The Math Behind Bitcoin - CoinDesk

Threshold Signature Explained— Bringing Exciting Applications with TSS

Threshold Signature Explained— Bringing Exciting Applications with TSS
— A deep dive into threshold signature without mathematics by ARPA’s cryptographer Dr. Alex Su

https://preview.redd.it/cp0wib2mk0q41.png?width=757&format=png&auto=webp&s=d42056f42fb16041bc512f10f10fed56a16dc279
Threshold signature is a distributed multi-party signature protocol that includes distributed key generation, signature, and verification algorithms.
In recent years, with the rapid development of blockchain technology, signature algorithms have gained widespread attention in both academic research and real-world applications. Its properties like security, practicability, scalability, and decentralization of signature are pored through.
Due to the fact that blockchain and signature are closely connected, the development of signature algorithms and the introduction of new signature paradigms will directly affect the characteristics and efficiency of blockchain networks.
In addition, institutional and personal account key management requirements stimulated by distributed ledgers have also spawned many wallet applications, and this change has also affected traditional enterprises. No matter in the blockchain or traditional financial institutions, the threshold signature scheme can bring security and privacy improvement in various scenarios. As an emerging technology, threshold signatures are still under academic research and discussions, among which there are unverified security risks and practical problems.
This article will start from the technical rationale and discuss about cryptography and blockchain. Then we will compare multi-party computation and threshold signature before discussing the pros and cons of different paradigms of signature. In the end, there will be a list of use cases of threshold signature. So that, the reader may quickly learn about the threshold signature.
I. Cryptography in Daily Life
Before introducing threshold signatures, let’s get a general understanding of cryptography. How does cryptography protect digital information? How to create an identity in the digital world? At the very beginning, people want secure storage and transmission. After one creates a key, he can use symmetric encryption to store secrets. If two people have the same key, they can achieve secure transmission between them. Like, the king encrypts a command and the general decrypts it with the corresponding key.
But when two people do not have a safe channel to use, how can they create a shared key? So, the key exchange protocol came into being. Analogously, if the king issues an order to all the people in the digital world, how can everyone proves that the sentence originated from the king? As such, the digital signature protocol was invented. Both protocols are based on public key cryptography, or asymmetric cryptographic algorithms.


“Tiger Rune” is a troop deployment tool used by ancient emperor’s, made of bronze or gold tokens in the shape of a tiger, split in half, half of which is given to the general and the other half is saved by the emperor. Only when two tiger amulets are combined and used at the same time, will the amulet holder get the right to dispatch troops.
Symmetric and asymmetric encryption constitute the main components of modern cryptography. They both have three fixed parts: key generation, encryption, and decryption. Here, we focus on digital signature protocols. The key generation process generates a pair of associated keys: the public key and the private key. The public key is open to everyone, and the private key represents the identity and is only revealed to the owner. Whoever owns the private key has the identity represented by the key. The encryption algorithm, or signature algorithm, takes the private key as input and generate a signature on a piece of information. The decryption algorithm, or signature verification algorithm, uses public keys to verify the validity of the signature and the correctness of the information.
II. Signature in the Blockchain
Looking back on blockchain, it uses consensus algorithm to construct distributed books, and signature provides identity information for blockchain. All the transaction information on the blockchain is identified by the signature of the transaction initiator. The blockchain can verify the signature according to specific rules to check the transaction validity, all thanks to the immutability and verifiability of the signature.
For cryptography, the blockchain is more than using signature protocol, or that the consensus algorithm based on Proof-of-Work uses a hash function. Blockchain builds an infrastructure layer of consensus and transaction through. On top of that, the novel cryptographic protocols such as secure multi-party computation, zero-knowledge proof, homomorphic encryption thrives. For example, secure multi-party computation, which is naturally adapted to distributed networks, can build secure data transfer and machine learning platforms on the blockchain. The special nature of zero-knowledge proof provides feasibility for verifiable anonymous transactions. The combination of these cutting-edge cryptographic protocols and blockchain technology will drive the development of the digital world in the next decade, leading to secure data sharing, privacy protection, or more applications now unimaginable.
III. Secure Multi-party Computation and Threshold Signature
After introducing how digital signature protocol affects our lives, and how to help the blockchain build identities and record transactions, we will mention secure multi-party computation (MPC), from where we can see how threshold signatures achieve decentralization. For more about MPC, please refer to our previous posts which detailed the technical background and application scenarios.
MPC, by definition, is a secure computation that several participants jointly execute. Security here means that, in one computation, all participants provide their own private input, and can obtain results from the calculation. It is not possible to get any private information entered by other parties. In 1982, when Prof. Yao proposed the concept of MPC, he gave an example called the “Millionaires Problem” — two millionaires who want to know who is richer than the other without telling the true amount of assets. Specifically, the secure multiparty computation would care about the following properties:
  • Privacy: Any participant cannot obtain any private input of other participants, except for information that can be inferred from the computation results.
  • Correctness and verifiability: The computation should ensure correct execution, and the legitimacy and correctness of this process should be verifiable by participants or third parties.
  • Fairness or robustness: All parties involved in the calculation, if not agreed in advance, should be able to obtain the computation results at the same time or cannot obtain the results.
Supposing we use secure multi-party computation to make a digital signature in a general sense, we will proceed as follows:
  • Key generation phase: all future participants will be involved together to do two things: 1) each involved party generates a secret private key; 2) The public key is calculated according to the sequence of private keys.
  • Signature phase: Participants joining in a certain signature use their own private keys as private inputs, and the information to be signed as a public input to perform a joint signature operation to obtain a signature. In this process, the privacy of secure multi-party computing ensures the security of private keys. The correctness and robustness guarantee the unforgeability of the signature and everyone can all get signatures.
  • Verification phase: Use the public key corresponding to the transaction to verify the signature as traditional algorithm. There is no “secret input” during the verification, this means that the verification can be performed without multi-party computation, which will become an advantage of multi-party computation type distributed signature.
The signature protocol constructed on the idea of ​​secure multiparty computing is the threshold signature. It should be noted that we have omitted some details, because secure multiparty computing is actually a collective name for a type of cryptographic protocol. For different security assumptions and threshold settings, there are different construction methods. Therefore, the threshold signatures of different settings will also have distinctive properties, this article will not explain each setting, but the comparative result with other signature schemes will be introduced in the next section.
IV. Single Signature, Multi-Signature and Threshold Signature
Besides the threshold signature, what other methods can we choose?
Bitcoin at the beginning, uses single signature which allocates each account with one private key. The message signed by this key is considered legitimate. Later, in order to avoid single point of failure, or introduce account management by multiple people, Bitcoin provides a multi-signature function. Multi-signature can be simply understood as each account owner signs successively and post all signatures to the chain. Then signatures are verified in order on the chain. When certain conditions are met, the transaction is legitimate. This method achieves a multiple private keys control purpose.
So, what’s the difference between multi-signature and threshold signature?
Several constraints of multi-signature are:
  1. The access structure is not flexible. If an account’s access structure is given, that is, which private keys can complete a legal signature, this structure cannot be adjusted at a later stage. For example, a participant withdraws, or a new involved party needs to change the access structure. If you must change, you need to complete the initial setup process again, which will change the public key and account address as well.
  2. Less efficiency. The first is that the verification on chain consumes power of all nodes, and therefore requires a processing fee. The verification of multiple signatures is equivalent to multiple single signatures. The second is performance. The verification obviously takes more time.
  3. Requirements of smart contract support and algorithm adaptation that varies from chain to chain. Because multi-sig is not naturally supported. Due to the possible vulnerabilities in smart contracts, this support is considered risky.
  4. No anonymity, this is not able to be trivially called disadvantage or advantage, because anonymity is required for specific conditions. Anonymity here means that multi-signature directly exposes all participating signers of the transaction.
Correspondingly, the threshold signature has the following features:
  1. The access structure is flexible. Through an additional multi-party computation, the existing private key sequence can be expanded to assign private keys to new participants. This process will not expose the old and newly generated private key, nor will it change the public key and account address.
  2. It provides more efficiency. For the chain, the signature generated by the threshold signature is not different from a single signature, which means the following improvements : a) The verification is the same as the single signature, and needs no additional fee; b ) the information of the signer is invisible, because for other nodes, the information is decrypted with the same public key; c) No smart contract on chain is needed to provide additional support.
In addition to the above discussion, there is a distributed signature scheme supported by Shamir secret sharing. Secret sharing algorithm has a long history which is used to slice information storage and perform error correction information. From the underlying algorithm of secure computation to the error correction of the disc. This technology has always played an important role, but the main problem is that when used in a signature protocol, Shamir secret sharing needs to recover the master private key.
As for multiple signatures or threshold signature, the master private key has never been reconstructed, even if it is in memory or cache. this short-term reconstruction is not tolerable for vital accounts.
V. Limitations
Just like other secure multi-party computation protocols, the introduction of other participants makes security model different with traditional point-to-point encrypted transmission. The problem of conspiracy and malicious participants were not taken into account in algorithms before. The behavior of physical entities cannot be restricted, and perpetrators are introduced into participating groups.
Therefore, multi-party cryptographic protocols cannot obtain the security strength as before. Effort is needed to develop threshold signature applications, integrate existing infrastructure, and test the true strength of threshold signature scheme.
VI. Scenarios
1. Key Management
The use of threshold signature in key management system can achieve a more flexible administration, such as ARPA’s enterprise key management API. One can use the access structure to design authorization pattern for users with different priorities. In addition, for the entry of new entities, the threshold signature can quickly refresh the key. This operation can also be performed periodically to level up the difficulty of hacking multiple private keys at the same time. Finally, for the verifier, the threshold signature is not different from the traditional signature, so it is compatible with old equipments and reduces the update cost. ARPA enterprise key management modules already support Elliptic Curve Digital Signature Scheme secp256k1 and ed25519 parameters. In the future, it will be compatible with more parameters.

https://preview.redd.it/c27zuuhdl0q41.png?width=757&format=png&auto=webp&s=26d46e871dadbbd4e3bea74d840e0198dec8eb1c
2. Crypto Wallet
Wallets based on threshold signature are more secure because the private key doesn’t need to be rebuilt. Also, without all signatures posted publicly, anonymity can be achieved. Compared to the multi-signature, threshold signature needs less transaction fees. Similar to key management applications, the administration of digital asset accounts can also be more flexible. Furthermore, threshold signature wallet can support various blockchains that do not natively support multi-signature, which reduces the risk of smart contracts bugs.

Conclusion

This article describes why people need the threshold signature, and what inspiring properties it may bring. One can see that threshold signature has higher security, more flexible control, more efficient verification process. In fact, different signature technologies have different application scenarios, such as aggregate signatures not mentioned in the article, and BLS-based multi-signature. At the same time, readers are also welcomed to read more about secure multi-party computation. Secure computation is the holy grail of cryptographic protocols. It can accomplish much more than the application of threshold signatures. In the near future, secure computation will solve more specific application questions in the digital world.

About Author

Dr. Alex Su works for ARPA as the cryptography researcher. He got his Bachelor’s degree in Electronic Engineering and Ph.D. in Cryptography from Tsinghua University. Dr. Su’s research interests include multi-party computation and post-quantum cryptography implementation and acceleration.

About ARPA

ARPA is committed to providing secure data transfer solutions based on cryptographic operations for businesses and individuals.
The ARPA secure multi-party computing network can be used as a protocol layer to implement privacy computing capabilities for public chains, and it enables developers to build efficient, secure, and data-protected business applications on private smart contracts. Enterprise and personal data can, therefore, be analyzed securely on the ARPA computing network without fear of exposing the data to any third party.
ARPA’s multi-party computing technology supports secure data markets, precision marketing, credit score calculations, and even the safe realization of personal data.
ARPA’s core team is international, with PhDs in cryptography from Tsinghua University, experienced systems engineers from Google, Uber, Amazon, Huawei and Mitsubishi, blockchain experts from the University of Tokyo, AIG, and the World Bank. We also have hired data scientists from CircleUp, as well as financial and data professionals from Fosun and Fidelity Investments.
For more information about ARPA, or to join our team, please contact us at [email protected].
Learn about ARPA’s recent official news:
Telegram (English): https://t.me/arpa_community
Telegram (Việt Nam): https://t.me/ARPAVietnam
Telegram (Russian): https://t.me/arpa_community_ru
Telegram (Indonesian): https://t.me/Arpa_Indonesia
Telegram (Thai): https://t.me/Arpa_Thai
Telegram (Philippines):https://t.me/ARPA_Philippines
Telegram (Turkish): https://t.me/Arpa_Turkey
Korean Chats: https://open.kakao.com/o/giExbhmb (Kakao) & https://t.me/arpakoreanofficial (Telegram, new)
Medium: https://medium.com/@arpa
Twitter: u/arpaofficial
Reddit: https://www.reddit.com/arpachain/
Facebook: https://www.facebook.com/ARPA-317434982266680/54
submitted by arpaofficial to u/arpaofficial [link] [comments]

Headlines for week 06 of 2019

Listen to the Headlines for week 06

​Show notes for Security Endeavors Headlines for Week 5 of 2019
InfoSec Week 6, 2019 (link to original Malgregator.com posting)
The Zurich American Insurance Company says to Mondelez, a maker of consumer packaged goods, that the NotPetya ransomware attack was considered an act of cyber war and therefore not covered by their policy. According to Mondelez, its cyber insurance policy with Zurich specifically covered “all risks of physical loss or damage” and “all risk of physical loss or damage to electronic data, programs or software” due to “the malicious introduction of a machine code or instruction.” One would think that the language in the cyber insurance policy was specifically designed to be broad enough to protect Mondelez in the event of any kind of cyber attack or hack. And NotPetya would seem to fit the definition included in the cyber insurance policy – it was a bit of malicious code that effectively prevented Mondelez from getting its systems back up and running unless it paid out a hefty Bitcoin ransom to hackers. Originally, Zurich indicated that it might pay $10 million, or about 10 percent of the overall claim. But then Zurich stated that it wouldn't pay any of the claim by invoking a special “cyber war” clause. According to Zurich, it is not responsible for any payment of the claim if NotPetya was actually “a hostile or warlike action in time of peace or war.” According to Zurich, the NotPetya cyber attack originated with Russian hackers working directly with the Russian government to destabilize the Ukraine. This is what Zurich believes constitutes "cyber war." https://ridethelightning.senseient.com/2019/01/insurance-company-says-notpetya-is-an-act-of-war-refuses-to-pay.html
Reuters reports that hackers working on behalf of Chinese intelligence breached the network of Norwegian software firm Visma to steal secrets from its clients. According to investigators at cyber security firm Recorded Future, the attack was part of what Western countries said in December is a global hacking campaign by China’s Ministry of State Security to steal intellectual property and corporate secrets. Visma took the decision to talk publicly about the breach to raise industry awareness about the hacking campaign, which is known as Cloudhopper and targets technology service and software providers in order reach their clients.
https://www.reuters.com/article/us-china-cyber-norway-visma/china-hacked-norways-visma-to-steal-client-secrets-investigators-idUSKCN1PV141
A new vulnerability has been discovered in the upcoming 5G cellular mobile communications protocol. Researchers have described this new flaw as more severe than any of the previous vulnerabilities that affected the 3G and 4G standards. Further, besides 5G, this new vulnerability also impacts the older 3G and 4G protocols, providing surveillance tech vendors with a new flaw they can abuse to create next-gen IMSI-catchers that work across all modern telephony protocols.
This new vulnerability has been detailed in a research paper named "New Privacy Threat on 3G, 4G, and Upcoming5G AKA Protocols," published last year.
According to researchers, the vulnerability impacts AKA, which stands for Authentication and Key Agreement, a protocol that provides authentication between a user's phone and the cellular networks.The AKA protocol works by negotiating and establishing keys for encrypting the communications between a phone and the cellular network. Current IMSI-catcher devices target vulnerabilities in this protocol to downgrade AKA to a weaker state that allows the device to intercept mobile phone traffic metadata and track the location of mobile phones. The AKA version designed for the 5G protocol --also known as 5G-AKA-- was specifically designed to thwart IMSI-catchers, featuring a stronger authentication negotiation system But the vulnerability discovered last year allows surveillance tech vendors to create new models of IMSI-catchers hardware that, instead of intercepting mobile traffic metadata, will use this new vulnerability to reveal details about a user's mobile activity. This could include the number of sent and received texts and calls, allowing IMSI-catcher operators to create distinct profiles for each smartphone holder. https://www.zdnet.com/article/new-security-flaw-impacts-5g-4g-and-3g-telephony-protocols/
The Debian Project is recommending the upgrade of golang-1.8 packages after a vulnerability was discovered in the implementation of the P-521 and P-384 elliptic curves, which could result in denial of service and in some cases key recovery. In addition this update fixes two vulnerabilities in the “go get” command, which could result in the execution of arbitrary shell commands. https://www.debian.org/security/2019/dsa-4380
It is possible to trick user’s of the Evolution email application into trusting a phished mail via adding a forged UID to a OpenPGP key that has a previously trusted UID. It's because Evolution extrapolates the trust of one of OpenPGP key UIDs into the key itself. The attack is based on using the deficiency of Evolution UI when handling new identifiers on previously trusted keys to convince the user to trust a phishing attempt. More details about how the flaw works, along with examples are included in the article, which is linked in the show notes. Let’s take a minute to cover a bit of background on Trust Models and how validating identities work in OpenPGP and GnuPG:
The commonly used OpenPGP trust models are UID-oriented. That is, they are based on establishing validity of individual UIDs associated with a particular key rather than the key as a whole. For example, in the Web-of-Trust model individuals certify the validity of UIDs they explicitly verified.
Any new UID added to the key is appropriately initially untrusted. This is understandable since the key holder is capable of adding arbitrary UIDs to the key, and there is no guarantee that new UID will not actually be an attempt at forging somebody else's identity. OpenPGP signatures do not provide any connection between the signature and the UID of the sender. While technically the signature packet permits specifying UID, it is used only to facilitate finding the key, and is not guaranteed to be meaningful. Instead, only the signing key can be derived from the signature in cryptographically proven way.
GnuPG (as of version 2.2.12) does not provide any method of associating the apparent UID against the signature. In other words, from e-mail's From header. Instead, only the signature itself is passed to GnuPG and its apparent trust is extrapolated from validity of different UIDs on the key. Another way to say this is that the signature is considered to be made with a trusted key if at least one of the UIDs has been verified. https://dev.gentoo.org/~mgorny/articles/evolution-uid-trust-extrapolation.html
If you’re up for some heavy reading about manipulation and deceit being perpetrated by cyber criminals, it may be worth checking out a piece from buzzfeednews. It tells a woeful and dark tale that does not have a happy ending. A small excerpt reads: “As the tools of online identity curation proliferate and grow more sophisticated, so do the avenues for deception. Everyone’s familiar with the little lies — a touch-up on Instagram or a stolen idea on Twitter. But what about the big ones? Whom could you defraud, trick, ruin, by presenting false information, or information falsely gained? An infinite number of individual claims to truth presents itself. How can you ever know, really know, that any piece of information you see on a screen is true? Some will find this disorienting, terrifying, paralyzing. Others will feel at home in it. Islam and Woody existed purely in this new world of lies and manufactured reality, where nothing is as it seems.” https://www.buzzfeednews.com/article/josephbernstein/tomi-masters-down-the-rabbit-hole-i-go
Security researchers were assaulted by a casino technology vendor Atrient after responsibly disclosed critical vulnerabilities to them. Following a serious vulnerability disclosure affecting casinos globally, an executive of one casino technology vendor Atrient has allegedly assaulted the security researcher who disclosed the vulnerability at the ICE conference in London. The article covers the story of a vulnerability disclosure gone bad, one involving the FBI, a vendor with a global customer base of casinos and a severe security vulnerability which has gone unresolved for four months without being properly addressed. https://www.secjuice.com/security-researcher-assaulted-ice-atrient/
Article 13, the new European Union copyright law is back and it got worse, not better. In the Franco-German deal, Article 13 would apply to all for-profit platforms. Upload filters must be installed by everyone except those services which fit all three of the following extremely narrow criteria:
Available to the public for less than 3 years Annual turnover below €10 million Fewer than 5 million unique monthly visitors Countless apps and sites that do not meet all these criteria would need to install upload filters, burdening their users and operators, even when copyright infringement is not at all currently a problem for them. https://juliareda.eu/2019/02/article-13-worse/
Researchers from Google Project Zero evaluated Apple's implementation of Pointer Authentication on the A12 SoC used in the iPhone XS. There are bypasses possible, but the conclusion says it is still a worthwhile exploitation mitigation technique. Among the most exciting security features introduced with ARMv8.3-A is Pointer Authentication, a feature where the upper bits of a pointer are used to store a Pointer Authentication Code (PAC), which is essentially a cryptographic signature on the pointer value and some additional context. Special instructions have been introduced to add an authentication code to a pointer and to verify an authenticated pointer's PAC and restore the original pointer value. This gives the system a way to make cryptographically strong guarantees about the likelihood that certain pointers have been tampered with by attackers, which offers the possibility of greatly improving application security. There’s a Qualcomm white paper which explains how ARMv8.3 Pointer Authentication was designed to provide some protection even against attackers with arbitrary memory read or arbitrary memory write capabilities. It's important to understand the limitations of the design under the attack model the author describes: a kernel attacker who already has read/write and is looking to execute arbitrary code by forging PACs on kernel pointers.
Looking at the specification, the author identifies three potential weaknesses in the design when protecting against kernel attackers with read/write access: reading the PAC keys from memory, signing kernel pointers in userspace, and signing A-key pointers using the B-key (or vice versa). The full article discusses each in turn. https://googleprojectzero.blogspot.com/2019/02/examining-pointer-authentication-on.html
There is a dangerous, remote code execution flaw in the LibreOffice and OpenOffice software. While in the past there have been well documented instances where opening a document would result in the executing of malicious code in paid office suites. This time LibreOffice and Apache’s OpenOffice are the susceptible suites. The attack relies on exploiting a directory traversal flaw, identified as CVE-2018-16858, to automatically execute a specific python library bundled within the software using a hidden onmouseover event. To exploit this vulnerability, the researcher created an ODT file with a white-colored hyperlink (so it can't be seen) that has an "onmouseover" event to trick victims into executing a locally available python file on their system when placing their mouse anywhere on the invisible hyperlink. According to the researcher, the python file, named "pydoc.py," that comes included with the LibreOffice's own Python interpreter accepts arbitrary commands in one of its parameters and execute them through the system's command line or console. https://thehackernews.com/2019/02/hacking-libreoffice-openoffice.html
Nadim Kobeissi is discontinuing his secure online chat Cryptocat. The service began in 2011 as an experiment in making secure messaging more accessible. In the eight ensuing years, Cryptocat served hundreds of thousands of users and developed a great story to tell. The former maintainer explains on the project’s website that other life events have come up and there’s no longer available time to maintain things. The coder says that Cryptocat users deserve a maintained secure messenger, recommends Wire.
The Cryptocat source code is still published on GitHub under the GPL version 3 license and has put the crypto.cat domain name up for sale, and thanks the users for the support during Cryptocat's lifetime. https://twitter.com/i/web/status/1092712064634753024
Malware For Humans is a conversation-led, independent documentary about fake news, big data, electoral interference, and hybrid warfare. Presented by James Patrick, a retired police officer, intelligence analyst, and writer, Malware For Humans covers the Brexit and Trump votes, the Cambridge Analytica scandal, Russian hybrid warfare, and disinformation or fake news campaigns.
Malware For Humans explains a complex assault on democracies in plain language, from hacking computers to hacking the human mind, and highlights the hypocrisy of the structure of intelligence agencies, warfare contractors, and the media in doing so. Based on two years of extensive research on and offline, Malware For Humans brings the world of electoral interference into the light and shows that we are going to be vulnerable for the long term in a borderless, online frontier. A complete audio companion is available as a separate podcast, which can be found on iTunes and Spotify as part of The Fall series and is available for free, without advertisements. https://www.byline.com/column/67/article/2412
Security Endeavors Headlines is produced by SciaticNerd & Security Endeavors with the hope that it provides value to the wider security community. Some sources adapted for on-air readability.
Special thanks to our friends at malgregator dot com, who allow us to use their compiled headlines to contribute to show’s content. Visit them at Malgregator.com.
Additional supporting sources are also be included in our show notes
More information about the podcast is available at SecurityEndeavors.com/SEHL
Thanks for listening and we'll see you next week!
submitted by SecurityEndeavors to SEHL [link] [comments]

Cocos-BCX:The decentralized gaming application & crypto assets creation platform

Cocos-BCX:The decentralized gaming application & crypto assets creation platform

I. Project Overview

Cocos-BCX is a platform used for the development, operation, management and transfer of decentralized applications and in-application assets on the blockchain ecosystem. The platform mainly includes three function modules:
(1)The application development framework that supports multiple operating systems and various blockchain environments.
(2)Completely scripted, componentized and data-driven application development tools;
(3)An improved blockchain system, which is oriented to high performance applications and based on graphene technology framework, and its related functional components.
Cocos-BCX can allow developers to perform programming, debugging, and publishing of decentralized applications oriented to the blockchain environment, and hybrid architecture applications. Meanwhile, the platform integrates the distributed user account system, wallet and digital asset circulation platform based on the blockchain, which can realize the permanent saving and cross-chain use of in-application assets.

II. Project evaluation

(一) Market analysis

1. Market conditions | 8 points

The organizing pattern of productivity dominated by governments in some areas or industrial domains is apt to change in the context of bottlenecks existing for global scientific and technological progress, rising resource consumption, an aging population, and intensified geopolitical conflicts. In particular, in 2008, when Nakamot published his thesis "Bitcoin: A Peer-to-Peer Electronic Cash System", discussions on blockchain and digital currency have gradually extended from technological aspects to economic, social and political, and other fields. The general public have begun to pay close attention to the impact of blockchain on social development as well as the role of digital currency in the world economy. Based on the decentralized characteristics of the blockchain and the vibrant vitality of the digital economy, the general public has enough confidence to predict that the decentralized "digital assets" will be a sweeping trend in the future, and will derive new business models and social values.
At the same time, in the development process of decentralized applications of different types, the game industry enjoys unique development advantages, because the game's production mode is the most sophisticated, enjoys the highest degree in terms of commercialization, and is one of the scenarios with the most profound foundation in terms of developers and users.
u Analysis: The game field has a huge room for development, which is highly consistent with the characteristics of the blockchain, and accords with the future development tendency of the digital economy.
The digital asset economy model carried by the project through the blockchain technology will assetize the content produced by the developer, enable the developer to continue reaping benefits during the use, management and transfer of his assets, and provide him with a convenient, decentralized game distribution channel; meanwhile, it helps players to transform the data formed by time and energy as well as the props they obtain as a result of their consumption into the assets that can be safely stored and circulated, offering players the right to manage and commercialize them.

2. Competition | 8 points

Since the last century till now, owing to the sustained efforts and promotion by a variety of IT technology game enterprises, the national and even global online game market is developing by leaps and bounds. If there is no systematic risks, such as policy regulation, vicious incidents and other factors, there will be no smooth and endless development momentum unless something unexpected happens. However, an objective analysis reveals that the current online game market is still dominated by IT technology companies, and even in a controlled and monopolized development, which, of course, also brings substantial profits, such as Tencent, Blizzard Tech.
u Analysis: It can be predicted that the Cocos-BCX project will hardly have any direct competitors in the strict sense for the time being, but will encounter a marginal pressure competitive environment from two dimensions. In summary, the classical IT game companies at home and abroad are massive in size and have obvious capital advantages. However, the Cocos-BCX project has an advanced philosophy and cutting edge technology, and thereby enjoys first-mover advantages for a breakthrough; The blockchain game project of the same business is currently marked by wide participation and generic applicability. But in comparison, the Cocos-BCX game industry has such advantages as a salient background, special project orientation and sophisticated development in technical modules, and therefore has greater development potential.

(二) Token Status

1. Token situation | 6 points

(1) Basic situation of Token
Token name: COCOS
Total tokens in circulation: 100 billion
Consensus mechanism: DPOS
(2) Token usage and allocation
Part I 82%: Cocos-BCX is used for the platform community construction in various ways, including but not limited to the witness' block reward, incentives for platform ecological developers, global community construction, marketing and promotion, industry alliances, eco-investment, research, financial and legal compliance. The use of this part of Cocos-BCX includes swapping by means of the consensus work contributions, free gifts, gifts in exchange for service, and gifts in exchange for other tokens, etc.
Part II, 18%: Cocos-BCX is intended as incentives for the sponsoring team of the project. The incentive part will set up a locking mechanism, which will be issued and unlocked one-third at the end of each year after Token generation, and the issuance will be completed within three years.

https://preview.redd.it/sahtuohmtb821.jpg?width=684&format=pjpg&auto=webp&s=324cbde0e5911f219649d8a64470dc3d70ecdb7f
u Analysis: The use of Token is mainly divided into two parts, among which, 82% is used for project development and construction. The remaining 18%, which has a locked position mechanism, is intended for team incentive and construction. The use design is rather rational, but the team part is slightly higher. Given that the industry is in the initial stage of development, it is of great importance to seize the first opportunity and acquire early traffic users. It is suggested that the proportion of Token used by the team be reduced slightly, which is more conducive to the long-term development of the project. It should be noted that the original holding distribution of Token has not been queried via the official channel, while this link for the conventional blockchain project are basically disclosed. Meanwhile, from the standpoint of ordinary investors, Token’s original holding ratio is also one of the important parameters for its investment.

2. Ecological cycle | 8 points

(1)The Token (COCOS) positioning of the platform: circulation media and governance proof in eco-economic activities
COCOS not only serves as a value exchange carrier and community participation proof for Cocox-BCX, but its orientation as a basic pricing Token is likely to play a critical role in the digital asset ecosystem. With the continuous development of the industry, a large quantity of decentralized digital assets will exist in multiple blockchain ecosystems according to different standards in the future, and the value existing in asset pricing media transcending the chain ecology will be infinitely magnified.
, which is specifically manifested in that developers and users can evaluate, compare, trade and manage digital assets of different chain ecosystems, worldview content, and technical standards based on COCOS. Meanwhile, as a primary and basic pricing medium, COCOS is positioned to become the necessary conditions for the blockchain industry to develop and trade financial products and derivatives of digital assets in the future.
(2)Basic use model of Token (COCOS)
Ø Value exchange medium within the platform ecosystem;
Ø Entrusted consensus equity share representative of the Cocos-BCX public blockchain;
Ø The reference and basis for the measurement of the participation in and contribution to the platform community.
(3)How to obtain Token (COCOS)
Ø Value creation: It includes the contribution of the behavior of creating digital assets, that is, developing games, making props, etc.
Ø Platform contribution reward: Users who contribute to the Cocos-BCX community is entitled to COCOS;
Ø Market transaction: Selling the prop assets obtained in the game to get COCOS;
Ø Behavioral incentives: Various effective behaviors within the Cocos-BCX platform, community and platform games will be converted into COCOS
according to a certain contribution degree.
u Analysis: The use model, scenario application, acquisition method, market orientation, etc. for the Token ecosystem design are all well deliberated, to be verified by the market.
The ecosystem design of the Token project not only takes the macroscopic use model and scenario application, but also gives a detailed description of the acquisition method. Another point that must be pointed out is that it has a clear market orientation and future prospect as soon as the design begins, therefore, in general the Token ecosystem design is well-considered and far-sighted. However, for the volatile blockchain market, the crux depends on whether the ecological design philosophy can keep pace with the times, which is very essential. In a word, in the face of massive uncertainties, it needs to be finally verified by the market.

(三) Team member

1. Founder | 8 points


https://preview.redd.it/6xhhabgntb821.jpg?width=200&format=pjpg&auto=webp&s=f8b038f4b4016724adf160c180c1eab3fb86aa1b
Haozhi Chen
China's renowned Internet serial entrepreneur, and has successively led and participated in the creation of Joyo.com, Xcar.com.cn, and cdn.yeeyan.org since 1999, and founded Chukong Technology in 2009. Chukong is a leading game development and distribution enterprise in China and a major maintainer and supporter of the Cocos-BCX global open source game engine and developer community.

https://preview.redd.it/t5siu9cotb821.jpg?width=200&format=pjpg&auto=webp&s=262123cfe0f40dbc87177d62ff57bd9e270a12cf
Xiaolong Yang
With over 14 years of experience in technology entrepreneurship and investment, he once co-founded China's leading entertainment social networking company. As an investor, he once worked for China's leading private equity fund, during which period, he led and participated in investment projects totalling over 1 billion US dollars, and realized the exit of some projects at home and abroad. His interests and expertise mainly concentrate on information technology of the global primary market and secondary market in the later stage, and macro multiple asset category investment, and has a profound understanding of the financial market mechanism and asset pricing. He is also an investment partner in China's major technology investment fund and provides counselling for Chinese and American hedge funds, venture capital funds and large enterprises.
u Analysis: Chen Haozhi, as a founder, has rich experience in the game industry, and enjoys widespread networking and abundant resources in the industry as being one of the early Internet entrepreneurs; Another founder, Yang Xiaolong, has a strong experience in technology venture capital investment, and has the expertise for global investment layout. On the whole, two co-founders have a prominent advantage in overall industry background and integrating resources.

2. Founding team | 8 points


https://preview.redd.it/15ytlu4ptb821.png?width=877&format=png&auto=webp&s=26839b00d4921c925431e8f0be337c9828e0eb49
Kevin Yin: An early contributor of CocosChina community, NOI winner, and ACM guest. A senior developer of blockchain, and having years of experience in compilation and distributed computing. An investor of the blockchain technology.
Jane Jin: Responsible for CocosChina community, the "Aipuworks" incubator, etc., and an expert of the Techincal Committee for Blockchain, China Software Industry Association. Bachelor of Economics, Zhejiang Gongshang University, and mini-EMBA of Tsinghua University. He once served important functions in "Fortune Global 500" including Lucent, Nortel, NSN, Nokia, Intel and other multinational companies in the marketing, sales, executive and developer relationship domain.
James Jeon: Responsible for the business development strategy and implementation of the project's South Korean section. From 2012 to 2015, he served as CEO of Gurum Company, a South Korean subsidiary of Chukong Technologies, earning an annual revenue of over $30 million from the scratch for the South Korean company and leading the South Korean subsidiary in going public successfully.
Frederick Lim: Responsible for the business development strategy and implementation of the project's South Korean section. From 2014 to 2015, he served as co-CEO of Gurum Company, and was once the director of the Strategic Investment Department of Hyundai Group, responsible for investment in Internet, communication, telecommunications and other fields. He is a doctor of Engineering Technology, Sungkyunkwan University, South Korea.
Hirokuni Fujita: originally head of the Japanese subsidiary of Chukong Technologies. He graduated from Graduate School of Arts and Sciences, The University of Tokyo, majoring in Interdisciplinary Cultural Studies.
Jason: preacher of the Cocos-BCX community and meanwhile, senior manager of the Cocos 2d-x global community. He started to program on the Commodore-64 computer when he was 8. In addition to developing the community, he was keen on studying mathematics, finance, C++ and improving his Chinese proficiency.
Qinzhou Wang: Since entering the game industry in 2009, he has worked in the brand market in ZOL. Com. CN, Howell Expo, host of ChinaJoy, and is responsible for the brand market in Chukong Technologies.
u Analysis: The special technological talent construction of the team technicians needs to be further strengthened. At present, there is a blockchain technician. The game background and the advantages of the international architecture building enjoy prominent advantages, and there are sufficient team members on the strategic level and in the aspect of ecological construction. It is worth mentioning that team building is stable, and there is a high level of consensus among team members, which is conducive to the robust development of the project.
One member of the founding team has experience in the blockchain project development, that is, Chief Technical Officer, who is a senior blockchain developer. He has many years of experience in compiling and distributed computing, and is also a technology investor of blockchain.
In the early stage, owing to the demand of the game industry in the Japanese and Korean markets, Japanese and Korean market leaders were specially arranged in the early team structure of Chukong Technologies. In particular, due to the prosperity and popularity of the game industry in the Korean market, two co-leaders were specially arranged for the Korea market, responsible for strategic and investment issues respectively.
Consultant Team | 8 points

https://preview.redd.it/7d9dp2wptb821.jpg?width=558&format=pjpg&auto=webp&s=39fd3b0aa342403493df250d99c09472c48e0c72
Zhe Wang: Founder of the Cocos engine, and CEO of Xiamen Yaji Software Co., Ltd. He graduated from Department of Electronics, Nanjing University, and later studied a postgraduate program at Department of Management Science, Xiamen University. He created the Cocos engine in 2011, which currently has 1.1 million registered developers worldwide and 300,000 monthly active developers in over 200 countries and regions in the world. The Cocos engine has arrested the attention of platform vendors at home and abroad, and has established a long-term cooperative partnership with Microsoft, Google, ARM, Intel, Qualcomm, Samsung, Huawei and Tencent, etc.
Edith Yeung: One of some "Silicon Valley's Must Meet" investors as covered in Inc magazine. She is the head of 500 Startups, Silicon Valley's famous venture capital company and incubator in Greater China, and meanwhile, manages a Mobile Collective fund worth tens of millions of dollars. She has invested in over 40 mobile Internet, VR, AR and AI start-ups, including Hooked (App store's No. 1 reading App), DayDayCook (one of Asia's largest food communities), Fleksy (acquired by Pinterest), Human (acquired by Mapbox), AISense and so on.
u Analysis: The consultant team has obvious advantages in technological achievements, rich experience in technology innovation investment and incubation experience for startups.
The consultant team consists of a Maker-oriented technical talent and two venture capital managers with a senior venture capital background, among whom, Wang Zhe, technical consultant, graduated from Department of Electronics, Nanjing University and CEO of Xiamen Yaji Software. Wang is the founder of Cocos-BCX engine. At present, the Cocos engine has 1.1 million registered developers and 300,000 monthly active developers in over 200 countries and regions worldwide.

(四) Tech Analysis

1. Tech highlights | 9 points

(1) Smart contract system which can be updated iteratively: The smart contract system, represented by Ethereum, is not subject to modification once its definition is published, making it difficult to meet the volatile demands of market. Therefore, an iterative smart contract system is designed to address this pain spot.
(2) Prop circulation platform: Unlike conventional game transaction platform, Cocos-BCX's decentralized digital asset circulation platform does not have intermediary agencies. Players can complete the transfer and purchase of non-homogeneous assets, including "game gold coins" and prop assets acquired in the game on the prop circulation platform. In the whole process of transfer, the platform will adopt smart contract for automatic matching to help users complete the transfer process more efficiently.
(3) Game interactive operation environment:
Based on the judgment of the operation environment characteristics of blockchain games in the future, Cocos-BCX has designed a set of integrated operation environment that accommodates various types of APPs, as well as the supporting interoperability interface. Combined with COCOS Creator, it simplifies the process of docking game programs and blockchain, making intra-chain interaction transparent to developers, and allowing conventional game developers to develop or migrate blockchain game without a threshold.
(4) Mapping gateway that supports multi-chain and asset riveting:
Cocos-BCX provides a set of mapping gateways used for the automatic mapping of game gold coins and props. Under the unified value measurement system, it realizes the smooth transition of different in-chain game content and different platform content. The content that can be used for mapping includes game gold coins, game equipment data, etc.
(5) Transaction authentication mechanism that prevents BP/developers from cheating:
BP, as the core of transaction processing and communication of the whole network, can know the processing result of the latest transaction prior to general nodes. Therefore, BP enjoys a priority for information with timeliness or confidentiality
, as compared with general nodes, so it has a cheating potential in terms of
information acquisition. To address the drawbacks of this technical link, five modular confrontation mechanisms has been specially designed to hold the likelihood of BP/developer cheating at bay.
(6) Economies Principle Design of Cocos-BCX:
The Cocos-BCX platform carries the game assets value created by developers by providing a complete set of functional components including the underlying public blockchain, digital property management, and exchanges. Its technology and governance structure design, based on the graphene standard, has the economic attributes corresponding to the DPoS consensus mechanism.
u Analysis: There are a multiplicity of technical highlights in that the overall technology construction shows characteristics such as rigid logic and prominent modularity, and various technical solutions and mechanisms with a strong pertinence have been put forward.
Based on the market pain spots of the game industry, and combined with the development opportunities of blockchain technology, the Cocos-BCX project puts forward a vision system to create consistence between the content producer and consumer in the digital world. In view of the initial intention of the project and the relatively profound background of the game industry, the overall technical structure design of the project is highly targeted and has a strong logic, which can be described as closely connected with each other. Based on the large technical framework system, each technical link and organization also has a strong sense of target and logical gene, and on this basis, many modular and modified technical programs or mechanisms have been proposed. However, it is worth noting that the synergy of a series of highlight technologies remains to be verified and examined. Meanwhile, attention should also be paid to the practicability and rationality.

2. Impossible Triangle | 7 points

(1) Decentralization
Ø Low fork risk: Cocos-BCX uses the DPoS consensus mechanism, which does not require miners to use mining machines for mining, and thereby it can effectively avoid the impact of centralized computing on the entire basechain, which in turn reduces a low fork risk. Under the DPoS mechanism, if a witness wants to fork by voting, it is necessary to guarantee that over one third of the witnesses violate this mechanism at the same time.
Ø Improved DPOS consensus mechanism: The consensus layer of the Cocos-BCX test chain adopts the DPoS consensus algorithm. The advantage characteristics of the improved edition DPOS are as follows: all active witnesses have the same block predefined probability as the witnesses' predefined algorithm in the DPoS consensus algorithm, which ensures that the block probability of all witnesses is consistent with the block reward.
Ø Lightweight node: In Cocos-BCX design, lightweight node is essentially an environment with chain interoperability. Unlike the whole node, the lightweight node does not require to synchronize the whole network data. Instead, it needs the contract information and environment data required for synchronous running. This design can greatly reduce the data volume and synchronization time required for node synchronization, enabling the in-chain game terminal software to have a capacity which is actually used and a plausible time cost.
(2) Security
Ø Player autonomy and asset security: Because of the open and transparent characteristics of the blockchain network, the digital asset information obtained by players in the game can be viewed through the blockchain.
Ø Guarantee by modern cryptography: Modern cryptography is a technology based on mathematics. Currently, it has been widely used in many industries in the Internet domain. Common symmetric encryption technologies include AES encryption used for WiFi, and asymmetric encryption algorithms (public and private key cryptography) RSA, ECC, etc., among which, ECC (Elliptic Curves Cryptography) is an encryption algorithm commonly used in the blockchain field.
Ø A transaction verification mechanism that prevents BP/developers from cheating: BP enjoys a priority compared with general nodes, so it has the probability to cheat in terms of information acquisition. Therefore, the BCX program has designed a set of transaction execution, messaging, and operating mechanisms to address the possible links that allow cheating by BP and developers.
Ø Iterative updated smart contract system: It can provide logical updating and loophole repair for the in-chain game smart contract, thus ensuring the security and timeliness of the smart contract.
(3) Expandability:
Ø Strong expandability of the top-level design of the project
The expandability of Cocos-BCX is powerful, which is specifically shown in a decentralized game production and an overall solution to the game economy operation established by means of the game engine, development environment and Cocos-BCX game chain.

https://preview.redd.it/xm5n7esrtb821.jpg?width=1207&format=pjpg&auto=webp&s=c3daa5d913560c0e8143c0635374596566bdbfc9
A business ecosystem is constructed based on the above overall solution, with the purpose of connecting the global game ecosystem. The main ecological links include developers, users, creative content, key ecological links and blockchain system, etc.

https://preview.redd.it/h4ssn41ttb821.jpg?width=1276&format=pjpg&auto=webp&s=ca6244d17b9745ce41b5be235f75a39f8a8af051
Ø Expanded design of specific technologies and mechanisms
  1. Multi-platform game integration running environment: This platform is mainly characterized by four features, consistent and perfect chain interoperability interface, downward transparent accepting mode, encapsulated atomic operation and multi-platform compatibility.
  2. Interactive interface of blockchain:
Cocos-BCX provides a chain-interactive development environment so that developers can easily interact with the chain through this set of environment. Meanwhile, its blockchain interactive development environment provides development components compatible with multiple working platforms, including SDK for the Android and iOS system, javascript libraries for front-terminal web applications, and python and PHP libraries for back-terminal applications.
u Analysis: The expandability of the project's "impossible triangle" shows the most prominently, and the decentralized attribute is the weakest, whose security is between the two. However, the project takes the three into consideration in terms of the technical mechanism and program function. Yet, the focus is different.
The project interprets the “impossible triangle” by means of thinking and design that focus on technical aspects and key issues.
The security level first guarantees the assets security and freedom of the ecosystem participants, and meanwhile ensures the rationality and security of the overall framework design, and finally takes its system updating and safe recovery into consideration mainly by means of player autonomy, modern cryptography and transaction verification mechanism that prevents BP/developers from cheating.

3. Development difficulty | 8 points

According to the summary of the project white paper, the blockchain game can be generally divided into four developmental stages.
(1)Using the homogeneous assets for the settlement of the game "gold coins";
(2)Free conversion of the game "gold coins" and props;
(3)In-chain operation of critical rules;
(4)Overall in-chain operation of the game
The game in-chain operation is the final form of the industry. Based on the above summary, Cocos-BCX proposes the future development prospect, mainly represented in seven aspects:
(1)Players having a lightweight full-node environment;
(2)The service stack operating in the blockchain environment;
(3)The game engine as one of the node infrastructures;
(4)Providing a joint development/debugging environment including engine, visual IDE, and chain network interactive interface;
(5)a set of asynchronous consensus tasks between nodes to ensure the trustworthiness of the engine environment. This consensus may be based on the discrimination of feature code of
the engine critical function's target code
(6) The game code (contract) is executed by the secure virtual machine controlled by the engine, and the key numerical calculation of the contract may adopt
the “Trusted Execution Environment” scheme, which is executed independently of the main part of the contract;
(7) The key process of the contract is witnessed by the adjacent or related nodes (like players in a copy).
u Analysis: The project covers a multiplicity of technical characteristics and functional mechanisms. The overall development is rather difficult. However, it is highly practicable in terms of performance.
At the initial stage of the project, four stages of blockchain game development were analyzed. After combing, the highest prospect was proposed, implicating to create a complete multi-platform game running environment, which can provide game developers with convenience in developing blockchain games and a perfect ecological environment to the maximum, while bringing game users a brand-new gaming experience and a game form that transcends the previous ones.
Based on the initial project prospect, numerous technical goals and functional modules are listed, indicating that the technical support for the project vision is rather effective. However, as public blockchain of the industry application basis, it encompasses various technical applications and functional modules. Comparatively speaking, the development difficulty is rather big. Meanwhile, as released by the white paper, the theoretical throughput of the Cocos-BCX test chain can reach up to 100,000 tps. The actual throughput is approximate to 3,500 tps, and the block time is 3 seconds, that is, the information broadcast across the entire network is completed once every 3 seconds. It can be seen from the project technical performance data that it has a relatively strong realistic significance. Therefore, on the whole, the project puts forward a sizeable technical challenge, and in the meantime has a reasonable practicability, therefore, it is worthwhile to look forward to!

(五) Project status

1. Product | 7 points

(1)System-level products
Ø The application development framework that supports multiple operating systems and various blockchain environments.
Ø Completely scripted, componentized and data-driven application development tools;
Ø An improved blockchain system, which is oriented to high performance applications and based on graphene technology framework, and its related functional components.
Ø Supporting non-homogeneous wallets;
Ø A blockchain browser that supports the contract event subscription;
Ø Supporting the third-party non-homogeneous asset exchanges;
Ø Supporting the blockchain game developed by a third party;
Ø Cross-chain asset acceptance gateway.
(2) Functional products
Ø De-intermediary assets (prop) operation interface;
Ø Paradigms of non-homogeneous assets circulation platform;
Ø Supporting player autonomy and blacksmith shop mechanism;
Ø Visual IDE (including visual editing of the game program and contract);
Ø Complete wallet, user system and blockchain browser;
Ø Smart contract system that allows iterative updating.
u Analysis: According to the information released on the official website of the project, the timeline shows that the Cocos-BCX main chain has started the closed beta test in the third quarter of 2018. Based on the obvious characteristics of the project technology module, Cocos-BCX has launched two series of projects, namely, system-level and function-level products, including development frameworks, blacksmith shop mechanisms tailored to various operations and multiple environment.

2. Code updating | 2 points

u Analysis: It is learned from official communication that the source code of the project has not been made public for the purpose of keeping the project's trade secret confidential. It is planned that the project will be open source in the future after the ecological and system products become gradually stabilized.

3. Completion status | 8 points

u Analysis: The project has formulated an overall development plan and recent work tasks, and at the same time it has demonstrated its strong vitality through weekly report, timeline and development broadcast.
According to the official channel inquiry, the project has formulated the Roadmap for the 2018 key milestone quarter and the recent detailed work task breakdown plan, and the project has a very complete display system featuring three major development progresses:
(1) Weekly reporting system
(2) Project timeline
(3) Development broadcast
Through the Roadmap+ work breakdown + 3 major system model, the project's development trajectory and dynamics have been display in a basically three-dimensional, spatial, meticulous and detailed manner, and in the meantime, the powerful execution and self-vitality of the project have been also displayed.

(六) Institution enabling (Investors)

1. Cooperative institutions | 9 points


https://preview.redd.it/w7g2hjxttb821.jpg?width=1036&format=pjpg&auto=webp&s=da35e0e9e453271300bdd8e6574e8c3a61e70225
u Analysis: Cocos-BCX has a wide margin for cooperation, and its cooperation institutions are not only numerous, but also mainly of leading and quality enterprises in the industry.
The cooperative institutions include HelloEOS, NEO, NEBULAS (chain), Loom, IMEOS.ONE, Kingsoft Cloud and SlowMist Technology, etc.
NEO is one of the earliest blockchain projects in China. It was officially created in 2014 and was open sourced in real time in Github in June 2015. Since its establishment, the NEO team has experienced ups and downs of the blockchain industry. This project can be said to be a veteran project in the industry. NEO combines with a series of technologies, such as point-to-point network, Byzantine fault tolerance, digital certificate, smart contract, superconducting transactions, and cross-chain interoperability protocols, to perform rapid, efficient, secure, and legitimate smart management of assets.

2. Investment institutions | 9 points


https://preview.redd.it/s2td22eutb821.jpg?width=1273&format=pjpg&auto=webp&s=ffcd40c67fcd16739b16207e364b91e98180ffd8
u Analysis: There are numerous investment institutions, many of which are Class I institutions, with a strong institutional strength.
Investment institutions include NGC, Binance, INB Capital, Dfund, 500 Startups, BlockVC, OK Blockchain Capital, Yisu Capital, Xiong'an Capital, ONTology, FreeS FUND, NODE Capital, Consensus Capital, Hash Capital, NEO Capital, Ticker Capital , ContractVC, Junwu Capital, Candy Capital, Hofan VC, BMETA Capital, BYTE Capital, Nimble Capital, InsurFun, BA Capital, Consensus Lab, TOKENMANIA, Byzantium Capital, etc.
The rest investment institutions are also well-known. For example, DFUND was founded by Zhao Dong, a well-known figure in the digital currency domain in July 2017. Yisu Capital is engaged in the early investment and project cooperation, focusing on blockchain technology and big data intelligence analysis, and other domains.

(七) Drawing attention | 6 points


https://preview.redd.it/fa3k060vtb821.png?width=605&format=png&auto=webp&s=ca3b6a4b185c81bbafb5bccb571a43b9bbaba148
Project content description

https://preview.redd.it/y6w1f3hvtb821.png?width=796&format=png&auto=webp&s=8f3b2116d63a77f839a1e18787dd986c34a573a3
u Analysis: The game user and developer group are highly active, and meanwhile the publicity of the media and news client are enhanced. The overall heat and operation and maintenance thinking are well-balanced. However, the current community operation link is relatively weak, and requires improvement in the follow-up.
Presently, the number of community fans is small. Therefore, the operation link of project content is rather weak. However, media communication and news broadcasting, two links of propaganda and promotion efforts, are quite effective, basically realizing a timely and real-time posting of the latest developments of the project. Although the media and news client are widely disseminated, their social interaction is relatively weak. The social platform has its own communication limitations. However, it is highly involved in interaction.

(VIII) Social Response | 7.78

User A | Point: 7.9
Comment: From the perspective of production mode and commercialization, this game is the most sophisticated. So I think this project has a very extensive application scenario, especially for developers and users.
User B | Point: 7.0
Comment: Currently, it seems that the game industry is greatly influenced by macro policies. Tencent's recent performance is a case in point. However, the project orientation is quite good.
User C | Point: 8.0
Comment: The technical advantages of the project are particularly prominent, and it also seizes the development opportunities of the blockchain. However, ultimately it needs to undergo the test of the market.
User D | Point: 9.0
Comment: First of all, COCOS has a large number of developers, solid underlying technology and reliable team work, which is worth looking forward to. Of course, great "undertaking" calls for enormous input, especially in technology. The way is arduous and long. Come on.
User E | Point: 7.0
Comment:
As a game practitioner, I would talk something about Cocos-BCX project: when the concept of blockchain game is put forward for everyone to consider, at this stage, it is no doubt that the dimension (type) of the game is developed from the perspective of "inheritance" and "tracing its very origin". If the Cocos-BCX project can be applied by game developers in terms of "development kit", is easy to learn and use, and allows the mobile game developers to shift to the development of blockchain games without a threshold, then the game dimensions and users can be further expanded. In a word, phenomenal games of blockchain games need the support of Cocos-BCX and the efforts of developers, both of which are indispensable. It is hoped that the team will make great efforts in development and publicity. "Coin friends" may not need to know how the game is developed, but they will certainly care about its future space. Such evaluation can only be called prospects and expectations. It remains to be determined whether the project adopts capital operation or the mode as solid as the old engine of COCOS till the project is landed.

III. Evaluation Summary

The project orientation is accurate, and the team has a strong lineup. It merits pointing out that its technical strength and model architecture design are particularly prominent, and there are an array of investment and cooperation institutions with strong strength. However, at present, the code has not been open sourced and the community operation and maintenance is deficient. The information disclosure of the Token link is not particularly perfect, and individual investors may care much about it. The Roadmap of the project development is all too simple. These are the deficiencies of the project development at the current moment.
submitted by ONETOPGlobal to u/ONETOPGlobal [link] [comments]

QRL Versus IOTA - An Overview of Quantum Resistant Cryptography

QRL and IOTA (iota) are quantum resistant cryptocurrencies - to my knowledge, they are the only such cryptocurrencies. I wanted to learn some more about the differences between the two and I thought it would be helpful to share my research with the QRL community.
Disclaimer: I own an amount of both QRL and IOTA.
QRL
QRL uses hash-based XMSS digital signatures and Winternitz OTS+ digital signatures for security. The QRL protocol is a custom POS algorithm which uses iterative hash-chains for randomness. (Source)
And we're in the weeds already. Here are some definitions:
Hash-based cryptography: This is the digital security which is implemented by a cryptocurrency. The different types of digital security are defined as digital signature schemes. There are many different signatures out there: Bitcoin uses Secure Hash Algorithm 256-bit (SHA-256); Ethereum uses Ethash; QRL uses XMSS - see below.
XMSS: A hash-based signature scheme (eXtended Merkle Signature Scheme). XMSS is designed specifically as an efficient post-quantum signature scheme. XMSS is PQ-CRYPTO recommended. ("PQ-Crypto is a forum for researchers to present results and exchange ideas on the topic of cryptography in an era with large-scale quantum computers." I won't go much more into this, although it appears to be a solid endorsement of the digital signatures chosen by QRL.)
Winternitz OTS+ (W-OTS+): A hash-based signature scheme, or more specifically a Winternitz type one-time signature scheme (W-OTS). Here is an extract from the QRL Whitepaper explaining the difference between OTS and OTS+ signatures:
Buchmann introduced a variant of the original Winternitz OTS by changing the iterating one-way function to instead be applied to a random number, x, repeatedly but this time parameterised by a key, k, which is generated from the previous iteration of fk(x). This is strongly unforgeable under adaptive chosen message attacks when using a pseudo random function (PRF) and a security proof can be computed for given parameters. It eliminates the need for a collision resistant hash function family by performing a random walk through the function instead of simple iteration. Huelsing introduced a further variant W-OTS+, enabling creation of smaller signatures for equivalent bit security through the addition of a bitmask XOR in the iterative chaining function. Another difference between W-OTS(2011 variant)/ W-OTS+ and W-OTS is that the message is parsed log2(w) bits at a time rather than w, decreasing hash function iterations but increasing keys and signature sizes.
Future improvements planned for QRL include second layer protocol enhancements: an Ephemeral messaging layer which uses lattice-based crypto to enable completely private, and cryptographically authenticated end-end post-quantum secure data channels. As these are not yet implemented, I will not dig into them.
IOTA
IOTA uses a custom hash-based signature called Kerl and implements Winternitz digital signatures for security. Kerl is written in ternary/trinary, as compared to the traditional binary.
Kerl is the recently upgraded version of Curl, which was upgraded due to the discovery of a security flaw. (The details of this flaw are best left for another post. I discovered this news while researching this post; I will assume Kerl solves the vulnerability issues of Curl for the purposes of this post.)
The official explanation of the quantum proof nature of IOTA is as follows (emphasis mine):
IOTA uses hash-based signatures (https://www.imperialviolet.org/2013/07/18/hashsig.html) instead of elliptic curve cryptography (ECC). Not only is hash-based signatures a lot faster than ECC, but it also greatly simplifies the overall protocol (signing and verification). What actually makes IOTA quantum-secure is the fact that we use Winternitz signatures. IOTA's ternary hash function is called Curl.
And here is the explanation direct from the IOTA Whitepaper:
4.3 Resistance to quantum computations
It is known that a (today still hypothetical) sufficiently large quantum computer can be very efficient for handling problems where only way to solve it is to guess answers repeatedly and check them. The process of finding a nonce in order to generate a Bitcoin block is a good example of such a problem. As of today, in average one must check around 268 nonces to find a suitable hash that allows to generate a block. It is known (see e.g. [13]) that a quantum computer would need Θ(√N) operations to solve a problem of the above sort that needs Θ(N) operations on a classical computer. Therefore, a quantum computer would be around √2 68 = 234 ≈ 17 billion times more efficient in Bitcoin mining than a classical one. Also, it is worth noting that if blockchain does not increase its difficulty in response to increased hashing power, that would lead to increased rate of orphaned blocks.
Observe that, for the same reason, the “large weight” attack described above would also be much more efficient on a quantum computer. However, capping the weight from above (as suggested in Section 4) would effectively fence off a quantum computer attack as well, due to the following reason. In iota, the number of nonces that one needs to check in order to find a suitable hash for issuing a transaction is not so huge, it is only around 38. The gain of efficiency for an “ideal” quantum computer would be therefore of order 34 = 81, which is already quite acceptable (also, remember that Θ(√N) could easily mean 10√N or so). Also, the algorithm is such that the time to find a nonce is not much larger than the time needed for other tasks necessary to issue a transaction, and the latter part is much more resistant against quantum computing.
Therefore, the above discussion suggests that the tangle provides a much better protection against an adversary with a quantum computer compared to the (Bitcoin) blockchain.
Conclusion
QRL and IOTA both use Winternitz-based digital signatures. Based on my understanding, these two are both reliably quantum resistant. However, QRL's Winternitz OTS+ has the edge on IOTA due to the introduction of additional randomized variables in the generation of the digital signatures. Whether this additional level of randomization is significant, I cannot say.
One takeaway from this research was the conclusion that both QRL and IOTA may be quantum resistant, but they do not appear to be quantum proof. However, like many elements of this analysis, that may not prove to be a significant distinction. In the event of a quantum attack on Bitcoin or another non-quantum resistant cryptocurrency, I would imagine the distinction disappears entirely (in the short term).
Please chime in if you see any errors or are able to shed light on any of the discussed topics. A healthy, critical discussion is good for QRL, for IOTA, and for all other cryptocurrencies.
References (some of these have been linked to already):
https://hacked.com/quantum-resistant-ledger-readies-battle-quantum-computing-hires-testers-seeks-feedback/ (This reference was particularly useful)
https://cryptopotato.com/qrl-taking-quantum-computers/
https://cs.stackexchange.com/questions/586/could-quantum-computing-eventually-be-used-to-make-modern-day-hashing-trivial-to/751#751
https://huelsing.files.wordpress.com/2013/05/wotsspr.pdf
The QRL Whitepaper
The IOTA Whitepaper
Previous comparison discussion: https://www.reddit.com/QRL/comments/6ywi2q/how_does_qrl_compare_to_iota/
submitted by HoagiesFortune to QRL [link] [comments]

Compact Multi-Signatures for Smaller Blockchains

Cryptology ePrint Archive: Report 2018/483
Date: 2018-06-10
Author(s): Dan Boneh, Manu Drijvers, Gregory Neven

Link to Paper


Abstract
We construct new multi-signature schemes that provide new functionality. Our schemes are designed to reduce the size of the Bitcoin blockchain, but are useful in many other settings where multi-signatures are needed. All our constructions support both signature compression and public-key aggregation. Hence, to verify that a number of parties signed a common message m, the verifier only needs a short multi-signature, a short aggregation of their public keys, and the message m. We give new constructions that are derived from Schnorr signatures and from BLS signatures. Our constructions are in the plain public key model, meaning that users do not need to prove knowledge or possession of their secret key.
In addition, we construct the first short accountable-subgroup multi-signature (ASM) scheme. An ASM scheme enables any subset S of a set of n parties to sign a message m so that a valid signature discloses which subset generated the signature (hence the subset S is accountable for signing m). We construct the first ASM scheme where signature size is only O(k) bits over the description of S, where k is the security parameter. Similarly, the aggregate public key is only O(k) bits, independent of n. The signing process is non-interactive. Our ASM scheme is very practical and well suited for compressing the data needed to spend funds from a t-of-n Multisig Bitcoin address, for any (polynomial size) t and n.

References
  1. Ahn, J.H., Green, M., Hohenberger, S.: Synchronized aggregate signatures: new definitions, constructions and applications. In: Al-Shaer, E., Keromytis, A.D., Shmatikov, V. (eds.) ACM CCS 10: 17th Conference on Computer and Communications Security. pp. 473–484. ACM Press, Chicago, Illinois, USA (Oct 4–8, 2010)
  2. Andresen, G.: m-of-n standard transactions. Bitcoin improvement proposal (BIP) 0011 (2011)
  3. Bagherzandi, A., Cheon, J.H., Jarecki, S.: Multisignatures secure under the discrete logarithm assumption and a generalized forking lemma. In: Ning, P., Syverson, P.F., Jha, S. (eds.) ACM CCS 08: 15th Conference on Computer and Communications Security. pp. 449–458. ACM Press, Alexandria, Virginia, USA (Oct 27–31, 2008)
  4. Bagherzandi, A., Jarecki, S.: Multisignatures using proofs of secret key possession, as secure as the Diffie-Hellman problem. In: Ostrovsky, R., Prisco, R.D., Visconti, I. (eds.) SCN 08: 6th International Conference on Security in Communication Networks. Lecture Notes in Computer Science, vol. 5229, pp. 218–235. Springer, Heidelberg, Germany, Amalfi, Italy (Sep 10–12, 2008)
  5. Bansarkhani, R.E., Sturm, J.: An efficient lattice-based multisignature scheme with applications to bitcoins. In: Foresti, S., Persiano, G. (eds.) CANS 16: 15th International Conference on Cryptology and Network Security. Lecture Notes in Computer Science, vol. 10052, pp. 140–155. Springer, Heidelberg, Germany, Milan, Italy (Nov 14–16, 2016)
  6. Barreto, P.S.L.M., Lynn, B., Scott, M.: On the selection of pairing-friendly groups. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003: 10th Annual International Workshop on Selected Areas in Cryptography. Lecture Notes in Computer Science, vol. 3006, pp. 17–25. Springer, Heidelberg, Germany, Ottawa, Ontario, Canada (Aug 14–15, 2004)
  7. Bellare, M., Namprempre, C., Neven, G.: Unrestricted aggregate signatures. In: Arge, L., Cachin, C., Jurdzinski, T., Tarlecki, A. (eds.) ICALP 2007: 34th International Colloquium on Automata, Languages and Programming. Lecture Notes in Computer Science, vol. 4596, pp. 411–422. Springer, Heidelberg, Germany, Wroclaw, Poland (Jul 9–13, 2007)
  8. Bellare, M., Namprempre, C., Pointcheval, D., Semanko, M.: The one-more-RSAinversion problems and the security of Chaum’s blind signature scheme. Journal of Cryptology 16(3), 185–215 (Jun 2003)
  9. Bellare, M., Neven, G.: Multi-signatures in the plain public-key model and a general forking lemma. In: Juels, A., Wright, R.N., Vimercati, S. (eds.) ACM CCS 06: 13th Conference on Computer and Communications Security. pp. 390–399. ACM Press, Alexandria, Virginia, USA (Oct 30 – Nov 3, 2006)
  10. Boldyreva, A.: Threshold signatures, multisignatures and blind signatures based on the gap-Diffie-Hellman-group signature scheme. In: Desmedt, Y. (ed.) PKC 2003: 6th International Workshop on Theory and Practice in Public Key Cryptography. Lecture Notes in Computer Science, vol. 2567, pp. 31–46. Springer, Heidelberg, Germany, Miami, FL, USA (Jan 6–8, 2003)
  11. Boldyreva, A., Gentry, C., O’Neill, A., Yum, D.H.: Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing. In: Ning, P., di Vimercati, S.D.C., Syverson, P.F. (eds.) ACM CCS 07: 14th Conference on Computer and Communications Security. pp. 276–285. ACM Press, Alexandria, Virginia, USA (Oct 28–31, 2007)
  12. Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Biham, E. (ed.) Advances in Cryptology – EUROCRYPT 2003. Lecture Notes in Computer Science, vol. 2656, pp. 416–432. Springer, Heidelberg, Germany, Warsaw, Poland (May 4–8, 2003)
  13. Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: Boyd, C. (ed.) Advances in Cryptology – ASIACRYPT 2001. Lecture Notes in Computer Science, vol. 2248, pp. 514–532. Springer, Heidelberg, Germany, Gold Coast, Australia (Dec 9–13, 2001)
  14. Brogle, K., Goldberg, S., Reyzin, L.: Sequential aggregate signatures with lazy verification from trapdoor permutations - (extended abstract). In: Wang, X., Sako, K. (eds.) Advances in Cryptology – ASIACRYPT 2012. Lecture Notes in Computer Science, vol. 7658, pp. 644–662. Springer, Heidelberg, Germany, Beijing, China (Dec 2–6, 2012)
  15. Budroni, A., Pintore, F.: Efficient hash maps to G2 on BLS curves. Cryptology ePrint Archive, Report 2017/419 (2017), http://eprint.iacr.org/2017/419
  16. Burmester, M., Desmedt, Y., Doi, H., Mambo, M., Okamoto, E., Tada, M., Yoshifuji, Y.: A structured ElGamal-type multisignature scheme. In: Imai, H., Zheng, Y. (eds.) PKC 2000: 3rd International Workshop on Theory and Practice in Public Key Cryptography. Lecture Notes in Computer Science, vol. 1751, pp. 466–483. Springer, Heidelberg, Germany, Melbourne, Victoria, Australia (Jan 18–20, 2000)
  17. Castelluccia, C., Jarecki, S., Kim, J., Tsudik, G.: A robust multisignatures scheme with applications to acknowledgment aggregation. In: Blundo, C., Cimato, S. (eds.) SCN 04: 4th International Conference on Security in Communication Networks. Lecture Notes in Computer Science, vol. 3352, pp. 193–207. Springer, Heidelberg, Germany, Amalfi, Italy (Sep 8–10, 2005)
  18. Certicom Research: Sec 2: Recommended elliptic curve domain parameters. Tech. rep., Certicom Research (2010)
  19. Chang, C.C., Leu, J.J., Huang, P.C., Lee, W.B.: A scheme for obtaining a message from the digital multisignature. In: Imai, H., Zheng, Y. (eds.) PKC’98: 1st International Workshop on Theory and Practice in Public Key Cryptography. Lecture Notes in Computer Science, vol. 1431, pp. 154–163. Springer, Heidelberg, Germany, Pacifico Yokohama, Japan (Feb 5–6, 1998)
  20. Coron, J.S., Naccache, D.: Boneh et al.’s k-element aggregate extraction assumption is equivalent to the Diffie-Hellman assumption. In: Laih, C.S. (ed.) Advances in Cryptology – ASIACRYPT 2003. Lecture Notes in Computer Science, vol. 2894, pp. 392–397. Springer, Heidelberg, Germany, Taipei, Taiwan (Nov 30 – Dec 4, 2003)
  21. Drijvers, M., EdalatNejad, K., Ford, B., Neven, G.: Okamoto beats Schnorr: On the provable security of multi-signatures. Cryptology ePrint Archive, Report 2018/417 (2018), https://eprint.iacr.org/2018/417
  22. Fuentes-Casta˜neda, L., Knapp, E., Rodr´ıguez-Henr´ıquez, F.: Faster hashing to ð2. In: Miri, A., Vaudenay, S. (eds.) SAC 2011: 18th Annual International Workshop on Selected Areas in Cryptography. Lecture Notes in Computer Science, vol. 7118, pp. 412–430. Springer, Heidelberg, Germany, Toronto, Ontario, Canada (Aug 11–12, 2012)
  23. Gentry, C., O’Neill, A., Reyzin, L.: A unified framework for trapdoor-permutationbased sequential aggregate signatures. In: Abdalla, M., Dahab, R. (eds.) PKC 2018: 21st International Conference on Theory and Practice of Public Key Cryptography, Part II. Lecture Notes in Computer Science, vol. 10770, pp. 34–57. Springer, Heidelberg, Germany, Rio de Janeiro, Brazil (Mar 25–29, 2018)
  24. Gentry, C., Ramzan, Z.: Identity-based aggregate signatures. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006: 9th International Conference on Theory and Practice of Public Key Cryptography. Lecture Notes in Computer Science, vol. 3958, pp. 257–273. Springer, Heidelberg, Germany, New York, NY, USA (Apr 24–26, 2006)
  25. Hardjono, T., Zheng, Y.: A practical digital multisignature scheme based on discrete logarithms. In: Seberry, J., Zheng, Y. (eds.) Advances in Cryptology – AUSCRYPT’92. Lecture Notes in Computer Science, vol. 718, pp. 122–132. Springer, Heidelberg, Germany, Gold Coast, Queensland, Australia (Dec 13–16, 1993)
  26. Harn, L.: Group-oriented (t, n) threshold digital signature scheme and digital multisignature. IEE Proceedings-Computers and Digital Techniques 141(5), 307–313 (1994)
  27. Horster, P., Michels, M., Petersen, H.: Meta-multisignature schemes based on the discrete logarithm problem. In: Information Securitythe Next Decade. pp. 128–142. Springer (1995)
  28. Itakura, K., Nakamura, K.: A public-key cryptosystem suitable for digital multisignatures. Tech. rep., NEC Research and Development (1983)
  29. Komano, Y., Ohta, K., Shimbo, A., Kawamura, S.: Formal security model of multisignatures. In: Katsikas, S.K., Lopez, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006: 9th International Conference on Information Security. Lecture Notes in Computer Science, vol. 4176, pp. 146–160. Springer, Heidelberg, Germany, Samos Island, Greece (Aug 30 – Sep 2, 2006)
  30. Le, D.P., Bonnecaze, A., Gabillon, A.: Multisignatures as secure as the DiffieHellman problem in the plain public-key model. In: Shacham, H., Waters, B. (eds.) PAIRING 2009: 3rd International Conference on Pairing-based Cryptography. Lecture Notes in Computer Science, vol. 5671, pp. 35–51. Springer, Heidelberg, Germany, Palo Alto, CA, USA (Aug 12–14, 2009)
  31. Li, C.M., Hwang, T., Lee, N.Y.: Threshold-multisignature schemes where suspected forgery implies traceability of adversarial shareholders. In: Santis, A.D. (ed.) Advances in Cryptology – EUROCRYPT’94. Lecture Notes in Computer Science, vol. 950, pp. 194–204. Springer, Heidelberg, Germany, Perugia, Italy (May 9–12, 1995)
  32. Lu, S., Ostrovsky, R., Sahai, A., Shacham, H., Waters, B.: Sequential aggregate signatures and multisignatures without random oracles. In: Vaudenay, S. (ed.) Advances in Cryptology – EUROCRYPT 2006. Lecture Notes in Computer Science, vol. 4004, pp. 465–485. Springer, Heidelberg, Germany, St. Petersburg, Russia (May 28 – Jun 1, 2006)
  33. Lysyanskaya, A., Micali, S., Reyzin, L., Shacham, H.: Sequential aggregate signatures from trapdoor permutations. In: Cachin, C., Camenisch, J. (eds.) Advances in Cryptology – EUROCRYPT 2004. Lecture Notes in Computer Science, vol. 3027, pp. 74–90. Springer, Heidelberg, Germany, Interlaken, Switzerland (May 2–6, 2004)
  34. Ma, C., Weng, J., Li, Y., Deng, R.: Efficient discrete logarithm based multisignature scheme in the plain public key model. Designs, Codes and Cryptography 54(2), 121–133 (2010)
  35. Maxwell, G., Poelstra, A., Seurin, Y., Wuille, P.: Simple schnorr multi-signatures with applications to bitcoin. Cryptology ePrint Archive, Report 2018/068 (2018), https://eprint.iacr.org/2018/068/20180118:124757
  36. Maxwell, G., Poelstra, A., Seurin, Y., Wuille, P.: Simple schnorr multi-signatures with applications to bitcoin. Cryptology ePrint Archive, Report 2018/068 (2018), https://eprint.iacr.org/2018/068/20180520:191909
  37. Merkle, R.C.: A digital signature based on a conventional encryption function. In: Pomerance, C. (ed.) Advances in Cryptology – CRYPTO’87. Lecture Notes in Computer Science, vol. 293, pp. 369–378. Springer, Heidelberg, Germany, Santa Barbara, CA, USA (Aug 16–20, 1988)
  38. Micali, S., Ohta, K., Reyzin, L.: Accountable-subgroup multisignatures: Extended abstract. In: ACM CCS 01: 8th Conference on Computer and Communications Security. pp. 245–254. ACM Press, Philadelphia, PA, USA (Nov 5–8, 2001)
  39. Michels, M., Horster, P.: On the risk of disruption in several multiparty signature schemes. In: International Conference on the Theory and Application of Cryptology and Information Security. pp. 334–345. Springer (1996)
  40. Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2008), http://bitcoin.org/bitcoin.pdf
  41. Neven, G.: Efficient sequential aggregate signed data. In: Smart, N.P. (ed.) Advances in Cryptology – EUROCRYPT 2008. Lecture Notes in Computer Science, vol. 4965, pp. 52–69. Springer, Heidelberg, Germany, Istanbul, Turkey (Apr 13–17, 2008)
  42. Ohta, K., Okamoto, T.: A digital multisignature scheme based on the Fiat-Shamir scheme. In: Imai, H., Rivest, R.L., Matsumoto, T. (eds.) Advances in Cryptology – ASIACRYPT’91. Lecture Notes in Computer Science, vol. 739, pp. 139–148. Springer, Heidelberg, Germany, Fujiyoshida, Japan (Nov 11–14, 1993)
  43. Ohta, K., Okamoto, T.: Multi-signature schemes secure against active insider attacks. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 82(1), 21–31 (1999)
  44. Okamoto, T.: Provably secure and practical identification schemes and corresponding signature schemes. In: Brickell, E.F. (ed.) Advances in Cryptology – CRYPTO’92. Lecture Notes in Computer Science, vol. 740, pp. 31–53. Springer, Heidelberg, Germany, Santa Barbara, CA, USA (Aug 16–20, 1993)
  45. Park, S., Park, S., Kim, K., Won, D.: Two efficient RSA multisignature schemes. In: Han, Y., Okamoto, T., Qing, S. (eds.) ICICS 97: 1st International Conference on Information and Communication Security. Lecture Notes in Computer Science, vol. 1334, pp. 217–222. Springer, Heidelberg, Germany, Beijing, China (Nov 11–14, 1997)
  46. Pointcheval, D., Stern, J.: Security arguments for digital signatures and blind signatures. Journal of Cryptology 13(3), 361–396 (2000)
  47. Ristenpart, T., Yilek, S.: The power of proofs-of-possession: Securing multiparty signatures against rogue-key attacks. In: Naor, M. (ed.) Advances in Cryptology – EUROCRYPT 2007. Lecture Notes in Computer Science, vol. 4515, pp. 228–245. Springer, Heidelberg, Germany, Barcelona, Spain (May 20–24, 2007)
  48. Schnorr, C.P.: Efficient signature generation by smart cards. Journal of Cryptology 4(3), 161–174 (1991)
  49. Scott, M., Benger, N., Charlemagne, M., Perez, L.J.D., Kachisa, E.J.: Fast hashing to g2 on pairing-friendly curves. In: Shacham, H., Waters, B. (eds.) PAIRING 2009: 3rd International Conference on Pairing-based Cryptography. Lecture Notes in Computer Science, vol. 5671, pp. 102–113. Springer, Heidelberg, Germany, Palo Alto, CA, USA (Aug 12–14, 2009)
submitted by dj-gutz to myrXiv [link] [comments]

Cocos-BCX:Decentralized game application and digital asset creation platform

Cocos-BCX:Decentralized game application and digital asset creation platform

I. Project Overview

Cocos-BCX is a platform used for the development, operation, management and transfer of decentralized applications and in-application assets on the blockchain ecosystem. The platform mainly includes three function modules:
(1)The application development framework that supports multiple operating systems and various blockchain environments.
(2)Completely scripted, componentized and data-driven application development tools;
(3)An improved blockchain system, which is oriented to high performance applications and based on graphene technology framework, and its related functional components.
Cocos-BCX can allow developers to perform programming, debugging, and publishing of decentralized applications oriented to the blockchain environment, and hybrid architecture applications. Meanwhile, the platform integrates the distributed user account system, wallet and digital asset circulation platform based on the blockchain, which can realize the permanent saving and cross-chain use of in-application assets.

II. Project evaluation

(一) Market analysis

1. Market conditions | 8 points

The organizing pattern of productivity dominated by governments in some areas or industrial domains is apt to change in the context of bottlenecks existing for global scientific and technological progress, rising resource consumption, an aging population, and intensified geopolitical conflicts. In particular, in 2008, when Nakamot published his thesis "Bitcoin: A Peer-to-Peer Electronic Cash System", discussions on blockchain and digital currency have gradually extended from technological aspects to economic, social and political, and other fields. The general public have begun to pay close attention to the impact of blockchain on social development as well as the role of digital currency in the world economy. Based on the decentralized characteristics of the blockchain and the vibrant vitality of the digital economy, the general public has enough confidence to predict that the decentralized "digital assets" will be a sweeping trend in the future, and will derive new business models and social values.
At the same time, in the development process of decentralized applications of different types, the game industry enjoys unique development advantages, because the game's production mode is the most sophisticated, enjoys the highest degree in terms of commercialization, and is one of the scenarios with the most profound foundation in terms of developers and users.
u Analysis: The game field has a huge room for development, which is highly consistent with the characteristics of the blockchain, and accords with the future development tendency of the digital economy.
The digital asset economy model carried by the project through the blockchain technology will assetize the content produced by the developer, enable the developer to continue reaping benefits during the use, management and transfer of his assets, and provide him with a convenient, decentralized game distribution channel; meanwhile, it helps players to transform the data formed by time and energy as well as the props they obtain as a result of their consumption into the assets that can be safely stored and circulated, offering players the right to manage and commercialize them.

2. Competition | 8 points

Since the last century till now, owing to the sustained efforts and promotion by a variety of IT technology game enterprises, the national and even global online game market is developing by leaps and bounds. If there is no systematic risks, such as policy regulation, vicious incidents and other factors, there will be no smooth and endless development momentum unless something unexpected happens. However, an objective analysis reveals that the current online game market is still dominated by IT technology companies, and even in a controlled and monopolized development, which, of course, also brings substantial profits, such as Tencent, Blizzard Tech.
u Analysis: It can be predicted that the Cocos-BCX project will hardly have any direct competitors in the strict sense for the time being, but will encounter a marginal pressure competitive environment from two dimensions. In summary, the classical IT game companies at home and abroad are massive in size and have obvious capital advantages. However, the Cocos-BCX project has an advanced philosophy and cutting edge technology, and thereby enjoys first-mover advantages for a breakthrough; The blockchain game project of the same business is currently marked by wide participation and generic applicability. But in comparison, the Cocos-BCX game industry has such advantages as a salient background, special project orientation and sophisticated development in technical modules, and therefore has greater development potential.

(二) Token Status

1. Token situation | 6 points

(1) Basic situation of Token
Token name: COCOS
Total tokens in circulation: 100 billion
Consensus mechanism: DPOS
(2) Token usage and allocation
Part I 82%: Cocos-BCX is used for the platform community construction in various ways, including but not limited to the witness' block reward, incentives for platform ecological developers, global community construction, marketing and promotion, industry alliances, eco-investment, research, financial and legal compliance. The use of this part of Cocos-BCX includes swapping by means of the consensus work contributions, free gifts, gifts in exchange for service, and gifts in exchange for other tokens, etc.
Part II, 18%: Cocos-BCX is intended as incentives for the sponsoring team of the project. The incentive part will set up a locking mechanism, which will be issued and unlocked one-third at the end of each year after Token generation, and the issuance will be completed within three years.

https://preview.redd.it/s47w2jtfj6521.jpg?width=684&format=pjpg&auto=webp&s=a60ea62b86dc0f177f9596608d1961e039d3bd1b
u Analysis: The use of Token is mainly divided into two parts, among which, 82% is used for project development and construction. The remaining 18%, which has a locked position mechanism, is intended for team incentive and construction. The use design is rather rational, but the team part is slightly higher. Given that the industry is in the initial stage of development, it is of great importance to seize the first opportunity and acquire early traffic users. It is suggested that the proportion of Token used by the team be reduced slightly, which is more conducive to the long-term development of the project. It should be noted that the original holding distribution of Token has not been queried via the official channel, while this link for the conventional blockchain project are basically disclosed. Meanwhile, from the standpoint of ordinary investors, Token’s original holding ratio is also one of the important parameters for its investment.

2. Ecological cycle | 8 points

(1)The Token (COCOS) positioning of the platform: circulation media and governance proof in eco-economic activities
COCOS not only serves as a value exchange carrier and community participation proof for Cocox-BCX, but its orientation as a basic pricing Token is likely to play a critical role in the digital asset ecosystem. With the continuous development of the industry, a large quantity of decentralized digital assets will exist in multiple blockchain ecosystems according to different standards in the future, and the value existing in asset pricing media transcending the chain ecology will be infinitely magnified.
, which is specifically manifested in that developers and users can evaluate, compare, trade and manage digital assets of different chain ecosystems, worldview content, and technical standards based on COCOS. Meanwhile, as a primary and basic pricing medium, COCOS is positioned to become the necessary conditions for the blockchain industry to develop and trade financial products and derivatives of digital assets in the future.
(2)Basic use model of Token (COCOS)
Ø Value exchange medium within the platform ecosystem;
Ø Entrusted consensus equity share representative of the Cocos-BCX public blockchain;
Ø The reference and basis for the measurement of the participation in and contribution to the platform community.
(3)How to obtain Token (COCOS)
Ø Value creation: It includes the contribution of the behavior of creating digital assets, that is, developing games, making props, etc.
Ø Platform contribution reward: Users who contribute to the Cocos-BCX community is entitled to COCOS;
Ø Market transaction: Selling the prop assets obtained in the game to get COCOS;
Ø Behavioral incentives: Various effective behaviors within the Cocos-BCX platform, community and platform games will be converted into COCOS
according to a certain contribution degree.
u Analysis: The use model, scenario application, acquisition method, market orientation, etc. for the Token ecosystem design are all well deliberated, to be verified by the market.
The ecosystem design of the Token project not only takes the macroscopic use model and scenario application, but also gives a detailed description of the acquisition method. Another point that must be pointed out is that it has a clear market orientation and future prospect as soon as the design begins, therefore, in general the Token ecosystem design is well-considered and far-sighted. However, for the volatile blockchain market, the crux depends on whether the ecological design philosophy can keep pace with the times, which is very essential. In a word, in the face of massive uncertainties, it needs to be finally verified by the market.

(三) Team member

1. Founder | 8 points


https://preview.redd.it/35gq3gyij6521.jpg?width=200&format=pjpg&auto=webp&s=c3e68b208bc15a0607557cf9be65739beba67375
Haozhi Chen
China's renowned Internet serial entrepreneur, and has successively led and participated in the creation of Joyo.com, Xcar.com.cn, and cdn.yeeyan.org since 1999, and founded Chukong Technology in 2009. Chukong is a leading game development and distribution enterprise in China and a major maintainer and supporter of the Cocos-BCX global open source game engine and developer community.

https://preview.redd.it/2wm6ki0kj6521.jpg?width=200&format=pjpg&auto=webp&s=be9cd5cbb527a9471faac4002065916f4ebd9bd5
Xiaolong Yang
With over 14 years of experience in technology entrepreneurship and investment, he once co-founded China's leading entertainment social networking company. As an investor, he once worked for China's leading private equity fund, during which period, he led and participated in investment projects totalling over 1 billion US dollars, and realized the exit of some projects at home and abroad. His interests and expertise mainly concentrate on information technology of the global primary market and secondary market in the later stage, and macro multiple asset category investment, and has a profound understanding of the financial market mechanism and asset pricing. He is also an investment partner in China's major technology investment fund and provides counselling for Chinese and American hedge funds, venture capital funds and large enterprises.
u Analysis: Chen Haozhi, as a founder, has rich experience in the game industry, and enjoys widespread networking and abundant resources in the industry as being one of the early Internet entrepreneurs; Another founder, Yang Xiaolong, has a strong experience in technology venture capital investment, and has the expertise for global investment layout. On the whole, two co-founders have a prominent advantage in overall industry background and integrating resources.

2. Founding team | 8 points


https://preview.redd.it/twotgvrxj6521.png?width=877&format=png&auto=webp&s=a03ab15246f51d9c1595266114fa1ee18ca943ed
Kevin Yin: An early contributor of CocosChina community, NOI winner, and ACM guest. A senior developer of blockchain, and having years of experience in compilation and distributed computing. An investor of the blockchain technology.
Jane Jin: Responsible for CocosChina community, the "Aipuworks" incubator, etc., and an expert of the Techincal Committee for Blockchain, China Software Industry Association. Bachelor of Economics, Zhejiang Gongshang University, and mini-EMBA of Tsinghua University. He once served important functions in "Fortune Global 500" including Lucent, Nortel, NSN, Nokia, Intel and other multinational companies in the marketing, sales, executive and developer relationship domain.
James Jeon: Responsible for the business development strategy and implementation of the project's South Korean section. From 2012 to 2015, he served as CEO of Gurum Company, a South Korean subsidiary of Chukong Technologies, earning an annual revenue of over $30 million from the scratch for the South Korean company and leading the South Korean subsidiary in going public successfully.
Frederick Lim: Responsible for the business development strategy and implementation of the project's South Korean section. From 2014 to 2015, he served as co-CEO of Gurum Company, and was once the director of the Strategic Investment Department of Hyundai Group, responsible for investment in Internet, communication, telecommunications and other fields. He is a doctor of Engineering Technology, Sungkyunkwan University, South Korea.
Hirokuni Fujita: originally head of the Japanese subsidiary of Chukong Technologies. He graduated from Graduate School of Arts and Sciences, The University of Tokyo, majoring in Interdisciplinary Cultural Studies.
Jason: preacher of the Cocos-BCX community and meanwhile, senior manager of the Cocos 2d-x global community. He started to program on the Commodore-64 computer when he was 8. In addition to developing the community, he was keen on studying mathematics, finance, C++ and improving his Chinese proficiency.
Qinzhou Wang: Since entering the game industry in 2009, he has worked in the brand market in ZOL. Com. CN, Howell Expo, host of ChinaJoy, and is responsible for the brand market in Chukong Technologies.
u Analysis: The special technological talent construction of the team technicians needs to be further strengthened. At present, there is a blockchain technician. The game background and the advantages of the international architecture building enjoy prominent advantages, and there are sufficient team members on the strategic level and in the aspect of ecological construction. It is worth mentioning that team building is stable, and there is a high level of consensus among team members, which is conducive to the robust development of the project.
One member of the founding team has experience in the blockchain project development, that is, Chief Technical Officer, who is a senior blockchain developer. He has many years of experience in compiling and distributed computing, and is also a technology investor of blockchain.
In the early stage, owing to the demand of the game industry in the Japanese and Korean markets, Japanese and Korean market leaders were specially arranged in the early team structure of Chukong Technologies. In particular, due to the prosperity and popularity of the game industry in the Korean market, two co-leaders were specially arranged for the Korea market, responsible for strategic and investment issues respectively.
Consultant Team | 8 points

https://preview.redd.it/822oiksyj6521.jpg?width=558&format=pjpg&auto=webp&s=620ffe23c556721c0ac3386c1cdf044e6d7d98af
Zhe Wang: Founder of the Cocos engine, and CEO of Xiamen Yaji Software Co., Ltd. He graduated from Department of Electronics, Nanjing University, and later studied a postgraduate program at Department of Management Science, Xiamen University. He created the Cocos engine in 2011, which currently has 1.1 million registered developers worldwide and 300,000 monthly active developers in over 200 countries and regions in the world. The Cocos engine has arrested the attention of platform vendors at home and abroad, and has established a long-term cooperative partnership with Microsoft, Google, ARM, Intel, Qualcomm, Samsung, Huawei and Tencent, etc.
Edith Yeung: One of some "Silicon Valley's Must Meet" investors as covered in Inc magazine. She is the head of 500 Startups, Silicon Valley's famous venture capital company and incubator in Greater China, and meanwhile, manages a Mobile Collective fund worth tens of millions of dollars. She has invested in over 40 mobile Internet, VR, AR and AI start-ups, including Hooked (App store's No. 1 reading App), DayDayCook (one of Asia's largest food communities), Fleksy (acquired by Pinterest), Human (acquired by Mapbox), AISense and so on.
u Analysis: The consultant team has obvious advantages in technological achievements, rich experience in technology innovation investment and incubation experience for startups.
The consultant team consists of a Maker-oriented technical talent and two venture capital managers with a senior venture capital background, among whom, Wang Zhe, technical consultant, graduated from Department of Electronics, Nanjing University and CEO of Xiamen Yaji Software. Wang is the founder of Cocos-BCX engine. At present, the Cocos engine has 1.1 million registered developers and 300,000 monthly active developers in over 200 countries and regions worldwide.

(四) Tech Analysis

1. Tech highlights | 9 points

(1) Smart contract system which can be updated iteratively: The smart contract system, represented by Ethereum, is not subject to modification once its definition is published, making it difficult to meet the volatile demands of market. Therefore, an iterative smart contract system is designed to address this pain spot.
(2) Prop circulation platform: Unlike conventional game transaction platform, Cocos-BCX's decentralized digital asset circulation platform does not have intermediary agencies. Players can complete the transfer and purchase of non-homogeneous assets, including "game gold coins" and prop assets acquired in the game on the prop circulation platform. In the whole process of transfer, the platform will adopt smart contract for automatic matching to help users complete the transfer process more efficiently.
(3) Game interactive operation environment:
Based on the judgment of the operation environment characteristics of blockchain games in the future, Cocos-BCX has designed a set of integrated operation environment that accommodates various types of APPs, as well as the supporting interoperability interface. Combined with COCOS Creator, it simplifies the process of docking game programs and blockchain, making intra-chain interaction transparent to developers, and allowing conventional game developers to develop or migrate blockchain game without a threshold.
(4) Mapping gateway that supports multi-chain and asset riveting:
Cocos-BCX provides a set of mapping gateways used for the automatic mapping of game gold coins and props. Under the unified value measurement system, it realizes the smooth transition of different in-chain game content and different platform content. The content that can be used for mapping includes game gold coins, game equipment data, etc.
(5) Transaction authentication mechanism that prevents BP/developers from cheating:
BP, as the core of transaction processing and communication of the whole network, can know the processing result of the latest transaction prior to general nodes. Therefore, BP enjoys a priority for information with timeliness or confidentiality
, as compared with general nodes, so it has a cheating potential in terms of
information acquisition. To address the drawbacks of this technical link, five modular confrontation mechanisms has been specially designed to hold the likelihood of BP/developer cheating at bay.
(6) Economies Principle Design of Cocos-BCX:
The Cocos-BCX platform carries the game assets value created by developers by providing a complete set of functional components including the underlying public blockchain, digital property management, and exchanges. Its technology and governance structure design, based on the graphene standard, has the economic attributes corresponding to the DPoS consensus mechanism.
u Analysis: There are a multiplicity of technical highlights in that the overall technology construction shows characteristics such as rigid logic and prominent modularity, and various technical solutions and mechanisms with a strong pertinence have been put forward.
Based on the market pain spots of the game industry, and combined with the development opportunities of blockchain technology, the Cocos-BCX project puts forward a vision system to create consistence between the content producer and consumer in the digital world. In view of the initial intention of the project and the relatively profound background of the game industry, the overall technical structure design of the project is highly targeted and has a strong logic, which can be described as closely connected with each other. Based on the large technical framework system, each technical link and organization also has a strong sense of target and logical gene, and on this basis, many modular and modified technical programs or mechanisms have been proposed. However, it is worth noting that the synergy of a series of highlight technologies remains to be verified and examined. Meanwhile, attention should also be paid to the practicability and rationality.

2. Impossible Triangle | 7 points

(1) Decentralization
Ø Low fork risk: Cocos-BCX uses the DPoS consensus mechanism, which does not require miners to use mining machines for mining, and thereby it can effectively avoid the impact of centralized computing on the entire basechain, which in turn reduces a low fork risk. Under the DPoS mechanism, if a witness wants to fork by voting, it is necessary to guarantee that over one third of the witnesses violate this mechanism at the same time.
Ø Improved DPOS consensus mechanism: The consensus layer of the Cocos-BCX test chain adopts the DPoS consensus algorithm. The advantage characteristics of the improved edition DPOS are as follows: all active witnesses have the same block predefined probability as the witnesses' predefined algorithm in the DPoS consensus algorithm, which ensures that the block probability of all witnesses is consistent with the block reward.
Ø Lightweight node: In Cocos-BCX design, lightweight node is essentially an environment with chain interoperability. Unlike the whole node, the lightweight node does not require to synchronize the whole network data. Instead, it needs the contract information and environment data required for synchronous running. This design can greatly reduce the data volume and synchronization time required for node synchronization, enabling the in-chain game terminal software to have a capacity which is actually used and a plausible time cost.
(2) Security
Ø Player autonomy and asset security: Because of the open and transparent characteristics of the blockchain network, the digital asset information obtained by players in the game can be viewed through the blockchain.
Ø Guarantee by modern cryptography: Modern cryptography is a technology based on mathematics. Currently, it has been widely used in many industries in the Internet domain. Common symmetric encryption technologies include AES encryption used for WiFi, and asymmetric encryption algorithms (public and private key cryptography) RSA, ECC, etc., among which, ECC (Elliptic Curves Cryptography) is an encryption algorithm commonly used in the blockchain field.
Ø A transaction verification mechanism that prevents BP/developers from cheating: BP enjoys a priority compared with general nodes, so it has the probability to cheat in terms of information acquisition. Therefore, the BCX program has designed a set of transaction execution, messaging, and operating mechanisms to address the possible links that allow cheating by BP and developers.
Ø Iterative updated smart contract system: It can provide logical updating and loophole repair for the in-chain game smart contract, thus ensuring the security and timeliness of the smart contract.
(3) Expandability:
Ø Strong expandability of the top-level design of the project
The expandability of Cocos-BCX is powerful, which is specifically shown in a decentralized game production and an overall solution to the game economy operation established by means of the game engine, development environment and Cocos-BCX game chain.

https://preview.redd.it/9zqpm1zzj6521.jpg?width=1207&format=pjpg&auto=webp&s=97073eb57409e0904da5c11873cc543c3b9f310b
A business ecosystem is constructed based on the above overall solution, with the purpose of connecting the global game ecosystem. The main ecological links include developers, users, creative content, key ecological links and blockchain system, etc.

https://preview.redd.it/l83i3pk0k6521.jpg?width=1276&format=pjpg&auto=webp&s=df7e694a557af1485c840ed44b9bbfba432b1d86
Ø Expanded design of specific technologies and mechanisms
1) Multi-platform game integration running environment: This platform is mainly characterized by four features, consistent and perfect chain interoperability interface, downward transparent accepting mode, encapsulated atomic operation and multi-platform compatibility.
2) Interactive interface of blockchain:
Cocos-BCX provides a chain-interactive development environment so that developers can easily interact with the chain through this set of environment. Meanwhile, its blockchain interactive development environment provides development components compatible with multiple working platforms, including SDK for the Android and iOS system, javascript libraries for front-terminal web applications, and python and PHP libraries for back-terminal applications.
u Analysis: The expandability of the project's "impossible triangle" shows the most prominently, and the decentralized attribute is the weakest, whose security is between the two. However, the project takes the three into consideration in terms of the technical mechanism and program function. Yet, the focus is different.
The project interprets the “impossible triangle” by means of thinking and design that focus on technical aspects and key issues.
The security level first guarantees the assets security and freedom of the ecosystem participants, and meanwhile ensures the rationality and security of the overall framework design, and finally takes its system updating and safe recovery into consideration mainly by means of player autonomy, modern cryptography and transaction verification mechanism that prevents BP/developers from cheating.

3. Development difficulty | 8 points

According to the summary of the project white paper, the blockchain game can be generally divided into four developmental stages.
(1)Using the homogeneous assets for the settlement of the game "gold coins";
(2)Free conversion of the game "gold coins" and props;
(3)In-chain operation of critical rules;
(4)Overall in-chain operation of the game
The game in-chain operation is the final form of the industry. Based on the above summary, Cocos-BCX proposes the future development prospect, mainly represented in seven aspects:
(1)Players having a lightweight full-node environment;
(2)The service stack operating in the blockchain environment;
(3)The game engine as one of the node infrastructures;
(4)Providing a joint development/debugging environment including engine, visual IDE, and chain network interactive interface;
(5)a set of asynchronous consensus tasks between nodes to ensure the trustworthiness of the engine environment. This consensus may be based on the discrimination of feature code of
the engine critical function's target code
(6) The game code (contract) is executed by the secure virtual machine controlled by the engine, and the key numerical calculation of the contract may adopt
the “Trusted Execution Environment” scheme, which is executed independently of the main part of the contract;
(7) The key process of the contract is witnessed by the adjacent or related nodes (like players in a copy).
u Analysis: The project covers a multiplicity of technical characteristics and functional mechanisms. The overall development is rather difficult. However, it is highly practicable in terms of performance.
At the initial stage of the project, four stages of blockchain game development were analyzed. After combing, the highest prospect was proposed, implicating to create a complete multi-platform game running environment, which can provide game developers with convenience in developing blockchain games and a perfect ecological environment to the maximum, while bringing game users a brand-new gaming experience and a game form that transcends the previous ones.
Based on the initial project prospect, numerous technical goals and functional modules are listed, indicating that the technical support for the project vision is rather effective. However, as public blockchain of the industry application basis, it encompasses various technical applications and functional modules. Comparatively speaking, the development difficulty is rather big. Meanwhile, as released by the white paper, the theoretical throughput of the Cocos-BCX test chain can reach up to 100,000 tps. The actual throughput is approximate to 3,500 tps, and the block time is 3 seconds, that is, the information broadcast across the entire network is completed once every 3 seconds. It can be seen from the project technical performance data that it has a relatively strong realistic significance. Therefore, on the whole, the project puts forward a sizeable technical challenge, and in the meantime has a reasonable practicability, therefore, it is worthwhile to look forward to!

(五) Project status

1. Product | 7 points

(1)System-level products
Ø The application development framework that supports multiple operating systems and various blockchain environments.
Ø Completely scripted, componentized and data-driven application development tools;
Ø An improved blockchain system, which is oriented to high performance applications and based on graphene technology framework, and its related functional components.
Ø Supporting non-homogeneous wallets;
Ø A blockchain browser that supports the contract event subscription;
Ø Supporting the third-party non-homogeneous asset exchanges;
Ø Supporting the blockchain game developed by a third party;
Ø Cross-chain asset acceptance gateway.
(2) Functional products
Ø De-intermediary assets (prop) operation interface;
Ø Paradigms of non-homogeneous assets circulation platform;
Ø Supporting player autonomy and blacksmith shop mechanism;
Ø Visual IDE (including visual editing of the game program and contract);
Ø Complete wallet, user system and blockchain browser;
Ø Smart contract system that allows iterative updating.
u Analysis: According to the information released on the official website of the project, the timeline shows that the Cocos-BCX main chain has started the closed beta test in the third quarter of 2018. Based on the obvious characteristics of the project technology module, Cocos-BCX has launched two series of projects, namely, system-level and function-level products, including development frameworks, blacksmith shop mechanisms tailored to various operations and multiple environment.

2. Code updating | 2 points

u Analysis: It is learned from official communication that the source code of the project has not been made public for the purpose of keeping the project's trade secret confidential. It is planned that the project will be open source in the future after the ecological and system products become gradually stabilized.

3. Completion status | 8 points

u Analysis: The project has formulated an overall development plan and recent work tasks, and at the same time it has demonstrated its strong vitality through weekly report, timeline and development broadcast.
According to the official channel inquiry, the project has formulated the Roadmap for the 2018 key milestone quarter and the recent detailed work task breakdown plan, and the project has a very complete display system featuring three major development progresses:
(1) Weekly reporting system
(2) Project timeline
(3) Development broadcast
Through the Roadmap+ work breakdown + 3 major system model, the project's development trajectory and dynamics have been display in a basically three-dimensional, spatial, meticulous and detailed manner, and in the meantime, the powerful execution and self-vitality of the project have been also displayed.

(六) Institution enabling (Investors)

1. Cooperative institutions | 9 points


https://preview.redd.it/9qmh4jj1k6521.jpg?width=1036&format=pjpg&auto=webp&s=25c7cb77d5196fc861750064b43b8ba8e83c71a9
u Analysis: Cocos-BCX has a wide margin for cooperation, and its cooperation institutions are not only numerous, but also mainly of leading and quality enterprises in the industry.
The cooperative institutions include HelloEOS, NEO, NEBULAS (chain), Loom, IMEOS.ONE, Kingsoft Cloud and SlowMist Technology, etc.
NEO is one of the earliest blockchain projects in China. It was officially created in 2014 and was open sourced in real time in Github in June 2015. Since its establishment, the NEO team has experienced ups and downs of the blockchain industry. This project can be said to be a veteran project in the industry. NEO combines with a series of technologies, such as point-to-point network, Byzantine fault tolerance, digital certificate, smart contract, superconducting transactions, and cross-chain interoperability protocols, to perform rapid, efficient, secure, and legitimate smart management of assets.

2. Investment institutions | 9 points


https://preview.redd.it/xd5u9w62k6521.jpg?width=1273&format=pjpg&auto=webp&s=c8729f585a57c8239c717ef8b58229fe7f98a6eb
u Analysis: There are numerous investment institutions, many of which are Class I institutions, with a strong institutional strength.
Investment institutions include NGC, Binance, INB Capital, Dfund, 500 Startups, BlockVC, OK Blockchain Capital, Yisu Capital, Xiong'an Capital, ONTology, FreeS FUND, NODE Capital, Consensus Capital, Hash Capital, NEO Capital, Ticker Capital , ContractVC, Junwu Capital, Candy Capital, Hofan VC, BMETA Capital, BYTE Capital, Nimble Capital, InsurFun, BA Capital, Consensus Lab, TOKENMANIA, Byzantium Capital, etc.
The rest investment institutions are also well-known. For example, DFUND was founded by Zhao Dong, a well-known figure in the digital currency domain in July 2017. Yisu Capital is engaged in the early investment and project cooperation, focusing on blockchain technology and big data intelligence analysis, and other domains.

(七) Drawing attention | 6 points

https://preview.redd.it/78rnnt96k6521.png?width=605&format=png&auto=webp&s=b60d1de55e93642a174730fbee394c9fe5f7166f


Project content description

https://preview.redd.it/cgps19x6k6521.png?width=796&format=png&auto=webp&s=141a8ce79539d70bb8ee15f31ed0786db2524e2b
u Analysis: The game user and developer group are highly active, and meanwhile the publicity of the media and news client are enhanced. The overall heat and operation and maintenance thinking are well-balanced. However, the current community operation link is relatively weak, and requires improvement in the follow-up.
Presently, the number of community fans is small. Therefore, the operation link of project content is rather weak. However, media communication and news broadcasting, two links of propaganda and promotion efforts, are quite effective, basically realizing a timely and real-time posting of the latest developments of the project. Although the media and news client are widely disseminated, their social interaction is relatively weak. The social platform has its own communication limitations. However, it is highly involved in interaction.

(VIII) Social Response | 7.78

User A | Point: 7.9
Comment: From the perspective of production mode and commercialization, this game is the most sophisticated. So I think this project has a very extensive application scenario, especially for developers and users.
User B | Point: 7.0
Comment: Currently, it seems that the game industry is greatly influenced by macro policies. Tencent's recent performance is a case in point. However, the project orientation is quite good.
User C | Point: 8.0
Comment: The technical advantages of the project are particularly prominent, and it also seizes the development opportunities of the blockchain. However, ultimately it needs to undergo the test of the market.
User D | Point: 9.0
Comment: First of all, COCOS has a large number of developers, solid underlying technology and reliable team work, which is worth looking forward to. Of course, great "undertaking" calls for enormous input, especially in technology. The way is arduous and long. Come on.
User E | Point: 7.0
Comment:
As a game practitioner, I would talk something about Cocos-BCX project: when the concept of blockchain game is put forward for everyone to consider, at this stage, it is no doubt that the dimension (type) of the game is developed from the perspective of "inheritance" and "tracing its very origin". If the Cocos-BCX project can be applied by game developers in terms of "development kit", is easy to learn and use, and allows the mobile game developers to shift to the development of blockchain games without a threshold, then the game dimensions and users can be further expanded. In a word, phenomenal games of blockchain games need the support of Cocos-BCX and the efforts of developers, both of which are indispensable. It is hoped that the team will make great efforts in development and publicity. "Coin friends" may not need to know how the game is developed, but they will certainly care about its future space. Such evaluation can only be called prospects and expectations. It remains to be determined whether the project adopts capital operation or the mode as solid as the old engine of COCOS till the project is landed.

III. Evaluation Summary

The project orientation is accurate, and the team has a strong lineup. It merits pointing out that its technical strength and model architecture design are particularly prominent, and there are an array of investment and cooperation institutions with strong strength. However, at present, the code has not been open sourced and the community operation and maintenance is deficient. The information disclosure of the Token link is not particularly perfect, and individual investors may care much about it. The Roadmap of the project development is all too simple. These are the deficiencies of the project development at the current moment.
submitted by ONETOPGlobal to u/ONETOPGlobal [link] [comments]

10-08 06:12 - 'klcchain' (self.Bitcoin) by /u/klcchain removed from /r/Bitcoin within 47-57min

'''
1 Basic knowledge of cryptography 1.1 Basic knowledge of elliptic curves 1.1.1Elliptic curve profile Let denote a finite domain, an elliptic curve defined in it, actually this curve represented as a set of points, defines an operation on elliptic curve, and two points on the elliptic curve, a + = for the two point addition operation. The intersection of the line and the curve represented by the point, and the point on the elliptic curve of the symmetry. At this point, when = when, the intersection of the tangent and the curve is represented as the point on the axis of the elliptic curve. Thus, the Abel group is formed on the finite field (+ +), and the addition unit element is. 1.1.2 Signature algorithm Defines an elliptic curve called [()) and its base point, which is the order. For the curve @ (), make a public key pair, in which the private key is the public key and can be made public. Step1: first, using Hash function to calculate the plaintext message, the Hash function algorithm used MD5 algorithm or SHA-1 algorithm can calculate the plaintext message value = (Step2); then in the interval [1, and the private key a random integer as the signature of a range of 1]; Step3: calculation a public key =;Step4: = = K, where K is the abscissa of the public key and, if = 0, returns to Step2; Step5: = = Q/ (+), which is the private key of the sender A, and if = 0, returns to Step2; Step6: the sender A transmits the message signature (to) to the receiver B. The receiver receives the message signature (B,), the specific verification process to sign the message as follows: Step1: firstly, message signature and verification, i.e. whether it is in the interval [1, N1] positive integer range, if the signature does not comply with the signature of the message, that message signature received (,) is not a valid legal signature; Step2: according to the signature public key of the sender A, the sender A and the receiver B have the same Hash function digest value, and the digest value of the signed message is calculated (=); Step3: calculates the parameter value = Q/; Step4: calculates the parameter value = = Step5: calculates the parameter value = = Step6: calculates the parameter value = +; Step7: if = 0, the receiver B may deny the signature. Otherwise, calculate '= K', where K is the parameter A horizontal coordinate; a signature. The digital signature based on ECC, partly because this scheme can avoid the order operation in the inverse operation, so it is better than the signature scheme based on discrete logarithm algorithm should be simple; on the other hand it is because the calculation of the plaintext message () (,) than the calculation simple, so its speed Schnorr digital signature scheme is faster than. Therefore, the digital signature scheme based on elliptic curve cryptography has good application advantages in resisting attack security strength, key length, computation speed, computation cost and bandwidth requirement. 1.2 Threshold key sharing technology 1.2.1 Shamir Threshold key sharing concept Threshold key sharing technology solves the key security management problem. The design of modern cryptography system is that depends on the security of cryptosystem in the cryptographic key leakage means the lost security system, so the key management plays an important role in the research and design of security in cryptography. Especially when multiple stakeholders manage an account, the key of the account is trusted, and it is very difficult to distribute it safely to multi-party participants. To solve this problem, the Israeli cryptographer Shamir proposed Shamir (,) the concept of threshold secret sharing: the key is divided into portions assigned to participants, each participant to grasp a key share, only collect more than key share, can the key recovery. 1.2.2 Linear secret sharing mechanism Linear secret sharing is the generalization of Shamir threshold key sharing. Its essence is that both the primary key space, the sub key space and the random input set are linear spaces, and the key reconstruction function is linear. The formal definition is as follows: let be a finite domain, PI is a key access structure sharing system, is the main key space. We say that Pi is a linear key sharing system, if the following conditions are met: 1) sub key is linear space, namely for, constant B, the sub key space B cd. Remember - B, e (,) as the components of B CD vector space is received, this component is dependent on the primary key and the random number 2) each authorization set may obtain the master key by means of a linear combination of sub keys, that is, for any one delegate The right to set in, constant {b, e:, B, less than 1 and less than or equal to b}, such that for any master key and random number, All = KD and l /jejcd B, e, B (E, II). 1.2.3 Shamir Polynomial interpolation threshold secret sharing scheme Shamir combines the characteristics of polynomials over finite fields and the theory of Lagrange's reconstructed polynomial, designs a threshold key management scheme based on Lagrange interpolation polynomial, and the scheme is as follows 1.3 Secure multi-party computation 1.3.1 The background of secure multiparty computation With the rapid development of Internet, more and more applications require cooperative computing among network users. But because of privacy protection and data security considerations, the user does not want to participate in collaborative computing and other users to calculate data sharing, this problem leads to collaborative computing cannot be performed, which leads to efficient use and share some of the scenarios can not be difficult to achieve the cyber source. Secure multi-party computation (secure multi-party computation) makes this problem easy to solve, and it provides a theoretical basis for solving the contradiction between data privacy protection and collaborative computing. Secure multi-party computation is the theoretical foundation of distributed cryptography, and also a basic problem of distributed computing. Secure multi-party computation means that in a non trusted multi-user network, two or more users can cooperate with each other to execute a computing task without leaking their private input information. In brief, secure multi-party computation refers to a set of people, such as /...... Q, computing functions together safely,...... , q = (/),...... (Q). Where the input of this function is held by the participant secretly, the secret input of B is B, and after the calculation, B gets the output B. Here is the safety requirements of cheating participants even in some cases, to ensure the correctness of the calculated results, which is calculated after the end of each honest participant B can get the correct output of B, but also requires each participant to ensure confidentiality of input, namely each participant B (B, b) in addition. Don't get any other information. Secure multi-party computation has been rich in theoretical results and powerful tools. Although its practical application is still in its infancy, it will eventually become an indispensable part of computer security. 1.3.2 Classification of secure multiparty computation protocols At present, secure multi-party computation protocols can be divided into four categories according to the different implementations: L secure multi-party computation protocol based on VSS sub protocol Most of the existing secure multi-party computation protocols adopt verifiable key sharing VSS (Verifiable Secret) (Sharing) the sub protocol is the basis of protocol construction, which is suitable for computing functions on any finite field. The finite field of arbitrary function can be expressed as the domain definition of addition and multiplication of the directed graph, so long as can secure computing addition and multiplication, we can calculate each addition and multiplication to calculate any function over finite fields. L secure multi-party computation protocol based on Mix-Match The secure multi-party computation protocol based on VSS sub protocol can compute arbitrary functions, but it can not efficiently calculate Boolean functions. Therefore, another secure multi-party protocol called Mix-Match is proposed. The basic idea of this protocol is that participants use secret sharing schemes to share the system's private key, and the system's public key is open. During the protocol, the participants randomly encrypt their own input public key y, then publish their own encryption results, and finally make all participants gain common output through Mix-Match. L secure multi-party computation protocol based on OT OT based secure multi-party computation protocol for computing arbitrary bit functions. It implements with "OT sub Protocol" and (and), or (or) "," (not) "three basic operations, then the arbitrary bit operation function is decomposed into a combination of three basic operations, finally by using iterative method to calculate the bit operation function. L secure multi-party computation based on homomorphic encryption Homomorphic encryption, secure multi-party computation can resist active attacks based on it is the idea of the selected atom is calculated, the calculation can be decomposed into a sequence of atomic computing allows arbitrary function and atomic calculation of input and output using homomorphic encryption, to get the final results in the encrypted state, only a specific set of participants will be able to the calculation results decrypted plaintext. 1.4 Introduction to ring signature In 2001, Rivest et al proposed a new signature technique, called Ring Signature, in the context of how to reveal the secret anonymously. Ring signature can be regarded as a kind of special group signature (Group Signature), because the establishment process need the trusted center and security group signature, often there are loopholes in the protection of anonymous (signer is traceable to the trusted center), group signature and ring signature in the foundation process in addition to the establishment of a trusted center and security. For the verifier, the signer is completely anonymous, so ring signature is more practical. Since the self ring signature was proposed, a large number of scholars have discovered its important value, such as elliptic curve, threshold and other ring signatures Volume design and development can be divided into four categories: 1. threshold ring signature 2. associated ring signature 3. revocable anonymous ring signature 4. deniable ring signature for block chain contract intelligent token transactions privacy, we use a linkable ring signature, in order to achieve privacy and prevent double problem. 2 A secure account generation scheme based on secure multi-party computation and threshold key sharing 2.1 Basic operations of secure multi-party computation The addition and multiplication, inverse element into three basic operations on the finite field, any computation can be decomposed into a sequence of the finite field addition and multiplication, inverse element, so long as to complete the three basic operations of multi-party computation, so the calculation process can be arbitrary finite domains through multi-party computation the basic operation to iterate the agreement. In this paper, we introduce a secure multi-party computation algorithm for finite fields based on secret sharing scheme based on Lagrange interpolation polynomial. 2.1.1 Addition In the secret sharing scheme based on Lagrange interpolation polynomial, the need to identify a polynomial, a shared secret is the constant term of this polynomial, and the secret share was value of this polynomial at a certain point. It is possible to set and share two secrets, the corresponding polynomials are w and X, and the secret share of participant B is b = w, B = X. In order to get the secret share of secret +, the participant B needs to construct a polynomial so that the constant of the polynomial is +, and B can be calculated. The construction process is as follows: B and B share a secret dreams and secrets, and the corresponding polynomial for W and X L = w + W / +. + W, oQ/oQ/ = {x + / +, +. X, oQ/oQ/ Might as well define = w + x = = w + x = B + B It was - 1 polynomial, and the constant term is +, for this polynomial in value * b = as + secret secret share Secure multi-party computation algorithm obtained by adding the above construction process: Addition of multi-party computation algorithms: secret, secret share, B, B output: Secret + secret share B 1)B = B + B 2.1.2 multiplication Set up two secrets, the corresponding polynomials are w and X, and the secret share of participant B is b = w, B = X. If the participants directly in the local computing B and B share a secret product, although the calculation after sharing secret is the constant term polynomials, but the degree of the polynomial is 2 (- 1), so the need to reduce the number of polynomial. The W and X share the secret share of the participant B, and the product of W and X is: Wx = w = x + / +. + (oQ/), (oQ/) Wx x = w, 1 = 1 + 1 = 2. Represented by matrices: - 1 When the upper coefficient matrix is written, it is obviously a nonsingular matrix, and the inverse matrix is denoted as Q/, which is a constant Number matrix. Remember (/, - - -, oQ/) is the first line of the matrix Q/, there are: /wx = 1 + - + - - oQ/wx, 2 - 1 Each participant randomly selected 2 - 1 - 1 - - - / polynomial, and, oQ/, to meet the requirements of B 0 = wx. Definition = "B, oQ/ Obviously: OQ/. 0 = b b 0 = /wx 1 + - - - 2 - 1 = oQ/wx +. B OQ/. = b b B Therefore, the secret is to share the secret and share the secret. A multi-party computation algorithm for multiplication 2.1.3 yuan inverse Set the secret of sharing, the corresponding polynomial is w, and the secret share of participant B is b = W. One yuan Inversion is refers to the participants by B B secret share calculation Q/ w (c) a secret share, but in the process of calculation Can not disclose, Q/ and secret share of the two. The calculation is as follows: Participant B selects the random number B, and selects the random polynomial B () to compute its secret share be = B () to the participant E. To accept all the secret share, e n = Q. Thus all participants share the same random number David - +q + = / s.. Using the multiplicative multi-party computation algorithm, the secret obtained by the secret share is calculated Share w, and sent to the other participants, so it can be recovered by using the Lagrange interpolation, we may assume that = . It is clear that the W - a Q/ C = n, i.e. Q/'s Secret share. 2.2 lock account generation scenarios The lock account generation scheme is an improvement on threshold key management scheme based on Lagrange interpolation polynomial. Its basic idea is that through the threshold secret sharing, all the authentication nodes generate a lock account in a centralized way, and each verification node has a share of the lock private key. This ensures that the lock account private key is distributed in the entire network in the form of the private key share, so it can be centralized management. 2.3 lock account signature scheme The lock account signature algorithm uses the ECDSA signature algorithm, because it is the current block chain project's mainstream signature algorithm, this choice can improve the system compatibility. In a locked account signature generation process, different from the original ECDSA signature algorithm, the private key and the random number to account is in the form of multi-party computation involved in ECDSA signature process; lock account signature verification process with the original ECDSA signature verification algorithm. Therefore, only the lock account signature generation process is described
'''
klcchain
Go1dfish undelete link
unreddit undelete link
Author: klcchain
submitted by removalbot to removalbot [link] [comments]

Elliptic Curve Cryptography Tutorial - Understanding ECC through the Diffie-Hellman Key Exchange Elliptic Curve Cryptography Overview

One of the world’s top cryptographers believes that Satoshi Nakamoto chose Bitcoin’s elliptic curve either for its efficiency or because it may offer a secret backdoor.Elliptic curve is worth $ billions. A Bitcoin public key is created by applying elliptic curve cryptography to the private key. One can easily create a public key from the private key, but it is impossible to go in the Elliptic Curve Digital Signature Algorithm Elliptic Curve Digital Signature Algorithm (or ECDSA) is a cryptographic algorithm used by Bitcoin to ensure that funds can only be spent by their rightful owners. The elliptic curve used by Bitcoin, Ethereum, and many other cryptocurrencies is called secp256k1. The equation for the secp256k1 curve is y² = x³+7. This curve looks like: Then you compute X= x•P using the parameters for the secp256k1 curve. X will be your public key. Your public key is safe to give out and cannot be used to determine The primary benefit promised by elliptic curve cryptography is a smaller key size , reducing storage and transmission requirements, i.e. that an elliptic curve group could provide the same level of security afforded by an RSA -based system with a large modulus and correspondingly larger key: for example, a 256-bit elliptic curve public key A protocol such as bitcoin selects a set of parameters for the elliptic curve and its finite field representation that is fixed for all users of the protocol.

[index] [523] [27125] [24662] [7222] [7651] [29953] [19083] [21165] [23557] [9240]

Elliptic Curve Cryptography Tutorial - Understanding ECC through the Diffie-Hellman Key Exchange

John Wagnon discusses the basics and benefits of Elliptic Curve Cryptography (ECC) in this episode of Lightboard Lessons. Check out this article on DevCentral that explains ECC encryption in more ... Elliptic Curve Cryptography (ECC) is a type of public key cryptography that relies on the math of both elliptic curves as well as number theory. This technique can be used to create smaller ...

Flag Counter