Andreas Park PRO
Professor of Finance at UofT
Andreas Park
Part 1: 30,000 ft overview
Part 2: Drilling down
Part 3: Moving along
Part 4: Smart contracts
Objectives
Objectives
Definition
Properties
Simple Application
Nerdy stuff:
Examples of "Andreas"
Examples of "AnDrEaS"
Problem: Hashes can be cracked!
cracked by "CrackStation"
Repeated Hashing to produce concise transaction digest
Source: https://github.com/cliftonm/MerkleTree
Idea
The Merkle Root
the leafs
the branches
Why convenient?
Source: https://github.com/cliftonm/MerkleTree
The Merkle Root
the leafs
the branches
https://www.codeproject.com/Articles/1176140/Understanding-Merkle-Trees-Why-use-them-who-uses-t
your record
assume you know the hash of the root
Some formalism
Alice wants to send Bob money without Charles seeing it
Symmetric Encryption: Bob and Alice use the same key to encrypt and decrypt a message
Formally: public key P = private key S
Asymmetric Encryption: Bob has a public and a private key, (Pb Sb)
Pb
Sb
Pb
Sb
Formally
required property
if S applied to M created T, T=Sign(M,S) => Check(T,M,P)=1
Alice wants to send Bob a message and provide proof that its her.
Sa
Pa
formally: computes T=Sign(M,Sa)
formally: computes check(T,M,Pa)
n | |
---|---|
1 | 1 |
5 | 4 |
10 | 4 |
12 | 4 |
14 | 6 |
15 | 8 |
A task that'll come up
trick: pick k and then find d s.t.
Sa
Pa
S=(d,n)=(2011,3127)
P=(e,n)=(3,3127)
Sa
Pa
S=(d,n)=(2011,3127)
P=(e,n)=(3,3127)
Example parameters
Order of transactions?
Cancel one before the other?
When is it in the "database"?
Cryptography is not enough for value transfers!
Sa
Pa
formally: computes T=Sign(M,Sa)
formally: computes check(T,M,Pa)
Recall: Blockchain is like a distributed database
Problem
Possible Solutions
Where to add a new block B7?
Equilibrium for "the longest chain"?
Tselekounis, Proceedings of the 2016 ACM Conference on Economics and Computation, 2016
"The blockchain folk theorem" by Biais, Bisière, Bouvard, and Casamatta, RFS 2018
Contains transaction from Bob to Alice
Bob wants to undo the transaction by rewriting history with B6
Bob's objective
What does it take?
How does Proof of Work prevent this?
Back of the envelope calculation
Double spend attack prevention
Basic idea of competitive equilibrium
aggregate mining cost = aggregate reward
Double spending attack
condition that prevents it
(Chiu & Koeppl RFS 2018)
Major innovation of bitcoin
My JAXX addresses:
Objectives
By Andreas Park
This deck is for the second of four lectures on Blockchain technology in finance, taught at the Rotman School of Management, Spring 2018. The pre-recorded version is available here: https://www.youtube.com/playlist?list=PLTmzBTSqnXdvhYGdCUzLM4r0r0K_jX3vx