/derosuite

DERO: Secure, Anonymous Blockchain with Smart Contracts. Subscribe to Dero announcements by sending mail to lists@dero.io with subject: subscribe announcements

Primary LanguageGoOtherNOASSERTION

Welcome to the Dero Project

DERO News Forum Wiki Explorer Source Twitter Discord Github Stats WebWallet Medium

Important Notice 26 FEB 2022:

DERO has migrated from Atlantis(CryptoNote) to it's own DERO Homomorphic Encrytion Blockchain Protocol on 26 Feb 2022 with code name Stargate.
Homomorphic Encryption offers offers very high level of privacy.
Please visit new repo of DERO-HE.
For migration of your DERO from DERO-Atlantis to new DERO-Stargate check DERO swap-HowTO.
This repo is now outdated and will be archived.

Table of Contents

  1. ABOUT DERO PROJECT
  2. DERO Crypto
  3. DERO PORTS
  4. Technical
  5. DERO blockchain salient features
  6. DERO Innovations
    1. Dero DAG
    2. Client Protocol
    3. Dero Rocket Bulletproofs
    4. 51% Attack Resistant
  7. DERO Mining
  8. DERO Installation
    1. Installation From Source
    2. Installation From Binary
  9. Next Step After DERO Installation
    1. Running DERO Daemon
    2. Running DERO wallet
      1. DERO Cmdline Wallet
      2. DERO WebWallet
      3. DERO Gui Wallet
  10. DERO Explorer
  11. Proving DERO Transactions

ABOUT DERO PROJECT

        DERO is decentralized DAG(Directed Acyclic Graph) based blockchain with enhanced reliability, privacy, security, and usability. Consensus algorithm is PoW based on DERO AstroBWT: ASIC/FPGA/GPU resistant CPU mining algorithm . DERO is industry leading and the first blockchain to have bulletproofs, TLS encrypted Network.
        DERO is the first crypto project to combine a Proof of Work blockchain with a DAG block structure and wholly anonymous transactions based on CryptoNote Protocol. The fully distributed ledger processes transactions with a twelve-second average block time and is secure against majority hashrate attacks. DERO will be the first CryptoNote blockchain to have smart contracts on its native chain without any extra layers or secondary blockchains. At present DERO have Smart Contracts on testnet.

DERO Crypto

        Secure and fast crypto is the basic necessity of this project and adequate amount of time has been devoted to develop/study/implement/audit it. Most of the crypto such as ring signatures have been studied by various researchers and are in production by number of projects. As far as the Bulletproofs are considered, since DERO is the first one to implement/deploy, they have been given a more detailed look. First, a bare bones bulletproofs was implemented, then implementations in development were studied (Benedict Bunz,XMR, Dalek Bulletproofs) and thus improving our own implementation.
        Some new improvements were discovered and implemented (There are number of other improvements which are not explained here). Major improvements are in the Double-Base Double-Scalar Multiplication while validating bulletproofs. A typical bulletproof takes ~15-17 ms to verify. Optimised bulletproofs takes ~1 to ~2 ms(simple bulletproof, no aggregate/batching). Since, in the case of bulletproofs the bases are fixed, we can use precompute table to convert 64*2 Base Scalar multiplication into doublings and additions (NOTE: We do not use Bos-Coster/Pippienger methods). This time can be again easily decreased to .5 ms with some more optimizations. With batching and aggregation, 5000 range-proofs (~2500 TX) can be easily verified on even a laptop. The implementation for bulletproofs is in github.com/deroproject/derosuite/crypto/ringct/bulletproof.go , optimized version is in github.com/deroproject/derosuite/crypto/ringct/bulletproof_ultrafast.go

        There are other optimizations such as base-scalar multiplication could be done in less than a microsecond. Some of these optimizations are not yet deployed and may be deployed at a later stage.

DERO PORTS

Mainnet:
P2P Default Port: 20202
RPC Default Port: 20206
Wallet RPC Default Port: 20209

Testnet:
P2P Default Port: 30303
RPC Default Port: 30306
Wallet RPC Default Port: 30309

Technical

        For specific details of current DERO core (daemon) implementation and capabilities, see below:

  1. DAG: No orphan blocks, No soft-forks.
  2. BulletProofs: Zero Knowledge range-proofs(NIZK)
  3. Cryptonight Hash: This is memory-bound algorithm. This provides assurance that all miners are equal. ( No miner has any advantage over common miners).
  4. P2P Protocol: This layers controls exchange of blocks, transactions and blockchain itself.
  5. Pederson Commitment: (Part of ring confidential transactions): Pederson commitment algorithm is a cryptographic primitive that allows user to commit to a chosen value while keeping it hidden to others. Pederson commitment is used to hide all amounts without revealing the actual amount. It is a homomorphic commitment scheme.
  6. Borromean Signature: (Part of ring confidential transactions): Borromean Signatures are used to prove that the commitment has a specific value, without revealing the value itself.
  7. Additive Homomorphic Encryption: Additive Homomorphic Encryption is used to prove that sum of encrypted Input transaction amounts is EQUAL to sum of encrypted output amounts. This is based on Homomorphic Pederson commitment scheme.
  8. Multilayered Linkable Spontaneous Anonymous Group (MLSAG) : (Part of ring confidential transactions): MLSAG gives DERO untraceability and increases privacy and fungibility. MLSAG is a user controlled parameter ( Mixin) which the user can change to improve his privacy. Mixin of minimal amount is enforced and user cannot disable it.
  9. Ring Confidential Transactions: Gives untraceability , privacy and fungibility while making sure that the system is stable and secure.
  10. Core-Consensus Protocol implemented: Consensus protocol serves 2 major purpose
  11. Protects the system from adversaries and protects it from forking and tampering.
  12. Next block in the chain is the one and only correct version of truth ( balances).
  13. Proof-of-Work(PoW) algorithm: PoW part of core consensus protocol which is used to cryptographically prove that X amount of work has been done to successfully find a block.
  14. Difficulty algorithm: Difficulty algorithm controls the system so as blocks are found roughly at the same speed, irrespective of the number and amount of mining power deployed.
  15. Serialization/De-serialization of blocks: Capability to encode/decode/process blocks .
  16. Serialization/De-serialization of transactions: Capability to encode/decode/process transactions.
  17. Transaction validity and verification: Any transactions flowing within the DERO network are validated,verified.
  18. Socks proxy: Socks proxy has been implemented and integrated within the daemon to decrease user identifiability and improve user anonymity.
  19. Interactive daemon can print blocks, txs, even entire blockchain from within the daemon
  20. status, diff, print_bc, print_block, print_tx and several other commands implemented
  21. GO DERO Daemon has both mainnet, testnet support.
  22. Enhanced Reliability, Privacy, Security, Useability, Portabilty assured.

DERO blockchain salient features

DERO Innovations

        Following are DERO first and leading innovations.

DERO DAG

        DERO DAG implementation builds outs a main chain from the DAG network of blocks which refers to main blocks (100% reward) and side blocks (8% rewards).

DERO DAG stats.dero.io
DERO DAG Screenshot Live

DERO DAG network.dero.io
DERO DAG Screenshot Live

Client Protocol

        Traditional Blockchains process blocks as single unit of computation(if a double-spend tx occurs within the block, entire block is rejected). However DERO network accepts such blocks since DERO blockchain considers transaction as a single unit of computation.DERO blocks may contain duplicate or double-spend transactions which are filtered by client protocol and ignored by the network. DERO DAG processes transactions atomically one transaction at a time.

DERO Rocket Bulletproofs

  • Dero ultrafast bulletproofs optimization techniques in the form used did not exist anywhere in publicly available cryptography literature at the time of implementation. Please contact for any source/reference to include here if it exists. Ultrafast optimizations verifies Dero bulletproofs 10 times faster than other/original bulletproof implementations. See: https://github.com/deroproject/derosuite/blob/master/crypto/ringct/bulletproof_ultrafast.go

  • DERO rocket bulletproof implementations are hardened, which protects DERO from certain class of attacks.

  • DERO rocket bulletproof transactions structures are not compatible with other implementations.

        Also there are several optimizations planned in near future in Dero rocket bulletproofs which will lead to several times performance boost. Presently they are under study for bugs, verifications, compatibilty etc.

51% Attack Resistant

        DERO DAG implementation builds outs a main chain from the DAG network of blocks which refers to main blocks (100% reward) and side blocks (8% rewards). Side blocks contribute to chain PoW security and thus traditional 51% attacks are not possible on DERO network. If DERO network finds another block at the same height, instead of choosing one, DERO include both blocks. Thus, rendering the 51% attack futile.

DERO Mining

Mining

DERO Installation

        DERO is written in golang and very easy to install both from source and binary.

Installation From Source

  1. Install Golang, Golang version 1.12.12 required.
  2. In go workspace: go get -u github.com/deroproject/derosuite/...
  3. Check go workspace bin folder for binaries.
  4. For example on Linux machine following binaries will be created:
    1. derod-linux-amd64 -> DERO daemon.
    2. dero-wallet-cli-linux-amd64 -> DERO cmdline wallet.
    3. explorer-linux-amd64 -> DERO Explorer. Yes, DERO has prebuilt personal explorer also for advance privacy users.

Installation From Binary

        Download DERO binaries for ARM, INTEL, MAC platform and Windows, Mac, FreeBSD, OpenBSD, Linux etc. operating systems.
Most users required following binaries:
Windows 7-10, Server 64bit/amd64
Windows 32bit/x86/386
Linux 64bit/amd64
Linux 32bit/x86
FreeBSD 64bit/amd64
OpenBSD 64bit/amd64
Mac OS
Contact for support of other hardware and OS.

Next Step After DERO Installation

        Running DERO daemon supports DERO network and shows your support to privacy.

Running DERO Daemon

        Run derod.exe or derod-linux-amd64 depending on your operating system. It will start syncing.

  1. DERO daemon core cryptography is highly optimized and fast.
  2. Use dedicated machine and SSD for best results.
  3. VPS with 2-4 Cores, 4GB RAM, 60GB disk is recommended.

DERO Daemon
DERO Daemon Screenshot

Running DERO Wallet

Dero cmdline wallet is most reliable and has support of all functions. Cmdline wallet is most secure and reliable.

DERO Cmdline Wallet

        DERO cmdline wallet is menu based and very easy to operate. Use various options to create, recover, transfer balance etc.
NOTE: DERO cmdline wallet by default connects DERO daemon running on local machine on port 20206.
If DERO daemon is not running start DERO wallet with --remote option like following:
./dero-wallet-cli-linux-amd64 --remote

DERO Wallet
DERO Cmdline Wallet Screenshot

DERO WEB Wallet

        Web Wallet runs in your browser, your seeds, keys etc. never leave your browser.

DERO GUI Wallet

        Download DERO GUI Wallet

DERO Explorer

DERO Explorer is used to check and confirm transaction on DERO Network.
DERO users can run their own explorer on local machine and can browse on local machine port 8080.
DERO Explorer DERO EXPLORER Screenshot

Proving DERO Transactions

DERO blockchain is completely private, so anyone cannot view, confirm, verify any other's wallet balance or any transactions. So to prove any transaction you require Tx private key and receiver address.
Tx private key can be obtained using get_tx_key command in dero-wallet-cli.
Enter the Tx private key and receiver address in DERO EXPLORER
DERO Explorer Proving Transaction DERO Explorer Proving Transaction