Visa, PayPal, bitcoin. The last, it seems, is not like the others.
You might be thinking, well, of course. Itâs unique compared to older institutions, ones that first made digital currency possible by storing payment data in centralized databases.
But, that might be only one way of looking at it.
Computer scientists and developers are quick to note that the reason bitcoin has succeeded at decentralizing its monetary system is because it improves on past computer consensus protocols, a point that Cornell associate professor Elaine Shi stressed in her presentation at the recent Stanford blockchain security conference.
Even after 30 years of research, Shi explained, classical consensus protocols fail under certain conditions. But she believes bitcoin is different because itâs more ârobustâ.
However, defining and mathematically spelling out these differences isnât so easy to do.
Shi told CoinDesk:
âThe protocolâs success is kind of ahead of the scientific understanding.â
Despite the challenge, the academic seems determined to catch up.
Sitting in the cold after a long day of security presentations, she chatted excitedly about bitcoinâs unique properties.
She noted that other recent research has sought to develop a formal security proof for bitcoin, and that thinkers from IC3 and elsewhere are now looking to help flag potential vulnerabilities and to inform future research into the protocol.
Shiâs curiosity was first piqued in 2010 or 2011 while she was working for the technology company Xerox PARC in Palo Alto.
It was then that her friend, a hobbyist and miner, showed her the bitcoin white paper. They read through it together, fascinated.
âWe tried to understand why bitcoin took off,â she said.
From her point of view, it was a big deal that the currency saw so much use compared to ecash, a technology put into the world by long-time cryptographer David Chaum in the mid-1990s.
âAt that time, they adopted more sophisticated crypto. But there wasnât so much traction,â she said.
She added that she was impressed that bitcoin, in contrast, saw more rapid adoption and uses simple cryptography â public key encryption, signatures and hash functions.
âOne big thing for bitcoin was that it made the incentives right. It gave incentives to early adopters. There are various other aspects that maybe it did right in terms of incentives and possibly helped with adoption and how it gained popularity,â she added.
Later on, Shi moved to University of Maryland, where she continued her bitcoin research, and then to Cornellâs Initiative For CryptoCurrencies & Contracts (IC3), the universityâs center for study on all things blockchain.
Her presentation at Stanford, âRethinking Large-Scale Consensus,â discussed her new research, aimed at rethinking how bitcoin might work differently, but retain its unique properties. The result is her proposed âsleepyâ model of consensus.
She noted that when she asked why people were exploring the use of a blockchain rather than a long-studied classical protocol, such as PBFT, people would typically respond âbecause itâs more robustâ.
This is the common wisdom. But, she noted that from an academic perspective, itâs been difficult to even define what ârobustâ means exactly.
In this light, âsleepy consensusâ explores a specific piece of bitcoinâs robustness: sporadic participation, where nodes can leave and enter the system as they please. It further examines whether a system can be as robust without proof-of-work, the algorithm that leads to one agreed-upon transaction history
In Shiâs model, there are âsleepyâ nodes (that are offline) and âawakeâ nodes (that are online and active).
Shi displayed images of Snow White to show each state, and to demonstrate that that nodes can shift between these two states.
âFor example, when the prince kisses Snow White, she wakes up and continues to participate,â she said. âSnow White is a very robust princess.â
One way to test the robustness of the system is to see whether it can come to agreement when 51% of the online nodes are âhonestâ (and therefore will not accept an invalid transaction), even with this property of sporadic participation.
Classical models fail here. In fact, Shi went as far as to say that no classical protocol, whether synchronous or asynchronous, holds up. Not even when 99% of the online nodes are honest.
She concluded that bitcoin, as conventional wisdom says, is indeed robust. Itâs a system thatâs been up and running for eight years, and that continues to work as long as 51% of nodes are honest.
âSleepyâ consensus builds on that robustness, but rearranges the protocol in a way that ditches bitcoinâs proof-of-work.
The research team found that the tweaked system was more robust in some ways, but with the new construction, new security problems also sprung up.
Work is ongoing here, and Shi said that, for now, the protocol is suitable for consortium blockchains along the lines of those released by the Linux-led Hyperledger.
Though, again, there are perhaps other elements to bitcoinâs ârobustnessâ.
Another project from Shi and IC3, FruitChains, explores bitcoinâs game theoretical component, or how it incentivizes participants to act in a way that ultimately benefits everyone.
The result of the research is a proposal for a âfair blockchainâ, where block rewards and transaction fees are evenly distributed and thereâs less variance in rewards.
Analyzing each piece on its own could lead to something bigger.
âIn general, we need a new scientific foundation for all of this,â Shi said.
Yet, Shi emphasized that this research is not about defining things just for the sake of academic curiosity.
Once people understand the protocols better, there are different, perhaps unexpected, directions to go. Broadly, researchers will have a better understanding of how public blockchains can be improved.
Proof-of-work is expensive, for example, as powerful computers from around the world are currently hashing puzzles at dizzying rates to secure blockchains like bitcoin and ethereum. Many researchers, such as those working on proof-of-stake for ethereum, are trying to develop a way around these massive electricity demands.
More research could help determine whether or not those efforts are in vain.
Furthermore, Shi argues that itâs important to work on understanding the security of the protocol, and writing up mathematical proofs that could potentially bring to light hidden protocol flaws.
âPeople have somehow developed these very nice intuitions, but itâs still very, very difficult to like design a provably correct protocol. Thatâs very, very important when youâre dealing with something like cryptocurrency, because if the protocol is broken then your money is at stake,â she said.
A âprovably correctâ protocol, on the other hand, is one that satisfies certain mathematical requirements.
She mentioned that such a protocol could help ward off future situations along the lines of The DAO â the ethereum project that ended in failure.
âItâs very easy to make a mistake unless you go through this whole process,â she said. âI think that both in academia and in industry thereâs this huge need for these protocols, including both consensus and cryptography.â
She also argued that smart contracts require more advanced cryptography protocols.
âIC3 would like to help make these secure by constructing protocols. And deploy them in the real world,â she added.
Beyond all that, Shi has other research ideas.
One potential project is to design a programming language that would let coders with little knowledge of cryptography create more secure apps. Programmers could state vaguely what security properties they need, and the programming language itself would decide what consensus protocol would be best used under the hood.
To Shi, the ability to combine disciplines in such a way is partly whatâs so exciting. And, bitcoin is a rich area to experiment with cryptography in particular, she said.
She concluded:
âThis is like the goldmine of problems.â
Bitcoin maze image via Shutterstock