欢迎来到环境100文库! | 帮助中心 分享价值,成长自我!

环境100文库

换一换
首页 环境100文库 > 资源分类 > PDF文档下载
 

REN币(Republic Protocol)项目白皮书.pdf

  • 资源ID:4141       资源大小:190.45KB        全文页数:15页
  • 资源格式: PDF        下载权限:游客/注册会员/VIP会员    下载费用:10碳币 【人民币10元】
快捷注册下载 游客一键下载
会员登录下载
三方登录下载: 微信开放平台登录 QQ登录   微博登录  
下载资源需要10碳币 【人民币10元】
邮箱/手机:
温馨提示:
支付成功后,系统会自动生成账号(用户名和密码都是您填写的邮箱或者手机号),方便下次登录下载和查询订单;
支付方式: 支付宝    微信支付   
验证码:   换一换

加入VIP,免费下载
 
友情提示
2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,既可以正常下载了。
3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰   

REN币(Republic Protocol)项目白皮书.pdf

pRepublic Protocol A decentralized dark pool exchange providing atomic swaps for Ethereum-based assets and Bitcoin. December 18, 2017 Taiyang Zhang, Loong Wang Abstract The market capitalization and trading volume of cryptocurrencies is growing rapidly every month. With institutional investors arriving into the cryptocurrency market, the development of alternative trading systems is critical for trading large blocks of cryptographic assets while maintaining minimal price slippage and market impact. We introduce Republic, a decentralized open-source dark pool protocol facilitating atomic swaps between cryptocurrency pairs across the Bitcoin and Ethereum blockchains. Trades are placed on a hidden order book and are matched through an engine built on a multi-party computation protocol. This provides order cution without exposing market sensitive ination such as price and volume at a certain position, which would provide an advantage to other traders. Republic removes the need for a trusted intermediary to operate a dark pool and provides crypto-economic incentives through a protocol token for governance; enabling the development of a secure, decentralized, scalable dark pool protocol capable of handling billions in trading volume daily. Introduction 3 Decentralized block order infrastructure 3 Atomic swap 3 Trustless, fair access to dark pools 4 Problems with centralized dark pools 4 How the Republic Protocol works 6 System properties 6 Assumptions 6 Security model 6 Order Matching 8 Incentive layer 9 Fees 9 Bonds 9 Attacks and Defenses 10 Order Reconstruction 10 False Orders 11 Sybil Attacks 11 Protocol token 12 Roadmap 12 References 13 Miscellaneous 14 1Introduction The advent of blockchain technologies has enabled the development of an entirely new class of assets backed by cryptographic verification. Bitcoin BTC and Ethereum ETH are two blockchain-based cryptocurrencies which, as of nbsp;eclipse the aggregate market capitalization of all other cryptocurrencies. In November 2017, the volumes for BTC and ETH trades exceeded USD 181B nbsp;not including over-the-counter and trades cuted on private forums. This statistic, coupled with the announcements of Bitcoin futures markets from CME Group and NASDAQ, signals interest from institutional investors looking to gain exposure to digital cryptographic assets. With institutions and HNWIs looking to deploy vast amounts of wealth into cryptocurrencies, we must develop the underlying infrastructure to support such volumes. At a fundamental level, dark pools are private exchanges where financial assets and instruments are traded and matched by an engine running on a hidden order book. These exchanges are primarily created to serve institutional or HNW retail investors who require a system where significant volumes of assets can be block traded with minimal price slippage. Dark pools are estimated to represent approximately 15 of all trading volume of all US stock trades [6]. Extrapolating this statistic for BTC and ETH volumes, a dark pool for such has the potential to cute USD 27.2B of orders monthly. We introduce the Republic Protocol which facilitates the exchange of Ethereum, ERC20 and Bitcoin cryptocurrencies through a decentralized dark pool. This is enabled through research within subfields of cryptography such as secure multi-party computation, which allow us to develop a matching engine to run on the distributed hidden order book. We facilitate cross-chain trades through atomic swaps and implement proper economic incentives to ensure these trades are cuted thoroughly. Compared to a centralized dark pool or exchange, the Republic Protocol removes the risk of asset theft, confiscation or possibility of interference from a malicious exchange operator. This leads to greater trust between institutional investors placing block orders and dark pool exchanges leveraging the Republic protocol. Additionally, the Republic Protocol is available universally and is highly transparent with regards to how the underlying protocol operates. Elementary Components ●Decentralized hidden order book ○A decentralized, hidden order book. ●Decentralized order matching nbsp;○Matching orders without knowing the underlying details ●Atomic swap infrastructure ○The ability to swap between Bitcoin, Ethereum and Ethereum-based tokens without trust. ●Protocol token ○The REN token Motivation ●Infrastructure for block orders ●Cross-chain trades ●Trustless, equitable access to dark pools ●Centralization risk 2Republic Protocol How the Republic Protocol works The primary technical goal of the Republic Protocol is to enable a decentralized network of nodes to match orders, without knowing anything about the orders. While it might seem like this is impossible, it can be achieved by applying cryptographic techniques that have been thoroughly researched over that last 30 years; modifying them to be suitable for the world of decentralized computation. The Republic Protocol uses the Shamir Secret Sharing Scheme [1] to break down orders into a large number of order fragments, and distributes them throughout the network. Orders cannot be reconstructed unless a majority of the order fragments are recombined. To prevent this from happening, the Republic Protocol defines an Ethereum smart contract called the Registrar that organizes nodes into a network topology that makes it unreasonably difficult for an adversary to acquire the enough of the order fragments to reconstruct an order. As long as traders respect the network topology defined by the Registrar, their orders will be safe. If they fail to do so, only their own orders are at risk of exposure. Using order fragments from two different orders, a node can cooperate with other nodes that hold other order fragments for the same two orders to per a decentralized computation that will determine if the two orders match. The decentralized computation does not expose the order fragments, and pers a random scaling of the final output [2][3]. This prevents nodes from reconstructing the original orders, and prevents them from using the output to infer anything about the orders. A Zero knowledge proof is used to verify the integrity of the computation, without revealing any ination. These proofs are simple and efficient, allowing them to be pered by an Ethereum smart contract called the Judge [3]. After two orders have been matched, an atomic swap is initiated between the two traders over the Republic Swarm Network, a decentralized peer-to-peer network. Using standard asymmetric encryption primitives, the details of the atomic swap are kept secure. System Properties The Republic Protocol provides the following properties 1. The identity of the traders is secure within the Republic Dark Pool. The underlying cryptocurrency that is being traded may provide different limitations for privacy. 2. Traders do not have to remain connected to the network while their orders are being matched. Once an order is placed, nodes will run the matching computation until a match is found, or the order is expired either manually, or by passing a deadline designated by the trader. nbsp;3. An order is secure until it is matched. After being matched, some details of the order are revealed to the matching parties. This is the natural limit of security for an order, since both parties know what they ted, and both parties need to know when a match has occurred. Note that ination disclosed in these cases does not provide any inational advantage to either party. 4. The total liquidity of the Republic Dark Pool cannot be reasonably estimated by any participant. 3Assumptions The Republic Protocol is built on the following assumptions I. There exists a trusted third-party that will always per computations honestly, but has limited computational power i.e. Ethereum. II. Participants act rationally and will not participate if there is no financial incentive to do so, and will attempt to maximize their own profit. In this way, we do not assume that a participant will act honestly if they can maximize their profit by acting maliciously. Adversarial Assumptions The Republic Protocol makes the following adversarial assumptions I. Adversaries cannot corrupt the trusted third-party defined previously by Assumption II. Concretely, an adversary cannot subvert the correctness of computations done by the Ethereum network. All plats built on Ethereum need to make this adversarial assumption. II. Adversaries have limited financial, and computational, powers. Limited financial powers are a reasonable assumption to make in the real world, and computational powers are naturally limited by financial powers. III.Computationally hard problems used to construct cryptographic primitives are sufficiently secure. This assumption is made by all blockchains that utilize any of cryptography, including Bitcoin and Ethereum. Security Model Defining a security model allows us to analyze the security guarantees provided by the Republic Protocol. The Republic Protocol makes use of the nbsp;real vs. ideal paradigm; analyzing the security of a real world decentralized protocol with respect to some non-existent ideal world in which there is a trusted, and incorruptible, third-party that can be used to handle all sensitive ination and per all sensitive computations this is not the same as Ethereum, since all transactions and data on Ethereum is publicly available. The security of the Republic Protocol can be demonstrated by showing that any possible attack in the real world is also possible in the ideal world. Since the ideal world is trivial to define, the real protocol is secure by implication. This approach to security analysis is typical for decentralized computation protocols in which there are active and passive adversaries. The ideal Republic Protocol contains a trusted, and incorruptible, third-party T. Traders their orders to T, and T guarantees to never reveal the details of these orders. T constantly attempts to match orders that have been ted, and when a match is found T ins the respective traders. The traders each their cryptocurrencies to T, and if they both do so, T swaps the cryptocurrencies and gives them back to the traders. This completes the trade. The real Republic Protocol is considered secure if, and only if, all attacks on the real protocol are also possible on the ideal protocol. From the definition of the ideal Republic Protocol it is clear that such an equivalence is sufficient. 4The Republic Protocol is able to guarantee that, unless the majority of nodes in the network are active adversaries, it is as secure as the ideal world protocol. If 50 of nodes are active adversaries, and they are enjoying the attackers best-case scenario, they are able to reconstruct all orders. However, the Republic Protocol ensures that such a best-case scenario is impossible to achieve in the real world. In the typical case, 50 of nodes becoming active adversaries would only allow the adversaries to reconstruct 50 of the orders. A more detailed explanation is given in “Attacks and Defenses”. 5Decentralized Order Matching Order matching is the process through which nodes match orders against each other without being able to observe the details of the order. To achieve this, traders first breakup their order into a set of order fragments. Note that these fragments do not individually represent a fraction of the order’s value, they simply represent the separation of sensitive data regarding the underlying order. On its own an order fragment reveals nothing about the underlying order, but when at least half of the order fragments for an order are combined, the order can be reconstructed see “Attacks and Defenses” for details about protecting against this. Each node pers an order matching computation on order fragments from multiple different orders and combines the results with the results from nodes who are using different fragments. The fragments are constructed in such a way that, after the computations are applied, the resulting fragments can be combined to reveal, not the underlying orders, but the result of the order matching computations for the underlying orders. This has several nice properties. For one, only half of the order fragments are needed to reconstruct an order. Nodes are incentivized to avoid collusion and adversaries have a difficult time subverting this system, see “Attacks and Defenses”. This means that if half of the nodes accidentally die, or leave the network halfway through an order matching computation, the network can still finish the computation. This makes it highly resilient to DDoS attacks, and expected failures. Order fragments are constructed in such a way that the order matching computations can use any function, applied over a polynomial, and can be involve two or more underlying orders. This allows for very flexible order matching computations. Nodes can match orders based on exact price points, partially match orders when only some of an order can be matched due to the currently available liquidity, match triplets or more of orders to increase liquidity e.g. the triplet BTC-to-ETH and ETH-to-REN and REN-to-BTC, where no match can be found with only pairs. Assuming the existence of a decentralized, consensus-based, data stream for National Best Bid and Offer NBBO data, the order matching computations can even involve orders without an explicit price point. Winning and Losing Nodes race to discover order matches. Any match that is found must be registered so that other nodes can see which orders have been closed. The associated traders are notified, and none of the matched orders can be involved in future matches. This is done on the Ethereum network, under Assumption 1. If two orders do not match, they continue to be used in future matching games. If an order cannot be matched before it expires, the associated fee is refunded. The nodes that combine their outputs to register a match are rewarded a fee, to incentivize their honest participation in the order matching game see “Incentive Layer”. This also incentivizes them to match as many orders as quickly as possible, since this correlates to a higher reward over time. The Republic Protocol also includes an Atomic Swapping protocol that is initiated between traders that have had their orders matched. Nodes facilitate passing messages and where possible, setting up a direct P2P connection between traders that cutes the order. Note that traders cannot be bound to cute on the orders, due to the limited way in which blockchains can communicate see “Attacks and Defenses” for ination about placing false orders. However, using trader bonds, traders can be heavily incentivized to faithfully cute orders. nbsp;At no point during order matching, or even after orders have matched, are Republic Protocol nodes capable of revealing the detai/p

注意事项

本文(REN币(Republic Protocol)项目白皮书.pdf)为本站会员(华夏使者)主动上传,环境100文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知环境100文库(点击联系客服),我们立即给予删除!

温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。




关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

copyright@ 2017 环境100文库版权所有
国家工信部备案号:京ICP备16041442号-6

收起
展开