Module 1 - FBT (Material 1)
Module 1 - FBT (Material 1)
• Blockchain is a distributed, immutable ledger that facilitates the process of recording transactions
and tracking assets in a business network. An asset can be tangible (a house, car, cash, land) or
intangible (intellectual property, patents, copyrights, branding).
• Virtually anything of value can be tracked and traded on a blockchain network, reducing risk and
cutting costs for all involved.
Node: user or computer within the blockchain architecture (each has an independent copy of the whole
blockchain ledger)
Transaction: smallest building block of a blockchain system (records, information, etc.) that serves as the
purpose of blockchain
Block: a data structure used for keeping a set of transactions which is distributed to all nodes in the network
Miners: specific nodes which perform the block verification process before adding anything to the
blockchain structure
Disadvantages:
• One of the main limitations of FBA is that it is more complex than PBFT, as it requires
nodes to manage multiple sub-networks and consensus mechanisms.
Asynchronous Byzantine Agreement
• Asynchronous Byzantine Agreement is designed to achieve consensus among a group of
nodes even when the network communication is prone to unpredictable delays and
message losses or other asynchronous behaviors.
• It aims to allow loyal nodes to agree on a common decision and further ensuring the
consensus reached in a fault-tolerant manner.
• Asynchronous Byzantine Agreement protocol works in multiple rounds, allowing nodes to
exchange messages and progressively converge towards a shared decision.
Asynchronous Byzantine Agreement
• Asynchronous Byzantine Agreement protocol has the following steps
• Initialization
• Proposal & Broadcasting
• Message Exchange
• Update & Broadcasting
• Iteration
• Decision
Asynchronous Byzantine Agreement
Reference: Garay, Juan A. et al. “The Bitcoin Backbone Protocol: Analysis and Applications.” IACR
Cryptol. ePrint Arch. 2014 (2015): 765.
GARAY Model
Double Spending:
• A crucial issue in Bitcoin (or any electronic payment system) is the need to
prevent double-spending attacks.
• In the case of Bitcoin, a double-spending attack can occur when an attacker first
transfer funds to an account to obtain goods or services from the account holder,
and then manipulates the transaction history to reverse the initial credit to the
account holder.
• This allows the attacker to retain their bitcoin while still benefiting from the goods
or services received, enabling them to spend the same bitcoin elsewhere.
GARAY Model
Double Spending:
GARAY Model
• Common Prefix: The common prefix property Qcp with parameter k ∈ N states that for any
pair of honest players P1, P2 adopting the chains C1, C2 then it holds as long as removing k
blocks from P1 honest party’s chain results to a prefix of P2 honest party’s chain.
• Chain Quality: The chain quality property Qcq with parameters µ ∈ R and l ∈ N states that
for any honest party P with chain C it holds that for any consecutive blocks of C the ratio
of honest blocks is at least µ.
• Chain Growth: The chain growth property Qcg with parameters τ ∈ R and s ∈ N states that
for any honest party P that has a chain C it holds that after any s consecutive rounds it
adopts a chain that is at least τ · s blocks longer than C.
GARAY Model
Then do “work”
ctr := 0; while Hash(ctr; Hash(𝜏, tx)) > T do ctr++
T: block’s “target” (difficulty level)
(T= 000000000000000000049ca90000000000000000000000000000000000000000)
Participants must own coins or tokens to Participants must buy equipment and
become a validator energy to become a miner