1.1 Our Contribution. 1.2 Paper Organization. The Goshawk Protocol 2.1 Improved Two-layer Hybrid Consensus

Size: px
Start display at page:

Download "1.1 Our Contribution. 1.2 Paper Organization. The Goshawk Protocol 2.1 Improved Two-layer Hybrid Consensus"

Transcription

1

2

3 m T t = T/m

4 B B = (H,B, H,K, h, k, {tx}, n) H,B H,K h k {tx} n B Hash(B) T K T K B T K < Hash(B) T M T M P B H = Hash(B ) P n 0 H T M H T K P B K P B M 2 λ E D N P N

5 5 The ticket price is adjusted by the function F( TP, P, L) which takes as input the size of TP, the current ticket price P and a parameter L. F returns a new price P which increases exponentially compared to P if TP > L, and P decreases when TP < L. Therefore, when TP > L, users are more reluctant to purchase tickets, and when TP < L users are more willing to. In this way, F keeps the size of TP close to L, thus on average each ticket waits time (L/N + D) T before it is chosen. A stakeholder with p fraction of total stakes gains disproportionate advantage by engaging in ticket purchasing if others do not devote all their stakes into tickets. To reduce such advantage, L should be large enough such that L P S/f, where S is the total amount of stakes and f is a constant greater than 1. A stakeholder who holds β fraction of the tickets in TP has a probability of M (N, β) to reach majority in the chosen ( ) N tickets of a keyblock, where M (N, β) = i= N/2 +1 Ni β i (1 β)n i. The relationship between M (N, β) and (N, β) is shown in Fig.1. Fig. 1. Figure of M (N, β), with N,β as two horizontal axises, and M (N, β) as the vertical axis. The smaller M (N, β) is, the more security the scheme is. For each N, M (N, β) increases strictly with β, as expected. For a specific β, M (N, β) decreases with N generally. On startup, PoW is the only consensus protocol because ticket pool is empty at the beginning of the chain. The ticket-voting mechanism begin at block R which is selected such that L = R E + D. 2.3 Goshawk: Hybrid Consensus Scheme We combine the improved two-layer blockchain structure with the ticket-voting mechanism mentioned above to construct our novel hybrid consensus scheme, Goshawk. The new block structure is presented in Definition 2. Definition 2 (Block Structure II). We define a block, denoted by B, as the following tuple B = (Htip,B, Htip,K, h, k, {tx}, {tk}, {vt}, n) where Htip,B, Htip,K, h, k, {tx}, n are as in Definition 1; {tk} is the set of tickets contained in B; {vt} is the set of votes contained in B. Compared to the mining process described in Section 2.1, in this combined scheme, the miner P needs to take the following additional steps. In addition to the transaction {tx}, Btemp also contains a set of ticket purchasing transactions {tk}, which were collected and stored locally by P similar to ordinary transactions;

6 P N/2 + 1 H,K {vt} B P H,K {tk} {vt} B K K B H,B H,K h k n { } { } {vt} H Hash(B ) H T K K B P K H T M H > T K M B P M P K (K ) (K ) H,B Hash(K ) H,K Hash(K ) h (K ) + 1 k (K ) + 1 P M ( (M )) (M ) H,B Hash(M ) H,K Hash( (M )) h (M ) + 1 k (M ) n n + 1 1/(2N) D M M/(2N)

7 Ticket Pool Add Select Vote Ordinary Transactions Ticket Purchase Transactions E D

8 F q m B a b c F now A B C D E ΣF prev F pm F pk E q (m 1)q B F F F F ΣF ΣF mf A D (a+c) F + a F + b F E b F + B c ΣF + a F + b F D a F + b F + B E D E

9 R = q ((a + c) F + b F + B) + (m 1)q (a F + b F ) = q ((a + c) F + b F + B) + (m 1)q (a F + b F ) = ((a + b) m + c)q F + q B = ((1 c) m + c)q F + q B. D 1/2 D R < 1 2 q (c ΣF + a F + b F + B) (m 1)q (a F + b F ) = 0.5mq F (a + b) + 0.5q c ΣF + 0.5q B. ΣF X X m P (X = k) = 1 m (1 1 m )k 1 θ P 1 := = P (X = k) k=θ k=θ 1 m (1 1 m )k 1 = (1 1 m )θ m 1 P 1 m lim m P 1 = e θ P 1 < e θ θ = 5 5m 0.62% ΣF 5mF ΣF mf R < 0.5mq F (a + b) + 0.5q c ΣF + 0.5q B < 0.5mq F (a + b + 5c) + 0.5q B < 0.5mq F (1 + 4c) + 0.5q B. R > R 1 (1 + 4c) < 1 c 2 c < 1 6 a = 0.3, b = 0.6, c = 0.1 E R ((1 c) m + c)q F + q B = (0.9m + 0.1)q F + q B.

10 D R < 0.5mq F (1 + 4c) + 0.5q B 0.7mq F + 0.5q B. R < R E F now A B C D F pm ΣF prev C D C D D C n i 1 i n λ i R i R i [ n ] 1 E (λ i R R i ) 2 i=1

11 [ n ] 1 E (λ i R R i ) 2 = i=1 = = n ( λ 2 i E[R 2 ] 2λ i E[RR i ] + E[Ri 2 ] ) i=1 n (λ 2 i 2λ 2 i + λ i )E[R 2 ] i=1 ( 1 n i=1 λ 2 i ) E[R 2 ] R i R λ i 0 i λ i = 1 r 1 r 2 R E[R 2 ] = (r 1 + r 2 ) 2 µ E[R 2 ] = µ(r 1 +r 2 ) 2 +(1 µ)r 2 2 = (r 1 +r 2 ) 2 (1 µ)(r r 1 r 2 ) < (r 1 +r 2 ) 2 φ φ : [0, 1] [0, 1] [0, 1] φ α β φ(α, β) γ(β) = N i= N/2 +1 ( N i ) β i (1 β) N i N αγ(β) 1 α γ(β)+2αγ(β) φ(α, β) α β E A

12 φ(α, β) N = 5 α β φ(α, β) E B E C φ(α, β) = = = = (Pr[E B E C ]) i 1 Pr[E A ] i=1 (α (1 γ) + (1 α) γ) i 1 αγ i=1 (α + γ 2αγ) i 1 αγ i=1 αγ 1 α γ + 2αγ, γ γ(β) = N i= N/2 +1 ( N i ) β i (1 β) N i γ = 1 φ(β) = 1 γ = 0 αγ(β) φ(β) = 0 φ(α, β) = 1 α γ(β)+2αγ(β) φ(α, β) α β φ(α, β) > 1 2 αγ 1 α γ + 2αγ > 1 2 2αγ > 1 α γ + 2αγ α + γ > 1 α > 1 γ. β = 20% N = 5 γ 6% 1 γ 94% 50%

13 1/3 1/2 α < 1 3 φ(α, β) < 1 3 αγ 1 α γ + 2αγ < 1 3 3αγ < 1 α γ + 2αγ αγ < 1 α γ α < 1 γ 1 + γ. β = 20% N = 5 γ 6% 1 γ 1+γ 89% W x W y W W N z

14 Z 29 th 21 st 1 32 T M /T K = 32 T M /T K

15 20% 90% 10% D th D 51% % 10%

16 T M /T K

17

18

Hash Tables. Direct-Address Tables Hash Functions Universal Hashing Chaining Open Addressing. CS 5633 Analysis of Algorithms Chapter 11: Slide 1

Hash Tables. Direct-Address Tables Hash Functions Universal Hashing Chaining Open Addressing. CS 5633 Analysis of Algorithms Chapter 11: Slide 1 Hash Tables Direct-Address Tables Hash Functions Universal Hashing Chaining Open Addressing CS 5633 Analysis of Algorithms Chapter 11: Slide 1 Direct-Address Tables 2 2 Let U = {0,...,m 1}, the set of

More information

arxiv: v1 [cs.dc] 22 Oct 2018

arxiv: v1 [cs.dc] 22 Oct 2018 FANTOM: A SCALABLE FRAMEWORK FOR ASYNCHRONOUS DISTRIBUTED SYSTEMS A PREPRINT Sang-Min Choi, Jiho Park, Quan Nguyen, and Andre Cronje arxiv:1810.10360v1 [cs.dc] 22 Oct 2018 FANTOM Lab FANTOM Foundation

More information

DEXON Consensus Algorithm

DEXON Consensus Algorithm DEXON Consensus Algorithm Infinitely Scalable, Low-Latency Byzantine Fault Tolerant Blocklattice DEXON Foundation Aug 9 2018, v1.0 Abstract A blockchain system is a replicated state machine that must be

More information

Proof-of-Stake. Research Seminar in Cryptography. Janno Siim

Proof-of-Stake. Research Seminar in Cryptography. Janno Siim Proof-of-Stake Research Seminar in Cryptography Janno Siim Project advisor: Michał Zając 1 Introduction Blockchain is a decentralized database containing linked data blocks that are resistant to modifications.

More information

The Blockchain Folk Theorem

The Blockchain Folk Theorem The Blockchain Folk Theorem Bruno Biais (TSE), Christophe Bisière (TSE), Matthieu Bouvard (McGill) and Catherine Casamatta (TSE) Swissquote Conference 2017 on Fintech Swiss Finance Institute Ecole Polytechnique

More information

BlockDAG protocols SPECTRE, PHANTOM

BlockDAG protocols SPECTRE, PHANTOM lockdag protocols SPECTRE, PHANTOM PASE 18, Stanford Yonatan Sompolinsky Joint work with Aviv Zohar Motivation - Algorithms on graphs are fun - lockchain does not scale - lockdag - generlization of Satoshi

More information

Data Structures and Algorithm. Xiaoqing Zheng

Data Structures and Algorithm. Xiaoqing Zheng Data Structures and Algorithm Xiaoqing Zheng zhengxq@fudan.edu.cn Dictionary problem Dictionary T holding n records: x records key[x] Other fields containing satellite data Operations on T: INSERT(T, x)

More information

Security of Blockchain Technologies

Security of Blockchain Technologies Security of Blockchain Technologies Master Thesis Karl Wüst 2016-07-11 Supervisor: Prof. Dr. Srdjan Capkun Advisor: Arthur Gervais Department of Computer Science, ETH Zürich Abstract Proof of Work (PoW)

More information

Section 2.1 Limits: Approached Numerically and Graphically

Section 2.1 Limits: Approached Numerically and Graphically Section 2.1 Limits: Approached Numerically and Graphically Foundation Concepts: Limit Left-hand limit Right-hand limit 1 = 1 = tiny big Practice: 1. What can we say about lim,. f(x)? a) If lim, 3 4 f(x)=7

More information

Evolutionary Game for Mining Pool Selection in Blockchain Networks

Evolutionary Game for Mining Pool Selection in Blockchain Networks Evolutionary Game for Mining Pool Selection in Blockchain Networks Xiaojun Liu, Wenbo Wang, Dusit Niyato, Narisa Zhao and Ping Wang Institute of Systems Engineering, Dalian University of Technology, Dalian,

More information

The Blockchain folk theorem

The Blockchain folk theorem The Blockchain folk theorem Bruno Biais (HEC & TSE), Christophe Bisière (TSE), Matthieu Bouvard (Mc Gill & TSE), Catherine Casamatta (TSE) April 2018 What s a blockchain? Distributed ledger, records transactions

More information

The shortest queue problem

The shortest queue problem The shortest queue problem Ivo Adan March 19, 2002 1/40 queue 1 join the shortest queue queue 2 Where: Poisson arrivals with rate Exponential service times with mean 1/ 2/40 queue 1 queue 2 randomly assign

More information

Gravity: Distributed ledger data management protocol.

Gravity: Distributed ledger data management protocol. Gravity: Distributed ledger data management protocol. June 7, 2018 Abstract The concept of a cryptographically protected and distributed transaction ledger has demonstrated its eciency in a series of projects.

More information

Simple Proofs of Sequential Work

Simple Proofs of Sequential Work Simple Proofs of Sequential Work Bram Cohen Krzysztof Pietrzak Eurocrypt 2018, Tel Aviv, May 1st 2018 Outline What How Why Proofs of Sequential Work Sketch of Construction & Proof Sustainable Blockchains

More information

On the Phase Space of Block-Hiding Strategies

On the Phase Space of Block-Hiding Strategies On the Phase Space of Block-Hiding Strategies Assaf Shomer 1 February 16, 014 1 Contact the author at assafshomer at gmail dot com. Support this research at 18wuRLYvbpeiEEUSykjms89cVciWBfcFF (BTC), LXT14HrbdQxU3cMiwuMPyEvp47frZkCD9

More information

Introduction to Hashtables

Introduction to Hashtables Introduction to HashTables Boise State University March 5th 2015 Hash Tables: What Problem Do They Solve What Problem Do They Solve? Why not use arrays for everything? 1 Arrays can be very wasteful: Example

More information

arxiv: v2 [cs.cr] 8 Nov 2018

arxiv: v2 [cs.cr] 8 Nov 2018 Deconstructing the Blockchain to Approach Physical Limits Vivek Bagaria, Sreeram Kannan, David Tse, Giulia Fanti, Pramod Viswanath arxiv:1810.08092v2 [cs.cr] 8 Nov 2018 Stanford University, University

More information

Introduction to Hash Tables

Introduction to Hash Tables Introduction to Hash Tables Hash Functions A hash table represents a simple but efficient way of storing, finding, and removing elements. In general, a hash table is represented by an array of cells. In

More information

Hathor Network 1 A Novel, Scalable, and Decentralized Architecture for a General Distributed Ledger

Hathor Network 1 A Novel, Scalable, and Decentralized Architecture for a General Distributed Ledger Hathor Network 1 A Novel, Scalable, and Decentralized Architecture for a General Distributed Ledger Hathor is a transactional consensus platform comprised of an entirely novel architecture, based on concepts

More information

Chapter 2 - Survival Models

Chapter 2 - Survival Models 2-1 Chapter 2 - Survival Models Section 2.2 - Future Lifetime Random Variable and the Survival Function Let T x = ( Future lifelength beyond age x of an individual who has survived to age x [measured in

More information

Cell throughput analysis of the Proportional Fair scheduler in the single cell environment

Cell throughput analysis of the Proportional Fair scheduler in the single cell environment Cell throughput analysis of the Proportional Fair scheduler in the single cell environment Jin-Ghoo Choi and Seawoong Bahk IEEE Trans on Vehicular Tech, Mar 2007 *** Presented by: Anh H. Nguyen February

More information

The Bitcoin Mining Game

The Bitcoin Mining Game RESEARCH ARTICLE The Bitcoin Mining Game Nicolas Houy Abstract. This article deals with the mining incentives in the Bitcoin protocol. The mining process is used to confirm and secure transactions. This

More information

ENEE 459-C Computer Security. Message authentication (continue from previous lecture)

ENEE 459-C Computer Security. Message authentication (continue from previous lecture) ENEE 459-C Computer Security Message authentication (continue from previous lecture) Last lecture Hash function Cryptographic hash function Message authentication with hash function (attack?) with cryptographic

More information

Hashing. Data organization in main memory or disk

Hashing. Data organization in main memory or disk Hashing Data organization in main memory or disk sequential, binary trees, The location of a key depends on other keys => unnecessary key comparisons to find a key Question: find key with a single comparison

More information

Searching. Constant time access. Hash function. Use an array? Better hash function? Hash function 4/18/2013. Chapter 9

Searching. Constant time access. Hash function. Use an array? Better hash function? Hash function 4/18/2013. Chapter 9 Constant time access Searching Chapter 9 Linear search Θ(n) OK Binary search Θ(log n) Better Can we achieve Θ(1) search time? CPTR 318 1 2 Use an array? Use random access on a key such as a string? Hash

More information

CHAPTER FIVE. Solutions for Section 5.1. Skill Refresher. Exercises

CHAPTER FIVE. Solutions for Section 5.1. Skill Refresher. Exercises CHAPTER FIVE 5.1 SOLUTIONS 265 Solutions for Section 5.1 Skill Refresher S1. Since 1,000,000 = 10 6, we have x = 6. S2. Since 0.01 = 10 2, we have t = 2. S3. Since e 3 = ( e 3) 1/2 = e 3/2, we have z =

More information

Stochastic Models and Wide-Area Network Measurements for Blockchain Design and Analysis

Stochastic Models and Wide-Area Network Measurements for Blockchain Design and Analysis Appeared in INFOCOM 208 Stochastic Models and Wide-Area Network Measurements for Blockchain Design and Analysis Nikolaos Papadis, Sem Borst, Anwar Walid, Mohamed Grissa, Leandros Tassiulas Nokia Bell Labs,

More information

SpaceMint: A Cryptocurrency Based on Proofs of Space

SpaceMint: A Cryptocurrency Based on Proofs of Space SpaceMint: A Cryptocurrency Based on Proofs of Space Sunoo Park 1, Albert Kwon 1, Georg Fuchsbauer 2, Peter Gaži 3, Joël Alwen 4, and Krzysztof Pietrzak 4 1 MIT 2 Inria, ENS, CNRS, and PSL 3 IOHK 4 IST

More information

Suppose that you have three coins. Coin A is fair, coin B shows heads with probability 0.6 and coin C shows heads with probability 0.8.

Suppose that you have three coins. Coin A is fair, coin B shows heads with probability 0.6 and coin C shows heads with probability 0.8. Suppose that you have three coins. Coin A is fair, coin B shows heads with probability 0.6 and coin C shows heads with probability 0.8. Coin A is flipped until a head appears, then coin B is flipped until

More information

Cryptographic Solutions for Data Integrity in the Cloud

Cryptographic Solutions for Data Integrity in the Cloud Cryptographic Solutions for Stanford University, USA Stanford Computer Forum 2 April 2012 Homomorphic Encryption Homomorphic encryption allows users to delegate computation while ensuring secrecy. Homomorphic

More information

DREP Chain A Novel Sharding Infrastructure Technical Whitepaer

DREP Chain A Novel Sharding Infrastructure Technical Whitepaer DREP Chain A Novel Sharding Infrastructure Technical Whitepaer DREP foundation V1.0.1 June 18, 2018 Abstract We present DREP chain, a novel scale-out blockchain protocol without compromising decentralization

More information

arxiv: v2 [cs.cr] 17 Feb 2017

arxiv: v2 [cs.cr] 17 Feb 2017 SATOSHI RISK TABLES CYRIL GRUNSPAN AND RICARDO PÉREZ-MARCO arxiv:1702.04421v2 [cs.cr] 17 Feb 2017 Abstract. We present Bitcoin Security Tables computing the probability of success p(z, q, t) of a double

More information

Junior Soldiers Unit 13 : Lesson 1

Junior Soldiers Unit 13 : Lesson 1 J S U 1 : L 1 R Bb PURPOSE: T v c pp xp pc f Bb f fm B Pc. Ev bf m, G v c C b f. Ep 1: NLT) C Pp R: Ep 1:-10 NLT) 1 C 8:6 CEV) Ep :-5 CEV) T Bb c b cf m, pc fc m p f. T v c B Pc m f Bb. W vc f G W, p v

More information

Equilibrium Valuation with Growth Rate Uncertainty

Equilibrium Valuation with Growth Rate Uncertainty Equilibrium Valuation with Growth Rate Uncertainty Lars Peter Hansen University of Chicago Toulouse p. 1/26 Portfolio dividends relative to consumption. 2 2.5 Port. 1 Port. 2 Port. 3 3 3.5 4 1950 1955

More information

STEP Support Programme. STEP II Vectors Questions: Solutions

STEP Support Programme. STEP II Vectors Questions: Solutions STEP Support Programme STEP II Vectors Questions: Solutions It makes no real difference whether you choose to work with column vectors or i, j, k notation, choose whichever you prefer! I tend to find it

More information

t over the interval 0 t

t over the interval 0 t Student Name: Period: Applications of Riemann Sums (AP Style) 1. A plane has just crashed six minutes after takeoff. There may be survivors, but you must locate the plane quickly without an extensive search.

More information

Chapter 3 Differentiation Rules

Chapter 3 Differentiation Rules Chapter 3 Differentiation Rules Derivative constant function if c is any real number, then Example: The Power Rule: If n is a positive integer, then Example: Extended Power Rule: If r is any real number,

More information

Blockchains from Proofs of Space and Time: from Spacemint to Chia

Blockchains from Proofs of Space and Time: from Spacemint to Chia Blockchains from Proofs of Space and Time: from Spacemint to Chia Krzysztof Pietrzak Guest Lecture, Blockchains and Cryptocurrencies (Spring 2018) Outline Bitcoin and Proofs of Work Proofs of Stake Proofs

More information

Intelligent Decentralized Cloud. EDCON 18th February 2017 (V1.0)

Intelligent Decentralized Cloud. EDCON 18th February 2017 (V1.0) Intelligent Decentralized Cloud EDCON 18th February 2017 (V1.0) Experimental Ethereum Sister Network Casper Extreme availability crypto:3 Speed, scale-out The Code is Law Governance by community The AI

More information

Proof of Kernel Work

Proof of Kernel Work Proof of Kernel Work A Resilient & Scalable Blockchain Consensus Algorithm for Dynamic Low-Energy Networks Leif-Nissen Lundbæk, XAIN Daniel Janes Beutel, XAIN Michael Huth, Imperial College London Laurence

More information

Overcoming Cryptographic Impossibility Results using Blockchains

Overcoming Cryptographic Impossibility Results using Blockchains Overcoming Cryptographic Impossibility Results using Blockchains Rishab Goyal goyal@utexas.edu Vipul Goyal vipul@cmu.edu Abstract Blockchain technology has the potential to disrupt how cryptography is

More information

CS5314 Randomized Algorithms. Lecture 15: Balls, Bins, Random Graphs (Hashing)

CS5314 Randomized Algorithms. Lecture 15: Balls, Bins, Random Graphs (Hashing) CS5314 Randomized Algorithms Lecture 15: Balls, Bins, Random Graphs (Hashing) 1 Objectives Study various hashing schemes Apply balls-and-bins model to analyze their performances 2 Chain Hashing Suppose

More information

Analysis of hashrate-based double-spending

Analysis of hashrate-based double-spending Analysis of hashrate-based double-spending Meni Rosenfeld December 11, 2012 Latest version: December 13, 2012 Abstract Bitcoin ([1]) is the world s first decentralized digital currency. Its main technical

More information

Ouroboros Praos: An adaptively-secure, semi-synchronous proof-of-stake blockchain

Ouroboros Praos: An adaptively-secure, semi-synchronous proof-of-stake blockchain Ouroboros Praos: An adaptively-secure, semi-synchronous proof-of-stake blockchain Bernardo David, Peter Gaži, Aggelos Kiayias, and Alexander Russell November 14, 2017 Abstract. We present Ouroboros Praos,

More information

Security Protocols and Application Final Exam

Security Protocols and Application Final Exam Security Protocols and Application Final Exam Solution Philippe Oechslin and Serge Vaudenay 25.6.2014 duration: 3h00 no document allowed a pocket calculator is allowed communication devices are not allowed

More information

Math 2250 Final Exam Practice Problem Solutions. f(x) = ln x x. 1 x. lim. lim. x x = lim. = lim 2

Math 2250 Final Exam Practice Problem Solutions. f(x) = ln x x. 1 x. lim. lim. x x = lim. = lim 2 Math 5 Final Eam Practice Problem Solutions. What are the domain and range of the function f() = ln? Answer: is only defined for, and ln is only defined for >. Hence, the domain of the function is >. Notice

More information

Math 113 Final Exam Practice Problem Solutions. f(x) = ln x x. lim. lim. x x = lim. = lim 2

Math 113 Final Exam Practice Problem Solutions. f(x) = ln x x. lim. lim. x x = lim. = lim 2 Math 3 Final Eam Practice Problem Solutions. What are the domain and range of the function f() = ln? Answer: is only defined for, and ln is only defined for >. Hence, the domain of the function is >. Notice

More information

The Derivative of a Function Measuring Rates of Change of a function. Secant line. f(x) f(x 0 ) Average rate of change of with respect to over,

The Derivative of a Function Measuring Rates of Change of a function. Secant line. f(x) f(x 0 ) Average rate of change of with respect to over, The Derivative of a Function Measuring Rates of Change of a function y f(x) f(x 0 ) P Q Secant line x 0 x x Average rate of change of with respect to over, " " " " - Slope of secant line through, and,

More information

BLOCKCHAIN technology, which was firstly coined in

BLOCKCHAIN technology, which was firstly coined in 1 Performance Analysis of the Raft Consensus Algorithm for Private Blockchains Dongyan Huang, Xiaoli Ma, Fellow, IEEE, and Shengli Zhang, Senior Member, IEEE arxiv:1808.01081v1 [cs.ni] 3 Aug 2018 Abstract

More information

Sequential Supervised Learning

Sequential Supervised Learning Sequential Supervised Learning Many Application Problems Require Sequential Learning Part-of of-speech Tagging Information Extraction from the Web Text-to to-speech Mapping Part-of of-speech Tagging Given

More information

In a five-minute period, you get a certain number m of requests. Each needs to be served from one of your n servers.

In a five-minute period, you get a certain number m of requests. Each needs to be served from one of your n servers. Suppose you are a content delivery network. In a five-minute period, you get a certain number m of requests. Each needs to be served from one of your n servers. How to distribute requests to balance the

More information

The first glance at the simulation of the Tangle: discrete model

The first glance at the simulation of the Tangle: discrete model The first glance at the simulation of the Tangle: discrete model B. Kuśmierz IOTA Foundation November 6, 2017 Abstract In this paper we present preliminary results obtained with the computer simulation

More information

Hash tables. Hash tables

Hash tables. Hash tables Dictionary Definition A dictionary is a data-structure that stores a set of elements where each element has a unique key, and supports the following operations: Search(S, k) Return the element whose key

More information

MATH 019: Final Review December 3, 2017

MATH 019: Final Review December 3, 2017 Name: MATH 019: Final Review December 3, 2017 1. Given f(x) = x 5, use the first or second derivative test to complete the following (a) Calculate f (x). If using the second derivative test, calculate

More information

Relative efficiency. Patrick Breheny. October 9. Theoretical framework Application to the two-group problem

Relative efficiency. Patrick Breheny. October 9. Theoretical framework Application to the two-group problem Relative efficiency Patrick Breheny October 9 Patrick Breheny STA 621: Nonparametric Statistics 1/15 Relative efficiency Suppose test 1 requires n 1 observations to obtain a certain power β, and that test

More information

Heiko AYDT PhD (Computer Science) Technology Enthusiast, Software Engineer. Blockchain Technology in a Nutshell

Heiko AYDT PhD (Computer Science) Technology Enthusiast, Software Engineer. Blockchain Technology in a Nutshell Heiko AYDT PhD (Computer Science) Technology Enthusiast, Software Engineer Blockchain Technology in a Nutshell Conceptually, it s a distributed ledger. What is a Blockchain? Example: simple ledger Ledger

More information

Hash tables. Hash tables

Hash tables. Hash tables Dictionary Definition A dictionary is a data-structure that stores a set of elements where each element has a unique key, and supports the following operations: Search(S, k) Return the element whose key

More information

COS433/Math 473: Cryptography. Mark Zhandry Princeton University Spring 2018

COS433/Math 473: Cryptography. Mark Zhandry Princeton University Spring 2018 COS433/Math 473: Cryptography Mark Zhandry Princeton University Spring 2018 Secret Sharing Vault should only open if both Alice and Bob are present Vault should only open if Alice, Bob, and Charlie are

More information

Math 121 Test 3 - Review 1. Use differentials to approximate the following. Compare your answer to that of a calculator

Math 121 Test 3 - Review 1. Use differentials to approximate the following. Compare your answer to that of a calculator Math Test - Review Use differentials to approximate the following. Compare your answer to that of a calculator.. 99.. 8. 6. Consider the graph of the equation f(x) = x x a. Find f (x) and f (x). b. Find

More information

Post s Theorem and Blockchain Languages

Post s Theorem and Blockchain Languages Post s Theorem and Blockchain Languages A Short Course in the Theory of Computation Russell O Connor roconnor@blockstream.com BPASE, January 26, 2017 1 / 35 morpheus (logician): Tell me Neo, what is the

More information

CALCULUS. Berkant Ustaoğlu CRYPTOLOUNGE.NET

CALCULUS. Berkant Ustaoğlu CRYPTOLOUNGE.NET CALCULUS Berkant Ustaoğlu CRYPTOLOUNGE.NET Secant 1 Definition Let f be defined over an interval I containing u. If x u and x I then f (x) f (u) Q = x u is the difference quotient. Also if h 0, such that

More information

Moment-based Availability Prediction for Bike-Sharing Systems

Moment-based Availability Prediction for Bike-Sharing Systems Moment-based Availability Prediction for Bike-Sharing Systems Jane Hillston Joint work with Cheng Feng and Daniël Reijsbergen LFCS, School of Informatics, University of Edinburgh http://www.quanticol.eu

More information

Secret-Key Generation in Many-to-One Networks: An Integrated Game-Theoretic and Information-Theoretic Approach

Secret-Key Generation in Many-to-One Networks: An Integrated Game-Theoretic and Information-Theoretic Approach 1 Secret-Key Generation in Many-to-One Networks: An Integrated Game-Theoretic and Information-Theoretic Approach Rémi A. Chou and Aylin Yener arxiv:1710.04643v1 [cs.it] 12 Oct 2017 remi.chou@wichita.edu

More information

1 Boosting. COS 511: Foundations of Machine Learning. Rob Schapire Lecture # 10 Scribe: John H. White, IV 3/6/2003

1 Boosting. COS 511: Foundations of Machine Learning. Rob Schapire Lecture # 10 Scribe: John H. White, IV 3/6/2003 COS 511: Foundations of Machine Learning Rob Schapire Lecture # 10 Scribe: John H. White, IV 3/6/003 1 Boosting Theorem 1 With probablity 1, f co (H), and θ >0 then Pr D yf (x) 0] Pr S yf (x) θ]+o 1 (m)ln(

More information

Hash tables. Hash tables

Hash tables. Hash tables Basic Probability Theory Two events A, B are independent if Conditional probability: Pr[A B] = Pr[A] Pr[B] Pr[A B] = Pr[A B] Pr[B] The expectation of a (discrete) random variable X is E[X ] = k k Pr[X

More information

3-4 Exponential and Logarithmic Equations

3-4 Exponential and Logarithmic Equations Solve each equation. 39. 7 2x + 1 = 3 x + 3 41. 9 x + 2 = 2 5x 4 47. 2 5x + 6 = 4 2x + 1 49. ASTRONOMY The brightness of two celestial bodies as seen from Earth can be compared by determining the variation

More information

Blockchain Programming Abstractions

Blockchain Programming Abstractions Blockchain Programming Abstractions Algorithmique Distribuée, @LaBRI, Bordeaux March 4 th, 2019 E. Anceaume, A. Del Pozzo, R. Ludinard, M. Potop, S. Tucci-Piergiovanni Historical perspective From the early

More information

LCA Maths Department

LCA Maths Department Name: LCA Maths Department Unit 19 Higher Check-in test 1 Calculator Q1. Complete the table of values for 6 y x x 0.5 1 2 3 4 5 6 y 6 3 1.5 1 Q2. On the grid, draw the graph of 6 y for 0. x x Q3. The graph

More information

GUIDE. mirfieldshow.com. Sponsored by. Orange Design Studio.

GUIDE. mirfieldshow.com. Sponsored by. Orange Design Studio. GUIDE mfhw.m Sp b O D S. Fh F m F C 1 3 5 7 9 b f M MIRFIELD COAT OF ARMS Th m w ff Fb 26, 1935. Th m f h mp f h w m h m. Th p S Jh H, wh pp h Pp h 13h h b f h ph hh. Hv W H Wh h? O, h wm mh, hp h f h.

More information

x C) y = - A) $20000; 14 years B) $28,000; 14 years C) $28,000; 28 years D) $30,000; 15 years

x C) y = - A) $20000; 14 years B) $28,000; 14 years C) $28,000; 28 years D) $30,000; 15 years Dr. Lee - Math 35 - Calculus for Business - Review of 3 - Show Complete Work for Each Problem MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. Find

More information

BC Exam 1 - Part I 28 questions No Calculator Allowed - Solutions C = 2. Which of the following must be true?

BC Exam 1 - Part I 28 questions No Calculator Allowed - Solutions C = 2. Which of the following must be true? BC Exam 1 - Part I 8 questions No Calculator Allowed - Solutions 6x 5 8x 3 1. Find lim x 0 9x 3 6x 5 A. 3 B. 8 9 C. 4 3 D. 8 3 E. nonexistent ( ) f ( 4) f x. Let f be a function such that lim x 4 x 4 I.

More information

The Tangle. Serguei Popov. October 1, Version 1.3

The Tangle. Serguei Popov. October 1, Version 1.3 The Tangle Serguei Popov October, 207. Version.3 Abstract In this paper we analyze the mathematical foundations of IOTA, a cryptocurrency for the Internet-of-Things (IoT) industry. The main feature of

More information

Balls & Bins. Balls into Bins. Revisit Birthday Paradox. Load. SCONE Lab. Put m balls into n bins uniformly at random

Balls & Bins. Balls into Bins. Revisit Birthday Paradox. Load. SCONE Lab. Put m balls into n bins uniformly at random Balls & Bins Put m balls into n bins uniformly at random Seoul National University 1 2 3 n Balls into Bins Name: Chong kwon Kim Same (or similar) problems Birthday paradox Hash table Coupon collection

More information

Lecture: Analysis of Algorithms (CS )

Lecture: Analysis of Algorithms (CS ) Lecture: Analysis of Algorithms (CS483-001) Amarda Shehu Spring 2017 1 Outline of Today s Class 2 Choosing Hash Functions Universal Universality Theorem Constructing a Set of Universal Hash Functions Perfect

More information

Mathematics 1a, Section 4.3 Solutions

Mathematics 1a, Section 4.3 Solutions Mathematics 1a, Section 4.3 Solutions Alexander Ellis November 30, 2004 1. f(8) f(0) 8 0 = 6 4 8 = 1 4 The values of c which satisfy f (c) = 1/4 seem to be about c = 0.8, 3.2, 4.4, and 6.1. 2. a. g is

More information

ELEC 2501 AB. Come to the PASS workshop with your mock exam complete. During the workshop you can work with other students to review your work.

ELEC 2501 AB. Come to the PASS workshop with your mock exam complete. During the workshop you can work with other students to review your work. It is most beneficial to you to write this mock midterm UNDER EXAM CONDITIONS. This means: Complete the midterm in 3 hour(s). Work on your own. Keep your notes and textbook closed. Attempt every question.

More information

Redactable Blockchain. Rewriting History in Bitcoin and Friends

Redactable Blockchain. Rewriting History in Bitcoin and Friends An abridged version of this paper appears in the proceedings of the 2nd IEEE European Symposium on Security and Privacy EuroS&P 2017. This is the full version. Redactable Blockchain or Rewriting History

More information

Non Markovian Queues (contd.)

Non Markovian Queues (contd.) MODULE 7: RENEWAL PROCESSES 29 Lecture 5 Non Markovian Queues (contd) For the case where the service time is constant, V ar(b) = 0, then the P-K formula for M/D/ queue reduces to L s = ρ + ρ 2 2( ρ) where

More information

Bitcoin and Secure Computation with Money. Iddo Bentov

Bitcoin and Secure Computation with Money. Iddo Bentov Bitcoin and Secure Computation with Money Iddo Bentov Bitcoin and Secure Computation with Money Research Thesis Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy

More information

5.2 MULTIPLICATION OF POLYNOMIALS. section. Multiplying Monomials with the Product Rule

5.2 MULTIPLICATION OF POLYNOMIALS. section. Multiplying Monomials with the Product Rule 5.2 Multiplication of Polynomials (5 9) 231 98. Height difference. A red ball and a green ball are simultaneously tossed into the air. The red ball is given an initial velocity of 96 feet per second, and

More information

Examination paper for TMA4265 Stochastic Processes

Examination paper for TMA4265 Stochastic Processes Department of Mathematical Sciences Examination paper for TMA4265 Stochastic Processes Academic contact during examination: Andrea Riebler Phone: 456 89 592 Examination date: December 14th, 2015 Examination

More information

:s ej2mttlm-(iii+j2mlnm )(J21nm/m-lnm/m)

:s ej2mttlm-(iii+j2mlnm )(J21nm/m-lnm/m) BALLS, BINS, AND RANDOM GRAPHS We use the Chernoff bound for the Poisson distribution (Theorem 5.4) to bound this probability, writing the bound as Pr(X 2: x) :s ex-ill-x In(x/m). For x = m + J2m In m,

More information

A Provably Secure Proof-of-Stake Blockchain Protocol

A Provably Secure Proof-of-Stake Blockchain Protocol A Provably Secure Proof-of-Stake Blockchain Protocol Aggelos Kiayias University of Edinburgh akiayias@inf.ed.ac.uk Bernardo David Aarhus University IOHK bernardo.david@iohk.io Ioannis Konstantinou University

More information

DEXON : A Highly Scalable, Decentralized DAG-Based Consensus Algorithm

DEXON : A Highly Scalable, Decentralized DAG-Based Consensus Algorithm DEXON : A Highly Scalable, Decentralized DAG-Based Consensus Algorithm Tai-Yuan Chen, Wei-Ning Huang, Po-Chun Kuo, Hao Chung and Tzu-Wei Chao DEXON Foundation, Taiwan {popo,w,pk,haochung,n}@dexon.org November

More information

Doug Clark The Learning Center 100 Student Success Center learningcenter.missouri.edu Overview

Doug Clark The Learning Center 100 Student Success Center learningcenter.missouri.edu Overview Math 1400 Final Exam Review Saturday, December 9 in Ellis Auditorium 1:00 PM 3:00 PM, Saturday, December 9 Part 1: Derivatives and Applications of Derivatives 3:30 PM 5:30 PM, Saturday, December 9 Part

More information

CS-E4320 Cryptography and Data Security Lecture 11: Key Management, Secret Sharing

CS-E4320 Cryptography and Data Security Lecture 11: Key Management, Secret Sharing Lecture 11: Key Management, Secret Sharing Céline Blondeau Email: celine.blondeau@aalto.fi Department of Computer Science Aalto University, School of Science Key Management Secret Sharing Shamir s Threshold

More information

The tangle. Serguei Popov, for Jinn Labs. December 28, Version 0.5

The tangle. Serguei Popov, for Jinn Labs. December 28, Version 0.5 The tangle Serguei Popov, for Jinn Labs December 28, 205. Version 0.5 Abstract In this paper we analyze the technology used as a backbone of iota a cryptocurrency for Internet-of-Things industry). This

More information

Chapter 13 Problem Solutions Computer Simulation Computer Simulation ma/ V 80. r I (120)(0.026)

Chapter 13 Problem Solutions Computer Simulation Computer Simulation ma/ V 80. r I (120)(0.026) Chapter 3 Pblem lutions 3. Computer Simulation 3. Computer Simulation 3.3 (a) ( Ri) g 0 C m T 0.0 r 80 o MΩ C 0 r 80 o MΩ C 0 0.79 m/ Ri + ( + βn) R 7 (0)(0.0) 7 5. kω 0. BE ( on) 0. C 0.030 m R 0 (0)(0.0)

More information

UNIVERSITY OF LONDON IMPERIAL COLLEGE LONDON

UNIVERSITY OF LONDON IMPERIAL COLLEGE LONDON UNIVERSITY OF LONDON IMPERIAL COLLEGE LONDON BSc and MSci EXAMINATIONS (MATHEMATICS) MAY JUNE 23 This paper is also taken for the relevant examination for the Associateship. M3S4/M4S4 (SOLUTIONS) APPLIED

More information

Hypothesis testing: theory and methods

Hypothesis testing: theory and methods Statistical Methods Warsaw School of Economics November 3, 2017 Statistical hypothesis is the name of any conjecture about unknown parameters of a population distribution. The hypothesis should be verifiable

More information

MATH 108 FALL 2013 FINAL EXAM REVIEW

MATH 108 FALL 2013 FINAL EXAM REVIEW MATH 08 FALL 203 FINAL EXAM REVIEW Definitions and theorems. The following definitions and theorems are fair game for you to have to state on the exam. Definitions: Limit (precise δ-ɛ version; 2.4, Def.

More information

arxiv: v2 [cs.cr] 16 May 2017

arxiv: v2 [cs.cr] 16 May 2017 Optimizing Governed Blockchains for Financial Process Authentications Leif-Nissen Lundbæk, Andrea Callia D Iddio, and Michael Huth Department of Computing, Imperial College London London, SW7 2AZ, United

More information

CS341 info session is on Thu 3/1 5pm in Gates415. CS246: Mining Massive Datasets Jure Leskovec, Stanford University

CS341 info session is on Thu 3/1 5pm in Gates415. CS246: Mining Massive Datasets Jure Leskovec, Stanford University CS341 info session is on Thu 3/1 5pm in Gates415 CS246: Mining Massive Datasets Jure Leskovec, Stanford University http://cs246.stanford.edu 2/28/18 Jure Leskovec, Stanford CS246: Mining Massive Datasets,

More information

Power Laws in ALOHA Systems

Power Laws in ALOHA Systems Power Laws in ALOHA Systems E6083: lecture 8 Prof. Predrag R. Jelenković Dept. of Electrical Engineering Columbia University, NY 10027, USA predrag@ee.columbia.edu March 6, 2007 Jelenković (Columbia University)

More information

Draft. On Limiting Expressions for the Capacity Region of Gaussian Interference Channels. Mojtaba Vaezi and H. Vincent Poor

Draft. On Limiting Expressions for the Capacity Region of Gaussian Interference Channels. Mojtaba Vaezi and H. Vincent Poor Preliminaries Counterexample Better Use On Limiting Expressions for the Capacity Region of Gaussian Interference Channels Mojtaba Vaezi and H. Vincent Poor Department of Electrical Engineering Princeton

More information

Symbol-table problem. Hashing. Direct-access table. Hash functions. CS Spring Symbol table T holding n records: record.

Symbol-table problem. Hashing. Direct-access table. Hash functions. CS Spring Symbol table T holding n records: record. CS 5633 -- Spring 25 Symbol-table problem Hashing Carola Wenk Slides courtesy of Charles Leiserson with small changes by Carola Wenk CS 5633 Analysis of Algorithms 1 Symbol table holding n records: record

More information

Fundamental Algorithms

Fundamental Algorithms Chapter 5: Hash Tables, Winter 2018/19 1 Fundamental Algorithms Chapter 5: Hash Tables Jan Křetínský Winter 2018/19 Chapter 5: Hash Tables, Winter 2018/19 2 Generalised Search Problem Definition (Search

More information

Optimal Pricing Strategies in a Continuum Limit Order Book

Optimal Pricing Strategies in a Continuum Limit Order Book Optimal Pricing Strategies in a Continuum Limit Order Book Alberto Bressan and Giancarlo Facchi Department of Mathematics, Penn State University University Park, Pa 1682, USA e-mails: bressan@mathpsuedu,

More information

Example problem in Birge & Louveaux, Introduction to Stochastic Programming. SLPwR: Farmer Problem page 1 D.L.Bricker

Example problem in Birge & Louveaux, Introduction to Stochastic Programming. SLPwR: Farmer Problem page 1 D.L.Bricker Example problem in Birge & Louveaux, Introduction to Stochastic Programming SLPwR: Farmer Problem page 1 D.L.Bricker A farmer raises wheat, corn, and sugar beets on 500 acres of land. Before the planting

More information

Slope Fields and Differential Equations

Slope Fields and Differential Equations Student Stud Session Slope Fields and Differential Equations Students should be able to: Draw a slope field at a specified number of points b hand. Sketch a solution that passes through a given point on

More information