默克尔准备金证明

  • learnerL
  • 更新于 2022-12-10 22:32
  • 阅读 1765

默克尔准备金证明,读者可以使用浏览器翻译,本人写的,我就不机翻了。

what is Merkle Tree Proof of Reserves

After FTX was hacked, many prevailing exchanges announced they would provide Merkle Tree Proof of Reserves to encourage transparency[1]. The Merkle tree proof of reserve is an essential cryptographic tool that is thought to boost the public confidence and transparency of user assets. It utilizes a particular data structure, Hash Tree or Merkle tree, to prove that the centralized exchange has adequate assets to serve its customers.<img src="http://cdn.blog-blockchain.xyz/202211182038173.png" alt="1920px-Hash_Tree.svg" style="zoom: 50%;" />

The above picture from the wiki shows that every leaf node is the hash of a data block, and every non-leaf node is the hash of its child nodes. Hence, all the child nodes uniquely establish and determine the root. When applied to proof of reserves, the leaves are labeled as all the balances of accounts controlled by centralized exchanges. We can quickly validate and monitor whether the accumulated balance alters.

To enhance its confidence, exchanges may entrust third-party auditors to pick a snapshot at random and combine the unique hashed id into a Merkle tree, then consolidate all id information into a root. Users can input their hash pieces to reproduce the process partly to verify their balance by checking the root. An example can be seen at https://proof-of-reserves.trustexplorer.io/clients/kraken/ .

Improved Approaches

Real-time Attestation

Though the mentioned method seems perfect, many flaws must be addressed. For instance, an exchange company may borrow plenty of assets to counterfeit that they are solvent and affordable for any withdrawal before the snapshot. Real-time attestation can mitigate and alleviate the problem.

Real-time attestation, also named real-time assurance, is the process whereby an independent accountant collects sufficient audit evidence and performs substantive procedures to issue on-demand audit reporting to intended users while meeting obligations under the then-prevailing audit standards and professional ethics requirements[2]. It is noteworthy that "real-time" does not mean "continuously" but "collect audit evidence in real-time". An example can be seen at https://real-time-attest.trustexplorer.io/nexo .

Relevant tutorials or passages are rare. OpenTimestamps is a blockchain-agnostic protocol that creates timestamp proofs based on a Certificate Authority (CA) issued by the governing body of a blockchain[3]. The OpenTimestamps protocol can reduce to the procedure that aggregates new node hash into Merkle Tree root when the monitored accounts change. This method does not consume much gas or computation since it operates outside the blockchain.

If you are interested in the protocol mentioned above, the website[4] might be a playground for you.

MPC-Threshold Signature Scheme

Multi-party computation is a subfield of cryptography with the goal of creating methods for parties to jointly compute a function over their inputs while keeping those inputs private[5].

There are three main properties of multi-party computation[6]:

  1. Correctness: the parties involved in multi-party computing initiate computation tasks and perform collaborative computation through an agreed secure multi-party computation function. The output produced by and algorithm is correct ( as expected).

  2. Privacy: each party must ensure that their secret inputs are independent and that no local data is disclosed during the computation.

  3. Decentralization: a decentralized computing model is offered with total equal of each participant, and no privilege for any participant or third party.

MPC-Threshold Signature Scheme divides a key-share to the auditor, who can use it to get anonymous information about total assets controlled by the centralized exchange. However, the auditor can not use it to obtain other sensitive information. Particularly, the entrusted auditor must get another key-share conferred from the exchange to get the privilege of censoring its assets. For instance, only an authorized can aggregate the total assets of all co-managed addresses by both the exchange and the auditor.

Further Reading

reference

欢迎关注个人博客,交流学习:https://www.blog-blockchain.xyz/

点赞 0
收藏 0
分享
本文参与登链社区写作激励计划 ,好文好收益,欢迎正在阅读的你也加入。

0 条评论

请先 登录 后评论
learnerL
learnerL
0xAFA4...27f6
blog: blog-blockchain.xyz