voting software
play

"Voting Software" xkcd.com/2030/ Cryptocurrencies & - PowerPoint PPT Presentation

"Voting Software" xkcd.com/2030/ Cryptocurrencies & Security on the Blockchain The Blockchain Prof. Tom Austin San Jos State University Lab Review Byzantine General's Problem (Lamport et al. 1982) Generals decide


  1. "Voting Software" xkcd.com/2030/

  2. Cryptocurrencies & Security on the Blockchain The Blockchain Prof. Tom Austin San José State University

  3. Lab Review

  4. Byzantine General's Problem (Lamport et al. 1982) • Generals decide whether to attack a city. • If all (or most) attack, victory is sure. • If insufficient forces attack they will be crushed.

  5. Complications • Some of the generals are traitors. – Fake messages. – Lie about messages received. • Messengers may be killed. • Should you confirm messages? • Should you confirm the confirmations? • Should you confirm the confirmations of the confirmations?

  6. Traitorous Lieutenant (from Lamport et al. 1982)

  7. Traitorous General (from Lamport et al. 1982)

  8. Previous Solutions for Byzantine Fault Tolerance • Paxos – Provides distributed consensus – Formal safety guarantees – Complex • Raft – Simplified version of Paxos – Also makes formal safety guarantees – Still complex

  9. James Mickens' The Saddest Moment "Whenever I go to a conference and I discover that there will be a presentation about Byzantine fault tolerance, I always feel an immediate, unshakable sense of sadness …"

  10. Distributed Consensus • Anyone could lie to us. • With crypto- currencies, everyone is motivated to lie.

  11. So what can we trust? Greed

  12. Nakamoto Consensus • Probabilistically offers Byzantine fault tolerance. • Solving PoW puzzle determines "leader". – In other words, who gets to make a block. • Incentive structure. – More profitable to mine than double-spend.

  13. What is a blockchain • Data • Cryptographic hash linking blocks • Sybil resistance

  14. Block Information • Version • Timestamp • Previous block hash • Proof-of-work (PoW) target • Nonce (the "proof") • Merkle root

  15. Block Information • Version • Timestamp • Previous block hash • Proof-of-work (PoW) target • Nonce (the "proof") The data • Merkle root

  16. Block Information • Version The link • Timestamp • Previous block hash • Proof-of-work (PoW) target • Nonce (the "proof") • Merkle root

  17. Block Information • Version • Timestamp • Previous block hash • Proof-of-work (PoW) target • Nonce (the "proof") • Merkle root The Sybil resistance

  18. What data structure is a blockchain? • A tree – With mostly dead branches • Orphan blocks – The surviving branches have names: • Bitcoin Cash, Bitcoin Gold, etc. • A chain of "finalized" blocks • A tree of remaining possibilities

  19. Blockchain Properties • Distributed • Decentralized • Immutable history • Time-stamping

  20. Blockchain Limitations • Establishes agreed-upon ordering not necessarily the original ordering. • Nasty stuff stored on the blockchain. • Assumes actors are – Rational – Incentivized by profit

  21. Irrational Actors

  22. Nation-states

  23. Lab: Blockchain Logger Details in Canvas and on course website.

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend