how merkle trees enable the decentralized web
play

How Merkle trees enable the decentralized Web! @taravancil - PowerPoint PPT Presentation

How Merkle trees enable the decentralized Web! @taravancil taravancil.com RESOURCES Host-based addressing youtube.com/myvideo Host-based addressing youtube.com/myvideo -> vimeo.com/myvideo Content addressing - hash functions Content


  1. How Merkle trees enable the decentralized Web! @taravancil taravancil.com

  2. RESOURCES

  3. Host-based addressing youtube.com/myvideo

  4. Host-based addressing youtube.com/myvideo -> vimeo.com/myvideo

  5. Content addressing - hash functions

  6. Content addressing - hash functions 2cf24dba5fb0a30e26e83b2ac5 hash( ) -> b9e29e1b161e5c1fa7425e7304 3362938b9824

  7. Regular binary tree 7 6 5 1 2 3 4

  8. = hash(left, right) R L = hash(data) L R L R

  9. Merkle tree 1 2 3 4

  10. Merkle tree 1 2 h(1) h(2) h(3) h(4) 3 4

  11. Merkle tree h(h(3), h(4)) B h(h(1), h(2)) A 1 2 h(1) h(2) h(3) h(4) 3 4

  12. Merkle tree h(A, B) C h(h(3), h(4)) B h(h(1), h(2)) A 1 2 h(1) h(2) h(3) h(4) 3 4

  13. Merkle tree Root hash h(A, B) C h(h(3), h(4)) h(h(1), h(2)) B A 1 2 h(1) h(2) h(3) h(4) 3 4

  14. Checking for equality C != F F C E B A A h(1) h(2) h(3) h(5) h(1) h(2) h(3) h(4)

  15. C C B A 1 2 h(1) h(2) h(3) h(4) 3 4

  16. What if? hash( ) 1 2 3 4 = Root hash

  17. partial verification

  18. UNTRUSTED PEER RECIPIENT C

  19. UNTRUSTED PEER RECIPIENT 4 C

  20. UNTRUSTED PEER RECIPIENT 4 C h(4)

  21. UNTRUSTED PEER RECIPIENT 4 C h(3) B h(3) h(4)

  22. UNTRUSTED PEER RECIPIENT 4 C h(3) B A A h(3) h(4)

  23. thanks! @taravancil

Recommend


More recommend