CS 731: Blockchain Technology and Applications: Sandeep K. Shukla IIT Kanpur
CS 731: Blockchain Technology and Applications: Sandeep K. Shukla IIT Kanpur
CS 731: Blockchain Technology and Applications: Sandeep K. Shukla IIT Kanpur
Technology And
Applications
Sandeep K. Shukla
IIT Kanpur
C3I Center
Blockchain evolving from simple ledgers, to cryptlets that fetch trusted and
agreed-upon external data needed to execute Smart Contracts
Smart Contracts are unable to access external data or events based on time or market conditions. Calling code or data outside
of a Smart Contract or blockchain breaks the general trust barrier and authenticity of transactions. Cryptlets will allow the
blockchain to access external data securely, while maintaining the integrity of the blockchain.
Source: Cale Teeter
Acknowledgement
• The material of this lecture material is
mostly due to Prof. Arvind Narayanan’s
Lecture at Princeton and his book on
Bitcoin
Centralization vs. decentralization
Centralization vs. decentralization
Centralization has many advantages
Easy to manage
Easy to provision
Easy to ban
Easy to distribute responsibility …
Decentralizaton
Harder to manage
Harder to distribute work
Harder to ban
Harder to provision
But centralization has a single trusted party – weakness
Decentralization may be mixed with partial
centralization
E-mail:
decentralized protocol, but dominated by
centralized webmail services
Decentralization in Blockchain
1. Who maintains the ledger?
2. Who has authority over which transactions are valid?
3. Who creates new bitcoins?
4. Who determines how the rules of the system change?
5. How do bitcoins acquire exchange value?
Mining:
open to anyone, but inevitable concentration of power
often seen as undesirable
Updates to software:
core developers trusted by community, have great
power
Distributed consensus
Bitcoin’s key challenge
distributed consensus
Why consensus protocols?
signed by you
Pay to pkRavi : H( )
Tx Tx This Photo by Unknown
Author is licensed under
Tx Tx CC BY
… …
This Photo by Unknown Author is licensed
under CC BY‐ND
Tx Tx
Network is imperfect
• Not all pairs of nodes connected
• Faults in network
• Latency
Example: Paxos
Introduces incentives
• Possible only because it’s a currency!
Embraces randomness
• Eventual consistency – no deadline for consensus
• Consensus happens over long time scales — about 1 hour
Consensus without identity: the
block chain
Why identity?
Double-
signed by A spending
CA → B attack
Pay to pkB : H( )
signed by A
CA → A’
Pay to pkA’ : H( )
CA → B
CA → A’ double-spend
attempt
Double-spend probability
Hear about CA → B transaction decreases exponentially with #
0 confirmations of confirmations
Year
Incentive 2: transaction fees
Target
space
110 x10^18 Hashes per second
PoW property 2: parameterizable cost
10
minutes
Probability density
Complications:
• fixed vs. variable costs
• reward depends on global hash rate
Putting it all together
Summary
security of
block chain
health of
value of
mining
currency
ecosystem
What can a “51% attacker” do?