SlideShare uma empresa Scribd logo
1 de 86
Baixar para ler offline
Introduction to blockchain
and cryptocurrency technologies
@pawaclawczyk
Agenda
• Cryptographic primitives
• Building blocks
• Making cryptocurrency
• Under the hood
• Not only currency — adToken
Cryptographic primitives
Cryptographic primitives
• Cryptographic hash function
• Digital signature
Cryptographic primitives: hash function
H(x) = y
• maps input of arbitrary size into fixed size output
• is efficiently computable
Cryptographic primitives: cryptographic hash function
• collision-resistance
• hiding
• puzzle-friendliness
Cryptographic primitives: cryptographic hash function
Cryptographic primitives: cryptographic hash function
A hash function H is collision resistant

if it is infeasible to find two values, x and y,

such that x ≠ y, yet H(x) = H(y).
Cryptographic primitives: cryptographic hash function
Example of not collision resistant hash function:
H(x) = x mod 2256
It’s easy to find that:
H(x) = H(x + 2256)
Cryptographic primitives: cryptographic hash function

A hash function H is hiding if:

when a secret value r is chosen from

a probability distribution that has high min-entropy,

then given H(r || x) it is infeasible to find x.
Cryptographic primitives: cryptographic hash function

Cryptographic primitives: cryptographic hash function

Application: commitments
commitment := commit(message, nonce)
:= H(nonce || message)
isValid := verify(commitment, message, nonce)
:= commitment == H(nonce || message)
Cryptographic primitives: cryptographic hash function

A hash function H is said to be puzzle-friendly if for every possible

n-bit output y, if k is chosen from a distribution with high min-entropy,
then it is infeasible to find x such that H(k || x) = y in time significantly
less then 2n.
Cryptographic primitives: cryptographic hash function

Application: search puzzle
Given:
• a hash function H
• a value v, chosen from high min-entropy distribution
• a target set Y
Find value x — solution to this puzzle — such that
H(v || x) ∈ Y
Cryptographic primitives: digital signature

Analogy to handwritten signature
• only you can make your signature
• anyone who sees it can verify it’s valid
• it’s tied to a particular document
Cryptographic primitives: digital signature

Digital signature scheme
(secKey, pubKey) := generateKeys(keyLength)
signature := sign(secKey, message)
isValid := verify(pubKey, message, signature)
Cryptographic primitives: digital signature

We require that digital signature scheme holds following two properties:
• valid signature must verify
• signatures are unforgeable
Cryptographic primitives: digital signature

Unforgeability of digital signature
• it’s computationally infeasible to forge signature
• an adversary, who knows your public key and gets to see your
signatures on some other messages can’t forge your signatures on
some message for which he has not seen your signature
Cryptographic primitives: digital signature

Practical concerns:
• many signature algorithms are randomized and therefore we need
good source randomness
• there's a limit on the message size that you’re able to sign, in
practice you can sign the hash of the message
Cryptographic primitives: digital signature

Public key as an identity
• if we see message that verifies correctly under public key pubKey, then
we can think of this as pubKey is saying the message
• in order for someone to speak for the identity pubKey, they must know
the corresponding secret key
• these identities are called addresses — commonly represented with the
hash of pubKey
• you can have as many identities as you want
Building blocks
Building blocks
• Hash pointer
• Block chain
• Merkle tree
Building blocks: hash pointer
Building blocks: hash pointer
A hash pointer is
• a pointer to where data is stored
• together with cryptographic hash of the value of that data at some
fixed point in time
Building blocks: hash pointer
We can use hash pointers to build almost all data structures that we
could build using regular pointers.
The exceptions are data structures containing cycles.
Building blocks: block chain
Building blocks: block chain
Building blocks: block chain
Building blocks: block chain
Building blocks: block chain
Building blocks: block chain
Building blocks: Merkle tree
Building blocks: Merkle tree
Building blocks: Merkle tree
Building blocks: Merkle tree
• Sorted Merkle tree — data blocks are ordered
• Proof of non-membership — it is possible to verify non-membership
in a logarithmic time and space
Making cryptocurrency
Making cryptocurrency
• A very naive currency
• Central authority protocol
• Decentralized network
• Reaching consensus
• Economy
Making cryptocurrency: a very naive currency
Making cryptocurrency: a very naive currency
Making cryptocurrency: a very naive currency
Making cryptocurrency: central authority
• Let Alice be a central authority that accepts transactions and
appends them to the block chain.
• Alice will create new block with transaction when decide that
transaction is valid.
Making cryptocurrency: central authority
Making cryptocurrency: central authority
Making cryptocurrency: central authority
Making cryptocurrency: decentralized network
• When central authority is compromised or is not operant, the whole
system is affected. It’s single point of failure.
• Central authority may not treat all users equally. Some transactions
may be significantly delayed or rejected at all.
Making cryptocurrency: decentralized network
• How to maintain ledger in a distributed peer-to-peer network?
Making cryptocurrency: decentralized network
In such network we have to remember that:
• network is imperfect,
• some nodes may act maliciously.
Making cryptocurrency: reaching consensus
Nodes must agree on:
• exactly which transactions were broadcasted,
• the order in which these transactions happened.
Making cryptocurrency: reaching consensus
The result is a single, global ledger consisting of a sequence of blocks,
each block containing a list of transactions, that the’ve reached
consensus on.
Making cryptocurrency: reaching consensus
• New transactions are broadcasted to all nodes.
• Each node verifies and collects new transactions into a block.
• In each round a random node gets to broadcast its block.
• Other nodes accept the block only if all transactions in it are valid.
• Nodes express their acceptance of the block by including its hash in
the next block they create.
Making cryptocurrency: reaching consensus
Making cryptocurrency: reaching consensus
Making cryptocurrency: reaching consensus
Making cryptocurrency: reaching consensus
Making cryptocurrency: reaching consensus
Making cryptocurrency: reaching consensus
Making cryptocurrency: reaching consensus
Making cryptocurrency: reaching consensus
Making cryptocurrency: reaching consensus
Making cryptocurrency: reaching consensus
Making cryptocurrency: reaching consensus
• How to select node in a random manner?
Making cryptocurrency: reaching consensus
The key idea behind proof of work is that we approximate the
selection of random node by instead selecting nodes in proportion to a
resource that we hope that nobody can monopolize.
Making cryptocurrency: reaching consensus
H ( nonce | block data ) < target
• Difficult to compute.
• Parametrizable cost.
• Trivial to verify.
Making cryptocurrency: economy
• Why do we assume that majority of nodes will follow the protocol?
Making cryptocurrency: economy
• Block rewards.
• Transaction fees.
Making cryptocurrency: economy
We’re talking about cryptocurrency, so we can introduce incentives.
• Block rewards.
• Transaction fees.
Making cryptocurrency: economy
• We can assume that we have viable cryptocurrency when we trust in
security of blockchain protocol.
• It is secure when the nodes ecosystem is healthy — majority of the
hash power is in hand of following the protocol nodes.
• The nodes are going to act honestly only when the value of the
reward for solving puzzle is high.
• And the value is high and stable only when there is a trust in the
security of the blockchain.
Making cryptocurrency: economy
Making cryptocurrency
• Stealing bitcoins
• Denial of service attack
• Double-spend attack
• Sybil attack
• 51-percent attack
Under the hood
Under the hood
• Blocks and transactions in Bitcoin.
• Smart contracts.
Under the hood
Under the hood
Under the hood
Under the hood
Under the hood
Under the hood
Under the hood
Under the hood
• The script says: that coins can be redeemed by person owns a public
identity and proves it.
• Script is a stack based language.
• Escrow transaction using multisig.
Under the hood
• Smart contracts.
• Solidity — Turing complete language working on EVM (Ethereum).
Not only currency
Not only currency — adToken
• Overview of adToken white paper
Not only currency — adToken
Not only currency — adToken
• http://bitcoinbook.cs.princeton.edu/
• https://en.bitcoin.it/
• https://blockchain.info/
Q & A

Mais conteúdo relacionado

Mais procurados

Cryptocurrency - Digital Currency
Cryptocurrency - Digital CurrencyCryptocurrency - Digital Currency
Cryptocurrency - Digital Currency
Sameer Satyam
 

Mais procurados (20)

Understanding Bitcoin
Understanding BitcoinUnderstanding Bitcoin
Understanding Bitcoin
 
Cryptocurrencies 101 v5 public
Cryptocurrencies 101 v5 publicCryptocurrencies 101 v5 public
Cryptocurrencies 101 v5 public
 
BitCoin Protocol
BitCoin ProtocolBitCoin Protocol
BitCoin Protocol
 
Investment Strategies in Bitcoin
Investment Strategies in BitcoinInvestment Strategies in Bitcoin
Investment Strategies in Bitcoin
 
Crypto Think Tank Presentation on Alternative Cryptocurrency Feb 16, 2014 at ...
Crypto Think Tank Presentation on Alternative Cryptocurrency Feb 16, 2014 at ...Crypto Think Tank Presentation on Alternative Cryptocurrency Feb 16, 2014 at ...
Crypto Think Tank Presentation on Alternative Cryptocurrency Feb 16, 2014 at ...
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
BITCOIN EXPLAINED
BITCOIN EXPLAINEDBITCOIN EXPLAINED
BITCOIN EXPLAINED
 
Bitcoin Transactions Examples
Bitcoin Transactions ExamplesBitcoin Transactions Examples
Bitcoin Transactions Examples
 
Cryptocurrency - Digital Currency
Cryptocurrency - Digital CurrencyCryptocurrency - Digital Currency
Cryptocurrency - Digital Currency
 
Crypto Currency
Crypto CurrencyCrypto Currency
Crypto Currency
 
Quick Understanding of Bitcoin/Cryptocurrency.
Quick Understanding of Bitcoin/Cryptocurrency.Quick Understanding of Bitcoin/Cryptocurrency.
Quick Understanding of Bitcoin/Cryptocurrency.
 
Blockchain overview, use cases, implementations and challenges
Blockchain overview, use cases, implementations and challengesBlockchain overview, use cases, implementations and challenges
Blockchain overview, use cases, implementations and challenges
 
Bitcoin Internal
Bitcoin InternalBitcoin Internal
Bitcoin Internal
 
Metadata in the Blockchain: The OP_RETURN Explosion
Metadata in the Blockchain: The OP_RETURN ExplosionMetadata in the Blockchain: The OP_RETURN Explosion
Metadata in the Blockchain: The OP_RETURN Explosion
 
Pi network
Pi networkPi network
Pi network
 
Bitcoin, Banking and the Blockchain
Bitcoin, Banking and the BlockchainBitcoin, Banking and the Blockchain
Bitcoin, Banking and the Blockchain
 
Intro to Blockchain Slides
Intro to Blockchain SlidesIntro to Blockchain Slides
Intro to Blockchain Slides
 
Cryptocurrency
CryptocurrencyCryptocurrency
Cryptocurrency
 
EDUCATION ON CRYPTOGRAPHY
EDUCATION ON CRYPTOGRAPHYEDUCATION ON CRYPTOGRAPHY
EDUCATION ON CRYPTOGRAPHY
 
14 Jan17- Nullmeets -Blockchain concept decoded by Ninad Sarang
14 Jan17- Nullmeets -Blockchain concept decoded by Ninad Sarang14 Jan17- Nullmeets -Blockchain concept decoded by Ninad Sarang
14 Jan17- Nullmeets -Blockchain concept decoded by Ninad Sarang
 

Semelhante a Introduction to blockchain and cryptocurrency technologies

BlockChain Techonology - Unit 1.pptx
BlockChain Techonology   -   Unit 1.pptxBlockChain Techonology   -   Unit 1.pptx
BlockChain Techonology - Unit 1.pptx
os3558995
 
CRYPTO CURRENCY-2022OD205.pdf
CRYPTO CURRENCY-2022OD205.pdfCRYPTO CURRENCY-2022OD205.pdf
CRYPTO CURRENCY-2022OD205.pdf
JESUNPK
 

Semelhante a Introduction to blockchain and cryptocurrency technologies (20)

BlockChain Techonology - Unit 1.pptx
BlockChain Techonology   -   Unit 1.pptxBlockChain Techonology   -   Unit 1.pptx
BlockChain Techonology - Unit 1.pptx
 
Blockchain - Presentacion Betabeers Galicia 10/12/2014
Blockchain - Presentacion Betabeers Galicia 10/12/2014Blockchain - Presentacion Betabeers Galicia 10/12/2014
Blockchain - Presentacion Betabeers Galicia 10/12/2014
 
01 what is blockchain
01 what is blockchain01 what is blockchain
01 what is blockchain
 
Chapter 2.pptx
Chapter 2.pptxChapter 2.pptx
Chapter 2.pptx
 
Icsa2018 blockchain tutorial
Icsa2018 blockchain tutorialIcsa2018 blockchain tutorial
Icsa2018 blockchain tutorial
 
BlockChain.pptx
BlockChain.pptxBlockChain.pptx
BlockChain.pptx
 
Blockchains 101
Blockchains 101Blockchains 101
Blockchains 101
 
Cryptocurrencies for Everyone (Dmytro Pershyn Technology Stream)
Cryptocurrencies for Everyone (Dmytro Pershyn Technology Stream)Cryptocurrencies for Everyone (Dmytro Pershyn Technology Stream)
Cryptocurrencies for Everyone (Dmytro Pershyn Technology Stream)
 
bitcoin
bitcoinbitcoin
bitcoin
 
15-Bitcoin.pptx
15-Bitcoin.pptx15-Bitcoin.pptx
15-Bitcoin.pptx
 
Blockchain and Bitcoin.pptx
Blockchain and Bitcoin.pptxBlockchain and Bitcoin.pptx
Blockchain and Bitcoin.pptx
 
CRYPTO CURRENCY-2022OD205.pdf
CRYPTO CURRENCY-2022OD205.pdfCRYPTO CURRENCY-2022OD205.pdf
CRYPTO CURRENCY-2022OD205.pdf
 
以比特幣為例的區塊鏈技術介紹 ( Intro to Blockchain using Bitcoin as an example)
以比特幣為例的區塊鏈技術介紹 ( Intro to Blockchain using Bitcoin as an example)以比特幣為例的區塊鏈技術介紹 ( Intro to Blockchain using Bitcoin as an example)
以比特幣為例的區塊鏈技術介紹 ( Intro to Blockchain using Bitcoin as an example)
 
Dissemination of knowledge on Secure Systems Engineering
Dissemination of knowledge on Secure Systems EngineeringDissemination of knowledge on Secure Systems Engineering
Dissemination of knowledge on Secure Systems Engineering
 
Blockchain Ecosystem and Cryptocurrency Regulations
Blockchain Ecosystem and Cryptocurrency RegulationsBlockchain Ecosystem and Cryptocurrency Regulations
Blockchain Ecosystem and Cryptocurrency Regulations
 
Idea To IPO Blockchain Slides
Idea To IPO Blockchain SlidesIdea To IPO Blockchain Slides
Idea To IPO Blockchain Slides
 
Understanding Blockchain
Understanding BlockchainUnderstanding Blockchain
Understanding Blockchain
 
Blockchain-Presentation.pptx
Blockchain-Presentation.pptxBlockchain-Presentation.pptx
Blockchain-Presentation.pptx
 
Blockchain
BlockchainBlockchain
Blockchain
 
Advanced Blockchain Technologies on Privacy & Scalability (All Things Open)
Advanced Blockchain Technologies on Privacy & Scalability (All Things Open) Advanced Blockchain Technologies on Privacy & Scalability (All Things Open)
Advanced Blockchain Technologies on Privacy & Scalability (All Things Open)
 

Último

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Introduction to blockchain and cryptocurrency technologies