The top three winners and a finalist of the event are all Ethereum-based platforms.

On February 14, 2017, the winners of the Blockchain Virtual GovHack were announced during a presentation ceremony at the World Government Summit, a government-sponsored event that took place in Dubai that focused on smart city initiatives and blockchain powered governance.

Project Oaken took home first prize with their Tesla on the blockchain submission, which combines IoT hardware and software for smart cars to operate toll systems autonomously (machine-to-machine) through the use of smart contracts. Second place went to HealthBlocks, a platform to gather, store, use, and exchange health information of patients, and third place was awarded to Dubai Land Registry, with the mission of digitizing title deeds on the blockchain. Finalist and recipient of the “2017 Year of Giving Award,” was Hypergive, a digital food wallet that helps feed homeless and hungry people in the community in a secure and transparent manner.

Weiterlesen

An alliance of about 30 companies, including Microsoft and JPMorgan Chase, has plans to standardize data gathering and tracking with software that is seen as harder to hack.

SAN FRANCISCO — Microsoft, JPMorgan Chase and other corporate giants are joining forces to create a new kind of computing system based on the virtual currency network Ethereum.

Some 30 companies are set to announce on Tuesday the formation of the Enterprise Ethereum Alliance, which will create a standard version of the Ethereum software that businesses around the world can use to track data and financial contracts.

The new organization, a nonprofit, is part of a broader movement to harness the technological concept known as the blockchain, which was introduced to the world by Bitcoin.

Blockchains offer a way for unrelated computers and companies to simultaneously collect and store information without relying on a central authority, similar to the way that Wikipedia is written and maintained by a group of writers and editors rather than a single author.

Continue reading the main story

Weiterlesen

Ethereum, Digital Asset, R3, and more go head-to-head in this detailed blockchain study by Aite Group.

Research and advisory firm Aite Group is preparing to release a detailed comparison of what it deems the ‚Top 10‘ distributed ledger platforms suited for securities settlement.

After eight months of research, including lengthy interviews with each of the platforms included, the report’s author Javier Paz has crafted a side-by-side analysis complete with defining characteristics, ranging from the project’s consensus mechanism to business model.

At the end of the 80-page report, Paz draws a series of conclusions for sectors including regulators and cloud providers.

But, Paz reserves his sternest conclusion for financial technology vendors not yet dealing in distributed ledger, or as he calls it, elsewhere in the report, ‚chaintech‘.

„Blockchain hype is high,“ he writes. „But the threat to traditional fintech vendors is real.“

Paz continues:

„This is the time for vendors to pivot and decide whether to acquire or develop relevant blockchain technology, years before a vendor’s client feel that a move to blockchain technology is required.“

Path to profit

Platforms selected based on their potential to more quickly and transparently conduct post-trade securities settlement include Axoni, Chain, Digital Asset, Ethereum, Hyperledger, Nasdaq, R3, Setl, Symbiont and tØ.

The report details how each of the firms earns money, or intends to earn money. Most plan to give away the building blocks of their services for free as part of various open-source licenses.

While giving enterprising companies the ability to build solutions from scratch, the startups will charge licensing fees to use the application layers they themselves have built.

Of the 10 firms, only Hyperledger and the Ethereum Foundation do not provide development teams to potential customers for a fee, instead relying on third-party consulting firms to help potential users build with the code.

But what is not mentioned is the price.

„Buyers and sellers discover the equilibrium price for that new thing after a good deal of haggling and window shopping,“ Paz writes. „Similarly, neither chaintech vendors nor their target audience has a perfectly clear sense of what should be the price tag for the new service.“

Blockchain fees

Tech dive

Another notable side-by-side comparison is the consensus mechanisms employed by each of the groups.

Of the numerous criteria, only Digital Assset, ethereum and Setl are not marked with the category „nodes using confederated consensus“.

„A growing trend, adopted by five chaintech platforms and spearheaded by R3,“ writes Paz, „calls for consensus taking place at the transaction level, requiring the consent of at least two counterparty nodes.“

Blockchain consensus

In conversation with CoinDesk, Javier Paz admitted that, in part, the exercise of aggregating so much data was part of his own personal attempt to better understand the technology.

But other than for his own gratification, Paz says the report is aimed at C-suite executives, regulators and platform developers themselves, who he believes might become so focused on their own projects that they lose sight of the competition.

For the report, Paz sifted through oral interviews, written responses, and schematics provided by 30 senior executives from 16 blockchain firms, four financial market utilities and others in search of the comparison points.

He estimates that the methodology could cut down on a reader’s learning curve by between one month and three months.

The full report is due out later this month.

Disclosure: CoinDesk is a subsidiary of Digital Currency Group, which has an ownership stake in Chain and Axoni.

Measuring cups via Shutterstock

Quelle: ‚Top 10‘ Blockchains Report Concludes: Now is the Time to Pivot – CoinDesk

Blockchains are beginning to turn green. This post describes some of the IC3 research in this direction.

The glorious view from our windows at Cornell Tech takes in 432 Park Avenue, the tallest residential building in the world. This tower is a monument to many things. Above all, for a student of Financial systems, it epitomizes ways to store wealth with breathtaking waste. (Fittingly, it was inspired by a wastepaper basket, shown to the right.) Buildings like it are sprouting up around NYC as investment vehicles for the ultra-wealthy, and their owners don’t actually live much in them. 432 Park and its ilk are essentially hollow vaults.

Something similar can be said for Bitcoin. As a concept and technological inspiration, Bitcoin is a marvelous thing. And unquestionably like 432 Park, it does see legitimate and valuable uses (and some shady ones). As a currency, though, Bitcoin serves in no small degree as a wasteful and ecologically damaging way for people to park their money.

There are a number of ways to substantiate this claim. One is in terms of its electricity consumption. Estimates vary, but it is likely that the Bitcoin network consumes roughly as much electricity as a nuclear reactor, about 1/3 of the entire electricity consumption of the entire country of Ireland. (See our back-of-the-envelope calculations in the blog notes.) To view this in another light, a recent IC3 paper estimated the cost-per-confirmed transaction at as much as $6.20 in capital costs and electricity. (Transaction rates have been rising, and today the figure is substantially lower, but still high.) That’s $6.20 in resources per transaction to move money between accounts in the same system.

Bitcoin proponents argue that this is simply the cost of decentralization. A credit-card network doesn’t provide the pseudonymity, freedom from government interference, portability, and other features of Bitcoin, so it isn’t comparable. This is true. But it isn’t a law of nature that a system like Bitcoin should be so resource-intensive. Researchers at IC3 believe that the many benefits of Bitcoin can be had without the waste. In a few papers released over the past month or so, we’ve outlined three different approaches to the development of greener alternatives:

  1. PieceWork is a tweak to standard cryptocurrency PoWs that enables recycling of mining effort.
  2. Resource-Efficient Mining (REM) repurposes innately useful workloads for mining effort. It relies on use of a trusted hardware technology called Intel SGX.
  3. Snow White is the Proof-of-Stake system with rigorous security guarantees.

PieceWork: Recycling PoWs

PatchWork

If we can’t reduce waste at the source, why not recycle? That’s the premise of the first, and simplest idea, called PieceWork. Piecework involves a slight modification to the standard Proof-of-Work (PoW) construction, decomposing it into two layers. One layer produces small PoWs called puzzlets that play a critical role in the mining process and can also, as we shall show, serve useful non-mining purposes.

Consider a standard cryptocurrency, abstracting away into a single value X the details of what gets hashed into a PoW (transactions, the previous block, etc.). A miner’s task then is is simply to search for an input (“nonce”) n∈N for which

H(X, n) ≤ Z,

where Z is a threshold representing the difficulty of the PoW.

To decompose a PoW into two layers, we instead construct it as follows:

H(X, n) = Fout (X, Fin (X, n; rin ), rout ),

where rin = H0(r) and rout = H1(r) for distinct hash functions H0, H1 and a secret value r. (These two values are a technical requirement to prevent what are called block withholding attacks. See the blog notes.)

A valid solution is a value n such that

Fin (∙, n, ∙) < Zin and Fout (∙, n, ∙) < Zout.

To solve this puzzle or PoW, a miner must first find an n such that Fin (∙, n, ∙) < Zin. This inner-puzzle is what we call a puzzlet. To solve the whole PoW, a miner must find a puzzlet solution. The puzzlet solution must additionally satisfy Fout (… n…) < Zout, meaning that a miner must in general come up with many puzzlet solutions to solve the PoW as a whole. By setting Zin + Zout = Z, one obtains a PoW with the same difficulty as that in (1).

What’s the benefit of this two-layered structure? A puzzlet, i.e., the task of finding a solution n to Fin (∙, n ,∙) < Zin, can be outsourced by a miner or mining pool operator to a worker, and put to any of several non-cryptocurrency goals. DoS prevention for TLS is one example. TLS requires computationally intensive crypto operations from a server to set up connections. Thus it’s a natural target for DoS attacks, prompting the idea of requiring clients to solve PoWs if a server comes under attack, an idea now floated in an IETF proposal. These PoWs used for DoS mitigation can themselves be puzzlets. The effect is that the server becomes a mining pool operator, and its clients become workers. And a DoS attacker effectively showers the victim HTTPS server with cryptocurrency. (Of course, a server can also dispense puzzlets and make money even when it’s not under attack…) Other examples of puzzlet uses are spam prevention (the original PoW goal proposed by Dwork and Naor), MicroMint, and Tor relay payments.

In summary, PieceWork requires only a small modification to standard cryptocurrency PoWs. It turns them into dual-use computational problems and recycle wasted mining effort. How much recycling it can feasibly accomplish is an open research question. PieceWork benefits from a number of previous, related ideas. Our short paper on it can be found here. PieceWork will be presented in April at BITCOIN 2017.

Resource-Efficient Mining (REM): Using Innately Useful Work as Mining Effort

Efficient Miner

A very different approach to minimizing waste is embraced in our second project, a system called REM. Rather than relying on hash-based PoWs, it makes use of an entirely different type of PoW, in which the W, i.e., the work, is useful. We call this concept Proof of Useful Work (PoUW).

Of course, traditional PoWs have several useful properties, prime among them the ease with which solutions can be verified. Most workloads don’t have this property. To enable verification of work on arbitrary useful workloads, REM relies on a new technology: Intel SGX.

Intel’s new SGX (Software Guard eXtensions) trusted execution environment technology. In a nutshell, SGX enables the execution of an application in a hardware-protected environment, called an enclave, that is isolated from the operating system and other applications. It thus protects the application against tampering by even the owner of the machine on which it’s running. SGX also enables generation of an attestation that proves to a remote party that a particular application was running in an enclave. SGX is already supported in many recent-model Intel CPUs.

As a good way to see how SGX can facilitate mining, it’s worth discussing an elegant mining scheme proposed by Intel called PoET (Proof of Elapsed Time). The idea behind PoET is simple. If miners use SGX, then they can be forced to use only a sanctioned piece of mining software that simulates PoWs. Standard PoWs have solution times that are exponentially distributed. A PoET client can thus sample a solution time from an exponential distribution, simply sit idle until this time elapses, and then wake up with a block in hand. The first client to awake gets to publish its block. An SGX attestation proves to others in the system that the client idled as it should have.

PoET has several nice features. Foremost among them is the fact that (at first glance) it’s virtually energy-waste-free. Clients idle instead of hashing. Block solution times can be tuned to mimic those of a standard mining regime, like Bitcoin or Ethereum mining. Thus PoET can effectively be plugged into such schemes. It is also relatively egalitarian in that it achieves precisely one vote per CPU. PoET, though, has two technical challenges. We call these the broken chips and stale chips problems.

First, the broken chips problem. SGX security is imperfect and, as with any trusted hardware, it’s to be expected that a well-resourced adversary can break it. Thus, it’s to be expected that some SGX CPUs will be broken. In the basic PoET scheme, a broken chip has devastating effect, as it enables a miner to simulate a zero mining times and win every consensus round, i.e., publish all blocks. Intel has proposed a statistical testing regime to detect breaks, but details aren’t published and formal foundations are needed for a good analysis.

REM faces the same challenge. In REM, we have developed a rigorous statistical testing regime with formal foundations and shown analytically and empirically that it is highly effective: It can strictly limit the gains of adversaries that have broken chips while minimizing incorrect rejection of blocks from honest miners.

The stale chips problem is more subtle. Our economic analysis shows that in many practical settings in PoET and related systems, it will be advantageous for a miner to buy old (“stale”) SGX CPUs and cobble them together into “farms” that mine cheaply. Such farms reinstate a fraction of the waste that PoET is trying to avoid to begin with. This is where REM’s Proof of Useful Work (PoUW) approach comes into play. In a nutshell, with PoUW, miners run whatever workloads they consider to be useful—protein-folding computations and ML classification algorithms are a couple of examples considered in our work. Miners can prove that they did work on these problems using SGX. The probability of a miner mining a block is proportional to the amount of work she does. Thus, REM turns otherwise useful work into mining effort. Making PoUW work is technically challenging. It requires that workloads be themselves compiled and instrumented using SGX to prove correctness, an innovation of independent interest introduced in REM.

The biggest objection lodged against SGX-based mining is the fact that it places Intel in charge, undermining the decentralization at the heart of permissionless ledgers. Of course, Intel is already a trust anchor. But we’d view this another way, and characterize REM and PoET as partially decentralized. You can read about REM here, in a paper under submission.

Snow White: Proof of Stake with Rigorous Security Guarantees

PatchWork

Our final approach to reducing cryptocurrency waste is one both proposed and studied by many projects in the cryptocurrency community since the inception of Bitcoin. This idea is called proof of stake, and revolves around the basic premise that rather than mining simulating a lottery where your chance of finding a block is proportional to computing power, mining simulates a lottery where your chance of finding a block is proportional to the number of coins (or “stake”) you have in the system.

A key roadblock to the adoption and deployment of proof of stake systems involves questions around the security guarantees that they provide. This continues to be an ongoing source of controversy and debate in the community, with sources like the Bitcoin Wiki claiming that “Proof of Stake alone is considered to an unworkable consensus mechanism” and efforts like Ethereum’s Casper project studying questions of how to design a maximally useful and relevant proof of stake protocol for the next generation of cryptocurrencies.

Despite its potential shortfalls, we believe proof of stake represents a critical new development and direction in both the blockchain and distributed consensus fields. With this in mind, we set out to apply previous work by Rafael Pass (an IC3 member) and others, in which a model for analyzing and proving consistency, chain growth, and restrictions on adversarial chain impact for proof of work blockchains was developed.

To more accurately model the nature of blockchain distributed consensus, and the implication of network delays, we propose a new model for consensus called the sleepy model. This model more accurately mimics the operation and naturally captures the design of permissionless blockchains. In the sleepy model, a user (node or miner) can leave or join the protocol at will. This is modeled by (non-crashed) users in the protocol being given the ability to “sleep”, or go offline and rejoin the network at some unspecified later date with unmodified original state. The key question then becomes how can we design a useful consensus protocol in the sleepy model, when at least half of all online nodes (or stake) is honestly following the protocol?

The guarantees of consistency and availability are rigorously defined in this new model, more accurately capturing the guarantees users expect from blockchain protocols. The analogues of proof-of-work style guarantees like chain growth (availability) and chain quality (integrity) are also discussed. We believe this new class of consensus protocols in the “sleepy” model represents one of the fundamental contributions of blockchains to the distributed consensus space. Neither the asynchronous, partially synchronous, or synchronous models, in either a permissioned or permissionless setting, prove sufficient to model or reason about these new consensus protocols or the probabilistic and often economic guarantees they provide.

To that end, we are working on two protocols proven in the Sleepy model: Sleepy and Snow White.

Sleepy is a simple protocol intended to achieve the guarantees of chain quality, chain growth, and consistency/agreement with 51% of online nodes being honest. This protocol is intended for deployment in a permissioned context, and assumes stake assigned or instantiated by some trusted source. This makes Sleepy ideal for bankchains or other permissioned deployments, in which the set of stakeholders is known a priori but the blockchain guarantees of robust, auditable distributed consensus remain desirable. Every second, every member of the committee is eligible to “mine” a new block in the system, which involves a standard block mining solution with a public source of entropy as the nonce. Standard difficulty adjustments retarget the block interval to a desired target, as in Bitcoin and Ethereum today. The challenges of choosing an appropriate, ungameable mining function and source of entropy are tackled in the work, and proof is given that no committee member can manipulate the protocol to their advantage.

Snow White, on the other hand, is an extension of Sleepy intended to provide the same rigorous blockchain-derived guarantees in a permissionless setting, such as in the deployment of a public cryptocurrency. Obviously, this is substantially more difficult: choosing appropriate committee members for the block lottery, as well as ensuring that no coalition of these committee members (of bounded size) can game the protocol for more than a negligible advantage, are highly nontrivial. The resulting protocol is actually quite simple: each step, a committee mines as in Sleepy, with a shared source of entropy h0. With sufficiently many bits of entropy in h0 and an appropriately selected committee weighted on stake, it is possible to prove the desired result of chain quality, growth, and consistency in the Sleepy model. Choosing both the committee and h0 such that no adversary or non-majority coalition of adversaries gain substantial advantage by deviating from the protocol is the key to the construction and concrete parameters of the protocol, which are discussed further in our full publication.

Sleepy and Snow White represent the first rigorously justified and proven blockchain consensus protocols in both the permissioned and permissionless proof of stake space. It is our belief that the rigorous proofs of security are valuable as both theoretical efforts and to guide protocol development and deployment. Both the proof and concrete parameterization of these protocols are highly non obvious, and while heuristic protocols designed elsewhere in the community (with only informal justification) may operate in a similar manner to Sleepy, there is no guarantee that subtle network-level, timing, committee / stake poisoning, and other attacks are not present in these protocols. In our work, we assume an optimal adversary with ability to delay network messages up to some arbitrary time, a very strong notion of attacker that makes our protocols the most rigorous conceived in the space thusfar.

You can read about the papers in prepublication manuscripts we have uploaded for release on ePrint: Snow White, Sleepy. Further conference or journal publications with implementation details of these systems, full proofs, simulation results, and experimental comparisons to existing cryptocurrencies are currently in development. We hope to share more exciting news about these new protocols soon.

[It is worth noting that our willingness to assume that the majority of online coins are honestly following the protocol is an assumption that `has been challenged <https://blog.ethereum.org/2016/12/06/history-casper-chapter-1/>`_ by the Ethereum foundation. We do not necessarily agree with these criticisms or model; we believe that the ε-Nash equilibrium achievable in *Snow White is sufficient for the design of a robust, decentralized coin. Nonetheless, we believe developing and proving protocols secure in this context is valuable: both as the most natural model for private blockchain deployments, and to illuminate common pitfalls in proof of stake protocol design that may lead to attacks in naive protocols. We look forward to a full specification of Ethereum’s Casper, and to comparing both its assumptions and attack surface with that of Snow White.

Notes

Back-of-the-envelope Bitcoin electricity consumption calculation

There are many estimates of the electricity consumption of the Bitcoin network, but we don’t find them convincing. For example, this widely cited one derives an upper bound of 10 GW (in 2014!). As we’ll see from a simple calculation below, that would imply that miners were losing huge amounts of money. So here’s our crack at a crude estimate.

Using the technique in this paper, to obtain a lower bound on electricity consumption, let’s take the Antminer S9 to represent the state of the art in mining rigs. It consumes 0.098 W/GH. The current mining rate of the Bitcoin network is about 3,330,000 TH/s. Thus, were all miners using Antminer S9s, the electricity consumption of the network would be about 326 MW. (Of course, many miners are probably using less efficient rigs, so this is a loose lower bound.)

To obtain an upper bound on electricity consumption, assume that miners are rational, i.e., won’t mine if it causes them to lose money. At the current price of about $1000 / BTC, given a 12.5 BTC mining reward and block production rate of about 6 blocks per hour, the global mining reward per hour is about $72,500. A common, extremely cheap form of electricity used by miners is Chinese hydroelectric power; the very low end of the levelized cost of such electricity is $0.02 / kWh. Thus rational miners will consume no more than 3.625 GW of electricity. (Of course, this estimate disregards the capital costs of mining, and is therefore probably a quite loose upper bound.)

Taking the log-average of these two bounds yields an estimate of 1.075 GW, about the output of a single unit in a nuclear power station. Ireland’s average electricity consumption is about 3.25 GW (as derived from this 2013 figure).

Again, this is a crude estimate, but we believe it’s probably within a factor of 2 of the real one.

Why use rin and rout in PieceWork?

It is possible to outsource mining with the standard cryptocurrency PoW H(X,n) ≤ Z, simply by declaring a puzzlet to be the problem of finding an n such that H(X,n) ≤ Z_{easy}, for some Z_{easy} > Z. In other words, a worker can be asked to find a solution to a PoW easier than the target. But with some probability, a solution to H(X,n) ≤ Z_{easy} will also be a solution to H(X,n) ≤ Z, i.e., will solve the outsourcing miner’s PoW.

The problem with this approach is that a malicious worker can mount a block withholding attack. If it happens to find a solution to H(X,n) ≤ Z, it can simply not submit it. Or it can demand a bribe from the outsourcer. Use of rin and rout conceals from a worker whether or not a puzzlet solution is also a solution to the global PoW, preventing such attacks.

Quelle: The Greening of Blockchains

KBC, Natixis, Rabobank, Société Générale and UniCredit also signed a Memorandum of Understanding in Brussels.

Seven large banks are collaborating on a blockchain-based trade finance and supply chain platform called Digital Trade Chain (DTC), which aims to make domestic and cross-border commerce easier for European small and medium-sized enterprises (SME).

Deutsche Bank, HSBC, KBC, Natixis, Rabobank, Société Générale and UniCredit have signed a Memorandum of Understanding in Brussels to build the DTC, which is based on a supply chain proof-of-concept originated by KBC.

DTC, which won the Efma Accenture Innovation Award for best new product or service of 2016 in October last year, is intended to seamlessly connect the parties involved in a trade transaction (buyer, buyer’s bank, seller, seller’s bank and transporter), online and via mobile devices, said a statement.

This new product would simplify trade finance processes for SMEs by addressing the challenge of managing, tracking and securing domestic and international trade transactions. Larger companies use documentary credit as a way of reducing the risks involved in doing business. However, documentary credit is not always suitable for SMEs or for companies that prefer open account solutions, wherein goods are shipped and delivered before payment is due, which is typically in 30, 60 or 90 days.

DTC would accelerate the order-to-settlement process and decrease administrative paperwork significantly. The platform’s end-to-end transparency would also give SMEs confidence to initiate trade with new partners in their home market or in other European markets, according to a statement.

The consortium would initially focus on building critical mass for DTC in seven European markets: Belgium and Luxembourg (KBC), France (Natixis, Société Générale), Germany (Deutsche Bank, UniCredit), Italy (UniCredit), the Netherlands (Rabobank) and the UK (HSBC).

Vivek Ramachandran, global head of product for HSBC’s trade finance business, has previously called for more collaboration among banks doing trade finance, and also other blockchain consortia looking at the space, such as R3 and IBM/Hyperledger.

He said: „I believe trade is the perfect use case for distributed ledger technology. You want transparency, verifiability, and immutability of agreements and information.

The last HSBC proof of concept was focused on the letter of credit. This project is focused on the open account space. Ramachandran explained that for a small company based in Europe (or anywhere else for that matter) trading internationally can be quite daunting and expensive.

„Trade can either be done over a letter of credit, which is complex and expensive and time consuming, or you can trade on open account which has a huge amount of risk, because either the buyer or the seller – one of the counterparties is bearing the risk at any point in time,“ he said.

Regarding the underlying technology, Ramachandran said: „The phrase ‚interoperability of ledgers‘ is used quite a lot and that’s hopefully where we will genuinely go to. You might well have a few different consortia working with different ledgers – as long as the ledgers can talk to each other.

The original KBC proof of concept was done using Ethereum. Asked whether R3’s Corda or Hyperledger fabric would likely host DTC blockchain nodes, he said, „actually we haven’t made that decision yet“.

Quelle: Deutsche Bank, HSBC and five other big banks collaborate on Digital Trade Chain

We unveil a new technology for secure, high throughput, low latency Bitcoin transactions using secure hardware, on the current Bitcoin network.

Bitcoin suffers from a fundamental limit on how far it can scale. While the number of transactions sent per day has been growing exponentially since Bitcoin’s inception, the number of transactions the system can clear is firmly capped at 7 tx/sec under the best of circumstances, and at around 3.3 tx/sec with realistic transaction sizes. This means that, for example, if Venezuela were to switch over to Bitcoin today, every adult would be able to conduct at most one financial transaction every 72 days. And on the latency side, every non-trivial transaction would incur at least an hour’s delay.

There have been no shortage of suggestions to improve the scale of the protocol. One possibility is to increase the block size. While a reasonable stopgap measure, changing the blocksize does not appreciably improve latencies for confirmations. And a 2X or 4X increase in block size delivers at most a 2X or 4X improvement in throughput. Even a highly controversial 10X increase in block size would yield only one transaction per week for Venezuelans, still far short of the target. Another possibility, suggested in efforts such as Bitcoin-NG, ByzCoin, and Hybrid Consensus by research groups including ours, is to change the protocol to construct blocks incrementally over time, avoiding centralization bottlenecks. Quixotically, the practitioner community has been reticent about adopting these techniques or even acknowledging their existence during scaling discussions, reportedly because these proposals require changes to the underlying protocol.

Instead, most practitioners have focused on off-chain scaling, through a technique known as payment channels. Payment channels, such as the Lightning Network (LN) and Duplex Micropayment Channels (DMC), allow for efficient transactions in which two parties can engage in a large number of fund transfers off chain, only settling the net result on the blockchain. While this can potentially improve scale immensely, these protocols, also, require substantial changes to the underlying protocol. Specifically, Lightning Network implementations are vulnerable to transaction malleability, whose current proposed fix, SegWit, has become mired in controversy, partly as a result of its implementation complexity.

A New Solution

Secure hardware

We have developed a new scalability solution for Bitcoin, called Teechan. It is a new, practical, high throughput, low latency off-chain transaction protocol that can be deployed securely on the Bitcoin network, as it exists today.

Teechan is similar in design to the Lightning Network, save for one crucial differentiating factor: it leverages trusted execution environments (TEEs), that is, secure hardware components found in recent commodity processors such as the latest batch of Intel CPUs with Software Guard Extensions (SGX).

This key technology enables Teechan to provide surprisingly strong guarantees. Specifically:

  1. Teechan does not require any changes to the existing Bitcoin network; it is secure even in the presence of transaction malleability.
  2. Teechan is efficient: Payments are completed with a single message. Network latency does not impair its throughput.
  3. Teechan enables infinite channel reuse as long as the balance does not exceed the channel credit.
  4. Teechan is space-efficient, requiring only two transactions to be placed in the blockchain in total under all scenarios. As a consequence of lower dependence on on-chain transactions, Teechan is less open to attacks based on blockchain flooding.
  5. Consequently, Teechan lends itself to an efficient implementation. Our prototype achieves a throughput of 2480 transactions per second per channel, with settlement latency overheads of 0.4 ms.

The first feature alone is worth its weight in bitcoin, as this means that all the touted benefits of payment channels can be had on top of the regular, unmodified Bitcoin protocol right now, avoiding the thorny discussion around SegWit and its deployment. It’s worth explaining why Teechan is able to provide these features.

Power of Secure Hardware

Secure hardware

SGX is a set of instruction set extensions for CPUs released in Fall 2015 and available on recent CPUs. The key ability SGX provides is the notion of confidential, private execution with integrity guarantees. In essence, the chip has a special construct called an enclave. An enclave is like an ordinary program, except that the memory contents of an enclave are encrypted whenever they are off-chip, and accessible only on-chip, and only while the special enclave code is running. Further, the decryption keys are available solely to code with a certain hash: if you or a hacker were to hack the enclave code and change its hash, that hacked code will no longer have access to the encryption keys, repelling attacks. As a result, this ingenious technology does not permit anyone, even the owner of the machine who can modify the code arbitrarily, to peek at the contents of the enclave or to modify execution within an enclave. Further, the SGX hardware enables remote attestation, that is, the ability to prove to a remote computer that a given enclave is running a particular software distribution. In essence, the chip is able to issue a statement that says „I guarantee to any remote party that I am running this code with this particular hash,“ which is a critical bootstrapping mechanism. Teechan is built on these two underlying features, which, together, provide a trusted execution environment (TEE).

Now, SGX is not the only way of building a trusted execution environment. It’s quite possible to do the same using, for instance, secure hardware co-processors known as trusted platform modules (TPMs). TPMs can be found in almost every laptop and cost somewhere between $1-$5, and come from multiple vendors. Rumor has it that they can even be manufactured with self-destruct circuitry in the packaging, where attempts to shave off the packaging result in the chip destructing its private key. While the Teechan protocol is suitable for building on top of any platform that supports TEEs, including TPMs, we decided to build our prototype implementation on top of SGX.

The nice thing about SGX is that the security guarantees are built into the CPU. SGX enclaves are secure against an attacker who has placed probes on the system bus, has special attack hardware on the USB ports, has modified disk contents and is able to forge network packets any which way. The only way to compromise these guarantees is to shave off the CPU packaging and place probes on the silicon wafer, a costly undertaking requiring a clean room and significant reverse-engineering effort. And users currently already trust Intel (or AMD) to execute their transaction signing code correctly.

Channels Over Secure Hardware

Secure hardware

Teechan uses TEEs to build lightweight duplex payment channels. Compared to software implementations of payment channels, such as the Lightning Network, a hardware-based implementation has several advantages:

First of all, current payment channel implementations require segwit to be activated and transaction malleability to be fixed to reduce implementation complexity. Lightning has been the big impetus behind SegWit, which is currently stuck without sufficient miner support. Teechan enables us to build secure payment channels without having to change the base protocol, without having to bicker over SegWit.

Sending money with Teechan is incredibly fast, because payments are completed with a single message. The alternatives are either DMC, which puts a bound on the maximal amount transacted in a single direction of the channel (deposit amount times max number of channel resetes), or LN, which requires multiple round trips between the two parties to complete a single transaction.

Caveats

Secure hardware

There is no such thing as a free lunch. While Teechan represents very good news for Bitcoin, it comes with some caveats:

  • Teechan requires a trusted execution environment. This requires some special hardware, so you may need a special machine with the right kind of hardware to create a channel. Our current prototype is implemented on top of Intel SGX, so if you want to use this particular prototype, you’ll have to trust Intel. This is not an onerous requirement, because you already trust Intel for the correct execution of your code, and these extensions are just a part of the new instruction set being rolled out by Intel. If you do not currently trust Intel and use AMD or another vendor instead, then you’ll have to wait for that vendor’s implementation of SGX, or else port Teechan to other trusted execution environments. Note that only the entities at the two ends of the channel, you and the person you are transacting with, need to trust each others’ TEEs. The blockchain and the rest of the world are oblivious.
  • Our measurements purposefully leave out the effects of the network, which depend on your deployment. You need to factor in the network latency between the two parties, as well as the bottleneck bandwidth. As noted above, higher latency does not impair Teechan’s throughput.
  • It is yet unknown by how much Teechan, or other solutions, will help Bitcoin scale. The exact benefit depends on the emergent credit network on top, which has yet to emerge, because it has not been possible to deploy payment channels securely until now. Our hope is that Teechan will be used in concert with payment network design by LN and others.
  • Payment channels rely on the ability to place certain transactions on-chain when needed. This requires space in blocks on the underlying blockchain. As mentioned in the LN paper, full blocks interfere with this and can open payment channels to attack.

Bottom Line

If you have the right hardware, you can run Teechan over the unmodified Bitcoin protocol right now.

Our unoptimized prototype of Teechan is able to achieve 2480 transactions per second per channel, with transaction latencies of 0.4 ms. Not only does this enable paying for a coffee, but also enables Bitcoin to achieve very high aggregate throughput, to enable cheap & fast micropayments, as well as a host of other usage scenarios that require frequent, high-speed payments.

Where Do We Go From Here?

If you are interested in the operation of the Teechan protocol for building secure payment channels on trusted execution environments, a working draft paper is available.

We will be making the Teechan implementation public in the next few weeks.

Caveat emptor: this code is going to be an alpha release. It is quite possible for software bugs to lead to loss of coins. The prototype will be made available as is, with no express warranty of its suitability for any purpose.

We do hope to build an open-source effort around Teechan. If you’re interested in contributing to the effort, please get in touch with us.

Summary

While Bitcoin has to embrace on-chain scaling to not only scale, but to ensure the security of off-chain protocols, it is essential to tackle scalability at all levels of the protocol stack.

Overall, we have outlined a best-of-breed off-chain solution to help Bitcoin scale. Teechan builds on secure hardware to yield a secure payment channel implementation that achieves high throughput and extracts a very low latency overhead. It side-steps a controversial proposal to change the underlying Bitcoin protocol, and provides all of the much-touted benefits of Lightning Networks today, without having to modify the base protocol at all.

Quelle: Scaling Bitcoin with Secure Hardware

The United Arab Emirates is ramping up blockchain development in a bid to become, by 2020, a leading center for innovation and the first government in the world to execute all of its transactions on a blockchain.

The move seeks to cut an estimated 100 million paper transactions annually and reduce the 25 million hours of work required in handling paper documents in Dubai alone.

Sheikh Hamdan Bin Mohammed Bin Rashid Al Maktoum, Dubai Crown Prince, launched the Dubai Blockchain strategy in October, which aims at achieving a high degree of efficiency in government departments.

Another area of the strategy seeks to create thousands of new jobs by leveraging blockchain technology to allow Emiratis, expatriates and investors to set up companies more easily.

„The strategy will result in substantial economic saving that can be reinvested in value-added sectors and will contribute to saving millions of hours wasted in entering data and ensuring their veracity,“ said Mohammad Abdullah Al Gergawi, Vice Chairman of the Board of Trustees and Managing Director of Dubai Future Foundation.

„It will also create new economic fields and businesses as the volume of blockchain market is expected to hit US$300 million over the course of the next five years.”

The strategy is a joint project between the government’s Dubai Future Foundation and Dubai Smart City Office.

Earlier this year, the Dubai Future Foundation launched the Global Blockchain Council, a public-private initiative that demonstrated the UAE’s commitment to the technology.

Under the Global Blockchain Council umbrella, prominent financial institutions, technology firms and startups are collaborating on a number of pilot projects that promise to increase efficiency in processes, cut costs and create new business opportunities. Among these projects, a system called BitOasis aims at creating a blockchain platform „to secure [the] flexidesk contracts and registration process.“ Another project, called the Kraken Bitcoin Exchange, seeks to build a financial infrastructure for Islamic finance operations. Both pilot projects are being overseen by Dubai Multi Commodities Center Authority.

Dubai Future Accelerators Selects Two Blockchain Companies for Pilot Programs

In September, Dubai Future Foundation kicked off the inaugural Dubai Future Accelerators, a 12-week program that seeks to connect international technology startups with government entities to create prototypes and pilots for the city of Dubai.

More specifically, Dubai Future Accelerators paired 30 companies with seven of Dubai’s public services: Health, Energy, Knowledge, Municipality, Police, Transport and the investment portfolio, Dubai Holding.

The program, which ended earlier this week, selected 19 out of the 30 companies to move forward to the pilot and prototyping phase. These will receive a total of Dh120 million (US$32.6 million) in investment.

Of the participating companies, 14 have already relocated their headquarters to Dubai, highlighting the city’s growing attractiveness.

“The UAE has become the foremost global platform for turning the future into reality,” said His Excellency, Mohammed Al Gergawi, Minister of Cabinet Affairs and The Future, and Vice Chairman of the Dubai Future Accelerators. “It is the ideal destination to materialize innovative ideas into tangible projects that have a significant impact on the economy and society — projects that can create better lives for us and for future generations.”

Among the companies that made it to the next phase, Loyyal, a loyalty and rewards platform, signed a deal with Dubai Holding for a pilot deployment aimed at creating the „internet of loyalty points, promotions and rewards“ by using blockchain technology. Specifically, it will seek to provide an innovative and cost effective solution to enhance and connect different loyalty programs.

The pilot will focus on the Jumeirah Group and TECOM Group, Dubai Holding’s sister company, bringing together their respective loyalty schemes to enable network-effect opportunities.

„We established the Global Blockchain Council here in Dubai less than a year ago, and are already seeing impressive advancements in the uptake of this technology,“ commented Saif Al-Aleeli, CEO of the Dubai Future Foundation and Founding Member of the Global Blockchain Council. „We are pleased by Loyyal’s progress with Dubai Points, their partnerships with the private sector, and look forward to working even closer with them as they bring the blockchain future to reality.“

As part of the deal, Loyyal will be deploying its proprietary and patent-pending blockchain and smart contract infrastructure solution to re-map the way Dubai Holding’s businesses interact with consumers and each other.

Alongside Loyyal, other blockchain startups that were selected for program integration included BlockApps, an Ethereum compliant platform for the development, deployment and management of enterprise blockchain applications, and ConsenSys. The largest Ethereum blockchain software company in the world, ConsenSys, will develop a real estate database using blockchain technology for the pilot program.

The 19 pilot projects are expected to create 135 job opportunities in Dubai over the next three months, which is projected to increase exponentially when the projects achieve tangible results, and the companies expand their activities.

The second round of the Dubai Future Accelerator program will kick off in the beginning of Q1 2017 and will see five additional government and private entities joining in: the Department of Economic Development, Dubai Smart Office, the General Directorate of Residency and Foreigners Affairs, Etisalat and du, both telecom operators in the UAE.

Source: Bitcoinmagazine

France’s central bank quietly released new details about its work with blockchain last week.

The Banque de France said on Friday that it had tested the tech for hypothetical use in the management of SEPA Credit Identifiers, or identification markers used to establish the identity of creditors within the Single Euro Payments Area. The trial marks its first publicly acknowledged blockchain trial.

According to the central bank, one of the key participants in the trial was the Caisse des Dépôts et Consignations, a public-sector organization that acts as a kind of investor on behalf of the French government through a number of subsidiaries. Paris-based startup Labo Blockchain and several unnamed French banks also took part in the test.

Work began in July, the Banque de France said, culminating in October with the creation of prototype tools for creating and managing SEPA Credit Identifiers. The central bank outlined how weekly meetings were held with stakeholders as the project moved forward, going on to indicate that more detailed insights into the project would be released sometime next year.

Word of the trial comes months after the central bank called for more research into the subject, arguing at the time that any testing should focus on both the positive and negative impacts the technology could hold for the finance sector.

The Banque de France evoked this sentiment in its announcement, noting in a translated statement:

This experience allows all the participating banks to share their analyzes on [the] impacts and opportunities of this technology.

With the trial, the French central bank becomes the latest institution of its kind to test the technology.

In the past year, central banks in Japan, Sweden and Singapore, among others, have launched similar efforts, with the European Central Bank announcing a new research undertaking in partnership with the Bank of Japan on 6th December. Earlier this month, the US Federal Reserve released its first major research paper on blockchain.

Image via Shutterstock

Quelle: France’s Central Bank Details its First Blockchain Test – CoinDesk

R3 is a financial innovation enterprise that aims to design and deliver distributed ledger technologies to global markets. They lead a consortium partnership of over 50 of the world’s top financial institutions. Through collaboration with their partner research centers, they’re working to test blockchain technologies and their applications towards developing a global financial-grade ledger.

Along with ten of its member banks, R3 has recently developed a proof-of-concept for a Know Your Customer (KYC) registry. KYC is about doing customer due diligence, and determining a valid identity. The systems currently in place are meant to catch identity theft, avoid fraud, prevent money laundering, and stop terrorist financing.

Over the course of three months, R3’s Lab and Research Center utilized blockchain technology to create a KYC registry that would satisfy regulatory requirements, as well as allow identities to be managed by their owners. According to a statement from R3, the project was able to simulate the establishing of the identity of both an individual, and a legal entity, including identity attestation by a third party. The transparency, and immutability of storing identification information in the blockchain seems like a logical choice for fighting illicit activities in the financial sector.

KYC is an important aspect of modern banking which would benefit from an overhaul. Long turnaround times and needlessly redundant processes have made for an inefficient current model. As costs rise, and the process continually grows in complexity, banks are beginning to struggle with their customer on-boarding process. A study by Reuters showed some financial institutions were spending upwards of $500-million annually in relation to KYC compliance. CEO of R3, David Rutter, said:

„The growing complexity and cost of KYC compliance requirements presents a major challenge for banks on-boarding new clients and is having a negative impact on those client relationships. Distributed ledger technology can provide a unified view of clients whilst also significantly reducing costs and time spent verifying identity.“

If R3’s platform were to be deployed, participants would be able to create their own identities, and link them to any relevant documentation. What’s great is an individual would manage their own identity, and simply permission access to their ID when necessary. In this system, a company could request additional validation through authoritative participants to attest to an ID. This means only those who need access to your data will be able to see it, because you specifically enabled that access.

This idea is similar to how distributed ledgers would revolutionize the healthcare industry, particularly in regard to the storage of medical history on a blockchain. With the implementation of R3’s KYC registry it would enable a customer to have one global ID, completely in their control. This increases security for the individual, and increases cost-efficiency for financial institutions.

Quelle: R3 Uses Blockchain To Streamline KYC For Banks Around The World

Money sent to Myanmar instantly with Everex’s Ethereum-based mobile payments app

Money sent to Myanmar instantly with Everex’s Ethereum-based mobile payments app

Over 100 migrant workers transferred money instantly over blockchain to their homes in Myanmar in the last months. It marks a successful pilot test for Everex, a company aiming to give financial access to the world’s huge “Bottom of the Pyramid” (BOP) population. Overall, average transaction took less than a minute and recorded savings of over 7% in remittance cost and currency exchange rates. Everex essentially hands the power to send any amount of money fast and cheap around the world to individual users, wherever they live.

The test is just a small start, but has major significance.

Over 850,000 Thai baht (around $24,000 USD) were transferred using the Everex wallet, a mobile and web based app that sends digitized national currencies using Ethereum blockchain.

With over 500 signed users, mainly in Thailand, the Everex wallet is capable of transferring any custom digital asset over the Ethereum blockchain.

Sending and currency conversion both happened in less than a minute and incurred no transaction fees.

Although the test recipients used Myanmar money-changers to switch from CryptoCash back to physical cash, no centralized entity performed the actual remittance. This cuts time and costs dramatically, since the transmission process was automated with programmable smart contracts on Ethereum.

This means powerful financial tools, which have always been the proprietary domain of large financial institutions, are now available to ordinary people everywhere.

Not Reinventing the Wheel, Just Making Them Smoother

Everex understands the value of national currencies and existing financial networks. Unlike some blockchain projects, it’s not trying to replace them completely — the aim is to make them better.

In this world, there’s still an important role for banks and other financial players to store the “real money” that backs up “CryptoCash” and to keep its value stable.

Technology to Replace Ad-Hoc Trust Networks

Estimates say there are between two and five million Myanmar citizens now living in Thailand.

In fact, it’s possible as much as 10% of the country’s 51 million population lives overseas — though the exact number is uncertain. The largest number lives in Thailand, with the rest spread throughout the rest of Asia.

This Economist article of two years ago highlights how mistrust in existing remittance and financial networks meant Myanmar workers sent most of their money home via informal channels.

A trust-based cash system called hundi — similar to the hawala remittance networks of the Islamic world — served their needs. These systems have little transparency and often hide a mountain of extra charges in unfavorable FX rates and conversions, even if rates appear low on the surface.

But the story highlights how, if people cannot use or trust existing financial systems, they’ll find a way to route around them. That’s where Everex comes in — transparent and requiring far fewer human intermediaries.

Everex offers the best of all these worlds. Transfers and conversions are based on the global Ethereum smart contracts network — utilizing the latest in blockchain technology.

Quelle: Over 100 Migrant Workers Test Blockchain Remittance in Thailand – Everex