SlideShare a Scribd company logo
1 of 52
Download to read offline
Location:
QuantUniversity Meetup
November 14th 2017
Boston, MA
Blockchain Technology Workshop
2017 Copyright QuantUniversity LLC.
Presented By:
Duru Turkoglu, PhD
www.QuantUniversity.com
Blockchain Technology
Cryptocurrencies, Applications, Limitations
• Public
• Distributed
• Immutable
• Trustless
What is Blockchain?
Open to everybody
Audited by everybody
Append only
No central authority
Blockchain is an accounting system that is:
Briefly: Distributed Ledger
Introduced by: Bitcoin
• 1970s/80s --- Public key cryptography
• Guardtime --- Application of public key cryptography
• 1990 --- Digicash/ecash
• 1992/1997 --- Hashcash/Proof-of-work
• 1998 --- b-money, bitgold
History of Blockchain
• 2008 --- Satoshi Nakamoto, creator of the Bitcoin Network
Think: Store of value
• 2013 --- Vitalik Buterin, creator of the Ethereum Network
Think: Smart contracts and Worldwide computer
• 2017 --- ERC20 Tokens/ICOs using the Ethereum Platform
First ICO actually took place in 2013
Think: Stocks/assets (not fully clarified yet)
• Ongoing --- Private blockchains, State channels, etc.
History of Blockchain
Ownership
Easy to Verify and Hard to Fabricate
Ledger
Easy to Transact and Hard to Modify
Essential Qualities of a Functioning Ledger
Cash
How do you make people
believe that some cash
out there is yours?
Verifying Ownership
Bearer’s Instrument
If you have it in your
wallet, then it is yours!
Cash
What if you have a LOT of
cash? It would be very
hard/risky to carry it.
Verifying Ownership
?
Bearer’s Instrument
If you have it in your
wallet, then it is yours!
Cash
What if you have a LOT of
cash? It would be very
hard/risky to carry it.
Verifying Ownership
Place it in a Trust
The bank has your funds,
but you can withdraw!
Car & Home
What about other kinds of
physical assets, such as
cars, real estate, etc?
Verifying Ownership
Government Record
Ownership is registered with
DMV and Recorder’s Office.
Verifying Ownership
Conventional Methods Rely on a Single Trusted Party
• Banks, government offices, etc.
• Problems arise when trust is broken:
▫ Access may be restricted or denied
▫ Prone to mistakes in recordkeeping
▫ Bank runs result in loss of funds (due to fractional reserve)
• Transfer of ownership may require multiple parties involved
• High transaction fees to be paid to each party involved
Blockchain does not place trust in a single entity
Double Spending
Cash in Wallet
Can you double spend the
cash in your wallet? NO!
(Unless you are a magician)
Issues
Cannot transact with
large amounts. Actually,
you can but very risky.
Cash in Bank Account
Can you double spend the
funds in your bank account.
No, banks do not clear funds
twice, but you can try!
Double Spending
Issues
Transaction fees are high.
Clearance of funds may
take several days.
Car & Home
Can you double sell a car?
Or a house? No! (In general)
Fraudulent sales exist!
Double Spending
Issues
Many parties are involved to
prevent such fraudulent sales.
Very high transaction fees.
Double Spending
Conventional Methods Are Prone to Such Frauds
• If the amount is too small there is no incentive (e.g., cash)
• There are prevention methods for larger amounts/real assets
▫ Central parties managing the funds disallow double spend
▫ Third intermediary parties check validity of ownership
• Requires trust in central or intermediary parties
• Transfer of ownership may require multiple parties involved
• High transaction fees to be paid to each party involved
Blockchain prevents double spend via its ledger
Transactions and Ledger
Physical Cash
Very easy transactions.
Very hard to modify ledger.
Need physical exchange.
Issues
Theft is relatively easy.
Physical cash is not the
only source of money.
Fiat Money
Relatively easy to transact
within the same bank but not
so easy with others. Hard to
modify ledger from outside.
Transactions and Ledger
Issues
Transaction fees are high.
Money supply can be
diluted relatively easily.
Car & Home
Not very easy transactions.
Relatively hard to modify
ledger from outside.
Transactions and Ledger
Issues
Many parties are involved in
transactions leading to high
fees.
Transactions and Ledger
Conventional Methods
• I
Blockchain is not easy to modify
Transactions require some time
Cryptography
&
Distributed Systems
Blockchain Solution
Easy to Verify
Hard to Fabricate
Story:
Alice would like to send a very important message to Bob.
She wants him to know that it is indeed her who sent the message.
How can Alice accomplish this?
Answer:
One way functions and public key cryptography!
Private and public keys to encrypt and to decrypt.
Applications:
Communications of any kind: internet, military, etc. Developments in
cryptography created the field of computer science back in the 1940s.
Public Key Cryptography
Illustration:
• Alice produces private and public keys.
• She publishes her public key to everyone.
• Private key encrypts, public key decrypts.
• Nobody can produce the same encryption
without knowing the private key of Alice.
Alice sends a message M to Bob:
She encrypts M using her own private key: M ⟶ MA
Bob decrypts the message from Alice:
He decrypts message using Alice’s public key: MA ⟶ M
Public Key Cryptography
Guarantees:
Using Alice’s private key ensures that message is sent by Alice.
Nobody else could have written it!
Digital signatures:
Encryption using a private key is called a “digital signature”.
Digital signatures are enforceable in a court of law!
Alice cannot claim that she did not send the message.
Application in blockchain:
Digital signatures are used to authenticate ownership.
Payment addresses are generated by public keys.
Public Key Cryptography
Verifying Ownership in Blockchain
Public Key Cryptography to Prove Ownership
• User creates a pair of public and private keys
• Public key to generate and publish payment addresses
• Private key to digitally sign for the funds in those addresses
Verifying Ownership in Blockchain
Security of Public Key Cryptography
• Brute force is a possible attack, but infeasible in general
• One-way functions for encrypting, cannot invert the function
• Best to avoid spending from the same address many times
• It is extremely hard to forge a signature even with observation
• If your private key is exposed, your address is compromised
. . .
Verifying Ownership in Blockchain
Anybody Can Verify Ownership in a Transaction
• Address of the funds being spent unlocks the transaction
• Verification similar to the process between Alice and Bob
• Nobody else but the owner of the address must have signed
• Owning an address is equivalent to owning its private key
• If your private key is exposed, ownership is lost forever
As long as the private keys are secured
It is practically impossible for someone to steal
Easy to Transact
Hard to Modify
Consists of several
computers called nodes
Each node has its
own private memory
Nodes communicate with
each other by messages
Network structure is
not known in advance
Distributed Systems
Nodes in the network
may fail or may exhibit
malicious behavior
Client-server: Designated
servers accept clients
Three-tier/n-tier: More
organized structure
Peer-to-peer: Every node
can be a server or a client
Distributed Systems
Computation by a master node or by using a shared database
Blockchain itself is the shared database
Consensus required:
• Who holds correct data
• Who can make changes
• How are these rules
enforced between nodes
Let's not forget, there may
be malicious nodes
Distributed Systems
Blockchain approach: Publicly verifiable data
requires (hard) proof Tampering with data
becomes exponentially harder as time passes
Advantages:
• No need to trust any particular (central) node
• Collective computation effort more powerful
than what can be done by one central entity
• Rules to be agreed on collectively
• More resilient to certain forms of attacks
Challenges:
• Scalability in the number of transactions
• Providing incentives for honest behavior
and/or penalties for malicious behavior
Distributed Systems
• Block number (height)
• Latest transactions
• Resulting changes to data
• Pointer to previous block
• Proof of validity
Structure of the Blockchain
…
• Each block stores a
list of transactions
• Similar to chain of
title in real estate
trxs, if we assume
one trx per block.
• For correctness,
the entire chain
must be valid
Structure of the Blockchain
• Transactions require
digital signatures
• How to verify the
entire history of
transactions in the
blockchain?
• Any message can be
digested into a short
string using a hash
function
• One-way functions
Cryptographic Hash Functions
• Cryptocurrency
Bitcoin, Ethereum, Litecoin, etc.
There are over 1000 different altcoins
• Smart contracts
Legal contracts which are enforced automatically
• Asset management
• Identity verification, notary, voting
• Decentralized exchanges
• Many more…
Applications of Blockchain Technology
Cryptography
&
Distributed Systems
Main Components of Blockchain
Story:
Alice would like to send a very important message to Bob.
She wants him to know that it is indeed her who sent the message.
How can Alice accomplish this?
Answer:
One way functions and public key cryptography!
Private and public keys to encrypt and to decrypt.
Applications:
Communications of any kind: internet, military, etc. Developments in
cryptography created the field of computer science back in the 1940s.
Public Key Cryptography
Illustration:
• Alice produces private and public keys.
• She publishes her public key to everyone.
• Private key encrypts, public key decrypts.
• Nobody can produce the same encryption
without knowing the private key of Alice.
Alice sends a message M to Bob:
She encrypts M using her own private key: M ⟶ MA
Bob decrypts the message from Alice:
He decrypts message using Alice’s public key: MA ⟶ M
Public Key Cryptography
Guarantees:
Using Alice’s private key ensures that message is sent by Alice.
Nobody else could have written it!
Digital signatures:
Encryption using a private key is called a “digital signature”.
Digital signatures are enforceable in a court of law!
Alice cannot claim that she did not send the message.
Application in blockchain:
Digital signatures are used to authenticate ownership.
Payment addresses are generated by public keys.
Public Key Cryptography
Verifying Ownership in Blockchain
Public Key Cryptography to Prove Ownership
• User creates a pair of public and private keys
• Public key to generate and publish payment addresses
• Private key to digitally sign for the funds in those addresses
Verifying Ownership in Blockchain
Security of Public Key Cryptography
• Brute force is a possible attack, but infeasible in general
• One-way functions for encrypting, cannot invert the function
• Best to avoid spending from the same address many times
• It is extremely hard to forge a signature even with observation
• If your private key is exposed, your address is compromised
. . .
Verifying Ownership in Blockchain
Anybody Can Verify Ownership in a Transaction
• Address of the funds being spent unlocks the transaction
• Verification similar to the process between Alice and Bob
• Nobody else but the owner of the address must have signed
• Owning an address is equivalent to owning its private key
• If your private key is exposed, ownership is lost forever
As long as the private keys are secured
It is practically impossible for someone to steal
• Transactions require
digital signatures
• How to verify the
entire history of
transactions in the
blockchain?
• Any message can be
digested into a short
string using a hash
function
• One-way functions
Cryptographic Hash Functions
Cryptography:
• Validity of transactions can be verified quickly
• Ownership is tied to the private keys
• Each block can be digested into a string
which proves the validity of the entire history
Distributed Systems:
• Trustless distributed public ledger
• Creating a block is hard, so it is much harder
to modify earlier blocks in the blockchain
• Constantly audited by peers
Main Components of Blockchain
Smart Homes, Smart Cars:
• Ownership information can be recorded on the blockchain
• Exchange of the ownership, money, keys (authority to use),
can be transferred in the same single transaction
• Crucial information related to the asset can also be recorded
on the blockchain: past insurance claims, previous owners
• Very reliable: any crucial information recorded on the
blockchain cannot be modified later
Applications of Blockchain Technology
Identity, Notary, Voting:
• Self identifying information is required in any business
transaction: photo ID, passport, etc
• This information can be stored on the blockchain and the proof
of identity can be produced without any government backing
• One can prove identity by just simply using the private key
• Claims about the identify of Satoshi Nakamoto was made
based on the use of one of his/their private keys
Applications of Blockchain Technology
Decentralized Exchanges:
• Exchange of two assets is generally carried out by a trusted
third party that acts as escrow
• Central entity controlling the exchange can be the subject of
an attack resulting in the loss of deposits
• Such incidents can be eliminated via exchanging the assets by
using an escrow for the transaction on the blockchain itself
• Swap will be carried out when both parties sign the transaction
Applications of Blockchain Technology
Private Blockchain:
• Even though the main motivation to introduce the blockchain
technology was to remove trust, settings where there is a
trusted entity can still enjoy the benefits of using a blockchain
• Automated maintenance and auditing of records
• No need for consensus. The blockchain is truly an append
only ledger. Once written, the past is indeed set in stone
• Requires full trust in the centralized node(s) issuing the blocks
Applications of Blockchain Technology
50
• Coming in 2018 to Boston, NYC, Chicago, San Francisco and online!
• Sign up at www.analyticscertificate.com/Blockchain-ML for updates!
Blockchain workshop
51
Q&A
Thank you members and CIC!
Checkout our programs at:
www.analyticscertificate.com
Sri Krishnamurthy, CFA, CAP
Founder and CEO
QuantUniversity LLC.
srikrishnamurthy
www.QuantUniversity.com
Information, data and drawings embodied in this presentation are strictly a property of QuantUniversity LLC. and shall not be
distributed or used in any other publication without the prior written consent of QuantUniversity LLC.
52

More Related Content

What's hot

Explain Ethereum smart contract hacking like i am a five
Explain Ethereum smart contract hacking like i am a fiveExplain Ethereum smart contract hacking like i am a five
Explain Ethereum smart contract hacking like i am a five
Zoltan Balazs
 
Blockchain: An Introduction for Executives
Blockchain: An Introduction for ExecutivesBlockchain: An Introduction for Executives
Blockchain: An Introduction for Executives
ScottMadden, Inc.
 
Blockchain Tutorial For Beginners - 2 | Blockchain Technology | Blockchain Tu...
Blockchain Tutorial For Beginners - 2 | Blockchain Technology | Blockchain Tu...Blockchain Tutorial For Beginners - 2 | Blockchain Technology | Blockchain Tu...
Blockchain Tutorial For Beginners - 2 | Blockchain Technology | Blockchain Tu...
Simplilearn
 
Introduction to Bitcoin and ECDSA
Introduction to Bitcoin and ECDSAIntroduction to Bitcoin and ECDSA
Introduction to Bitcoin and ECDSA
Nikesh Mistry
 

What's hot (20)

Security in the blockchain
Security in the blockchainSecurity in the blockchain
Security in the blockchain
 
Cryptocurrencies, Smart Contracts, and the Future of Economic Interaction
Cryptocurrencies, Smart Contracts, and the Future of Economic InteractionCryptocurrencies, Smart Contracts, and the Future of Economic Interaction
Cryptocurrencies, Smart Contracts, and the Future of Economic Interaction
 
Blockchain, Ethereum and ConsenSys
Blockchain, Ethereum and ConsenSysBlockchain, Ethereum and ConsenSys
Blockchain, Ethereum and ConsenSys
 
Explain Ethereum smart contract hacking like i am a five
Explain Ethereum smart contract hacking like i am a fiveExplain Ethereum smart contract hacking like i am a five
Explain Ethereum smart contract hacking like i am a five
 
All About Ethereum
All About EthereumAll About Ethereum
All About Ethereum
 
Security and privacy with blockchain
Security and privacy with blockchainSecurity and privacy with blockchain
Security and privacy with blockchain
 
IDC - Blockchain Threat Model
IDC - Blockchain Threat ModelIDC - Blockchain Threat Model
IDC - Blockchain Threat Model
 
Blockchain: No Thunder No Wonder
Blockchain: No Thunder No Wonder  Blockchain: No Thunder No Wonder
Blockchain: No Thunder No Wonder
 
Blockchain: An Introduction for Executives
Blockchain: An Introduction for ExecutivesBlockchain: An Introduction for Executives
Blockchain: An Introduction for Executives
 
Blockchain Tutorial For Beginners - 2 | Blockchain Technology | Blockchain Tu...
Blockchain Tutorial For Beginners - 2 | Blockchain Technology | Blockchain Tu...Blockchain Tutorial For Beginners - 2 | Blockchain Technology | Blockchain Tu...
Blockchain Tutorial For Beginners - 2 | Blockchain Technology | Blockchain Tu...
 
Introduction to Bitcoin and ECDSA
Introduction to Bitcoin and ECDSAIntroduction to Bitcoin and ECDSA
Introduction to Bitcoin and ECDSA
 
Blockchains 101
Blockchains 101Blockchains 101
Blockchains 101
 
Some Thoughts On Bitcoin
Some Thoughts On BitcoinSome Thoughts On Bitcoin
Some Thoughts On Bitcoin
 
01 what is blockchain
01 what is blockchain01 what is blockchain
01 what is blockchain
 
List of best Open Source Blockchain platforms
List of best Open Source Blockchain platformsList of best Open Source Blockchain platforms
List of best Open Source Blockchain platforms
 
Ethereum Explained | Understanding Ethereum Blockchain Protocols | Ethereum C...
Ethereum Explained | Understanding Ethereum Blockchain Protocols | Ethereum C...Ethereum Explained | Understanding Ethereum Blockchain Protocols | Ethereum C...
Ethereum Explained | Understanding Ethereum Blockchain Protocols | Ethereum C...
 
1% OF EVERYTHING ABOUT BLOCKCHAIN
1% OF EVERYTHING ABOUT BLOCKCHAIN1% OF EVERYTHING ABOUT BLOCKCHAIN
1% OF EVERYTHING ABOUT BLOCKCHAIN
 
Introduction to Blockchain Governance Models
Introduction to Blockchain Governance ModelsIntroduction to Blockchain Governance Models
Introduction to Blockchain Governance Models
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Ethereum - Teory and Practice
Ethereum - Teory and PracticeEthereum - Teory and Practice
Ethereum - Teory and Practice
 

Viewers also liked

Viewers also liked (20)

Blockchain workshop Intro
Blockchain workshop IntroBlockchain workshop Intro
Blockchain workshop Intro
 
What is an ICO? @TechInvestMonaco
What is an ICO? @TechInvestMonacoWhat is an ICO? @TechInvestMonaco
What is an ICO? @TechInvestMonaco
 
Initial Coin Offerings: An Overview [Digital Ventures]
Initial Coin Offerings: An Overview [Digital Ventures]Initial Coin Offerings: An Overview [Digital Ventures]
Initial Coin Offerings: An Overview [Digital Ventures]
 
William Mougayar's Keynote at the ICO Summit, Zurich 15 Sept 2017
William Mougayar's Keynote at the ICO Summit, Zurich 15 Sept 2017William Mougayar's Keynote at the ICO Summit, Zurich 15 Sept 2017
William Mougayar's Keynote at the ICO Summit, Zurich 15 Sept 2017
 
Blockchain Angels & UK Business Angels Association Oct 16
Blockchain Angels & UK Business Angels Association Oct 16Blockchain Angels & UK Business Angels Association Oct 16
Blockchain Angels & UK Business Angels Association Oct 16
 
Blockchain Initial Coin Offerings - The Future for Online Investing or Regula...
Blockchain Initial Coin Offerings - The Future for Online Investing or Regula...Blockchain Initial Coin Offerings - The Future for Online Investing or Regula...
Blockchain Initial Coin Offerings - The Future for Online Investing or Regula...
 
AN INVESTORS VIEW ON BLOCKCHAIN
AN INVESTORS VIEW ON BLOCKCHAINAN INVESTORS VIEW ON BLOCKCHAIN
AN INVESTORS VIEW ON BLOCKCHAIN
 
Blockchain Thinking: The Brain as a DAC (Decentralized Autonomous Corporation)
Blockchain Thinking: The Brain as a DAC (Decentralized Autonomous Corporation)Blockchain Thinking: The Brain as a DAC (Decentralized Autonomous Corporation)
Blockchain Thinking: The Brain as a DAC (Decentralized Autonomous Corporation)
 
Business Opportunity Through Corporate Venture Capital
Business Opportunity Through Corporate Venture CapitalBusiness Opportunity Through Corporate Venture Capital
Business Opportunity Through Corporate Venture Capital
 
Applying the Howey Test to the DAO Tokens
Applying the Howey Test to the DAO TokensApplying the Howey Test to the DAO Tokens
Applying the Howey Test to the DAO Tokens
 
29 cool slides about ICO and ITO
29 cool slides about ICO and ITO29 cool slides about ICO and ITO
29 cool slides about ICO and ITO
 
Is there a token for that? Tokens demystified.
Is there a token for that? Tokens demystified.Is there a token for that? Tokens demystified.
Is there a token for that? Tokens demystified.
 
Convergence - Where Blockchain Converges With AR / VR / AI / 3d printing / dr...
Convergence - Where Blockchain Converges With AR / VR / AI / 3d printing / dr...Convergence - Where Blockchain Converges With AR / VR / AI / 3d printing / dr...
Convergence - Where Blockchain Converges With AR / VR / AI / 3d printing / dr...
 
Trade Coin ICO plan
Trade Coin ICO planTrade Coin ICO plan
Trade Coin ICO plan
 
Blockchain and Sharing Economy
Blockchain and Sharing EconomyBlockchain and Sharing Economy
Blockchain and Sharing Economy
 
ICO and Cyber security - How to protect from hackers during ICOs
ICO and Cyber security - How to protect from hackers during ICOsICO and Cyber security - How to protect from hackers during ICOs
ICO and Cyber security - How to protect from hackers during ICOs
 
Cryptocitizen: Smart Contracts, Pluralistic Morality, and Blockchain Society
Cryptocitizen: Smart Contracts, Pluralistic Morality, and Blockchain SocietyCryptocitizen: Smart Contracts, Pluralistic Morality, and Blockchain Society
Cryptocitizen: Smart Contracts, Pluralistic Morality, and Blockchain Society
 
Mougayar chicago blockchain_insurance presentation_nov8_2016
Mougayar chicago blockchain_insurance presentation_nov8_2016Mougayar chicago blockchain_insurance presentation_nov8_2016
Mougayar chicago blockchain_insurance presentation_nov8_2016
 
The Grand Vision of a Crypto-Tech Economy at Steemfest
The Grand Vision of a Crypto-Tech Economy at SteemfestThe Grand Vision of a Crypto-Tech Economy at Steemfest
The Grand Vision of a Crypto-Tech Economy at Steemfest
 
William Mougayar - Success factors in Distributed Organizations Models - Bar...
William Mougayar -  Success factors in Distributed Organizations Models - Bar...William Mougayar -  Success factors in Distributed Organizations Models - Bar...
William Mougayar - Success factors in Distributed Organizations Models - Bar...
 

Similar to Blockchain meetup

Similar to Blockchain meetup (20)

Blockchain and Bitcoin
Blockchain and BitcoinBlockchain and Bitcoin
Blockchain and Bitcoin
 
Blockchain
BlockchainBlockchain
Blockchain
 
FreeGeek -Cryptocurrency and Blockchain
FreeGeek -Cryptocurrency and BlockchainFreeGeek -Cryptocurrency and Blockchain
FreeGeek -Cryptocurrency and Blockchain
 
Idea To IPO Blockchain Slides
Idea To IPO Blockchain SlidesIdea To IPO Blockchain Slides
Idea To IPO Blockchain Slides
 
Dissemination of knowledge on Secure Systems Engineering
Dissemination of knowledge on Secure Systems EngineeringDissemination of knowledge on Secure Systems Engineering
Dissemination of knowledge on Secure Systems Engineering
 
C-Suite Snacks Webinar Series: How Companies are Making Money in Bitcoin and ...
C-Suite Snacks Webinar Series: How Companies are Making Money in Bitcoin and ...C-Suite Snacks Webinar Series: How Companies are Making Money in Bitcoin and ...
C-Suite Snacks Webinar Series: How Companies are Making Money in Bitcoin and ...
 
Blockchain and Crypto 101 - October 2017
Blockchain and Crypto 101 - October 2017Blockchain and Crypto 101 - October 2017
Blockchain and Crypto 101 - October 2017
 
Blockchain and Bitcoin
Blockchain and BitcoinBlockchain and Bitcoin
Blockchain and Bitcoin
 
Blockchain: Bitcoin and Beyond
Blockchain: Bitcoin and BeyondBlockchain: Bitcoin and Beyond
Blockchain: Bitcoin and Beyond
 
BlockchainIntro.com
BlockchainIntro.comBlockchainIntro.com
BlockchainIntro.com
 
Blockchain-based shared ownership of City Platform Cooperatives
Blockchain-based shared ownership of City Platform CooperativesBlockchain-based shared ownership of City Platform Cooperatives
Blockchain-based shared ownership of City Platform Cooperatives
 
Blockchain 101
Blockchain 101Blockchain 101
Blockchain 101
 
Introduction to Bit Coin Model
Introduction to Bit Coin ModelIntroduction to Bit Coin Model
Introduction to Bit Coin Model
 
CryptoFinalizedBSAF1A.pptx
CryptoFinalizedBSAF1A.pptxCryptoFinalizedBSAF1A.pptx
CryptoFinalizedBSAF1A.pptx
 
Investment Club Presentation 1 2021
Investment Club Presentation 1 2021Investment Club Presentation 1 2021
Investment Club Presentation 1 2021
 
Blockchain - Presentacion Betabeers Galicia 10/12/2014
Blockchain - Presentacion Betabeers Galicia 10/12/2014Blockchain - Presentacion Betabeers Galicia 10/12/2014
Blockchain - Presentacion Betabeers Galicia 10/12/2014
 
BIT COIN ,MINING & ATM
BIT COIN ,MINING & ATMBIT COIN ,MINING & ATM
BIT COIN ,MINING & ATM
 
Block chains and crypto currencies - introduction
Block chains and crypto currencies - introductionBlock chains and crypto currencies - introduction
Block chains and crypto currencies - introduction
 
Bit.ppt
Bit.pptBit.ppt
Bit.ppt
 
Michael bowen | High risk specialist |Card not present transaction expert
Michael bowen | High risk specialist |Card not present transaction expert Michael bowen | High risk specialist |Card not present transaction expert
Michael bowen | High risk specialist |Card not present transaction expert
 

More from QuantUniversity

EU Artificial Intelligence Act 2024 passed !
EU Artificial Intelligence Act 2024 passed !EU Artificial Intelligence Act 2024 passed !
EU Artificial Intelligence Act 2024 passed !
QuantUniversity
 

More from QuantUniversity (20)

EU Artificial Intelligence Act 2024 passed !
EU Artificial Intelligence Act 2024 passed !EU Artificial Intelligence Act 2024 passed !
EU Artificial Intelligence Act 2024 passed !
 
Managing-the-Risks-of-LLMs-in-FS-Industry-Roundtable-TruEra-QuantU.pdf
Managing-the-Risks-of-LLMs-in-FS-Industry-Roundtable-TruEra-QuantU.pdfManaging-the-Risks-of-LLMs-in-FS-Industry-Roundtable-TruEra-QuantU.pdf
Managing-the-Risks-of-LLMs-in-FS-Industry-Roundtable-TruEra-QuantU.pdf
 
PYTHON AND DATA SCIENCE FOR INVESTMENT PROFESSIONALS
PYTHON AND DATA SCIENCE FOR INVESTMENT PROFESSIONALSPYTHON AND DATA SCIENCE FOR INVESTMENT PROFESSIONALS
PYTHON AND DATA SCIENCE FOR INVESTMENT PROFESSIONALS
 
Qu for India - QuantUniversity FundRaiser
Qu for India  - QuantUniversity FundRaiserQu for India  - QuantUniversity FundRaiser
Qu for India - QuantUniversity FundRaiser
 
Ml master class for CFA Dallas
Ml master class for CFA DallasMl master class for CFA Dallas
Ml master class for CFA Dallas
 
Algorithmic auditing 1.0
Algorithmic auditing 1.0Algorithmic auditing 1.0
Algorithmic auditing 1.0
 
Towards Fairer Datasets: Filtering and Balancing the Distribution of the Peop...
Towards Fairer Datasets: Filtering and Balancing the Distribution of the Peop...Towards Fairer Datasets: Filtering and Balancing the Distribution of the Peop...
Towards Fairer Datasets: Filtering and Balancing the Distribution of the Peop...
 
Machine Learning: Considerations for Fairly and Transparently Expanding Acces...
Machine Learning: Considerations for Fairly and Transparently Expanding Acces...Machine Learning: Considerations for Fairly and Transparently Expanding Acces...
Machine Learning: Considerations for Fairly and Transparently Expanding Acces...
 
Seeing what a gan cannot generate: paper review
Seeing what a gan cannot generate: paper reviewSeeing what a gan cannot generate: paper review
Seeing what a gan cannot generate: paper review
 
AI Explainability and Model Risk Management
AI Explainability and Model Risk ManagementAI Explainability and Model Risk Management
AI Explainability and Model Risk Management
 
Algorithmic auditing 1.0
Algorithmic auditing 1.0Algorithmic auditing 1.0
Algorithmic auditing 1.0
 
Machine Learning in Finance: 10 Things You Need to Know in 2021
Machine Learning in Finance: 10 Things You Need to Know in 2021Machine Learning in Finance: 10 Things You Need to Know in 2021
Machine Learning in Finance: 10 Things You Need to Know in 2021
 
Bayesian Portfolio Allocation
Bayesian Portfolio AllocationBayesian Portfolio Allocation
Bayesian Portfolio Allocation
 
The API Jungle
The API JungleThe API Jungle
The API Jungle
 
Explainable AI Workshop
Explainable AI WorkshopExplainable AI Workshop
Explainable AI Workshop
 
Constructing Private Asset Benchmarks
Constructing Private Asset BenchmarksConstructing Private Asset Benchmarks
Constructing Private Asset Benchmarks
 
Machine Learning Interpretability
Machine Learning InterpretabilityMachine Learning Interpretability
Machine Learning Interpretability
 
Responsible AI in Action
Responsible AI in ActionResponsible AI in Action
Responsible AI in Action
 
Qu speaker series 14: Synthetic Data Generation in Finance
Qu speaker series 14: Synthetic Data Generation in FinanceQu speaker series 14: Synthetic Data Generation in Finance
Qu speaker series 14: Synthetic Data Generation in Finance
 
Qwafafew meeting 5
Qwafafew meeting 5Qwafafew meeting 5
Qwafafew meeting 5
 

Recently uploaded

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Krashi Coaching
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Recently uploaded (20)

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 

Blockchain meetup

  • 1. Location: QuantUniversity Meetup November 14th 2017 Boston, MA Blockchain Technology Workshop 2017 Copyright QuantUniversity LLC. Presented By: Duru Turkoglu, PhD www.QuantUniversity.com
  • 3. • Public • Distributed • Immutable • Trustless What is Blockchain? Open to everybody Audited by everybody Append only No central authority Blockchain is an accounting system that is: Briefly: Distributed Ledger Introduced by: Bitcoin
  • 4. • 1970s/80s --- Public key cryptography • Guardtime --- Application of public key cryptography • 1990 --- Digicash/ecash • 1992/1997 --- Hashcash/Proof-of-work • 1998 --- b-money, bitgold History of Blockchain
  • 5. • 2008 --- Satoshi Nakamoto, creator of the Bitcoin Network Think: Store of value • 2013 --- Vitalik Buterin, creator of the Ethereum Network Think: Smart contracts and Worldwide computer • 2017 --- ERC20 Tokens/ICOs using the Ethereum Platform First ICO actually took place in 2013 Think: Stocks/assets (not fully clarified yet) • Ongoing --- Private blockchains, State channels, etc. History of Blockchain
  • 6. Ownership Easy to Verify and Hard to Fabricate Ledger Easy to Transact and Hard to Modify Essential Qualities of a Functioning Ledger
  • 7. Cash How do you make people believe that some cash out there is yours? Verifying Ownership Bearer’s Instrument If you have it in your wallet, then it is yours!
  • 8. Cash What if you have a LOT of cash? It would be very hard/risky to carry it. Verifying Ownership ? Bearer’s Instrument If you have it in your wallet, then it is yours!
  • 9. Cash What if you have a LOT of cash? It would be very hard/risky to carry it. Verifying Ownership Place it in a Trust The bank has your funds, but you can withdraw!
  • 10. Car & Home What about other kinds of physical assets, such as cars, real estate, etc? Verifying Ownership Government Record Ownership is registered with DMV and Recorder’s Office.
  • 11. Verifying Ownership Conventional Methods Rely on a Single Trusted Party • Banks, government offices, etc. • Problems arise when trust is broken: ▫ Access may be restricted or denied ▫ Prone to mistakes in recordkeeping ▫ Bank runs result in loss of funds (due to fractional reserve) • Transfer of ownership may require multiple parties involved • High transaction fees to be paid to each party involved Blockchain does not place trust in a single entity
  • 12. Double Spending Cash in Wallet Can you double spend the cash in your wallet? NO! (Unless you are a magician) Issues Cannot transact with large amounts. Actually, you can but very risky.
  • 13. Cash in Bank Account Can you double spend the funds in your bank account. No, banks do not clear funds twice, but you can try! Double Spending Issues Transaction fees are high. Clearance of funds may take several days.
  • 14. Car & Home Can you double sell a car? Or a house? No! (In general) Fraudulent sales exist! Double Spending Issues Many parties are involved to prevent such fraudulent sales. Very high transaction fees.
  • 15. Double Spending Conventional Methods Are Prone to Such Frauds • If the amount is too small there is no incentive (e.g., cash) • There are prevention methods for larger amounts/real assets ▫ Central parties managing the funds disallow double spend ▫ Third intermediary parties check validity of ownership • Requires trust in central or intermediary parties • Transfer of ownership may require multiple parties involved • High transaction fees to be paid to each party involved Blockchain prevents double spend via its ledger
  • 16. Transactions and Ledger Physical Cash Very easy transactions. Very hard to modify ledger. Need physical exchange. Issues Theft is relatively easy. Physical cash is not the only source of money.
  • 17. Fiat Money Relatively easy to transact within the same bank but not so easy with others. Hard to modify ledger from outside. Transactions and Ledger Issues Transaction fees are high. Money supply can be diluted relatively easily.
  • 18. Car & Home Not very easy transactions. Relatively hard to modify ledger from outside. Transactions and Ledger Issues Many parties are involved in transactions leading to high fees.
  • 19. Transactions and Ledger Conventional Methods • I Blockchain is not easy to modify Transactions require some time
  • 21. Easy to Verify Hard to Fabricate
  • 22. Story: Alice would like to send a very important message to Bob. She wants him to know that it is indeed her who sent the message. How can Alice accomplish this? Answer: One way functions and public key cryptography! Private and public keys to encrypt and to decrypt. Applications: Communications of any kind: internet, military, etc. Developments in cryptography created the field of computer science back in the 1940s. Public Key Cryptography
  • 23. Illustration: • Alice produces private and public keys. • She publishes her public key to everyone. • Private key encrypts, public key decrypts. • Nobody can produce the same encryption without knowing the private key of Alice. Alice sends a message M to Bob: She encrypts M using her own private key: M ⟶ MA Bob decrypts the message from Alice: He decrypts message using Alice’s public key: MA ⟶ M Public Key Cryptography
  • 24. Guarantees: Using Alice’s private key ensures that message is sent by Alice. Nobody else could have written it! Digital signatures: Encryption using a private key is called a “digital signature”. Digital signatures are enforceable in a court of law! Alice cannot claim that she did not send the message. Application in blockchain: Digital signatures are used to authenticate ownership. Payment addresses are generated by public keys. Public Key Cryptography
  • 25. Verifying Ownership in Blockchain Public Key Cryptography to Prove Ownership • User creates a pair of public and private keys • Public key to generate and publish payment addresses • Private key to digitally sign for the funds in those addresses
  • 26. Verifying Ownership in Blockchain Security of Public Key Cryptography • Brute force is a possible attack, but infeasible in general • One-way functions for encrypting, cannot invert the function • Best to avoid spending from the same address many times • It is extremely hard to forge a signature even with observation • If your private key is exposed, your address is compromised . . .
  • 27. Verifying Ownership in Blockchain Anybody Can Verify Ownership in a Transaction • Address of the funds being spent unlocks the transaction • Verification similar to the process between Alice and Bob • Nobody else but the owner of the address must have signed • Owning an address is equivalent to owning its private key • If your private key is exposed, ownership is lost forever As long as the private keys are secured It is practically impossible for someone to steal
  • 29. Consists of several computers called nodes Each node has its own private memory Nodes communicate with each other by messages Network structure is not known in advance Distributed Systems Nodes in the network may fail or may exhibit malicious behavior
  • 30. Client-server: Designated servers accept clients Three-tier/n-tier: More organized structure Peer-to-peer: Every node can be a server or a client Distributed Systems Computation by a master node or by using a shared database Blockchain itself is the shared database
  • 31. Consensus required: • Who holds correct data • Who can make changes • How are these rules enforced between nodes Let's not forget, there may be malicious nodes Distributed Systems Blockchain approach: Publicly verifiable data requires (hard) proof Tampering with data becomes exponentially harder as time passes
  • 32. Advantages: • No need to trust any particular (central) node • Collective computation effort more powerful than what can be done by one central entity • Rules to be agreed on collectively • More resilient to certain forms of attacks Challenges: • Scalability in the number of transactions • Providing incentives for honest behavior and/or penalties for malicious behavior Distributed Systems
  • 33. • Block number (height) • Latest transactions • Resulting changes to data • Pointer to previous block • Proof of validity Structure of the Blockchain …
  • 34. • Each block stores a list of transactions • Similar to chain of title in real estate trxs, if we assume one trx per block. • For correctness, the entire chain must be valid Structure of the Blockchain
  • 35. • Transactions require digital signatures • How to verify the entire history of transactions in the blockchain? • Any message can be digested into a short string using a hash function • One-way functions Cryptographic Hash Functions
  • 36. • Cryptocurrency Bitcoin, Ethereum, Litecoin, etc. There are over 1000 different altcoins • Smart contracts Legal contracts which are enforced automatically • Asset management • Identity verification, notary, voting • Decentralized exchanges • Many more… Applications of Blockchain Technology
  • 38. Story: Alice would like to send a very important message to Bob. She wants him to know that it is indeed her who sent the message. How can Alice accomplish this? Answer: One way functions and public key cryptography! Private and public keys to encrypt and to decrypt. Applications: Communications of any kind: internet, military, etc. Developments in cryptography created the field of computer science back in the 1940s. Public Key Cryptography
  • 39. Illustration: • Alice produces private and public keys. • She publishes her public key to everyone. • Private key encrypts, public key decrypts. • Nobody can produce the same encryption without knowing the private key of Alice. Alice sends a message M to Bob: She encrypts M using her own private key: M ⟶ MA Bob decrypts the message from Alice: He decrypts message using Alice’s public key: MA ⟶ M Public Key Cryptography
  • 40. Guarantees: Using Alice’s private key ensures that message is sent by Alice. Nobody else could have written it! Digital signatures: Encryption using a private key is called a “digital signature”. Digital signatures are enforceable in a court of law! Alice cannot claim that she did not send the message. Application in blockchain: Digital signatures are used to authenticate ownership. Payment addresses are generated by public keys. Public Key Cryptography
  • 41. Verifying Ownership in Blockchain Public Key Cryptography to Prove Ownership • User creates a pair of public and private keys • Public key to generate and publish payment addresses • Private key to digitally sign for the funds in those addresses
  • 42. Verifying Ownership in Blockchain Security of Public Key Cryptography • Brute force is a possible attack, but infeasible in general • One-way functions for encrypting, cannot invert the function • Best to avoid spending from the same address many times • It is extremely hard to forge a signature even with observation • If your private key is exposed, your address is compromised . . .
  • 43. Verifying Ownership in Blockchain Anybody Can Verify Ownership in a Transaction • Address of the funds being spent unlocks the transaction • Verification similar to the process between Alice and Bob • Nobody else but the owner of the address must have signed • Owning an address is equivalent to owning its private key • If your private key is exposed, ownership is lost forever As long as the private keys are secured It is practically impossible for someone to steal
  • 44. • Transactions require digital signatures • How to verify the entire history of transactions in the blockchain? • Any message can be digested into a short string using a hash function • One-way functions Cryptographic Hash Functions
  • 45. Cryptography: • Validity of transactions can be verified quickly • Ownership is tied to the private keys • Each block can be digested into a string which proves the validity of the entire history Distributed Systems: • Trustless distributed public ledger • Creating a block is hard, so it is much harder to modify earlier blocks in the blockchain • Constantly audited by peers Main Components of Blockchain
  • 46. Smart Homes, Smart Cars: • Ownership information can be recorded on the blockchain • Exchange of the ownership, money, keys (authority to use), can be transferred in the same single transaction • Crucial information related to the asset can also be recorded on the blockchain: past insurance claims, previous owners • Very reliable: any crucial information recorded on the blockchain cannot be modified later Applications of Blockchain Technology
  • 47. Identity, Notary, Voting: • Self identifying information is required in any business transaction: photo ID, passport, etc • This information can be stored on the blockchain and the proof of identity can be produced without any government backing • One can prove identity by just simply using the private key • Claims about the identify of Satoshi Nakamoto was made based on the use of one of his/their private keys Applications of Blockchain Technology
  • 48. Decentralized Exchanges: • Exchange of two assets is generally carried out by a trusted third party that acts as escrow • Central entity controlling the exchange can be the subject of an attack resulting in the loss of deposits • Such incidents can be eliminated via exchanging the assets by using an escrow for the transaction on the blockchain itself • Swap will be carried out when both parties sign the transaction Applications of Blockchain Technology
  • 49. Private Blockchain: • Even though the main motivation to introduce the blockchain technology was to remove trust, settings where there is a trusted entity can still enjoy the benefits of using a blockchain • Automated maintenance and auditing of records • No need for consensus. The blockchain is truly an append only ledger. Once written, the past is indeed set in stone • Requires full trust in the centralized node(s) issuing the blocks Applications of Blockchain Technology
  • 50. 50 • Coming in 2018 to Boston, NYC, Chicago, San Francisco and online! • Sign up at www.analyticscertificate.com/Blockchain-ML for updates! Blockchain workshop
  • 52. Thank you members and CIC! Checkout our programs at: www.analyticscertificate.com Sri Krishnamurthy, CFA, CAP Founder and CEO QuantUniversity LLC. srikrishnamurthy www.QuantUniversity.com Information, data and drawings embodied in this presentation are strictly a property of QuantUniversity LLC. and shall not be distributed or used in any other publication without the prior written consent of QuantUniversity LLC. 52