SlideShare a Scribd company logo
1 of 41
Download to read offline
Economics of
Decentralized
Currency Systems
By Ernie Teo, Research Fellow, Sim Kee
Boon Institute for Financial Economics
THE MONEY MATRIX
Internet coupon
Mobile coupon
E-money
Legal
status
Not based on
cryptography
Decentralized
cryptocurrencies
Centralized virtual
currencies
Physical
commodity money
Local currencies
Decentralized N/A
Currency
Regulated
Banknotes and
coins
Commercial
bank money
(deposits)
The Money Matrix
Money format
Physical
Digital
Cryptocurrency
Unregulated
Centralized
Coupon
Virtual
Taken from: http://en.wikipedia.org/wiki/Virtual_currency
Reference: European Central Bank (October 2012). "1". Virtual Currency Schemes (PDF).
Frankfurt am Main: European Central Bank. p. 5. ISBN 978-92-899-0862-7.
N/A
N/A
WHAT IS A
DECENTRALIZED MARKET?
INVESTOPEDIA EXPLAINS 'DECENTRALIZED MARKET'
• The foreign exchange market is an example of a
decentralized market because there is no one
physical location where investors go to buy or sell
currencies. Forex traders can use the internet to
check the quotes of various currency pairs from
different dealers from around the world.
http://www.investopedia.com/terms/d/decentralizedmarket.asp
WHAT IS DECENTRALIZED
CURRENCY?
A decentralized currency was defined by the US
Department of Treasury as a currency
• That has no central repository and no single
administrator
• That persons may obtain by their own computing or
manufacturing effort
• Rather than relying on confidence in a central
authority, it depends instead on a distributed
system of trust.
GRAPHICALLY…
WHY DECENTRALIZE?
Features
• Privacy – pseudo-anonymous
• Transparency – all transactions can be seen
• Trustless – doesn’t rely on trust
• Hard to shut down
• No chargebacks
• Ownership – users own their account
• Faster and cheaper than traditional international transfers
• Central government has no control
• Can’t print money to finance debts
• Non inflationary – there may be deflationary pressures
• Can’t take back uninsured deposits, eg. Cyprus
WHO MAY BENEFIT?
• The underbanked
• Overseas workers in need of international
remittance
• People looking for fast and cheap ways to pay over
the internet
• Citizens of countries facing risk of hyperinflation
• Libertarians – no government control and full
anonymity
HOW DO WE
“COUNT VOTES”?
• Decisions are made in decentralized systems by
participating “voters”
• It is necessary to ensure that protocol used to
validate all “votes” gives the desired results
• Unlike usual elections, votes are not counted by a
central authority
• There will be coordination problems in decision making
• The Byzantine General’s Problem is used to describes
such scenarios
THE BYZANTINE
GENERAL’S PROBLEM
• Byzantine generals
must decide
unanimously whether to
attack some enemy
army
• Each general’s army is
geographically
separated
• Must communicate by
sending messengers
• There is a presence of
traitors amongst the
generals
THE BYZANTINE
GENERAL’S PROBLEM
• Traitors can force decisions like
• Attacking when most generals do not wish to attack
• Confusing some generals to the point that they are
unable to make up their minds
• In a distributed/decentralized currency system,
each miner/validating node can be considered a
“general”
• Nodes need to agree upon the validity of a transaction
• Malicious nodes can work together to invalidate
legitimate transactions
• Or validate double spent transactions (by invalidating the first
transaction)
FORMULATING A SOLUTION
An algorithm need to guarantee that
A. All loyal generals decide upon the same plan of action
• The loyal generals will all do what the algorithm says they
should, but the traitors may do anything they wish
The algorithm must guarantee condition A regardless of what
the traitors do. We also want to insure that
B. A small number of traitors cannot cause the loyal generals
to adopt a bad plan
This ensures Byzantine Fault Tolerance
Pease, M.; Shostak, R.; Lamport, L. (April 1980). "Reaching Agreement in the
Presence of Faults". Journal of the ACM 27 (2): 228–
234. doi:10.1145/322186.322188
SOLUTIONS TO THE
BYZANTINE GENERAL’S
PROBLEM?
• Byzantine faults include:
• omission failures (e.g., crash failures, failing to receive a
request, or failing to send a response)
• commission failures (e.g., processing a request
incorrectly, corrupting local state, and/or sending an
incorrect or inconsistent response to a request).
• When a Byzantine failure has occurred, the system
may respond in any unpredictable way, unless it is
designed to have Byzantine fault tolerance
SOLUTIONS TO THE
BYZANTINE GENERAL’S
PROBLEM?
• The byzantine general’s problem has no solutions
unless
n ≥ 3t + 1
• where n is the number of processes in the system
and t is the number of traitors (faults)
• In other words, the algorithm can ensure correct
operation only if fewer than one third of the
processes are faulty
• If unforgeability of messages is possible, higher
fault tolerance is possible
UNDERSTANDING BYZANTINE
FAULT TOLERANCE WITH
GAME THEORY
• Abraham, Ittai, Lorenzo Alvisi, and Joseph Y.
Halpern. "Distributed computing meets game
theory: Combining insights from two fields." ACM
SIGACT News42.2 (2011): 69-76.
• To extend game theory to incorporate fault
tolerance, it is necessary to move beyond single
player deviations
• An equilibrium is k-resilient if no group of k players can
all do better by deviating
UNDERSTANDING BYZANTINE
FAULT TOLERANCE WITH
GAME THEORY
• We also need to consider non-rationality or
unanticipated behavior
• An equilibrium is t-immune if non-deviating players are
not made worse off by arbitrary deviations by up to t
players
• A Nash equilibrium has k=1 and t=0
• We get fault tolerance, we need an equilibrium
concept that is both k-resilient and t-immune
• One way to achieve that is by assuming altruistic or
obedient players
DECENTRALIZED CURRENCY AND THE
BYZANTINE GENERAL’S PROBLEM
• A number of Byzantine Generals each have a computer
and want to attack the King's computer system
• They must crack the password within a limited time to
break in and erase the logs, lest they be discovered
• They only have enough CPU power to crack it fast
enough if a majority of them attack at the same time
Adopted from:
https://bitcointalk.org/oldSiteFiles/byzantine.html
DECENTRALIZED CURRENCY AND THE
BYZANTINE GENERAL’S PROBLEM
• They don't particularly care when the attack will be,
just that they agree
• It has been decided that anyone who feels like it
will announce an attack time, whatever plan is
heard first will be the official plan
• The problem is that the network is not
instantaneous, and if two generals announce
different plans at close to the same time, some may
hear one first and others hear the other first.
Adopted from:
https://bitcointalk.org/oldSiteFiles/byzantine.html
MINING PROTOCOLS
• Mining protocols like bitcoin aims to achieve
byzantine agreement using a proof-of-work chain
• Once each general receives whatever plan he
hears first, he sets his computer to solve a difficult
hash-based proof-of-work problem that includes the
plan in its hash
• The proof-of-work is difficult enough that with all of
them working at once, it's expected to take 10
minutes before one of them finds a solution and
broadcasts it to the network
Bitcoin Primer
MINING PROTOCOLS
• Once received, everyone adjusts the hash in their
proof-of-work computation to include the first
solution, so that when they find the next proof-of-
work, it chains after the first one
• If anyone was working on a different plan, they
switch to this one, because its proof-of-work chain
is now longer
• After about two hours, the plan should be hashed
by a chain of 12 proofs-of-work
MINING PROTOCOLS
Plan A
Plan B
Plan A
hashed
Next Proof
of Work
Some computers starts solving
hashed based proof of work for plan A
Some computers starts solving
hashed based proof of work for plan B
Plan B is abandoned
The chain continues…
All computers move
to this chain
MINING PROTOCOLS
• Every general, just by verifying the difficulty of the
proof-of-work chain, can estimate how much
parallel CPU power per hour was expended on it
and see that it must have required the majority of
the computers to produce in the allotted time
• Difficulty = (Previous Difficulty) x
• Hash Rate = total amount of calculations the
network can make per second
Intended Time Taken
Actual Time Taken
MINING PROTOCOLS
• This would mean that most of them had to have
seen the plan, since the proof-of-work is proof that
they worked on it
• If the CPU power exhibited by the proof-of-work is
sufficient to crack the password, they can safely
attack at the agreed time
RIPPLE PRIMER
• Ripple Explained: Medieval Banking with a
Digital Twist, CoinDesk, May 11, 2014
• http://www.coindesk.com/ripple-medieval-banking-digital-twist/
• By Antony Lewis, ItBit
• Anthony uses the example of Hawala to explain
Ripple
• A traditional way of sending money in medieval Arabia which is
still practised today
RIPPLE PRIMER
• Alex wants to send money to Beth:
• Alex goes to his local hawala agent and gives him
some cash and a password, which he and Beth
share.
• The agent telephones Beth's local agent and
tells him to release funds to someone who can
provide the password.
• Beth walks in to her agent, says the password,
and receives cash
• Commissions can be taken from either or both
agents.
Based on: http://www.coindesk.com/ripple-medieval-banking-digital-twist/
RIPPLE PRIMER
• Money has been transmitted from Alex to Beth, but
the physical notes have not moved!
• Alex's agent owes Beth's agent money
• They can either settle the debt later, or hope that
there may be reverse transactions if other clients
want to move money in the opposite direction
Based on: http://www.coindesk.com/ripple-medieval-banking-digital-twist/
RIPPLE PRIMER
• Trust is involved
• In this scenario, there are three trust relationships:
• Alex has to trust that his agent will do the right
thing, as he is handing over cash
• Beth has to trust that her agent will do the right
thing, as she is expecting to receive cash
• The agents need to trust each other over the
repayment of the debt (IOUs)
Based on: http://www.coindesk.com/ripple-medieval-banking-digital-twist/
RIPPLE PRIMER
Moving to Ripple
• “Gateways” such as exchanges or banks perform
the function of agents
• IOUs can be communicated electronically over the
Ripple network
• Alex logs on to his preferred Ripple gateway,
deposits money to it
• Alex then transfer electronic funds to Beth
• Beth collects her funds via her gateway
Based on: http://www.coindesk.com/ripple-medieval-banking-digital-twist/
RIPPLE PRIMER
Moving to Ripple
• The system allows for trade between currencies
• Alex can deposit USD with his gateway but choose to
send EUR to Beth
• If the two gateways do not trust each other, we can
use a chain of trust
• eg, the two gateways operate on different currencies
• XRP, ripple’s native currency can be used
• XRP is irreversible and trustless
• Similar to bitcoin
Based on: http://www.coindesk.com/ripple-medieval-banking-digital-twist/
CONSENSUS
PROTOCOLS
• Each general has a unique node list (UNL)
• Have to be nodes not run by the same group or
individuals
• No need to trust UNL, just have to trust that <50% will
collude with each other
• Examples:
• General A and B hate each other
• General X and Y don’t speak the same language
• Each general can also choose nodes with a good
reputation or are non-anonymous
CONSENSUS
PROTOCOLS
• The plan/transaction is broadcasted into the
network
• Each node verifies the plan is sound and
broadcasts it into the network
• Verification is asynchronous, each round is timed
• In the first round, each node checks against their UNL
• If 50% agrees by the time limit, the node re-broadcasts the
message
• In the second round, 60% has to agree
• In the third round, 70% has to agree
• In the fourth round, 80% has to agree
CONSENSUS
PROTOCOLS
Plan X
General A
Round 1UNL
B
F
K
L
P
R
T
50%
reached
Plan X/ General A/ Round 1
Round 1 Broadcasts
ok
ok
ok
ok
Round 2
60%
reached
Plan X/ General A/ Round 2
ok
ok
ok
ok
ok
Round 2 Broadcasts
CONSENSUS
PROTOCOLS
• Consensus is reached at the end of the 4th round
• The message/transaction is applied to the last
closed ledger
• This is known as the Ripple Consensus Algorithm
• In reality, multiple messages are verified in each
“bundle”
• Messages that do not reach the target in either
round will be discarded and considered in the next
bundle
CONSENSUS
PROTOCOLS
• Consensus is reached at the end of the 4th round
• The message/transaction is applied to the last
closed ledger
• This is known as the Ripple Consensus Algorithm
• In reality, multiple messages are verified in each
“bundle”
• Messages that do not reach the target in either
round will be discarded and considered in the next
bundle
CONSENSUS
PROTOCOLS
• At 80%, the fault tolerance is
• t ≤ (n-1)/5
• Each general on the UNL may have different UNLs
from each other
• This makes the consensus decentralized
Economics of Decentalized Currency Systems
CONSENSUS
PROTOCOLS
• For nodes to reach agreement regardless of their
UNLs, certain amount of connectivity within the
network is required
• If a network is too cliquey, consensus could form within
cliques and forks can occur
DISCUSSION– MINING
• Miners are incentivize by rewards and transaction
fees
• As the system evolves over time, miners compete on
computational power
• This eventually led to the emergence of mining pools,
and less individual miners
• This causes the network to be less decentralized than
originally intended
• Mining protocols are “good enough” solutions to the
byzantine general’s problem
DISCUSSION– CONSENSUS
• No economic incentives to be validators
• Nodes would be gateways or exchanges
• Gateways may have more incentives to be validators in
order to ensure the health of the network
• The eco-system needs to be created by getting
gateways to join the network
• Consensus networks are faster as there is no
proof-of-work
The End, Thanks!
Any Comments are Welcomed
SHORT
BITCOIN PRIMER
• Bitcoin is a decentralized encrypted digital currency
system
• Transactions are recorded on a decentralized
online ledger called the Blockchain
• Ledger entries called blocks are created every 10
minutes on average
• Each ledger entry is chained to the previous entry
making it almost impossible to change past
transactions
SHORT
BITCOIN PRIMER
• bitcoins are created via the ledger validation
process called mining
• Each ‘miner’ participates in solving a cryptographic
puzzle which takes approximately 10 mins to solve
• Difficulty level is adjusted based on computing power
available
• bitcoins are received as a reward by miners
• Another way to get bitcoins is to trade it with fiat
currencies via exchanges
• Prices are determined by demand and supply
Back

More Related Content

What's hot

Bitcoin Protocols 1.0 and 2.0 Explained in the Series: Blockchain: The Inform...
Bitcoin Protocols 1.0 and 2.0 Explained in the Series: Blockchain: The Inform...Bitcoin Protocols 1.0 and 2.0 Explained in the Series: Blockchain: The Inform...
Bitcoin Protocols 1.0 and 2.0 Explained in the Series: Blockchain: The Inform...Melanie Swan
 
FINTECH Circle Blockchain Masterclass with Prof Mainelli @ BNY Mellon
FINTECH Circle Blockchain Masterclass with Prof Mainelli @ BNY MellonFINTECH Circle Blockchain Masterclass with Prof Mainelli @ BNY Mellon
FINTECH Circle Blockchain Masterclass with Prof Mainelli @ BNY MellonFINTECH Circle
 
the age of cryptocurrency at Devoxx Morocco
the age of cryptocurrency at Devoxx  Moroccothe age of cryptocurrency at Devoxx  Morocco
the age of cryptocurrency at Devoxx MoroccoBellaj Badr
 
Dgw birch eris_presentation
Dgw birch eris_presentationDgw birch eris_presentation
Dgw birch eris_presentationPreston J. Byrne
 
Cryptocurrencies, Blockchain & Smart Contracts: A General Introduction
Cryptocurrencies, Blockchain & Smart Contracts: A General IntroductionCryptocurrencies, Blockchain & Smart Contracts: A General Introduction
Cryptocurrencies, Blockchain & Smart Contracts: A General IntroductionRaffaele Mauro
 
Digital Digest 2 by Harshit
Digital Digest 2 by HarshitDigital Digest 2 by Harshit
Digital Digest 2 by HarshitHarshitMadan7
 
Bitcoin and Blockchain Technology: An Introduction
Bitcoin and Blockchain Technology: An IntroductionBitcoin and Blockchain Technology: An Introduction
Bitcoin and Blockchain Technology: An IntroductionFerdinando Maria Ametrano
 
FirstPartner 2016 Blockchain Ecosystem Market Map
FirstPartner 2016 Blockchain Ecosystem Market MapFirstPartner 2016 Blockchain Ecosystem Market Map
FirstPartner 2016 Blockchain Ecosystem Market MapRichard Warren
 
Blockchain for Business
Blockchain for BusinessBlockchain for Business
Blockchain for BusinessFloyd DCosta
 
Why distributed ledgers
Why distributed ledgersWhy distributed ledgers
Why distributed ledgersChris Skinner
 
Future Opportunities and Economic Challenges for Cryptoledgers: Trends and sp...
Future Opportunities and Economic Challenges for Cryptoledgers: Trends and sp...Future Opportunities and Economic Challenges for Cryptoledgers: Trends and sp...
Future Opportunities and Economic Challenges for Cryptoledgers: Trends and sp...Tim Swanson
 
By the numbers: understanding value transfers to and from China
By the numbers: understanding value transfers to and from ChinaBy the numbers: understanding value transfers to and from China
By the numbers: understanding value transfers to and from ChinaTim Swanson
 
9 BUILDING BLOCKS FOR A SUCCESSFUL BLOCKCHAIN INDUSTRY | BLOCKSTARS.IO
9 BUILDING BLOCKS FOR A SUCCESSFUL BLOCKCHAIN INDUSTRY | BLOCKSTARS.IO9 BUILDING BLOCKS FOR A SUCCESSFUL BLOCKCHAIN INDUSTRY | BLOCKSTARS.IO
9 BUILDING BLOCKS FOR A SUCCESSFUL BLOCKCHAIN INDUSTRY | BLOCKSTARS.IOBlockStars.io
 
Bitcoin, Blockchain, and IoT
Bitcoin, Blockchain, and IoTBitcoin, Blockchain, and IoT
Bitcoin, Blockchain, and IoTRobin Teigland
 
Bitcoin and Blockchain Explained: Cryptocitizen Smartnetwork Trust
Bitcoin and Blockchain Explained: Cryptocitizen Smartnetwork Trust Bitcoin and Blockchain Explained: Cryptocitizen Smartnetwork Trust
Bitcoin and Blockchain Explained: Cryptocitizen Smartnetwork Trust Melanie Swan
 
Columbia Law School - Decentralized Ledgers Presentation on 4/7/2014
Columbia Law School - Decentralized Ledgers Presentation on 4/7/2014Columbia Law School - Decentralized Ledgers Presentation on 4/7/2014
Columbia Law School - Decentralized Ledgers Presentation on 4/7/2014Ldger, Inc
 
CST 20363 Session 7 - Blockchain
CST 20363 Session 7 - BlockchainCST 20363 Session 7 - Blockchain
CST 20363 Session 7 - Blockchainoudesign
 
Making Lemonade out of Lemons: Squeezing utility from a proof-of-work experiment
Making Lemonade out of Lemons: Squeezing utility from a proof-of-work experimentMaking Lemonade out of Lemons: Squeezing utility from a proof-of-work experiment
Making Lemonade out of Lemons: Squeezing utility from a proof-of-work experimentTim Swanson
 

What's hot (20)

Bitcoin Protocols 1.0 and 2.0 Explained in the Series: Blockchain: The Inform...
Bitcoin Protocols 1.0 and 2.0 Explained in the Series: Blockchain: The Inform...Bitcoin Protocols 1.0 and 2.0 Explained in the Series: Blockchain: The Inform...
Bitcoin Protocols 1.0 and 2.0 Explained in the Series: Blockchain: The Inform...
 
FINTECH Circle Blockchain Masterclass with Prof Mainelli @ BNY Mellon
FINTECH Circle Blockchain Masterclass with Prof Mainelli @ BNY MellonFINTECH Circle Blockchain Masterclass with Prof Mainelli @ BNY Mellon
FINTECH Circle Blockchain Masterclass with Prof Mainelli @ BNY Mellon
 
the age of cryptocurrency at Devoxx Morocco
the age of cryptocurrency at Devoxx  Moroccothe age of cryptocurrency at Devoxx  Morocco
the age of cryptocurrency at Devoxx Morocco
 
Dgw birch eris_presentation
Dgw birch eris_presentationDgw birch eris_presentation
Dgw birch eris_presentation
 
Cryptocurrencies, Blockchain & Smart Contracts: A General Introduction
Cryptocurrencies, Blockchain & Smart Contracts: A General IntroductionCryptocurrencies, Blockchain & Smart Contracts: A General Introduction
Cryptocurrencies, Blockchain & Smart Contracts: A General Introduction
 
Digital Digest 2 by Harshit
Digital Digest 2 by HarshitDigital Digest 2 by Harshit
Digital Digest 2 by Harshit
 
Bitcoin and Blockchain Technology: An Introduction
Bitcoin and Blockchain Technology: An IntroductionBitcoin and Blockchain Technology: An Introduction
Bitcoin and Blockchain Technology: An Introduction
 
FirstPartner 2016 Blockchain Ecosystem Market Map
FirstPartner 2016 Blockchain Ecosystem Market MapFirstPartner 2016 Blockchain Ecosystem Market Map
FirstPartner 2016 Blockchain Ecosystem Market Map
 
Blockchain for Business
Blockchain for BusinessBlockchain for Business
Blockchain for Business
 
Why distributed ledgers
Why distributed ledgersWhy distributed ledgers
Why distributed ledgers
 
Future Opportunities and Economic Challenges for Cryptoledgers: Trends and sp...
Future Opportunities and Economic Challenges for Cryptoledgers: Trends and sp...Future Opportunities and Economic Challenges for Cryptoledgers: Trends and sp...
Future Opportunities and Economic Challenges for Cryptoledgers: Trends and sp...
 
By the numbers: understanding value transfers to and from China
By the numbers: understanding value transfers to and from ChinaBy the numbers: understanding value transfers to and from China
By the numbers: understanding value transfers to and from China
 
Unlocking Blockchain’s Potential
Unlocking Blockchain’s PotentialUnlocking Blockchain’s Potential
Unlocking Blockchain’s Potential
 
9 BUILDING BLOCKS FOR A SUCCESSFUL BLOCKCHAIN INDUSTRY | BLOCKSTARS.IO
9 BUILDING BLOCKS FOR A SUCCESSFUL BLOCKCHAIN INDUSTRY | BLOCKSTARS.IO9 BUILDING BLOCKS FOR A SUCCESSFUL BLOCKCHAIN INDUSTRY | BLOCKSTARS.IO
9 BUILDING BLOCKS FOR A SUCCESSFUL BLOCKCHAIN INDUSTRY | BLOCKSTARS.IO
 
Bitcoin, Blockchain, and IoT
Bitcoin, Blockchain, and IoTBitcoin, Blockchain, and IoT
Bitcoin, Blockchain, and IoT
 
Bitcoin and Blockchain Explained: Cryptocitizen Smartnetwork Trust
Bitcoin and Blockchain Explained: Cryptocitizen Smartnetwork Trust Bitcoin and Blockchain Explained: Cryptocitizen Smartnetwork Trust
Bitcoin and Blockchain Explained: Cryptocitizen Smartnetwork Trust
 
Columbia Law School - Decentralized Ledgers Presentation on 4/7/2014
Columbia Law School - Decentralized Ledgers Presentation on 4/7/2014Columbia Law School - Decentralized Ledgers Presentation on 4/7/2014
Columbia Law School - Decentralized Ledgers Presentation on 4/7/2014
 
CST 20363 Session 7 - Blockchain
CST 20363 Session 7 - BlockchainCST 20363 Session 7 - Blockchain
CST 20363 Session 7 - Blockchain
 
Intro to Blockchain
Intro to Blockchain Intro to Blockchain
Intro to Blockchain
 
Making Lemonade out of Lemons: Squeezing utility from a proof-of-work experiment
Making Lemonade out of Lemons: Squeezing utility from a proof-of-work experimentMaking Lemonade out of Lemons: Squeezing utility from a proof-of-work experiment
Making Lemonade out of Lemons: Squeezing utility from a proof-of-work experiment
 

Viewers also liked

The byzantine generals problem
The byzantine generals problemThe byzantine generals problem
The byzantine generals problemNGUYEN VAN LUONG
 
Byzantine General Problem - Siddharth Chaudhry
Byzantine General Problem - Siddharth ChaudhryByzantine General Problem - Siddharth Chaudhry
Byzantine General Problem - Siddharth ChaudhrySiddharth Chaudhry
 
The new decentralized sharing economy and crypto coins
The new decentralized sharing economy and crypto coinsThe new decentralized sharing economy and crypto coins
The new decentralized sharing economy and crypto coinsHubert Gertis
 
Decentralized Autonomous Organizations: Concept & Practical Examples
Decentralized Autonomous Organizations: Concept & Practical ExamplesDecentralized Autonomous Organizations: Concept & Practical Examples
Decentralized Autonomous Organizations: Concept & Practical ExamplesJan Brejcha
 
The DAO attack - Ethereum
The DAO attack - EthereumThe DAO attack - Ethereum
The DAO attack - EthereumAbanlex
 
Blockchain Consensus Protocols
Blockchain Consensus ProtocolsBlockchain Consensus Protocols
Blockchain Consensus ProtocolsMelanie Swan
 

Viewers also liked (9)

The byzantine generals problem
The byzantine generals problemThe byzantine generals problem
The byzantine generals problem
 
Byzantine General Problem - Siddharth Chaudhry
Byzantine General Problem - Siddharth ChaudhryByzantine General Problem - Siddharth Chaudhry
Byzantine General Problem - Siddharth Chaudhry
 
Introducción The DAO
Introducción The DAOIntroducción The DAO
Introducción The DAO
 
Byzantine Generals
Byzantine GeneralsByzantine Generals
Byzantine Generals
 
The new decentralized sharing economy and crypto coins
The new decentralized sharing economy and crypto coinsThe new decentralized sharing economy and crypto coins
The new decentralized sharing economy and crypto coins
 
ZipCar Presentation
ZipCar PresentationZipCar Presentation
ZipCar Presentation
 
Decentralized Autonomous Organizations: Concept & Practical Examples
Decentralized Autonomous Organizations: Concept & Practical ExamplesDecentralized Autonomous Organizations: Concept & Practical Examples
Decentralized Autonomous Organizations: Concept & Practical Examples
 
The DAO attack - Ethereum
The DAO attack - EthereumThe DAO attack - Ethereum
The DAO attack - Ethereum
 
Blockchain Consensus Protocols
Blockchain Consensus ProtocolsBlockchain Consensus Protocols
Blockchain Consensus Protocols
 

Similar to Economics of Decentalized Currency Systems

Crypto Presentation
Crypto PresentationCrypto Presentation
Crypto PresentationMaxWheelock
 
Bitcoin, Cryptocurrency, & Blockchain Presentation
Bitcoin, Cryptocurrency, & Blockchain PresentationBitcoin, Cryptocurrency, & Blockchain Presentation
Bitcoin, Cryptocurrency, & Blockchain PresentationMaxWheelock
 
Blockchain Presentation
Blockchain PresentationBlockchain Presentation
Blockchain PresentationThaboBotha
 
What is Cryptocurrency?
What is Cryptocurrency?What is Cryptocurrency?
What is Cryptocurrency?Rakesh Ranjan
 
Basics of Bitcoin & Mining
Basics of Bitcoin & MiningBasics of Bitcoin & Mining
Basics of Bitcoin & MiningAkhilesh Arora
 
Regulating Cryptocurrency
Regulating CryptocurrencyRegulating Cryptocurrency
Regulating Cryptocurrencyorrenprunckun
 
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...Codemotion
 
Bitcoin and Ransomware Analysis
Bitcoin and Ransomware AnalysisBitcoin and Ransomware Analysis
Bitcoin and Ransomware AnalysisInderjeet Singh
 
Bitcoin and Ransomware Analysis
Bitcoin and Ransomware AnalysisBitcoin and Ransomware Analysis
Bitcoin and Ransomware Analysisinder_barara
 
Blockchain Projects - Core Pillars of Shipping Product, Feb 2018
Blockchain Projects - Core Pillars of Shipping Product, Feb 2018Blockchain Projects - Core Pillars of Shipping Product, Feb 2018
Blockchain Projects - Core Pillars of Shipping Product, Feb 2018🔗Audrey Chaing
 
Investment Club Presentation 1 2021
Investment Club Presentation 1 2021Investment Club Presentation 1 2021
Investment Club Presentation 1 2021SamPurcell4
 
Blockchain, DLT, Tokens and ICO Introduction Course
Blockchain, DLT, Tokens and ICO Introduction CourseBlockchain, DLT, Tokens and ICO Introduction Course
Blockchain, DLT, Tokens and ICO Introduction CourseJean-Marc Seigneur
 
Blockchain and Bitcoin.pptx
Blockchain and Bitcoin.pptxBlockchain and Bitcoin.pptx
Blockchain and Bitcoin.pptxssuser3ab054
 

Similar to Economics of Decentalized Currency Systems (20)

Crypto Presentation
Crypto PresentationCrypto Presentation
Crypto Presentation
 
01 what is blockchain
01 what is blockchain01 what is blockchain
01 what is blockchain
 
Bitcoin, Cryptocurrency, & Blockchain Presentation
Bitcoin, Cryptocurrency, & Blockchain PresentationBitcoin, Cryptocurrency, & Blockchain Presentation
Bitcoin, Cryptocurrency, & Blockchain Presentation
 
Blockchain Presentation
Blockchain PresentationBlockchain Presentation
Blockchain Presentation
 
Blockchain
BlockchainBlockchain
Blockchain
 
Blockchain
BlockchainBlockchain
Blockchain
 
What is Cryptocurrency?
What is Cryptocurrency?What is Cryptocurrency?
What is Cryptocurrency?
 
Basics of Bitcoin & Mining
Basics of Bitcoin & MiningBasics of Bitcoin & Mining
Basics of Bitcoin & Mining
 
Cryptocurrency
CryptocurrencyCryptocurrency
Cryptocurrency
 
Regulating Cryptocurrency
Regulating CryptocurrencyRegulating Cryptocurrency
Regulating Cryptocurrency
 
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...
 
Bitcoin and Ransomware Analysis
Bitcoin and Ransomware AnalysisBitcoin and Ransomware Analysis
Bitcoin and Ransomware Analysis
 
Bitcoin and Ransomware Analysis
Bitcoin and Ransomware AnalysisBitcoin and Ransomware Analysis
Bitcoin and Ransomware Analysis
 
Cryptocurrency
Cryptocurrency  Cryptocurrency
Cryptocurrency
 
Blockchain Projects - Core Pillars of Shipping Product, Feb 2018
Blockchain Projects - Core Pillars of Shipping Product, Feb 2018Blockchain Projects - Core Pillars of Shipping Product, Feb 2018
Blockchain Projects - Core Pillars of Shipping Product, Feb 2018
 
Investment Club Presentation 1 2021
Investment Club Presentation 1 2021Investment Club Presentation 1 2021
Investment Club Presentation 1 2021
 
Blockchain, DLT, Tokens and ICO Introduction Course
Blockchain, DLT, Tokens and ICO Introduction CourseBlockchain, DLT, Tokens and ICO Introduction Course
Blockchain, DLT, Tokens and ICO Introduction Course
 
Blockchain meetup
Blockchain meetupBlockchain meetup
Blockchain meetup
 
bitcoin
bitcoinbitcoin
bitcoin
 
Blockchain and Bitcoin.pptx
Blockchain and Bitcoin.pptxBlockchain and Bitcoin.pptx
Blockchain and Bitcoin.pptx
 

Recently uploaded

Lundin Gold March 2024 Corporate Presentation - PDAC v1.pdf
Lundin Gold March 2024 Corporate Presentation - PDAC v1.pdfLundin Gold March 2024 Corporate Presentation - PDAC v1.pdf
Lundin Gold March 2024 Corporate Presentation - PDAC v1.pdfAdnet Communications
 
Introduction to Entrepreneurship and Characteristics of an Entrepreneur
Introduction to Entrepreneurship and Characteristics of an EntrepreneurIntroduction to Entrepreneurship and Characteristics of an Entrepreneur
Introduction to Entrepreneurship and Characteristics of an Entrepreneurabcisahunter
 
2024.03 Strategic Resources Presentation
2024.03 Strategic Resources Presentation2024.03 Strategic Resources Presentation
2024.03 Strategic Resources PresentationAdnet Communications
 
20240314 Calibre March 2024 Investor Presentation (FINAL).pdf
20240314 Calibre March 2024 Investor Presentation (FINAL).pdf20240314 Calibre March 2024 Investor Presentation (FINAL).pdf
20240314 Calibre March 2024 Investor Presentation (FINAL).pdfAdnet Communications
 
20240315 _E-Invoicing Digiteal. .pptx
20240315 _E-Invoicing Digiteal.    .pptx20240315 _E-Invoicing Digiteal.    .pptx
20240315 _E-Invoicing Digiteal. .pptxFinTech Belgium
 
What Key Factors Should Risk Officers Consider When Using Generative AI
What Key Factors Should Risk Officers Consider When Using Generative AIWhat Key Factors Should Risk Officers Consider When Using Generative AI
What Key Factors Should Risk Officers Consider When Using Generative AI360factors
 
Mphasis - Schwab Newsletter PDF - Sample 8707
Mphasis - Schwab Newsletter PDF - Sample 8707Mphasis - Schwab Newsletter PDF - Sample 8707
Mphasis - Schwab Newsletter PDF - Sample 8707harshan90
 
Sarlat Advisory - Corporate Brochure - 2024
Sarlat Advisory - Corporate Brochure - 2024Sarlat Advisory - Corporate Brochure - 2024
Sarlat Advisory - Corporate Brochure - 2024Guillaume Ⓥ Sarlat
 
LIC PRIVATISATION its a bane or boon.pptx
LIC PRIVATISATION its a bane or boon.pptxLIC PRIVATISATION its a bane or boon.pptx
LIC PRIVATISATION its a bane or boon.pptxsonamyadav7097
 
Stock Market Brief Deck for 3/22/2024.pdf
Stock Market Brief Deck for 3/22/2024.pdfStock Market Brief Deck for 3/22/2024.pdf
Stock Market Brief Deck for 3/22/2024.pdfMichael Silva
 
RWA Report 2024: Rise of Real-World Assets in Crypto | CoinGecko
RWA Report 2024: Rise of Real-World Assets in Crypto | CoinGeckoRWA Report 2024: Rise of Real-World Assets in Crypto | CoinGecko
RWA Report 2024: Rise of Real-World Assets in Crypto | CoinGeckoCoinGecko
 
ACCOUNTING FOR BUSINESS.II BRANCH ACCOUNTS NOTES
ACCOUNTING FOR BUSINESS.II BRANCH ACCOUNTS NOTESACCOUNTING FOR BUSINESS.II BRANCH ACCOUNTS NOTES
ACCOUNTING FOR BUSINESS.II BRANCH ACCOUNTS NOTESKumarJayaraman3
 
Solution manual for Intermediate Accounting, 11th Edition by David Spiceland...
Solution manual for  Intermediate Accounting, 11th Edition by David Spiceland...Solution manual for  Intermediate Accounting, 11th Edition by David Spiceland...
Solution manual for Intermediate Accounting, 11th Edition by David Spiceland...mwangimwangi222
 
Remembering my Totem _Unity is Strength_ growing in Bophuthatswana_Matthews B...
Remembering my Totem _Unity is Strength_ growing in Bophuthatswana_Matthews B...Remembering my Totem _Unity is Strength_ growing in Bophuthatswana_Matthews B...
Remembering my Totem _Unity is Strength_ growing in Bophuthatswana_Matthews B...Matthews Bantsijang
 
Stock Market Brief Deck for March 26.pdf
Stock Market Brief Deck for March 26.pdfStock Market Brief Deck for March 26.pdf
Stock Market Brief Deck for March 26.pdfMichael Silva
 
The Power Laws of Bitcoin: How can an S-curve be a power law?
The Power Laws of Bitcoin: How can an S-curve be a power law?The Power Laws of Bitcoin: How can an S-curve be a power law?
The Power Laws of Bitcoin: How can an S-curve be a power law?Stephen Perrenod
 
Slideshare - ONS Economic Forum Slidepack - 18 March 2024.pptx
Slideshare - ONS Economic Forum Slidepack - 18 March 2024.pptxSlideshare - ONS Economic Forum Slidepack - 18 March 2024.pptx
Slideshare - ONS Economic Forum Slidepack - 18 March 2024.pptxOffice for National Statistics
 
Hungarys economy made by Robert Miklos
Hungarys economy   made by Robert MiklosHungarys economy   made by Robert Miklos
Hungarys economy made by Robert Miklosbeduinpower135
 

Recently uploaded (20)

Lundin Gold March 2024 Corporate Presentation - PDAC v1.pdf
Lundin Gold March 2024 Corporate Presentation - PDAC v1.pdfLundin Gold March 2024 Corporate Presentation - PDAC v1.pdf
Lundin Gold March 2024 Corporate Presentation - PDAC v1.pdf
 
Introduction to Entrepreneurship and Characteristics of an Entrepreneur
Introduction to Entrepreneurship and Characteristics of an EntrepreneurIntroduction to Entrepreneurship and Characteristics of an Entrepreneur
Introduction to Entrepreneurship and Characteristics of an Entrepreneur
 
2024.03 Strategic Resources Presentation
2024.03 Strategic Resources Presentation2024.03 Strategic Resources Presentation
2024.03 Strategic Resources Presentation
 
20240314 Calibre March 2024 Investor Presentation (FINAL).pdf
20240314 Calibre March 2024 Investor Presentation (FINAL).pdf20240314 Calibre March 2024 Investor Presentation (FINAL).pdf
20240314 Calibre March 2024 Investor Presentation (FINAL).pdf
 
20240315 _E-Invoicing Digiteal. .pptx
20240315 _E-Invoicing Digiteal.    .pptx20240315 _E-Invoicing Digiteal.    .pptx
20240315 _E-Invoicing Digiteal. .pptx
 
What Key Factors Should Risk Officers Consider When Using Generative AI
What Key Factors Should Risk Officers Consider When Using Generative AIWhat Key Factors Should Risk Officers Consider When Using Generative AI
What Key Factors Should Risk Officers Consider When Using Generative AI
 
Mphasis - Schwab Newsletter PDF - Sample 8707
Mphasis - Schwab Newsletter PDF - Sample 8707Mphasis - Schwab Newsletter PDF - Sample 8707
Mphasis - Schwab Newsletter PDF - Sample 8707
 
Sarlat Advisory - Corporate Brochure - 2024
Sarlat Advisory - Corporate Brochure - 2024Sarlat Advisory - Corporate Brochure - 2024
Sarlat Advisory - Corporate Brochure - 2024
 
LIC PRIVATISATION its a bane or boon.pptx
LIC PRIVATISATION its a bane or boon.pptxLIC PRIVATISATION its a bane or boon.pptx
LIC PRIVATISATION its a bane or boon.pptx
 
Stock Market Brief Deck for 3/22/2024.pdf
Stock Market Brief Deck for 3/22/2024.pdfStock Market Brief Deck for 3/22/2024.pdf
Stock Market Brief Deck for 3/22/2024.pdf
 
RWA Report 2024: Rise of Real-World Assets in Crypto | CoinGecko
RWA Report 2024: Rise of Real-World Assets in Crypto | CoinGeckoRWA Report 2024: Rise of Real-World Assets in Crypto | CoinGecko
RWA Report 2024: Rise of Real-World Assets in Crypto | CoinGecko
 
New Monthly Enterprises Survey. Issue 21. (01.2024) Ukrainian Business in War...
New Monthly Enterprises Survey. Issue 21. (01.2024) Ukrainian Business in War...New Monthly Enterprises Survey. Issue 21. (01.2024) Ukrainian Business in War...
New Monthly Enterprises Survey. Issue 21. (01.2024) Ukrainian Business in War...
 
ACCOUNTING FOR BUSINESS.II BRANCH ACCOUNTS NOTES
ACCOUNTING FOR BUSINESS.II BRANCH ACCOUNTS NOTESACCOUNTING FOR BUSINESS.II BRANCH ACCOUNTS NOTES
ACCOUNTING FOR BUSINESS.II BRANCH ACCOUNTS NOTES
 
Solution manual for Intermediate Accounting, 11th Edition by David Spiceland...
Solution manual for  Intermediate Accounting, 11th Edition by David Spiceland...Solution manual for  Intermediate Accounting, 11th Edition by David Spiceland...
Solution manual for Intermediate Accounting, 11th Edition by David Spiceland...
 
Effects & Policies Of Bank Consolidation
Effects & Policies Of Bank ConsolidationEffects & Policies Of Bank Consolidation
Effects & Policies Of Bank Consolidation
 
Remembering my Totem _Unity is Strength_ growing in Bophuthatswana_Matthews B...
Remembering my Totem _Unity is Strength_ growing in Bophuthatswana_Matthews B...Remembering my Totem _Unity is Strength_ growing in Bophuthatswana_Matthews B...
Remembering my Totem _Unity is Strength_ growing in Bophuthatswana_Matthews B...
 
Stock Market Brief Deck for March 26.pdf
Stock Market Brief Deck for March 26.pdfStock Market Brief Deck for March 26.pdf
Stock Market Brief Deck for March 26.pdf
 
The Power Laws of Bitcoin: How can an S-curve be a power law?
The Power Laws of Bitcoin: How can an S-curve be a power law?The Power Laws of Bitcoin: How can an S-curve be a power law?
The Power Laws of Bitcoin: How can an S-curve be a power law?
 
Slideshare - ONS Economic Forum Slidepack - 18 March 2024.pptx
Slideshare - ONS Economic Forum Slidepack - 18 March 2024.pptxSlideshare - ONS Economic Forum Slidepack - 18 March 2024.pptx
Slideshare - ONS Economic Forum Slidepack - 18 March 2024.pptx
 
Hungarys economy made by Robert Miklos
Hungarys economy   made by Robert MiklosHungarys economy   made by Robert Miklos
Hungarys economy made by Robert Miklos
 

Economics of Decentalized Currency Systems

  • 1. Economics of Decentralized Currency Systems By Ernie Teo, Research Fellow, Sim Kee Boon Institute for Financial Economics
  • 2. THE MONEY MATRIX Internet coupon Mobile coupon E-money Legal status Not based on cryptography Decentralized cryptocurrencies Centralized virtual currencies Physical commodity money Local currencies Decentralized N/A Currency Regulated Banknotes and coins Commercial bank money (deposits) The Money Matrix Money format Physical Digital Cryptocurrency Unregulated Centralized Coupon Virtual Taken from: http://en.wikipedia.org/wiki/Virtual_currency Reference: European Central Bank (October 2012). "1". Virtual Currency Schemes (PDF). Frankfurt am Main: European Central Bank. p. 5. ISBN 978-92-899-0862-7. N/A N/A
  • 3. WHAT IS A DECENTRALIZED MARKET? INVESTOPEDIA EXPLAINS 'DECENTRALIZED MARKET' • The foreign exchange market is an example of a decentralized market because there is no one physical location where investors go to buy or sell currencies. Forex traders can use the internet to check the quotes of various currency pairs from different dealers from around the world. http://www.investopedia.com/terms/d/decentralizedmarket.asp
  • 4. WHAT IS DECENTRALIZED CURRENCY? A decentralized currency was defined by the US Department of Treasury as a currency • That has no central repository and no single administrator • That persons may obtain by their own computing or manufacturing effort • Rather than relying on confidence in a central authority, it depends instead on a distributed system of trust.
  • 6. WHY DECENTRALIZE? Features • Privacy – pseudo-anonymous • Transparency – all transactions can be seen • Trustless – doesn’t rely on trust • Hard to shut down • No chargebacks • Ownership – users own their account • Faster and cheaper than traditional international transfers • Central government has no control • Can’t print money to finance debts • Non inflationary – there may be deflationary pressures • Can’t take back uninsured deposits, eg. Cyprus
  • 7. WHO MAY BENEFIT? • The underbanked • Overseas workers in need of international remittance • People looking for fast and cheap ways to pay over the internet • Citizens of countries facing risk of hyperinflation • Libertarians – no government control and full anonymity
  • 8. HOW DO WE “COUNT VOTES”? • Decisions are made in decentralized systems by participating “voters” • It is necessary to ensure that protocol used to validate all “votes” gives the desired results • Unlike usual elections, votes are not counted by a central authority • There will be coordination problems in decision making • The Byzantine General’s Problem is used to describes such scenarios
  • 9. THE BYZANTINE GENERAL’S PROBLEM • Byzantine generals must decide unanimously whether to attack some enemy army • Each general’s army is geographically separated • Must communicate by sending messengers • There is a presence of traitors amongst the generals
  • 10. THE BYZANTINE GENERAL’S PROBLEM • Traitors can force decisions like • Attacking when most generals do not wish to attack • Confusing some generals to the point that they are unable to make up their minds • In a distributed/decentralized currency system, each miner/validating node can be considered a “general” • Nodes need to agree upon the validity of a transaction • Malicious nodes can work together to invalidate legitimate transactions • Or validate double spent transactions (by invalidating the first transaction)
  • 11. FORMULATING A SOLUTION An algorithm need to guarantee that A. All loyal generals decide upon the same plan of action • The loyal generals will all do what the algorithm says they should, but the traitors may do anything they wish The algorithm must guarantee condition A regardless of what the traitors do. We also want to insure that B. A small number of traitors cannot cause the loyal generals to adopt a bad plan This ensures Byzantine Fault Tolerance Pease, M.; Shostak, R.; Lamport, L. (April 1980). "Reaching Agreement in the Presence of Faults". Journal of the ACM 27 (2): 228– 234. doi:10.1145/322186.322188
  • 12. SOLUTIONS TO THE BYZANTINE GENERAL’S PROBLEM? • Byzantine faults include: • omission failures (e.g., crash failures, failing to receive a request, or failing to send a response) • commission failures (e.g., processing a request incorrectly, corrupting local state, and/or sending an incorrect or inconsistent response to a request). • When a Byzantine failure has occurred, the system may respond in any unpredictable way, unless it is designed to have Byzantine fault tolerance
  • 13. SOLUTIONS TO THE BYZANTINE GENERAL’S PROBLEM? • The byzantine general’s problem has no solutions unless n ≥ 3t + 1 • where n is the number of processes in the system and t is the number of traitors (faults) • In other words, the algorithm can ensure correct operation only if fewer than one third of the processes are faulty • If unforgeability of messages is possible, higher fault tolerance is possible
  • 14. UNDERSTANDING BYZANTINE FAULT TOLERANCE WITH GAME THEORY • Abraham, Ittai, Lorenzo Alvisi, and Joseph Y. Halpern. "Distributed computing meets game theory: Combining insights from two fields." ACM SIGACT News42.2 (2011): 69-76. • To extend game theory to incorporate fault tolerance, it is necessary to move beyond single player deviations • An equilibrium is k-resilient if no group of k players can all do better by deviating
  • 15. UNDERSTANDING BYZANTINE FAULT TOLERANCE WITH GAME THEORY • We also need to consider non-rationality or unanticipated behavior • An equilibrium is t-immune if non-deviating players are not made worse off by arbitrary deviations by up to t players • A Nash equilibrium has k=1 and t=0 • We get fault tolerance, we need an equilibrium concept that is both k-resilient and t-immune • One way to achieve that is by assuming altruistic or obedient players
  • 16. DECENTRALIZED CURRENCY AND THE BYZANTINE GENERAL’S PROBLEM • A number of Byzantine Generals each have a computer and want to attack the King's computer system • They must crack the password within a limited time to break in and erase the logs, lest they be discovered • They only have enough CPU power to crack it fast enough if a majority of them attack at the same time Adopted from: https://bitcointalk.org/oldSiteFiles/byzantine.html
  • 17. DECENTRALIZED CURRENCY AND THE BYZANTINE GENERAL’S PROBLEM • They don't particularly care when the attack will be, just that they agree • It has been decided that anyone who feels like it will announce an attack time, whatever plan is heard first will be the official plan • The problem is that the network is not instantaneous, and if two generals announce different plans at close to the same time, some may hear one first and others hear the other first. Adopted from: https://bitcointalk.org/oldSiteFiles/byzantine.html
  • 18. MINING PROTOCOLS • Mining protocols like bitcoin aims to achieve byzantine agreement using a proof-of-work chain • Once each general receives whatever plan he hears first, he sets his computer to solve a difficult hash-based proof-of-work problem that includes the plan in its hash • The proof-of-work is difficult enough that with all of them working at once, it's expected to take 10 minutes before one of them finds a solution and broadcasts it to the network Bitcoin Primer
  • 19. MINING PROTOCOLS • Once received, everyone adjusts the hash in their proof-of-work computation to include the first solution, so that when they find the next proof-of- work, it chains after the first one • If anyone was working on a different plan, they switch to this one, because its proof-of-work chain is now longer • After about two hours, the plan should be hashed by a chain of 12 proofs-of-work
  • 20. MINING PROTOCOLS Plan A Plan B Plan A hashed Next Proof of Work Some computers starts solving hashed based proof of work for plan A Some computers starts solving hashed based proof of work for plan B Plan B is abandoned The chain continues… All computers move to this chain
  • 21. MINING PROTOCOLS • Every general, just by verifying the difficulty of the proof-of-work chain, can estimate how much parallel CPU power per hour was expended on it and see that it must have required the majority of the computers to produce in the allotted time • Difficulty = (Previous Difficulty) x • Hash Rate = total amount of calculations the network can make per second Intended Time Taken Actual Time Taken
  • 22. MINING PROTOCOLS • This would mean that most of them had to have seen the plan, since the proof-of-work is proof that they worked on it • If the CPU power exhibited by the proof-of-work is sufficient to crack the password, they can safely attack at the agreed time
  • 23. RIPPLE PRIMER • Ripple Explained: Medieval Banking with a Digital Twist, CoinDesk, May 11, 2014 • http://www.coindesk.com/ripple-medieval-banking-digital-twist/ • By Antony Lewis, ItBit • Anthony uses the example of Hawala to explain Ripple • A traditional way of sending money in medieval Arabia which is still practised today
  • 24. RIPPLE PRIMER • Alex wants to send money to Beth: • Alex goes to his local hawala agent and gives him some cash and a password, which he and Beth share. • The agent telephones Beth's local agent and tells him to release funds to someone who can provide the password. • Beth walks in to her agent, says the password, and receives cash • Commissions can be taken from either or both agents. Based on: http://www.coindesk.com/ripple-medieval-banking-digital-twist/
  • 25. RIPPLE PRIMER • Money has been transmitted from Alex to Beth, but the physical notes have not moved! • Alex's agent owes Beth's agent money • They can either settle the debt later, or hope that there may be reverse transactions if other clients want to move money in the opposite direction Based on: http://www.coindesk.com/ripple-medieval-banking-digital-twist/
  • 26. RIPPLE PRIMER • Trust is involved • In this scenario, there are three trust relationships: • Alex has to trust that his agent will do the right thing, as he is handing over cash • Beth has to trust that her agent will do the right thing, as she is expecting to receive cash • The agents need to trust each other over the repayment of the debt (IOUs) Based on: http://www.coindesk.com/ripple-medieval-banking-digital-twist/
  • 27. RIPPLE PRIMER Moving to Ripple • “Gateways” such as exchanges or banks perform the function of agents • IOUs can be communicated electronically over the Ripple network • Alex logs on to his preferred Ripple gateway, deposits money to it • Alex then transfer electronic funds to Beth • Beth collects her funds via her gateway Based on: http://www.coindesk.com/ripple-medieval-banking-digital-twist/
  • 28. RIPPLE PRIMER Moving to Ripple • The system allows for trade between currencies • Alex can deposit USD with his gateway but choose to send EUR to Beth • If the two gateways do not trust each other, we can use a chain of trust • eg, the two gateways operate on different currencies • XRP, ripple’s native currency can be used • XRP is irreversible and trustless • Similar to bitcoin Based on: http://www.coindesk.com/ripple-medieval-banking-digital-twist/
  • 29. CONSENSUS PROTOCOLS • Each general has a unique node list (UNL) • Have to be nodes not run by the same group or individuals • No need to trust UNL, just have to trust that <50% will collude with each other • Examples: • General A and B hate each other • General X and Y don’t speak the same language • Each general can also choose nodes with a good reputation or are non-anonymous
  • 30. CONSENSUS PROTOCOLS • The plan/transaction is broadcasted into the network • Each node verifies the plan is sound and broadcasts it into the network • Verification is asynchronous, each round is timed • In the first round, each node checks against their UNL • If 50% agrees by the time limit, the node re-broadcasts the message • In the second round, 60% has to agree • In the third round, 70% has to agree • In the fourth round, 80% has to agree
  • 31. CONSENSUS PROTOCOLS Plan X General A Round 1UNL B F K L P R T 50% reached Plan X/ General A/ Round 1 Round 1 Broadcasts ok ok ok ok Round 2 60% reached Plan X/ General A/ Round 2 ok ok ok ok ok Round 2 Broadcasts
  • 32. CONSENSUS PROTOCOLS • Consensus is reached at the end of the 4th round • The message/transaction is applied to the last closed ledger • This is known as the Ripple Consensus Algorithm • In reality, multiple messages are verified in each “bundle” • Messages that do not reach the target in either round will be discarded and considered in the next bundle
  • 33. CONSENSUS PROTOCOLS • Consensus is reached at the end of the 4th round • The message/transaction is applied to the last closed ledger • This is known as the Ripple Consensus Algorithm • In reality, multiple messages are verified in each “bundle” • Messages that do not reach the target in either round will be discarded and considered in the next bundle
  • 34. CONSENSUS PROTOCOLS • At 80%, the fault tolerance is • t ≤ (n-1)/5 • Each general on the UNL may have different UNLs from each other • This makes the consensus decentralized
  • 36. CONSENSUS PROTOCOLS • For nodes to reach agreement regardless of their UNLs, certain amount of connectivity within the network is required • If a network is too cliquey, consensus could form within cliques and forks can occur
  • 37. DISCUSSION– MINING • Miners are incentivize by rewards and transaction fees • As the system evolves over time, miners compete on computational power • This eventually led to the emergence of mining pools, and less individual miners • This causes the network to be less decentralized than originally intended • Mining protocols are “good enough” solutions to the byzantine general’s problem
  • 38. DISCUSSION– CONSENSUS • No economic incentives to be validators • Nodes would be gateways or exchanges • Gateways may have more incentives to be validators in order to ensure the health of the network • The eco-system needs to be created by getting gateways to join the network • Consensus networks are faster as there is no proof-of-work
  • 39. The End, Thanks! Any Comments are Welcomed
  • 40. SHORT BITCOIN PRIMER • Bitcoin is a decentralized encrypted digital currency system • Transactions are recorded on a decentralized online ledger called the Blockchain • Ledger entries called blocks are created every 10 minutes on average • Each ledger entry is chained to the previous entry making it almost impossible to change past transactions
  • 41. SHORT BITCOIN PRIMER • bitcoins are created via the ledger validation process called mining • Each ‘miner’ participates in solving a cryptographic puzzle which takes approximately 10 mins to solve • Difficulty level is adjusted based on computing power available • bitcoins are received as a reward by miners • Another way to get bitcoins is to trade it with fiat currencies via exchanges • Prices are determined by demand and supply Back