Bitcoin Beyond Money Michael Goldstein

Slides:



Advertisements
Similar presentations
Secure Multiparty Computations on Bitcoin
Advertisements

Bitcoin: A New Internet Currency Stephen Clayton Senior Economic Education Specialist Federal Reserve Bank of Dallas The opinions expressed are solely.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
 Key exchange o Kerberos o Digital certificates  Certificate authority structure o PGP, hierarchical model  Recovery from exposed keys o Revocation.
CSE331: Introduction to Networks and Security Lecture 28 Fall 2002.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
Birthday Attack on Efficient and Anonymous Buyer-Seller Watermarking Protocol BY Qurat-ul-Ain M. Mahboob Yasin COMSATS Institute of Information Technology,
Information Security of Embedded Systems : Algorithms and Measures Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
BITCOIN An introduction to a decentralised and anonymous currency. By Andy Brodie.
Domain Name System Security Extensions (DNSSEC) Hackers 2.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
9 - 1 © 2007 Prentice Hall, Business Law, sixth edition, Henry R. Cheeseman Chapter 17: E-Contracts and Licensing.
Pay As You Go – Associating Costs with Jini Leases By: Peer Hasselmeyer and Markus Schumacher Presented By: Nathan Balon.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Computer Science Public Key Management Lecture 5.
Digital Cash By Gaurav Shetty. Agenda Introduction. Introduction. Working. Working. Desired Properties. Desired Properties. Protocols for Digital Cash.
Bitcoin (what, why and how?)
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
X-Road – Estonian Interoperability Platform
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
Formal Analysis of Security Protocols Dr. Changyu Dong
10. Key Management. Contents Key Management  Public-key distribution  Secret-key distribution via public-key cryptography.
Decentralized multi-signature solutions for Bitcoin.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
1 Bitcoin A Digital Currency. Functions of Money.
Chapter 4 Using Encryption in Cryptographic Protocols & Practices (Part B)
Chapter 4 Using Encryption in Cryptographic Protocols & Practices.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
J. S. PATIL.  The revolution in internet and technology has made the future much more uncertain than most people assume it to be.  People can make money.
COMP 424 Computer Security Lecture 09 & 10. Protocol ● An orderly sequence of steps agreed upon by two or more parties in order to accomplish a task ●
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
The Silk Road: An Online Marketplace
Private key
Bitcoin as real currency Bitcoin. Phone: | Bitcoin? - decentralized, peer to peer no banks.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Bitcoin is a cryptographic currency that has been in continuous operation over the last 3 years. It currently enjoys an exchange rate of $4.80 (as of April.
9.2 SECURE CHANNELS JEJI RAMCHAND VEDULLAPALLI. Content Introduction Authentication Message Integrity and Confidentiality Secure Group Communications.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Cryptography and Network Security Chapter 13
Fourth Edition by William Stallings Lecture slides by Lawrie Brown
Block Chain 101 May 2017.
Self-enforcing and executing contracts
CSE 4095 Lecture 22 – BlockChain Slides adapted from Claudio Orlandi.
Blockchain Infrastructure for e-Science
Grid Security.
B. R. Chandavarkar CSE Dept., NITK Surathkal
Bitcoin - a distributed virtual currency system
Chapter 17: E-Contracts and Licensing
Blockchains and Cryptocurrencies: What Financial Planners Need to Know
Blockchain Adrian Zaragoza.
{ BLOCKCHAIN Technology. BSEtecBSEtec is a digital solution provider company which offers the best service with the implement of the latest technologies.
Message Digest Cryptographic checksum One-way function Relevance
BLOCKCHAIN BASICS & LEGAL ISSUES
Bitcoin: A New Internet Currency
E-Contracts and Internet Law
Blockchain Alexander Prenta 9/27/2018.
The Living Blockchain Craig Sellars, Co-Founder of Omni Tether vAtomic
Blockchain Technology: A New Approach to Provenance
Digital Signatures Network Security.
Cryptocurrency and Blockchain Technology
Presentation transcript:

Bitcoin Beyond Money Michael Goldstein

A Theory of Property ● Scarcity – The prerequisite for property norms – Scarcity = conflict ● Appropriation – Homesteading – Voluntary transfer of title ● Technology for delineating – “the existence of an objective, intersubjectively ascertainable link between owner and owned good” A Theory of Socialism and Capitalism, Hans-Hermann Hoppe

Bitcoin as Property ● Scarcity – There is a finite set of bitcoins ● Appropriation – Homesteading → mining – Voluntary transfer of title → Bitcoin transaction ● Technology for delineating – Public-key cryptography

The Problem of Securing Titles ● Historically done through written records ● These can be forged or destroyed ● Collecting informal records is costly ● Online database? – Centralized – Trust issues – Just as vulnerable, now to any hacker with a computer and access to the internet

Distributed Solution ● Nick Szabo proposed a “secure, distributed title database to prevent [fraudulent] attacks against property rights in the future” ● Transferable rights “enforced entirely by protocol... [and] owned by a particular entity but possessed and relied upon by the public” ● “This technology will give us public records which can 'survive a nuclear war', along the lines of the original design of the internet.” – “Secure Property Titles with Owner Authority” (1998)

Intersubjectively and Digitally Ascertainable Block Chain ● The block chain is the ultimate technology for securing titles of scarce digital goods (and more?) – Unforgeable – Verifiable – Decentralized – Resilient

Contracts ● “A contract is a relation between two or more parties which includes legally enforceable obligations between them.” – Stephan Kinsella, “A Libertarian Theory of Contract” ● Title-transfer theory of contract ● “Any future-oriented title transfer is necessarily conditional, as are exchanges of title.” – If you do X, then title of Y will transfer to you.

Smart Contracts ● A large cost of doing business is that which concerns trust and security ● Once again, historically we have paper, writing, and humans ● Let's digitize what we can. ● “The basic idea behind smart contracts is that many kinds of contractual clauses (such as collateral, bonding, delineation of property rights, etc.) can be embedded in the hardware and software we deal with, in such a way as to make breach of contract expensive (if desired, sometimes prohibitively so) for the breacher.” ● “Smart contracts combine protocols, user interfaces, and promises expressed via those interfaces, to formalize and secure relationships over public networks. This gives us new ways to formalize the digital relationships which are far more functional than their inanimate paper- based ancestors” ● “Smart contracts reduce mental and computational transaction costs.” – “Formalizing and Securing Relationships on Public Networks,” Nick Szabo

Bitcoin Smart Contracts ● Transactions have space for arbitrary data ● Bitcoin has scripting capabilities ● In effect, the protocol has built in methods of creating smart contracts based on bitcoin transactions ● Watch Mike Hearn's talk! ● ● Let's cover a few examples...

Escrow and Dispute Mediation ● M-of-n multisig transaction ● A third party can be chosen by both parties ● Transaction made requiring 2-of-3 signatures ● Establish third party arbitration ● Best part? Nearly trustless

External State ● We already determined people are expensive ● External state contracts use oracles ● Oracles run computer programs that interpret external data ● Program the dispute and its resolution into the contract itself ● Oracle signs for transaction ● Examples: sports bet, inheritance

Assurance Contracts ● Who will build the roads? ● Free riders, no incentives ● Assurance contracts use Kickstarter model ● SIGHASH_ANYONECANPAY ● Transactions are signed and sent ● When total adds up, transactions are bundled and broadcast ● Examples: Creative goods, web translation ● Extend this further with dominant assurance contracts ● Have at it, free riders.

Smart Property ● Smart property are physical goods with hardware and software that incorporate cryptography into their security and ownership ● Example: fob keys that open doors ● Imagine a public private key pair associated with a physical good... and a Bitcoin transaction ● Ownership of these physical goods now dictated by the block chain ● Combine with other contracts for robust ownership agreements

Namecoin ● Bitcoin uses a ledger tracing units of a finite number and their relation to public addresses – great for money ● The block chain, as a secure property title database, can be used for other things as well ● Imagine the block chain instead holds namespaces ● Namecoin attempts this – Distributed DNS – Login and authentication services – Smart property – Property titles in general – Block chain notaries (ProofOfExistence.com)

“While thugs can still take physical property by force, the continued existence of correct ownership records will remain a thorn in the side of usurping claimants.” Nick Szabo, “Secure Property Titles with Owner Authority”

“The struggle of man against power is the struggle of memory against forgetting.” Milan Kundera, The Book of Laughter and Forgetting

Recommended Reading ● A Theory of Socialism and Capitalism by Hans-Hermann Hoppe ● Against Intellectual Property by Stephan Kinsella ● “A Libertarian Theory of Contracts” by Stephan Kinsella ● “Secure Property Titles with Owner Authority” by Nick Szabo ● “Formalizing Secure Relationships on Public Networks” by Nick Szabo ● “A Formal Language for Analyzing Contracts” by Nick Szabo ●