...by Daniel Szego
quote
"On a long enough timeline we will all become Satoshi Nakamoto.."
Daniel Szego

Sunday, May 13, 2018

Notes on highly secure software architectures


The basic architectural elements of Blockchain give the possibility for realizing highly trusted and secure computational architecture, even if they are not manifested in a decentralized peer 2 peer manner. Elements of the secure computation are the basic cryptographic elements, like public and private key infrastructures or hash functions. Services of such a highly secure architecture might be: - secure computation: for certain critical computations the requirement to sign either the computation or the result with multiply keys of multiply actors. 
- secure data structure: for the data structures to be organized in a hash structure, implying hash pointers showing to the result of other hashed data elements, providing a highly hacker resistant data structure. 
- proof of work: putting proof of work into the system implying that the security system will be more resistant against exhaustive search attacks. 
- secure architecture: combining the previous elements together to form a highly secure, highly hacker resistant software architecture.