Skip to content

Instantly share code, notes, and snippets.

View Haseeb-Qureshi's full-sized avatar
🕶️
Being a cool guy

Haseeb Qureshi Haseeb-Qureshi

🕶️
Being a cool guy
View GitHub Profile
@Haseeb-Qureshi
Haseeb-Qureshi / mimblewimble.md
Created February 3, 2019 02:26
Building Mimblewimble/Grin, an implementation for privacy and scalability (SBC19)

Building Mimblewimble/Grin, an implementation for privacy and scalability

Speaker: Quentin Le Sceller

  • MimbleWimble
    • Proposed anonymously in IRC by Tom Elvis Jedusor
    • Private by default
    • Massively prunable
    • Relies solely on elliptic curve cryptography
    • No scripting
  • MW transactions consist of:
@Haseeb-Qureshi
Haseeb-Qureshi / formally_verifying_dapps.md
Created October 11, 2018 22:57
Formally Verifying Dapps from the Ground Up @ CESC

Formally Verifying Dapps from the Ground up

Martin Lundfall, MKR

K Framework

  • Allows you to define a programming language by specifying a:
    • Syntax
      • via BNF notation
    • Configuration
      • state according to your VM, things like stack, memory, storage, etc.
  • Rewrite rules
@Haseeb-Qureshi
Haseeb-Qureshi / application_specific_blockchains.md
Created October 11, 2018 22:26
The Case for Application-Specific Blockchains @ CESC

The Case for Application-Specific Blockchains

Loi Luu, Kyber Network

Why Loi Luu is a badass

  • Designed Elastico, first peer-reviewed sharding protocol for public blockchain
    • Inspired Zilliqa
  • Created Oyente, first open-source smart contract verifier
    • Used by Melonport, Quantstamp, Augur
  • Co-founder at Kyber Network
  • On-chain liquidity protocol for token swaps
@Haseeb-Qureshi
Haseeb-Qureshi / gap_game.md
Created October 11, 2018 21:24
The Gap Game @ CESC

The Gap Game

Itay Tsabary, Technion

Headline result: miners in PoW are incentivized to shut off their hardware occasionally.

Proof of Work

  • Find a value for which a protocol-defined condition holds
    • In Bitcoin, hash(block) < K
  • Memory-less process
  • PoW is very expensive
@Haseeb-Qureshi
Haseeb-Qureshi / arbitrum.md
Created October 11, 2018 19:17
Arbitrum: Scalable private smart contracts @ CESC

Arbitrum: Scalable, Private Smart Contracts

Ed Felten

Ethereum smart contracts

  • Have issues with scalability:
    • Every miner needs to emulate every execution step for the VM
    • Thus, charges gas for those who want to advance state of VMs
      • To compensate miners
    • The complexity of contracts is capped by the global gas limit
  • All contract code and data can only be public
@Haseeb-Qureshi
Haseeb-Qureshi / chainlink.md
Created October 11, 2018 18:48
Secure Decentralized Oracles and Reliably Triggering Smart Contracts @ CESC
@Haseeb-Qureshi
Haseeb-Qureshi / analyzing_china.md
Created October 11, 2018 18:26
Analyzing China's Influence on Bitcoin at CESC

Analyzing China's Influence on Bitcoin

Ben Kaiser, Princeton

Why did we pursue this research?

  • There's been a lot of discussion and fear about China's involvement with Bitcoin. We wanted to provide more rigor to the discussion.
  • Note: will refer to "China" often—primarily referring to a small number of policymaking groups in China who have the power to affect Bitcoin policy.

Why care about China as a threat?

  • China challenges Bitcoin's fundamental security
  • Assumption: no party can amass too much power over the consensus process.
@Haseeb-Qureshi
Haseeb-Qureshi / network_and_consensus.md
Created October 10, 2018 22:19
Scaling Blockchains at the Network and Consensus Layers at CESC

Scaling Blockchains at the Network and Consensus Layers

Emin Gun Sirer

The Promise

  • Blockchain is becoming a big deal.
  • Every finance company is developing a "blockchain strategy."
  • $5B invested in startups, $10B invested in ICOs.
  • Big gap between what's been sold to users, and what current technology is capable of.
  • Doesn't scale to being a payment system.
  • What about a store of value?
@Haseeb-Qureshi
Haseeb-Qureshi / threshold_ecdsa.md
Created October 10, 2018 21:44
Fast Multiparty Threshold ECDSA with Fast Trustless Setup @ CESC

Fast Multiparty Threshold ECDSA with Fast Trustless Setup

Steven Goldfeder

Digital signatures authorize transactions in cryptocurrencies

  • Alice's device, containing her private key, is a single point of failure

Multiparty authentication

  • Instead of having a single device store your key material...
    • You can split it into multiple devices
  • Designed your address as protected by multiple keys
@Haseeb-Qureshi
Haseeb-Qureshi / snargs.md
Created October 10, 2018 19:51
Transaprent Succinct Arguments @ CESC

Transparent Succinct Arguments

Alessandro Chiesa (UC Berkeley, Starkware, Zcash)

What are succinct arguments?

  • Proofs of computational integrity
  • Game between prover and verifier
  • Prover knows an input to a F(x) that would make it return y
  • Prover could trivially prove this by providing x
    • This convinces the verifier for sure!
  • Being able to convince the verifier of a true claim is the property of completeness