Some Insights into Cardano´s Blockchain

Reading Time: 5 minutes

Introduction In this blog post, we present a high-level overview of the paper describing the Ouroboros Proof of Stake protocol implemented in Cardano´s blockchain. After the overview follow some comments about theoretical aspects of the protocol. In general, Proof of Stake (PoS) consensus protocols elect the network nodes responsible to send the next block to the […]

Comparison of PoS projects: Unbiased Leader Election

Reading Time: 7 minutes

Introduction Prior to the Bitcoin blockchain of “Satoshi Nakamoto”, distributed ledger systems were lacking two important properties which are essential for a decentralized digital cash system. The first property which existing distributed ledger systems were missing, was the ability to scale to a network of millions of users. And secondly, systems at the time were […]

Review of AppeCoin: An Alternative Anonymous Cryptocurrency

Reading Time: 6 minutes

AppeCoin, Sergio D. Lerner‘s proposal for an e-cash scheme, is designed for a peer-to-peer network which does not rely on a Trusted Third Party. Like the cryptocurrencies Monero or Zcash, AppeCoin is a protocol which aims to guarantee to its users full privacy. Lerner’s e-cash scheme leverages coin shuffling. Unlike ZeroCoin, where the monetary units […]

zk-SNARKs definition

zk-SNARKs Technically Explained: Basic Principles

Reading Time: 1

The full technical article is available here. Introduction Payment confidentiality is a property for cryptocurrencies which allows the user to hide the sender and receiver, as well as the amount of a transaction in the blockchain. Monero Research Lab invented Ring Confidential Transactions, while Zcash uses a different approach based on recent scientific progress in the field […]

Quantum Resistant Public Key Exchange: The Supersingular Isogenous Diffie-Hellman Protocol

Reading Time: 1

Synopsis of our full article: Though the research on quantum computers is still facing big challenges, there is also some progress in this field. The National Institute of Security and Technology (NIST) recently published a report on Post-Quantum Cryptography which informs about new developments. They believe that it is time to think of quantum-safe primitives, […]

ECDSA Security in Bitcoin and Ethereum: a Research Survey

Reading Time: 1

Elliptic curve cryptography is becoming more and more popular. One of its main supporters is the cryptocurrency system Bitcoin which uses an elliptic curve scheme for their digital signatures. Smaller key size, a more efficient implementation than the RSA system, and a similar level of security make elliptic curve cryptography an interesting alternative to RSA. […]