SlideShare una empresa de Scribd logo
1 de 39
Descargar para leer sin conexión
THE BLOCKCHAIN BUSINESS CLOUD
ADVANCED BLOCKCHAIN TECHNOLOGIES
ON PRIVACY AND SCALABILITY
Jim Zhang, Co-founder, Head of Protocol Engineering
Kaleido, The Blockchain Business Cloud
Agenda
• What makes Jim from Kaleido qualified for this topic?
• Privacy
• Scalability
The Blockchain Business Cloud
Full Stack Blockchain Platform for Modern Business Networks
Business Networks Made Radically Simple For the Enterprise
Kaleido sits at the intersection of world’s largest
blockchain company and the world’s leading clouds
Largest cloud infrastructure provider
61 Availability Zones across 20 Regions,
Complimentary services
A leading pure-play blockchain company
Global consulting. Deep blockchain expertise
1,200+ specialists in 30+ countries
Early Pioneer of blockchain technology
100+ datacenters across 54 regions
Complimentary services
THE BLOCKCHAIN BUSINESS CLOUD
Blockchain Projects are
Accelerating into Production Status
on Kaleido
BLOCKCHAIN NETWORK
LEDGER & SMART CONTRACTS
OFF-CHAIN STACK
DECENTRALIZED TECH
APPLICATION
APPS & MIDDLEWARE
The chain is
of a complete
blockchain solution 5%
45%
50%
Typical projects have over 40 components
Modernizing Business Networks
Enterprise IntegrationCollaboration Services
Digital Assets Cryptography API Gateway
Data Feeds B2B Messaging Connectors
Off Chain On Chain Data BusData
Full Stack blockchain for the
modern business network
Middleware
App
Blockchain Network
Privacy Blockchain First EventsTransaction
Cross-Cloud:
One Chain, Many Clouds
Kaleido’s platform offers a single, seamless experience across
participants to build and manage blockchains running across
Microsoft Azure and AWS
Multi-Region:
Start Anywhere, Grow Anywhere
Start your consortium in any available cloud region and enable
members to join from their geography of choice.
Hybrid Deployment: Run Behind Your Own
Firewall
Deploy the Kaleido stack on your own on-premise node and
integrate seamlessly into broader business network.
Only Kaleido delivers multi-region, cross-cloud,
and hybrid deployments
On-prem
Private cloud
Org C: Kaleido Private Stack
Org A: AWS Org B: Azure
10x
the APIs
Shared IT
DevOps
Privacy
Defining “Privacy”
• Confidentiality
• Hiding the “what”
• Anonymity
• Hiding the “who”
Quick Refresher on Blockchain
• Foundational properties of a blockchain:
• Shared ledger
• Shared view of transactions order
• Trustless model
• Do not trust others’ records
• Independent validation of proposed blocks (order of transactions)
• Independent execution of transactions
• Consensus
• All copies of the ledger are guaranteed to be identical (fraudulent records are easy to
discover and dispute)
Privacy is inherently challenging in blockchain
• The most valuable property of blockchain is data immutability
• Which is achieved by having multiple parties maintain a shared ledger
• Transactions are independently executed by nodes while validating
blocks
• As a result, both transaction input and state are globally shared
throughout the network participants
• How can privacy be achieved in such an architectural context?
Technique #1: Data Isolation
• Only a subset of the network participants get the transaction input,
others do not know such transactions have happened
• States are inherently partitioned: there are many separate state trees
corresponding to private transactions
• It’s also important to have a reference of commitment in the global
shared ledger to ensure security of the private transactions (eg. For
dispute resolution when private parties do not agree with private
states)
• Examples: EEA Private Transactions (Quorum, Hyperledger Besu),
Hyperledger Fabric private data collections
Technique #2: Separate Blockchains
• Most enterprise use cases dictate permissioned blockchains, such
that data is not accessible to external parties
• Setting up different instances of permissioned blockchains, among
different groups of private transactions, to keep transactions private
• Overhead can be high, although with Hyperledger Fabric’s channel
design, single node can participate in multiple networks
• Can still be a costly pattern given the number of permutations
required to satisfy privacy among a large number of participants
Technique #3: Address Generation
• Only addresses anonymity
• Use a new address for every transaction, making it impossible to link
signing keys to real world identity
• Hides trading patterns
• Typically using key derivation from a master seed to avoid tracking a
large number of signing keys
• e.g BIP32 compliant Hierarchical Deterministic wallets
Technique #3: Trusted Compute
• The idea is that:
• Transaction inputs are hidden,
• but the processing logic is public,
• such that the computations involved in the state transfer can be performed
only by the transaction participants
• but others can be convinced that the computations are done
correctly/honestly
• “I may not know what you did, but I know you did it
honestly/correctly”
Different types of Trusted Compute
• Zero Knowledge Proof (ZKP)
• Using advanced cryptography, present a proof that only the transaction
submitter can generate, and ask all participants to verify for correctness
• Trusted Execution Environment (TEE)
• Execute the transaction on a special hardware based environment, and be
assured the code involved match expected processing logic
Zero Knowledge Proof
• A cryptographic protocol
• Actors: prover, verifier
• Goal: prover to convince the verifier of the possession of knowledge
X, without disclosing what X is
ZKP – An illustrative explanation
• Alice to Prove: Knowledge of a Sudoku puzzle solution
Prover Verifier
ZKP – An illustrative explanation
• Step 1: Alice to permute the solution by using different numbers, 1-
>5, 2-> 7, 3->2, etc.
Prover Verifier
ZKP – An illustrative explanation
• Step 1: mask the solution, called a “commitment”
Prover Verifier
commitment
ZKP – An illustrative explanation
• Step 2: present the commitment to Bob
commitment
Prover Verifier
ZKP – An illustrative explanation
• Step 3: Bob randomly picks a unit (row, column or 3x3 square) and asks
Alice to reveal the (permuted) solution; Bob verifies for correctness
Prover Verifier
ZKP – An illustrative explanation
• Step 4: Alice permutes the solution again to get a different set of
numbers (still mapped from the original solution)
Prover Verifier
ZKP – An illustrative explanation
• Step 5: Bob randomly picks another unit and asks Alice to reveal the
(permuted) solution again
Prover Verifier
ZKP – An illustrative explanation
• After enough rounds, Bob is convinced that Alice must know the
correct answer to be able to nail each requested unit, randomly
decided by the verifier
• Zero Knowledge Proof is a probabilistic proof
Prover Verifier
ZKP – cryptographic components*
• Secure hashing (to produce commitments)
• Homomorphic encryption (to hide verifier’s challenge)
• Cryptographic pairing (to make the protocol non-interactive and
operate on encrypted public parameters from trusted setup)
* Based on zkSNARKs protocol
ZKP – comparing protocols
Proof
Verification
Time
Proof Size Utility Trusted Setup
zkSNARKs Short Constant (228 bytes for 128bit
security)
General purpose Needed
Bulletproof Long Logarithmic to complexity of the
arithmetic circuits
Numeric operations,
Range proofs
Not needed
zkSTARKs General purpose Not needed
Trusted Execution Environment
• Hardware based secure enclave where code and data are protected
against malicious access, even if attacker gained admin privilege
• Both confidentiality (can not steal what’s inside the enclave) and
integrity (can be ensured the right code is executed) are protected
• Provides remote attestation on the code and data inside the enclave
• Examples:
• Intel SGX (Software Guard Extension)
• IBM SSC (Secure Service Container)
• ARM TrustZone
TEE - How It Works and Why It Matters
• “Enclaves” are special regions of memory that is only accessible to
CPUs, not even system administrator can see what’s inside
• “Attestation” is equivalent to a proof in ZKP, that can convince a
verifier of correct computation
• Therefore, using TEE to process transactions and sending either the
encrypted result or hash to the blockchain, guarantees confidentiality
Enterprise Ethereum Alliance Trusted Token Dapp
– A Reference Implementation of Hyperledger
Avalon
Admin Scope
TEE
Listener
Registered WorkerUser Scope Blockchain
SGX VM Cluster
JWT
Secret
Provision
Transaction
Data
Storage
Encrypted
Tx Requests
SMS
TEE
App
Intel SGX Enclave
Kaleido Offers Wide Range of Privacy Features
• Data Isolation
• Kaleido supports EEA Compliant Private Transactions via Quorum, Hyperledger Besu
• Separate blockchains
• streamlined onboarding, same Kaleido attested organizational identifies can be re-used in many
instances of blockchains
• Address generation
• BIP32 compliant HD Wallet in Kaleido marketplace
• Zero Knowledge Proof
• Zero Knowledge Token Transfer service in Kaleido marketplace; QEDIT as a partner service
• Trusted Execution Environment
• Kaleido is a founding member of Hyperledger Avalon, the latest project to utilize trusted
compute in blockchains
Scalability
Blockchain’s Scalability Trilemma
• Vitalik Buterin:
Security
Scalability Decentralization
Decentralization in Enterprise Blockchains
• Unlike public blockchains, enterprise blockchains are almost always
built with permissioned networks, where all identities are known to
be linked to real world entities
• This gives consortiums legal tools that are not available to public
blockchains
• As such, decentralization in enterprise blockchains are not achieved
with massive number of nodes, but with competing real world
interests (thus making collusions costly)
Achieving Scalability
• Increased block size
• More efficient consensus algorithms, instead of PoW, use:
• Crash fault tolerance – Raft, Kafka (zookeeper)
• Byzantine fault tolerance – IBFT, Tendermint
• Off-chain (“layer-2”) transactions
• state channels
• Trusted Execution Environment
• Sharding
• Split smart contracts and accounts among instances of blockchains, and have
a single coordinating chain to ensure security (consensus)
• Eth2.0
Get Started With Kaleido Today
Thank You

Más contenido relacionado

La actualidad más candente

Enterprise Blockchain: Lessons from Global Innovators in Production (All Thin...
Enterprise Blockchain: Lessons from Global Innovators in Production (All Thin...Enterprise Blockchain: Lessons from Global Innovators in Production (All Thin...
Enterprise Blockchain: Lessons from Global Innovators in Production (All Thin...Kaleido
 
Blockchain for Business
Blockchain for BusinessBlockchain for Business
Blockchain for BusinessAhmad Gohar
 
Blockchain Essentials and Blockchain on Azure
Blockchain Essentials and Blockchain on AzureBlockchain Essentials and Blockchain on Azure
Blockchain Essentials and Blockchain on AzureNuri Cankaya
 
How does hyperledger fabric blockchain work
How does hyperledger fabric blockchain work How does hyperledger fabric blockchain work
How does hyperledger fabric blockchain work Blockchain Council
 
Blockchain FinTech PoC
Blockchain FinTech PoCBlockchain FinTech PoC
Blockchain FinTech PoCSanjeev Raman
 
Enterprise Blockchain: Lessons from Global Innovators in Production (All Thin...
Enterprise Blockchain: Lessons from Global Innovators in Production (All Thin...Enterprise Blockchain: Lessons from Global Innovators in Production (All Thin...
Enterprise Blockchain: Lessons from Global Innovators in Production (All Thin...Peter Broadhurst
 
Enterprise Blockchain Application Development using Azure Blockchain Service
Enterprise Blockchain Application Development using Azure Blockchain ServiceEnterprise Blockchain Application Development using Azure Blockchain Service
Enterprise Blockchain Application Development using Azure Blockchain ServiceJuarez Junior
 
The Emerging Role of ZKP in the Privacy Stack of Production Business Networks...
The Emerging Role of ZKP in thePrivacy Stack ofProduction Business Networks...The Emerging Role of ZKP in thePrivacy Stack ofProduction Business Networks...
The Emerging Role of ZKP in the Privacy Stack of Production Business Networks...Peter Broadhurst
 
Introduction to Blockchain for Business
Introduction to Blockchain for BusinessIntroduction to Blockchain for Business
Introduction to Blockchain for BusinessFito Benitez
 
Blockchain on Azure
Blockchain on AzureBlockchain on Azure
Blockchain on AzureNuri Cankaya
 
What does it take to deploy large scale decentralized applications?
What does it take to deploy large scale decentralized applications?What does it take to deploy large scale decentralized applications?
What does it take to deploy large scale decentralized applications?Peter Broadhurst
 
Building Blockchain Projects on Enterprise Ethereum [Webinar]
Building Blockchain Projects on Enterprise Ethereum [Webinar] Building Blockchain Projects on Enterprise Ethereum [Webinar]
Building Blockchain Projects on Enterprise Ethereum [Webinar] Kaleido
 
The Microsoft vision for Blockchain
The Microsoft vision for BlockchainThe Microsoft vision for Blockchain
The Microsoft vision for BlockchainASPEX_BE
 
Microsoft blockchain vision - enterprise smart contracts, coco framework and...
Microsoft blockchain vision  - enterprise smart contracts, coco framework and...Microsoft blockchain vision  - enterprise smart contracts, coco framework and...
Microsoft blockchain vision - enterprise smart contracts, coco framework and...Razi Rais
 
Introduction to Blockchain Business Models
Introduction to Blockchain Business ModelsIntroduction to Blockchain Business Models
Introduction to Blockchain Business ModelsGokul Alex
 
Distributed Intelligence
Distributed IntelligenceDistributed Intelligence
Distributed IntelligenceNuri Cankaya
 
Gluecon 2016 Keynote: Deploying and Managing Blockchain Applications
Gluecon 2016 Keynote: Deploying and Managing Blockchain ApplicationsGluecon 2016 Keynote: Deploying and Managing Blockchain Applications
Gluecon 2016 Keynote: Deploying and Managing Blockchain ApplicationsDuncan Johnston-Watt
 
Hyperledger Sawtooth Lake Intel's OSS Contribution to Enterprise Blockchain
Hyperledger Sawtooth Lake Intel's OSS Contribution to Enterprise BlockchainHyperledger Sawtooth Lake Intel's OSS Contribution to Enterprise Blockchain
Hyperledger Sawtooth Lake Intel's OSS Contribution to Enterprise BlockchainAltoros
 
Microsoft Accelerator event- Blockchain technology from disruptive concept to...
Microsoft Accelerator event- Blockchain technology from disruptive concept to...Microsoft Accelerator event- Blockchain technology from disruptive concept to...
Microsoft Accelerator event- Blockchain technology from disruptive concept to...Hila Bar
 

La actualidad más candente (20)

Enterprise Blockchain: Lessons from Global Innovators in Production (All Thin...
Enterprise Blockchain: Lessons from Global Innovators in Production (All Thin...Enterprise Blockchain: Lessons from Global Innovators in Production (All Thin...
Enterprise Blockchain: Lessons from Global Innovators in Production (All Thin...
 
Blockchain for Business
Blockchain for BusinessBlockchain for Business
Blockchain for Business
 
Blockchain Essentials and Blockchain on Azure
Blockchain Essentials and Blockchain on AzureBlockchain Essentials and Blockchain on Azure
Blockchain Essentials and Blockchain on Azure
 
How does hyperledger fabric blockchain work
How does hyperledger fabric blockchain work How does hyperledger fabric blockchain work
How does hyperledger fabric blockchain work
 
Blockchain FinTech PoC
Blockchain FinTech PoCBlockchain FinTech PoC
Blockchain FinTech PoC
 
Enterprise Blockchain: Lessons from Global Innovators in Production (All Thin...
Enterprise Blockchain: Lessons from Global Innovators in Production (All Thin...Enterprise Blockchain: Lessons from Global Innovators in Production (All Thin...
Enterprise Blockchain: Lessons from Global Innovators in Production (All Thin...
 
Enterprise Blockchain Application Development using Azure Blockchain Service
Enterprise Blockchain Application Development using Azure Blockchain ServiceEnterprise Blockchain Application Development using Azure Blockchain Service
Enterprise Blockchain Application Development using Azure Blockchain Service
 
Making blockchain real for business
Making blockchain real for businessMaking blockchain real for business
Making blockchain real for business
 
The Emerging Role of ZKP in the Privacy Stack of Production Business Networks...
The Emerging Role of ZKP in thePrivacy Stack ofProduction Business Networks...The Emerging Role of ZKP in thePrivacy Stack ofProduction Business Networks...
The Emerging Role of ZKP in the Privacy Stack of Production Business Networks...
 
Introduction to Blockchain for Business
Introduction to Blockchain for BusinessIntroduction to Blockchain for Business
Introduction to Blockchain for Business
 
Blockchain on Azure
Blockchain on AzureBlockchain on Azure
Blockchain on Azure
 
What does it take to deploy large scale decentralized applications?
What does it take to deploy large scale decentralized applications?What does it take to deploy large scale decentralized applications?
What does it take to deploy large scale decentralized applications?
 
Building Blockchain Projects on Enterprise Ethereum [Webinar]
Building Blockchain Projects on Enterprise Ethereum [Webinar] Building Blockchain Projects on Enterprise Ethereum [Webinar]
Building Blockchain Projects on Enterprise Ethereum [Webinar]
 
The Microsoft vision for Blockchain
The Microsoft vision for BlockchainThe Microsoft vision for Blockchain
The Microsoft vision for Blockchain
 
Microsoft blockchain vision - enterprise smart contracts, coco framework and...
Microsoft blockchain vision  - enterprise smart contracts, coco framework and...Microsoft blockchain vision  - enterprise smart contracts, coco framework and...
Microsoft blockchain vision - enterprise smart contracts, coco framework and...
 
Introduction to Blockchain Business Models
Introduction to Blockchain Business ModelsIntroduction to Blockchain Business Models
Introduction to Blockchain Business Models
 
Distributed Intelligence
Distributed IntelligenceDistributed Intelligence
Distributed Intelligence
 
Gluecon 2016 Keynote: Deploying and Managing Blockchain Applications
Gluecon 2016 Keynote: Deploying and Managing Blockchain ApplicationsGluecon 2016 Keynote: Deploying and Managing Blockchain Applications
Gluecon 2016 Keynote: Deploying and Managing Blockchain Applications
 
Hyperledger Sawtooth Lake Intel's OSS Contribution to Enterprise Blockchain
Hyperledger Sawtooth Lake Intel's OSS Contribution to Enterprise BlockchainHyperledger Sawtooth Lake Intel's OSS Contribution to Enterprise Blockchain
Hyperledger Sawtooth Lake Intel's OSS Contribution to Enterprise Blockchain
 
Microsoft Accelerator event- Blockchain technology from disruptive concept to...
Microsoft Accelerator event- Blockchain technology from disruptive concept to...Microsoft Accelerator event- Blockchain technology from disruptive concept to...
Microsoft Accelerator event- Blockchain technology from disruptive concept to...
 

Similar a Advanced Blockchain Technologies on Privacy & Scalability (All Things Open)

Advanced Blockchain Technologies on Privacy and Scalability
Advanced Blockchain Technologies on Privacy and ScalabilityAdvanced Blockchain Technologies on Privacy and Scalability
Advanced Blockchain Technologies on Privacy and ScalabilityAll Things Open
 
BlockchainConf.tech - Hyperledger overview
BlockchainConf.tech - Hyperledger overviewBlockchainConf.tech - Hyperledger overview
BlockchainConf.tech - Hyperledger overviewPad Kankipati
 
Block chain fundamentals and hyperledger
Block chain fundamentals and hyperledgerBlock chain fundamentals and hyperledger
Block chain fundamentals and hyperledgersendhilkumarks
 
A Breathless Tour of Blockchain
A Breathless Tour of BlockchainA Breathless Tour of Blockchain
A Breathless Tour of BlockchainEoin Woods
 
Block chains and crypto currencies - introduction
Block chains and crypto currencies - introductionBlock chains and crypto currencies - introduction
Block chains and crypto currencies - introductionInitio
 
Blockchain target-share
Blockchain target-shareBlockchain target-share
Blockchain target-sharejoelcrabb
 
Introduction to Blockchain Governance Models
Introduction to Blockchain Governance ModelsIntroduction to Blockchain Governance Models
Introduction to Blockchain Governance ModelsGokul Alex
 
Blockchain Fundamental_KIPMI_2022.02.26.pdf
Blockchain Fundamental_KIPMI_2022.02.26.pdfBlockchain Fundamental_KIPMI_2022.02.26.pdf
Blockchain Fundamental_KIPMI_2022.02.26.pdfadinugroho751867
 
Blockchain and BPM - Reflections on Four Years of Research and Applications
Blockchain and BPM - Reflections on Four Years of Research and ApplicationsBlockchain and BPM - Reflections on Four Years of Research and Applications
Blockchain and BPM - Reflections on Four Years of Research and ApplicationsIngo Weber
 
Blockchain in the enterprise
Blockchain in the enterpriseBlockchain in the enterprise
Blockchain in the enterpriseJesus Rodriguez
 
Blockchain a-new-disruption-in-financial-servies by ibm
Blockchain a-new-disruption-in-financial-servies by ibm Blockchain a-new-disruption-in-financial-servies by ibm
Blockchain a-new-disruption-in-financial-servies by ibm Diego Alberto Tamayo
 
Blockchain a-new-disruption-in-financial-services - IBM
Blockchain a-new-disruption-in-financial-services - IBMBlockchain a-new-disruption-in-financial-services - IBM
Blockchain a-new-disruption-in-financial-services - IBMDiego Alberto Tamayo
 
Blockchain a-new-disruption-in-financial-servies - IBM
Blockchain a-new-disruption-in-financial-servies - IBMBlockchain a-new-disruption-in-financial-servies - IBM
Blockchain a-new-disruption-in-financial-servies - IBMDiego Alberto Tamayo
 
Blockchain Application Design and Development, and the Case of Programmable M...
Blockchain Application Design and Development, and the Case of Programmable M...Blockchain Application Design and Development, and the Case of Programmable M...
Blockchain Application Design and Development, and the Case of Programmable M...Ingo Weber
 
Blockchain on the oracle cloud, the next big thing
Blockchain on the oracle cloud, the next big thingBlockchain on the oracle cloud, the next big thing
Blockchain on the oracle cloud, the next big thingRobert van Mölken
 
SITIST 2018 Part 1 - Blockchain and Enterprise Use Cases
SITIST 2018 Part 1 - Blockchain and Enterprise Use CasesSITIST 2018 Part 1 - Blockchain and Enterprise Use Cases
SITIST 2018 Part 1 - Blockchain and Enterprise Use Casessitist
 

Similar a Advanced Blockchain Technologies on Privacy & Scalability (All Things Open) (20)

Advanced Blockchain Technologies on Privacy and Scalability
Advanced Blockchain Technologies on Privacy and ScalabilityAdvanced Blockchain Technologies on Privacy and Scalability
Advanced Blockchain Technologies on Privacy and Scalability
 
BlockchainConf.tech - Hyperledger overview
BlockchainConf.tech - Hyperledger overviewBlockchainConf.tech - Hyperledger overview
BlockchainConf.tech - Hyperledger overview
 
Block chain
Block chainBlock chain
Block chain
 
Block chain fundamentals and hyperledger
Block chain fundamentals and hyperledgerBlock chain fundamentals and hyperledger
Block chain fundamentals and hyperledger
 
BlockChain-1.pptx
BlockChain-1.pptxBlockChain-1.pptx
BlockChain-1.pptx
 
A Breathless Tour of Blockchain
A Breathless Tour of BlockchainA Breathless Tour of Blockchain
A Breathless Tour of Blockchain
 
BlockChain-1.pptx
BlockChain-1.pptxBlockChain-1.pptx
BlockChain-1.pptx
 
Blockchain (1).pptx
Blockchain (1).pptxBlockchain (1).pptx
Blockchain (1).pptx
 
Block chains and crypto currencies - introduction
Block chains and crypto currencies - introductionBlock chains and crypto currencies - introduction
Block chains and crypto currencies - introduction
 
Blockchain target-share
Blockchain target-shareBlockchain target-share
Blockchain target-share
 
Introduction to Blockchain Governance Models
Introduction to Blockchain Governance ModelsIntroduction to Blockchain Governance Models
Introduction to Blockchain Governance Models
 
Blockchain Fundamental_KIPMI_2022.02.26.pdf
Blockchain Fundamental_KIPMI_2022.02.26.pdfBlockchain Fundamental_KIPMI_2022.02.26.pdf
Blockchain Fundamental_KIPMI_2022.02.26.pdf
 
Blockchain and BPM - Reflections on Four Years of Research and Applications
Blockchain and BPM - Reflections on Four Years of Research and ApplicationsBlockchain and BPM - Reflections on Four Years of Research and Applications
Blockchain and BPM - Reflections on Four Years of Research and Applications
 
Blockchain in the enterprise
Blockchain in the enterpriseBlockchain in the enterprise
Blockchain in the enterprise
 
Blockchain a-new-disruption-in-financial-servies by ibm
Blockchain a-new-disruption-in-financial-servies by ibm Blockchain a-new-disruption-in-financial-servies by ibm
Blockchain a-new-disruption-in-financial-servies by ibm
 
Blockchain a-new-disruption-in-financial-services - IBM
Blockchain a-new-disruption-in-financial-services - IBMBlockchain a-new-disruption-in-financial-services - IBM
Blockchain a-new-disruption-in-financial-services - IBM
 
Blockchain a-new-disruption-in-financial-servies - IBM
Blockchain a-new-disruption-in-financial-servies - IBMBlockchain a-new-disruption-in-financial-servies - IBM
Blockchain a-new-disruption-in-financial-servies - IBM
 
Blockchain Application Design and Development, and the Case of Programmable M...
Blockchain Application Design and Development, and the Case of Programmable M...Blockchain Application Design and Development, and the Case of Programmable M...
Blockchain Application Design and Development, and the Case of Programmable M...
 
Blockchain on the oracle cloud, the next big thing
Blockchain on the oracle cloud, the next big thingBlockchain on the oracle cloud, the next big thing
Blockchain on the oracle cloud, the next big thing
 
SITIST 2018 Part 1 - Blockchain and Enterprise Use Cases
SITIST 2018 Part 1 - Blockchain and Enterprise Use CasesSITIST 2018 Part 1 - Blockchain and Enterprise Use Cases
SITIST 2018 Part 1 - Blockchain and Enterprise Use Cases
 

Último

Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 

Último (20)

Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 

Advanced Blockchain Technologies on Privacy & Scalability (All Things Open)

  • 1. THE BLOCKCHAIN BUSINESS CLOUD ADVANCED BLOCKCHAIN TECHNOLOGIES ON PRIVACY AND SCALABILITY Jim Zhang, Co-founder, Head of Protocol Engineering Kaleido, The Blockchain Business Cloud
  • 2. Agenda • What makes Jim from Kaleido qualified for this topic? • Privacy • Scalability
  • 3. The Blockchain Business Cloud Full Stack Blockchain Platform for Modern Business Networks Business Networks Made Radically Simple For the Enterprise
  • 4. Kaleido sits at the intersection of world’s largest blockchain company and the world’s leading clouds Largest cloud infrastructure provider 61 Availability Zones across 20 Regions, Complimentary services A leading pure-play blockchain company Global consulting. Deep blockchain expertise 1,200+ specialists in 30+ countries Early Pioneer of blockchain technology 100+ datacenters across 54 regions Complimentary services THE BLOCKCHAIN BUSINESS CLOUD
  • 5. Blockchain Projects are Accelerating into Production Status on Kaleido
  • 6. BLOCKCHAIN NETWORK LEDGER & SMART CONTRACTS OFF-CHAIN STACK DECENTRALIZED TECH APPLICATION APPS & MIDDLEWARE The chain is of a complete blockchain solution 5% 45% 50% Typical projects have over 40 components Modernizing Business Networks
  • 7. Enterprise IntegrationCollaboration Services Digital Assets Cryptography API Gateway Data Feeds B2B Messaging Connectors Off Chain On Chain Data BusData Full Stack blockchain for the modern business network Middleware App Blockchain Network Privacy Blockchain First EventsTransaction
  • 8. Cross-Cloud: One Chain, Many Clouds Kaleido’s platform offers a single, seamless experience across participants to build and manage blockchains running across Microsoft Azure and AWS Multi-Region: Start Anywhere, Grow Anywhere Start your consortium in any available cloud region and enable members to join from their geography of choice. Hybrid Deployment: Run Behind Your Own Firewall Deploy the Kaleido stack on your own on-premise node and integrate seamlessly into broader business network. Only Kaleido delivers multi-region, cross-cloud, and hybrid deployments On-prem Private cloud Org C: Kaleido Private Stack Org A: AWS Org B: Azure
  • 11. Defining “Privacy” • Confidentiality • Hiding the “what” • Anonymity • Hiding the “who”
  • 12. Quick Refresher on Blockchain • Foundational properties of a blockchain: • Shared ledger • Shared view of transactions order • Trustless model • Do not trust others’ records • Independent validation of proposed blocks (order of transactions) • Independent execution of transactions • Consensus • All copies of the ledger are guaranteed to be identical (fraudulent records are easy to discover and dispute)
  • 13. Privacy is inherently challenging in blockchain • The most valuable property of blockchain is data immutability • Which is achieved by having multiple parties maintain a shared ledger • Transactions are independently executed by nodes while validating blocks • As a result, both transaction input and state are globally shared throughout the network participants • How can privacy be achieved in such an architectural context?
  • 14. Technique #1: Data Isolation • Only a subset of the network participants get the transaction input, others do not know such transactions have happened • States are inherently partitioned: there are many separate state trees corresponding to private transactions • It’s also important to have a reference of commitment in the global shared ledger to ensure security of the private transactions (eg. For dispute resolution when private parties do not agree with private states) • Examples: EEA Private Transactions (Quorum, Hyperledger Besu), Hyperledger Fabric private data collections
  • 15. Technique #2: Separate Blockchains • Most enterprise use cases dictate permissioned blockchains, such that data is not accessible to external parties • Setting up different instances of permissioned blockchains, among different groups of private transactions, to keep transactions private • Overhead can be high, although with Hyperledger Fabric’s channel design, single node can participate in multiple networks • Can still be a costly pattern given the number of permutations required to satisfy privacy among a large number of participants
  • 16. Technique #3: Address Generation • Only addresses anonymity • Use a new address for every transaction, making it impossible to link signing keys to real world identity • Hides trading patterns • Typically using key derivation from a master seed to avoid tracking a large number of signing keys • e.g BIP32 compliant Hierarchical Deterministic wallets
  • 17. Technique #3: Trusted Compute • The idea is that: • Transaction inputs are hidden, • but the processing logic is public, • such that the computations involved in the state transfer can be performed only by the transaction participants • but others can be convinced that the computations are done correctly/honestly • “I may not know what you did, but I know you did it honestly/correctly”
  • 18. Different types of Trusted Compute • Zero Knowledge Proof (ZKP) • Using advanced cryptography, present a proof that only the transaction submitter can generate, and ask all participants to verify for correctness • Trusted Execution Environment (TEE) • Execute the transaction on a special hardware based environment, and be assured the code involved match expected processing logic
  • 19. Zero Knowledge Proof • A cryptographic protocol • Actors: prover, verifier • Goal: prover to convince the verifier of the possession of knowledge X, without disclosing what X is
  • 20. ZKP – An illustrative explanation • Alice to Prove: Knowledge of a Sudoku puzzle solution Prover Verifier
  • 21. ZKP – An illustrative explanation • Step 1: Alice to permute the solution by using different numbers, 1- >5, 2-> 7, 3->2, etc. Prover Verifier
  • 22. ZKP – An illustrative explanation • Step 1: mask the solution, called a “commitment” Prover Verifier commitment
  • 23. ZKP – An illustrative explanation • Step 2: present the commitment to Bob commitment Prover Verifier
  • 24. ZKP – An illustrative explanation • Step 3: Bob randomly picks a unit (row, column or 3x3 square) and asks Alice to reveal the (permuted) solution; Bob verifies for correctness Prover Verifier
  • 25. ZKP – An illustrative explanation • Step 4: Alice permutes the solution again to get a different set of numbers (still mapped from the original solution) Prover Verifier
  • 26. ZKP – An illustrative explanation • Step 5: Bob randomly picks another unit and asks Alice to reveal the (permuted) solution again Prover Verifier
  • 27. ZKP – An illustrative explanation • After enough rounds, Bob is convinced that Alice must know the correct answer to be able to nail each requested unit, randomly decided by the verifier • Zero Knowledge Proof is a probabilistic proof Prover Verifier
  • 28. ZKP – cryptographic components* • Secure hashing (to produce commitments) • Homomorphic encryption (to hide verifier’s challenge) • Cryptographic pairing (to make the protocol non-interactive and operate on encrypted public parameters from trusted setup) * Based on zkSNARKs protocol
  • 29. ZKP – comparing protocols Proof Verification Time Proof Size Utility Trusted Setup zkSNARKs Short Constant (228 bytes for 128bit security) General purpose Needed Bulletproof Long Logarithmic to complexity of the arithmetic circuits Numeric operations, Range proofs Not needed zkSTARKs General purpose Not needed
  • 30. Trusted Execution Environment • Hardware based secure enclave where code and data are protected against malicious access, even if attacker gained admin privilege • Both confidentiality (can not steal what’s inside the enclave) and integrity (can be ensured the right code is executed) are protected • Provides remote attestation on the code and data inside the enclave • Examples: • Intel SGX (Software Guard Extension) • IBM SSC (Secure Service Container) • ARM TrustZone
  • 31. TEE - How It Works and Why It Matters • “Enclaves” are special regions of memory that is only accessible to CPUs, not even system administrator can see what’s inside • “Attestation” is equivalent to a proof in ZKP, that can convince a verifier of correct computation • Therefore, using TEE to process transactions and sending either the encrypted result or hash to the blockchain, guarantees confidentiality
  • 32. Enterprise Ethereum Alliance Trusted Token Dapp – A Reference Implementation of Hyperledger Avalon Admin Scope TEE Listener Registered WorkerUser Scope Blockchain SGX VM Cluster JWT Secret Provision Transaction Data Storage Encrypted Tx Requests SMS TEE App Intel SGX Enclave
  • 33. Kaleido Offers Wide Range of Privacy Features • Data Isolation • Kaleido supports EEA Compliant Private Transactions via Quorum, Hyperledger Besu • Separate blockchains • streamlined onboarding, same Kaleido attested organizational identifies can be re-used in many instances of blockchains • Address generation • BIP32 compliant HD Wallet in Kaleido marketplace • Zero Knowledge Proof • Zero Knowledge Token Transfer service in Kaleido marketplace; QEDIT as a partner service • Trusted Execution Environment • Kaleido is a founding member of Hyperledger Avalon, the latest project to utilize trusted compute in blockchains
  • 35. Blockchain’s Scalability Trilemma • Vitalik Buterin: Security Scalability Decentralization
  • 36. Decentralization in Enterprise Blockchains • Unlike public blockchains, enterprise blockchains are almost always built with permissioned networks, where all identities are known to be linked to real world entities • This gives consortiums legal tools that are not available to public blockchains • As such, decentralization in enterprise blockchains are not achieved with massive number of nodes, but with competing real world interests (thus making collusions costly)
  • 37. Achieving Scalability • Increased block size • More efficient consensus algorithms, instead of PoW, use: • Crash fault tolerance – Raft, Kafka (zookeeper) • Byzantine fault tolerance – IBFT, Tendermint • Off-chain (“layer-2”) transactions • state channels • Trusted Execution Environment • Sharding • Split smart contracts and accounts among instances of blockchains, and have a single coordinating chain to ensure security (consensus) • Eth2.0
  • 38. Get Started With Kaleido Today