1) The document discusses adapting permissionless blockchain construction to user demand by allowing the number of blocks and block creation rate in a blockchain to self-adapt to transaction demand.
2) It proposes a system called Sycomore that moves from a chain of blocks to a directed acyclic graph (DAG) of blocks where the predecessor of a block is not predictable.
3) Sycomore aims to partition transactions over blocks in a way that is verifiable by anyone and allows the blockchain to scale to thousands of transactions per second while maintaining security properties like preventing double spending.
The document provides an overview of blockchain technology. It discusses what blockchain is, how it works through decentralization and distributed ledgers, and why it is needed to solve issues of trust on the internet. It covers key aspects of blockchain like public vs private blockchains, cryptography techniques used for integrity and authentication, how blocks are structured in the chain using hashing and Merkle trees, and consensus mechanisms like proof of work that allow the decentralized network to agree on the valid state. Use cases like managing music copyright are also presented.
Simone Bronzini - Weaknesses of blockchain applications - Codemotion Milan 2018Codemotion
Due to the immutability of the ledger and the difficulty to update their consensus rules, Blockchain applications have many critical layers where a bug can cause huge, irreversible fund losses. This talk will shed some light on why and how Blockchain applications are so critical and will discuss past events that led to fund loss or consensus failures due to bugs in critical parts of the code of Bitcoin and Ethereum applications.
This document proposes a hybrid Proof-of-Work/Proof-of-Stake consensus algorithm called Hyperchains. Hyperchains use a parent Proof-of-Work blockchain to secure and checkpoint a child Proof-of-Stake blockchain. The elections of validators on the child chain depend only on what happens on the parent chain. When a new keyblock is mined on the parent chain, eligible delegates on the child chain submit commitments to the parent chain acknowledging their view of the child chain. A transparent function then elects the new validator on the child chain based on stakes and commitments. This avoids problems with naive Proof-of-Stake by punishing voting on multiple forks and only considering the last commitment. Hyperchains
A basic overview of what blockchain is with step-by-step easy to follow explanation of its core concepts. It should be easy for anyone with zero knowledge of blockchain to follow through the slides
Intro to Blockchain - And, by the way, what the heck is proof-of-work?Jim Flynn
An overview of bitcoin and the blockchain with a more in-depth description of proof of work (POW). Conde samples used to demonstrate the concepts behind POW are available at http://jamespflynn.com.
Blockchain general presentation nov 2017 v engDavid Vangulick
These slides are used to introduce the concept of blockchain and how this technology can be used for peer to peer energy exchange linked with the wholesale energy market
The document provides an overview of cryptography and cryptocurrency such as Bitcoin. It discusses how cryptography works through encryption and decryption with keys. Cryptocurrency uses cryptography for security and transactions are recorded on a public blockchain. Bitcoin was the first major cryptocurrency and works on a decentralized peer-to-peer network without a central authority. Users can make transactions with minimal fees and Bitcoin can be used to purchase goods and services from many companies.
Sidechains allow the transfer of assets between blockchains through a two-way peg mechanism. This mechanism uses cryptographic proofs to lock assets on one blockchain and unlock equivalent assets on another blockchain. It provides properties like atomic transfers without counterparty risk. There are challenges around complexity, potential for fraudulent transfers through deep reorganizations, and risks of centralization for sidechains with mining. Applications include experimentation with new features on separate blockchains and issuing new blockchain-based assets.
The document provides an overview of blockchain technology. It discusses what blockchain is, how it works through decentralization and distributed ledgers, and why it is needed to solve issues of trust on the internet. It covers key aspects of blockchain like public vs private blockchains, cryptography techniques used for integrity and authentication, how blocks are structured in the chain using hashing and Merkle trees, and consensus mechanisms like proof of work that allow the decentralized network to agree on the valid state. Use cases like managing music copyright are also presented.
Simone Bronzini - Weaknesses of blockchain applications - Codemotion Milan 2018Codemotion
Due to the immutability of the ledger and the difficulty to update their consensus rules, Blockchain applications have many critical layers where a bug can cause huge, irreversible fund losses. This talk will shed some light on why and how Blockchain applications are so critical and will discuss past events that led to fund loss or consensus failures due to bugs in critical parts of the code of Bitcoin and Ethereum applications.
This document proposes a hybrid Proof-of-Work/Proof-of-Stake consensus algorithm called Hyperchains. Hyperchains use a parent Proof-of-Work blockchain to secure and checkpoint a child Proof-of-Stake blockchain. The elections of validators on the child chain depend only on what happens on the parent chain. When a new keyblock is mined on the parent chain, eligible delegates on the child chain submit commitments to the parent chain acknowledging their view of the child chain. A transparent function then elects the new validator on the child chain based on stakes and commitments. This avoids problems with naive Proof-of-Stake by punishing voting on multiple forks and only considering the last commitment. Hyperchains
A basic overview of what blockchain is with step-by-step easy to follow explanation of its core concepts. It should be easy for anyone with zero knowledge of blockchain to follow through the slides
Intro to Blockchain - And, by the way, what the heck is proof-of-work?Jim Flynn
An overview of bitcoin and the blockchain with a more in-depth description of proof of work (POW). Conde samples used to demonstrate the concepts behind POW are available at http://jamespflynn.com.
Blockchain general presentation nov 2017 v engDavid Vangulick
These slides are used to introduce the concept of blockchain and how this technology can be used for peer to peer energy exchange linked with the wholesale energy market
The document provides an overview of cryptography and cryptocurrency such as Bitcoin. It discusses how cryptography works through encryption and decryption with keys. Cryptocurrency uses cryptography for security and transactions are recorded on a public blockchain. Bitcoin was the first major cryptocurrency and works on a decentralized peer-to-peer network without a central authority. Users can make transactions with minimal fees and Bitcoin can be used to purchase goods and services from many companies.
Sidechains allow the transfer of assets between blockchains through a two-way peg mechanism. This mechanism uses cryptographic proofs to lock assets on one blockchain and unlock equivalent assets on another blockchain. It provides properties like atomic transfers without counterparty risk. There are challenges around complexity, potential for fraudulent transfers through deep reorganizations, and risks of centralization for sidechains with mining. Applications include experimentation with new features on separate blockchains and issuing new blockchain-based assets.
Talk for CodeMash 2018. Page to end for resources. Some more links (click to expand):
Bitcoin's Insane Energy Consumption Explained: https://arstechnica.com/tech-policy/2017/12/bitcoins-insane-energy-consumption-explained/
The Ethereum-blockchain size will not exceed 1TB anytime soon.
https://dev.to/5chdn/the-ethereum-blockchain-size-will-not-exceed-1tb-anytime-soon-58a
For use rights, please see license agreement below.
Consensus Algorithms - Nakov at CryptoBlockCon - Las Vegas (2018)Svetlin Nakov
This document discusses various blockchain consensus algorithms, including Byzantine Fault Tolerance (BFT), Proof of Work (PoW), Proof of Stake (PoS), Delegated Proof of Stake (DPoS), and Asynchronous BFT (aBFT). It provides an overview of how each algorithm works, examples of blockchain systems that use each algorithm, and the advantages and disadvantages of each approach. In conclusion, it notes that there is no perfect consensus algorithm and that each has tradeoffs between decentralization, performance, and security.
Apart from Proof of Work there are many other Consensus Mechanisms being discussed. What are they and what are their pros and cons. (Proof of Stake, Proof of Elapsed Time, Proof of Authority, Proof of Burn, Proof of Authority, Byzantine Fault Tolerance, Proof of Importance)
Blockchain is a decentralized ledger or list of all transactions across a peer-to-peer network. It underlies technologies like Bitcoin and has potential to disrupt many business processes. No single user controls the blockchain, transactions are broadcast to the network and validated through consensus. The author of the blockchain concept is unknown, thought to use the pseudonym Satoshi Nakamoto. Blockchains use techniques like proof-of-work to serialize changes and achieve distributed consensus to maintain integrity without centralized authority.
Blockchain consensus algorithms allow distributed networks to agree on a single transaction history. The document discusses several popular consensus algorithms including proof of work (PoW), proof of stake (PoS), practical Byzantine fault tolerance (PBFT), Istanbul Byzantine fault tolerance (IBFT), proof of authority (PoA), and RAFT. It provides overviews of how each algorithm works and compares their properties such as finality, tolerance for malicious nodes, trust requirements, and energy usage.
Proof-of-Stake & Its Improvements (San Francisco Bitcoin Devs Hackathon)Alex Chepurnoy
This document discusses improvements to proof-of-stake consensus algorithms for cryptocurrencies. It begins with an introduction to the author and their areas of research interest. It then provides an overview of consensus algorithms, problems in distributed systems, and the history of Byzantine agreement and Bitcoin's consensus protocol. The majority of the document focuses on improvements to proof-of-stake protocols, including the use of multiple branching forging to improve security and the development of formal models and simulation tools to analyze consensus algorithms. It concludes by discussing the author's work on experimental cryptocurrency implementations using proof-of-stake variants.
This document provides an overview of consensus mechanisms for blockchain networks. It begins by defining key terms like blockchain, distributed ledger, and consensus mechanism. It then discusses the Byzantine General's Problem and how consensus solves it. The document outlines basic parameters of consensus mechanisms and provides examples of widely used mechanisms like Proof-of-Work. It also summarizes several alternative consensus algorithms like Proof-of-Stake, Delegated Proof-of-Stake, Raft, and Byzantine Fault Tolerant variants. Throughout, it emphasizes the need for different consensus approaches based on use cases and technical requirements.
The Lightning Network - A gentle introductionRoland Stadler
The Lightning Network allows for instant, low-cost payments on Bitcoin through the use of payment channels and a mesh network. It provides greatly improved scalability over Bitcoin by taking transactions off-chain, where local consensus between peers is sufficient instead of global consensus on the blockchain. While adding complexity, it enables new use cases like micropayments and improves privacy. Real-world examples demonstrate its viability for coffee shops, online purchases, tipping, and more.
Consensus Algorithms - Nakov @ jProfessionals - Jan 2018Svetlin Nakov
This document provides an overview of blockchain consensus algorithms including proof-of-work, proof-of-stake, delegated proof-of-stake, proof-of-authority, and PBFT. It discusses the requirements for consensus algorithms and describes how various popular cryptocurrencies implement different consensus mechanisms. Several Java-based blockchain projects are also mentioned, including IOTA, NEM, and TRON.
Bitcoin, Blockchain and the Crypto Contracts - Part 2Prithwis Mukerjee
Where we explain how the cryptographic ideas are used to create a crypto asset on the block chain. This one part of a three part slide deck. For the full deck and the context please visit http://bit.ly/pm-bbc
Where we explain how the concept of a crypto currency can lead to the creation of a new kind of autonomous corporation. This one part of a three part slide deck. For the full deck and the context please visit http://bit.ly/pm-bbc
The Lightning Network aims to solve Bitcoin's problems of slow payments, high transaction costs, and poor scalability. It allows for instant, very low-cost payments between nodes by conducting transactions off-blockchain through payment channels. There are currently three main implementations of Lightning that have achieved compatibility. The network functions as a layer on top of Bitcoin through defined BOLT protocols, forming a decentralized network of payment channels between nodes.
This document provides instructions for creating an alternative cryptocurrency like Bitcoin. It outlines the necessary planning steps like designing coin parameters, source code configuration changes, and compiling the code. Key steps include cloning an existing altcoin source, modifying parameters like block time and total coin amount, generating a genesis block, and connecting multiple computers to mine fresh coins. The document cautions that one should not create an altcoin just for the sake of it, but instead focus on innovation through new hashing algorithms, economic models, or smart contract capabilities.
Best practices to build secure smart contractsGautam Anand
- Quick update in blockchain tech space
- Comparision between tech
- Security in Blockchain (Focusing on ETH Solidity attack vectors)
- Design patterns
- 2 Popular hacks (Case study)
Presentation material for Quorum meetup in Singapore (1 June) for the purpose of circulating among attendees.
Presentation by Sai Valiveti, Quorum platform development lead for APAC
An introduction to Quorum that covers:
- What is Quorum
- Key features
- Technical deep-dive: privacy
- What can be done with Quorum
- Existing use-cases
- Getting started with Quorum
Connecting The Block Cointelligence Academy by Dr Vince MingCointelligence
This lecture is intended for konwledge sharing and educational purpose only in order to provide a comprehensive overview and helping people who wants to find out about the blockchain's core concept from a general technical standpoint with the intention to gain the right perception, the basic know-how and overall perspective on the emerging technology.
Bitcoin Lightning Network - Presentation Jim Brysland
The Lightning Network is a solution to Bitcoin's scalability problem that allows for high volumes of fast and cheap transactions to be conducted off the blockchain. It creates payment channels that enable direct and instant transfers between two parties without waiting for transaction confirmations. This helps Bitcoin fulfill its potential as a global, decentralized payment system and scales far beyond the current 7 transactions per second that can be supported on-chain.
Bitcoin is a decentralized digital currency that uses cryptography to secure online transactions without relying on central authorities. It works by maintaining a distributed ledger called the blockchain that records all transactions. Transactions are authenticated through digital signatures and verified by the network through proof-of-work mining to prevent double spending. While providing pseudonymity, Bitcoin transactions are publicly visible on the blockchain, compromising user privacy. Zerocoin was proposed to add an anonymous currency layer on top of Bitcoin through the use of cryptographic commitments and zero-knowledge proofs to obscure the link between minting and spending of digital coins.
An introduction to Ethereum, the peer to peer computing framework based on the blockchain design. It describes how Ethereum relates to earlier blockchain technologies and how it represents an evolution of these technologies
The document discusses the Lightning Network, which aims to scale bitcoin transactions by enabling instant, low-cost payments through off-chain payment channels. It describes key concepts like payment channels, routing payments across multiple nodes, and implementations. The Lightning Network allows for near-instant micropayments, smart contracts, and cross-chain atomic swaps by using timelocks and hashed timelock contracts to securely transfer bitcoin off the main blockchain.
Blockchain is a distributed ledger technology that allows for the safe distribution of a ledger across multiple nodes. It works by having each transaction digitally signed and added in a "block" along with a proof of work. This prevents double spending and allows nodes to reach consensus on the transaction history without a centralized authority. Smart contracts enable decentralized applications to run transactions automatically according to the program. However, first generation blockchains face challenges around centralization, scalability, and smart contract quality. New solutions aim to address these through alternative consensus methods, off-chain transactions, and designed smart contract languages.
Talk for CodeMash 2018. Page to end for resources. Some more links (click to expand):
Bitcoin's Insane Energy Consumption Explained: https://arstechnica.com/tech-policy/2017/12/bitcoins-insane-energy-consumption-explained/
The Ethereum-blockchain size will not exceed 1TB anytime soon.
https://dev.to/5chdn/the-ethereum-blockchain-size-will-not-exceed-1tb-anytime-soon-58a
For use rights, please see license agreement below.
Consensus Algorithms - Nakov at CryptoBlockCon - Las Vegas (2018)Svetlin Nakov
This document discusses various blockchain consensus algorithms, including Byzantine Fault Tolerance (BFT), Proof of Work (PoW), Proof of Stake (PoS), Delegated Proof of Stake (DPoS), and Asynchronous BFT (aBFT). It provides an overview of how each algorithm works, examples of blockchain systems that use each algorithm, and the advantages and disadvantages of each approach. In conclusion, it notes that there is no perfect consensus algorithm and that each has tradeoffs between decentralization, performance, and security.
Apart from Proof of Work there are many other Consensus Mechanisms being discussed. What are they and what are their pros and cons. (Proof of Stake, Proof of Elapsed Time, Proof of Authority, Proof of Burn, Proof of Authority, Byzantine Fault Tolerance, Proof of Importance)
Blockchain is a decentralized ledger or list of all transactions across a peer-to-peer network. It underlies technologies like Bitcoin and has potential to disrupt many business processes. No single user controls the blockchain, transactions are broadcast to the network and validated through consensus. The author of the blockchain concept is unknown, thought to use the pseudonym Satoshi Nakamoto. Blockchains use techniques like proof-of-work to serialize changes and achieve distributed consensus to maintain integrity without centralized authority.
Blockchain consensus algorithms allow distributed networks to agree on a single transaction history. The document discusses several popular consensus algorithms including proof of work (PoW), proof of stake (PoS), practical Byzantine fault tolerance (PBFT), Istanbul Byzantine fault tolerance (IBFT), proof of authority (PoA), and RAFT. It provides overviews of how each algorithm works and compares their properties such as finality, tolerance for malicious nodes, trust requirements, and energy usage.
Proof-of-Stake & Its Improvements (San Francisco Bitcoin Devs Hackathon)Alex Chepurnoy
This document discusses improvements to proof-of-stake consensus algorithms for cryptocurrencies. It begins with an introduction to the author and their areas of research interest. It then provides an overview of consensus algorithms, problems in distributed systems, and the history of Byzantine agreement and Bitcoin's consensus protocol. The majority of the document focuses on improvements to proof-of-stake protocols, including the use of multiple branching forging to improve security and the development of formal models and simulation tools to analyze consensus algorithms. It concludes by discussing the author's work on experimental cryptocurrency implementations using proof-of-stake variants.
This document provides an overview of consensus mechanisms for blockchain networks. It begins by defining key terms like blockchain, distributed ledger, and consensus mechanism. It then discusses the Byzantine General's Problem and how consensus solves it. The document outlines basic parameters of consensus mechanisms and provides examples of widely used mechanisms like Proof-of-Work. It also summarizes several alternative consensus algorithms like Proof-of-Stake, Delegated Proof-of-Stake, Raft, and Byzantine Fault Tolerant variants. Throughout, it emphasizes the need for different consensus approaches based on use cases and technical requirements.
The Lightning Network - A gentle introductionRoland Stadler
The Lightning Network allows for instant, low-cost payments on Bitcoin through the use of payment channels and a mesh network. It provides greatly improved scalability over Bitcoin by taking transactions off-chain, where local consensus between peers is sufficient instead of global consensus on the blockchain. While adding complexity, it enables new use cases like micropayments and improves privacy. Real-world examples demonstrate its viability for coffee shops, online purchases, tipping, and more.
Consensus Algorithms - Nakov @ jProfessionals - Jan 2018Svetlin Nakov
This document provides an overview of blockchain consensus algorithms including proof-of-work, proof-of-stake, delegated proof-of-stake, proof-of-authority, and PBFT. It discusses the requirements for consensus algorithms and describes how various popular cryptocurrencies implement different consensus mechanisms. Several Java-based blockchain projects are also mentioned, including IOTA, NEM, and TRON.
Bitcoin, Blockchain and the Crypto Contracts - Part 2Prithwis Mukerjee
Where we explain how the cryptographic ideas are used to create a crypto asset on the block chain. This one part of a three part slide deck. For the full deck and the context please visit http://bit.ly/pm-bbc
Where we explain how the concept of a crypto currency can lead to the creation of a new kind of autonomous corporation. This one part of a three part slide deck. For the full deck and the context please visit http://bit.ly/pm-bbc
The Lightning Network aims to solve Bitcoin's problems of slow payments, high transaction costs, and poor scalability. It allows for instant, very low-cost payments between nodes by conducting transactions off-blockchain through payment channels. There are currently three main implementations of Lightning that have achieved compatibility. The network functions as a layer on top of Bitcoin through defined BOLT protocols, forming a decentralized network of payment channels between nodes.
This document provides instructions for creating an alternative cryptocurrency like Bitcoin. It outlines the necessary planning steps like designing coin parameters, source code configuration changes, and compiling the code. Key steps include cloning an existing altcoin source, modifying parameters like block time and total coin amount, generating a genesis block, and connecting multiple computers to mine fresh coins. The document cautions that one should not create an altcoin just for the sake of it, but instead focus on innovation through new hashing algorithms, economic models, or smart contract capabilities.
Best practices to build secure smart contractsGautam Anand
- Quick update in blockchain tech space
- Comparision between tech
- Security in Blockchain (Focusing on ETH Solidity attack vectors)
- Design patterns
- 2 Popular hacks (Case study)
Presentation material for Quorum meetup in Singapore (1 June) for the purpose of circulating among attendees.
Presentation by Sai Valiveti, Quorum platform development lead for APAC
An introduction to Quorum that covers:
- What is Quorum
- Key features
- Technical deep-dive: privacy
- What can be done with Quorum
- Existing use-cases
- Getting started with Quorum
Connecting The Block Cointelligence Academy by Dr Vince MingCointelligence
This lecture is intended for konwledge sharing and educational purpose only in order to provide a comprehensive overview and helping people who wants to find out about the blockchain's core concept from a general technical standpoint with the intention to gain the right perception, the basic know-how and overall perspective on the emerging technology.
Bitcoin Lightning Network - Presentation Jim Brysland
The Lightning Network is a solution to Bitcoin's scalability problem that allows for high volumes of fast and cheap transactions to be conducted off the blockchain. It creates payment channels that enable direct and instant transfers between two parties without waiting for transaction confirmations. This helps Bitcoin fulfill its potential as a global, decentralized payment system and scales far beyond the current 7 transactions per second that can be supported on-chain.
Bitcoin is a decentralized digital currency that uses cryptography to secure online transactions without relying on central authorities. It works by maintaining a distributed ledger called the blockchain that records all transactions. Transactions are authenticated through digital signatures and verified by the network through proof-of-work mining to prevent double spending. While providing pseudonymity, Bitcoin transactions are publicly visible on the blockchain, compromising user privacy. Zerocoin was proposed to add an anonymous currency layer on top of Bitcoin through the use of cryptographic commitments and zero-knowledge proofs to obscure the link between minting and spending of digital coins.
An introduction to Ethereum, the peer to peer computing framework based on the blockchain design. It describes how Ethereum relates to earlier blockchain technologies and how it represents an evolution of these technologies
The document discusses the Lightning Network, which aims to scale bitcoin transactions by enabling instant, low-cost payments through off-chain payment channels. It describes key concepts like payment channels, routing payments across multiple nodes, and implementations. The Lightning Network allows for near-instant micropayments, smart contracts, and cross-chain atomic swaps by using timelocks and hashed timelock contracts to securely transfer bitcoin off the main blockchain.
Blockchain is a distributed ledger technology that allows for the safe distribution of a ledger across multiple nodes. It works by having each transaction digitally signed and added in a "block" along with a proof of work. This prevents double spending and allows nodes to reach consensus on the transaction history without a centralized authority. Smart contracts enable decentralized applications to run transactions automatically according to the program. However, first generation blockchains face challenges around centralization, scalability, and smart contract quality. New solutions aim to address these through alternative consensus methods, off-chain transactions, and designed smart contract languages.
This document provides an overview of blockchain technology. It discusses why blockchain is important by outlining issues with existing banking systems. It then defines blockchain as an open distributed ledger recorded in a peer-to-peer network. The structure of blockchain uses blocks containing data, a hash, and the hash of the previous block, linking them together in a chain. Fundamentals like proof of work and encryption make blockchain secure and decentralized. Cryptocurrency and smart contracts are emerging applications of blockchain technology.
This document provides an overview of the topics covered in a Fintech course. The syllabus includes digital transformation of financial services, regulation, identity, payments technology, blockchain, wealth technology, and innovation. It also discusses recent issues in cryptocurrency markets and reviews concepts like un-banking, decentralization, privacy, and the evolution of Bitcoin and Ethereum. Examples and short demonstrations are provided to help explain technical concepts in blockchain and consensus protocols.
Understanding Blockchain: Distributed Ledger TechnologySuraj Kumar Jana
A complete introduction to Distributed Ledger Technology and Blockchain. Also, get introduced to Hyperledger, an open source permissioned blockchain framework by The Linux Foundation.
Rohan provided an overview of how cryptocurrency works including key terms like blockchain, mining, decentralization, and proof of work. Blockchain is a digital ledger that records transactions across a network of computers. Mining is the process of verifying transactions and adding them to the blockchain to introduce new coins as a reward. Decentralization means control is distributed across the network rather than centralized. Proof of work is the consensus algorithm where miners compete to complete transactions. Rohan also discussed advantages like transparency and security as well as challenges like energy use and implementation costs.
A brief introduction to Blockchain and the underlying technology of distributed computing, challenges and future scope.
Copyrights belong to the respective owners, intention is purely for informational/educational purpose
I would like to thank various blogs, technical tutorials, books, videos to help me understand the basics and collate this presentaion
A Primer on Blockchain and its Potential, with a Focus on the GCCZeyad T. Al Mudhaf
During my summer internship at BECO Capital, a technology-focused Venture Capital firm based in Dubai, I put together this primer on blockchain that demystifies this hyped up technology, covers key investment trends in the space both globally and regionally within the GCC*, and highlights both the barriers and enablers for wider blockchain adoption in the region. *The GCC is the Gulf Cooperation Council - comprised of the United Arab Emirates, Saudi Arabia, Kuwait, Bahrain, Qatar, and Oman.
An overview of blockchain and Distributed Ledger Technologies (DLT) including consensus, PoW, PoS, dBFT, DAG, smart contracts, Ethereum, Stellar, Ripple, Hashgraph Hedera, tokens, tokenomics, cryptocurrencies, ICO... taught during the ITU DLT seminar in Bangkok Thailand in September 2018
Gas is a unit used in Ethereum that measures the amount of computational effort required to execute a transaction or smart contract. Every operation on the Ethereum network has an associated gas cost. While gas is used to measure computational work, fees are actually paid in ether using a gas price. The total fee paid is calculated as gas used multiplied by gas price. Gas ensures transactions pay appropriately for their computational requirements and prevents spam on the network. Running out of gas results in transaction failure, while providing too little gas price means a transaction won't be included in a block.
Blockchain Ecosystem and Cryptocurrency RegulationsAmir Rafati
A blockchain is a general digital ledger of transactions that are executed on the network, e.g. using Bitcoin to buy a cup of coffee is a transaction.
All users of the network, ‘Nodes’, have a copy of the transaction records and can access them freely, a role previously played by centralized institutions. Therefore, the blockchain network is ‘decentralized’.
Blockchain has gained lots of attention in recent years. Bitcoin and Ethereum are leading the race. Crypto currencies in spite of uncertainty and volatility are here to stay. Smart contract programming is the future for the Internet 3.0.
This document provides an overview of blockchain technology and distributed ledgers. It begins with the story of Bitcoin's origins in response to the 2008 financial crisis. It then explains key concepts like distributed ledgers, smart contracts, tokens, proof-of-work, private-public keys, and addresses. Issues discussed include classification of cryptocurrencies, identity, complexity challenges, legal issues, capital raising, data ownership, and energy consumption concerns related to mining. The goal is to help understand implications of this technology for citizens, businesses, and governments.
Virtual or digital currencies, with Bitcoin chief amongst them, have been gaining momentum and investment over the last couple of years. Offering an almost costless means of making payments around the globe, virtual currencies have the potential to bring significant disruption to the banking industry. This potential is not lost on either Bitcoin startups or banks themselves. But how does Bitcoin actually work? A peer-to-peer network maintains the “blockchain”, an innovative cryptographic protocol which securely mediates payments between parties without mutual trust. This session will step through the structure of the blockchain, showing how it solves the “double spend” problem and allows decentralised processing of financial transactions. Whether Bitcoin will become the currency of the internet or it’s a bubble that is doomed to burst sooner or later, the blockchain itself will change the face of transactional banking and perhaps other industries along the way.
Presentation to the Sydney Financial Mathematics Workshop (11 March 2015)
http://www.qgroup.org.au/content/bitcoin-banking-and-blockchain
Blockchain technology is a distributed ledger platform that provides open and transparent transaction information with integrity and non-repudiation based on modern cryptography. It is also the technology behind many cryptocurrencies. This presentation will give fundamental knowledge on how blockchain works, its cryptography implementation, cryptocurrency definition and related terms and also blockchain use cases.
This document discusses blockchain technology and its applications. It begins with definitions of blockchain, describing how blocks are linked together in a growing list using cryptography. It then covers blockchain consensus protocols like proof-of-work and proof-of-stake. Applications of blockchain discussed include use in IoT for addressing space, identity management, and access control, as well as in smart agriculture for supply chain tracking and fair pricing. The document concludes by outlining challenges for blockchain like security issues, scalability as the ledger grows, legal questions around jurisdiction, and limitations to transactional privacy.
This document provides an overview of blockchain technology. It defines blockchain as a decentralized data structure that allows for a secure, immutable transaction system. The document then briefly outlines the history of blockchain, starting with Satoshi Nakamoto's 2008 paper introducing Bitcoin. It provides a simple technical explanation of blockchain components like hash functions, hash pointers, and blocks. The document also discusses consensus mechanisms like proof-of-work, smart contracts, decentralized applications, and challenges facing blockchain adoption and scalability.
Blockchain and cryptocurrencies are emerging technologies that are still not fully understood. There are differing views on their value. Blockchain is a distributed digital ledger of transactions that is replicated across multiple computers. Cryptocurrencies like Bitcoin use blockchain technology, and their value comes from factors like production costs, scarcity, and utility. Ethereum enables decentralized applications and smart contracts through its cryptocurrency Ether. Altcoins have proliferated since Bitcoin, with some gaining significant value through network effects. Initial coin offerings have also raised billions for new blockchain projects.
Exploring the tech and legal side of Blockchain. A peek behind the curtain of how it works. Presented by Susan Goldsmith and Ash Yadav at whartonclubnj event.
Similaire à Can we safely adapt the construction of permissionless blockchain to user demand ? (20)
Colloque Healthcare 4.0 : "Accompagnement des troubles du sommeil : la recher...I MT
Colloque Healthcare 4.0 : "Accompagnement des troubles du sommeil : la recherche-projet Som'Health"
Plus d'infos : https://www.imt.fr/retour-sur-le-colloque-imt-healthcare-4-0-du-15-octobre-2019/
Colloque Healthcare 4.0 : « Vous ne devriez pas autant être sur les écrans ! » I MT
Colloque Healthcare 4.0 : « Vous ne devriez pas autant être sur les écrans ! »
Plus d'infos : https://www.imt.fr/retour-sur-le-colloque-imt-healthcare-4-0-du-15-octobre-2019/
Colloque Healthcare 4.0 : "NeuroLife : Interfaces Cerveau Machine pour la San...I MT
Colloque Healthcare 4.0 : "NeuroLife : Interfaces Cerveau Machine pour la Santé et l’Autonomie"
Plus d'infos : https://www.imt.fr/retour-sur-le-colloque-imt-healthcare-4-0-du-15-octobre-2019/
Colloque Healthcare 4.0 : "La protection de données en santé"I MT
Colloque Healthcare 4.0 : "La protection de données en santé"
Plus d'infos : https://www.imt.fr/retour-sur-le-colloque-imt-healthcare-4-0-du-15-octobre-2019/
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « EIT Health : un tremplin europ...I MT
EIT Health is a network of health innovators backed by the European Union. It supports innovations in healthcare through three main programs: Innovation, Education, and Acceleration. The document provides information on EIT Health's activities in France, including its partners in different regions and industries. It also summarizes some of EIT Health's past successes in supporting new technologies and businesses, as well as training programs. Attendees of the event are encouraged to discuss project ideas and find potential partners.
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Modélisation semi-analytique personnalisée du port des ceintures lombaires. Application à des essais précliniques in vitro » -Présentation par Jérôme Molimard
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Développement de la caméra XE...I MT
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Développement de la caméra XEMIS2 pour l'imagerie médicale à 3 gammas » - Présentation par Dominique Thers
This document proposes using a digital twin approach to simulate an emergency service. A discrete event simulation model was developed based on historical patient data from a hospital emergency department. The model consists of modules representing different patient pathways and models staff activities. The digital twin can operate in two modes: 1) real-time monitoring of the current system and 2) running simulation scenarios to evaluate "what-if" situations. Experimental results showed the digital twin could replicate key performance metrics like length of stay. Opportunities exist to improve data collection during patient stays and generate the model automatically. The approach provides a proof of concept for using digital twins to evaluate hospital emergency departments.
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - "Machine...I MT
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - "Machine Listening: L'intelligence artificielle pour les sons et la musique". Présentation par Gaël Richard
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Contrôle...I MT
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Session Robotique, Perception, Interaction: Contrôleurs neuronaux plastiques pour l'émergence de coordinations motrices dans l'interaction physique et sociale humain/robot. Présentation par Patrick Henaff (IMT Mines Nancy)
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Interopé...I MT
Colloque IMT - L'IA au cœur des mutations industrielles - Session Données et connaissances: Interopérabilité sémantique et coordination décentralisée. Présentation par Maxime Lefrançois, Maître-assistant Mines
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - TeraLab,...I MT
Colloque IMT - L'IA au cœur des mutations industrielles - Session Données et connaissances: TeraLab, un accélérateur de l'industrie 4.0. Présentation par Anne-Sophie Taillandier, Directrice de projet TeraLab (IMT)
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Session ...I MT
Colloque IMT - L'IA au cœur des mutations industrielles - Session: Contrôle dynamique des systèmes ou produits industriels : une intelligence artificielle ? Présentation par Philippe Chevrel
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
The CBC machine is a common diagnostic tool used by doctors to measure a patient's red blood cell count, white blood cell count and platelet count. The machine uses a small sample of the patient's blood, which is then placed into special tubes and analyzed. The results of the analysis are then displayed on a screen for the doctor to review. The CBC machine is an important tool for diagnosing various conditions, such as anemia, infection and leukemia. It can also help to monitor a patient's response to treatment.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Can we safely adapt the construction of permissionless blockchain to user demand ?
1. 1
Can we safely adapt the construction of
permissionless blockchain to user demand?
Emmanuelle Anceaume (CNRS)
Joint work with
Antoine Durand (IRT SystemX), Romaric Ludinard
(IMT-Atlantique), Bruno Sericola (INRIA)
Journées Futur & Ruptures - January, 31st of January 2019
2. 2
Bitcoin is a cryptocurrency and payment system
• Fully decentralized
• No public key infrastructure
• Permissionless
Such constraints make the general problem of consensus
impossible to solve
• Relies on rational behavior and incentives mechanisms
To reach a consensus on the cryptocurrency state
4. 4
The state of the cryptocurrency system is represented by transactions
• Transfers currency from one user to another
• Does not contain any encrypted information nor confidential
information
Transaction 20ab3701i
Transaction 74201ab3c
UTXO
UTXO = Unspent Transaction Output
Output #2
account + ฿ + script
Output #1
account + ฿ + script
Output #1
account + ฿ + script
Output #1
account + ฿ + script
Input #1
Output ref. + script
Transaction 1206ac34e
Output #2
account + ฿ + script
Output #3
account + ฿ + script
Output #1
account + ฿ + script
Input #1
Output ref. + script
Input #2
Output ref. + script
Input #1
Output ref. + script
Input #2
Output ref. + script
Do not forget Tx fees, i.e., ฿ input ฿ output
UTXO
5. 5
Checking the ownership of an account
• How can anyone check that I am the legitimate owner of an
account since there are no identities in a transaction ?
• Using « public keys as identities » principle 1
• Ownership = knowing a private key that redeems an output
Account / address / UTXO = « single use » object
• debited once
• should be credited once
1. D. Chaum, « Untraceable Electronic Mail, Return Addresses, and Digital
Pseudonums », Communications of the ACM 24(2), pp :84–90,1981
6. 6
Signed transactions guarantee that only the owner of an
output can spend bitcoins
However signatures do not prevent double-spending attacks
• I.e., the fact that Alice spends an output twice
A publicly, immutable, and totally ordered sequence of transactions
7. 7
2. Nakamoto Consensus protocol : Adversary model 2
The Computational Threshold Adversary (CTA) model
• The adversary controls a minority of the total amount of
computational power
• The CTA model is also called the permissionless model
• There is no membership protocol
• Incorporates some degree of synchrony
The Stake Threshold Adversary (STA) model
• The adversary controls a minority stake in some limited
resource, i.e., the crypto-currency
• May allow to punish malicious parties via some stake deposit
2. Ittai Abraham and Dahlia Malkhi, « The blockchain consensus layer and
BFT », The distributed Computing Column, 2017
8. 8
2. Nakamoto Consensus protocol
Two ingredients : Leader Election Oracle + Heavier Fork Strategy
1 A leader election oracle by relying on the PoW mechanism
• Each party is elected independently
• The probability of electing each party is proportional to its
relative computational power
• Each party commits to a single block
→ Synchronize the creation of blocks
→ Prevent Sybil attacks
→ Incentivize correct behavior through currency creation
9. 9
2. Nakamoto Consensus protocol
Two ingredients : Leader Election Oracle + Heavier Fork Strategy
2 The simple and local Heavier Fork Strategy
• Select the chain which required the greatest among of work
• Random nature of the PoW + Non-faulty leaders always use
the chain which required the greatest among of work
→ One chain will be extended more than the others
→ The blockchain
B0 Bi
Bi+1
Bi+1
10. 10
2. Nakamoto Consensus protocol
The goal of the Consensus Nakamoto protocol is to implement a
blockchain replication protocol 3
• (Uniqueness) There is a unique chain of blocks (i.e., the
blockchain) extracted from the tree
• (Liveness) The blockchain is constantly growing
• (Safety) The deeper a block is buried in the blockchain the
harder it is to abort it
• (Fairness) The proportion of blocks of non-faulty parties in the
blockchain is proportional to their computation power
3. J. Garay and A. Kiayias, The Bitcoin Backbone Protocol : Analysis and
Application, Eurocrypt 2015
11. 11
3. Peer-to-Peer Network
• Topology formed through a randomized process
• No coordinating entity
• Broadcast is based on flooding/gossiping neighbors’ link
Tx d - e
Tx a - B
Tx a - B Tx a - B
Tx a - B
Tx a - B
Tx a - B
Tx a - B
Tx a - B
Tx a - B
Tx a - B
Tx d - e
Tx d - e
Tx d - e
Tx d - e
Tx d - e
Tx a - B
Tx d - e
Tx d - e
Tx a - B
Tx a - B
Tx d - e
12. 12
Required properties
1. Connectivity
• Each node should receive any broadcast information
2. Low latency 4
msg. transmission time
block time interval
1
Allows to keep the probability of fork small (i.e. 10−3)
PoW mechanism allows this ratio to continuously hold
Safety requires to wait one hour (i.e., no instant finality)
No more than 7 trans/s can be permanently confirmed in
average ! !
4. J. Garay and A. Kiayias, The Bitcoin Backbone Protocol : Analysis and
Application, Eurocrypt 2015
13. 13
Electing a leader in a permissionless setting
• Proof-of-work
Works in practice and this is true since 2009
Security analysis
Environmental issues
Diminishing returns
Distinction between miners and crypto-currency holders (i.e.,
miners control what is inside blocks)
• Proof-of-work with useful computation, proof-of-space,
proof-of-storage, . . .
Physical resources
• Proof-of-stake
Abstract but limited resource : coin itself
All the required information is already in the blockchain
Numerous attacks
14. 14
Proof-of-stake approaches
Proof-of-stake motto : « The probability for party p of winning the
leader election is proportional to the fraction of currency p owns »
• Eventual-consensus
• Protocols that apply some form of longest-chain rule to the
blockchain
• Immutability of a block increases gradually
• e.g. PPcoin, NXT, Ouroboros, . . .
• Blockwise-BA
• Immutability of a block is achieved by BA before working on
the next one
• e.g. Algorand
15. 15
Proof-of-stake approaches
PoS approaches are subject to attacks 5 essentially because it costs
nothing to create blocks and because of currency transfer from
transacting parties to the parties that maintain the ledger
• Checkpointing mechanisms
• Provide newcomers with a relatively recent block (trust issue)
• Prevent to adopt a new chain that originates to much in the
past (knowledge of the honest chain)
• Key-evolving cryptography : secret keys are evolving so that
past signatures cannot be forged (does not apply to UTXO
based model)
• Enforce strict chain density statistics (knowledge of the
number of parties at any time)
• Add context in each transaction (knowledge of the honest
chain)
5. P. Gazi, A. Kiayias, A. Russel, « Stake-Bleeding Attacks on Proof-of-Stake
Blockchains », IOHK
16. 16
Preventing conflicts as soon as possible
1. Valid blocks should never be confronted with any other
conflicting blocks
→ No fork !
→ 0-confirmation delay
2. Valid transactions should never be confronted with any other
conflicting transactions
→ No double spending attacks !
→ Fast payments feasible
17. 17
Preventing conflicts as soon as possible 6
1. Valid blocks should never be confronted with any other
conflicting blocks
How ? Agreement on the unique block that can reference an earlier
block in the blockchain
2. Valid transactions should never be confronted with any other
conflicting transactions
How ? Agreement on the unique transaction that can redeem unspent
transaction outputs (UTXOs)
6. Joint work with Antoine Durand (IRT SystemX), Romaric Ludinard (IMT),
Bruno Sericola (Inria)
E. Anceaume, A. Guellier, R. Ludinard, UTXO as a proof of membership for
Byzantine Agreements, IEEE Blockchain 2018.
18. 18
Model
• Permissionless system
• Partially synchronous environment
• Adversary : no more than 1/3 of the total amount of money is
held by the adversary
• Nodes have access to safe cryptographic functions (hash
function and signature scheme)
• Each object of the system (i.e., UTXO, transaction and block)
is assumed to be uniquely identified
• No public key infrastructure to establish node identities
19. 19
Properties
Most of the permissionless blockchain-based cryptosystems
guarantee that :
Property (Safety)
If a valid transaction T is deeply confirmed at some
non-compromised node then no transaction conflicting with T will
ever be deeply confirmed by any non-compromised nodes
Property (Liveness)
Any conflict-free and valid transaction will eventually be deeply
confirmed in the blockchain of all non-compromised nodes at the
same height in the blockchain
20. 20
Properties
We aim at strengthening both properties
Property (Strong safety)
If a valid transaction T is confirmed at some non-compromised
node then no transaction conflicting with T will ever be confirmed
by any non-compromised nodes
Property (Strong liveness)
Any valid transaction will eventually be confirmed in the blockchain
of all non-compromised nodes at the same height in the blockchain
21. 21
Transaction validation protocol
At most one transaction is allowed to use
all the UTXOs referenced in its input set
TRANSACTION
WITH BOB
VALID ??
YES !
ALICE
23. 23
Transaction validation protocol
At most one transaction is allowed to re-
deem all the UTXOs referenced in its input set
TRANSACTION
WITH BOB
VALID ??
YES !
ALICE
TRANSACTION
WITH EVE
VALID ??
NO!
24. 24
Block validation protocol
Any validated block has at most one
valid block as immediate successor
VALID ??
YES !
Pred=0001001
Block 0000111
25. 25
Block validation protocol
Any validated block has at most one
valid block as immediate successor
VALID ??
YES !
Pred=0001001
Block 0000111
Pred=0001001
Block 0000001
NO !
VALID ??
26. 26
A set of ingredients
1. Byzantine Agreement (BA)
• Primitive enabling a set of committee members to agree on a
single value, each member holding a possibly different initial
value.
• Tolerate the presence of a minority of malicious members
27. 27
2. « Public keys as identities » principle
• Users, i.e. owners of accounts (owners of UTXOs), participate
to BA 7
• Alternative to existing designs
• Rely on the unique association UTXO/identity as a proof of
membership for BA
7. E. Anceaume, A. Guellier, R. Ludinard, UTXO as a proof of membership
for Byzantine Agreements, IEEE Blockchain 2018.
28. 28
3. Clustered-based Distributed Hash Table (DHT)
• P2P overlay whose topology approximates a structured graph
• For resiliency reasons, each vertex of the graph is a set of
nodes
• Nodes logically close to each other belong to the same cluster
• e.g., PeerCube is a clustered-based overlay 8
resilient to
adversarial behavior and robust to high churn
8. E. Anceaume, R. Ludinard and B. Sericola. Performance evaluation of large-scale
dynamic systems. ACM Sigmetrics Performance Evaluation Review, 39(4), 2012.
29. 29
3. Clustered-based Distributed Hash Table (DHT) (cont’d)
By reaching an agreement around the objects to be validated
• Resistance to Eclipse attacks
• IDs are random, ephemeral and verifiable
• Resistance to Sybil attacks
• Participation to committees is weighted by UTXOs amount
• Resistance to Selfish attacks
• Miners cannot create a block without disclosing it
• No double-spending
• No forks
30. 30
Sycomore : from a chain of blocks to a DAG of blocks 9
9. E. Anceaume, A. Guellier, R. Ludinard, B. Sericola, Sycomore : a
Permissionless Distributed Ledger that self-adapts to Transactions Demand,
IEEE NCA, 2018
31. 31
Sycomore : from a chain of blocks to a DAG of blocks
• Transactions are partitioned over the blocks of the ledger -
verifiable by anyone
32. 32
Sycomore : from a chain of blocks to a DAG of blocks
• The number of blocks and their creation rate self-adapt to
transactions demand - verifiable by anyone
33. 33
Sycomore : from a chain of blocks to a DAG of blocks
• The predecessor of a block is not predictable - verifiable by
anyone
34. 34
0
100
200
300
400
500
600
1 5 10 15 20 25 30 35
Meaninter-blocktime(s)
c
1/(cλ0)
• With c = 30 leaf blocks,
a block is mined every
20s (7, 000 Tx/s) with a
proba of fork of 10−6
• Bitcoin : a block every 10
mns (7 Tx/s) with a
proba of fork of 10−3
• Could even go faster by
relying on our structured
DHT
Mean inter-block time as a function
of the number of leaf blocks c.
35. 35
Collaborations and financial support
Current collaborations
• Local : R. Ludinard (IMT Atlantique), B. Sericola and Y.
Mocquard (Dionysos), F. Tronel (Cidre).
• National : A. Durand (IRT SystemX), M. Potop-Butucaru
(LIP6), A. Del Pozzo and S. Tucci (CEA)
• International : P. Tzigas (Chalmers Univ), L. Querzoni (La
Sapienza Univ),
Financial support
• PEPS INS2I Securite 2016 and 2017 : BIPs
• Labex Cominlabs 2019 : Blockchain FM
36. 36
Collaborations and financial support
We are looking for students, engineers, researchers to join us in this
adventure to build a nice and secure infrastructure
Thanks for your attention