Thirty Years of Digital Currency: From DigiCash to the Blockchain
Matthew Green Johns Hopkins University
Thirty Years of Digital Currency: From DigiCash to the Blockchain - - PowerPoint PPT Presentation
Thirty Years of Digital Currency: From DigiCash to the Blockchain Matthew Green Johns Hopkins University My background Prof. at Johns Hopkins University Mainly work in applied cryptography (TLS, messaging systems,
Matthew Green Johns Hopkins University
(TLS, messaging systems, privacy-preserving protocols)
and boy was that weird
a massive influence on our field
really exciting new cryptography
being investigated today
(both in currency and outside of currency)
(networked) party that must be trusted
sees every transaction you make
and user privacy
Payer Bank Merchant
Redeem/ verify not previously spent (Blind) signature
Payer Bank Merchant
Redeem/ verify not previously spent (Blind) signature
SN = PRF(K, i)
For I = 1 to N
Π NIZK
improvements
currencies (e-Gold and Liberty Reserve)
vulnerable interface with the banking system
have to work around those (manufactured) technical problems
all of the problems of identity verification
“undesirable” features (privacy)
support the case of person->person transfers
anyway.
“undesirable” features (privacy)
support the case of person->person transfers
anyway.
undesirable features (privacy)
support the case of person->person transfers
anyway.
undesirable features (privacy)
support the case of person->person transfers
anyway.
[Credit to Dai, (B-Cash) Back (HashCash) etc.]
excellent engineering
systems (mostly ignored)
[B]lockchain-style consensus indeed achieves certain robustness properties in the presence of sporadic participation and node churn that none of the classical style protocols can attain.
management significantly simplifies the currency problem
significantly simplifies the currency problem
significantly simplifies the currency problem
This is simultaneously trivial and the most unexpected lesson of the entire cryptocurrency experiment: People will assign significant value to meaningless electronic tokens — if you convince them that the tokens are secure and have a predictable supply.
Source: MPJLMVS13
consuming some previous state and producing a state update
and stored data
Open Update Update 1 0.9 0.1 0.8 0.2 … Close result on blockchain …
from cost, it falls to even limited collusion
called a “hash lock” that is common between all peers
H H H H
withdraw coins and spend them back.
“bank”
different participants) have to be tied together in some recognizable way
without losing (value, payer ID) privacy
Proof of Stake”
by their stake — and then sample one to construct the next block
Testnet
[KRDO17] proposed an interactive VSS scheme! [DGKR18] uses a grinding-resistant hash function (based on CDH)
to secure ledgers (blockchains)
internal secrets — but no ability to keep state
hardware, or “virtually” from cryptographic obfuscation and/or MPC
multi-step interactive computation
computing devices, each provisioned with secrets
where the node performing the computation can be replaced between steps
“AWS Lambda”
Secure computing device
Input1 Out1 ,
S1 ← Encrypt(K, state1) S1
Secure computing device
Input1 Out1 , Input 2, Out2,
S1 S2 S2 ← Encrypt(K, state2) state2 ← Decrypt(K, S1) S1
Secure computing device
Input 3, S1
Secure computing device
Input 3, Out3 ,
S1 S3
Secure computing device
Input 3, Out3 ,
S1 S3
Input 4, And so on…
S1
Secure computing device Publicly-verifiable ledger
Imagine we have a “publicly verifiable” blockchain: 1. We can post a string S 2. Obtain a copy of the full Ledger, plus a proof that the ledger is valid (This covers most private blockchains, many public blockchains if we make an economic assumption)
Secure computing device Publicly-verifiable ledger
Secure computing device Publicly-verifiable ledger
Out1 ,
S1
Thanks @ben_h
Thanks @ben_h
Thanks @ben_h