Bitcoin and Crypto Currency

These are notes that I have kept during the process of learning more about bitcoin and crypto currency

Sources:

https://www.dropbox.com/s/anqtj2if3s0vlw7/princeton_bitcoin_book.pdf?dl=0

https://www.dropbox.com/s/anqtj2if3s0vlw7/princeton_bitcoin_book.pdf?dl=0


Cryptographic Hash Functions

Commitment API

Summary: The committment API is how cryptographic hash functions work. This is basically a starter to how public/private key encryption through hashing works

How the commitment API works

//applying a commit function to a message, will return a com(committment val) and a key //property 1: Hiding - Given only com, its infeasible for anyone to find out the message so the message itself is hidden

(com, key) := commit(msg)

//publish key, msg and the user presumably already has com this will allow the user to verify the mesasge //property 2: Binding - Its infeasible to find a message2 such that verify(commit(msg), message2, key) == true. This basically is there to ensure that once you have committed to a message you cannot modify and use the commitment with a different message

match := verify(com, key, msg)

Hash Pointers

Summary: Hash pointers provide a mechanism to have the following properties.

Purpose of a hash pointer:

  • pointer to get information back
  • erify the information has not changed
  • CAN WORK FOR ANY DATA STRUCTURE WITH NO CYCLES!!!
  • Can be used to create simple trusted blockchains
    A tamper-evident hash pointer based blockchain

Merkle tree - consecutive data blocks which are stored as tamper evident (advantage is that it shows a fast membership for any data being a part of the merkle tree (blockchain will require a full pass, this is O(logn))


Simple Bitcoin Schemes

The following are two examples of dumb bit-coins which work but have obvious problems:

Goofy Coin

Rules for Goofy coin:

- Goofy can create new coin
- Goofy can create a new coin
- Can send coin to someone else

Transactions are done in a block chain fashion as follows

  1. Goofy creates a coin, and it is signed by Goofy’s private key
  2. this is then paid to alice and alice now owns the hash

Pros: It’s decentralized

Cons: Double Spending Attack : It’s impossible to detect if the user sends the same coin to multiple users thereby spending it again, since all of those block chains can be verified as “untampered”

Scrooge Coin

As an optimization each block is multiple transaction

Create coin functionality

Every coin is created and published

  • It’s assigned to a recepient (public key)
  • Each coin has a ID

Pay coins functionality

Each block as explained earlier can have multiple transactions

  • consumes valid coins

  • coins that are not already consumed

  • create new coins equal to the value of the consumed coins

  • Signature: signature of all the owners

  • Coins are immutable they are created and destroyed, but they belong to the same user when they were created

Pros:

No Double spending attack

Cons

The problem here is a centralized transaction management system, Scrooge is the coin creator and destroyer since scrooge keeps the history

  • Can we have a decentralized trusted mechanism
  • How can people agree on validity of transactions
  • How to give ID’s to these transactions?

Decentralization in Bitcoin

Summary: TBD

Important aspects to remember

  1. Who maintains the ledger of transactions?
  2. Who has authority over which transactions are valid?
  3. Who creates new bitcoins?
  4. Who determines how the rules of the system change?
  5. How do bitcoins acquire exchange value?

Distributed Consensus

Problems with current distributed consensus protocols (Impossibility Result):

  • Byzantine Generals Problem
  • Fischer Lynch Paterson

Paxos - never produces inconsistent result, but under some conditions can get stuck.

Nipun:

  • Why not use PAXOS for bitcoin consensus an already existing agreed upon consensus protocol? Paxos is designed more for distributed systems, and doesn’t work as well for bitcoin

Assumptions:

  • Bitcoin nodes have no identity
    • Identity is hard in a P2P system - Sybil attack
    • Psudonymity is a goad of bitcoin

Bitcoin distributed consensus protocol

The problem we are trying to solve is a distributed consensus protocol, where a chain of trust can be maintained. Remember that there is no identity for each of the nodes in the blockchain rather the blockchain is provided tokens!

Potential attacks:

  • Sybil attack
  • Double spend attack

Bitcoin consensus algorithm (simplified) This algorithm is simplified in that it assumes the ability to select a random node in a manner that is not vulnerable to Sybil attacks.

  1. New transactions are broadcast to all nodes
  2. Each node collects new transactions into a block
  3. In each round a r andom node gets to broadcast its block
  4. Other nodes accept the block only if all transactions in it are valid (unspent, valid signatures)
  5. Nodes express their acceptance of the block by including its hash in the next block they create

The following is an example of a double spend attack.

In this attack Alice is a malicious agent, who defrauds user Bob by sending him some money and then sends the same bitcoin to herself using a pseudonym. Given that Bob allows the transaction to proceed immediately after receiving the money, there is a high probability that the Ca→A’ transaction will proceed having the longer chain rather than the Ca→B transaction. Thus being a successful attack

Now let us see how bitcoin defends against this attack by seeing the same transaction from Bob’s viewpoint.

So there is no consensus guarantee, but after several confirmations there is a very high probability that the transaction is true and finished.

Incentivize nodes for working honestly

Computer Scientist/Software Engineer