TrustChain: A Sybil-resistant scalable blockchain

Slides:



Advertisements
Similar presentations
1 P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains Authors: P. Dewan and P. Dasgupta Source: IEEE Transactions.
Advertisements

COMS 486 Iowa State University Introduction to Bitcoin A P2P Electronic Cash System.
Bitcoin Double Spending Attack Karame, Androulaki & Capkun Presented by Subhro Kar CSCE 715, Fall 2013.
Towards a More Democratic Mining in Bitcoins Goutam Paul R. C. Bose Centre for Cryptology & Security, Indian Statistical Institute Pratik Sarkar Indian.
Stefan Dziembowski Why do the cryptographic currencies need a solid theory? Forum Informatyki Teoretycznej, Warsaw
The world’s first decentralized digital currency Meni Rosenfeld Bitcoil 29/11/2012Written by Meni Rosenfeld1.
1 Bitcoin A Digital Currency. Functions of Money.
Key Establishment Scheme against Storage-Bounded Adversaries in Wireless Sensor Networks Authors: Shi-Chun Tsai, Wen-Guey Tzeng, and Kun-Yi Zhou Source:
SCP: A Computationally Scalable Byzantine Consensus Protocol for Blockchains Loi Luu, Viswesh Narayanan, Kunal Baweja, Chaodong Zheng, Seth Gilbert, Prateek.
Secure untraceable off-line electronic cash system Sharif University of Technology Scientia Iranica Volume 20, Issue 3, Pp. 637–646, June 2013 Baseri,
SPEAKER: HONG-JI WEI DATE: Efficient and Secure Anonymous Authentication Scheme with Roaming Used in Mobile Networks.
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
Bitcoin Bitcoin is a cryptocurrency. The platform that hosts Bitcoin is a p2p system. Bitcoin can be abstracted as a digital file that records the account.
An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks Source: IEEE Transactions on Vehicular Technology, Reviewing.
Symposium on Distributed Ledger Technology SDLT'2017
Source: Computers & Security, Vol. 24, No. 5, pp , August 2005
Chapter 5 Network Security Protocols in Practice Part I
Lightweight Mutual Authentication for IoT and Its Applications
A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications,
Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy Source: Computer & Security,
Bitcoin and the Blockchain
Cryptanalysis on Mu–Varadharajan's e-voting schemes
A secure and traceable E-DRM system based on mobile device
Efficient password authenticated key agreement using smart cards
Bitcoin - a distributed virtual currency system
Practical and Secure Nearest Neighbor Search on Encrypted Large-Scale Data Source : IEEE INFOCOM IEEE International Conference on Computer Communications,
Bitcoin Mining by David Kopczyk.
Distributed Systems for Information Systems Management
Introduction to Blockchain & Ethereum
CPS 512 midterm exam #1, 10/5/17 Your name please: NetID:_______ Sign for your honor:____________________________.
Bitcoin and the Blockchain
Privacy Preserving Ranked Multi-Keyword
So what is Blockchain anyway?
Nakamoto Consensus Marco Canini
EECS 498 Introduction to Distributed Systems Fall 2017
Efficient CRT-Based RSA Cryptosystems
CS 240: Computing Systems and Concurrency Lecture 20 Marco Canini
Bitcoin & Blockchains Kevin Sekniqi.
Bitcoin and the Blockchain
Setting the Stage for a Community Blockchain Incubator
Blockchains (2) slides have been taken from:
A Secure and Efficient Cloud Resource Allocation Scheme with Trust
A Secure and Efficient Cloud Resource Allocation Scheme with Trust
2018/7/28 GridMonitoring: Secured Sovereign Blockchain based Monitoring on Smart Grid Authors: Jian-Bin Gao, Kwame Omono Asamoah, Emmanuel Boateng Sifah,
Nonce Making Sense of Nonces.
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
2018/7/28 GridMonitoring: Secured Sovereign Blockchain Based Monitoring on Smart Grid Authors: Jianbin Gao, Kwame Omono Asamoah, Emmanuel Boateng Sifah,
A Novel Latin Square-based Secret Sharing for M2M Communications
Blockchain Concepts RISK FORUM 2017 Hash function (e.g. SHA-256)
Controllable and Trustworthy Blockchain-based Cloud Data Management
SBLWT: A Secure Blockchain Lightweight Wallet Based on Trustzone
Source: Energies, vol. 10, no. 12, pp. 1-22, November 2017
SBLWT: A Secure Blockchain Lightweight Wallet Based on Trustzone
Kai Bu 04 Blockchain Kai Bu
Source: Energies, Vol. 10, No. 12, November 2017
Blockchains and Auditing
University of Cyprus By: Nectarios Efstathiou
— The Blockchain Innovation Hub
Scalable and Privacy-preserving Design of On/Off-chain Smart Contracts
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Faculty Seminar Series Blockchain Technology
Bitcoin & Blockchains Kevin Sekniqi.
Source: Journal of Systems and Software, Vol. 140, pp , June 2018
Source:Journal of Systems and Software, vol. 140, pp , June 2018
Source: Sensors, Volume 19, Issue 9 (May )
Biometrics-based RSA Cryptosystem for Securing Real-Time Communication
Renovating Blockchain with Distributed Database: An Open Source System
Campbell R. Harvey Duke University and NBER
Bitcoin and Blockchain
Presentation transcript:

TrustChain: A Sybil-resistant scalable blockchain Source: Future Generation Computer Systems, Article in Press, Sep. 2017 Authors: Pim Otte, Martijn de Vos, and Johan Pouwelse Speaker: Ren-Kai Yang Date:2018/03/22

Outline Introduction Related works Proposed method Security analysis Performance analysis Conclusions

Introduction(1/3) Bitcoin Name Price Alice 50 Bob 60 David 1 Name 100 Bob 10 David 1 Bitcoin Alice Secret key [Alice → Bob, $50] Secret key [Alice → Bob, $50] David Bob Name Price Alice 100 Bob 10 David 1 Name Price Alice 50 Bob 60 David 1 Name Price Alice 100 Bob 10 David 1 Name Price Alice 50 Bob 60 David 1

Introduction(2/3) Transactions Header Global transaction broadcasts "hash" : "0000000000000001b6b9a13b095e96db41c4a928b97ef2d944a9b31b2cc7bdc4", "previousblockhash" : "0000000000000002a7bbd25a417c0374cc55261021e8a9ca74442b01284f0569", "difficulty" : 1180923195.25802612, "time" : 1388185914, "nonce" : 924591752, "merkleroot" : "c91c008c26e50763e9f548bb8b2fc323735f73577effbc55502c51eb4cc7cf2e", "version" : 2, "tx" : [ "d5ada064c6417ca25c4308bd158c34b77e1c0eca2a73cda16c737e7424afba2f", "b268b45c59b39d759614757718b9918caf0ba9d97c56f3b91956ff877c503fbe", ... 417 more transactions ... ], "confirmations" : 35561, "size" : 218629, "height" : 277316, "bits" : "1903a30c", "chainwork" : "000000000000000000000000000000000000000000000934695e92aaf53afa1a", "nextblockhash" : "000000000000000010236c269dd6ed714dd5db39d36b33959079d78dfd431ba7" } Header Transactions Blockchain Global transaction broadcasts Proof-of-Work mechanisms 7 transactions per second Prev Hash Nonce Prev Hash Nonce Prev Hash Nonce Merkle Root Timestamp Merkle Root Timestamp Merkle Root Timestamp Hash01 Hash23 Hash02 Hash03 Tx 02 Tx 03

Introduction(3/3) Sybil attack in P2P network

Related works Maximum flow B D 7 9+3=12 9 7 5 2 9 2 2 6 4 1 3 A C

Proposed method(1/4) – TrustChain architecture Traditional blockchain Hash C D F B Hash A Hash A Hash A Hash A Hash B Hash E Hash G Hash F C D Hash F B

Proposed method(2/4) – TrustChain architecture B Hash Hash A Hash A Hash A Hash E Hash G Hash F B D Hash A Hash C Hash D Hash B Hash D Hash F Hash D

Proposed method(3/4) – Netflow accounting mechanism 9 + 3 = 12 6 + 3 = 9 Sp= 3 Cp= 3 Ct= 4 St= 2 2 p t 9 3 2 5 6 3 q r 4 Cq= -3 Sq= 0

Proposed method(4/4) – α-Netflow accounting mechanism 9 + 3 = 12 3 + 2 = 5 Sp= 7 Cp= 7 Ct= 4 St= 2 2 p t α = 2 3 9 2 5 3 3 q r 2 Cq= 1 Sq= 1

Security analysis(1/3) Replay attack A B A A C B Hash Hash Hash Hash

Security analysis(2/3) Double spending attack A B A D A C A G Hash

Security analysis(3/3) Sybil attack sj1 5 i 2 j 5 sj2 5 sj3

Performance analysis(1/2) 1.6 transactions per second 18.1 transactions per second

Performance analysis(2/2)

Conclusions Detection Sybil attack