cryptographic protocols
play

Cryptographic Protocols Bank executes (valid) transactions. What is - PDF document

Repetition: A Virtual Bank (1/4) 2 Alice $7535 Specification Bob $73227 Clara $8317 Bank keeps track of all balances. . . . Users send transactions to bank. transfer(Alice,Clara,$200) Cryptographic Protocols Bank


  1. Repetition: A Virtual Bank (1/4) 2 Alice $7’535 Specification Bob $73’227 Clara $8’317 • Bank keeps track of all balances. . . . • Users send transactions to bank. transfer(Alice,Clara,$200) Cryptographic Protocols • Bank executes (valid) transactions. What is a Valid Transaction Spring 2020 • Debit account belongs to user. Blockchain Part 2 • Amount of transaction is available. • Amount is non-negative. • Target account is valid. Repetition: The Ledger Approach (2/4) Repetition: Constructing the Bank (3/4) 3 4 Our Bank A Ledger 2020/05/14 Eat soup 2020/05/15 Pee • ledger = initial balances, then sequence of all transactions • Anybody can append an entry to the ledger. • transaction = (debit-pk, target-pk, amount, counter, signature) • Anybody can read all entries on the ledger. • validity: a transaction is valid if • Nobody can modify / delete entries on the ledger. – valid signature (w.r.t debit-pk) The Ledger Approach – amount available in debit-account 1. Construct a ledger. – counter > previous valid transactions with same debit-pk 2. Construct a bank using the ledger. Note: Target account (target-pk) is automatically created if not existing Note 1: Privacy needs to be discussed (today). Security Analysis • correctness: ok if signature scheme is secure • privacy: only pseudonymity → But: same customer can have multiple (many) accounts . . . Repetition: Constructing the Ledger (4/4) Permissioned ← → Permissionless 5 6 Parties’ Protocol (round-robin) Permissioned 1. The king broadcasts block with unposted entries. • Users: Anyone can be a user. Users’ Protocol (Post Entry) • Parties: A fixed set of parties. 1. Send the entry to some (presumably honest) parties. Permissionless Users’ Protocol (Fetch Ledger) • Users: Anyone can be a user. 1. Request block(s) from some (presumably honest) parties. • Parties: Anyone can be a party. 2. Majority decision (or decide according trust). Challenges of the Permissionless Setting 3. Check that each block is valid (including hash value). • unclear who participates • the adversary can pretend to be many parties (Sybil attack) → no honest majority Today : How to construct a permissionless ledger.

  2. And Now for Something Completely Different: Spam Spam Spam Spam 7 8 The Problem Use Proof of Work (PoW) • Sending emails is cheap. • Computation cost is energy. • Filtering spam is difficult (false positives). • Sender of email must solve a moderately-hard computation task. • The receiver of spam has increased costs. • Verification of the computation is easy. Cost-based Solution Partial Hash Inversion PoW • Incur a small cost for sending a single email. • Let H be a cryptographic hash function. • Normal user send small amounts of emails → small costs. • Task: Given msg find nonce such that H(msg � nonce) starts with D • Spammer send huge amounts of emails → huge costs. zeroes. • Solving task by guessing nonce (best strategy assuming H is a random Use Micropayments • Sending an email costs, say 1 Rappen. oracle). • D = k requires on average 2 k guesses • This requires some sort of payment solution. • Verification: one hash query • No receiver actually wants to collect the payment. Proof of Work Lottery Permissionless Setting 9 10 Lottery Parties and Users • Lottery tickets can be bought. • Users U 1 , U 2 . . . • Each ticket has a chance to win. • Parties P 1 , P 2 , . . . • Winner gets a prize. • Parties/users can join and leave. • Verification of winner is easy. Communication PoW Lottery • Multicast channel • Cost ticket = one hash evaluation. • Honest messages are received by everyone. • A participant can buy many tickets. • Realised as a peer-to-peer network. • Winner can send email. Idea: Use a proof-of-work lottery for a permissionless ledger. Constructing the Ledger: Block Lottery (1/2) Constructing the Ledger: Block Lottery (2/2) 11 12 Idea Block consists of: • Each party/user holds its copy of the ledger • The hash of the previous block • Lottery winner can publish a new block • Block data (the entries) • The block nonce Lottery • Prepare hash and data → defines what is appended where. • Find nonce such that H(hash � data � nonce) as at least D zeroes. Definition: A block is valid , if it - is correctly formatted (syntax), - contains only valid transactions - contains the hash of the last valid block, and - has a hash value with at least D zeroes.

  3. Constructing the Ledger: Bitcoin Protocol (1/6) Constructing the Ledger: Bitcoin Protocol (2/6) 13 14 Idea Bitcoin Protocol • Lottery winner can publish a new block 1. Users multi-cast their entries, parties collect them. 2. Each party tries to extend their the longest chain by using the lottery. 3. Winner multicasts a block of (new) entries that extends longest chain. 4. Each party/user appends the new block if it is valid. Observations 1. The lottery difficulty D and the total computing power determine the block production rate. 2. We have a blocktree, not a blockchain. 3. No instant confirmation of entries due to branching. Constructing the Ledger: Bitcoin Protocol (3/6) Constructing the Ledger: Bitcoin Protocol (4/6) 15 16 Adversary Setting the Difficulty • Controls a fraction of 1. Low difficulty → fast block production. the computing power 2. High difficulty → less branching. • Active 3. Ideally: The winner knows the block of the previous winner. Example: Reorganisation Attack 4. Bitcoin difficulty target: 1. The adversary publishes transaction to pay for Alice’s cake. production rate of ∼ 1 block per 10 minutes. 2. As soon as the transaction is k blocks deep, Alice will accept it. 5. Measure block production rate to estimate right difficulty. 3. However, in the meantime the adversary created a branch: Confirmation of Entries • which is k+2 blocks long 1. Idea: A block is confirmed if it is k blocks deep on the longest chain. • where the money for Alice is spent otherwise 2. This is probabilistic consensus. 4. The adversary publishes his branch. 3. Rollbacks potentially happen. 5. As it is now the longest chain parties will accept it as the right version. 6. The payment for the cake has never happened. Constructing the Ledger: Bitcoin Protocol (5/6) Constructing the Ledger: Bitcoin Protocol (6/6) 17 18 Observation Problems • The attack requires the adversary to build a chain of k+2 blocks faster • Specialized hardware skews the lottery. than the honest parties build one with k blocks. • Centralisation due to electricity cost. • Computing power ∼ block production rate. • Scaling: More parties = more energy consumption, but not more • ⇒ to prevent this, the majority of computing power must be honest. throughput. • Bitcoin consumes more energy than Switzerland. Informal Security Analysis • Assume fast a network. • Bitcoin is secure if 51% of the computing power is honest. • For confirmation k must be set large enough (Bitcoin: x = 6 ).

  4. Constructing the Ledger: Proof of Stake (1/2) Constructing the Ledger: Proof of Stake (2/2) 19 20 Idea PoS Lottery • Money is a limited resource. • Lottery tickets proportional to stake • Select block producer proportional to their wealth (=stake). • Problem: How to generate randomness for drawing? Approach I: Bitcoin-like Randomness Source • Proof of Stake lottery • Use an MPC protocol (expensive) • Lottery winner proposes block • Use a Verifiable Random Function (VRF): Approach II: Byzantine Fault Tolerance (BFT) – A pseudo random function • Similar to our permissioned ledger protocol – Output can be computed locally – Output can be verified publicly • King replaced by winner of lottery • Broadcast simulated by committee • Committee also selected by lottery Actual Ledger Protocols Constructing the Bank: Minting (1/2) 21 22 Until now: Name Consensus Security • Total balance of all accounts is fixed. • (Honest) parties are altruistic. Bitcoin PoW t < n/ 2 Bitcoin Approach to Minting Ethereum PoW t < n/ 2 • Creator of each block gets a block reward. Cardano PoS t < n/ 2 Bitcoin-like • Block reward comes out of nothing → money printing. Algorand PoS t < n/ 3 BFT • However, total number of coins is limited to 21 million. → Block reward gets smaller over time (until it is zero). Constructing the Bank: Minting (2/2) Constructing the Bank: Transaction Fees 23 24 Minting in General Problem • Get (fresh) money for maintaining the ledger. • Users can spam transactions → system gets overwhelmed. • Supply of money can be capped or unlimited: Solution – Determines the inflation rate. • Publishing a transaction costs a transaction fee. • Fee is deducted from sender’s account. Initial Balances • Proof of Work: Can start with no money at all. • Bitcoin: Transaction fee goes to block creator. • Proof of Stake: Needs initial stake distribution. → Transactions with high fee get priority. – Alternatively, start with PoW and change to PoS later. • Bitcoin: Transaction fee will eventually replace block reward.

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend