SlideShare une entreprise Scribd logo
1  sur  17
Bitcoin,
Blockchain &
CryptoContracts
Part 1
cryptographic fundamentals
Prithwis Mukerjee, PhD, Praxis Business School, Calcutta, India
What is Cryptography ?
Cryptography is a mathematical technique by which information in the form
of text files or any digital string of numbers and characters are changed into
another string so that the contents are not readily understandable by others.
It was originally used for keeping secrets but now it has many uses.
Cryptographic Functions
A cryptographic
function is an
operator that
converts an input
string of numbers
and characters into
an output string as
per rules defined by
the function and a
key value
k=2, x+k
k=2, xk
k=2, Crypt()
anagram(2)
9 11
3 9
prithwis rtkvjyku
prithwis wish trip
One Way Functions
In a one-way
cryptographic
function it is quite
difficult to reverse
the process. Difficult
to derive the input by
looking at the output
125 8sum of digits
40706 8sum of digits
prithwis mukerjee BODPM4264EPAN(:-)
prithwis mukerjee SHA-256
1b18b866382f05d8698ebcb8eae7c881
1b3a988e7112503c1ecc9aacd9cc63e8
collision
SHA-256 Hash Function
Generates 256 bit
output irrespective of
the size (or length) of
input.
Collision resistant -
two inputs will “never”
generate the same
output.
Hash(“prithwis”)
1b18b866382f05d8698ebcb8eae7c8811b3a988e7112503c1ecc9aacd9cc63e8
Hash(“prithwish”)
4486d9ef726a5a4a559f24cce58480968a4527004cfb7ceb8cf6fccbef2886bc
Hash(“Our price bid is Rs 2,00,000”)
62b72cda490d54e56ac0978d263906ef892b6449c1175ebf0af839c7f99e772f
Hash(pm.jpg) <- a full image file
af9493c777bcb88e57fb3e08cf05807d117f945fdffc932f3deddcc82835b385
Tamper-proof messages
If we send the
message along
with its hash, then
recipient can
detect if the
message has been
altered later on
Communication Transmitted
“Pay Rs 2,00,000 to Prithwis Mukerjee”
Hash = 4949504ab01a4a8d4ebec5f38bd13a7ea2819a60d1004690a09b6aa518a02922
Communication Received
“Pay Rs 20,00,000 to Prithwis Mukerjee”
Hash = 4949504ab01a4a8d4ebec5f38bd13a7ea2819a60d1004690a09b6aa518a02922
Recipient Verifies Hash of message
“Pay Rs 20,00,000 to Prithwis Mukerjee”
Hash = 5331cf192a895d1b7cb8d0d5b1e78090aa8f33e1a781103ed4d9eab8282704a7
You can also send the hash of [message+hash of message] to make sure
that the hash value has not been tampered with either!
Mismatch
detected
Encryption
Hashing is irreversible.
Encryption is reversible
It is a two step process of
converting clear-text
(human understandable)
into cypher-text by
sender and reconverting
it back to clear-text by
receiver using
passphrases
Original Message in Clear Text secretKey
ENCRYPT function
Unreadable Message in Cypher Text
Unreadable Message in Cypher Text
DECRYPT function
Retrieved Message in Clear Text
secretKey
Encryption for Privacy during Transmission
Here we see that Arup is
sending a secret message
to Bina and both of them
do not want anybody else
to read the message
Arup will meet Bina at 2PM at Victoria p@ssw0rd
ENCRYPT
xyza erty 78s& a3 0w@ uTc99srt
xyza erty 78s& a3 0w@ uTc99srt
DECRYPT
Arup will meet Bina at 2PM at Victoria
p@ssw0rd
secure, private
transmission
insecure
transmission
can be
intercepted
and used to
break
privacy
Asymmetric Encryption & Decryption
Two Keys
Encryption with
one key,
decryption with
other.
Called Public key,
Private Key
Clear Text MessageK2 K1
ENCRYPT
Cypher Text 1 Cypher Text 2K2
DECRYP
T
K1 K1
ENCRYPT
K2
DECRYP
T
DECRYP
T
DECRYP
T
Clear Text Message
Asymmetric Encryption : Privacy
Arup, Bina have a
pair of keys, one
Private Key and
one Public Key
KPrA, KPrB are
“private” keys
and KPuA, KPuB
are “public” keys
of Arup and Bina
Arup will meet Bina at 2PM at VictoriaKPuAKPrA
Arup will meet Bina at 2PM at Victoria
KPuB
KPuB
ENCRYPT
xyza erty 78s& a3 0w@ uTc99srt
xyza erty 78s& a3 0w@ uTc99srt KPrB
DECRYPT
secure, private
transmission
insecure
transmission
can be
intercepted
but cannot
be used to
break
privacy
Asymmetric Encryption : Authentication
Arup appends his
encrypted public key
as signature to
message
Bina confirms that
signature was
created by person
whose public key is
same as that of Arup
Hence authentic
Arup loves BinaKPrAKPuA
ENCRYPT
DECRYPT
public
transmission
sigA Arup loves Bina
sigA Arup loves BinaKPuA
Arup loves BinaKPuAKPuA
Contracts without Trust!
Bina transfers and asset, House25, to Chandru
Bina claims that Arup transferred this asset to Bina and so she has
clear title to transfer asset to Chandru
Chandru does not trust Bina
Bina produces transfer contract that Arup gave to Bina
How can we use cryptofunctions to ensure that Bina does have the
asset that she is transferring to Chandru
Arup transfers asset to Bina
Arup creates contract C1
transferring H25 to B
Arup adds his signature
to C1
sigA
Arup completes the contract
by adding a hash HC1
KPuA KPrA
KPuA H25 KPuB
KPuA H25 KPuB
sigA KPuA H25 KPuBHC1
Since all
individuals are
anonymous, the
contract will
represent them
by their public
keys
Bina tries to transfer asset to Chandru
Bina creates similar
contract C2
sigB KPuB H25 KPuCHC2
Chandru does not trust
Bina. Does she really
own H25?
sigB KPuB H25 KPuCHC2
Bina prefixes C1 to C2
but still not trusted! sigB KPuB H25 KPuCHC2
sigA KPuA H25 KPuBHC1
Since all
individuals are
anonymous, the
contract will
represent them
by their public
keys
Chandru verifies cryptographically
Since all
individuals are
anonymous, the
contract will
represent them
by their public
keys
Has Bina tampered with C1?
Perhaps Arup has sold House
22? Did he sell to Bina? Check
Hash
sigB KPuB H25 KPuCHC2
sigA KPuA H25 KPuBHC1
sigB KPuB H25 KPuCHC2
sigA KPuA H25 KPuBHC1
Hash matches! We know
house was sold to Bina. Is
Bina the Bina referred to in
C1? Check Bina signature
sigB KPuB H25 KPuCHC2
sigB KPuB
KPuB
sigA KPuA H25 KPuBKPuA
Chandru accepts
1. Bina got H25 from Arup
2. Bina can sell to Chandru
sigB KPuB H25 KPuCHC2
YES!
matches
bitcoin txn
validation is
similar, not
same
When Chandru transfer to Dipa
Since all
individuals are
anonymous, the
contract will
represent them
by their public
keys
Chandru will create unverified
contract C3 that transfers H25
to Dipak
sigB KPuB H25 KPuCHC2
sigC KPuC H25 KPuDHC3
Process
Continues
What about?
What if Bina had already sold the house
to Esha? -- Double Spend?
Who will do all this verification? Why will
they do all this?
The first contract? How do we know
that Arup owns the asset? How far in
the past do we go? -- the “Genesis” ?
All these issues
are addressed by
Bitcoin. See next
presentation
Prithwis Mukerjee, PhD, Praxis Business School, Calcutta, India

Contenu connexe

En vedette

En vedette (19)

Bitcoin, Blockchain and Crypto Contracts - Part 3
Bitcoin, Blockchain and Crypto Contracts - Part 3Bitcoin, Blockchain and Crypto Contracts - Part 3
Bitcoin, Blockchain and Crypto Contracts - Part 3
 
Game theoretic concepts in Support Vector Machines
Game theoretic concepts in Support Vector MachinesGame theoretic concepts in Support Vector Machines
Game theoretic concepts in Support Vector Machines
 
Business Intelligence Industry Perspective Session I
Business Intelligence   Industry Perspective Session IBusiness Intelligence   Industry Perspective Session I
Business Intelligence Industry Perspective Session I
 
The incompleteness of reason
The incompleteness of reasonThe incompleteness of reason
The incompleteness of reason
 
Tintin and Contemporary Politics
Tintin and Contemporary PoliticsTintin and Contemporary Politics
Tintin and Contemporary Politics
 
A study of cryptography for satellite applications
A study of cryptography for satellite applicationsA study of cryptography for satellite applications
A study of cryptography for satellite applications
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
ইন্টার্নেট কি এবং কেন ?
ইন্টার্নেট কি এবং কেন ?ইন্টার্নেট কি এবং কেন ?
ইন্টার্নেট কি এবং কেন ?
 
La blockchain en détail - Devoxxfr 2016 - Benoit Lafontaine - Yann Rouillard
La blockchain en détail - Devoxxfr 2016 - Benoit Lafontaine - Yann RouillardLa blockchain en détail - Devoxxfr 2016 - Benoit Lafontaine - Yann Rouillard
La blockchain en détail - Devoxxfr 2016 - Benoit Lafontaine - Yann Rouillard
 
The curious case of Blockchain Technology
The curious case of Blockchain TechnologyThe curious case of Blockchain Technology
The curious case of Blockchain Technology
 
Blockchain - Presentacion Betabeers Galicia 10/12/2014
Blockchain - Presentacion Betabeers Galicia 10/12/2014Blockchain - Presentacion Betabeers Galicia 10/12/2014
Blockchain - Presentacion Betabeers Galicia 10/12/2014
 
Demysitifying Bitcoin and Blockchain
Demysitifying Bitcoin and Blockchain Demysitifying Bitcoin and Blockchain
Demysitifying Bitcoin and Blockchain
 
Block chain in banking industry
Block chain in banking industryBlock chain in banking industry
Block chain in banking industry
 
IOTA - Ledger of Things
IOTA - Ledger of ThingsIOTA - Ledger of Things
IOTA - Ledger of Things
 
Bitcoin, Blockchain, and IoT
Bitcoin, Blockchain, and IoTBitcoin, Blockchain, and IoT
Bitcoin, Blockchain, and IoT
 
Demystifying Blockchains
Demystifying BlockchainsDemystifying Blockchains
Demystifying Blockchains
 
CBGTBT - Part 6 - Transactions 102
CBGTBT - Part 6 - Transactions 102CBGTBT - Part 6 - Transactions 102
CBGTBT - Part 6 - Transactions 102
 
Bitcoin and Blockchain Technology Explained: Not just Cryptocurrencies, Econo...
Bitcoin and Blockchain Technology Explained: Not just Cryptocurrencies, Econo...Bitcoin and Blockchain Technology Explained: Not just Cryptocurrencies, Econo...
Bitcoin and Blockchain Technology Explained: Not just Cryptocurrencies, Econo...
 
Block chain 101 what it is, why it matters
Block chain 101  what it is, why it mattersBlock chain 101  what it is, why it matters
Block chain 101 what it is, why it matters
 

Plus de Prithwis Mukerjee

04 Dimensional Analysis - v6
04 Dimensional Analysis - v604 Dimensional Analysis - v6
04 Dimensional Analysis - v6
Prithwis Mukerjee
 
Lecture02 - Data Mining & Analytics
Lecture02 - Data Mining & AnalyticsLecture02 - Data Mining & Analytics
Lecture02 - Data Mining & Analytics
Prithwis Mukerjee
 
Data mining clustering-2009-v0
Data mining clustering-2009-v0Data mining clustering-2009-v0
Data mining clustering-2009-v0
Prithwis Mukerjee
 
Datawarehousing and Business Intelligence
Datawarehousing and Business IntelligenceDatawarehousing and Business Intelligence
Datawarehousing and Business Intelligence
Prithwis Mukerjee
 

Plus de Prithwis Mukerjee (20)

Thought controlled devices
Thought controlled devicesThought controlled devices
Thought controlled devices
 
Cloudcasting
CloudcastingCloudcasting
Cloudcasting
 
Currency, Commodity and Bitcoins
Currency, Commodity and BitcoinsCurrency, Commodity and Bitcoins
Currency, Commodity and Bitcoins
 
Data Science
Data ScienceData Science
Data Science
 
05 OLAP v6 weekend
05 OLAP  v6 weekend05 OLAP  v6 weekend
05 OLAP v6 weekend
 
04 Dimensional Analysis - v6
04 Dimensional Analysis - v604 Dimensional Analysis - v6
04 Dimensional Analysis - v6
 
Thought control
Thought controlThought control
Thought control
 
World of data @ praxis 2013 v2
World of data   @ praxis 2013  v2World of data   @ praxis 2013  v2
World of data @ praxis 2013 v2
 
BIS 08a - Application Development - II Version 2
BIS 08a - Application Development - II Version 2BIS 08a - Application Development - II Version 2
BIS 08a - Application Development - II Version 2
 
Lecture02 - Data Mining & Analytics
Lecture02 - Data Mining & AnalyticsLecture02 - Data Mining & Analytics
Lecture02 - Data Mining & Analytics
 
Data mining clustering-2009-v0
Data mining clustering-2009-v0Data mining clustering-2009-v0
Data mining clustering-2009-v0
 
PPM Lite
PPM LitePPM Lite
PPM Lite
 
OLAP Cubes in Datawarehousing
OLAP Cubes in DatawarehousingOLAP Cubes in Datawarehousing
OLAP Cubes in Datawarehousing
 
Dimensional Modelling
Dimensional ModellingDimensional Modelling
Dimensional Modelling
 
Datawarehousing and Business Intelligence
Datawarehousing and Business IntelligenceDatawarehousing and Business Intelligence
Datawarehousing and Business Intelligence
 
Business Models for Web 2.0
Business Models for Web 2.0Business Models for Web 2.0
Business Models for Web 2.0
 
BIS01 Living On the Web
BIS01 Living On the WebBIS01 Living On the Web
BIS01 Living On the Web
 
BIS03 Data Modelling - I
BIS03 Data Modelling - IBIS03 Data Modelling - I
BIS03 Data Modelling - I
 
BIS04 Data Modelling - II
BIS04 Data Modelling  - IIBIS04 Data Modelling  - II
BIS04 Data Modelling - II
 
BIS06 Physical Database Models
BIS06 Physical Database ModelsBIS06 Physical Database Models
BIS06 Physical Database Models
 

Dernier

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 

Dernier (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 

Bitcoin, Blockchain and the Crypto Contracts - Part 1

  • 1. Bitcoin, Blockchain & CryptoContracts Part 1 cryptographic fundamentals Prithwis Mukerjee, PhD, Praxis Business School, Calcutta, India
  • 2. What is Cryptography ? Cryptography is a mathematical technique by which information in the form of text files or any digital string of numbers and characters are changed into another string so that the contents are not readily understandable by others. It was originally used for keeping secrets but now it has many uses.
  • 3. Cryptographic Functions A cryptographic function is an operator that converts an input string of numbers and characters into an output string as per rules defined by the function and a key value k=2, x+k k=2, xk k=2, Crypt() anagram(2) 9 11 3 9 prithwis rtkvjyku prithwis wish trip
  • 4. One Way Functions In a one-way cryptographic function it is quite difficult to reverse the process. Difficult to derive the input by looking at the output 125 8sum of digits 40706 8sum of digits prithwis mukerjee BODPM4264EPAN(:-) prithwis mukerjee SHA-256 1b18b866382f05d8698ebcb8eae7c881 1b3a988e7112503c1ecc9aacd9cc63e8 collision
  • 5. SHA-256 Hash Function Generates 256 bit output irrespective of the size (or length) of input. Collision resistant - two inputs will “never” generate the same output. Hash(“prithwis”) 1b18b866382f05d8698ebcb8eae7c8811b3a988e7112503c1ecc9aacd9cc63e8 Hash(“prithwish”) 4486d9ef726a5a4a559f24cce58480968a4527004cfb7ceb8cf6fccbef2886bc Hash(“Our price bid is Rs 2,00,000”) 62b72cda490d54e56ac0978d263906ef892b6449c1175ebf0af839c7f99e772f Hash(pm.jpg) <- a full image file af9493c777bcb88e57fb3e08cf05807d117f945fdffc932f3deddcc82835b385
  • 6. Tamper-proof messages If we send the message along with its hash, then recipient can detect if the message has been altered later on Communication Transmitted “Pay Rs 2,00,000 to Prithwis Mukerjee” Hash = 4949504ab01a4a8d4ebec5f38bd13a7ea2819a60d1004690a09b6aa518a02922 Communication Received “Pay Rs 20,00,000 to Prithwis Mukerjee” Hash = 4949504ab01a4a8d4ebec5f38bd13a7ea2819a60d1004690a09b6aa518a02922 Recipient Verifies Hash of message “Pay Rs 20,00,000 to Prithwis Mukerjee” Hash = 5331cf192a895d1b7cb8d0d5b1e78090aa8f33e1a781103ed4d9eab8282704a7 You can also send the hash of [message+hash of message] to make sure that the hash value has not been tampered with either! Mismatch detected
  • 7. Encryption Hashing is irreversible. Encryption is reversible It is a two step process of converting clear-text (human understandable) into cypher-text by sender and reconverting it back to clear-text by receiver using passphrases Original Message in Clear Text secretKey ENCRYPT function Unreadable Message in Cypher Text Unreadable Message in Cypher Text DECRYPT function Retrieved Message in Clear Text secretKey
  • 8. Encryption for Privacy during Transmission Here we see that Arup is sending a secret message to Bina and both of them do not want anybody else to read the message Arup will meet Bina at 2PM at Victoria p@ssw0rd ENCRYPT xyza erty 78s& a3 0w@ uTc99srt xyza erty 78s& a3 0w@ uTc99srt DECRYPT Arup will meet Bina at 2PM at Victoria p@ssw0rd secure, private transmission insecure transmission can be intercepted and used to break privacy
  • 9. Asymmetric Encryption & Decryption Two Keys Encryption with one key, decryption with other. Called Public key, Private Key Clear Text MessageK2 K1 ENCRYPT Cypher Text 1 Cypher Text 2K2 DECRYP T K1 K1 ENCRYPT K2 DECRYP T DECRYP T DECRYP T Clear Text Message
  • 10. Asymmetric Encryption : Privacy Arup, Bina have a pair of keys, one Private Key and one Public Key KPrA, KPrB are “private” keys and KPuA, KPuB are “public” keys of Arup and Bina Arup will meet Bina at 2PM at VictoriaKPuAKPrA Arup will meet Bina at 2PM at Victoria KPuB KPuB ENCRYPT xyza erty 78s& a3 0w@ uTc99srt xyza erty 78s& a3 0w@ uTc99srt KPrB DECRYPT secure, private transmission insecure transmission can be intercepted but cannot be used to break privacy
  • 11. Asymmetric Encryption : Authentication Arup appends his encrypted public key as signature to message Bina confirms that signature was created by person whose public key is same as that of Arup Hence authentic Arup loves BinaKPrAKPuA ENCRYPT DECRYPT public transmission sigA Arup loves Bina sigA Arup loves BinaKPuA Arup loves BinaKPuAKPuA
  • 12. Contracts without Trust! Bina transfers and asset, House25, to Chandru Bina claims that Arup transferred this asset to Bina and so she has clear title to transfer asset to Chandru Chandru does not trust Bina Bina produces transfer contract that Arup gave to Bina How can we use cryptofunctions to ensure that Bina does have the asset that she is transferring to Chandru
  • 13. Arup transfers asset to Bina Arup creates contract C1 transferring H25 to B Arup adds his signature to C1 sigA Arup completes the contract by adding a hash HC1 KPuA KPrA KPuA H25 KPuB KPuA H25 KPuB sigA KPuA H25 KPuBHC1 Since all individuals are anonymous, the contract will represent them by their public keys
  • 14. Bina tries to transfer asset to Chandru Bina creates similar contract C2 sigB KPuB H25 KPuCHC2 Chandru does not trust Bina. Does she really own H25? sigB KPuB H25 KPuCHC2 Bina prefixes C1 to C2 but still not trusted! sigB KPuB H25 KPuCHC2 sigA KPuA H25 KPuBHC1 Since all individuals are anonymous, the contract will represent them by their public keys
  • 15. Chandru verifies cryptographically Since all individuals are anonymous, the contract will represent them by their public keys Has Bina tampered with C1? Perhaps Arup has sold House 22? Did he sell to Bina? Check Hash sigB KPuB H25 KPuCHC2 sigA KPuA H25 KPuBHC1 sigB KPuB H25 KPuCHC2 sigA KPuA H25 KPuBHC1 Hash matches! We know house was sold to Bina. Is Bina the Bina referred to in C1? Check Bina signature sigB KPuB H25 KPuCHC2 sigB KPuB KPuB sigA KPuA H25 KPuBKPuA Chandru accepts 1. Bina got H25 from Arup 2. Bina can sell to Chandru sigB KPuB H25 KPuCHC2 YES! matches bitcoin txn validation is similar, not same
  • 16. When Chandru transfer to Dipa Since all individuals are anonymous, the contract will represent them by their public keys Chandru will create unverified contract C3 that transfers H25 to Dipak sigB KPuB H25 KPuCHC2 sigC KPuC H25 KPuDHC3 Process Continues
  • 17. What about? What if Bina had already sold the house to Esha? -- Double Spend? Who will do all this verification? Why will they do all this? The first contract? How do we know that Arup owns the asset? How far in the past do we go? -- the “Genesis” ? All these issues are addressed by Bitcoin. See next presentation Prithwis Mukerjee, PhD, Praxis Business School, Calcutta, India