SlideShare uma empresa Scribd logo
1 de 32
Baixar para ler offline
Fundamentals of Cryptoeconomics
Pranay Prateek
Why?
Why do Bitcoin miners follow the protocol rather
than include transactions benefiting them?
Afterall, no one directly controls them - No governance
Incentives
Outline
● What is Cryptoeconomics?
● Features of cryptoeconomic systems
● Modelling a cryptoeconomic system
● Mechanism Design
● Discussion of Casper protocol
● Mechanism design in blockchain projects
● Q&A
What is Cryptoeconomics?
Crypto Economics is the application of incentive
mechanism design to information security problems
Bitcoin as an instance of cryptoeconomic system
What is the information security problem?
Transfer of value in a trustless and decentralised manner
Design
● Need to agree on a universal - Nakamoto consensus
● Uses tokens (BTC) to incentivise miners to keep the system running
● Proof-of-work as an anti-Sybil mechanism
● Following the protocol should be the equilibrium
Bitcoin Mining
https://www.slideshare.net/wenyingng/bitcoin-20-47421199
Features of a cryptoeconomic system
Stability - Is following the protocol an equilibrium
Persistence - If the system falls out of equilibrium, does it recover
Optimality - Does following the protocol maximise the quality of outcomes
Robustness - Can the protocol withstand perturbations in player’s incentives
Efficiency - Is the incentive mechanism economically efficient? Is it efficiently
computable?
[Vlad Zamfir, BIP’001]
Modelling a cryptoeconomic system
1. Level of coordination of participants
2. Budget and cost of attacks
3. Incentives
4. Attack Models
5. Consensus mechanism
Coordination Level and Cost
Traditional Fault Tolerance Research (in context of distributed systems)
Honest majority model - assumes at least 51% of participants are honest.
Cryptoeconomic systems are more complex
Parameters for examining fault tolerance
1. The level of coordination between participants
2. The budget of the attacker (maximum amount the attacker would have to pay)
3. The cost of the attacker (the actual cost incurred by the attacker)
Incentives
1. Payments, such as mining rewards
2. Privileges, which allow their holders to extract rents, such
as transaction fees.
Incentives dictate the behavior of the participants of
the decentralised system
Attack Models
Uncoordinated majority models
● Participants make independent choice
● No player controls more than given % of the network
● Participants are self-interested
● Not necessarily honest
Coordinated choice models
● Actors are colluding
Bribing attacker model
Schelling Coin game
Property: provide the “true answer” to a given question
eg. who won the election?
Algorithm:
● Everyone votes 1 or 0
● Majority answer is taken as correct
● Everyone who voted with majority given reward of P, all
others get nothing
[Vitalik Buterin, Cryptoeconomics]
Uncoordinated choice model
Uncoordinated choice: you have the incentive to vote the truth, because everyone
else will vote the truth and you only get a reward of P if you agree with them
Why will everyone else vote the truth? Because they are reasoning in the same way
that you are!
You vote 0 You vote 1
Others vote 0 P 0
Others vote 1 0 P
Example : Bribing attacker model
A model that starts off with an uncoordinated choice assumption, but also assumes
that there is an attacker capable of making payments to actors conditional of them
taking certain actions
● Suppose there are 2 outcomes 0 and 1
● Briber asks everyone to vote for 1. If 1 is not the majority vote, then he will pay
them P+e, otherwise nothing.
[Vitalik Buterin, Cryptoeconomics]
P + epsilon attack
Base Game With bribe
A bribing attacker can corrupt the Schelling coin game with a budget of P + ε and
zero cost!
You vote 0 You vote 1
Others vote 0 P 0
Others vote 1 0 P
You vote 0 You vote 1
Others vote 0 P P+ε
Others vote 1 0 P
Possible attacks on Bitcoin network
1. 51% attack - Censorship
2. Selfish Mining attack - Needs only 25% collusion
3. Zeitgeist attack - This is a 51% attack where the attacker
sets the block timestamps artificially to lower the difficulty
Consensus types
Nakamoto Consensus - Doesn’t reach finality. There is always a chance of
blockchain getting forked
Practical BFT Consensus - Hyperledger, Stellar and Ripple
Proof of Stake Consensus - e.g. Casper
● Slashing conditions
● Forfeiture of deposits
● Fully and partially attributable faults
Mechanism Design
Key Question
How do you design systems, that have strategic participants, so that the end result
is something you want.
● Reverse Game Theory
● Auction theory is an application of mechanism design
Examples of Mechanism Design
Auction Design - Objective is to give the item to players who has highest
valuation for the item on sale. Sealed bidding
What should be the auction rule?
1. The highest bidder wins. The price they win is equal to the amount they bid.
2. The highest bidder wins. The price they pay is equal to the 2nd highest bid.
Ethereum - Casper
Casper is a PoS consensus algorithm designed for Ethereum blockchain
Proof of Stake (PoS) is a category of consensus algorithms for public blockchains
that depend on a validator's economic stake in the network
Slashing conditions - Penalising violators
Build on both chain - Nothing at Stake
https://github.com/ethereum/wiki/wiki/Proof-of-Stake-FAQ
Proof of Work
https://github.com/ethereum/wiki/wiki/Proof-of-Stake-FAQ
Penalizing violators - Slasher
https://github.com/ethereum/wiki/wiki/Proof-of-Stake-FAQ
Token Design
A token is nothing but a term denoting a unit of value issued by a project or
company.
● This unit of value can be used to reward users who participate in the
project and perform particular actions
● It can be used as transaction fees for getting a specific service on the
network
How to design a token mechanism which serves the objective of the
platform?
Token Design Example
Content Portal - CP token
Objective - To create good content on different topics
People who are interested in different topics can back them.
3 Topics
e.g CRYPTOCURRENCY, POLITICS, INDIA
- Curators assigned to each topic - Other people back these curators
- You get reward in CP token if more people like your topic. The reward is
proportional to number of tokens you back a post with
Truth is not necessarily the schelling point. So people will stake money
which people will find more attractive
So, the platform becomes useless as a good source of content and only acts
as a way for people to increase sensationalization.
https://steemit.com/trending/cryptocurrency
Topic 1
Post 1 Post 2 Post 3
5 1 2
Topic 2
Post 1 Post 2 Post 3
4 1 3
How can we fix this?
Summary
● Incentives are a powerful tool
● Following the protocol should be an equilibrium
● The protocol should be robust to external
incentives
● Following the protocol should achieve the
intended objective
Further Readings
1. Course on Mechanism design - https://theory.stanford.edu/~tim/f13/f13.html
2. Proof of Stake FAQ - https://github.com/ethereum/wiki/wiki/Proof-of-Stake-FAQ
3. Cryptoeconomics reading list -
https://github.com/ethereummadrid/cryptoeconomics-reading-list
Thanks!
@pranay01 pranay01.com

Mais conteúdo relacionado

Mais procurados

Introduction to database
Introduction to databaseIntroduction to database
Introduction to databaseSuleman Memon
 
Producer consumer problem operating system
Producer consumer problem operating systemProducer consumer problem operating system
Producer consumer problem operating systemAl Mamun
 
Database ,14 Parallel DBMS
Database ,14 Parallel DBMSDatabase ,14 Parallel DBMS
Database ,14 Parallel DBMSAli Usman
 
Target language in compiler design
Target language in compiler designTarget language in compiler design
Target language in compiler designMuhammad Haroon
 
Planning in AI(Partial order planning)
Planning in AI(Partial order planning)Planning in AI(Partial order planning)
Planning in AI(Partial order planning)Vicky Tyagi
 
Version spaces
Version spacesVersion spaces
Version spacesGekkietje
 
P, NP, NP-Complete, and NP-Hard
P, NP, NP-Complete, and NP-HardP, NP, NP-Complete, and NP-Hard
P, NP, NP-Complete, and NP-HardAnimesh Chaturvedi
 
Functional Programming in R
Functional Programming in RFunctional Programming in R
Functional Programming in RSoumendra Dhanee
 
Computational Complexity: Complexity Classes
Computational Complexity: Complexity ClassesComputational Complexity: Complexity Classes
Computational Complexity: Complexity ClassesAntonis Antonopoulos
 
BACKUP & RECOVERY IN DBMS
BACKUP & RECOVERY IN DBMSBACKUP & RECOVERY IN DBMS
BACKUP & RECOVERY IN DBMSBaivabiNayak
 
Backtracking-N Queens Problem-Graph Coloring-Hamiltonian cycle
Backtracking-N Queens Problem-Graph Coloring-Hamiltonian cycleBacktracking-N Queens Problem-Graph Coloring-Hamiltonian cycle
Backtracking-N Queens Problem-Graph Coloring-Hamiltonian cyclevarun arora
 
PROLOG: Matching And Proof Search In Prolog
PROLOG: Matching And Proof Search In PrologPROLOG: Matching And Proof Search In Prolog
PROLOG: Matching And Proof Search In PrologDataminingTools Inc
 
Dead Lock in operating system
Dead Lock in operating systemDead Lock in operating system
Dead Lock in operating systemAli Haider
 
20. Parallel Databases in DBMS
20. Parallel Databases in DBMS20. Parallel Databases in DBMS
20. Parallel Databases in DBMSkoolkampus
 

Mais procurados (20)

Introduction to database
Introduction to databaseIntroduction to database
Introduction to database
 
Producer consumer problem operating system
Producer consumer problem operating systemProducer consumer problem operating system
Producer consumer problem operating system
 
Deadlock
DeadlockDeadlock
Deadlock
 
Parallel Database
Parallel DatabaseParallel Database
Parallel Database
 
Database ,14 Parallel DBMS
Database ,14 Parallel DBMSDatabase ,14 Parallel DBMS
Database ,14 Parallel DBMS
 
Target language in compiler design
Target language in compiler designTarget language in compiler design
Target language in compiler design
 
Planning in AI(Partial order planning)
Planning in AI(Partial order planning)Planning in AI(Partial order planning)
Planning in AI(Partial order planning)
 
Version spaces
Version spacesVersion spaces
Version spaces
 
P, NP, NP-Complete, and NP-Hard
P, NP, NP-Complete, and NP-HardP, NP, NP-Complete, and NP-Hard
P, NP, NP-Complete, and NP-Hard
 
Database recovery
Database recoveryDatabase recovery
Database recovery
 
Functional Programming in R
Functional Programming in RFunctional Programming in R
Functional Programming in R
 
Computational Complexity: Complexity Classes
Computational Complexity: Complexity ClassesComputational Complexity: Complexity Classes
Computational Complexity: Complexity Classes
 
Buffering.pptx
Buffering.pptxBuffering.pptx
Buffering.pptx
 
BACKUP & RECOVERY IN DBMS
BACKUP & RECOVERY IN DBMSBACKUP & RECOVERY IN DBMS
BACKUP & RECOVERY IN DBMS
 
Backtracking-N Queens Problem-Graph Coloring-Hamiltonian cycle
Backtracking-N Queens Problem-Graph Coloring-Hamiltonian cycleBacktracking-N Queens Problem-Graph Coloring-Hamiltonian cycle
Backtracking-N Queens Problem-Graph Coloring-Hamiltonian cycle
 
PROLOG: Matching And Proof Search In Prolog
PROLOG: Matching And Proof Search In PrologPROLOG: Matching And Proof Search In Prolog
PROLOG: Matching And Proof Search In Prolog
 
Dead Lock in operating system
Dead Lock in operating systemDead Lock in operating system
Dead Lock in operating system
 
The bounded buffer
The bounded bufferThe bounded buffer
The bounded buffer
 
20. Parallel Databases in DBMS
20. Parallel Databases in DBMS20. Parallel Databases in DBMS
20. Parallel Databases in DBMS
 
5 csp
5 csp5 csp
5 csp
 

Semelhante a Fundamentals of Cryptoeconomics

Blockchain Intro + Myths
Blockchain Intro + MythsBlockchain Intro + Myths
Blockchain Intro + MythsAPIGarage
 
Ico processes n_li
Ico processes n_liIco processes n_li
Ico processes n_linikinew1
 
Blockchain Projects - Core Pillars of Shipping Product, Feb 2018
Blockchain Projects - Core Pillars of Shipping Product, Feb 2018Blockchain Projects - Core Pillars of Shipping Product, Feb 2018
Blockchain Projects - Core Pillars of Shipping Product, Feb 2018🔗Audrey Chaing
 
Crypto Token Economy Design for Disruptive BM
Crypto Token Economy Design for Disruptive BMCrypto Token Economy Design for Disruptive BM
Crypto Token Economy Design for Disruptive BMJongseung Kim
 
Week 4 - DApps, Smart Contracts, and Decentralized Incentive Systems
Week 4 - DApps, Smart Contracts, and Decentralized Incentive SystemsWeek 4 - DApps, Smart Contracts, and Decentralized Incentive Systems
Week 4 - DApps, Smart Contracts, and Decentralized Incentive SystemsRoger Royse
 
Designing Blockchain Incentive Systems
Designing Blockchain Incentive SystemsDesigning Blockchain Incentive Systems
Designing Blockchain Incentive SystemsPaulo Fonseca
 
Blockchain tutorial for MBA
Blockchain tutorial for MBABlockchain tutorial for MBA
Blockchain tutorial for MBABlokcert
 
Ethereum Mining How To
Ethereum Mining How ToEthereum Mining How To
Ethereum Mining How ToNugroho Gito
 
Application of machine learning algorithms for Bitcoin Automated Trading.
Application of machine learning algorithms for Bitcoin Automated Trading.Application of machine learning algorithms for Bitcoin Automated Trading.
Application of machine learning algorithms for Bitcoin Automated Trading.PranavGarg36
 
Introduction to Blockchain and BitCoin New Business Opportunties
Introduction to Blockchain and BitCoin New Business OpportuntiesIntroduction to Blockchain and BitCoin New Business Opportunties
Introduction to Blockchain and BitCoin New Business OpportuntiesValue Amplify Consulting
 
BitCoin Price Predictor.pptx
BitCoin Price Predictor.pptxBitCoin Price Predictor.pptx
BitCoin Price Predictor.pptxIrfan Anjum
 
Governance for public Blockchains and DAOs - by Vitalik Buterin
Governance for public Blockchains and DAOs - by Vitalik ButerinGovernance for public Blockchains and DAOs - by Vitalik Buterin
Governance for public Blockchains and DAOs - by Vitalik ButerinMartin Köppelmann
 
Token(ed) meetup jan 31st
Token(ed) meetup jan 31stToken(ed) meetup jan 31st
Token(ed) meetup jan 31stPropulsive
 
Can we safely adapt the construction of permissionless blockchain to user dem...
Can we safely adapt the construction of permissionless blockchain to user dem...Can we safely adapt the construction of permissionless blockchain to user dem...
Can we safely adapt the construction of permissionless blockchain to user dem...I MT
 

Semelhante a Fundamentals of Cryptoeconomics (20)

Blockchain Intro + Myths
Blockchain Intro + MythsBlockchain Intro + Myths
Blockchain Intro + Myths
 
Ico processes n_li
Ico processes n_liIco processes n_li
Ico processes n_li
 
Managing Initial Coin Offerings
Managing Initial Coin OfferingsManaging Initial Coin Offerings
Managing Initial Coin Offerings
 
Blockchain Projects - Core Pillars of Shipping Product, Feb 2018
Blockchain Projects - Core Pillars of Shipping Product, Feb 2018Blockchain Projects - Core Pillars of Shipping Product, Feb 2018
Blockchain Projects - Core Pillars of Shipping Product, Feb 2018
 
Crypto Token Economy Design for Disruptive BM
Crypto Token Economy Design for Disruptive BMCrypto Token Economy Design for Disruptive BM
Crypto Token Economy Design for Disruptive BM
 
Bitcoin 2.0
Bitcoin 2.0 Bitcoin 2.0
Bitcoin 2.0
 
Week 4 - DApps, Smart Contracts, and Decentralized Incentive Systems
Week 4 - DApps, Smart Contracts, and Decentralized Incentive SystemsWeek 4 - DApps, Smart Contracts, and Decentralized Incentive Systems
Week 4 - DApps, Smart Contracts, and Decentralized Incentive Systems
 
Designing Blockchain Incentive Systems
Designing Blockchain Incentive SystemsDesigning Blockchain Incentive Systems
Designing Blockchain Incentive Systems
 
What is Blockchain?
What is Blockchain?What is Blockchain?
What is Blockchain?
 
What is Blockchain
What is BlockchainWhat is Blockchain
What is Blockchain
 
Blockchain tutorial for MBA
Blockchain tutorial for MBABlockchain tutorial for MBA
Blockchain tutorial for MBA
 
Ethereum Mining How To
Ethereum Mining How ToEthereum Mining How To
Ethereum Mining How To
 
Application of machine learning algorithms for Bitcoin Automated Trading.
Application of machine learning algorithms for Bitcoin Automated Trading.Application of machine learning algorithms for Bitcoin Automated Trading.
Application of machine learning algorithms for Bitcoin Automated Trading.
 
Introduction to Blockchain and BitCoin New Business Opportunties
Introduction to Blockchain and BitCoin New Business OpportuntiesIntroduction to Blockchain and BitCoin New Business Opportunties
Introduction to Blockchain and BitCoin New Business Opportunties
 
BitCoin Price Predictor.pptx
BitCoin Price Predictor.pptxBitCoin Price Predictor.pptx
BitCoin Price Predictor.pptx
 
01 what is blockchain
01 what is blockchain01 what is blockchain
01 what is blockchain
 
Governance for public Blockchains and DAOs - by Vitalik Buterin
Governance for public Blockchains and DAOs - by Vitalik ButerinGovernance for public Blockchains and DAOs - by Vitalik Buterin
Governance for public Blockchains and DAOs - by Vitalik Buterin
 
Token(ed) meetup jan 31st
Token(ed) meetup jan 31stToken(ed) meetup jan 31st
Token(ed) meetup jan 31st
 
crypto ppt.ppt
crypto ppt.pptcrypto ppt.ppt
crypto ppt.ppt
 
Can we safely adapt the construction of permissionless blockchain to user dem...
Can we safely adapt the construction of permissionless blockchain to user dem...Can we safely adapt the construction of permissionless blockchain to user dem...
Can we safely adapt the construction of permissionless blockchain to user dem...
 

Último

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Último (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

Fundamentals of Cryptoeconomics

  • 3. Why do Bitcoin miners follow the protocol rather than include transactions benefiting them? Afterall, no one directly controls them - No governance
  • 5. Outline ● What is Cryptoeconomics? ● Features of cryptoeconomic systems ● Modelling a cryptoeconomic system ● Mechanism Design ● Discussion of Casper protocol ● Mechanism design in blockchain projects ● Q&A
  • 6. What is Cryptoeconomics? Crypto Economics is the application of incentive mechanism design to information security problems
  • 7. Bitcoin as an instance of cryptoeconomic system What is the information security problem? Transfer of value in a trustless and decentralised manner Design ● Need to agree on a universal - Nakamoto consensus ● Uses tokens (BTC) to incentivise miners to keep the system running ● Proof-of-work as an anti-Sybil mechanism ● Following the protocol should be the equilibrium
  • 9. Features of a cryptoeconomic system Stability - Is following the protocol an equilibrium Persistence - If the system falls out of equilibrium, does it recover Optimality - Does following the protocol maximise the quality of outcomes Robustness - Can the protocol withstand perturbations in player’s incentives Efficiency - Is the incentive mechanism economically efficient? Is it efficiently computable? [Vlad Zamfir, BIP’001]
  • 10. Modelling a cryptoeconomic system 1. Level of coordination of participants 2. Budget and cost of attacks 3. Incentives 4. Attack Models 5. Consensus mechanism
  • 11. Coordination Level and Cost Traditional Fault Tolerance Research (in context of distributed systems) Honest majority model - assumes at least 51% of participants are honest. Cryptoeconomic systems are more complex Parameters for examining fault tolerance 1. The level of coordination between participants 2. The budget of the attacker (maximum amount the attacker would have to pay) 3. The cost of the attacker (the actual cost incurred by the attacker)
  • 12. Incentives 1. Payments, such as mining rewards 2. Privileges, which allow their holders to extract rents, such as transaction fees. Incentives dictate the behavior of the participants of the decentralised system
  • 13. Attack Models Uncoordinated majority models ● Participants make independent choice ● No player controls more than given % of the network ● Participants are self-interested ● Not necessarily honest Coordinated choice models ● Actors are colluding Bribing attacker model
  • 14. Schelling Coin game Property: provide the “true answer” to a given question eg. who won the election? Algorithm: ● Everyone votes 1 or 0 ● Majority answer is taken as correct ● Everyone who voted with majority given reward of P, all others get nothing [Vitalik Buterin, Cryptoeconomics]
  • 15. Uncoordinated choice model Uncoordinated choice: you have the incentive to vote the truth, because everyone else will vote the truth and you only get a reward of P if you agree with them Why will everyone else vote the truth? Because they are reasoning in the same way that you are! You vote 0 You vote 1 Others vote 0 P 0 Others vote 1 0 P
  • 16. Example : Bribing attacker model A model that starts off with an uncoordinated choice assumption, but also assumes that there is an attacker capable of making payments to actors conditional of them taking certain actions ● Suppose there are 2 outcomes 0 and 1 ● Briber asks everyone to vote for 1. If 1 is not the majority vote, then he will pay them P+e, otherwise nothing. [Vitalik Buterin, Cryptoeconomics]
  • 17. P + epsilon attack Base Game With bribe A bribing attacker can corrupt the Schelling coin game with a budget of P + ε and zero cost! You vote 0 You vote 1 Others vote 0 P 0 Others vote 1 0 P You vote 0 You vote 1 Others vote 0 P P+ε Others vote 1 0 P
  • 18. Possible attacks on Bitcoin network 1. 51% attack - Censorship 2. Selfish Mining attack - Needs only 25% collusion 3. Zeitgeist attack - This is a 51% attack where the attacker sets the block timestamps artificially to lower the difficulty
  • 19. Consensus types Nakamoto Consensus - Doesn’t reach finality. There is always a chance of blockchain getting forked Practical BFT Consensus - Hyperledger, Stellar and Ripple Proof of Stake Consensus - e.g. Casper ● Slashing conditions ● Forfeiture of deposits ● Fully and partially attributable faults
  • 20. Mechanism Design Key Question How do you design systems, that have strategic participants, so that the end result is something you want. ● Reverse Game Theory ● Auction theory is an application of mechanism design
  • 21. Examples of Mechanism Design Auction Design - Objective is to give the item to players who has highest valuation for the item on sale. Sealed bidding What should be the auction rule? 1. The highest bidder wins. The price they win is equal to the amount they bid. 2. The highest bidder wins. The price they pay is equal to the 2nd highest bid.
  • 22. Ethereum - Casper Casper is a PoS consensus algorithm designed for Ethereum blockchain Proof of Stake (PoS) is a category of consensus algorithms for public blockchains that depend on a validator's economic stake in the network Slashing conditions - Penalising violators
  • 23. Build on both chain - Nothing at Stake https://github.com/ethereum/wiki/wiki/Proof-of-Stake-FAQ
  • 25. Penalizing violators - Slasher https://github.com/ethereum/wiki/wiki/Proof-of-Stake-FAQ
  • 26. Token Design A token is nothing but a term denoting a unit of value issued by a project or company. ● This unit of value can be used to reward users who participate in the project and perform particular actions ● It can be used as transaction fees for getting a specific service on the network How to design a token mechanism which serves the objective of the platform?
  • 27. Token Design Example Content Portal - CP token Objective - To create good content on different topics People who are interested in different topics can back them. 3 Topics e.g CRYPTOCURRENCY, POLITICS, INDIA - Curators assigned to each topic - Other people back these curators - You get reward in CP token if more people like your topic. The reward is proportional to number of tokens you back a post with
  • 28. Truth is not necessarily the schelling point. So people will stake money which people will find more attractive So, the platform becomes useless as a good source of content and only acts as a way for people to increase sensationalization. https://steemit.com/trending/cryptocurrency Topic 1 Post 1 Post 2 Post 3 5 1 2 Topic 2 Post 1 Post 2 Post 3 4 1 3
  • 29. How can we fix this?
  • 30. Summary ● Incentives are a powerful tool ● Following the protocol should be an equilibrium ● The protocol should be robust to external incentives ● Following the protocol should achieve the intended objective
  • 31. Further Readings 1. Course on Mechanism design - https://theory.stanford.edu/~tim/f13/f13.html 2. Proof of Stake FAQ - https://github.com/ethereum/wiki/wiki/Proof-of-Stake-FAQ 3. Cryptoeconomics reading list - https://github.com/ethereummadrid/cryptoeconomics-reading-list