1,471 research outputs found
Securing Smart Contract On The Fly
We present Solythesis, a source to source Solidity compiler which takes a
smart contract code and a user specified invariant as the input and produces an
instrumented contract that rejects all transactions that violate the invariant.
The design of Solythesis is driven by our observation that the consensus
protocol and the storage layer are the primary and the secondary performance
bottlenecks of Ethereum, respectively. Solythesis operates with our novel delta
update and delta check techniques to minimize the overhead caused by the
instrumented storage access statements. Our experimental results validate our
hypothesis that the overhead of runtime validation, which is often too
expensive for other domains, is in fact negligible for smart contracts. The CPU
overhead of Solythesis is only 0.12% on average for our 23 benchmark contracts
CEPchain: A graphical model-driven solution for integrating complex event processing and blockchain
Blockchain provides an immutable distributed ledger for storing transactions. One of the challenges of
blockchain is the particular processing of dynamic queries due to accumulating costs. Complex Event Processing
(CEP) provides efficient and effective support for this in a way, however, that is difficult to integrate with
blockchain. This paper addresses the research challenges of integrating blockchain with CEP. More specifically,
we envision an effective development environment in which (i) event-driven smart contracts are modeled in
a graphical way, which are, in turn, (ii) automatically transformed into complementary code that is deployed
in both a CEP engine and a blockchain network, and then (iii) executed on off-chain CEP applications
which, connected to different data sources and sinks, automatically invoke smart contracts when event pattern
conditions are met. We follow a classic systems engineering approach for defining the concepts of our system,
called CEPchain, which addresses the described requirements. CEPchain was evaluated using a real-world case
study for vaccine delivery, which requires an unbroken cold chain. The results demonstrate that our approach
can be applied without requiring experts on event processing and smart contract languages. Our contribution
simplifies the design of integrated CEP and blockchain functionality by hiding implementation details and
supporting efficient deployment.This work was supported by the Spanish Ministry of Science and
Innovation under the ‘‘Estancias de movilidad en el extranjero José
Castillejo para jóvenes doctores’’ program [grant number
CAS19/00241], and the Spanish Ministry of Science and Innovation
and the European Regional Development Funds under project FAME
[grant number RTI2018-093608-B-C33]. The authors would like to
thank Orlenys López-Pintado for his help with the Caterpillar tool and
his insightful comments. Juan Boubeta-Puig would also like to thank
the Institute for Information Business for their hospitality when visiting them at the Vienna University of Economics and Business, Austria,
where part of this work was developed
Overview of Polkadot and its Design Considerations
In this paper we describe the design components of the heterogenous
multi-chain protocol Polkadot and explain how these components help Polkadot
address some of the existing shortcomings of blockchain technologies. At
present, a vast number of blockchain projects have been introduced and employed
with various features that are not necessarily designed to work with each
other. This makes it difficult for users to utilise a large number of
applications on different blockchain projects. Moreover, with the increase in
number of projects the security that each one is providing individually becomes
weaker. Polkadot aims to provide a scalable and interoperable framework for
multiple chains with pooled security that is achieved by the collection of
components described in this paper
ARPA Whitepaper
We propose a secure computation solution for blockchain networks. The
correctness of computation is verifiable even under malicious majority
condition using information-theoretic Message Authentication Code (MAC), and
the privacy is preserved using Secret-Sharing. With state-of-the-art multiparty
computation protocol and a layer2 solution, our privacy-preserving computation
guarantees data security on blockchain, cryptographically, while reducing the
heavy-lifting computation job to a few nodes. This breakthrough has several
implications on the future of decentralized networks. First, secure computation
can be used to support Private Smart Contracts, where consensus is reached
without exposing the information in the public contract. Second, it enables
data to be shared and used in trustless network, without disclosing the raw
data during data-at-use, where data ownership and data usage is safely
separated. Last but not least, computation and verification processes are
separated, which can be perceived as computational sharding, this effectively
makes the transaction processing speed linear to the number of participating
nodes. Our objective is to deploy our secure computation network as an layer2
solution to any blockchain system. Smart Contracts\cite{smartcontract} will be
used as bridge to link the blockchain and computation networks. Additionally,
they will be used as verifier to ensure that outsourced computation is
completed correctly. In order to achieve this, we first develop a general MPC
network with advanced features, such as: 1) Secure Computation, 2) Off-chain
Computation, 3) Verifiable Computation, and 4)Support dApps' needs like
privacy-preserving data exchange
- …