announcements
play

Announcements Guest speaker next Monday No office hours on Monday - PowerPoint PPT Presentation

Announcements Guest speaker next Monday No office hours on Monday Extra office hours next Wednsday, noon-1pm Cryptocurrencies & Security on the Blockchain Storage and the Blockchain Prof. Tom Austin San Jos State University


  1. Announcements • Guest speaker next Monday • No office hours on Monday – Extra office hours next Wednsday, noon-1pm

  2. Cryptocurrencies & Security on the Blockchain Storage and the Blockchain Prof. Tom Austin San José State University

  3. Storage and the Blockchain • Storage for consensus • Storage as a byproduct • Dropbox on the blockchain • Off-chain storage

  4. Dimensions of Storage Proving Schemes • Publicly verifiable • Retrievable • Zero-knowledge • Useful • Dynamically updateable

  5. Verifying Storage • What knowledge is needed? • Who can we trust? – Miners? – Storage providers? – Clients?

  6. Review: Merkle Trees H1 = H(H(A),H(B)) MR H2 = H(H(C),H(D)) H2 H1 MR = H(H1,H2) H(A) H(B) H(C) H(D) (Merkle root) B D A C

  7. Using Merkle Trees for Storage • Merkle root of data is known • Challenger requests specific block(s) • Attacker provides Merkle Proof – Pieces needed to reconstruct Merkle root

  8. Merkle Trees for Storage Proofs Merkle proof for MR block B: • Block B H2 H1 • H(A) • H2 H(A) H(B) H(C) H(D) B D A C

  9. Spacemint: Storage for Consensus • Data only useful for consensus • Miners invest disk space (PoSpace) • Motivation – Minimal computation – Egalitarian

  10. Archival Storage

  11. Permacoin: Useful, incidental storage • Storage of archival data • Miller et al. 2014 • Proof-of-work (PoW) and proof-of- retrievability (PoRet) – Solve proof-of-retrievability – Solution feeds into PoW puzzle

  12. Permacoin Process (taken from https://www.youtube.com/watch?v=gIJim7JKW_M ) 1. Setup – archival file is erasure coded 2. Users generate keypairs 3. Miners look for solutions – Requires locally storing data

  13. "Puzzle Solving" Bitcoin puzzle solving: – H(puz||pk||r) < target Permacoin solves 2 puzzles (in sequence): 1. H(puz||pk||r) selects blocks to reveal 2. H(puz||pk||r||dataBlks) < target If data is not stored, 1 st solution found is useless.

  14. Forcing Local Storage • Goal: prevent outsourcing of storage. • Solution: modify previous approach to include a signing step. – Related to non-outsourceable puzzles. • Miner then must choose: – Share data and keys with the 3rd party • Keys could be stolen – Store data remotely, but keys locally – Store data and keys locally

  15. Economics of Permacoin Mining (taken from https://www.youtube.com/watch?v=gIJim7JKW_M )

  16. Dropbox on the Cloud

  17. Filecoin • Incentive layer for IPFS • Storage market – Guarantees data is stored – Very slow, by design • Retrieval market – Caches frequently requested data – Offers CDN functionality – (Details a little murky)

  18. InterPlanetary File System (IPFS) • Content-addressable storage – Hash of data serves as its ID • Peer-to-peer • Used in Catalan independence referendum

  19. Attacks • Outsourcing • Generation • Sybils (or collusion)

  20. Review: Cipher Block Chaining (CBC) • Block – data chunk cipher encrypts – No relation to blockchain blocks • C 0 = E(IV Å P 0 , K) C i = E(C i-1 Å P i , K) ∀ i. i>0 • P 0 = IV Å D(C 0 , K) P i = C i-1 Å D(C i , K) ∀ i. i>0

  21. CBC Encryption P 0 P 1 P 2 XOR XOR XOR IV then then then encrypt encrypt encrypt C 0 C 1 C 2

  22. CBC Decryption C 0 C 1 C 2 Decrypt Decrypt Decrypt IV then then then XOR XOR XOR P 0 P 1 P 2

  23. Can encryption be parallelized? Can decryption be parallelized?

  24. Proof-of-replication • Ensure that miner is storing as many copies of a file as they claim . • Each copy of data must be unique – Ensured by sealing key • Miner must provide data within time limit • Uses modified versions of CBC mode – Slows down encryption

  25. Modified CBC Modes • Shuffling – Data spread across many blocks • Streaming – Each block chained to itself N times • Layering – The last block is chained to the first block M times.

  26. CBC Encryption, Streaming Mode P 0 P 1 P 2 XOR XOR XOR IV then then then encrypt encrypt encrypt C 0 C 1 C 2

  27. CBC Encryption, Layering Mode P 0 P 1 P 2 XOR XOR XOR IV then then then encrypt encrypt encrypt C 0 C 1 C 2

  28. Proof-of-spacetime • Filecoin miners can also prove that they are continually storing their data. • Proof-of-replication determines next round of challenge. • Miners write these proofs to the blockchain to get paid.

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend