, trustlessly
In this preliminary version, Alice's GoodID may be stolen by
somebody in 1st-come-1st-serve manner: it remains secure
for that blockchain wallet owner
DaoliName Service for IDPK
Distributed consensus ledger fixation of
TADHQ for IDPK:
• No one can alter TADHQ, i.e., GoodID
based IDPK, fixation once entering a
distributed consensus ledger
• No CA, no PKG, no centralized single
point of attack or failure
• Peer-to-peer, e.g., mobile phone VPN
overlaying social network
• Service handles no secret and can be
easily elastically scaled in world wide
distributed replicas
• IDPK uses ID-asking, IDPK-answering
online service, so it has inherent key
revocation (Who can live offline today,
not even a cryptographer!)
10DaoliName All Rights Reserved ©2019
Applications
• DNs are GoodIDs, IPs bound to DNs are
GoodIDs too, therefore SSL like web
security can straightforwardly use IDPK:
No CA, no cert, no muss, no fuss
• IPSec VPN: No CA, no cert, off you go!
• Clients IDPK: SSL two-way authentication
for the first time
• Overlay “VPN” on top of social media
network as underlay, e.g., secure, private,
business and office uses of WeChat,
Facebook, and the like
• IoT security, ...
11DaoliName All Rights Reserved ©2019
Try it NOW!
IDPK “VPN” overlay social media network
http://daoliname.com:8080/daoliname.apk
IDPK “VPN” Overlay: Explained
DaoliName All Rights Reserved ©2019 12
A Smart Contract Example:
Party A: Alice's smart phone with social media account “Alice” = GoodID
Party B: The World
Contract Content: “Alice”, TADHQ = ( Alice1, [kAlice]Alice1, Alice2, [kAlice]Alice2 )
Screen shot of Alice timely showing-off on her social media
Contract Output: 1: Hash of Contract Content entering the Blockchain
2: Private key kAlice establishing in Alice's smart phone
Alice's
smart
phone
Bob's
smart
phone
Blockchain Service
for IDPK Setup, e.g.,
Smart Contract Execution
(distributed, replicated,
trustless, no user secret)
Physical
Underlay
Network
Underlay
Network, e.g.,
Social Media
for ID Mngt
+ Ciphertext
Passage
Physical
Underlay
Network
Peer to Peer
Overlay Network
Ledger
IDPK Setup
Smart Contract
Execution
Improving “Smart Contract” Content
In the “social media timely showing off”
example, “timely” can include a challenge
response mechanism, and “showing off”
can be Alice persuading her friends to
flatter her. These are designed to add
difficulties to GoodID theft
Let Bob be an old acquaintance of Alice,
the following bilinear paring equations
are trustlessly verifiable
1. Bob has already registered his IDPK, the following TADHQ
( Bob1, [kBob]Bob1, Bob2, [kBob]Bob2 ) is already in the ledger;
2. Bob is introducing Alice to Registrar by using his private key to sign
Alice's GoodID, in exactly the way of PGP Web-of-Trust
Registrar can demand Alice to submit several PGP Web-of-Trust helpers
signatures, for “Alice” being more and more likely her own GoodID
13DaoliName All Rights Reserved ©2019
)Alice][,Bob(ˆ)Alice,Bob]([ˆ
)Bob][,Alice(ˆ)Bob,Alice]([ˆ
2Bob121Bob
2Bob121Bob
keke
keke


The Future is Private AND NOT Centralized
Try it NOW! IBC for smart phones
http://daoliname.com:8080/daoliname.apk
(Android for the moment, other OSes soon)

More Related Content

What's hot

NFTs and Their Role in The Metaverse
NFTs and Their Role in The MetaverseNFTs and Their Role in The Metaverse
NFTs and Their Role in The Metaverse
101 Blockchains
 
Identity Theft
Identity TheftIdentity Theft
Software Modeling of Contracts in Games and Finance, Part 1: 2018-01-10
Software Modeling of Contracts in Games and Finance, Part 1: 2018-01-10Software Modeling of Contracts in Games and Finance, Part 1: 2018-01-10
Software Modeling of Contracts in Games and Finance, Part 1: 2018-01-10
Jay Coskey
 
071031 Njedge
071031 Njedge071031 Njedge
071031 Njedge
AJ Kelton
 
Blockchian introduction
Blockchian introductionBlockchian introduction
Blockchian introduction
kesavan N B
 
Mini Satoshi Whitepaper V1
Mini Satoshi Whitepaper V1Mini Satoshi Whitepaper V1
Mini Satoshi Whitepaper V1
MiniSatoshi
 
Sarwar sayeed , hector marco gisbert, tom caira ieee
Sarwar sayeed , hector marco gisbert, tom caira ieeeSarwar sayeed , hector marco gisbert, tom caira ieee
Sarwar sayeed , hector marco gisbert, tom caira ieee
IT Strategy Group
 
Jehyuk jang and heung no lee ieee
Jehyuk jang and heung no lee ieeeJehyuk jang and heung no lee ieee
Jehyuk jang and heung no lee ieee
IT Strategy Group
 
50120130406038
5012013040603850120130406038
50120130406038
IAEME Publication
 
Blockchain presentation v0617
Blockchain presentation v0617Blockchain presentation v0617
Blockchain presentation v0617
Joaquim Pedro Antunes
 
Cto eng
Cto engCto eng
Cto eng
gary wang
 
The use cases of blockchain technology
The use cases of blockchain technologyThe use cases of blockchain technology
The use cases of blockchain technology
Ugokwe Marcellus Ifeanyi
 
Jehyuk jang and heung no lee ieee double spend
Jehyuk jang and heung no lee ieee double spendJehyuk jang and heung no lee ieee double spend
Jehyuk jang and heung no lee ieee double spend
IT Strategy Group
 
Cyber crime
Cyber crimeCyber crime
Blockchain 50 companies
Blockchain 50 companiesBlockchain 50 companies
Blockchain 50 companies
makipei
 
Restribute ~ Wealth re-distirbution by blockchain hardfork ~
Restribute ~ Wealth re-distirbution by blockchain hardfork ~ Restribute ~ Wealth re-distirbution by blockchain hardfork ~
Restribute ~ Wealth re-distirbution by blockchain hardfork ~
Tomoaki Sato
 
Iceic2019 final presented
Iceic2019 final presentedIceic2019 final presented
Iceic2019 final presented
Heung-No Lee
 
Ch31354359
Ch31354359Ch31354359
Ch31354359
IJMER
 
Blockchain Introduction
Blockchain IntroductionBlockchain Introduction
Blockchain Introduction
Kaushik Dutta
 
Top 8 blockchain based smart contract platforms
Top 8 blockchain based smart contract platformsTop 8 blockchain based smart contract platforms
Top 8 blockchain based smart contract platforms
Blockchain Council
 

What's hot (20)

NFTs and Their Role in The Metaverse
NFTs and Their Role in The MetaverseNFTs and Their Role in The Metaverse
NFTs and Their Role in The Metaverse
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Software Modeling of Contracts in Games and Finance, Part 1: 2018-01-10
Software Modeling of Contracts in Games and Finance, Part 1: 2018-01-10Software Modeling of Contracts in Games and Finance, Part 1: 2018-01-10
Software Modeling of Contracts in Games and Finance, Part 1: 2018-01-10
 
071031 Njedge
071031 Njedge071031 Njedge
071031 Njedge
 
Blockchian introduction
Blockchian introductionBlockchian introduction
Blockchian introduction
 
Mini Satoshi Whitepaper V1
Mini Satoshi Whitepaper V1Mini Satoshi Whitepaper V1
Mini Satoshi Whitepaper V1
 
Sarwar sayeed , hector marco gisbert, tom caira ieee
Sarwar sayeed , hector marco gisbert, tom caira ieeeSarwar sayeed , hector marco gisbert, tom caira ieee
Sarwar sayeed , hector marco gisbert, tom caira ieee
 
Jehyuk jang and heung no lee ieee
Jehyuk jang and heung no lee ieeeJehyuk jang and heung no lee ieee
Jehyuk jang and heung no lee ieee
 
50120130406038
5012013040603850120130406038
50120130406038
 
Blockchain presentation v0617
Blockchain presentation v0617Blockchain presentation v0617
Blockchain presentation v0617
 
Cto eng
Cto engCto eng
Cto eng
 
The use cases of blockchain technology
The use cases of blockchain technologyThe use cases of blockchain technology
The use cases of blockchain technology
 
Jehyuk jang and heung no lee ieee double spend
Jehyuk jang and heung no lee ieee double spendJehyuk jang and heung no lee ieee double spend
Jehyuk jang and heung no lee ieee double spend
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Blockchain 50 companies
Blockchain 50 companiesBlockchain 50 companies
Blockchain 50 companies
 
Restribute ~ Wealth re-distirbution by blockchain hardfork ~
Restribute ~ Wealth re-distirbution by blockchain hardfork ~ Restribute ~ Wealth re-distirbution by blockchain hardfork ~
Restribute ~ Wealth re-distirbution by blockchain hardfork ~
 
Iceic2019 final presented
Iceic2019 final presentedIceic2019 final presented
Iceic2019 final presented
 
Ch31354359
Ch31354359Ch31354359
Ch31354359
 
Blockchain Introduction
Blockchain IntroductionBlockchain Introduction
Blockchain Introduction
 
Top 8 blockchain based smart contract platforms
Top 8 blockchain based smart contract platformsTop 8 blockchain based smart contract platforms
Top 8 blockchain based smart contract platforms
 

Similar to Squaring Zooko's Triangle - Blockchain Authentication for Smart Dusts

Blockchain ibc eng
Blockchain ibc engBlockchain ibc eng
Blockchain ibc eng
DaoliCloud Ltd
 
BigchainDB and Beyond
BigchainDB and BeyondBigchainDB and Beyond
BigchainDB and Beyond
Dimitri De Jonghe
 
TBD Presentation - Web5: "extra decentralized" web platform (by Square)
TBD Presentation - Web5: "extra decentralized" web platform (by Square)TBD Presentation - Web5: "extra decentralized" web platform (by Square)
TBD Presentation - Web5: "extra decentralized" web platform (by Square)
Pitch Decks
 
Domain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network HackingDomain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network Hacking
ShivamSharma909
 
CEH Domain 6.pdf
CEH Domain 6.pdfCEH Domain 6.pdf
CEH Domain 6.pdf
infosec train
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web Summit
Kaliya "Identity Woman" Young
 
CrowdSec A-Round Fundraising Deck
CrowdSec A-Round Fundraising DeckCrowdSec A-Round Fundraising Deck
CrowdSec A-Round Fundraising Deck
CrowdSec
 
Airports redacted with_comments_from_tony_yustein
Airports redacted with_comments_from_tony_yusteinAirports redacted with_comments_from_tony_yustein
Airports redacted with_comments_from_tony_yustein
Tony Yustein
 
PKI in today's landscape (Mauritius - Siddick)
PKI in today's landscape (Mauritius - Siddick)PKI in today's landscape (Mauritius - Siddick)
PKI in today's landscape (Mauritius - Siddick)
Siddick Elaheebocus
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
Abhimanyu Singh
 
ViaSip beta
ViaSip betaViaSip beta
ViaSip beta
Ed Pimentel
 
A Survey on Secure Data Sharing with Forward Security in Cloud Computing
A Survey on Secure Data Sharing with Forward Security in Cloud ComputingA Survey on Secure Data Sharing with Forward Security in Cloud Computing
A Survey on Secure Data Sharing with Forward Security in Cloud Computing
IRJET Journal
 
Web5 - Open to Build - Block-TBD
Web5 - Open to Build - Block-TBDWeb5 - Open to Build - Block-TBD
Web5 - Open to Build - Block-TBD
SSIMeetup
 
Blockchain and Bitcoin
Blockchain and BitcoinBlockchain and Bitcoin
Blockchain and Bitcoin
Hugo Rodrigues
 
SSL/TLS for Mortals (Voxxed Days Luxembourg)
SSL/TLS for Mortals (Voxxed Days Luxembourg)SSL/TLS for Mortals (Voxxed Days Luxembourg)
SSL/TLS for Mortals (Voxxed Days Luxembourg)
Maarten Mulders
 
Ethereum Smart Contracts 101 with Cryptizens.io
Ethereum Smart Contracts 101 with Cryptizens.ioEthereum Smart Contracts 101 with Cryptizens.io
Ethereum Smart Contracts 101 with Cryptizens.io
Thomas Charles Vanderstraeten
 
DaoliName Key Management Solution
DaoliName Key Management SolutionDaoliName Key Management Solution
DaoliName Key Management Solution
DaoliCloud Ltd
 
Mobile Privacy - Meetup #5 - 2022-10-13
Mobile Privacy - Meetup #5 - 2022-10-13Mobile Privacy - Meetup #5 - 2022-10-13
Mobile Privacy - Meetup #5 - 2022-10-13
RoundRockBitcoiners
 
The DDS Security Standard
The DDS Security StandardThe DDS Security Standard
The DDS Security Standard
Angelo Corsaro
 
CAN BLOCKCHAIN PRIVATE KEY BE HACKED?
CAN BLOCKCHAIN PRIVATE KEY BE HACKED?CAN BLOCKCHAIN PRIVATE KEY BE HACKED?
CAN BLOCKCHAIN PRIVATE KEY BE HACKED?
Blockchain Council
 

Similar to Squaring Zooko's Triangle - Blockchain Authentication for Smart Dusts (20)

Blockchain ibc eng
Blockchain ibc engBlockchain ibc eng
Blockchain ibc eng
 
BigchainDB and Beyond
BigchainDB and BeyondBigchainDB and Beyond
BigchainDB and Beyond
 
TBD Presentation - Web5: "extra decentralized" web platform (by Square)
TBD Presentation - Web5: "extra decentralized" web platform (by Square)TBD Presentation - Web5: "extra decentralized" web platform (by Square)
TBD Presentation - Web5: "extra decentralized" web platform (by Square)
 
Domain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network HackingDomain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network Hacking
 
CEH Domain 6.pdf
CEH Domain 6.pdfCEH Domain 6.pdf
CEH Domain 6.pdf
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web Summit
 
CrowdSec A-Round Fundraising Deck
CrowdSec A-Round Fundraising DeckCrowdSec A-Round Fundraising Deck
CrowdSec A-Round Fundraising Deck
 
Airports redacted with_comments_from_tony_yustein
Airports redacted with_comments_from_tony_yusteinAirports redacted with_comments_from_tony_yustein
Airports redacted with_comments_from_tony_yustein
 
PKI in today's landscape (Mauritius - Siddick)
PKI in today's landscape (Mauritius - Siddick)PKI in today's landscape (Mauritius - Siddick)
PKI in today's landscape (Mauritius - Siddick)
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
 
ViaSip beta
ViaSip betaViaSip beta
ViaSip beta
 
A Survey on Secure Data Sharing with Forward Security in Cloud Computing
A Survey on Secure Data Sharing with Forward Security in Cloud ComputingA Survey on Secure Data Sharing with Forward Security in Cloud Computing
A Survey on Secure Data Sharing with Forward Security in Cloud Computing
 
Web5 - Open to Build - Block-TBD
Web5 - Open to Build - Block-TBDWeb5 - Open to Build - Block-TBD
Web5 - Open to Build - Block-TBD
 
Blockchain and Bitcoin
Blockchain and BitcoinBlockchain and Bitcoin
Blockchain and Bitcoin
 
SSL/TLS for Mortals (Voxxed Days Luxembourg)
SSL/TLS for Mortals (Voxxed Days Luxembourg)SSL/TLS for Mortals (Voxxed Days Luxembourg)
SSL/TLS for Mortals (Voxxed Days Luxembourg)
 
Ethereum Smart Contracts 101 with Cryptizens.io
Ethereum Smart Contracts 101 with Cryptizens.ioEthereum Smart Contracts 101 with Cryptizens.io
Ethereum Smart Contracts 101 with Cryptizens.io
 
DaoliName Key Management Solution
DaoliName Key Management SolutionDaoliName Key Management Solution
DaoliName Key Management Solution
 
Mobile Privacy - Meetup #5 - 2022-10-13
Mobile Privacy - Meetup #5 - 2022-10-13Mobile Privacy - Meetup #5 - 2022-10-13
Mobile Privacy - Meetup #5 - 2022-10-13
 
The DDS Security Standard
The DDS Security StandardThe DDS Security Standard
The DDS Security Standard
 
CAN BLOCKCHAIN PRIVATE KEY BE HACKED?
CAN BLOCKCHAIN PRIVATE KEY BE HACKED?CAN BLOCKCHAIN PRIVATE KEY BE HACKED?
CAN BLOCKCHAIN PRIVATE KEY BE HACKED?
 

Recently uploaded

E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
Hornet Dynamics
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Crescat
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
rickgrimesss22
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
Drona Infotech
 
socradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdfsocradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdf
SOCRadar
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
Shane Coughlan
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
Green Software Development
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke
 
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdfRevolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
Undress Baby
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
lorraineandreiamcidl
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Łukasz Chruściel
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
Boni García
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
Ayan Halder
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
Łukasz Chruściel
 
DDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systemsDDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systems
Gerardo Pardo-Castellote
 
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise EditionWhy Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Envertis Software Solutions
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
Remote DBA Services
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
Deuglo Infosystem Pvt Ltd
 
E-commerce Application Development Company.pdf
E-commerce Application Development Company.pdfE-commerce Application Development Company.pdf
E-commerce Application Development Company.pdf
Hornet Dynamics
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
Green Software Development
 

Recently uploaded (20)

E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
 
socradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdfsocradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdf
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
 
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdfRevolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
 
DDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systemsDDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systems
 
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise EditionWhy Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
 
E-commerce Application Development Company.pdf
E-commerce Application Development Company.pdfE-commerce Application Development Company.pdf
E-commerce Application Development Company.pdf
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
 

Squaring Zooko's Triangle - Blockchain Authentication for Smart Dusts

  • 1. Squaring Zooko's Triangle Blockchain Authentication for Smart Dusts DaoliName Service May 2019
  • 2. Authentication for Smart Dusts? May I know your name dust? • Once upon a time, ..., family name, ..., Tel no, library study, postcode, inventory, ..., domain names, email address, URL, ..., You name it! • 1992: DARPA-CNRI proposed “Handle System” • 1994: DOI (Digital Object Identifiers) implementation • 2003: IETF Handle System RFCs – RFC-3650 Handle System Overview – RFC-3651 Handle System Namespace and Service Definition – RFC-3652 Handle System Protocol (ver 2.1) Specification • 2017: Chinese IoT Name Resolution Whitepaper What's in common: GoodIDs = universally uniquely identifiable, structured, meaningful for human, scalably manageable 2DaoliName All Rights Reserved ©2019
  • 3. Peer-to-Peer Connection Multiply2 One phone is useless Two phones are very useful, no wonder cryptographers are so addicted to study Alice and Bob Metcalfe's Law: n phones p2p connected = n2 multiply revenue for, e.g., “The Phone Company” However unless phone numbers are structurally organized, line plugging girls would have been in nightmarish job 3DaoliName All Rights Reserved ©2019
  • 4. With dusts already smart, crypto does authentication Public Key: n nodes authentication complexity = n • With random private key → random public key, in a close system, e.g., BTC, blockchain, peer nodes having random ID features anonymity! Who is Nakamoto? p2p = r2r (r = random) • PKI: CA binds a GoodID to a random public key. A cert may be huge to have all revoked certs. PKI has never won clients, let alone mobiles ( Trust CA, not the figure in the right! ) • PGP: 1st Amendment free export RSA! • Identity Based Crypto: GoodID is public key! Need Private Key Generator (PKG). Centralized gravity for attacks! Why no semblance of impact since a promising proposal in 20 years ago? Mandate From 2019: Smart Dusts Must Know Each Other in Authentication 4DaoliName All Rights Reserved ©2019
  • 5. Zooko's Triangle for ID Authentication My WeChat ID binding to an address can ONLY enjoy 2 out of the following 3 usefulness: http://wechat.com/f6b9ef03e8b...f71c3: Putting this ID = address to a public blockchain, the (ID, address) binding is decentralize secured, but the ID is not human meaningful, i.e., not a GoodID http://wechat.com/wenbo_mao: Signing to bind this GoodID to an address, with a certificate issued by, e.g., DNSSEC, (ID, address) binding is secure but must trust a centralized CA root DNS no SEC can also binds the above GoodID to an insecure address Zcash founder Zooko Wilcox-O'Hearn made this “Pick 2 only” conjecture 5DaoliName All Rights Reserved ©2019
  • 6. An Awesome Example of Managing GoodIDs Domain Names: Well structured, global scale searchable, DNS binds DN as a GoodID to a more random looking IP DNS is an interactive query-answer system, pyramid sale structure and management efficiency, and the service enjoys natural monopoly 6DaoliName All Rights Reserved ©2019
  • 7. GoodID as a Public Key (IDPK) Inspiration from Interaction • Consider a DN = public key, a client can verify binding ( DN, IP ). IBC can offer a good DNS security solution • Observe, a returned IP can also be a public key, though looking random, bilinear pairing can verify the binding • Q: What is one more IDPK for? • Eureka! The private key behind this IDPK needn't be generated by PKG anymore! • Centralized gravity for attacks and single point failure is dispersed 7DaoliName All Rights Reserved ©2019
  • 8. Trustlessly Agreeable Diffie-Hellman Quadruple Membership Decision DaoliName All Rights Reserved ©2019 8 ( Alice1, Alice2, [kAlice]Alice1, [kAlice]Alice2 ) is called Trustlessly Agreeable Diffie-Hellman Quadruple (TADHQ). Publicly decidability of TADHQ means it contains ONLY GoodID. Entering TADHQ in a public blockchain service, GoodID is publicly agreeable being cryptography worthy public key(s). Bilinear Pairing, bilinearity easily computable ),(ˆ),(ˆ),(ˆ ),(ˆ),(ˆ),(ˆ VUeUUeVUUe UVeUUeUVUe   )Alice,Alice]([ˆ)Alice][,Alice(ˆ 21Alice2Alice1 keke  Let Alice1, Alice2 be “pairing friendly elliptic curve” points which are deterministically derived from Alice's GoodID. The following pairing equation is publicly decidable, i.e., Trustlessly Agreeable. Decision making does not need to know Alice's private key kAlice
  • 9. Zooko's Triangle: No More a Trilemma DaoliName All Rights Reserved ©2019 9 Version 1 Let Alice have a blockchain wallet, with the wallet's private key being kAlice Using her wallet's private key and GoodID, Alice can construct TADHQ: (Alice1, Alice2, [kAlice]Alice1, [kAlice]Alice2) By destroying anonymity for her blockchain address, Alice gains advantage of enjoying “squaring” Zooko's Triangle! Alice's blockchain wallet provides authentication for binding her GoodID and her blockchain address, trustlessly In this preliminary version, Alice's GoodID may be stolen by somebody in 1st-come-1st-serve manner: it remains secure for that blockchain wallet owner
  • 10. DaoliName Service for IDPK Distributed consensus ledger fixation of TADHQ for IDPK: • No one can alter TADHQ, i.e., GoodID based IDPK, fixation once entering a distributed consensus ledger • No CA, no PKG, no centralized single point of attack or failure • Peer-to-peer, e.g., mobile phone VPN overlaying social network • Service handles no secret and can be easily elastically scaled in world wide distributed replicas • IDPK uses ID-asking, IDPK-answering online service, so it has inherent key revocation (Who can live offline today, not even a cryptographer!) 10DaoliName All Rights Reserved ©2019
  • 11. Applications • DNs are GoodIDs, IPs bound to DNs are GoodIDs too, therefore SSL like web security can straightforwardly use IDPK: No CA, no cert, no muss, no fuss • IPSec VPN: No CA, no cert, off you go! • Clients IDPK: SSL two-way authentication for the first time • Overlay “VPN” on top of social media network as underlay, e.g., secure, private, business and office uses of WeChat, Facebook, and the like • IoT security, ... 11DaoliName All Rights Reserved ©2019 Try it NOW! IDPK “VPN” overlay social media network http://daoliname.com:8080/daoliname.apk
  • 12. IDPK “VPN” Overlay: Explained DaoliName All Rights Reserved ©2019 12 A Smart Contract Example: Party A: Alice's smart phone with social media account “Alice” = GoodID Party B: The World Contract Content: “Alice”, TADHQ = ( Alice1, [kAlice]Alice1, Alice2, [kAlice]Alice2 ) Screen shot of Alice timely showing-off on her social media Contract Output: 1: Hash of Contract Content entering the Blockchain 2: Private key kAlice establishing in Alice's smart phone Alice's smart phone Bob's smart phone Blockchain Service for IDPK Setup, e.g., Smart Contract Execution (distributed, replicated, trustless, no user secret) Physical Underlay Network Underlay Network, e.g., Social Media for ID Mngt + Ciphertext Passage Physical Underlay Network Peer to Peer Overlay Network Ledger IDPK Setup Smart Contract Execution
  • 13. Improving “Smart Contract” Content In the “social media timely showing off” example, “timely” can include a challenge response mechanism, and “showing off” can be Alice persuading her friends to flatter her. These are designed to add difficulties to GoodID theft Let Bob be an old acquaintance of Alice, the following bilinear paring equations are trustlessly verifiable 1. Bob has already registered his IDPK, the following TADHQ ( Bob1, [kBob]Bob1, Bob2, [kBob]Bob2 ) is already in the ledger; 2. Bob is introducing Alice to Registrar by using his private key to sign Alice's GoodID, in exactly the way of PGP Web-of-Trust Registrar can demand Alice to submit several PGP Web-of-Trust helpers signatures, for “Alice” being more and more likely her own GoodID 13DaoliName All Rights Reserved ©2019 )Alice][,Bob(ˆ)Alice,Bob]([ˆ )Bob][,Alice(ˆ)Bob,Alice]([ˆ 2Bob121Bob 2Bob121Bob keke keke  
  • 14. The Future is Private AND NOT Centralized Try it NOW! IBC for smart phones http://daoliname.com:8080/daoliname.apk (Android for the moment, other OSes soon)