Presentation by Team 4.  What Is It?—Tim Johnson  How Does it Work—Javier Navarro  Different Kinds of Cryptocurrency—Idong  Challenges—Mark Weeks.

Slides:



Advertisements
Similar presentations
What Are the Functions of ATM Machines?
Advertisements

Digital Cash Mehdi Bazargan Fall 2004.
Requirements for a Secure Voting System  Only authorized voters can vote  No one can vote more than once  No one can determine for whom anyone else.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Recoverable and Untraceable E-Cash Dr. Joseph K. Liu The Chinese University of HongKong.
Understanding Networked Applications: A First Course Chapter 14 by David G. Messerschmitt.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Warm-up: April 11 What’s the difference between a checking and savings account?
Digital Cash Present By Kevin, Hiren, Amit, Kai. What is Digital Cash?  A payment message bearing a digital signature which functions as a medium of.
ELECTRONIC PAYMENT SYSTEMS FALL 2002COPYRIGHT © 2002 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 11 Electronic Cash.
Slide 1 Vitaly Shmatikov CS 378 Digital Cash. slide 2 Digital Cash: Properties uDigital “payment message” with properties of cash uUnforgeable Users cannot.
Payment Systems 1. Electronic Payment Schemes Schemes for electronic payment are multi-party protocols Payment instrument modeled by electronic coin that.
BITCOIN – 2014 John BlackSpring Digital Currency  Chaum’s ideas in the 1980’s  All ideas required a central bank or single point of trust  Chaum.
Bitcoin Double Spending Attack Karame, Androulaki & Capkun Presented by Subhro Kar CSCE 715, Fall 2013.
Introduction to Modern Cryptography, Lecture 13 Money Related Issues ($$$) and Odds and Ends.
ELECTRONIC PAYMENT SYSTEMS SPRING 2004 COPYRIGHT © 2004 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 11 Electronic Cash.
1 Applications of Computers Lecture-3 2 E-Commerce 4 Almost all major companies have their homes on the web, mainly for advertising 4 Companies were.
Digital Cash Damodar Nagapuram. Overview ► Monetary Freedom ► Digital Cash and its importance ► Achieving Digital Cash ► Disadvantages with digital cash.
Electronic Voting Schemes and Other stuff. Requirements Only eligible voters can vote (once only) No one can tell how voter voted Publish who voted (?)
BITCOIN An introduction to a decentralised and anonymous currency. By Andy Brodie.
ELECTRONIC PAYMENT SYSTEMSFALL 2001COPYRIGHT © 2001 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 6 Epayment Security II.
Module 8 – Anonymous Digital Cash Blind Signatures DigiCash coins.
Homework #5 Solutions Brian A. LaMacchia Portions © , Brian A. LaMacchia. This material is provided without.
Electronic Payment Systems. Transaction reconciliation –Cash or check.
Financial Transactions on Internet Financial transactions require the cooperation of more than two parties. Transaction must be very low cost so that small.
E-Money / Digital Cash Lin Huang. Money / Digital Cash What is Money –Coins, Bill – can’t exist on two places at one time –Bearer bonds: immediate cashable.
J. Wang. Computer Network Security Theory and Practice. Springer 2008 Chapter 4 Data Authentication Part II.
DNSSEC Cryptography Review Track 2 Workshop July 3, 2010 American Samoa Hervey Allen.
Digital Cash By Gaurav Shetty. Agenda Introduction. Introduction. Working. Working. Desired Properties. Desired Properties. Protocols for Digital Cash.
Common payment services What are the common payment services provided by financial institutions? 1.
MIS 3090 IT for Financial Services Digital Cash September 4, 2015.
Electronic Payment Systems
Bitcoin (what, why and how?)
Electronic Payment Systems. How do we make an electronic payment? Credit and debit cards Smart cards Electronic cash (digital cash) Electronic wallets.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Cryptography, Authentication and Digital Signatures
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Lecture 12 E-Commerce and Digital Cash. As communication technologies, such as the Internet and wireless networks, have advanced, new avenues of commerce.
Digital Cash. p2. OUTLINE  Properties  Scheme  Initialization  Creating a Coin  Spending the Coin  Depositing the Coin  Fraud Control  Anonymity.
Privacy Enhancing Technologies Spring What is Privacy? “The right to be let alone” Confidentiality Anonymity Access Control Most privacy technologies.
HOW TO FINANCE YOUR LIFE Financial Literacy. Savings Accounts Saving – The process of setting money aside for a future date instead of spending it today.
Chapter 6:Esoteric Protocols Dulal C Kar. Secure Elections Ideal voting protocol has at least following six properties 1.Only authorized voters can vote.
1 Bitcoin A Digital Currency. Functions of Money.
Section 3.1 CHECKING ACCOUNTS. How do people gain access to money they keep in a bank?  How many of you have a savings account?  How many of you have.
Chapter 4 Using Encryption in Cryptographic Protocols & Practices (Part B)
2/16/001 E-commerce Systems Electronic Payment Systems.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Anonymous Digital Cash  Ashok Reddy  Madhu Tera  Laxminarayan Muktinutalapati (Lux)  Venkat Nagireddy.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Digital Signatures, Message Digest and Authentication Week-9.
BITCOIN What is bitcoin? Put simply, bitcoin is a digital currency. It can be used to make electronic payments face to face or over the internet just like.
Encryption. Introduction The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live.
1. ◦ Intro ◦ Online shopping vs MOTO ◦ Credit card payments vs PayPal ◦ E-cash? 2.
Checking Accounts and Other Banking Services Understanding and Managing.
Electronic Cash R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide anonymity.
Electronic Payment Systems Presented by Rufus Knight Veronica Ogle Chris Sullivan As eCommerce grows, so does our need to understand current methods of.
Checking & Savings Accounts Economics What is a Checking Account?  Common financial service used by many consumers (a place to keep money)  Funds.
BZUPAGES.COM E-cash Payment System A company, DigiCash, has pioneered the use of electronic cash or e-cash. Anonymity of the buyer is the key feature of.
Section #9: Bitcoins. Digital currency Unique string of bits Use cryptography for security and privacy Not tied to names: hard to trace Finite set of.
A Secure Online Card Payment Protocol VIJAY CHOUDHARY M.Tech(IS), DTU.
1 E-cash Model Ecash Bank Client Wallet Merchant Software stores coins makes payments accepts payments Goods, Receipt Pay coins sells items accepts payments.
Ian Miers, Christina Garman, Matthew Green, Avi Rubin Zerocoin: Anonymous Distributed E-Cash from Bitcoin.
Bitcoin - a distributed virtual currency system
eCommerce Technology Lecture 13 Electronic Cash
Chapter 8 roadmap 8.1 What is network security?
GAYATRI INSTITUTE OF COMPUTER AND MANAGEMENT HINJILICUT (GANJAM)
Presentation transcript:

Presentation by Team 4

 What Is It?—Tim Johnson  How Does it Work—Javier Navarro  Different Kinds of Cryptocurrency—Idong  Challenges—Mark Weeks

 Simply put a cryptocurrency is money that has been converted to a value expressed in bits and encoded for secrecy. In ways it is similar to using an ATM. This presentation will illuminate differences by making it clear how cryptocurrency works.  Once common protocol for cryptocurrency is Bitcoin. There are no coins per se except in the expression but there are bits.  The said money can then be exchanged using the internet for payment of debts or other commercial purchases pseudonymously.

 In 2009 specifications and a proof of concept 7 for Bitcoin was published by Satoshi Nakamoto. This was the first truly cryptocurrency. This point is where the popular press picks up the history of Bitcoin. The truth is there was a long trail of contributors before Nakamoto and Bitcoin: DigiCash begun in 1990 by David Chaum purchased by Ecash in 1998 absorbed by InfoSpace in  Speculation arose starting with a paper written in 1985 of a transaction system without identification that was secure 2 by David Chaum followed in 1988 with a second paper about untraceable electronic cash 3. He wrote his first paper on this subject in  By the early 90’s two papers appeared that tied together two concept that became key for crypto-currency: Universal Electronic Cash 4 and Wallet Databases with Observers 5. In 1996 the cryptographic means of security was described in The Cryptography of Anonymous Electronic Cash 6 by the enigma known as Satoshi Nakamoto.

 The expression, “Let’s see the color of your money” implies it being green and made out of paper or precious metals pressed into disks.  We’re accustomed to debit and credit cards and purchasing goods over the Internet because they are tied to our bank accounts and net worth plus something more precious, our trustworthiness.  But Bitcoins? What kind of economic over-reach is this?  Cryptocurrency is a form of digital currency that is available for purchase on exchanges. Like all currencies, it can be used to purchase good and services where it is accepted but no coins are used 1.

 Banks have faced this question throughout their existence. The FBI was set up during the 1930 due to a spate of bank robberies. Cryptocurrency is slightly different.  Cryptocurrency has the distinction of being without government intervention. There is no central bank along with all the rules for banks that make up our financial institutions. It’s very much like the wild west except there is an accounting algorithm that tracks the history of the bit exchanges. Each bit is unique.  The current value of a bit in US dollars is 1.6 millibits for each dollar. This value can vary as all currencies do.

 One-Way Functions: The function phi is one-way if, given s in the domain of phi, it is easy to compute t=phi(s), but given only t, it is hard to find s.  Key Pairs: If phi is one-way function, then a key pair is a pair s, t related in some way via phi. We call s the secret key and t the public key. Each user keeps his secret key to himself and makes his public key available to all. The secret key remains secret even when the public key is known, because the one-way property of phi.  Digital Signature: A user identifies himself by proving that he knows his secret key without revealing it. This is done by performing some operations using the secret key which anyone can check or undo using the public key (identification). If one uses a message as well as one's secret key, one is performing a digital signature on the message.  Secure Hashing: A hash function is a map from all possible strings of bits of any length to a bit string of fixed length. If a hash is both one-way (to prevent signature forgery) and collision-free (to prevent repudiation), it is said to be a secure hash.

Withdrawal Alice sends a withdrawal request to the Bank Bank prepares an electronic coin and digitally signs it Bank sends coin to Alice and debits her account Payment/Deposit Alice gives Bob the coin Bob contacts Bank and send coin Bank verifies the Bank’s digital signature Bank verifies that coin has not already been spent Bank consults its withdrawal records to confirm Alice’s withdrawal (optional) Bank enters coin in spent-coin database Bank credits Bob’s account and informs Bob Bob gives Alice the merchandise

Withdrawal Alice sends a withdrawal request to the Bank Bank prepares an electronic coin and digitally signs it Bank sends coin to Alice and debits her account Payment Alice gives Bob the coin Bob verifies the Bank’s digital signature. (optional) Bob gives Alice the merchandise Bob sends coin to the Bank Bank verifies the Bank’s digital signature Bank verifies that coin has not already been spent Bank consults it withdrawal records to confirm Alice’s withdrawal. (optional) Bank enters coin in spent-coin database Deposit Bank credits Bob’s account

 Blind Signature: It is necessary that the Bank not be able to link a specific withdrawal with a specific deposit. This is accomplished by using a special kind of digital signature called a blind signature.  Blinding: In the withdrawal step, the user changes the message to be signed using a random quantity. This step is called blinding the coin, the random quantity is called the blinding factor.  Unblinding: The Bank signs this random-looking text, and the user removes the blinding factor (unblinding). The user now has a legitimate electronic coin signed by the Bank.  The Bank will see this coin when it is submitted for deposit, but will not know who withdrew it since the random blinding factors are unknown to the Bank.  Bank does not know what is signing in the withdrawal step. The Bank uses secret keys for fixed amounts (one key for a $10 withdrawal, another for a $50 withdrawal, and so on).

Withdrawal Alice creates an electronic coin and blinds it Alice sends the blinded coin to the Bank with a withdrawal request Bank digitally signs the blinded coin Payment/Deposit Alice gives Bob the coin Bob contacts Bank and send coin Bank verifies the Bank’s digital signature Bank verifies that coin has not already been spent Bank enters coin in spent-coin database Bank credits Bob's account and informs Bob Bob gives Alice the merchandise Bank sends the signed blinded coin to Alice and debits her account Alice unblinds the signed coin

Withdrawal Alice creates an electronic coin and blinds it Alice sends the blinded coin to the Bank with a withdrawal request Bank digitally signs the blinded coin Bank sends the signed blinded coin to Alice and debits her account Alice unblinds the signed coin Payment Alice gives Bob the coin Bob verifies the Bank’s digital signature. (optional) Bob gives Alice the merchandise Bob sends coin to the Bank Bank verifies the Bank’s digital signature Bank verifies that coin has not already been spent Bank enters coin in spent-coin database Bank credits Bob’s account Deposit

 Payment Anonymity: Neither payer nor payee should know the identity of the other. This makes remote transactions using electronic cash totally anonymous.  Multiple Spender: If a merchant tries to deposit a previously spent coin, he will be turned down by the Bank, but neither will know who the multiple spender was since she was anonymous.  Identifying Information: The payer shares some sort of identifying information with the payee at the payment step, in addition to her electronic coin. This information is created during the withdrawal step. The withdrawal protocol includes a step in which the Bank verifies that the information is there and corresponds to Alice and to the particular coin being created.  To preserve payer anonymity, the Bank will not actually see the information, only verify that it is there. Alice carries the information along with the coin until she spends it.  Challenge-Response Protocol: Bob sends Alice a random challenge quantity and, in response, Alice returns a piece of identifying information. At the deposit step, the revealed piece is sent to the Bank along with the coin. If she spends the coin twice, the Bank will eventually obtain two copies of the same coin, each with a piece of identifying information.  If the piece of identifying information is the same, we know that her coin was copied and re-spent by someone else.  If the piece of identifying information is different (due to the randomness in the challenge-response protocol), The Bank will be able to identify her as the multiple spender.

Withdrawal Alice creates an electronic coin, including identifying information Alice blinds the coin Alice sends the blinded coin to the Bank with a withdrawal request Bank verifies that the identifying information is present Bank digitally signs the blinded coin Payment Alice gives Bob the coin Bob verifies the Bank’s digital signature Bob sends Alice a challenge Bob sends coin, challenge, and response to the Bank Bank verifies the Bank’s digital signature Bank verifies that coin has not already been spent Bank enters coin, challenge, and response in spent-coin database Bank credits Bob’s account Deposit Bank sends the signed blinded coin to Alice and debits her account Alice unblinds the signed coin Alice sends Bob a response (revealing one piece of identifying info) Bob verifies the response Bob gives Alice the merchandise

 (short)  (long)

 As of March 24, 2014, cryptocurrencies now have 193 varieties. There are only 180 recognized currencies around the globe.  This growth began in At the end of December of 2013 there were 67 types. The total evaluation of all these currencies was 13 billion US dollars at the start of In the last quarter the number cryptocurrencies has tripled.  Source: Bitcoin gang nears 200-member mark; outnumbers real currencies, The Hindu, published 3/24/2014, nears-200member-mark-outnumber-real-currencies/article ece, accessed: 3/30/2014.  Next slide source: Cryptocurrencies, Wikipedia, graphic, accessed 3/30/

A LIST OF VARIOUS CRYPTOCURRENCIES

 The risk that a digital currency can be spent twice. Bitcoin has a mechanism based on transaction logs (publicly viewable) known as a "block chain" to verify the authenticity of each transaction and prevent double-counting  When digital currency is exchanged, there is a very real possibility that the currency could be copied over to the recipient, with the ‘original’ still intact in the owner’s possession. In this case, a currency-holder would be much more likely to take the risk of spending a unit of currency twice  Sending a fraudulent transaction log to a seller and another to the rest of the Bitcoin network  Bitcoin transactions take some time to verify because the process involves intensive number-crunching and complex algorithms that take up a great deal of computing power. It is, therefore, exceedingly difficult to duplicate or falsify the block chain because of the immense amount of computing power that would be required to do so

If P1 and P2 are XORed the original id of the user will be revealed. But only the last owner can be seen, "CHARLIE". Note that secret sharing is done with XOR, not concatenation. Concatenation is used for illustration just to make the picture readable. There is no way the identities of ALICE and BOB can be extracted from the transaction list. When a user spends their money, the protocol will randomly blank some of P1 and some of the P2 for the current owner, and adds another list of P1 and P2 for the new owner.

 1. accessed 02/03/2014.  2. Security without Identification: Transaction Systems to make Big Brother Obsolete, David Chaum, ACM 28 no.10 (Oct 1985), pp  3. Untraceable Electronic Cash, David Chaum, Advances in Cryptology CRYPTO ‘88, Springer-Verlag, pp  4. Universal Electronic Cash, Tatsuaki Okamoto, Advances in Cryptology CRYPTO ’91, Springer- Verlag, pp  5. Wallet Databases with Observers, David Chaum, Advances in Cryptology CRYPTO ’92, Springer- Verlag, pp  6. The Cryptography of Anonymous Electronic Cash, Frank Fried, 1996, accessed 02/11/2014.  7. Bitcoin: A Peer-to-Peer Electronic Cash System, Satoshi Nakamoto, 2009, accessed 2/13/2014.  8. Blind signatures for untraceable payments, David Chaum, Advances in Cryptology Proceedings of Crypto, pp , 1982.

 Associate Professor Tim Johnson became the first person to use an AbDM on February 22, 2014 at Amtrak’s South Station in Boston, MA. more… more…