Released: May 1st, 11:59pm EST
Due: May 8th, 11:59pm EST
Alice, Bob, and Carol want to exchange assets. Which of the following protocols are atomic swaps? Don't worry about who's getting which asset. You only need to make sure that the swap is correct. We strongly recommend you draw out these graphs.
Hashed Time Locks:
HTLC: (hashlock, escrower, redeemer, delta)
Ex:
The hashlock is
Practical Byzantine Fault Tolerance ensures both the liveness and safety assumptions. One such implementation is the "Hot Stuff Protocol," as described in lecture.
NOTE (05/03/23) : In previous versions of the slides, Maurice talked more extensively about the HSP in particular, but in the later slides opted for more general discussions about BFT and consensus.
While most of these questions have the same answer for most/all protocols that hope to be Byzantine Fault Tolerant, we have decided to throw these questions out of grading (or rather, you will get them automatically right regardless of answer) for the sake of fairness.
Suppose the MTAs decide that all HTAs and UTAs should now be paid in Bitcoin, rather than USD. After all, Bitcoin is far superior to USD. Currently, there are only two courses at Brown: cs1951-L and cs1760.
OBJECTIVE
:
cs1951-L and cs1760 should be completely separated, but the MTAs should be able to see information from both courses.
Suppose a third course, cs4000, is added to this schema. The MTAs are good friends with the HTAs of cs4000, so they allow the HTAs of cs4000 to see how much the HTAs of cs1951-L and cs1760 make.
OBJECTIVE
of the MTAs described above?Ethereum blocks are often full of "whale" contracts–-calls that occupy most of the transaction space on a block and computation power of the consensus committee. This is to the detriment of simpler transactions, severely limiting Ethereum's throughput. Algorand solves this problem by diverting "whale" contracts to a contract committee prior to them reaching the consensus committee.
Alice loves two things: movies and Christmas. She recently purchased movie-based advent calendars for the next 20 years. The advent calendar stores an entire HD movie on each December day for Alice to enjoy.
Her friend Bob is a software entrepreneur who recently bought many servers. Since the business hasn't taken off yet, Bob's servers are currently idling.
Alice decides she'll pay Bob a fee to store her digital advent calendars, since it's currently April and she won't be needing any of them for a while (and some not for quite a while). However, she needs to make sure that Bob is actually storing the collection and not just taking her money.
Bob and Alice develop a scheme where Alice can challenge Bob's storage, and he can prove he is storing any movie for any of the advent calendars, without ruining the surprise for Alice!
(day, year, start_time, end_time)
tuple, where start_time
and end_time
define a 5-second clip of the movie. Bob returns the contents of the clip to Alice.(day, year, start_time, end_time)
tuple. The seed of the pseudorandom number generator is publicly known. Alice does not interfere with the software, which sends a request to Bob up to 10 time over the duration of the storage contract. When he receives such a request, he returns the 5-second clip to the software, which validates the clip and tells Alice whether Bob has completed his challenge.With the increasing popularity and adoption of cryptocurrencies, the use of crypto wallets has become more prevalent, raising important questions about the ethical implications of using these wallets for financial transactions. Crypto Wallets are often touted as providing greater privacy and anonymity than traditional financial systems, but this raises concerns about the potential for illegal activities such as money laundering or tax evasion. At the same time, ensuring transparency and accountability in financial transactions is crucial for maintaining trust in the financial system.
To further explore the implications of these issues, here are a few use cases and resources that may be of interest.
Your task after reading these is to give a writing response in less than 200 words about what you think are the ethical and social considerations should be taken into account when designing and implementing crypto wallets to ensure user privacy, and how can these considerations be balanced with the need for security/transparency, regulatory compliance and accountability in financial transactions?