SlideShare a Scribd company logo
1 of 51
Download to read offline
Analyzing Bitcoin Security
Philippe Camacho
philippe.camacho@dreamlab.net
Universidad Católica, Santiago de Chile
15 of June 2016
Bitcoin matters
Map
Blockchain 
Design
Known
 Attacks
Security 
Models
P2P Architecture TransactionsConsensus
51% 
attack
Double 
spending 
attack
Eclipse 
attack
Approx.
Bitcoin 
Mining
Selfish 
Mining
Nakamoto’s 
model
Bitcoin 
Backbone
Malleability 
attack
Random 
Oracle
An open question (until 2008)
Is  it possible to create 
(digital) money without a 
centralized authority?
Who wants some satoshis?
● What kinds of problems are hard to solve when 
building a decentralized digital cash system?
P2P Network
● TCP/IP
● No authentication
● 8 outgoing connections
● Up to 117 incoming connections
● Hardcoded IP addresses + 
DNS seeders to get first list of 
peers
● Probabilistic algorithm to choose 
peers
● Specific data structure to store 
peers list
● Gossip protocol to broadcast 
transactions
Bitcoin addresses
3Nxwenay9Z8Lc9JBiywExpnEFiLp6Afp8v 3J5KeQSVBUEs3v2vEEkZDBtPLWqLTuZPuD
Bitcoin transactions
● Conceptually very simple 
● In practice quite
complicated
(more on this later)
Double spending attack
3NDQz8rZ3CnmsiBGrATk8SCpDXF2sAUiuM
3Nxwenay9Z8Lc9JBiywExpnEFiLp6Afp8v
1BTC
1BTC
3J5KeQSVBUEs3v2vEEkZDBtPLWqLTuZPuD
How does Bitcoin prevent
the double-spending attack?
● Idea
– Have participants of the network vote to establish the 
“official” ordered list of transactions
– Check the validity of each transaction with this ledger 
● Challenge
– We are in an open network => Sybil attack is always 
possible
Consensus
Instead of voting with your IP, vote with your CPU
The Blockchain
HH H
Tx1;
Tx2;
Tx3…
Coinbase
Tx34;
Tx35;
Tx36…
Tx54;
Tx55;
Tx56…
Transactions
block
…
Who wants some satoshis?
● Who will extend the next block ? 
Or how to agree in a fair way on the participant that 
will extend the chain?
Proof of Work [Back2002]
00000
00001
00010
00011
00100
00101
00110
00111
01000
01001
01010
01011
01100
01101
01110
01111
10000
10001
10010
10011
10100
10101
10110
10111
11000
11001
11010
11011
11100
11101
11110
11111
H1001101|| x 000||10
Find value  x so 
that the output 
begins with 3 zeros.
 
On the limits of the Random Oracle
● Approximate Bitcoin Mining 
[LH2015,VDR2015]
● Patent pending AsicBoost.com
● Enable to increase profitability of miners by 
20%~30%
Block
Mining
 in 1 slide
Genesis 
(Coinbase)
Blockchain
Who wants some satoshis?
● What happens if two miners produce a block at 
almost the same time?
The longest chain rule Main chain
that will be 
extended by 
the miners
Idea:
the longest chain 
represents the 
accumulated 
computational power of 
the network
Who wants some satoshis?
● How are bitcoins created?
● Why would people spend their computational
power to protect the network?
Incentive
● Each block mined that 
ends up in the main chain 
will be awarded with 12.5 BTC (*)
● Hence the metaphor «Mining»
(*) It was 50 BTC at the beginning, 
halving every 210000 blocks
The Monkey at the Cliff 
0 1 2 3 4 5 6 7 …
  
 
 
-1…
What is the 
probability that the 
monkey, sooner or 
later, will fall off 
the cliff? 
51% attack [Nakamoto2008]
I will try to catch 
up with 3 blocks
and rewrite the 
history of 
transactions
51% attack
0 1 2 3 4 5 6 7 …
  
-1…
 
 
Computational power
of the adversary
 
Who wants some satoshis?
● What are some implicit assumptions in the
previous analysis?
Selfish Mining Attack [ES2014]
● Idea: The attacker will mine his blocks privately and 
release them at the right time so that honest miners 
waste their computational power.
Selfish Mining Attack
This block is 
«lost» for the 
honest miners
Honest miners keep 
mining on the new 
longest chain
…
Selfish Mining Attack
…
State 0: only a single public chain
Selfish Mining Attack
…
State 1: Adversary manages to mine 
a block. The block is kept private.
Selfish Mining Attack
…
State 2: Adversary manages to mine 
a block. The block is kept private.
Selfish Mining Attack
…
State 2:  Honest miners find a block
In this 
situation the 
private chain is 
published and 
the honest 
miners loose 
their block
Selfish Mining Attack
…
State 0:  After releasing the private 
chain, back to state 0.
New head of 
the public 
chain.
Selfish Mining Attack
…
State 1: Adversary manages to mine 
a block. The block is kept private.
Selfish Mining Attack
…
State 0’: Honest miners and 
adversary’s chain are competing
In this situation 
release the private 
block and hope the 
honest miners will 
mine on top of it
Selfish Mining Attack
 
http://arxiv.org/pdf/1311.0243v1.pdf
 
Adversary’s computational power
Portion of honest miners that will 
mine on top of adversary’s block
Selfish Mining Attack
● Now we can compute the relative gain of the 
adversary
 
Who wants some satoshis?
●  
 
Selfish Mining Attack
●  
Majority is not enough!
Eclipse Attack [HKZG2015]
The attacker 
surrounds the victim 
in the P2P network 
so that it can filter 
his view on the 
events.
Eclipse Attack
● Mainly an implementation problem
– It is possible to populate the tables of peers of the victim
● But with huge consequences as this attack can be
used to leverage others
– Selfish mining
– 51%
– Double spending
Transaction Malleability
http://www.righto.com/2014/02/bitcoins-hard-way-using-raw-bitcoin.html
• Step 1:
Compute the unsigned 
transaction
• Step 2:
Compute the signature of 
the transaction
• Step 3: 
Put the signature inside the 
transaction
• Step 4: 
Compute the hash of the 
signed transaction => this is 
the transaction ID
Transaction Malleability
http://www.righto.com/2014/02/bitcoins-hard-way-using-raw-bitcoin.html
• Step 1:
Compute the unsigned 
transaction
• Step 2:
Compute the signature of 
the transaction
• Step 3: 
Put the signature inside the 
transaction
• Step 4: 
Compute the hash of the 
signed transaction => this is 
the transaction ID
Problem:  signature 
algorithm is probabilistic 
(ECDSA)
=> very easy to create 
«identical» transactions 
with different hashes
Privacy with Bitcoin
«Standard» user id is replaced 
by a random looking sequence.
Bitcoin address
31uEbMgunupShBVTewXjtqbBv5MndwfXhb
However Bitcoin is not totally 
anonymous
Anonymity = Pseudonymity +  Unlinkability
Improving Anonymity with mixers
Mixer
Other initiatives: Zerocash [BCG+2014]
• + Uses of near to practical 
«universal» zero-knowlege proofs (ZK-SNARKs)
• + Provides a much higher level of anonymity 
than mixers
• - Requires to change bitcoin source code
• - Requires a trusted setup
Bitcoin Backbone protocol [GKL2014]
● Purpose: models the problem that occurs when the 
time of mining a block becomes small
● Security model: synchronous setting (*)
(*) Asynchronous setting is even more complex  and analyzed in [PSS2016].
Bitcoin Backbone protocol
●  
Bitcoin Backbone protocol
●  
Caution: this definition 
does not exclude selfish 
mining attacks.
Open problems
● Anonymity
● Selfish Mining
● Alternatives to PoW
● Scalability
● Avoiding centralization in mining
● ASIC resistance proof of work
● Useful proof of work
● …
Thank you!
References
● [LH2015] Lerner, S. D., & HANKE, T. T. (2015). Block mining methods and
apparatus. Retrieved from
http://www.google.com/patents/WO2015077378A1?cl=en
● [VDR2015] Vilim, M., Duwe, H., & Kumar Rakesh. (2015). Approximate
Bitcoin Mining.
● [HKZG2015] Heilman, E., Kendler, A., Zohar, A., & Goldberg, S. (2015).
Eclipse Attacks on Bitcoin’s Peer-to-Peer Network. In USENIX Security
Symposium (pp. 129–144).
● [Back2002] Back, A. (2002). Hashcash - A Denial of Service Counter-
Measure.
References
● [Nakamoto2008] Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic
Cash System. Consulted. http://doi.org/10.1007/s10838-008-9062-0
● [ES2014] Eyal, I., & Sirer, E. G. (2014). Majority is not enough: Bitcoin
mining is vulnerable. Lecture Notes in Computer Science (Including
Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in
Bioinformatics), 8437(.0243v1), 436–454. Cryptography and Security.
http://doi.org/10.1007/978-3-662-45472-5_28
● [BCG+2014] Ben-Sasson, E., Chiesa, A., Garman, C., Green, M., Miers, I.,
Tromer, E., & Virza, M. (2014). Zerocash: Decentralized Anonymous
Payments from Bitcoin. Retrieved from https://eprint.iacr.org/2014/349
● [GKL2014] Garay, J., Kiayias, A., & Leonardos, N. (2014). The Bitcoin
Backbone Protocol: Analysis and Applications. Retrieved from
https://eprint.iacr.org/2014/765
● [PSS2016] Pass, R., Seeman, L., & shelat, abhi. (n.d.). Analysis of the
Blockchain Protocol in Asynchronous Networks. Retrieved from
http://eprint.iacr.org/2016/454

More Related Content

What's hot

what is bitcoin, its history and detail
what is bitcoin, its history and detailwhat is bitcoin, its history and detail
what is bitcoin, its history and detailSelf-employed
 
Block Chain Bitcoin and Crypto Currency
Block Chain Bitcoin and Crypto CurrencyBlock Chain Bitcoin and Crypto Currency
Block Chain Bitcoin and Crypto CurrencyNidhin P Koshy
 
An Overview on Bitcoin
An Overview  on Bitcoin         An Overview  on Bitcoin
An Overview on Bitcoin Touroxy
 
Crypto currencies presentation by Dr. Andre Gholam
Crypto currencies presentation by Dr. Andre GholamCrypto currencies presentation by Dr. Andre Gholam
Crypto currencies presentation by Dr. Andre GholamPMILebanonChapter
 
Bitcoin 101: The Currency, The Network, The Community
Bitcoin 101: The Currency, The Network, The CommunityBitcoin 101: The Currency, The Network, The Community
Bitcoin 101: The Currency, The Network, The CommunityEarthsite
 
Blockchain Introduction Presentation
Blockchain Introduction PresentationBlockchain Introduction Presentation
Blockchain Introduction PresentationAmr Alaa Yassen
 
What is Cryptocurrency
What is Cryptocurrency What is Cryptocurrency
What is Cryptocurrency James Travis
 
Bitcoin as an Emerging Technology Written Report
Bitcoin as an Emerging Technology Written ReportBitcoin as an Emerging Technology Written Report
Bitcoin as an Emerging Technology Written ReportShane Hickey
 

What's hot (20)

what is bitcoin, its history and detail
what is bitcoin, its history and detailwhat is bitcoin, its history and detail
what is bitcoin, its history and detail
 
Block Chain Bitcoin and Crypto Currency
Block Chain Bitcoin and Crypto CurrencyBlock Chain Bitcoin and Crypto Currency
Block Chain Bitcoin and Crypto Currency
 
Bitcoin history
Bitcoin historyBitcoin history
Bitcoin history
 
An Introduction to Blockchain
An Introduction to BlockchainAn Introduction to Blockchain
An Introduction to Blockchain
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
An Overview on Bitcoin
An Overview  on Bitcoin         An Overview  on Bitcoin
An Overview on Bitcoin
 
Introduction Bitcoin
Introduction BitcoinIntroduction Bitcoin
Introduction Bitcoin
 
What's cryptocurrency ?
What's cryptocurrency ?What's cryptocurrency ?
What's cryptocurrency ?
 
Crypto currencies presentation by Dr. Andre Gholam
Crypto currencies presentation by Dr. Andre GholamCrypto currencies presentation by Dr. Andre Gholam
Crypto currencies presentation by Dr. Andre Gholam
 
Bitcoin 101: The Currency, The Network, The Community
Bitcoin 101: The Currency, The Network, The CommunityBitcoin 101: The Currency, The Network, The Community
Bitcoin 101: The Currency, The Network, The Community
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
All about Bitcoins!
All about Bitcoins!All about Bitcoins!
All about Bitcoins!
 
Cryptocurrency
Cryptocurrency  Cryptocurrency
Cryptocurrency
 
Digital currency
Digital currencyDigital currency
Digital currency
 
Blockchain Introduction Presentation
Blockchain Introduction PresentationBlockchain Introduction Presentation
Blockchain Introduction Presentation
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
What is Cryptocurrency
What is Cryptocurrency What is Cryptocurrency
What is Cryptocurrency
 
Blockchain concepts
Blockchain conceptsBlockchain concepts
Blockchain concepts
 
Cryptocurrency
CryptocurrencyCryptocurrency
Cryptocurrency
 
Bitcoin as an Emerging Technology Written Report
Bitcoin as an Emerging Technology Written ReportBitcoin as an Emerging Technology Written Report
Bitcoin as an Emerging Technology Written Report
 

Viewers also liked

Bitcoin (Global Digital Currency)
Bitcoin (Global Digital Currency) Bitcoin (Global Digital Currency)
Bitcoin (Global Digital Currency) Paramkusa K
 
Bitcoin, Blockchain y más allá: Riesgos y Oportunidades
Bitcoin, Blockchain y más allá: Riesgos y OportunidadesBitcoin, Blockchain y más allá: Riesgos y Oportunidades
Bitcoin, Blockchain y más allá: Riesgos y OportunidadesPhilippe Camacho, Ph.D.
 
Man in-the-middle attack(http)
Man in-the-middle attack(http)Man in-the-middle attack(http)
Man in-the-middle attack(http)Togis UAB Ltd
 
From Big Linked Data to Linked Big Data - DBpedia as a framework for data int...
From Big Linked Data to Linked Big Data - DBpedia as a framework for data int...From Big Linked Data to Linked Big Data - DBpedia as a framework for data int...
From Big Linked Data to Linked Big Data - DBpedia as a framework for data int...giuseppe_futia
 
ORAM: A Brief Overview
ORAM: A Brief OverviewORAM: A Brief Overview
ORAM: A Brief OverviewDev Nath
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Radar Cyber Security
 
Scaling up Linked Data
Scaling up Linked DataScaling up Linked Data
Scaling up Linked DataMarin Dimitrov
 
Introduction to Bitcoins and Cryptocurrency
Introduction to Bitcoins and CryptocurrencyIntroduction to Bitcoins and Cryptocurrency
Introduction to Bitcoins and CryptocurrencyUtkarsh Gupta
 
Botnet Detection Techniques
Botnet Detection TechniquesBotnet Detection Techniques
Botnet Detection TechniquesTeam Firefly
 
Bitspend Introduction
Bitspend IntroductionBitspend Introduction
Bitspend Introductionbitcoin
 
Man In The Middle - Hacking Illustrated
Man In The Middle - Hacking IllustratedMan In The Middle - Hacking Illustrated
Man In The Middle - Hacking IllustratedInfoSec Institute
 

Viewers also liked (20)

Bitcoin (Global Digital Currency)
Bitcoin (Global Digital Currency) Bitcoin (Global Digital Currency)
Bitcoin (Global Digital Currency)
 
Bitcoin, Blockchain y más allá: Riesgos y Oportunidades
Bitcoin, Blockchain y más allá: Riesgos y OportunidadesBitcoin, Blockchain y más allá: Riesgos y Oportunidades
Bitcoin, Blockchain y más allá: Riesgos y Oportunidades
 
Man in-the-middle attack(http)
Man in-the-middle attack(http)Man in-the-middle attack(http)
Man in-the-middle attack(http)
 
Path oram
Path oramPath oram
Path oram
 
From Big Linked Data to Linked Big Data - DBpedia as a framework for data int...
From Big Linked Data to Linked Big Data - DBpedia as a framework for data int...From Big Linked Data to Linked Big Data - DBpedia as a framework for data int...
From Big Linked Data to Linked Big Data - DBpedia as a framework for data int...
 
ORAM: A Brief Overview
ORAM: A Brief OverviewORAM: A Brief Overview
ORAM: A Brief Overview
 
Man in the middle
Man in the middleMan in the middle
Man in the middle
 
MITM : man in the middle attack
MITM : man in the middle attackMITM : man in the middle attack
MITM : man in the middle attack
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
BotNet Attacks
BotNet AttacksBotNet Attacks
BotNet Attacks
 
man in the middle
man in the middleman in the middle
man in the middle
 
Scaling up Linked Data
Scaling up Linked DataScaling up Linked Data
Scaling up Linked Data
 
Introduction to Bitcoins and Cryptocurrency
Introduction to Bitcoins and CryptocurrencyIntroduction to Bitcoins and Cryptocurrency
Introduction to Bitcoins and Cryptocurrency
 
Botnet Detection Techniques
Botnet Detection TechniquesBotnet Detection Techniques
Botnet Detection Techniques
 
Bitspend Introduction
Bitspend IntroductionBitspend Introduction
Bitspend Introduction
 
Ppt.1
Ppt.1Ppt.1
Ppt.1
 
Man In The Middle - Hacking Illustrated
Man In The Middle - Hacking IllustratedMan In The Middle - Hacking Illustrated
Man In The Middle - Hacking Illustrated
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Smart contracts
Smart contractsSmart contracts
Smart contracts
 
Bitcoin technology
Bitcoin technologyBitcoin technology
Bitcoin technology
 

Similar to Analyzing Bitcoin Security

New Business Models enabled by Blockchain
New Business Models enabled by BlockchainNew Business Models enabled by Blockchain
New Business Models enabled by BlockchainSlash
 
Blockchain disruptive technology 2018
Blockchain disruptive technology 2018Blockchain disruptive technology 2018
Blockchain disruptive technology 2018Ziyad Abualrob
 
Intro to Blockchain Slides
Intro to Blockchain SlidesIntro to Blockchain Slides
Intro to Blockchain SlidesShannon Wells
 
Best practices to build secure smart contracts
Best practices to build secure smart contractsBest practices to build secure smart contracts
Best practices to build secure smart contractsGautam Anand
 
Blockchain: 12 predictions for a new world
Blockchain: 12 predictions for a new worldBlockchain: 12 predictions for a new world
Blockchain: 12 predictions for a new worldPhilippe Camacho, Ph.D.
 
Toward Money-over-IP? From Bitcoin to M2M Money
Toward Money-over-IP? From Bitcoin to M2M MoneyToward Money-over-IP? From Bitcoin to M2M Money
Toward Money-over-IP? From Bitcoin to M2M MoneyGeorge Giaglis
 
Blockchain and the digital future. Promises of new technology against reality
Blockchain and the digital future. Promises of new technology against realityBlockchain and the digital future. Promises of new technology against reality
Blockchain and the digital future. Promises of new technology against realityVladimir Seleznev
 
Blockchain Technology: A Technical Introduction to Non-Technical People
Blockchain Technology: A Technical Introduction to Non-Technical PeopleBlockchain Technology: A Technical Introduction to Non-Technical People
Blockchain Technology: A Technical Introduction to Non-Technical PeopleMecklerMedia
 
Blockchain technology in (life) sciences
Blockchain technology in (life) sciencesBlockchain technology in (life) sciences
Blockchain technology in (life) sciencesBarbera van Schaik
 
Blockchain Тechnology - Introduction
Blockchain Тechnology - IntroductionBlockchain Тechnology - Introduction
Blockchain Тechnology - IntroductionGalin Dinkov
 
IOTA Presentation - BlockchainHub Graz Meetup #5
IOTA Presentation - BlockchainHub Graz Meetup #5 IOTA Presentation - BlockchainHub Graz Meetup #5
IOTA Presentation - BlockchainHub Graz Meetup #5 BlockchainHub Graz
 
Bitcoin: Not just a currency but an IoT facilitator
Bitcoin: Not just a currency but an IoT facilitatorBitcoin: Not just a currency but an IoT facilitator
Bitcoin: Not just a currency but an IoT facilitatorRobin Teigland
 
Blockchain security research (in 2 minutes)
Blockchain security research (in 2 minutes)Blockchain security research (in 2 minutes)
Blockchain security research (in 2 minutes)Sergei Tikhomirov
 

Similar to Analyzing Bitcoin Security (20)

New Business Models enabled by Blockchain
New Business Models enabled by BlockchainNew Business Models enabled by Blockchain
New Business Models enabled by Blockchain
 
Blockchain introduction
Blockchain introductionBlockchain introduction
Blockchain introduction
 
Blockchain disruptive technology 2018
Blockchain disruptive technology 2018Blockchain disruptive technology 2018
Blockchain disruptive technology 2018
 
Brief Introduction to Blockchain Security
Brief Introduction to Blockchain SecurityBrief Introduction to Blockchain Security
Brief Introduction to Blockchain Security
 
Intro to Blockchain Slides
Intro to Blockchain SlidesIntro to Blockchain Slides
Intro to Blockchain Slides
 
Best practices to build secure smart contracts
Best practices to build secure smart contractsBest practices to build secure smart contracts
Best practices to build secure smart contracts
 
Crypto currency
Crypto currencyCrypto currency
Crypto currency
 
Blockchain: 12 predictions for a new world
Blockchain: 12 predictions for a new worldBlockchain: 12 predictions for a new world
Blockchain: 12 predictions for a new world
 
Bitcoin Talk at Rainbow
Bitcoin Talk at RainbowBitcoin Talk at Rainbow
Bitcoin Talk at Rainbow
 
Toward Money-over-IP? From Bitcoin to M2M Money
Toward Money-over-IP? From Bitcoin to M2M MoneyToward Money-over-IP? From Bitcoin to M2M Money
Toward Money-over-IP? From Bitcoin to M2M Money
 
Blockchain and the digital future. Promises of new technology against reality
Blockchain and the digital future. Promises of new technology against realityBlockchain and the digital future. Promises of new technology against reality
Blockchain and the digital future. Promises of new technology against reality
 
Blockchain Technology: A Technical Introduction to Non-Technical People
Blockchain Technology: A Technical Introduction to Non-Technical PeopleBlockchain Technology: A Technical Introduction to Non-Technical People
Blockchain Technology: A Technical Introduction to Non-Technical People
 
Blockchain technology in (life) sciences
Blockchain technology in (life) sciencesBlockchain technology in (life) sciences
Blockchain technology in (life) sciences
 
Blockchain Тechnology - Introduction
Blockchain Тechnology - IntroductionBlockchain Тechnology - Introduction
Blockchain Тechnology - Introduction
 
AI and Blockchain
AI and BlockchainAI and Blockchain
AI and Blockchain
 
IOTA Presentation - BlockchainHub Graz Meetup #5
IOTA Presentation - BlockchainHub Graz Meetup #5 IOTA Presentation - BlockchainHub Graz Meetup #5
IOTA Presentation - BlockchainHub Graz Meetup #5
 
Introduction to Blockchain and Ethereum
Introduction to Blockchain and EthereumIntroduction to Blockchain and Ethereum
Introduction to Blockchain and Ethereum
 
Blockchain presentation v0617
Blockchain presentation v0617Blockchain presentation v0617
Blockchain presentation v0617
 
Bitcoin: Not just a currency but an IoT facilitator
Bitcoin: Not just a currency but an IoT facilitatorBitcoin: Not just a currency but an IoT facilitator
Bitcoin: Not just a currency but an IoT facilitator
 
Blockchain security research (in 2 minutes)
Blockchain security research (in 2 minutes)Blockchain security research (in 2 minutes)
Blockchain security research (in 2 minutes)
 

More from Philippe Camacho, Ph.D.

Cuando las maquinas deciden por nosotros: introducción a los contratos inteli...
Cuando las maquinas deciden por nosotros: introducción a los contratos inteli...Cuando las maquinas deciden por nosotros: introducción a los contratos inteli...
Cuando las maquinas deciden por nosotros: introducción a los contratos inteli...Philippe Camacho, Ph.D.
 
Predicate-Preserving Collision-Resistant Hashing
Predicate-Preserving  Collision-Resistant HashingPredicate-Preserving  Collision-Resistant Hashing
Predicate-Preserving Collision-Resistant HashingPhilippe Camacho, Ph.D.
 
Fair Exchange of Short Signatures without Trusted Third Party
Fair Exchange of Short Signatures without Trusted Third PartyFair Exchange of Short Signatures without Trusted Third Party
Fair Exchange of Short Signatures without Trusted Third PartyPhilippe Camacho, Ph.D.
 
On the Impossibility of Batch Update for Cryptographic Accumulators
On the Impossibility of Batch Update for Cryptographic AccumulatorsOn the Impossibility of Batch Update for Cryptographic Accumulators
On the Impossibility of Batch Update for Cryptographic AccumulatorsPhilippe Camacho, Ph.D.
 
Short Transitive Signatures For Directed Trees
Short Transitive Signatures For Directed TreesShort Transitive Signatures For Directed Trees
Short Transitive Signatures For Directed TreesPhilippe Camacho, Ph.D.
 
Strong Accumulators From Collision-Resistant Hashing
Strong Accumulators From Collision-Resistant HashingStrong Accumulators From Collision-Resistant Hashing
Strong Accumulators From Collision-Resistant HashingPhilippe Camacho, Ph.D.
 

More from Philippe Camacho, Ph.D. (19)

Cuando las maquinas deciden por nosotros: introducción a los contratos inteli...
Cuando las maquinas deciden por nosotros: introducción a los contratos inteli...Cuando las maquinas deciden por nosotros: introducción a los contratos inteli...
Cuando las maquinas deciden por nosotros: introducción a los contratos inteli...
 
Bitcoin y (in)seguridad: 5 paradojas
Bitcoin y (in)seguridad: 5 paradojasBitcoin y (in)seguridad: 5 paradojas
Bitcoin y (in)seguridad: 5 paradojas
 
No más Madoff: Satoshi al rescate
No más Madoff: Satoshi al rescateNo más Madoff: Satoshi al rescate
No más Madoff: Satoshi al rescate
 
Protocols for Provable Solvency
Protocols for Provable SolvencyProtocols for Provable Solvency
Protocols for Provable Solvency
 
Más allá del dinero: Bitcoin
Más allá del dinero: BitcoinMás allá del dinero: Bitcoin
Más allá del dinero: Bitcoin
 
Introducción a Bitcoin
Introducción a BitcoinIntroducción a Bitcoin
Introducción a Bitcoin
 
How to explain bitcoin to your mother
How to explain bitcoin to your motherHow to explain bitcoin to your mother
How to explain bitcoin to your mother
 
Predicate-Preserving Collision-Resistant Hashing
Predicate-Preserving  Collision-Resistant HashingPredicate-Preserving  Collision-Resistant Hashing
Predicate-Preserving Collision-Resistant Hashing
 
Cuidatusbitcoins
CuidatusbitcoinsCuidatusbitcoins
Cuidatusbitcoins
 
Fair Exchange of Short Signatures without Trusted Third Party
Fair Exchange of Short Signatures without Trusted Third PartyFair Exchange of Short Signatures without Trusted Third Party
Fair Exchange of Short Signatures without Trusted Third Party
 
Foaf+ssl
Foaf+sslFoaf+ssl
Foaf+ssl
 
Agilidad al rescate
Agilidad al rescateAgilidad al rescate
Agilidad al rescate
 
XPDay2009: Nameaction
XPDay2009: NameactionXPDay2009: Nameaction
XPDay2009: Nameaction
 
On the Impossibility of Batch Update for Cryptographic Accumulators
On the Impossibility of Batch Update for Cryptographic AccumulatorsOn the Impossibility of Batch Update for Cryptographic Accumulators
On the Impossibility of Batch Update for Cryptographic Accumulators
 
Short Transitive Signatures For Directed Trees
Short Transitive Signatures For Directed TreesShort Transitive Signatures For Directed Trees
Short Transitive Signatures For Directed Trees
 
Strong Accumulators From Collision-Resistant Hashing
Strong Accumulators From Collision-Resistant HashingStrong Accumulators From Collision-Resistant Hashing
Strong Accumulators From Collision-Resistant Hashing
 
Security of DNS
Security of DNSSecurity of DNS
Security of DNS
 
Agile daychile2010
Agile daychile2010Agile daychile2010
Agile daychile2010
 
Agiles2010
Agiles2010Agiles2010
Agiles2010
 

Recently uploaded

Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 

Recently uploaded (20)

Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 

Analyzing Bitcoin Security