Cryptographic Primitives in Blockchain Technology
Latest Publications


TOTAL DOCUMENTS

11
(FIVE YEARS 11)

H-INDEX

0
(FIVE YEARS 0)

Published By Oxford University Press

9780198862840, 9780191895463

Author(s):  
Andreas Bolfing

Chapter 5 considers distributed systems by their properties. The first section studies the classification of software systems, which is usually distinguished in centralized, decentralized and distributed systems. It studies the differences between these three major approaches, showing there is a rather multidimensional classification instead of a linear one. The most important case are distributed systems that enable spreading of computational tasks across several autonomous, independently acting computational entities. A very important result of this case is the CAP theorem that considers the trade-off between consistency, availability and partition tolerance. The last section deals with the possibility to reach consensus in distributed systems, discussing how fault tolerant consensus mechanisms enable mutual agreement among the individual entities in presence of failures. One very special case are so-called Byzantine failures that are discussed in great detail. The main result is the so-called FLP Impossibility Result which states that there is no deterministic algorithm that guarantees solution to the consensus problem in the asynchronous case. The chapter concludes by considering practical solutions that circumvent the impossibility result in order to reach consensus.


Author(s):  
Andreas Bolfing

The rapid progress of Information and Communication Technology (ICT) continuously intensifies the interest in the two disciplines of security and privacy. This chapter introduces the most important concepts of information security, which essentially include the three major security mechanisms identification, authentication and authorization. These mechanisms are used to obtain the most important security goals, namely confidentiality, integrity, availability and non-repudiation, which are standardized by many international organisations. The next section deals with the possible attacks against distributed systems, which are mainly the Denial-of-Service (DoS) and the Sybil attack. The chapter then concludes by introducing one possible defense mechanism against such attacks, which is now publicly known as Proof-of-Work (PoW).


Author(s):  
Andreas Bolfing

Bitcoin was proposed by Nakamoto (2008) as the first electronic payment system, which fully relies on cryptographic primitives in order to work over a purely peer-to-peer system, where everyone can participate in spending funds to other users without the need for a trusted third party. This chapter first introduces the basic ideas of Satoshi Nakamoto, who defined an electronic coin as a chain of digital signatures. It explains how the addresses in Bitcoin are derived, and how the elliptic curve cryptography (ECC) key pair is used in order to transact funds from one user to another. For this, it shows how the transactions are constructed in Bitcoin, based on the most common transaction, which is the Pay-to-Public-Key-Hash transaction. The last section then shows how the transactions are permanently stored in the public ledger, the blockchain, and how the miners solve the Proof-of-Work in order to safeguard the records.


Author(s):  
Andreas Bolfing

This chapter gives an introduction to blockchain technology which was proposed by the pseudonymous Nakamoto (2008) with his well-known Bitcoin paper to enable online payments in a decentralized digital cash system, solving the double-spending problem where someone can make two payments with the same coin. The chapter starts with an informal outline of the application of a blockchain and a brief explanation of how a blockchain network is able to reach consensus about the common state of a transaction history. Furthermore, it introduces the Proof-of-Work (PoW) algorithmwhich needs to be donein order to extend the blockchain with new blocks. Since the PoW is a very costly computational algorithm, the transaction data is stored in previous blocks resistant to modification, and thus the PoW safeguards the order of blocks, forming a tamper-proof history of transactions. As a last step, it examines the double-spending attack, which is a fundamental attack to the integrity of a blockchain based system.


Author(s):  
Andreas Bolfing

This chapter provides a very detailed introduction to cryptography. It first explains the cryptographic basics and introduces the concept of public-key encryption which is based on one-way and trapdoor functions, considering the three major public-key encryption families like integer factorization, discrete logarithm and elliptic curve schemes. This is followed by an introduction to hash functions which are applied to construct Merkle trees and digital signature schemes. As modern cryptoschemes are commonly based on elliptic curves, the chapter then introduces elliptic curve cryptography which is based on the Elliptic Curve Discrete Logarithm Problem (ECDLP). It considers the hardness of the ECDLP and the possible attacks against it, showing how to find suitable domain parameters to construct cryptographically strong elliptic curves. This is followed by the discussion of elliptic curve domain parameters which are recommended by current standards. Finally, it introduces the Elliptic Curve Digital Signature Algorithm (ECDSA), the elliptic curve digital signature scheme.


Author(s):  
Andreas Bolfing

Blockchains are heavily based on mathematical concepts, in particular on algebraic structures. This chapter starts with an introduction to the main aspects in number theory, such as the divisibility of integers, prime numbers and Euler’s totient function. Based on these basics, it follows a very detailed introduction to modern algebra, including group theory, ring theory and field theory. The algebraic main results are then applied to describe the structure of cyclic groups and finite fields, which are needed to construct cryptographic primitives. The chapter closes with an introduction to complexity theory, examining the efficiency of algorithms.


Author(s):  
Andreas Bolfing
Keyword(s):  

This chapter gives an outline of Nakamoto’s main idea when introducing Bitcoin as first blockchain system in history of computer sciences. The scope of the book and its outline is described.


Author(s):  
Andreas Bolfing
Keyword(s):  

This final chapter gives a short summary of the contents of the book and represents some important lessons about the security considerations of the cryptography used in blockchain systems.


Author(s):  
Andreas Bolfing

Chapter 10 deals with the fact that quantum computers will break all current practical digital signature schemes once large-scale quantum computers become reality. The chapter starts with an outline of the major cryptographic primitives that are considered to be quantum-safe and compare their efficiency and usability for blockchain networks. For this, it compares the basic factors of the most popular classical public-key schemes and some chosen post-quantum approaches. This is followed by an introduction to hash-based cryptosystems. Based on Lamport-Diffie one-time signatures, it shows how hash-based signature schemes work and how they can be transformed to multi-signature schemes.


Author(s):  
Andreas Bolfing

Bitcoin’s security relies solely on cryptographic primitives, namely on digital signatures, hash functions and Merkle trees. This chapter discusses the security of the Bitcoin system if some primitives become weaker due to advances in cryptanalysis, an increasing computing power of the adversaries or improper software implementations. The chapter starts with a general overview of the primitives in use, explaining possible attack strategies against each of them, which is followed by combined attack strategies. The chapter closes by showing the consequences of Grover’s and Shor’s quantum algorithms for Bitcoin’s security.


Sign in / Sign up

Export Citation Format

Share Document