Bitcoins Transaction Processing Yonatan Sompolinsky joint work with Aviv Zohar.

Slides:



Advertisements
Similar presentations
Your performance improvement partner 2/25/
Advertisements

The following 5 questions are about VOLTAGE DIVIDERS. You have 20 seconds for each question What is the voltage at the point X ? A9v B5v C0v D10v Question.
Inside the binary adder. Electro-mechanical relay A solid state relay is a switch that is controlled by a current. When current flows from A to B, the.
Enter. The Scene Type text here Choice A1 Text for decisions Guidelines Guideline text Click on A, B or C A B C Choice B1 Choice C1 Click on A, B or C.
1 Comnet 2010 Communication Networks Recitation 4 Scheduling & Drop Policies.
A Roadmap to Restoring Computing's Former Glory David I. August Princeton University (Not speaking for Parakinetics, Inc.)
Web-pa – the tutors’ view Web-PA – a tutors’ view Peter Willmot (School of Mechanical and Manufacturing Engineering)
PODC 2007 © 2007 IBM Corporation Constructing Scalable Overlays for Pub/Sub With Many Topics Problems, Algorithms, and Evaluation G. Chockler, R. Melamed,
Software-defined networking: Change is hard Ratul Mahajan with Chi-Yao Hong, Rohan Gandhi, Xin Jin, Harry Liu, Vijay Gill, Srikanth Kandula, Mohan Nanduri,
Bitcoin Double Spending Attack Karame, Androulaki & Capkun Presented by Subhro Kar CSCE 715, Fall 2013.
Stefan Dziembowski Why do the cryptographic currencies need a solid theory? Forum Informatyki Teoretycznej, Warsaw
Optical Ring Networks Research over MAC protocols for optical ring networks with packet switching. MAC protocols divide the ring bandwidth according to.
Error Checking continued. Network Layers in Action Each layer in the OSI Model will add header information that pertains to that specific protocol. On.
The world’s first decentralized digital currency Meni Rosenfeld Bitcoil 29/11/2012Written by Meni Rosenfeld1.
Common Cents Investment Group Monday February 2 th Welcome Christian Gabis!
Bitcoin (what, why and how?)
Bitcoins and the Digital Economy Presented By: Matt Blackman.
1 Bitcoin A Digital Currency. Functions of Money.
SCP: A Computationally Scalable Byzantine Consensus Protocol for Blockchains Loi Luu, Viswesh Narayanan, Kunal Baweja, Chaodong Zheng, Seth Gilbert, Prateek.
Bitcoin College - Learn Bitcoin, Have Fun, & Be Part Of The Movement Why You’ll be Telling Your Grandchildren About Bitcoin.
Bitcoin is a cryptographic currency that has been in continuous operation over the last 3 years. It currently enjoys an exchange rate of $4.80 (as of April.
Cryptocurrencies: challenges and caveats Khaled Baqer Cambridge University.
Motivation ✓ ✘ ? Bitcoin/Ideal Credit Card Works on Internet
Bitcoin A Basic Tutorial on Decentralized money
Hijacking Bitcoin: Routing attacks on cryptocurrencies
Bitcoin and the Blockchain
Evaluation Forms for Blockchain- Based System ver. 1.0
Mechanics of Bitcoin Part II
Bitcoin - a distributed virtual currency system
Instability Of Bitcoin Without the Block Reward.
Presentation by Shamili
Towards an optimized BlockChain for IoT
Distributed Systems for Information Systems Management
Introduction to Blockchain & Ethereum
Blockchains and Cryptocurrencies: What Financial Planners Need to Know
Amiko Pay A decentralized network for secure, instant, off-blockchain transactions.
Blockchain beyond cryptocurrencies
Ling Ren Joint work with Ittai Abraham, Dahlia Malkhi,
Blockchain Adrian Zaragoza.

What Is Blockchain Technology?. blockchain is a decentralized technology. A global network of computers uses blockchain technology to jointly manage the.
{ BLOCKCHAIN Technology. BSEtecBSEtec is a digital solution provider company which offers the best service with the implement of the latest technologies.
Nakamoto Consensus Marco Canini
Crypto Mining LLC.
BLOCKCHAIN BASICS & LEGAL ISSUES
A Blockchain-based Distributed Access Control for IoT
Campbell R. Harvey Duke University and NBER
Campbell R. Harvey Duke University and NBER
Distributed Ledger Technology (DLT) and Blockchain
Blockchain Alexander Prenta 9/27/2018.
Introduction to Blockchain
Blockchain Concepts RISK FORUM 2017 Hash function (e.g. SHA-256)
ScroogeCoin Client-server architecture N1 N2 N3 N6 N4 N5
Scaling the Blockchain:
Kai Bu 04 Blockchain Kai Bu
TrustChain: A Sybil-resistant scalable blockchain
Blockchains and Auditing
The blockchain : Bitcoin
— The Blockchain Innovation Hub
Faculty Seminar Series Blockchain Technology
Reducing Forks in the Blockchain via Probabilistic Verification
Κατανεμημένα Συστήματα
Moni Finex ပထမဦးစွာ Block ကို Chain & Crypto ငွေကြေးအခြေပြု
Blockchain Tech Big Picture
Majority is not Enough: Bitcoin Mining is Vulnerable
Bitcoin and Blockchain
Explore Txs, block, blockchain in Bitcoin
Cryptocurrency.
Not about digital currencies
Cryptocurrency and Blockchain Technology
Presentation transcript:

Bitcoins Transaction Processing Yonatan Sompolinsky joint work with Aviv Zohar

Bitcoin hard to get easy to pass no authority, no money printing pseudonymous relatively secure ?high transaction volume decentralized cryptocurrency current protocol: conflict ghost protocol: in accord

Transactions in Bitcoin tx Bob Calvin ?irreversible tx

txs: block #81block #82 block #83 The Blockchain txs: ~ 10 min consistent grows in time kept locally at each node Time

A B2 B1 maintain one main chain only blocks discarded & txs cancelled Conflicting blockchains the longest chain rule delays => forks Time

Block tree vs Block chain λ:= block creation rate = 6 per hour β:= growth rate of main chain = 4 per hour efficiency:= β/λ=4/6<1 Time delays => forks => inefficiency

Block size, Delay & Efficiency analysis of data provided to us by Decker and Wattenhofer λ = block creation rate β = growth rate of main chain 0.95 Block Propagation Time

Throughput (TPS) Transactions Processed per Second = (block size) X (growth rate of the main chain) /600 TPS ~ 1736 TPS < 3.3 why?

Security - double spend attack tx Bob Calvin tx secret tx main chain publish !

Success of attack

Effect of increasing throughput efficiency security TPS delay

Security limitation on TPS attacker computational power (fraction) TPS Bitcoin today: secure but low throughput high TPS: more bandwidth needed secure TPS vulnerable TPS

Greedy Heaviest Observed Sub-Tree longest chain efficiency security

Greedy Heaviest Observed Sub-Tree B C1 A C2 C3 D1 D2 D3 E1 tx B tx main chain according to longest rule main chain according to ghost Time

GHOST throughput no security constraint hardware constraints, e.g., network congestion, limit the feasible TPS 8.5-fold increase of current bandwidth can withstand TPS = 2000 in pipeline: improvement of ghost, same bandwidth more TPS … security high transaction volume