Overview
This course aims to teach learners about redactable blockchain in the permissionless setting. The learning outcomes include understanding the challenges posed by harmful data in immutable blockchains like Bitcoin, and the proposal of an efficient redactable blockchain solution that does not rely on heavy cryptographic tools or trust assumptions. The course covers topics such as consensus-based voting, policy parameters for redactions, public verifiability, and accountability for redacted chains. The teaching method involves presenting formal security definitions, proofs, and a proof-of-concept implementation. This course is intended for individuals interested in blockchain technology, data security, and law enforcement agencies dealing with harmful data on public blockchains.
Syllabus
Intro
What data can this be
Why is this a problem
This clearly is a problem
Our solution
Dropping data
verifying hash links
adversary
Trusted Authority
Similar Solutions
Key Challenges
Our Protocol
Formalism
Properties
Block Header Structure
Request for Reduction
Candidate Pool
Miner Deliberation
Validation
Block Modification
Candidate Block
Deliberation
Public Verification
Questions
Taught by
IEEE Symposium on Security and Privacy