SlideShare una empresa de Scribd logo
1 de 24
Tangle: An Alternative to Block Chain
For Future of Crypto Currency
Presented by
Kishor Datta Gupta
Center for Information Assurance (CfIA)
Some Conceptual issue
Center for Information Assurance (CfIA)
• Block is not equal Bitcoin or any CryptoCoin.
• Header of every block contains a hash of header of the previous block.
• Mining is NOT about creating new coins.
• Block is not limited to a definite number like Bitcoin/Cryptocoin.
• Linked List outside between blocks & Merkle tree inside between
transections.
• Merkle roots do not verify transactions, they verify a set of transactions.
• Merkle root will change if data tempered.
Simplified Bitcoin Block Chain
Center for Information Assurance (CfIA)
Mining Logic
Center for Information Assurance (CfIA)
Joe's reward = Reward for mining block + transactions fees
Block Chain Issue
Center for Information Assurance (CfIA)
As a Block chain grows over
time, nodes will need more and
more storage capacity and a
higher bandwidth (volume
increases) to keep up-to-date
with the transactions added to
the ledger.
Network Size
Memory Storage
Bandwidth
Centralization
8 Pool Contain 75% mining
Center for Information Assurance (CfIA)
Some can have 51%
Center for Information Assurance (CfIA)
LinkList vs DAG
Center for Information Assurance (CfIA)
LinkList
Direct Acyclic Graph
Tangle
Center for Information Assurance (CfIA)
Same as block chain , tangle is also a distributed ledger, in
which a network of independent accounts perform
transactions among themselves, reaching consensus about
who owns what without depending on a centralized
authority.
http://tangle.glumb.de
Tangle: Issue a transaction
Center for Information Assurance (CfIA)
• It chooses two other transactions to approve (in
general, these two transactions may coincide),
according to some algorithm.
• It checks if the two transactions are not conflicting and
do not approve conflicting transactions.
• For the transaction to be valid, the node must solve a
cryptographic puzzle
Tangle: Nodes
Center for Information Assurance (CfIA)
Full Node: store all transactions since the last snapshot. It
is required to be online (= available to its neighbors) 24/7
Permanodes: is a Full Node that doesn't do snapshots and
stores all transactions since the genesis transaction.
Light Client: does not store any transactions. To make
transactions, it has to has access to a Full Node.
It asks the full node to publish its transactions. It does not
have to be online 24/7.
Swarm Clients: Full Nodes that run distributed on more
than one device.
Tangle: Nodes Weight
Center for Information Assurance (CfIA)
Tangle: Consensus
Center for Information Assurance (CfIA)
A node runs the tip selection algorithm many times, and
see which transaction of the two is more likely to be
(indirectly) approved by the selected tip.
For example, if, after 100 runs of the tip selection
algorithm, a transaction was selected 97 times, we say that
it is confirmed with 97% confidence.
Consensus: tip selection algorithm
Center for Information Assurance (CfIA)
Instead of just randomly selecting two tips (or always using the newest two tips), there
is a tip selection algorithm that is run and which will select the tips, to make sure that
tips are chosen in a way to make the tangle converge (have all transactions approved)
quickly. IOTA Use Random Walk Markov Chain Monte Carlo algorithm
Consensus: Orphaned
Center for Information Assurance (CfIA)
if a node issues a new transaction that approves conflicting transactions, then it risks that
other nodes will not approve its new transaction, which will fall into oblivion."
In order to find transactions to approve that are unlikely to lead its own transaction to be
orphaned, a node runs a "tip selection algorithm."
Incentive: For Node to Run
Center for Information Assurance (CfIA)
Every node calculates some statistics, one of which is how
many new transactions are received from a neighbor. If one
particular node is “too lazy", it will be dropped by its
neighbors.
So, even if a node does not issue transactions (and hence has
no direct incentive to share new transactions that approve its
own one), it still has incentive to work hard.
Incentive: For Full Node to Run
Center for Information Assurance (CfIA)
• Hope that people are generally good
• Almost all server run 24*7
Possible attack scenarios :Double
Spending
Center for Information Assurance (CfIA)
Possible attack scenarios :Parasite
Chain
Center for Information Assurance (CfIA)
Tangle Applications: IOTA
Center for Information Assurance (CfIA)
• Uses a coordinator to issue all node a
certificate.
• Not distributed yet per definition, but
decentralized.
• Uses Quantum Resistance cryptography
• No mining so No transection fees
• Partition intolerance
IOTA is a Crypto Currency designed for
the Internet of Things.
Tangle Applications: Byteball
Center for Information Assurance (CfIA)
• Has Transection Fees
• Use a MC(main chain) algorithm to define transaction order
• Need time to verify transection
• Can remove orphan nodes
Byteball is a Crypto Currency similar to IOTA with additional
features
Tangle Applications: Git
Center for Information Assurance (CfIA)
Git actually use tangle type consensus to commit its code
In simplified form, git object storage is "just" a DAG of objects,
with a handful of different types of objects. They are all stored
compressed and identified by an SHA-1 hash (that, incidentally,
isn't the SHA-1 of the contents of the file they represent, but of
their representation in git).
Tangle Advantages over block chain:
Scalability
Center for Information Assurance (CfIA)
Conclusions
Center for Information Assurance (CfIA)
A Tangle can solve many problems blockchains are facing right now
• Bandwidth
• Storage cost
• Centralization
• Scalability
• Micropayments

Más contenido relacionado

La actualidad más candente

Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to BlockchainMalak Abu Hammad
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain TechnologyRemaisha Ali
 
Introduction to blockchain
Introduction to blockchainIntroduction to blockchain
Introduction to blockchainPriyab Satoshi
 
Distributed systems and blockchain technology
Distributed systems and blockchain technologyDistributed systems and blockchain technology
Distributed systems and blockchain technologyAlket Cecaj
 
Block chain by harsh biltu agarwal
Block chain by harsh biltu agarwalBlock chain by harsh biltu agarwal
Block chain by harsh biltu agarwalN V Jagadeesh Kumar
 
Blockchain for IoT Security and Privacy: The Case Study of a Smart Home
Blockchain for IoT Security and Privacy: The Case Study of a Smart HomeBlockchain for IoT Security and Privacy: The Case Study of a Smart Home
Blockchain for IoT Security and Privacy: The Case Study of a Smart HomeKishor Datta Gupta
 
Blockchain: Bitcoin and Beyond
Blockchain: Bitcoin and BeyondBlockchain: Bitcoin and Beyond
Blockchain: Bitcoin and BeyondSanjeev Verma, PhD
 
What is Block-Chain Technology?
What is Block-Chain Technology?What is Block-Chain Technology?
What is Block-Chain Technology?ThreadSol
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain TechnologyPalakGulati10
 
Introduction to Blockchain and Recordkeeping
Introduction to Blockchain and RecordkeepingIntroduction to Blockchain and Recordkeeping
Introduction to Blockchain and RecordkeepingPeter Van Garderen
 
How does blockchain work
How does blockchain workHow does blockchain work
How does blockchain workShishir Aryal
 
Understanding Blockchain Security
Understanding Blockchain SecurityUnderstanding Blockchain Security
Understanding Blockchain SecurityITU
 
Blockchains and Smart Contracts: Architecture Design and Model-Driven Develop...
Blockchains and Smart Contracts: Architecture Design and Model-Driven Develop...Blockchains and Smart Contracts: Architecture Design and Model-Driven Develop...
Blockchains and Smart Contracts: Architecture Design and Model-Driven Develop...Ingo Weber
 
Blockchain and Security : A Virtuous Circle?
Blockchain and Security : A Virtuous Circle?Blockchain and Security : A Virtuous Circle?
Blockchain and Security : A Virtuous Circle?ITU
 
Block Chain as a Platform February 2015 - LERNER Consulting
Block Chain as a Platform February 2015 - LERNER ConsultingBlock Chain as a Platform February 2015 - LERNER Consulting
Block Chain as a Platform February 2015 - LERNER ConsultingLERNER Consulting
 
Understanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
Understanding Proof of Work (PoW) and Proof of Stake (PoS) AlgorithmsUnderstanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
Understanding Proof of Work (PoW) and Proof of Stake (PoS) AlgorithmsGautam Anand
 
Introduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart ContractsIntroduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart ContractsSaad Zaher
 
Microservices architecture
Microservices architectureMicroservices architecture
Microservices architectureTomasz Tomczyk
 
Payment Protocols - Block Chain & Beyond
Payment Protocols - Block Chain & BeyondPayment Protocols - Block Chain & Beyond
Payment Protocols - Block Chain & BeyondAlexander Kiriakou
 

La actualidad más candente (20)

Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to Blockchain
 
Hands on with multichain
Hands on with multichainHands on with multichain
Hands on with multichain
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
 
Introduction to blockchain
Introduction to blockchainIntroduction to blockchain
Introduction to blockchain
 
Distributed systems and blockchain technology
Distributed systems and blockchain technologyDistributed systems and blockchain technology
Distributed systems and blockchain technology
 
Block chain by harsh biltu agarwal
Block chain by harsh biltu agarwalBlock chain by harsh biltu agarwal
Block chain by harsh biltu agarwal
 
Blockchain for IoT Security and Privacy: The Case Study of a Smart Home
Blockchain for IoT Security and Privacy: The Case Study of a Smart HomeBlockchain for IoT Security and Privacy: The Case Study of a Smart Home
Blockchain for IoT Security and Privacy: The Case Study of a Smart Home
 
Blockchain: Bitcoin and Beyond
Blockchain: Bitcoin and BeyondBlockchain: Bitcoin and Beyond
Blockchain: Bitcoin and Beyond
 
What is Block-Chain Technology?
What is Block-Chain Technology?What is Block-Chain Technology?
What is Block-Chain Technology?
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
 
Introduction to Blockchain and Recordkeeping
Introduction to Blockchain and RecordkeepingIntroduction to Blockchain and Recordkeeping
Introduction to Blockchain and Recordkeeping
 
How does blockchain work
How does blockchain workHow does blockchain work
How does blockchain work
 
Understanding Blockchain Security
Understanding Blockchain SecurityUnderstanding Blockchain Security
Understanding Blockchain Security
 
Blockchains and Smart Contracts: Architecture Design and Model-Driven Develop...
Blockchains and Smart Contracts: Architecture Design and Model-Driven Develop...Blockchains and Smart Contracts: Architecture Design and Model-Driven Develop...
Blockchains and Smart Contracts: Architecture Design and Model-Driven Develop...
 
Blockchain and Security : A Virtuous Circle?
Blockchain and Security : A Virtuous Circle?Blockchain and Security : A Virtuous Circle?
Blockchain and Security : A Virtuous Circle?
 
Block Chain as a Platform February 2015 - LERNER Consulting
Block Chain as a Platform February 2015 - LERNER ConsultingBlock Chain as a Platform February 2015 - LERNER Consulting
Block Chain as a Platform February 2015 - LERNER Consulting
 
Understanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
Understanding Proof of Work (PoW) and Proof of Stake (PoS) AlgorithmsUnderstanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
Understanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
 
Introduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart ContractsIntroduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart Contracts
 
Microservices architecture
Microservices architectureMicroservices architecture
Microservices architecture
 
Payment Protocols - Block Chain & Beyond
Payment Protocols - Block Chain & BeyondPayment Protocols - Block Chain & Beyond
Payment Protocols - Block Chain & Beyond
 

Similar a Tangle: An alternative to Block chain for future of crypto currency

The problem with blockchains
The problem with blockchainsThe problem with blockchains
The problem with blockchainsGurkirat Singh
 
Overview of Blockchain Consensus Mechanisms
Overview of Blockchain Consensus MechanismsOverview of Blockchain Consensus Mechanisms
Overview of Blockchain Consensus MechanismsJohannes Ahlmann
 
Vilnius blockchain club 20170413 consensus
Vilnius blockchain club 20170413 consensusVilnius blockchain club 20170413 consensus
Vilnius blockchain club 20170413 consensusAudrius Ramoska
 
Can we safely adapt the construction of permissionless blockchain to user dem...
Can we safely adapt the construction of permissionless blockchain to user dem...Can we safely adapt the construction of permissionless blockchain to user dem...
Can we safely adapt the construction of permissionless blockchain to user dem...I MT
 
Blockchain Ecosystem and Cryptocurrency Regulations
Blockchain Ecosystem and Cryptocurrency RegulationsBlockchain Ecosystem and Cryptocurrency Regulations
Blockchain Ecosystem and Cryptocurrency RegulationsAmir Rafati
 
Blockchain consensus algorithms
Blockchain consensus algorithmsBlockchain consensus algorithms
Blockchain consensus algorithmsAnurag Dashputre
 
Cooperative Mining by Stephen Reed (Bitcoin Proof-of-Stake Co-operative Project)
Cooperative Mining by Stephen Reed (Bitcoin Proof-of-Stake Co-operative Project)Cooperative Mining by Stephen Reed (Bitcoin Proof-of-Stake Co-operative Project)
Cooperative Mining by Stephen Reed (Bitcoin Proof-of-Stake Co-operative Project)Hashers United
 
Bitcoin A Peer-to-Peer Electronic Cash SystemSatoshi Naka.docx
Bitcoin A Peer-to-Peer Electronic Cash SystemSatoshi Naka.docxBitcoin A Peer-to-Peer Electronic Cash SystemSatoshi Naka.docx
Bitcoin A Peer-to-Peer Electronic Cash SystemSatoshi Naka.docxjasoninnes20
 
Fundamentals of Block chain Technology
Fundamentals of Block chain TechnologyFundamentals of Block chain Technology
Fundamentals of Block chain TechnologySubham Preetam
 
Cryptocurrency - Digital Currency
Cryptocurrency - Digital CurrencyCryptocurrency - Digital Currency
Cryptocurrency - Digital CurrencySameer Satyam
 
english_sample_exam_blockchainf_202202.pdf
english_sample_exam_blockchainf_202202.pdfenglish_sample_exam_blockchainf_202202.pdf
english_sample_exam_blockchainf_202202.pdfJyotirmayaMaharana2
 
Ethereum Mining How To
Ethereum Mining How ToEthereum Mining How To
Ethereum Mining How ToNugroho Gito
 
bitcoin.pdf
bitcoin.pdfbitcoin.pdf
bitcoin.pdfkikofx
 
Introduction for Bitcoin. Original Pater
Introduction for Bitcoin. Original PaterIntroduction for Bitcoin. Original Pater
Introduction for Bitcoin. Original PaterMarkYang62
 
Bitcoin Whitepaper
Bitcoin WhitepaperBitcoin Whitepaper
Bitcoin WhitepaperJohnAvery36
 
Whitepaper Bitcoin: A Peer-to-Peer Electronic Cash System
Whitepaper Bitcoin: A Peer-to-Peer Electronic Cash SystemWhitepaper Bitcoin: A Peer-to-Peer Electronic Cash System
Whitepaper Bitcoin: A Peer-to-Peer Electronic Cash SystemIQbal KHan
 

Similar a Tangle: An alternative to Block chain for future of crypto currency (20)

The problem with blockchains
The problem with blockchainsThe problem with blockchains
The problem with blockchains
 
Overview of Blockchain Consensus Mechanisms
Overview of Blockchain Consensus MechanismsOverview of Blockchain Consensus Mechanisms
Overview of Blockchain Consensus Mechanisms
 
01 what is blockchain
01 what is blockchain01 what is blockchain
01 what is blockchain
 
Vilnius blockchain club 20170413 consensus
Vilnius blockchain club 20170413 consensusVilnius blockchain club 20170413 consensus
Vilnius blockchain club 20170413 consensus
 
Can we safely adapt the construction of permissionless blockchain to user dem...
Can we safely adapt the construction of permissionless blockchain to user dem...Can we safely adapt the construction of permissionless blockchain to user dem...
Can we safely adapt the construction of permissionless blockchain to user dem...
 
Blockchain Ecosystem and Cryptocurrency Regulations
Blockchain Ecosystem and Cryptocurrency RegulationsBlockchain Ecosystem and Cryptocurrency Regulations
Blockchain Ecosystem and Cryptocurrency Regulations
 
Blockchain consensus algorithms
Blockchain consensus algorithmsBlockchain consensus algorithms
Blockchain consensus algorithms
 
Cooperative Mining by Stephen Reed (Bitcoin Proof-of-Stake Co-operative Project)
Cooperative Mining by Stephen Reed (Bitcoin Proof-of-Stake Co-operative Project)Cooperative Mining by Stephen Reed (Bitcoin Proof-of-Stake Co-operative Project)
Cooperative Mining by Stephen Reed (Bitcoin Proof-of-Stake Co-operative Project)
 
Bitcoin A Peer-to-Peer Electronic Cash SystemSatoshi Naka.docx
Bitcoin A Peer-to-Peer Electronic Cash SystemSatoshi Naka.docxBitcoin A Peer-to-Peer Electronic Cash SystemSatoshi Naka.docx
Bitcoin A Peer-to-Peer Electronic Cash SystemSatoshi Naka.docx
 
Fundamentals of Block chain Technology
Fundamentals of Block chain TechnologyFundamentals of Block chain Technology
Fundamentals of Block chain Technology
 
Cryptocurrency - Digital Currency
Cryptocurrency - Digital CurrencyCryptocurrency - Digital Currency
Cryptocurrency - Digital Currency
 
english_sample_exam_blockchainf_202202.pdf
english_sample_exam_blockchainf_202202.pdfenglish_sample_exam_blockchainf_202202.pdf
english_sample_exam_blockchainf_202202.pdf
 
Ethereum Mining How To
Ethereum Mining How ToEthereum Mining How To
Ethereum Mining How To
 
bitcoin.pdf
bitcoin.pdfbitcoin.pdf
bitcoin.pdf
 
Introduction for Bitcoin. Original Pater
Introduction for Bitcoin. Original PaterIntroduction for Bitcoin. Original Pater
Introduction for Bitcoin. Original Pater
 
Bitcoin White Paper
Bitcoin White PaperBitcoin White Paper
Bitcoin White Paper
 
Bitcoin whitepaper
Bitcoin whitepaperBitcoin whitepaper
Bitcoin whitepaper
 
bitcoin.pdf
bitcoin.pdfbitcoin.pdf
bitcoin.pdf
 
Bitcoin Whitepaper
Bitcoin WhitepaperBitcoin Whitepaper
Bitcoin Whitepaper
 
Whitepaper Bitcoin: A Peer-to-Peer Electronic Cash System
Whitepaper Bitcoin: A Peer-to-Peer Electronic Cash SystemWhitepaper Bitcoin: A Peer-to-Peer Electronic Cash System
Whitepaper Bitcoin: A Peer-to-Peer Electronic Cash System
 

Más de Kishor Datta Gupta

Interpretable Learning Model for Lower Dimensional Feature Space: A Case stud...
Interpretable Learning Model for Lower Dimensional Feature Space: A Case stud...Interpretable Learning Model for Lower Dimensional Feature Space: A Case stud...
Interpretable Learning Model for Lower Dimensional Feature Space: A Case stud...Kishor Datta Gupta
 
A safer approach to build recommendation systems on unidentifiable data
A safer approach to build recommendation systems on unidentifiable dataA safer approach to build recommendation systems on unidentifiable data
A safer approach to build recommendation systems on unidentifiable dataKishor Datta Gupta
 
Adversarial Attacks and Defense
Adversarial Attacks and DefenseAdversarial Attacks and Defense
Adversarial Attacks and DefenseKishor Datta Gupta
 
Who is responsible for adversarial defense
Who is responsible for adversarial defenseWho is responsible for adversarial defense
Who is responsible for adversarial defenseKishor Datta Gupta
 
Robust Filtering Schemes for Machine Learning Systems to Defend Adversarial A...
Robust Filtering Schemes for Machine Learning Systems to Defend Adversarial A...Robust Filtering Schemes for Machine Learning Systems to Defend Adversarial A...
Robust Filtering Schemes for Machine Learning Systems to Defend Adversarial A...Kishor Datta Gupta
 
Using Negative Detectors for Identifying Adversarial Data Manipulation in Mac...
Using Negative Detectors for Identifying Adversarial Data Manipulation in Mac...Using Negative Detectors for Identifying Adversarial Data Manipulation in Mac...
Using Negative Detectors for Identifying Adversarial Data Manipulation in Mac...Kishor Datta Gupta
 
Deep Reinforcement Learning based Recommendation with Explicit User-ItemInter...
Deep Reinforcement Learning based Recommendation with Explicit User-ItemInter...Deep Reinforcement Learning based Recommendation with Explicit User-ItemInter...
Deep Reinforcement Learning based Recommendation with Explicit User-ItemInter...Kishor Datta Gupta
 
Machine learning in computer security
Machine learning in computer securityMachine learning in computer security
Machine learning in computer securityKishor Datta Gupta
 
Policy Based reinforcement Learning for time series Anomaly detection
Policy Based reinforcement Learning for time series Anomaly detectionPolicy Based reinforcement Learning for time series Anomaly detection
Policy Based reinforcement Learning for time series Anomaly detectionKishor Datta Gupta
 
understanding the pandemic through mining covid news using natural language p...
understanding the pandemic through mining covid news using natural language p...understanding the pandemic through mining covid news using natural language p...
understanding the pandemic through mining covid news using natural language p...Kishor Datta Gupta
 
Different representation space for MNIST digit
Different representation space for MNIST digitDifferent representation space for MNIST digit
Different representation space for MNIST digitKishor Datta Gupta
 
"Can NLP techniques be utilized as a reliable tool for medical science?" -Bui...
"Can NLP techniques be utilized as a reliable tool for medical science?" -Bui..."Can NLP techniques be utilized as a reliable tool for medical science?" -Bui...
"Can NLP techniques be utilized as a reliable tool for medical science?" -Bui...Kishor Datta Gupta
 
Applicability issues of Evasion-Based Adversarial Attacks and Mitigation Tech...
Applicability issues of Evasion-Based Adversarial Attacks and Mitigation Tech...Applicability issues of Evasion-Based Adversarial Attacks and Mitigation Tech...
Applicability issues of Evasion-Based Adversarial Attacks and Mitigation Tech...Kishor Datta Gupta
 
Adversarial Input Detection Using Image Processing Techniques (IPT)
Adversarial Input Detection Using Image Processing Techniques (IPT)Adversarial Input Detection Using Image Processing Techniques (IPT)
Adversarial Input Detection Using Image Processing Techniques (IPT)Kishor Datta Gupta
 
An empirical study on algorithmic bias (aiml compsac2020)
An empirical study on algorithmic bias (aiml compsac2020)An empirical study on algorithmic bias (aiml compsac2020)
An empirical study on algorithmic bias (aiml compsac2020)Kishor Datta Gupta
 

Más de Kishor Datta Gupta (20)

GAN introduction.pptx
GAN introduction.pptxGAN introduction.pptx
GAN introduction.pptx
 
Interpretable Learning Model for Lower Dimensional Feature Space: A Case stud...
Interpretable Learning Model for Lower Dimensional Feature Space: A Case stud...Interpretable Learning Model for Lower Dimensional Feature Space: A Case stud...
Interpretable Learning Model for Lower Dimensional Feature Space: A Case stud...
 
A safer approach to build recommendation systems on unidentifiable data
A safer approach to build recommendation systems on unidentifiable dataA safer approach to build recommendation systems on unidentifiable data
A safer approach to build recommendation systems on unidentifiable data
 
Adversarial Attacks and Defense
Adversarial Attacks and DefenseAdversarial Attacks and Defense
Adversarial Attacks and Defense
 
Who is responsible for adversarial defense
Who is responsible for adversarial defenseWho is responsible for adversarial defense
Who is responsible for adversarial defense
 
Robust Filtering Schemes for Machine Learning Systems to Defend Adversarial A...
Robust Filtering Schemes for Machine Learning Systems to Defend Adversarial A...Robust Filtering Schemes for Machine Learning Systems to Defend Adversarial A...
Robust Filtering Schemes for Machine Learning Systems to Defend Adversarial A...
 
Zero shot learning
Zero shot learning Zero shot learning
Zero shot learning
 
Using Negative Detectors for Identifying Adversarial Data Manipulation in Mac...
Using Negative Detectors for Identifying Adversarial Data Manipulation in Mac...Using Negative Detectors for Identifying Adversarial Data Manipulation in Mac...
Using Negative Detectors for Identifying Adversarial Data Manipulation in Mac...
 
Deep Reinforcement Learning based Recommendation with Explicit User-ItemInter...
Deep Reinforcement Learning based Recommendation with Explicit User-ItemInter...Deep Reinforcement Learning based Recommendation with Explicit User-ItemInter...
Deep Reinforcement Learning based Recommendation with Explicit User-ItemInter...
 
Machine learning in computer security
Machine learning in computer securityMachine learning in computer security
Machine learning in computer security
 
Policy Based reinforcement Learning for time series Anomaly detection
Policy Based reinforcement Learning for time series Anomaly detectionPolicy Based reinforcement Learning for time series Anomaly detection
Policy Based reinforcement Learning for time series Anomaly detection
 
Cyber intrusion
Cyber intrusionCyber intrusion
Cyber intrusion
 
understanding the pandemic through mining covid news using natural language p...
understanding the pandemic through mining covid news using natural language p...understanding the pandemic through mining covid news using natural language p...
understanding the pandemic through mining covid news using natural language p...
 
Different representation space for MNIST digit
Different representation space for MNIST digitDifferent representation space for MNIST digit
Different representation space for MNIST digit
 
"Can NLP techniques be utilized as a reliable tool for medical science?" -Bui...
"Can NLP techniques be utilized as a reliable tool for medical science?" -Bui..."Can NLP techniques be utilized as a reliable tool for medical science?" -Bui...
"Can NLP techniques be utilized as a reliable tool for medical science?" -Bui...
 
Applicability issues of Evasion-Based Adversarial Attacks and Mitigation Tech...
Applicability issues of Evasion-Based Adversarial Attacks and Mitigation Tech...Applicability issues of Evasion-Based Adversarial Attacks and Mitigation Tech...
Applicability issues of Evasion-Based Adversarial Attacks and Mitigation Tech...
 
Adversarial Input Detection Using Image Processing Techniques (IPT)
Adversarial Input Detection Using Image Processing Techniques (IPT)Adversarial Input Detection Using Image Processing Techniques (IPT)
Adversarial Input Detection Using Image Processing Techniques (IPT)
 
Clustering report
Clustering reportClustering report
Clustering report
 
Basic digital image concept
Basic digital image conceptBasic digital image concept
Basic digital image concept
 
An empirical study on algorithmic bias (aiml compsac2020)
An empirical study on algorithmic bias (aiml compsac2020)An empirical study on algorithmic bias (aiml compsac2020)
An empirical study on algorithmic bias (aiml compsac2020)
 

Último

High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 

Último (20)

High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 

Tangle: An alternative to Block chain for future of crypto currency

  • 1. Tangle: An Alternative to Block Chain For Future of Crypto Currency Presented by Kishor Datta Gupta Center for Information Assurance (CfIA)
  • 2. Some Conceptual issue Center for Information Assurance (CfIA) • Block is not equal Bitcoin or any CryptoCoin. • Header of every block contains a hash of header of the previous block. • Mining is NOT about creating new coins. • Block is not limited to a definite number like Bitcoin/Cryptocoin. • Linked List outside between blocks & Merkle tree inside between transections. • Merkle roots do not verify transactions, they verify a set of transactions. • Merkle root will change if data tempered.
  • 3. Simplified Bitcoin Block Chain Center for Information Assurance (CfIA)
  • 4. Mining Logic Center for Information Assurance (CfIA) Joe's reward = Reward for mining block + transactions fees
  • 5. Block Chain Issue Center for Information Assurance (CfIA) As a Block chain grows over time, nodes will need more and more storage capacity and a higher bandwidth (volume increases) to keep up-to-date with the transactions added to the ledger. Network Size Memory Storage Bandwidth Centralization
  • 6. 8 Pool Contain 75% mining Center for Information Assurance (CfIA)
  • 7. Some can have 51% Center for Information Assurance (CfIA)
  • 8. LinkList vs DAG Center for Information Assurance (CfIA) LinkList Direct Acyclic Graph
  • 9. Tangle Center for Information Assurance (CfIA) Same as block chain , tangle is also a distributed ledger, in which a network of independent accounts perform transactions among themselves, reaching consensus about who owns what without depending on a centralized authority. http://tangle.glumb.de
  • 10. Tangle: Issue a transaction Center for Information Assurance (CfIA) • It chooses two other transactions to approve (in general, these two transactions may coincide), according to some algorithm. • It checks if the two transactions are not conflicting and do not approve conflicting transactions. • For the transaction to be valid, the node must solve a cryptographic puzzle
  • 11. Tangle: Nodes Center for Information Assurance (CfIA) Full Node: store all transactions since the last snapshot. It is required to be online (= available to its neighbors) 24/7 Permanodes: is a Full Node that doesn't do snapshots and stores all transactions since the genesis transaction. Light Client: does not store any transactions. To make transactions, it has to has access to a Full Node. It asks the full node to publish its transactions. It does not have to be online 24/7. Swarm Clients: Full Nodes that run distributed on more than one device.
  • 12. Tangle: Nodes Weight Center for Information Assurance (CfIA)
  • 13. Tangle: Consensus Center for Information Assurance (CfIA) A node runs the tip selection algorithm many times, and see which transaction of the two is more likely to be (indirectly) approved by the selected tip. For example, if, after 100 runs of the tip selection algorithm, a transaction was selected 97 times, we say that it is confirmed with 97% confidence.
  • 14. Consensus: tip selection algorithm Center for Information Assurance (CfIA) Instead of just randomly selecting two tips (or always using the newest two tips), there is a tip selection algorithm that is run and which will select the tips, to make sure that tips are chosen in a way to make the tangle converge (have all transactions approved) quickly. IOTA Use Random Walk Markov Chain Monte Carlo algorithm
  • 15. Consensus: Orphaned Center for Information Assurance (CfIA) if a node issues a new transaction that approves conflicting transactions, then it risks that other nodes will not approve its new transaction, which will fall into oblivion." In order to find transactions to approve that are unlikely to lead its own transaction to be orphaned, a node runs a "tip selection algorithm."
  • 16. Incentive: For Node to Run Center for Information Assurance (CfIA) Every node calculates some statistics, one of which is how many new transactions are received from a neighbor. If one particular node is “too lazy", it will be dropped by its neighbors. So, even if a node does not issue transactions (and hence has no direct incentive to share new transactions that approve its own one), it still has incentive to work hard.
  • 17. Incentive: For Full Node to Run Center for Information Assurance (CfIA) • Hope that people are generally good • Almost all server run 24*7
  • 18. Possible attack scenarios :Double Spending Center for Information Assurance (CfIA)
  • 19. Possible attack scenarios :Parasite Chain Center for Information Assurance (CfIA)
  • 20. Tangle Applications: IOTA Center for Information Assurance (CfIA) • Uses a coordinator to issue all node a certificate. • Not distributed yet per definition, but decentralized. • Uses Quantum Resistance cryptography • No mining so No transection fees • Partition intolerance IOTA is a Crypto Currency designed for the Internet of Things.
  • 21. Tangle Applications: Byteball Center for Information Assurance (CfIA) • Has Transection Fees • Use a MC(main chain) algorithm to define transaction order • Need time to verify transection • Can remove orphan nodes Byteball is a Crypto Currency similar to IOTA with additional features
  • 22. Tangle Applications: Git Center for Information Assurance (CfIA) Git actually use tangle type consensus to commit its code In simplified form, git object storage is "just" a DAG of objects, with a handful of different types of objects. They are all stored compressed and identified by an SHA-1 hash (that, incidentally, isn't the SHA-1 of the contents of the file they represent, but of their representation in git).
  • 23. Tangle Advantages over block chain: Scalability Center for Information Assurance (CfIA)
  • 24. Conclusions Center for Information Assurance (CfIA) A Tangle can solve many problems blockchains are facing right now • Bandwidth • Storage cost • Centralization • Scalability • Micropayments