SlideShare une entreprise Scribd logo
1
Can we safely adapt the construction of
permissionless blockchain to user demand?
Emmanuelle Anceaume (CNRS)
Joint work with
Antoine Durand (IRT SystemX), Romaric Ludinard
(IMT-Atlantique), Bruno Sericola (INRIA)
Journées Futur & Ruptures - January, 31st of January 2019
2
Bitcoin is a cryptocurrency and payment system
• Fully decentralized
• No public key infrastructure
• Permissionless
 Such constraints make the general problem of consensus
impossible to solve
• Relies on rational behavior and incentives mechanisms
 To reach a consensus on the cryptocurrency state
3
Deconstructing Bitcoin
Transactions
Nakamoto consensus algorithm
Communication network
4
The state of the cryptocurrency system is represented by transactions
• Transfers currency from one user to another
• Does not contain any encrypted information nor confidential
information
Transaction 20ab3701i
Transaction 74201ab3c
UTXO
UTXO = Unspent Transaction Output
Output #2
account + ฿ + script
Output #1
account + ฿ + script
Output #1
account + ฿ + script
Output #1
account + ฿ + script
Input #1
Output ref. + script
Transaction 1206ac34e
Output #2
account + ฿ + script
Output #3
account + ฿ + script
Output #1
account + ฿ + script
Input #1
Output ref. + script
Input #2
Output ref. + script
Input #1
Output ref. + script
Input #2
Output ref. + script
Do not forget Tx fees, i.e., ฿ input  ฿ output
UTXO
5
Checking the ownership of an account
• How can anyone check that I am the legitimate owner of an
account since there are no identities in a transaction ?
• Using « public keys as identities » principle 1
• Ownership = knowing a private key that redeems an output
Account / address / UTXO = « single use » object
• debited once
• should be credited once
1. D. Chaum, « Untraceable Electronic Mail, Return Addresses, and Digital
Pseudonums », Communications of the ACM 24(2), pp :84–90,1981
6
 Signed transactions guarantee that only the owner of an
output can spend bitcoins
 However signatures do not prevent double-spending attacks
• I.e., the fact that Alice spends an output twice
A publicly, immutable, and totally ordered sequence of transactions
7
2. Nakamoto Consensus protocol : Adversary model 2
The Computational Threshold Adversary (CTA) model
• The adversary controls a minority of the total amount of
computational power
• The CTA model is also called the permissionless model
• There is no membership protocol
• Incorporates some degree of synchrony
The Stake Threshold Adversary (STA) model
• The adversary controls a minority stake in some limited
resource, i.e., the crypto-currency
• May allow to punish malicious parties via some stake deposit
2. Ittai Abraham and Dahlia Malkhi, « The blockchain consensus layer and
BFT », The distributed Computing Column, 2017
8
2. Nakamoto Consensus protocol
Two ingredients : Leader Election Oracle + Heavier Fork Strategy
1 A leader election oracle by relying on the PoW mechanism
• Each party is elected independently
• The probability of electing each party is proportional to its
relative computational power
• Each party commits to a single block
→ Synchronize the creation of blocks
→ Prevent Sybil attacks
→ Incentivize correct behavior through currency creation
9
2. Nakamoto Consensus protocol
Two ingredients : Leader Election Oracle + Heavier Fork Strategy
2 The simple and local Heavier Fork Strategy
• Select the chain which required the greatest among of work
• Random nature of the PoW + Non-faulty leaders always use
the chain which required the greatest among of work
→ One chain will be extended more than the others
→ The blockchain
B0 Bi
Bi+1
Bi+1
10
2. Nakamoto Consensus protocol
The goal of the Consensus Nakamoto protocol is to implement a
blockchain replication protocol 3
• (Uniqueness) There is a unique chain of blocks (i.e., the
blockchain) extracted from the tree
• (Liveness) The blockchain is constantly growing
• (Safety) The deeper a block is buried in the blockchain the
harder it is to abort it
• (Fairness) The proportion of blocks of non-faulty parties in the
blockchain is proportional to their computation power
3. J. Garay and A. Kiayias, The Bitcoin Backbone Protocol : Analysis and
Application, Eurocrypt 2015
11
3. Peer-to-Peer Network
• Topology formed through a randomized process
• No coordinating entity
• Broadcast is based on flooding/gossiping neighbors’ link
Tx d	-	e
Tx a	-	B
Tx a	-	B Tx a	-	B
Tx a	-	B
Tx a	-	B
Tx a	-	B
Tx a	-	B
Tx a	-	B
Tx a	-	B
Tx a	-	B
Tx d	-	e
Tx d	-	e
Tx d	-	e
Tx d	-	e
Tx d	-	e
Tx a	-	B
Tx d	-	e
Tx d	-	e
Tx a	-	B
Tx a	-	B
Tx d	-	e
12
Required properties
1. Connectivity
• Each node should receive any broadcast information
2. Low latency 4
msg. transmission time
block time interval
1
 Allows to keep the probability of fork small (i.e. 10−3)
 PoW mechanism allows this ratio to continuously hold
 Safety requires to wait one hour (i.e., no instant finality)
 No more than 7 trans/s can be permanently confirmed in
average ! !
4. J. Garay and A. Kiayias, The Bitcoin Backbone Protocol : Analysis and
Application, Eurocrypt 2015
13
Electing a leader in a permissionless setting
• Proof-of-work
 Works in practice and this is true since 2009
 Security analysis
 Environmental issues
 Diminishing returns
 Distinction between miners and crypto-currency holders (i.e.,
miners control what is inside blocks)
• Proof-of-work with useful computation, proof-of-space,
proof-of-storage, . . .
 Physical resources
• Proof-of-stake
 Abstract but limited resource : coin itself
 All the required information is already in the blockchain
 Numerous attacks
14
Proof-of-stake approaches
Proof-of-stake motto : « The probability for party p of winning the
leader election is proportional to the fraction of currency p owns »
• Eventual-consensus
• Protocols that apply some form of longest-chain rule to the
blockchain
• Immutability of a block increases gradually
• e.g. PPcoin, NXT, Ouroboros, . . .
• Blockwise-BA
• Immutability of a block is achieved by BA before working on
the next one
• e.g. Algorand
15
Proof-of-stake approaches
PoS approaches are subject to attacks 5 essentially because it costs
nothing to create blocks and because of currency transfer from
transacting parties to the parties that maintain the ledger
• Checkpointing mechanisms
• Provide newcomers with a relatively recent block (trust issue)
• Prevent to adopt a new chain that originates to much in the
past (knowledge of the honest chain)
• Key-evolving cryptography : secret keys are evolving so that
past signatures cannot be forged (does not apply to UTXO
based model)
• Enforce strict chain density statistics (knowledge of the
number of parties at any time)
• Add context in each transaction (knowledge of the honest
chain)
5. P. Gazi, A. Kiayias, A. Russel, « Stake-Bleeding Attacks on Proof-of-Stake
Blockchains », IOHK
16
Preventing conflicts as soon as possible
1. Valid blocks should never be confronted with any other
conflicting blocks
→ No fork !
→ 0-confirmation delay
2. Valid transactions should never be confronted with any other
conflicting transactions
→ No double spending attacks !
→ Fast payments feasible
17
Preventing conflicts as soon as possible 6
1. Valid blocks should never be confronted with any other
conflicting blocks
How ? Agreement on the unique block that can reference an earlier
block in the blockchain
2. Valid transactions should never be confronted with any other
conflicting transactions
How ? Agreement on the unique transaction that can redeem unspent
transaction outputs (UTXOs)
6. Joint work with Antoine Durand (IRT SystemX), Romaric Ludinard (IMT),
Bruno Sericola (Inria)
E. Anceaume, A. Guellier, R. Ludinard, UTXO as a proof of membership for
Byzantine Agreements, IEEE Blockchain 2018.
18
Model
• Permissionless system
• Partially synchronous environment
• Adversary : no more than 1/3 of the total amount of money is
held by the adversary
• Nodes have access to safe cryptographic functions (hash
function and signature scheme)
• Each object of the system (i.e., UTXO, transaction and block)
is assumed to be uniquely identified
• No public key infrastructure to establish node identities
19
Properties
Most of the permissionless blockchain-based cryptosystems
guarantee that :
Property (Safety)
If a valid transaction T is deeply confirmed at some
non-compromised node then no transaction conflicting with T will
ever be deeply confirmed by any non-compromised nodes
Property (Liveness)
Any conflict-free and valid transaction will eventually be deeply
confirmed in the blockchain of all non-compromised nodes at the
same height in the blockchain
20
Properties
We aim at strengthening both properties
Property (Strong safety)
If a valid transaction T is confirmed at some non-compromised
node then no transaction conflicting with T will ever be confirmed
by any non-compromised nodes
Property (Strong liveness)
Any valid transaction will eventually be confirmed in the blockchain
of all non-compromised nodes at the same height in the blockchain
21
Transaction validation protocol
At most one transaction is allowed to use
all the UTXOs referenced in its input set
TRANSACTION	
WITH	BOB
VALID	??
YES	!
ALICE
22
Transaction validation protocol
At most one transaction is allowed to re-
deem all the UTXOs referenced in its input set
23
Transaction validation protocol
At most one transaction is allowed to re-
deem all the UTXOs referenced in its input set
TRANSACTION	
WITH	BOB
VALID	??
YES	!
ALICE	
TRANSACTION
WITH	EVE
VALID	??
NO!
24
Block validation protocol
Any validated block has at most one
valid block as immediate successor
VALID	??
YES	!
Pred=0001001
Block	0000111
25
Block validation protocol
Any validated block has at most one
valid block as immediate successor
VALID	??
YES	!
Pred=0001001
Block	0000111
Pred=0001001
Block	0000001
NO	!
VALID	??
26
A set of ingredients
1. Byzantine Agreement (BA)
• Primitive enabling a set of committee members to agree on a
single value, each member holding a possibly different initial
value.
• Tolerate the presence of a minority of malicious members
27
2. « Public keys as identities » principle
• Users, i.e. owners of accounts (owners of UTXOs), participate
to BA 7
• Alternative to existing designs
• Rely on the unique association UTXO/identity as a proof of
membership for BA
7. E. Anceaume, A. Guellier, R. Ludinard, UTXO as a proof of membership
for Byzantine Agreements, IEEE Blockchain 2018.
28
3. Clustered-based Distributed Hash Table (DHT)
• P2P overlay whose topology approximates a structured graph
• For resiliency reasons, each vertex of the graph is a set of
nodes
• Nodes logically close to each other belong to the same cluster
• e.g., PeerCube is a clustered-based overlay 8
resilient to
adversarial behavior and robust to high churn
8. E. Anceaume, R. Ludinard and B. Sericola. Performance evaluation of large-scale
dynamic systems. ACM Sigmetrics Performance Evaluation Review, 39(4), 2012.
29
3. Clustered-based Distributed Hash Table (DHT) (cont’d)
By reaching an agreement around the objects to be validated
• Resistance to Eclipse attacks
• IDs are random, ephemeral and verifiable
• Resistance to Sybil attacks
• Participation to committees is weighted by UTXOs amount
• Resistance to Selfish attacks
• Miners cannot create a block without disclosing it
• No double-spending
• No forks
30
Sycomore : from a chain of blocks to a DAG of blocks 9
9. E. Anceaume, A. Guellier, R. Ludinard, B. Sericola, Sycomore : a
Permissionless Distributed Ledger that self-adapts to Transactions Demand,
IEEE NCA, 2018
31
Sycomore : from a chain of blocks to a DAG of blocks
• Transactions are partitioned over the blocks of the ledger -
verifiable by anyone
32
Sycomore : from a chain of blocks to a DAG of blocks
• The number of blocks and their creation rate self-adapt to
transactions demand - verifiable by anyone
33
Sycomore : from a chain of blocks to a DAG of blocks
• The predecessor of a block is not predictable - verifiable by
anyone
34
0
100
200
300
400
500
600
1 5 10 15 20 25 30 35
Meaninter-blocktime(s)
c
1/(cλ0)
• With c = 30 leaf blocks,
a block is mined every
20s (7, 000 Tx/s) with a
proba of fork of 10−6
• Bitcoin : a block every 10
mns (7 Tx/s) with a
proba of fork of 10−3
• Could even go faster by
relying on our structured
DHT
Mean inter-block time as a function
of the number of leaf blocks c.
35
Collaborations and financial support
Current collaborations
• Local : R. Ludinard (IMT Atlantique), B. Sericola and Y.
Mocquard (Dionysos), F. Tronel (Cidre).
• National : A. Durand (IRT SystemX), M. Potop-Butucaru
(LIP6), A. Del Pozzo and S. Tucci (CEA)
• International : P. Tzigas (Chalmers Univ), L. Querzoni (La
Sapienza Univ),
Financial support
• PEPS INS2I Securite 2016 and 2017 : BIPs
• Labex Cominlabs 2019 : Blockchain FM
36
Collaborations and financial support
We are looking for students, engineers, researchers to join us in this
adventure to build a nice and secure infrastructure
Thanks for your attention

Contenu connexe

Tendances

Intro to Blockchain Slides
Intro to Blockchain SlidesIntro to Blockchain Slides
Intro to Blockchain Slides
Shannon Wells
 
Consensus Algorithms - Nakov at CryptoBlockCon - Las Vegas (2018)
Consensus Algorithms - Nakov at CryptoBlockCon - Las Vegas (2018)Consensus Algorithms - Nakov at CryptoBlockCon - Las Vegas (2018)
Consensus Algorithms - Nakov at CryptoBlockCon - Las Vegas (2018)
Svetlin Nakov
 
Overview of Blockchain Consensus Mechanisms
Overview of Blockchain Consensus MechanismsOverview of Blockchain Consensus Mechanisms
Overview of Blockchain Consensus Mechanisms
Johannes Ahlmann
 
Blockchain Corporate Style
Blockchain Corporate StyleBlockchain Corporate Style
Blockchain Corporate Style
Narendranath Reddy
 
Blockchain consensus algorithms
Blockchain consensus algorithmsBlockchain consensus algorithms
Blockchain consensus algorithms
Anurag Dashputre
 
Proof-of-Stake & Its Improvements (San Francisco Bitcoin Devs Hackathon)
Proof-of-Stake & Its Improvements (San Francisco Bitcoin Devs Hackathon)Proof-of-Stake & Its Improvements (San Francisco Bitcoin Devs Hackathon)
Proof-of-Stake & Its Improvements (San Francisco Bitcoin Devs Hackathon)
Alex Chepurnoy
 
Vilnius blockchain club 20170413 consensus
Vilnius blockchain club 20170413 consensusVilnius blockchain club 20170413 consensus
Vilnius blockchain club 20170413 consensus
Audrius Ramoska
 
The Lightning Network - A gentle introduction
The Lightning Network - A gentle introductionThe Lightning Network - A gentle introduction
The Lightning Network - A gentle introduction
Roland Stadler
 
Consensus Algorithms - Nakov @ jProfessionals - Jan 2018
Consensus Algorithms - Nakov @ jProfessionals - Jan 2018Consensus Algorithms - Nakov @ jProfessionals - Jan 2018
Consensus Algorithms - Nakov @ jProfessionals - Jan 2018
Svetlin Nakov
 
Bitcoin, Blockchain and the Crypto Contracts - Part 2
Bitcoin, Blockchain and the Crypto Contracts - Part 2Bitcoin, Blockchain and the Crypto Contracts - Part 2
Bitcoin, Blockchain and the Crypto Contracts - Part 2
Prithwis Mukerjee
 
Bitcoin, Blockchain and Crypto Contracts - Part 3
Bitcoin, Blockchain and Crypto Contracts - Part 3Bitcoin, Blockchain and Crypto Contracts - Part 3
Bitcoin, Blockchain and Crypto Contracts - Part 3
Prithwis Mukerjee
 
The Bitcoin Lightning Network
The Bitcoin Lightning NetworkThe Bitcoin Lightning Network
The Bitcoin Lightning Network
Shun Shiku
 
How to Create AltCoin(Alternative Cryptocurrency)?
How to Create AltCoin(Alternative Cryptocurrency)?How to Create AltCoin(Alternative Cryptocurrency)?
How to Create AltCoin(Alternative Cryptocurrency)?
Abdullah Khan Zehady
 
Best practices to build secure smart contracts
Best practices to build secure smart contractsBest practices to build secure smart contracts
Best practices to build secure smart contracts
Gautam Anand
 
Getting started with quorum -101
Getting started with quorum -101  Getting started with quorum -101
Getting started with quorum -101
Chainstack
 
Connecting The Block Cointelligence Academy by Dr Vince Ming
Connecting The Block   Cointelligence Academy by Dr Vince MingConnecting The Block   Cointelligence Academy by Dr Vince Ming
Connecting The Block Cointelligence Academy by Dr Vince Ming
Cointelligence
 
Bitcoin Lightning Network - Presentation
Bitcoin Lightning Network - Presentation Bitcoin Lightning Network - Presentation
Bitcoin Lightning Network - Presentation
Jim Brysland
 
bitcoin
bitcoinbitcoin
bitcoin
AasimRasheed3
 
Introduction to Ethereum
Introduction to EthereumIntroduction to Ethereum
Introduction to Ethereum
Terek Judi
 
Lightning Network
Lightning  NetworkLightning  Network
Lightning Network
Felix Crisan
 

Tendances (20)

Intro to Blockchain Slides
Intro to Blockchain SlidesIntro to Blockchain Slides
Intro to Blockchain Slides
 
Consensus Algorithms - Nakov at CryptoBlockCon - Las Vegas (2018)
Consensus Algorithms - Nakov at CryptoBlockCon - Las Vegas (2018)Consensus Algorithms - Nakov at CryptoBlockCon - Las Vegas (2018)
Consensus Algorithms - Nakov at CryptoBlockCon - Las Vegas (2018)
 
Overview of Blockchain Consensus Mechanisms
Overview of Blockchain Consensus MechanismsOverview of Blockchain Consensus Mechanisms
Overview of Blockchain Consensus Mechanisms
 
Blockchain Corporate Style
Blockchain Corporate StyleBlockchain Corporate Style
Blockchain Corporate Style
 
Blockchain consensus algorithms
Blockchain consensus algorithmsBlockchain consensus algorithms
Blockchain consensus algorithms
 
Proof-of-Stake & Its Improvements (San Francisco Bitcoin Devs Hackathon)
Proof-of-Stake & Its Improvements (San Francisco Bitcoin Devs Hackathon)Proof-of-Stake & Its Improvements (San Francisco Bitcoin Devs Hackathon)
Proof-of-Stake & Its Improvements (San Francisco Bitcoin Devs Hackathon)
 
Vilnius blockchain club 20170413 consensus
Vilnius blockchain club 20170413 consensusVilnius blockchain club 20170413 consensus
Vilnius blockchain club 20170413 consensus
 
The Lightning Network - A gentle introduction
The Lightning Network - A gentle introductionThe Lightning Network - A gentle introduction
The Lightning Network - A gentle introduction
 
Consensus Algorithms - Nakov @ jProfessionals - Jan 2018
Consensus Algorithms - Nakov @ jProfessionals - Jan 2018Consensus Algorithms - Nakov @ jProfessionals - Jan 2018
Consensus Algorithms - Nakov @ jProfessionals - Jan 2018
 
Bitcoin, Blockchain and the Crypto Contracts - Part 2
Bitcoin, Blockchain and the Crypto Contracts - Part 2Bitcoin, Blockchain and the Crypto Contracts - Part 2
Bitcoin, Blockchain and the Crypto Contracts - Part 2
 
Bitcoin, Blockchain and Crypto Contracts - Part 3
Bitcoin, Blockchain and Crypto Contracts - Part 3Bitcoin, Blockchain and Crypto Contracts - Part 3
Bitcoin, Blockchain and Crypto Contracts - Part 3
 
The Bitcoin Lightning Network
The Bitcoin Lightning NetworkThe Bitcoin Lightning Network
The Bitcoin Lightning Network
 
How to Create AltCoin(Alternative Cryptocurrency)?
How to Create AltCoin(Alternative Cryptocurrency)?How to Create AltCoin(Alternative Cryptocurrency)?
How to Create AltCoin(Alternative Cryptocurrency)?
 
Best practices to build secure smart contracts
Best practices to build secure smart contractsBest practices to build secure smart contracts
Best practices to build secure smart contracts
 
Getting started with quorum -101
Getting started with quorum -101  Getting started with quorum -101
Getting started with quorum -101
 
Connecting The Block Cointelligence Academy by Dr Vince Ming
Connecting The Block   Cointelligence Academy by Dr Vince MingConnecting The Block   Cointelligence Academy by Dr Vince Ming
Connecting The Block Cointelligence Academy by Dr Vince Ming
 
Bitcoin Lightning Network - Presentation
Bitcoin Lightning Network - Presentation Bitcoin Lightning Network - Presentation
Bitcoin Lightning Network - Presentation
 
bitcoin
bitcoinbitcoin
bitcoin
 
Introduction to Ethereum
Introduction to EthereumIntroduction to Ethereum
Introduction to Ethereum
 
Lightning Network
Lightning  NetworkLightning  Network
Lightning Network
 

Similaire à Can we safely adapt the construction of permissionless blockchain to user demand ?

01 what is blockchain
01 what is blockchain01 what is blockchain
01 what is blockchain
BastianBlankenburg
 
Blockchain - Presentacion Betabeers Galicia 10/12/2014
Blockchain - Presentacion Betabeers Galicia 10/12/2014Blockchain - Presentacion Betabeers Galicia 10/12/2014
Blockchain - Presentacion Betabeers Galicia 10/12/2014
WeKCo Coworking
 
blockchain.pptx
blockchain.pptxblockchain.pptx
blockchain.pptx
19MEB302SahilAli
 
Indjic fintech module 6
Indjic fintech module 6Indjic fintech module 6
Indjic fintech module 6
Drago Indjic
 
Understanding Blockchain: Distributed Ledger Technology
Understanding Blockchain: Distributed Ledger TechnologyUnderstanding Blockchain: Distributed Ledger Technology
Understanding Blockchain: Distributed Ledger Technology
Suraj Kumar Jana
 
crypto ppt.ppt
crypto ppt.pptcrypto ppt.ppt
crypto ppt.ppt
SakshiRawat394090
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to Blockchain
subbul
 
BCHGraz - Meetup #8 - Intro & Ethereum
 BCHGraz - Meetup #8 - Intro & Ethereum BCHGraz - Meetup #8 - Intro & Ethereum
BCHGraz - Meetup #8 - Intro & Ethereum
BlockchainHub Graz
 
A Primer on Blockchain and its Potential, with a Focus on the GCC
A Primer on Blockchain and its Potential, with a Focus on the GCCA Primer on Blockchain and its Potential, with a Focus on the GCC
A Primer on Blockchain and its Potential, with a Focus on the GCC
Zeyad T. Al Mudhaf
 
Blockchain, DLT, Tokens and ICO Introduction Course
Blockchain, DLT, Tokens and ICO Introduction CourseBlockchain, DLT, Tokens and ICO Introduction Course
Blockchain, DLT, Tokens and ICO Introduction Course
Jean-Marc Seigneur
 
Ethereum Mining How To
Ethereum Mining How ToEthereum Mining How To
Ethereum Mining How To
Nugroho Gito
 
Blockchain Ecosystem and Cryptocurrency Regulations
Blockchain Ecosystem and Cryptocurrency RegulationsBlockchain Ecosystem and Cryptocurrency Regulations
Blockchain Ecosystem and Cryptocurrency Regulations
Amir Rafati
 
Blockchain, bitcoin, ethereum and ICOs
Blockchain, bitcoin, ethereum and ICOsBlockchain, bitcoin, ethereum and ICOs
Blockchain, bitcoin, ethereum and ICOs
Bogdan Fiedur
 
Understanding Blockchain
Understanding BlockchainUnderstanding Blockchain
Understanding Blockchain
Tony Willenberg
 
Bitcoin, Banking and the Blockchain
Bitcoin, Banking and the BlockchainBitcoin, Banking and the Blockchain
Bitcoin, Banking and the Blockchain
seancarmody
 
Blockchain and Cryptocurrency for Dummies
Blockchain and Cryptocurrency for DummiesBlockchain and Cryptocurrency for Dummies
Blockchain and Cryptocurrency for Dummies
Narudom Roongsiriwong, CISSP
 
Blockchain in the Heart of Digital Transformation
Blockchain in the Heart of Digital TransformationBlockchain in the Heart of Digital Transformation
Blockchain in the Heart of Digital Transformation
Dr. Mohamed Torky
 
Blockchains 101
Blockchains 101Blockchains 101
Blockchains 101
Nikhil Krishna Nair
 
Blockchain and Cryptocurrencies
Blockchain and CryptocurrenciesBlockchain and Cryptocurrencies
Blockchain and Cryptocurrencies
nimeshQ
 
blockchain bootcamp @WCNJ
blockchain bootcamp @WCNJblockchain bootcamp @WCNJ
blockchain bootcamp @WCNJ
Ash Yadav
 

Similaire à Can we safely adapt the construction of permissionless blockchain to user demand ? (20)

01 what is blockchain
01 what is blockchain01 what is blockchain
01 what is blockchain
 
Blockchain - Presentacion Betabeers Galicia 10/12/2014
Blockchain - Presentacion Betabeers Galicia 10/12/2014Blockchain - Presentacion Betabeers Galicia 10/12/2014
Blockchain - Presentacion Betabeers Galicia 10/12/2014
 
blockchain.pptx
blockchain.pptxblockchain.pptx
blockchain.pptx
 
Indjic fintech module 6
Indjic fintech module 6Indjic fintech module 6
Indjic fintech module 6
 
Understanding Blockchain: Distributed Ledger Technology
Understanding Blockchain: Distributed Ledger TechnologyUnderstanding Blockchain: Distributed Ledger Technology
Understanding Blockchain: Distributed Ledger Technology
 
crypto ppt.ppt
crypto ppt.pptcrypto ppt.ppt
crypto ppt.ppt
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to Blockchain
 
BCHGraz - Meetup #8 - Intro & Ethereum
 BCHGraz - Meetup #8 - Intro & Ethereum BCHGraz - Meetup #8 - Intro & Ethereum
BCHGraz - Meetup #8 - Intro & Ethereum
 
A Primer on Blockchain and its Potential, with a Focus on the GCC
A Primer on Blockchain and its Potential, with a Focus on the GCCA Primer on Blockchain and its Potential, with a Focus on the GCC
A Primer on Blockchain and its Potential, with a Focus on the GCC
 
Blockchain, DLT, Tokens and ICO Introduction Course
Blockchain, DLT, Tokens and ICO Introduction CourseBlockchain, DLT, Tokens and ICO Introduction Course
Blockchain, DLT, Tokens and ICO Introduction Course
 
Ethereum Mining How To
Ethereum Mining How ToEthereum Mining How To
Ethereum Mining How To
 
Blockchain Ecosystem and Cryptocurrency Regulations
Blockchain Ecosystem and Cryptocurrency RegulationsBlockchain Ecosystem and Cryptocurrency Regulations
Blockchain Ecosystem and Cryptocurrency Regulations
 
Blockchain, bitcoin, ethereum and ICOs
Blockchain, bitcoin, ethereum and ICOsBlockchain, bitcoin, ethereum and ICOs
Blockchain, bitcoin, ethereum and ICOs
 
Understanding Blockchain
Understanding BlockchainUnderstanding Blockchain
Understanding Blockchain
 
Bitcoin, Banking and the Blockchain
Bitcoin, Banking and the BlockchainBitcoin, Banking and the Blockchain
Bitcoin, Banking and the Blockchain
 
Blockchain and Cryptocurrency for Dummies
Blockchain and Cryptocurrency for DummiesBlockchain and Cryptocurrency for Dummies
Blockchain and Cryptocurrency for Dummies
 
Blockchain in the Heart of Digital Transformation
Blockchain in the Heart of Digital TransformationBlockchain in the Heart of Digital Transformation
Blockchain in the Heart of Digital Transformation
 
Blockchains 101
Blockchains 101Blockchains 101
Blockchains 101
 
Blockchain and Cryptocurrencies
Blockchain and CryptocurrenciesBlockchain and Cryptocurrencies
Blockchain and Cryptocurrencies
 
blockchain bootcamp @WCNJ
blockchain bootcamp @WCNJblockchain bootcamp @WCNJ
blockchain bootcamp @WCNJ
 

Plus de I MT

Colloque Healthcare 4.0 : "Soufflez, c’est dépisté"
Colloque Healthcare 4.0 : "Soufflez, c’est dépisté" Colloque Healthcare 4.0 : "Soufflez, c’est dépisté"
Colloque Healthcare 4.0 : "Soufflez, c’est dépisté"
I MT
 
Colloque Healthcare 4.0 : "Accompagnement des troubles du sommeil : la recher...
Colloque Healthcare 4.0 : "Accompagnement des troubles du sommeil : la recher...Colloque Healthcare 4.0 : "Accompagnement des troubles du sommeil : la recher...
Colloque Healthcare 4.0 : "Accompagnement des troubles du sommeil : la recher...
I MT
 
Colloque Healthcare 4.0 : "HospiT'Win"
Colloque Healthcare 4.0 : "HospiT'Win"Colloque Healthcare 4.0 : "HospiT'Win"
Colloque Healthcare 4.0 : "HospiT'Win"
I MT
 
Colloque Healthcare 4.0 : « Vous ne devriez pas autant être sur les écrans ! »
Colloque Healthcare 4.0 : « Vous ne devriez pas autant être sur les écrans ! » Colloque Healthcare 4.0 : « Vous ne devriez pas autant être sur les écrans ! »
Colloque Healthcare 4.0 : « Vous ne devriez pas autant être sur les écrans ! »
I MT
 
Colloque Healthcare 4.0 : "NeuroLife : Interfaces Cerveau Machine pour la San...
Colloque Healthcare 4.0 : "NeuroLife : Interfaces Cerveau Machine pour la San...Colloque Healthcare 4.0 : "NeuroLife : Interfaces Cerveau Machine pour la San...
Colloque Healthcare 4.0 : "NeuroLife : Interfaces Cerveau Machine pour la San...
I MT
 
Colloque Healthcare 4.0 : "La protection de données en santé"
Colloque Healthcare 4.0 : "La protection de données en santé"Colloque Healthcare 4.0 : "La protection de données en santé"
Colloque Healthcare 4.0 : "La protection de données en santé"
I MT
 
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « EIT Health : un tremplin europ...
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « EIT Health : un tremplin europ...Colloque IMT - 15/10/2019 - Healthcare 4.0 – « EIT Health : un tremplin europ...
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « EIT Health : un tremplin europ...
I MT
 
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Modélisation semi-analytique ...
Colloque IMT - 15/10/2019 - Healthcare 4.0 –  « Modélisation semi-analytique ...Colloque IMT - 15/10/2019 - Healthcare 4.0 –  « Modélisation semi-analytique ...
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Modélisation semi-analytique ...
I MT
 
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Développement de la caméra XE...
Colloque IMT - 15/10/2019 - Healthcare 4.0 –  « Développement de la caméra XE...Colloque IMT - 15/10/2019 - Healthcare 4.0 –  « Développement de la caméra XE...
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Développement de la caméra XE...
I MT
 
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Le suivi géographique des per...
Colloque IMT - 15/10/2019 - Healthcare 4.0 –  « Le suivi géographique des per...Colloque IMT - 15/10/2019 - Healthcare 4.0 –  « Le suivi géographique des per...
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Le suivi géographique des per...
I MT
 
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Pilotage intelligent du servic...
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Pilotage intelligent du servic...Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Pilotage intelligent du servic...
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Pilotage intelligent du servic...
I MT
 
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Quantification of idiopathic i...
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Quantification of idiopathic i...Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Quantification of idiopathic i...
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Quantification of idiopathic i...
I MT
 
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - "Machine...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - "Machine...Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - "Machine...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - "Machine...
I MT
 
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Contrôle...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Contrôle...Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Contrôle...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Contrôle...
I MT
 
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Interopé...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Interopé...Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Interopé...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Interopé...
I MT
 
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Machine ...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Machine ...Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Machine ...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Machine ...
I MT
 
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - TeraLab,...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - TeraLab,...Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - TeraLab,...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - TeraLab,...
I MT
 
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Session ...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Session ...Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Session ...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Session ...
I MT
 
Colloque IMT - L'IA au cœur des mutations industrielles - Session Robotique, ...
Colloque IMT - L'IA au cœur des mutations industrielles - Session Robotique, ...Colloque IMT - L'IA au cœur des mutations industrielles - Session Robotique, ...
Colloque IMT - L'IA au cœur des mutations industrielles - Session Robotique, ...
I MT
 
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Focus CE...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Focus CE...Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Focus CE...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Focus CE...
I MT
 

Plus de I MT (20)

Colloque Healthcare 4.0 : "Soufflez, c’est dépisté"
Colloque Healthcare 4.0 : "Soufflez, c’est dépisté" Colloque Healthcare 4.0 : "Soufflez, c’est dépisté"
Colloque Healthcare 4.0 : "Soufflez, c’est dépisté"
 
Colloque Healthcare 4.0 : "Accompagnement des troubles du sommeil : la recher...
Colloque Healthcare 4.0 : "Accompagnement des troubles du sommeil : la recher...Colloque Healthcare 4.0 : "Accompagnement des troubles du sommeil : la recher...
Colloque Healthcare 4.0 : "Accompagnement des troubles du sommeil : la recher...
 
Colloque Healthcare 4.0 : "HospiT'Win"
Colloque Healthcare 4.0 : "HospiT'Win"Colloque Healthcare 4.0 : "HospiT'Win"
Colloque Healthcare 4.0 : "HospiT'Win"
 
Colloque Healthcare 4.0 : « Vous ne devriez pas autant être sur les écrans ! »
Colloque Healthcare 4.0 : « Vous ne devriez pas autant être sur les écrans ! » Colloque Healthcare 4.0 : « Vous ne devriez pas autant être sur les écrans ! »
Colloque Healthcare 4.0 : « Vous ne devriez pas autant être sur les écrans ! »
 
Colloque Healthcare 4.0 : "NeuroLife : Interfaces Cerveau Machine pour la San...
Colloque Healthcare 4.0 : "NeuroLife : Interfaces Cerveau Machine pour la San...Colloque Healthcare 4.0 : "NeuroLife : Interfaces Cerveau Machine pour la San...
Colloque Healthcare 4.0 : "NeuroLife : Interfaces Cerveau Machine pour la San...
 
Colloque Healthcare 4.0 : "La protection de données en santé"
Colloque Healthcare 4.0 : "La protection de données en santé"Colloque Healthcare 4.0 : "La protection de données en santé"
Colloque Healthcare 4.0 : "La protection de données en santé"
 
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « EIT Health : un tremplin europ...
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « EIT Health : un tremplin europ...Colloque IMT - 15/10/2019 - Healthcare 4.0 – « EIT Health : un tremplin europ...
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « EIT Health : un tremplin europ...
 
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Modélisation semi-analytique ...
Colloque IMT - 15/10/2019 - Healthcare 4.0 –  « Modélisation semi-analytique ...Colloque IMT - 15/10/2019 - Healthcare 4.0 –  « Modélisation semi-analytique ...
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Modélisation semi-analytique ...
 
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Développement de la caméra XE...
Colloque IMT - 15/10/2019 - Healthcare 4.0 –  « Développement de la caméra XE...Colloque IMT - 15/10/2019 - Healthcare 4.0 –  « Développement de la caméra XE...
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Développement de la caméra XE...
 
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Le suivi géographique des per...
Colloque IMT - 15/10/2019 - Healthcare 4.0 –  « Le suivi géographique des per...Colloque IMT - 15/10/2019 - Healthcare 4.0 –  « Le suivi géographique des per...
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Le suivi géographique des per...
 
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Pilotage intelligent du servic...
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Pilotage intelligent du servic...Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Pilotage intelligent du servic...
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Pilotage intelligent du servic...
 
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Quantification of idiopathic i...
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Quantification of idiopathic i...Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Quantification of idiopathic i...
Colloque IMT - 15/10/2019 - Healthcare 4.0 – « Quantification of idiopathic i...
 
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - "Machine...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - "Machine...Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - "Machine...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - "Machine...
 
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Contrôle...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Contrôle...Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Contrôle...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Contrôle...
 
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Interopé...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Interopé...Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Interopé...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Interopé...
 
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Machine ...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Machine ...Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Machine ...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Machine ...
 
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - TeraLab,...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - TeraLab,...Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - TeraLab,...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - TeraLab,...
 
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Session ...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Session ...Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Session ...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Session ...
 
Colloque IMT - L'IA au cœur des mutations industrielles - Session Robotique, ...
Colloque IMT - L'IA au cœur des mutations industrielles - Session Robotique, ...Colloque IMT - L'IA au cœur des mutations industrielles - Session Robotique, ...
Colloque IMT - L'IA au cœur des mutations industrielles - Session Robotique, ...
 
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Focus CE...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Focus CE...Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Focus CE...
Colloque IMT -04/04/2019- L'IA au cœur des mutations industrielles - Focus CE...
 

Dernier

Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
Divyanshu
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
Introduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptxIntroduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptx
MiscAnnoy1
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
abbyasa1014
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
LAXMAREDDY22
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
gowrishankartb2005
 
Hematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood CountHematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood Count
shahdabdulbaset
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
Mahmoud Morsy
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
Software Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.pptSoftware Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.ppt
TaghreedAltamimi
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 

Dernier (20)

Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
Introduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptxIntroduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptx
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
 
Hematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood CountHematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood Count
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
Software Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.pptSoftware Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.ppt
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 

Can we safely adapt the construction of permissionless blockchain to user demand ?

  • 1. 1 Can we safely adapt the construction of permissionless blockchain to user demand? Emmanuelle Anceaume (CNRS) Joint work with Antoine Durand (IRT SystemX), Romaric Ludinard (IMT-Atlantique), Bruno Sericola (INRIA) Journées Futur & Ruptures - January, 31st of January 2019
  • 2. 2 Bitcoin is a cryptocurrency and payment system • Fully decentralized • No public key infrastructure • Permissionless Such constraints make the general problem of consensus impossible to solve • Relies on rational behavior and incentives mechanisms To reach a consensus on the cryptocurrency state
  • 4. 4 The state of the cryptocurrency system is represented by transactions • Transfers currency from one user to another • Does not contain any encrypted information nor confidential information Transaction 20ab3701i Transaction 74201ab3c UTXO UTXO = Unspent Transaction Output Output #2 account + ฿ + script Output #1 account + ฿ + script Output #1 account + ฿ + script Output #1 account + ฿ + script Input #1 Output ref. + script Transaction 1206ac34e Output #2 account + ฿ + script Output #3 account + ฿ + script Output #1 account + ฿ + script Input #1 Output ref. + script Input #2 Output ref. + script Input #1 Output ref. + script Input #2 Output ref. + script Do not forget Tx fees, i.e., ฿ input ฿ output UTXO
  • 5. 5 Checking the ownership of an account • How can anyone check that I am the legitimate owner of an account since there are no identities in a transaction ? • Using « public keys as identities » principle 1 • Ownership = knowing a private key that redeems an output Account / address / UTXO = « single use » object • debited once • should be credited once 1. D. Chaum, « Untraceable Electronic Mail, Return Addresses, and Digital Pseudonums », Communications of the ACM 24(2), pp :84–90,1981
  • 6. 6 Signed transactions guarantee that only the owner of an output can spend bitcoins However signatures do not prevent double-spending attacks • I.e., the fact that Alice spends an output twice A publicly, immutable, and totally ordered sequence of transactions
  • 7. 7 2. Nakamoto Consensus protocol : Adversary model 2 The Computational Threshold Adversary (CTA) model • The adversary controls a minority of the total amount of computational power • The CTA model is also called the permissionless model • There is no membership protocol • Incorporates some degree of synchrony The Stake Threshold Adversary (STA) model • The adversary controls a minority stake in some limited resource, i.e., the crypto-currency • May allow to punish malicious parties via some stake deposit 2. Ittai Abraham and Dahlia Malkhi, « The blockchain consensus layer and BFT », The distributed Computing Column, 2017
  • 8. 8 2. Nakamoto Consensus protocol Two ingredients : Leader Election Oracle + Heavier Fork Strategy 1 A leader election oracle by relying on the PoW mechanism • Each party is elected independently • The probability of electing each party is proportional to its relative computational power • Each party commits to a single block → Synchronize the creation of blocks → Prevent Sybil attacks → Incentivize correct behavior through currency creation
  • 9. 9 2. Nakamoto Consensus protocol Two ingredients : Leader Election Oracle + Heavier Fork Strategy 2 The simple and local Heavier Fork Strategy • Select the chain which required the greatest among of work • Random nature of the PoW + Non-faulty leaders always use the chain which required the greatest among of work → One chain will be extended more than the others → The blockchain B0 Bi Bi+1 Bi+1
  • 10. 10 2. Nakamoto Consensus protocol The goal of the Consensus Nakamoto protocol is to implement a blockchain replication protocol 3 • (Uniqueness) There is a unique chain of blocks (i.e., the blockchain) extracted from the tree • (Liveness) The blockchain is constantly growing • (Safety) The deeper a block is buried in the blockchain the harder it is to abort it • (Fairness) The proportion of blocks of non-faulty parties in the blockchain is proportional to their computation power 3. J. Garay and A. Kiayias, The Bitcoin Backbone Protocol : Analysis and Application, Eurocrypt 2015
  • 11. 11 3. Peer-to-Peer Network • Topology formed through a randomized process • No coordinating entity • Broadcast is based on flooding/gossiping neighbors’ link Tx d - e Tx a - B Tx a - B Tx a - B Tx a - B Tx a - B Tx a - B Tx a - B Tx a - B Tx a - B Tx a - B Tx d - e Tx d - e Tx d - e Tx d - e Tx d - e Tx a - B Tx d - e Tx d - e Tx a - B Tx a - B Tx d - e
  • 12. 12 Required properties 1. Connectivity • Each node should receive any broadcast information 2. Low latency 4 msg. transmission time block time interval 1 Allows to keep the probability of fork small (i.e. 10−3) PoW mechanism allows this ratio to continuously hold Safety requires to wait one hour (i.e., no instant finality) No more than 7 trans/s can be permanently confirmed in average ! ! 4. J. Garay and A. Kiayias, The Bitcoin Backbone Protocol : Analysis and Application, Eurocrypt 2015
  • 13. 13 Electing a leader in a permissionless setting • Proof-of-work Works in practice and this is true since 2009 Security analysis Environmental issues Diminishing returns Distinction between miners and crypto-currency holders (i.e., miners control what is inside blocks) • Proof-of-work with useful computation, proof-of-space, proof-of-storage, . . . Physical resources • Proof-of-stake Abstract but limited resource : coin itself All the required information is already in the blockchain Numerous attacks
  • 14. 14 Proof-of-stake approaches Proof-of-stake motto : « The probability for party p of winning the leader election is proportional to the fraction of currency p owns » • Eventual-consensus • Protocols that apply some form of longest-chain rule to the blockchain • Immutability of a block increases gradually • e.g. PPcoin, NXT, Ouroboros, . . . • Blockwise-BA • Immutability of a block is achieved by BA before working on the next one • e.g. Algorand
  • 15. 15 Proof-of-stake approaches PoS approaches are subject to attacks 5 essentially because it costs nothing to create blocks and because of currency transfer from transacting parties to the parties that maintain the ledger • Checkpointing mechanisms • Provide newcomers with a relatively recent block (trust issue) • Prevent to adopt a new chain that originates to much in the past (knowledge of the honest chain) • Key-evolving cryptography : secret keys are evolving so that past signatures cannot be forged (does not apply to UTXO based model) • Enforce strict chain density statistics (knowledge of the number of parties at any time) • Add context in each transaction (knowledge of the honest chain) 5. P. Gazi, A. Kiayias, A. Russel, « Stake-Bleeding Attacks on Proof-of-Stake Blockchains », IOHK
  • 16. 16 Preventing conflicts as soon as possible 1. Valid blocks should never be confronted with any other conflicting blocks → No fork ! → 0-confirmation delay 2. Valid transactions should never be confronted with any other conflicting transactions → No double spending attacks ! → Fast payments feasible
  • 17. 17 Preventing conflicts as soon as possible 6 1. Valid blocks should never be confronted with any other conflicting blocks How ? Agreement on the unique block that can reference an earlier block in the blockchain 2. Valid transactions should never be confronted with any other conflicting transactions How ? Agreement on the unique transaction that can redeem unspent transaction outputs (UTXOs) 6. Joint work with Antoine Durand (IRT SystemX), Romaric Ludinard (IMT), Bruno Sericola (Inria) E. Anceaume, A. Guellier, R. Ludinard, UTXO as a proof of membership for Byzantine Agreements, IEEE Blockchain 2018.
  • 18. 18 Model • Permissionless system • Partially synchronous environment • Adversary : no more than 1/3 of the total amount of money is held by the adversary • Nodes have access to safe cryptographic functions (hash function and signature scheme) • Each object of the system (i.e., UTXO, transaction and block) is assumed to be uniquely identified • No public key infrastructure to establish node identities
  • 19. 19 Properties Most of the permissionless blockchain-based cryptosystems guarantee that : Property (Safety) If a valid transaction T is deeply confirmed at some non-compromised node then no transaction conflicting with T will ever be deeply confirmed by any non-compromised nodes Property (Liveness) Any conflict-free and valid transaction will eventually be deeply confirmed in the blockchain of all non-compromised nodes at the same height in the blockchain
  • 20. 20 Properties We aim at strengthening both properties Property (Strong safety) If a valid transaction T is confirmed at some non-compromised node then no transaction conflicting with T will ever be confirmed by any non-compromised nodes Property (Strong liveness) Any valid transaction will eventually be confirmed in the blockchain of all non-compromised nodes at the same height in the blockchain
  • 21. 21 Transaction validation protocol At most one transaction is allowed to use all the UTXOs referenced in its input set TRANSACTION WITH BOB VALID ?? YES ! ALICE
  • 22. 22 Transaction validation protocol At most one transaction is allowed to re- deem all the UTXOs referenced in its input set
  • 23. 23 Transaction validation protocol At most one transaction is allowed to re- deem all the UTXOs referenced in its input set TRANSACTION WITH BOB VALID ?? YES ! ALICE TRANSACTION WITH EVE VALID ?? NO!
  • 24. 24 Block validation protocol Any validated block has at most one valid block as immediate successor VALID ?? YES ! Pred=0001001 Block 0000111
  • 25. 25 Block validation protocol Any validated block has at most one valid block as immediate successor VALID ?? YES ! Pred=0001001 Block 0000111 Pred=0001001 Block 0000001 NO ! VALID ??
  • 26. 26 A set of ingredients 1. Byzantine Agreement (BA) • Primitive enabling a set of committee members to agree on a single value, each member holding a possibly different initial value. • Tolerate the presence of a minority of malicious members
  • 27. 27 2. « Public keys as identities » principle • Users, i.e. owners of accounts (owners of UTXOs), participate to BA 7 • Alternative to existing designs • Rely on the unique association UTXO/identity as a proof of membership for BA 7. E. Anceaume, A. Guellier, R. Ludinard, UTXO as a proof of membership for Byzantine Agreements, IEEE Blockchain 2018.
  • 28. 28 3. Clustered-based Distributed Hash Table (DHT) • P2P overlay whose topology approximates a structured graph • For resiliency reasons, each vertex of the graph is a set of nodes • Nodes logically close to each other belong to the same cluster • e.g., PeerCube is a clustered-based overlay 8 resilient to adversarial behavior and robust to high churn 8. E. Anceaume, R. Ludinard and B. Sericola. Performance evaluation of large-scale dynamic systems. ACM Sigmetrics Performance Evaluation Review, 39(4), 2012.
  • 29. 29 3. Clustered-based Distributed Hash Table (DHT) (cont’d) By reaching an agreement around the objects to be validated • Resistance to Eclipse attacks • IDs are random, ephemeral and verifiable • Resistance to Sybil attacks • Participation to committees is weighted by UTXOs amount • Resistance to Selfish attacks • Miners cannot create a block without disclosing it • No double-spending • No forks
  • 30. 30 Sycomore : from a chain of blocks to a DAG of blocks 9 9. E. Anceaume, A. Guellier, R. Ludinard, B. Sericola, Sycomore : a Permissionless Distributed Ledger that self-adapts to Transactions Demand, IEEE NCA, 2018
  • 31. 31 Sycomore : from a chain of blocks to a DAG of blocks • Transactions are partitioned over the blocks of the ledger - verifiable by anyone
  • 32. 32 Sycomore : from a chain of blocks to a DAG of blocks • The number of blocks and their creation rate self-adapt to transactions demand - verifiable by anyone
  • 33. 33 Sycomore : from a chain of blocks to a DAG of blocks • The predecessor of a block is not predictable - verifiable by anyone
  • 34. 34 0 100 200 300 400 500 600 1 5 10 15 20 25 30 35 Meaninter-blocktime(s) c 1/(cλ0) • With c = 30 leaf blocks, a block is mined every 20s (7, 000 Tx/s) with a proba of fork of 10−6 • Bitcoin : a block every 10 mns (7 Tx/s) with a proba of fork of 10−3 • Could even go faster by relying on our structured DHT Mean inter-block time as a function of the number of leaf blocks c.
  • 35. 35 Collaborations and financial support Current collaborations • Local : R. Ludinard (IMT Atlantique), B. Sericola and Y. Mocquard (Dionysos), F. Tronel (Cidre). • National : A. Durand (IRT SystemX), M. Potop-Butucaru (LIP6), A. Del Pozzo and S. Tucci (CEA) • International : P. Tzigas (Chalmers Univ), L. Querzoni (La Sapienza Univ), Financial support • PEPS INS2I Securite 2016 and 2017 : BIPs • Labex Cominlabs 2019 : Blockchain FM
  • 36. 36 Collaborations and financial support We are looking for students, engineers, researchers to join us in this adventure to build a nice and secure infrastructure Thanks for your attention