Experiences Working on Layer 2 Scalability Solutions Corné Plooy

Slides:



Advertisements
Similar presentations
NAS vs. SAN 10/2010 Palestinian Land Authority IT Department By Nahreen Ameen 1.
Advertisements

Secure Multiparty Computations on Bitcoin
Presented to GIS Committee presented by Eric Songer, URS Corporation 11/20/2008 Turnpike Enterprise Use of TeleAtlas GIS Data for Transportation Modeling.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #13: P2P and Sensor Networks Shivkumar Kalyanaraman:
A SIMPLE MICRO SIMULATION MODEL EXAMPLE: Cost chain and trading price formation for international exports Master Économie et Affaires Internationales Cours.
Lesson 3 – UNDERSTANDING NETWORKING. Network relationship types Network features OSI Networking model Network hardware components OVERVIEW.
CS 347Notes 041 CS 347: Distributed Databases and Transaction Processing Notes04: Query Optimization Hector Garcia-Molina.
SPIES Secret Protection Incentive-based Escrow System N. Boris Margolin, Matthew Wright, Brian Neil Levine University of Massachusetts at Amherst.
Wide-area cooperative storage with CFS
7/14/2015EECS 584, Fall MapReduce: Simplied Data Processing on Large Clusters Yunxing Dai, Huan Feng.
ECE669 L17: Memory Systems April 1, 2004 ECE 669 Parallel Computer Architecture Lecture 17 Memory Systems.
A SIMPLE MICRO SIMULATION MODEL EXAMPLE: Cost chain and trading price formation for international exports Master Économie et Affaires Internationales Cours.
Secured Hosting Services Frank Adams / Tom Carter.
The world’s first decentralized digital currency Meni Rosenfeld Bitcoil 29/11/2012Written by Meni Rosenfeld1.
Near-realtime Software. September 22, 2009GONG H-alpha Review2 Laminate From Wikipedia: A laminate is a material constructed by uniting two or more layers.
IPDPS 2007 Making Peer-to-Peer Anonymous Routing Resilient to Failures Yingwu Zhu Seattle University
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
1 CPS216: Advanced Database Systems Notes 04: Operators for Data Access Shivnath Babu.
 Protocols used by network systems are not effective to distributed system  Special requirements are needed here.  They are in cases of: Transparency.
Case Study II: A Web Server CSCI 8710 September 30 th, 2008.
A Framework for Elastic Execution of Existing MPI Programs Aarthi Raveendran Graduate Student Department Of CSE 1.
Personal Computer - Stand- Alone Database  Database (or files) reside on a PC - on the hard disk.  Applications run on the same PC and directly access.
Network Security7-1 CIS3360: Chapter 8: Cryptography Application of Public Cryptography Cliff Zou Spring 2012 TexPoint fonts used in EMF. Read the TexPoint.
Database Architectures Database System Architectures Considerations – Data storage: Where do the data and DBMS reside? – Processing: Where.
1 Bitcoin A Digital Currency. Functions of Money.
Computers Computer & Internet Security How Computer Forensics Works What is the Year 2038 problem? Could hackers devastate the U.S. economy?
Department of Computer Science and Engineering Applied Research Laboratory Architecture for a Hardware Based, TCP/IP Content Scanning System David V. Schuehler.
Intro to Block Chain Bitcoin. Blocks ●Ethereum - block chain ●Dogecoin - block chain ●Ripple - not a block chain ●Stellar - not a block chain ●Bitcoin.
A P2P On-Demand Video Streaming System with Multiple Description Coding Yanming Shen, Xiaofeng Xu, Shivendra Panwar, Keith Ross, Yao Wang Polytechnic University.
Internet of Things. Creating Our Future Together.
Online School Management System Supervisor Name: Ashraful Islam Juwel Lecturer of Asian University of Bangladesh Submitted By: Bikash Chandra SutrodhorID.
This document is provided for informational purposes only and Microsoft makes no warranties, either express or implied, in this document. Information.
Bitcoin’s new Era OP_CSV, Segregated Witness And how it relates to Bitcoin at Visa’s scale.
© OCR 2016 Unit 2.6 Data Representation Lesson 1 ‒ Numbers.
Micro-transaction channels
Volume Licensing Readiness: Level 100
Volume Licensing Readiness: Level 200
Volume Licensing Readiness: Level 200
Volume Licensing Readiness: Level 100
Cloud Computing By: Vanika Jennings.
Evaluation Forms for Blockchain- Based System ver. 1.0
Storage and Indexes Chapter 8 & 9
Secondary storage.
Volume Licensing Readiness: Level 100
Amiko Pay A decentralized network for secure, instant, off-blockchain transactions.
9/12/2018.
Basic Network Encryption
Volume Licensing Readiness: Level 200
Campbell R. Harvey Duke University and NBER
How To Get Good Grades in Economics Assignment Without Working Hard on it
Bill.com Overview for [CLIENT NAME]
NYMBLE: BLOCKING MISBEHAVING USERS IN ANONYMIZING NETWORKS
VIRTUALIZATION & CLOUD COMPUTING
Distributed File Systems
Cryptocurrency as a payment option
Fujitsu and SUSE Enterprise Storage
CS 4432 Database Systems II Lecture 1: Introduction
USE CASE 1 Business Drivers Our Solution
Specialized Cloud Architectures
Secure Electronic Transactions (SET)
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Scaling the Blockchain:
Basic Network Encryption
Off-Chain Payment Channels
MECH 3550 : Simulation & Visualization
Scalable and Privacy-preserving Design of On/Off-chain Smart Contracts
Lightning or How to Pay Quickly with Bitcoin
Campbell R. Harvey Duke University and NBER
Campbell R. Harvey Duke University and NBER
Iserve – Bulk Cash Deposit Kiosk
Presentation transcript:

Experiences Working on Layer 2 Scalability Solutions Corné Plooy Amiko Pay Experiences Working on Layer 2 Scalability Solutions Corné Plooy

A network of channels Lightning model De-centralized Internet

Nodes and Channels Lightning model De-centralized Internet

Different channel types Lightning model De-centralized Internet

Channel types Done: Ripple-style IOU “channel” Work In Progress: true Lightning channel Lightning developers: side chain Amiko Pay: emulation by escrow service More important than complexity: Missing features These things are required for Lightning

Issues / Thoughts Software complexity Transaction malleability The routing details really matter Economic modeling of the network More important than complexity: Missing features These things are required for Lightning

https://github.com/cornwarecjp/amiko-pay Thank you https://github.com/cornwarecjp/amiko-pay

Emulation by escrow services A+B TCD TCD TCD A OP_RETURN A 2 of A+B+E B A B This is the Amiko Pay microtransaction channel OP_RETURN: secure hash → Transaction Conditions Documents Time-out, transaction hash etc. 2-of-3 locked amount Normally: update by Alice / Bob Alternative: 3rd transaction signed by escrow

Required for Lightning Network Fixes for transaction malleability New SIGHASH types Lock time evaluation in script “OP_CHECKLOCKTIME” Relative lock time Optional: necessary for unlimited-lifetime micro- transaction channels More important than complexity: Missing features These things are required for Lightning

Very rough storage estimate $10 000 savings per person $1 per small transaction ___ / 10 000 unspent transactions per person 10 billion people 100 bytes per transaction ___ x 1016 bytes = 10 000 TByte = block chain size (when using block chain pruning!) Also: 10 GByte per block Hard disks: max density ~3 nm → 10 nm^2 → 1 m^2 hard disk surface → ~100 surface layers (expensive!) IF 100% of disk is used for block chain Flash:max density ~100 nm → much worse Only possibility: 3D structures (e.g. holographic)

100 x 100 TByte

Very rough storage estimate 1 channel per person 10 billion people 100 bytes per transaction ___ x 1012 bytes = 1 TByte = block chain size → Factor 10 000 reduction! Also: 10 MByte per block → Factor 1000 reduction! Hard disks: max density ~3 nm → 10 nm^2 → 10 mm^2 hard disk surface → small fraction of hard disk