Archive for category Uncategorized
DagCoin: a cryptocurrency without blocks
Posted by SDLerner in Uncategorized on September 11, 2015
Back in 2012 I thought a lot on a new cryptocurrency that could merge the concepts of transaction and block. Each transaction would carry a proof-of-work and reference one or more previous transactions. The resulting authenticated data structure would be a Direct Acyclic Graph (DAG) of transactions where each transaction “confirms” one or more previous […]
How DECOR++ can eradicate selfish mining incentive by design
Posted by SDLerner in Uncategorized on August 16, 2015
A year ago I proposed the DECOR protocol, a new rule for cryptocurrencies to reduce significantly the amount of orphan blocks and then allow block rate to be as high as one every 5 seconds, and at the same time it promised to address the problem of selfish mining. After one year, I’ve received very […]
Simulated Brains, Smart-contracts and the direction of time
Posted by SDLerner in Uncategorized on March 30, 2015
There are three fantastic discoveries in computer science that fascinate me: fully-homomorphic encryption , Indistinguishability Obfuscation, and sz-Snarks. Using these constructions, it’s possible to create an obfuscated program and allow others to execute the program in a way that the when the program produces an output, people cannot learn anything about its inner workings. The […]
Faster SHA-256 ASICs using carry reduced adders
Posted by SDLerner in Uncategorized on February 17, 2015
The core part of Bitcoin mining is performing a double SHA-256 hash digest and comparing the result against the target. Two years ago, in 2013, the first Bitcoin ASIC miners appeared on the market. Since then, mining ASIC technology advanced both in terms of the manufacturing technology (the node) and in terms of design, to […]
Proof of unique blockchain storage
Posted by SDLerner in Uncategorized on November 3, 2014
One of the key elements to measure the health of a blockchain based cryptocurrency is the number of nodes actually storing the blockchain. The blockchain grows normally according to the number of payments per second. But as a cryptocurrency becomes popular, the number of payments per second increases, and the blockchain growth rate also increases. […]
The Bitcoin Freeze on Transaction Attack (FRONT)
Posted by SDLerner in Uncategorized on October 5, 2014
Two month passed since my last post and the reason is I’ve been terribly busy working for Coinspect and also helping with Bitcoin Core security. A rainy Sunday evening is a great moment to write, so here is my new post, with some new thoughts. People are trying to understand the security guarantees Bitcoin provides. […]
Blockpad: Improved Proof-of-work function with decentralization incentives
Posted by SDLerner in Uncategorized on July 5, 2014
A few posts ago I presented BlockPow, an example of a proof of work function that practically reduces the incentives for users to join mining pools. The shorter the block interval, the best it works. Let’s first summarize the idea behind BlockPow: if a miner tries to join a pool, then he incur in overhead […]
Preventing Geographical Centralization of Cryptocurrency Mining with the LIMIO protocol
Posted by SDLerner in Uncategorized on July 4, 2014
There has been much discussion recently about how to prevent mining pools. There are theoretical and practical approaches. Nevertheless preventing mining pools is not the same as preventing geographical centralization. Mining pools incentives are: Reduce payoff variance. Reduce resource usage. Normally Bitcoin node would require more resources (memory,disk, bandwidth) than a pooled miner. Reduce exposition to […]
Preview of Identiva PassKey: vote for us for the Cisco IoT Challenge
Posted by SDLerner in Uncategorized on July 1, 2014
A friend of mine and me have developed a new technology and device that we think can be a game changer in web authentication. I’d like you take a look and vote for as for the Cisco IoT Challenge (you must register first to vote….#?@!) We’re launching a new company (Identiva Security) to develop the […]
July 2009 Mystery Solved
Posted by SDLerner in Uncategorized on June 23, 2014
A year ago I analyzed a mining pattern that suggested a correlation between Satoshi computer and another computer mining at the same time. This relation had been highlighted to me by a another user in the forums (I don’t remember who) . From this correlation I conjectured that the same computer was mining both patterns […]
Recent Comments