Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
METHODS FOR PREVENTING FRONT RUNNING IN DIGITAL ASSET TRANSACTIONS
Document Type and Number:
WIPO Patent Application WO/2019/156705
Kind Code:
A1
Abstract:
Provided is a method for matching orders of digital assets. The method comprises: receiving a plurality orders of digital asset from a plurality addresses on a distributed ledger, wherein each of the orders comprises a digital signature of the address, an authorizing public key, and an authorizing private key.

Inventors:
WANG DONG (US)
Application Number:
PCT/US2018/040530
Publication Date:
August 15, 2019
Filing Date:
July 02, 2018
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
LOOPRING PROJECT LTD (VG)
WANG DONG (US)
International Classes:
G06F21/10; G06F21/51; G06F21/60; G06Q20/06; G07F19/00; H04L9/08
Domestic Patent References:
WO2017195164A12017-11-16
WO2018020389A22018-02-01
Foreign References:
US9875510B12018-01-23
Attorney, Agent or Firm:
ZHANG, Yi (US)
Download PDF:
Claims:
WHAT IS CLAIMED IS:

1. A method for matching orders of digital assets, the method comprising:

receiving n orders of digital asset from n addresses on a distributed ledger, wherein n is an integer of at least 2, and wherein the ith order (1 < i < n) is received from the ith address and comprises

an ith order’ s digital signature,

an ith order’s authoring public key, and

an ith order’s authoring private key;

determining in a server that the n orders are matched;

generating n authoring digital signatures using each of the n authoring private keys; and

sending a transaction on the distributed ledger, wherein the transaction comprises the n authoring digital signatures.

2. The method of claim 1, wherein at least one of the digital assets is a cryptocurrency.

3. The method of claim 1, wherein the distributed ledger is Bitcoin, Ethereum, Bitcoin Cash, Cardano, Stellar, NEO, Qtum, EOS, IOTA, Monero or BitShares.

4. The method of claim 1, wherein the distributed ledger, after receiving the transaction, determines that each of the n addresses is not overspending.

5. The method of claim 5, wherein the distributed ledger, after determining that each of the n addresses is not overspending, completes the transaction according to the n orders.

6. The method of claim 1, wherein the transaction does not include any of the authoring private key.

7. The method of claim 1, wherein the transaction further comprises a server’s digital signature generated by using a server’s private key.

8. A non-transitory readable storage medium including instructions, executable by a processor in a terminal, for matching orders of digital assets, the method comprising: receiving n orders of digital asset from n addresses on a distributed ledger, wherein n is an integer of at least 2, and wherein the ith order (1 < i < n) is received from the ith address and comprises

an ith order’ s digital signature,

an ith order’s authoring public key, and

an ith order’s authoring private key;

determining in a server that the n orders are matched;

generating n authoring digital signatures using each of the n authoring private keys; and

sending a transaction on the distributed ledger, wherein the transaction comprises the n authoring digital signatures.

9. The non-transitory readable storage medium of claim 8, wherein at least one of the digital assets is a cryptocurrency.

10. The non-transitory readable storage medium of claim 9, wherein the distributed ledger is Bitcoin, Ethereum, Bitcoin Cash, Cardano, Stellar, NEO, Qtum, EOS, IOTA, Monero or BitShares.

11. The non-transitory readable storage medium of claim 8, wherein the distributed ledger, after receiving the transaction, determines that each of the n addresses is not overspending.

12. The non-transitory readable storage medium of claim 11, wherein the distributed ledger, after determining that each of the n addresses is not overspending, completes the transaction according to the n orders.

13. The non-transitory readable storage medium of claim 8, wherein the transaction does not include any of the authoring private key.

14. The non-transitory readable storage medium of claim 8, wherein the transaction further comprises a server’s digital signature generated by using a server’s private key.

15. A system for matching orders of digital assets, the system comprising: a distributed ledger comprising at least n addresses, wherein n is an integer of at least

2;

a minor which

receives n orders of digital asset from the n addresses, wherein the ith order (1 < i < n) is received from the ith address and comprises

an ith order’ s digital signature,

an ith order’s authoring public key, and

an ith order’s authoring private key;

determines in a server that the n orders are matched;

generates n authoring digital signatures using each of the n authoring private keys; and

sends a transaction on the distributed ledger, wherein the transaction comprises the n authoring digital signatures; and

a settler which completes the transaction on the distributed ledger.

16. The system of claim 15, wherein at least one of the digital assets is a cryptocurrency.

17. The system of claim 16, wherein the distributed ledger is Bitcoin, Ethereum, Bitcoin Cash, Cardano, Stellar, NEO, Qtum, EOS, IOTA, Monero or BitShares.

18. The system of claim 15, wherein the distributed ledger, after receiving the transaction, determines that each of the n addresses is not overspending.

19. The system of claim 15, wherein the transaction does not include any of the authoring private key.

20. The system of claim 15, wherein the transaction further comprises a miner’s digital signature generated by using a miner’s private key.

Description:
METHODS FOR PREVENTING FRONT RUNNING IN DIGITAL ASSET

TRANSACTIONS

CROSS-REFERENCE TO RELATED APPLICATIONS

[0001] This application claims priority to ET.S. provisional patent application nos.

62/629,056, filed February 11, 2018, and 62/629,058, filed February 11, 2018, the disclosure of which is incorporated herein by reference.

FIELD OF THE INVENTION

[0002] The present invention generally relates to digital assets transaction.

BACKGROUND

[0003] With the proliferation of blockchain-based assets, the need to exchange these assets amongst counterparties has significantly increased. As thousands of new tokens are introduced, including the tokenization of traditional assets, this need is magnified. Whether exchanging tokens for speculative trading motivations or converting to access networks via their native utility tokens, the ability to exchange one cryptoasset for another is foundational for the larger ecosystem. Indeed, there is a potential energy in assets, and realizing this energy, i.e., unlocking capital, requires not only asserting ownership, which blockchains have immutably allowed for, but the ability to freely transfer and transform these assets.

[0004] As such, the trustless exchange of tokens (value) is a compelling use case for blockchain technology. Until now, however, crypto enthusiasts have largely settled for trading tokens on traditional centralized exchanges. A new method and system for digital asset transaction is needed because, just as Bitcoin dutifully emphasized, in regards to peer- to-peer electronic cash, the main benefits are lost if a trusted third party is still required to prevent double-spending, so too are the main benefits of decentralized assets lost if they must pass through trusted, gated, centralized exchanges.

[0005] Trading decentralized tokens on centralized exchanges doesn't make sense from a philosophical perspective, as it fails to uphold the virtues these decentralized projects espouse. There are also numerous practical risks and limitations in using centralized exchanges which are described below. Decentralized exchanges (DEXs) have sought to address these issues, and in many cases have succeeded in alleviating security risks by using blockchains for disintermediation. However, as DEX capability becomes crucial

infrastructure for the new economy, there is substantial room for performance improvement. [0006] There are three primary risks in centralized exchanges: 1) lack of security; 2) lack of transparency; and 3) lack of liquidity.

[0007] Lack of security arises from users typically surrendering control of their private-keys (funds) to one centralized entity. This exposes users to the possibility that centralized exchanges fall prey to malicious hackers. The security and hacking risks facing all centralized exchanges are well known, yet are often accepted as“table stakes" for token trading. Centralized exchanges continue to be honeypots for hackers to attack as their servers have custody over millions of dollars of user funds. Exchange developers can also make honest, accidental errors with user funds. Simply, users are not in control of their own tokens when deposited at a centralized exchange.

[0008] Lack of transparency exposes users to the risk of dishonest exchanges acting unfairly. The distinction here is by the exchange operator's malicious intentions, as users are not truly trading their own assets on centralized exchanges, but rather, an IOU. When tokens are sent to the exchange's wallet, the exchange takes custody, and offers an IOU in its place. All trades are then effectively between users’ IOUs. To withdraw, users redeem their IOU with the exchange, and receive their tokens to their external wallet address. Throughout this process there is a lack of transparency, and the exchange can shutdown, freeze your account, go bankrupt, etc. It is also possible that they use user assets for other purposes while in custody, such as lending them out to third parties. Lack of transparency can cost users without a total loss of funds, such as in higher trading fees, delays at peak demand, regulatory risk, and orders being front ran.

[0009] Lack of liquidity is another inadequacy of centralized exchange. From the point of view of exchange operators, fragmented liquidity inhibits entry by new exchanges because of two winner-takes-all scenarios. First, the exchange with the greatest number of trading pairs wins, because users find it desirable to conduct all their trades on one exchange. Second, the exchange with the largest order book wins, because of favorable bid-ask spreads for each trading pair. This discourages competition from newcomers because it is difficult for them to build up initial liquidity. As a result, many exchanges command a high market share despite user complaints and even major hacking incidents. It’s worth noting that as centralized exchanges win market share, they become an ever-larger hacking target.

[0010] From the point of view of users, fragmented liquidity significantly reduces user experience. In a centralized exchange, users are only able to trade within the exchange’s own liquidity pools, against its own order book, and between its supported token pairs. To trade token A for token B, users must go to an exchange that supports both tokens or register at different exchanges, disclosing personal information. Users often need to execute preliminary or intermediate trades, typically against BTC or ETH, paying bid-ask spreads in the process. Finally, the order books may not be deep enough to complete the trade without material slippage. Even if the exchange purports to process large volumes, there is no guarantee that this volume and liquidity is not fake. The result is disconnected silos of liquidity and a fragmented ecosystem that resembles the legacy financial system, with significant trading volume centralized on few exchanges. The global liquidity promises of blockchains hold no merit within centralized exchanges.

[0011] On the other hand, current decentralized exchanges have their own

inadequacies. Decentralized exchanges differ from centralized exchanges in part because users maintain control of their private-keys (assets) by performing trades directly on the underlying blockchain. By leveraging the trustless technology of cryptocurrencies themselves, they successfully mitigate many of the abovementioned risks surrounding security. However, problems persist in regards to performance and structural limitations. Liquidity often remains an issue as users must search for counterparties across disparate liquidity pools and standards. Fragmented liquidity effects are present if DEXs or dApps at large don’t employ consistent standards to interoperate, and if orders are not

shared/propagated across a wide network. The liquidity of limit order books, and, specifically, their resiliency, i.e., how fast filled limit orders are regenerated, can significantly affect optimal trading strategies. The absence of such standards has resulted not only in reduced liquidity, but also exposure to an array of potentially insecure proprietary smart contracts.

[0012] Furthermore, since trades are performed on chain, DEXs inherit the limitations of the underlying blockchain, namely: scalability, delays in execution (mining), and costly modifications to orders. Thus, blockchain order books do not scale particularly well, as executing code on the blockchain incurs a cost (gas), making multiple order-cancellation cadences prohibitively expensive.

[0013] Finally, because blockchain order books are public, the transaction to place an order is visible by miners as it awaits being mined into the next block and placed into an order book. This delay exposes the user to the risk of being front run and having the price or execution move against him. Front running is the illegal practice of a stockbroker executing orders on a security for its own account while taking advantage of advance knowledge of pending orders from its customers. In decentralized exchanges, front-running means someone tries to mine transactions before mining other transactions that are already in the pending transaction pool (mempool). This can be achieved by specifying a higher transaction fee (gas price), and if the front-runner happen to be a miner he can order pending transactions in a way that benefits himself.

[0014] Therefore, there is an urgent need to develop a method and system to solve the aforementioned issues.

SUMMARY

[0001] The present disclosure in one aspect provides a method for matching orders of digital asset. The method prevents ring-filch and order-filch while still ensures the settlement of rings can be done in one single transaction.

[0015] In one embodiment, the method comprises: receiving n orders of digital asset from n addresses on a distributed ledger, wherein n is an integer of at least 2, and wherein the ith order (1 < i < n) is received from the ith address and comprises a digital signature of the ith address, an ith authorizing public key, and an ith authorizing private key; determining in a server that the n orders are matched; generating n digital signature of the server using each of the n authorizing private keys; and sending a transaction to the smart contract on the distributed ledger, wherein the transaction comprises digital signatures of each of the n addresses and the n signature of the server.

[0016] In some embodiments, at least one of the digital assets is a cryptocurrency.

[0017] In some embodiments, the distributed ledger is Bitcoin, Ethereum, Bitcoin

Cash, Cardano, Stellar, NEO, Qtum, EOS, IOTA, Monero or BitShares.

[0018] In some embodiments, the distributed ledger, after receiving the smart contract, determines that each of the n addresses is not overspending.

[0019] In some embodiments, the distributed ledger, after determining that each of the n addresses is not overspending, completes the transaction according to the n orders.

[0020] The present disclosure in another aspect provides a non-transitory readable storage medium including instructions, executable by a processor in a terminal, for matching orders of digital assets.

BRIEF DESCRIPTION OF DRAWINGS

[0021] The accompanying drawings, which are incorporated herein, form part of the specification. Together with this written description, the drawings further serve to explain the principles of, and to enable a person skilled in the relevant art(s), to make and use the present invention. [0022] FIG. 1 illustrates an order-ring of three order under an exemplary method of the present invention.

[0023] FIG. 2 illustrates the general sequence of steps for exchange process under an exemplary method of the present invention.

[0024] FIG. 3 illustrates an order-ring with sub-ring under an exemplary method of the present invention.

[0025] FIG. 4 illustrates a ring settlement under an exemplary method of the present invention.

[0026] FIG. 5 illustrates a 60% margin split under an exemplary method of the present invention.

[0027] FIG. 6 illustrates a fee model under an exemplary method of the present invention.

[0028] FIG. 7 illustrates a scheme of order signature signed against the order’s hash.

[0029] FIG. 8 illustrates a scheme of ring signature signed against all the order hashs.

[0030] FIG. 9 illustrates the payload of a submitRing transaction for a ring of 3 orders.

[0031] FIG. 10 illustrates the payload filched for a Ring settlement.

[0032] FIG. 11 illustrates an order of dual authorization used in a method of the present invention.

[0033] FIG. 12 illustrates an exemplary ring-signing process in a method of the present invention.

[0034] FIG. 13 illustrates a ring seen in an on-chain transaction.

DESCRIPTION OF THE INVENTION

[0035] The following description of the disclosure is merely intended to illustrate various embodiments of the disclosure. As such, the specific modifications discussed are not to be construed as limitations on the scope of the disclosure. It will be apparent to one skilled in the art that various equivalents, changes, and modifications may be made without departing from the scope of the disclosure, and it is understood that such equivalent embodiments are to be included herein. All references cited herein, including publications, patents and patent applications are incorporated herein by reference in their entirety.

Definition [0036] The following definitions are provided to assist the reader. Unless otherwise defined, all terms of art, notations and other scientific or medical terms or terminology used herein are intended to have the meanings commonly understood by those of skill in the art.

In some cases, terms with commonly understood meanings are defined herein for clarity and/or for ready reference, and the inclusion of such definitions herein should not necessarily be construed to represent a substantial difference over the definition of the term as generally understood in the art.

[0037] As used herein, the singular forms“a”,“an” and“the” include plural references unless the context clearly dictates otherwise.

[0038] As used herein, an“address” or“network address” refers to an identifier for a node or hos on a telecommunications networks. Typically, addresses are designed to be unique identifiers across the network. Examples of network addresses include, without limitation, IP address, IPX address, MAC address, etc.

[0039] “Blockchain” or“block chain” refers to a continually growing list of records, i.e., blocks, that are linked and secured using cryptography. Each block typically contains a cryptographic hash of the previous block, a timestamp and transaction data. A blockchain, by design, is inherently resistant to modification of the data. Blockchain can be used as an open, distributed ledger that records transactions between two parties efficiently and in a verifiable and permanent way. When used as a distributed ledger, a blockchain is typically managed by a peer-to-peer network collectively adhering to a protocol for validating new blocks. Once recorded, the data in any given block cannot be altered retroactively without the alteration of all subsequent blocks, which requires collusion of the network majority.

[0040] The term“cryptographic hash” or“hash” refers to a mathematical algorithm that maps data of arbitrary size to a bit string of a fixed size, and is designed to be a one-way function, that is, a function which is infeasible to invert. The only way to recreate the input data from an ideal cryptographic hash function’s output is to attempt a brute-force search of possible inputs to see if they produce a match, or use a rainbow table of matched hashes. Examples of cryptographic hash include SHA hash function, e.g., SHA-0, SHA-l, SHA-2 and SHA-3, and DSA function.

[0041] As used herein, a“digital signature” refers to a mathematical scheme for presenting the authenticity of digital messages or documents. A valid digital signature gives a recipient reason to believe that the message was created by a known sender, that the sender cannot deny having sent the message and that the message was not altered in transit. A typical digital signature scheme consists of three algorithms: a key generation algorithm that selects a private key uniformly at random from a set of possible private keys and outputs the private key and a corresponding public key; a signing algorithm that, given a message and a private key, produces a signature; and a signature verification algorithm that, given the message, public key and signature, either accepts or rejects the message’s claim to authenticity. Examples of digital signature algorithm include, without limitation, RSA based signature schemes (e.g., RSA-PSS), DSA, Edwards-curve digital signature algorithm, Rabin signature algorithm, aggregate signature, etc.

[0042] “Distributed ledger” refers to a database that is consensually shared and synchronized across network spread across multiple sites, institutions or geographies.

Distributed ledger allows transactions to have public witnesses, thereby making a cyberattack more difficult. A peer-to-peer network is usually required as well as consensus algorithm to ensure replication in nodes is undertaken. One form of distributed ledger is the blockchain system, which can be either public or private. Distributed ledger may employ a system other than blockchain to provide secure and valid achievement of distributed census.

[0043] As used herein, a“smart contact” refers to a computer protocol intended to digitally facilitate, verify or enforce the negotiation or performance of a contract. Smart contracts allow the performance of credible transactions without third parties. These transactions are trackable and irreversible. For example, smart contracts implemented on Ethereum may include those that defines the interfaces and events, that registers wallets and relays, that validates order rings, transfers tokens for settlement and emits events, that enables multi-signature ownership, and that transfers tokens on behalf of users.

Methods of Digital Asset Transaction

[0044] The present disclosure in one aspect provides methods and systems for facilitating digital asset transaction. It is understandable to those skilled in the art that such methods are implemented in a distributed network which may include one or more computer servers and devices that are connected and communicated with each other. Correspondingly, the systems disclosed herein include both hardware, such as computer servers and devices, and software. Suitable computer servers include, without limitation, a rack server, a tower server, a miniature server, a blade server, a mini rack server, a mobile server, an ultra-dense server, a super server, and may include various hardware components, for example, a mother board, a processing unit, memory systems, hard drives, network interfaces, power supplies, etc. The computer systems or devices may run an operating system including any

commercial available server operating system. The computer servers and devices may be connected and communicated through various types of networks, for example, computer networks, telecommunications networks, wireless networks, and any combinations of these an/or other networks.

[0045] Order Ring

[0046] In certain embodiments of the methods disclosed herein, the orders are expressed as token exchange requests, amountS/amountB, (amount to sell/buy) instead of bids and asks. Since every order is just an exchange rate between two tokens, one feature of the methods disclosed herein is the mixing and matching of multiple orders in circular trade. By using multiple orders instead of a single trading pair, there is a dramatic increase in liquidity and potential for price improvement.

[0047] FIG. 1 shows an order-ring of three orders under an exemplary method of the present invention. Referring to FIG. 1, each order's token to sell (tokenS) is another order's token to buy (tokenB). It creates a loop that allows each order to exchange their desired tokens without requiring an opposing order for its pair. Traditional order pair trades can, of course, still be executed, in what is essentially a special case of an order-ring.

[0048] As used herein, an“order-ring” can be defined as follows. Let Co, Ci, · C n- 1 be n different kinds of token, Oo i , · · ·, O n- i o be n orders. Those orders can form a order-ring for trading: Oo i · · · 0, , ® i · · · O n- i o, where n is the length of the ring, and i ® 1 º i + 1 mod n.

[0049] An order-ring is valid when all component transactions can be executed at an exchange rate equal to or better than the original rate specified implicitly by the user. To verify order-ring validity, the smart contracts of the methods disclosed herein must receive order-rings from ring-miners where the product of the original exchange rates of all orders is equal to or greater than 1.

[0050] The following is an example of valid order-ring. Assuming Alice and Bob want to trade their token A and B. Alice has 15 token A and she wants 4 token B for them; Bob has 10 token B and he wants 30 token A for them.

[0051] Here, who’s the buyer or sell is arbitrary and depends only on the asset fixed to give price quotations. If token A is the reference, then Alice is buying token B for the price of 15/4 = 3.75A, while Bob is selling 10 token B for the price of 30/10 = 3.00A. In the case of fixing token B as reference, Alice is selling 15 token A for the price of 4/15 =

0.26666667B and Bob is buying 10 token A for the price of 10/30 = 0.33333334B. [0052] In the first situation Alice is willing to pay a higher price (3.75 A) than the price Bob is selling his tokens for (3.00A), while in the second situation Bob is willing to pay a higher price (0.33333334B) than the price Alice is selling her tokens for (0.26666667B). It is clear that a trade is possible whenever the buyer is willing to pay an equal or higher price than the seller's price.

[0053] Thus, for a set of n orders to be able to be filled, fully or partially, it needs to know if the product of each one of the exchange rates as buy orders results in a number greater or equal to 1. If so, all the n orders can be either partially, or totally filled.

[0054] If a third counterparty, Charlie, is introduced, such that Alice wants to give xi token A and receive yi token B, Bob wants to give x 2 token B and receive yi token C, and Charlie wants to give x 3 token C and receive^ token A. The necessary tokens are present, and the trade is possible if:

[0055] Additional Components of the System

[0056] In certain embodiments, the methods and systems of the present invention involve the following components that jointly provide all functionalities a centralized exchange has to offer.

[0057] Wallets

[0058] In certain embodiments, the methods of the present invention involve a common wallet service or interface that gives users access to their tokens and a way to send orders to the network. Wallets will be incentivized to produce orders by sharing fees with ring-miners.

[0059] Consortium liquidity sharing hlockchain/relay-mesh

[0060] In certain embodiments, the methods of the present invention involve a relay- mesh network for order and liquidity sharing. When nodes run a relay software, they are able to join an existing network and share liquidity with other relays over a consortium

blockchain. In certain embodiments, the consortium blockchain has near real time order sharing (1-2 second blocks), and trims old history to allow for faster download by new nodes. Notably, relays need not join this consortium; they can act alone and not share liquidity with others, or they can start and manage their own liquidity sharing network.

[0061] Relay /ring-miners [0062] As used herein, a relay is a node that receives orders from wallets or the relay- mesh, maintains public order books and trade history, and optionally broadcasts orders to other relays (via any arbitrary off-chain medium) and/or relay-mesh nodes. Ring-mining is a feature, but not a requirement, of relays. In certain embodiments, ring-mining is

computationally heavy and is done completely off-chain. In certain embodiments, relays with the ring-mining feature are called turned on“Ring-Miners”, who produce order-rings by stitching together disparate orders. In certain embodiments, relays are free in (1) how they choose to communicate with one another, (2) how they build their order books, and (3) how they mine order-rings (mining algorithms).

[0063] Smart contracts

[0064] In certain embodiments, the methods and systems of the present invention involve a set of public smart contracts that checks order-rings received from ring-miners, trustlessly settles and transfers tokens on behalf of users, incentivizes ring-miners and wallets with fees, and emits events. In certain embodiments, relays/order browsers listen to these events to keep their order books and trade history up to date.

[0065] Asset Token Service

[0066] In certain embodiments, asset token services serve as a bridge between assets that cannot be directly traded using the methods and systems of the present invention. In certain embodiments, they are centralized services run by trustworthy companies or organizations. Users deposit assets (real, fiat or tokens from other chains) and get tokens issued, which can be redeemed for the deposit in the future.

[0067] Exchange Process

[0068] The following description refers to FIG. 2, which illustrates an exemplary method of the present disclosure where three orders are matched.

[0069] 1. Authorization

[0070] Referring to FIG. 2, user Y who wants to exchange tokens authorizes a smart contract to handle amounts of token B the user wants to sell. This does not lock the user's tokens, who remains free to move them while the order is processed.

[0071] 2. Order creation

[0072] Referring to FIG. 2. the current rate and order book for token B vs token C, are provided by relays or other agents hooked up to the network, such as order book browsers. User Y places an order (limit order) specifying amounts and amountB and other parameters through any integrated wallet interface. In certain embodiments, an amount of tokens can be added to the order as a fee for ring-miners; higher fee means a better chance to be processed earlier by ring-miners. The order's hash is signed with user Y 's private-key.

[0073] 3. Order broadcast

[0074] Referring to FIG. 2, the wallet sends the order and its signature to one or more relays. Relays update their public order book. In some embodiments, the methods of the present invention do not require order books to be built in a certain way, such as first-come- first-serve. Instead, relays have the power to make their own design decisions in building their order books.

[0075] 4. Liquidity sharing

[0076] Referring to FIG. 2, relays broadcast the order to other relays through any arbitrary communication medium. Once again, there is flexibility how/whether nodes interact. To facilitate a certain level of network connectivity, there is a built-in liquidity sharing relay-mesh using a consortium blockchain. As mentioned in the prior section, this relay-mesh is optimized for speed and inclusivity.

[0077] 5. Ring-mining (Order matching)

[0078] Referring to FIG. 2, ring-miners try to fill the order fully or partially at the given exchange rate or better by matching it with multiple other orders. In certain embodiments, ring-mining is the main reason why the methods of the present invention are able to provide high liquidity over any pair. If the executed rate is better than what user Y specified, margin is shared amongst all orders in the order-ring. As a reward, the ring-miner chooses between claiming part of the margin (Margin-Split, and giving back the tokens to the user), or simply keeping the fee.

[0079] 6. Verification and settlement

[0080] Referring to FIG. 2, the order-ring is received by the smart contract, which makes multiple checks to verify the ring-miner supplied data and determines if the order-ring can be settled fully or partially (depending on the fill rate of orders in-ring and tokens in users' wallets). If all checks are successful, the contract automatically transfers the tokens to users and pays the ring-miner and wallet fees at the same time. If user Y’s balance as determined by the smart contract is insufficient, it will be considered scaled-down: a scaled- down order will automatically scale up to its original size if sufficient funds are deposited to its address, unlike a cancellation, which is a one-way manual operation and cannot be reversed.

[0081] Operational Flexibility [0082] It's important to note that open standard of the methods described herein allows participants significant flexibility in how they operate. Actors are free to implement novel business models and provide value for users, earning fees on volume or other metrics in the process (if they so choose). The system of the present invention is modular and meant to support participation from a multitude of applications.

[0083] In certain embodiments, relays can design their order books in any number of ways to display and match users' orders. In some embodiments, limit orders are positioned based on price alone. Timestamps of orders, in other words, have no bearing on the order book. However, a relay is free to design their order book in such a way as to emulate a typical centralized exchange's matching engine, where orders are ranked by price, while respecting timestamps as well. If a relay was inclined to offer this type of order book, they can own/integrate with a wallet, and have those wallet orders sent solely to the single relay, who would then be able to match orders based on time. Any such configuration is possible. Whereas other decentralized exchange methods at times require relays to have resources - initial token balances to place taker orders - in the methods of the present invention, relays need only find matchable orders to consummate a trade and can do so without initial tokens.

[0084] In certain embodiments, relays are free to design how they share liquidity

(orders) with each other. The consortium blockchain is but one solution to accomplish this, and the system of the present invention is free to network and communicate as they wish. Besides joining a consortium blockchain, they can build and manage their own, creating rules/incentives as they see fit. Relays can also work alone, as seen in the time-sensitive wallet implementation. Of course, there are clear advantages in communicating with other relays in pursuit of network effects, however, different business models could merit peculiar sharing designs and split fees in any number of ways.

Features of the Methods

[0085] Order

[0086] As used herein, an order is a pack of data that describes the intent of the user's trade. In one embodiment, an order of the present invention is defined as follows:

Message Order {

address protocol;

address owner;

address tokenS;

address tokenB; uint256 amounts;

unit256 amountB;

uint256 IrcFee;

unit256 validSince; // Seconds since epoch

unit256 validUntil; // Seconds since epoch

uint8 marginSplitPercentage; // [1-100]

bool buyNoMoreThanAmountB;

uint256 walletld;

//Dual Authoring address

address authAddr;

// v, r, s are parts of the signature

uint8 v;

byte32 r;

byte32 s;

// Dual-Authoring private-key,

// not used for calculating order’s hash,

// thus it is NOT signed

string authKey;

}

[0087] To ensure the origin of the order, it is signed against the hash of its parameters, excluding authAddr, with the user's private-key. The authAddr parameter is used for signing order-rings that this order is part of, which prevents front-running. The signature is represented by the v, r, and 5 fields, and is sent alongside the order parameters over the network. This guarantees the order stays immutable during its whole lifetime. Even though the order never changes, the system of the present invention can still compute its current state based on the balance of its address along with other variables.

[0088] The order doesn't include a price (which must be a floating-point number by nature), but, instead uses the term rate or r, which is expressed as amounts /amountB . The rate is not a floating-point number but an expression that will only be evaluated with other unsigned integers on demand, to keep all intermediate results as unsigned integers and increase calculation accuracy.

[0089] When a ring-miner ring-matches orders, it's possible that a better rate will be executable, allowing users to get more tokenB than the amountB they specified. However, if buyNoMoreThanAmountB is set to True, the method ensures users receive no more than amountB of tokenB. Thus, the buyNoMoreThantokenB parameter determines when an order is considered completely filled. The buyNoMoreThantokenB parameter applies a cap on either amounts or amountB and allows users to express more granular trade intentions than traditional buy/sell orders.

[0090] For example: with amounts = 10 and amountB = 2, the rate r = 10/2 = 5.

Thus the user is willing to sell 5 tokenS for each tokenB. The ring-miner matches and finds the user a rate of 4, allowing the user to receive 2.5 tokenB instead of 2. However, if the user only wants 2 tokenB and set the buyNoMoreThanAmountB flag to True, the smart contract performs the transaction at a rate of 4 and the user sells 4 tokenS for each tokenB, effectively saving 2 tokenS. This does not take into account mining fees.

[0091] Indeed, if we use

Order (amounts, tokenS,

amountB, tokenB,

buyNoMoreThantokenB)

[0092] to represent an order in a simplified form, then for ETH/USD markets on a traditional exchange, traditional buy-sell modeling can express the lst and the 3rd order below, but not the other two:

[0093] 1. Sell 10 ETH at price of 300 ETSD/ETH. This order can be expressed as:

Order (10, ETH, 3000, USD, False).

[0094] 2. Sell ETH at price of 300 USD/ETH to get 3000 USD. This order can expressed as: Order (10, ETH, 3000, USD, True).

[0095] 3. Buy 10 ETH at price of 300 USD/ETH, This order can be expressed as:

Order (3000, USD, 10, ETH, True).

[0096] 4. Spend 3000 USD to buy as many ETH as possible at price of 300

USD/ETH, This order can be expressed as: Order (3000, USD, 10, ETH, False).

[0097] Ring Verification

[0098] In certain embodiments of the methods described herein, the smart contracts do not perform exchange rate or amount calculations but must receive and verify what the ring-miners supply for these values. These calculations are done by ring-miners for two main reasons: (1) the programming language for smart contracts, such as solidity on Ethereum, does not have support for floating point math, especially pow (x, 1 hi) (calculating the n-th root of a floating-point number), and (2) it is desirable for the computation to be made off- chain to reduce blockchain computation and cost.

[0099] 1. Sub-Ring checking [00100] This step prevents arbitrageurs from unfairly realizing all the margin in an order-ring by implementing new orders within it. Essentially, once a valid order-ring is found by a ring-miner, it could be tempting to add other orders to the order-ring to fully absorb the users' margin (rate discounts). As illustrated by FIG.3, carefully calculated xi, i, X2 and >'2 will make the product of all orders’ rate be exactly 1 so there will be no rate discount. This is zero-risk, zero-value add to the network, and is considered unfair conduct by the ring-miner. To prevent this, in certain embodiments, the method of the present invention requires that a valid loop cannot contain any sub-rings. To check this, the smart contract ensures a token cannot be in a buy or sell position twice. Referring to FIG.3, it can be seen that token A is a sell token twice and a buy token twice, which would be disallowed.

[00101] 2. Fill Rate Checking

[00102] The exchange rate calculations in the order-ring are made by ring-miners for reasons stated previously in the disclosure. It is the smart contract that must verify they're correct. First, it verifies that the buy rate the ring-miner can execute for each order is equal to or less than the original buy rate set by the user. This ensures the user gets at least the exchange rate they asked for or better on the transaction. Once the exchange rates are confirmed, the smart contract ensures that each order in the order-ring shares the same rate discount. For instance, if the discounted rate is g, then the price for each order will be:

r 0®i · (1 - g ), r 1®2 (1 - g ), r 2®0 (1 - y), and satisfy:

r 0®i · (1 - y), r 1®2 (1 - y), r 2®0 (1 - y) = 1

[00103] hence:

[00104] If the transaction crosses n orders, the discount is:

[00106] where r l is the order turnover rate of z-th order. Obviously, only when the discount rate is y ³ 0, can these orders be filled; and the z-th order (O 1 )’ s actual exchange rate is l = r l (1— y), l £ r l .

[00107] In the prior example where Alice has 15 token A and wants 4 token B for them, Bob has 10 token B and wants 30 token A for them. If token A is the reference, then Alice is buying token B for 15/4 = 3.75A, while Bob is selling token B for 30/10 = 3.00A.

To calculate the discount: 150/120 = 1.25 thus 1/1.25 = 0.8 = (1— y) 2 . Thus the exchange rate that renders the trade equitable for both parties is OB 3.75 « 3.3541 token A per token B. [00108] Bob gives 4 token B and receives 13.4164 token A, more than the 12 he was expecting for those 4 tokens. Alice receives 4 token B as intended but gives only 13.4164 token A in exchange, less than the 15 she was willing to give for those 4 tokens. In certain embodiments, a portion of this margin will go towards paying fees to incentivize miners (and wallets).

[00109] 3. Fill tracking and cancellation

[00110] In certain embodiments of the methods described herein, a user can partially or fully cancel an order by sending a special transaction to the smart contract, containing the details about the order and the amounts to cancel. The smart contract takes that into account, stores the amounts to cancel, and emits an OrderCancelled event to the network. The smart contract keeps track of filled and cancelled amounts by storing their values using the order's hash as an identifier. This data is publicly accessible and OrderCancelled/OrderFilled events are emitted when it changes. Tracking these values is critical for the smart contract during the order-ring settlement step. The smart contract also supports cancelling all orders for any trading pair with the OrdersCancelled event and cancelling all orders for an address with the AllOrdersCancelled event.

[00111] 4. Order scaling

[00112] In certain embodiments, orders can be scaled according to the history of filled and cancelled amounts and the current balance of the senders’ accounts. The process finds the order with the smallest amount to be filled according to the above characteristics and uses it as a reference for scaling all transactions in the order-ring.

[00113] Finding the lowest value order can help to figure out the fill volume for each order. For instance, if the z-th order is the lowest value order, then the number of tokens sold from each order s and number of tokens purchased b from each order can be calculated as:

| (HI 1 14| where s L is the balance left after orders are partially filled.

[00115] During implementation of the methods described herein, it can be safely assumed that any order in the order-ring to have the lowest value, then iterate through the order-ring at most twice to calculate each order’s fill volume. For example, if the smallest amount to be filled compared to the original order is 5%, all the transactions in the order-ring are scaled down to 5%. Once the transactions are completed, the order that was considered to have the smallest amount remaining to be filled should be completely filled.

[00116] Ring Settlement

[00117] If the order-ring fulfills all the previous checks, the order-ring can be closed, and transactions can be made. This means that all n orders form a closed order-ring, connected as in FIG. 4.

[00118] Referring to FIG. 4, to make the transactions, the method uses the

TokenTransferDelegate smart contract. For each order in the order-ring, a payment of tokenS is made to the next or the previous order depending on the implementation. Then the ring- miner's fee is paid depending on the fee model chosen by the ring-miner. Finally, once all the transactions are made, a RingMined event is emitted.

[00119] In certain embodiments, the methods described herein include an emitted event selected from the group consisting of OrderCancelled event (a specific order has been cancelled), OrdersCancelled event (all orders of a trading pair from an owning address have been cancelled; AllOrdersCancelled event (all orders of all trading pairs from an owning address have been cancelled), RingMined event (an order-ring has been settled successfully).

Cost and Fees

[00120] In certain embodiments, when a user creates an order, they specify an amount of fees to be paid to the ring-miner, in conjunction with a percentage of the margin

(marginSplitPercentage) made on the order that the ring-miner can claim. This is called the margin split. The decision of which one to choose (fee or margin split) is left to the ring- miner. A representation of the margin split is shown in FIG. 5.

[00121] If the margin on the order-ring is too small, a ring-miner will choose the fee.

If, on the contrary, the margin is substantial enough for the resulting margin split to be worth much more than the fee, a ring-miner will choose the margin split. There is another proviso, however: when the ring-miner chooses the margin split, they must pay the user (order creator) a fee, which is equal to the fee the user would have paid to the ring-miner. This increases the threshold of where the ring-miner will choose the margin split to twice the fee of the order, increasing the propensity of the fee choice. This allows ring-miners to receive a constant income on low margin order-rings for the tradeoff of receiving less income on higher margin order-rings. In certain embodiments, the fee model is based on the expectation that as the market grows and matures, there will be fewer high margin order-rings, thus necessitating fixed fees as incentive. This ends up with the model illustrated in FIG. 6, where /is the fee, x is the margin split, y is the mining income y = max (/, x— /) as indicated by the solid line; if the fee for the order is 0, the equation is y = max (0, x— 0) that simplifies toy = x as indicated by the gray line.

[00122] The consequences are:

[00123] 1. If the margin split is 0, ring-miners will choose the flat fee and are still incentivized.

[00124] 2. If the fee is 0, the gray line results and the income is based on a general linear model.

[00125] 3. When the margin split income is greater than 2 times fo the fee, ring-miners choose the margin split and pay to the user.

[00126] It should be noted that if the fee is non-zero, no matter which option the ring- miner chooses, there will always be a transfer of fee between the ring-miner and the order's sender. Either the ring-miner earns the fee or pays the fee back to the sender to take the margin split.

[00127] Ring-miners will share a certain percentage of fees with wallets. When a user places an order through a wallet and gets filled, the wallet is rewarded with a portion of the fees or margin split. Although this is modular, and unique business models or

implementations are possible, the inclination is for wallets to receive approximately 20%- 25% of earned fees. Wallets represent a primary target for the methods described herein as they have the user base, but little or no source of income.

[00128] At its root, the methods and systems described herein is a social protocol in the sense that it relies on coordination amongst members to operate effectively towards a goal. This is not dissimilar to cryptoeconomic protocols at large, and indeed, its usefulness is largely protected by the same mechanisms of coordination problems, grim trigger equilibrium, and bounded rationality. To this end, one designated token can be used to pay fees, thus to align the financial incentives of the various network participants. Such alignment is necessary for broad adoption of any protocol, but is particularly acute for exchange protocols, given that success rests largely on improving liquidity in a robust decentralized ecosystem.

[00129] The designated tokens can be used to effectuate protocol updates through decentralized governance. Smart contract updates will, in part, be governed by token holders to ensure continuity and safety, and to attenuate the risks of siphoned liquidity through incompatibility. Given that smart contracts cannot be altered once deployed, there is a risk that dApps or end users continue to interact with deprecated versions and preclude themselves from updated contracts. Upgradeability is crucial to the protocol's success as it must adapt to market demands and the underlying blockchains. Decentralized governance by the stakeholders of the designated tokens will allow for protocol smart contract updates without disrupting dApps or end users or relying too heavily on smart contract abstraction. In certain embodiments, the designated tokens have a fixed supply, and in some cases certain percentages are frozen and allocated to community-purposed funds.

[00130] However, owners of the designated token are not the only stakeholders to consider in steering the protocol's direction: relays/ringminers, wallets, developers, and others are an integral part of the ecosystem and their voice must be heard. In fact, given that these agents need not hold any designated tokens to perform their respective roles (since traditional makers/takers and market-makers are nonexistent, initial token reserves are not mandatory) alternative methods are allowed for their interests to be respected. Furthermore, "simple" tokenbased voting, both on-chain and off, is an imperfect salve for disagreement, as low voter turnout and token ownership concentration pose risks. Thus, the goal is to implement a governance model that is built in layers, and rests on a shared knowledge that some set of decision-making processes is the norm. This can be facilitated by coordination institutions that offer signals from a diverse set of participants, and, perhaps, from pre-established protocol focal points.

Dual Authoring Process

[00131] In decentralized exchanges, front-running is when someone tries to copy another node's trade solution, and have it mined before the original transaction that is in the pending transaction pool (mempool). This can be achieved by specifying a higher transaction fee (gas price). The major scheme of front-running in an order-matching is order-filch: when a front-runner steals one or more orders from a pending order-ring settlement transaction. In certain embodiments, a front-runner may try to steal the entire order-ring from a pending transaction.

[00132] When a transaction (submitRing) is not confirmed and is still in the pending transaction pool, anyone can easily spot such a transaction and replace minerAddress with their own address (the filcherAddress), then they can resign the payload with filcherAddress to replace the order-ring's signature. The filcher can set a higher gas price and submit a new transaction hoping block-miners will pick his new transaction into the next block instead of the original transaction.

[00133] Previous solutions to this problem had important downsides which requires more transactions and thus costs ring-miners more gas and takes at least twice the blocks to settle an order-ring. To solve this problem, in certain embodiments, the method described herein uses a dual authoring process that involves the mechanism of setting up two levels of authorization for orders: one for settlement, and one for ring-mining.

[00134] In one embodiment, the dual authoring process includes the following steps:

[00135] 1. For each order, the wallet software will generate a random public- key/private-key (authKey) pair and put the key pair into the order's JSON snippet.

Alternatively, an address (authAddr) derived from the public-key instead of the public-key itself is used to reduce byte size, and authKey is used to represent authAddr’ s matching private-key.

[00136] 2. Compute the order's hash with all fields in the order except r, v, 5, and authKey, and sign the hash using the owner’s private-key (not authKey).

[00137] 3. The wallet will send the order together with the authKey to relays for ring mining. Ring-miners will verify that authKey and authAddr are correctly paired and the order's signature is valid with respect to owner address.

[00138] 4. When an order-ring is identified, the ring-miner will use each order’s authKey to sign the ring's hash, miner Address, and all the mining parameters. If an order ring contains n orders, there will be n signatures by the n authKeys. These signatures can be called the authSignatures. The ring-miner may also need to sign the ring’s hash together with all mining parameters using minerAddress’s private-key.

[00139] 5 The ring-miner calls the submitRing function with all the parameters, as well as all the extra authSignatures. Notably, authKeys are not part of the on-chain transaction and thus remain unknown to parties other than the ring-miner itself.

[00140] 6. The method will now verify each authSignature against the corresponding authAddr of each order and reject the order-ring if any authSignature is missing or invalid.

[00141] The result is that now:

[00142] 1. The order’ s signature (by the private-key of the owner address) guarantees the order cannot be modified, including the authAddr.

[00143] 2 The ring-miner’ s signature (by the private-key of the miner Address), if supplied, guarantees nobody can use his identity to mine an order-ring. [00144] 3 The authSignatures guarantees the entire order-ring cannot be modified, including minerAddress, and no orders can be stolen.

[00145] The dual authorizing process prevents ring-filch and order-filch while still ensuring the settlement of order-rings can be done in one single transaction. In addition, the dual authoring process opens doors for relays to share orders in two ways: nonmatchable sharing and matchable sharing. By default, the method of the present invention operates an OTC model and only supports limit price orders, meaning that orders’ timestamps are ignored. This implies that front-running a trade has no impact on the actual price of that trade but does impact whether it gets executed or not.

[00146] A person with ordinary skill in the art would understand that certain variants of the Dual Authoring process disclosed herein can be used in the methods described herein.

[00147] Partial Dual Authoring

[00148] Typically, the Dural Authoring process disclosed above requires the signatures by all the auth_private_keys in a ring. A variant of the Dual Authoring process is to require one or only a few auth signatures. This Partial Dual Authoring scheme also guarantees a ring as a whole cannot be stolen, but it is subject to order-filch, and the filcher can use stolen orders in another Partial Dual Authoring enabled ring settlement transaction where the stolen orders auth_private_keys are not required at all.

[00149] Key-Sharing Dual Authoring

[00150] In another variant of the Dual Authoring process, a relay may generate an auth address / auth pri vate k ey pair and requires all wallets connecting to it to use the same shared auth address for all the orders (since wallets do not have the auth_private_key, this field is missing from order’s JSON payload). This Key-Sharing Dual Authoring scheme allows only that relay to miner the orders, therefore wallets do not have the option of sharing orders with other relays.

[0002] It is appreciated that the Summary and Abstract sections may set forth one or more, but not all exemplary embodiments of the present invention as contemplated by the inventor(s), and thus, are not intended to limit the present invention and the appended claims in any way.

EXAMPLE

[00151] This example illustrates the dual authoring process in a digital asset transaction. [00152] Orders of digital assets are created by wallets and tools that can help manage users’ private keys. Orders as JSON snippets are transferred to relays as JSON payload over APIs. An example of an order is shown below:

[00153] The owner field is also known as the order’s owner address from which tokens will be transferred once the order is filled. The order (including the owner address) must be signed with owner address’s private key. The order is valid only if the

order signature (represented by the r, v, and s) is valid.

[00154] As illustrated by FIG. 7, the order signature is signed against the order’s hash (or order hash), which is the keccak256 function output of all other fields except r, v, and s.

[00155] Order hash is then computed to verify whether the signing address is indeed the owner address in the order. Relays verifies the signature of each order they receive; the smart-contract also verifies order signatures when 1) orders are submitted as part of a ring and 2) orders are submitted for cancellation.

[00156] Rings don’t take a JSON form, but are represented by all the parameters of the submitRing function. As illustrated in FIG. 8, a ring encapsulates all the data of its orders (a ring can have 2 to 10 orders). The miner of the ring also populates its address (the miner address) and other mining parameters (or ring parameters) into the ring so that the submitRing function behaves differently based on these parameters.

[00157] Miners need to sign the ring’s hash (ring_hash) together with all mining parameters with the private key of the miner address. The ring hash is calculated as the XOR op-result of all the order hashs or using other hash functions. [00158] The method does not require msg. sender to sign anything. In order words, a ring— as the submitRing transaction payload— can be signed by a mining address and the blockchain transaction itself can be signed (and broadcasted) by a different transacting address. The decoupling of mining address and transacting address provides extra flexibility and security advantage.

[00159] FIG. 9 illustrates the payload (or the parameters) of a submitRing transaction for a ring of 3 orders.

[00160] Problem of Filch

[00161] In order to make sure all trading stats are calculated/updated for the rightful miners, miners are required to sign the rings. These stats are used by members in the consortium liquidity-sharing blockchain to calculate each member’s order production and consumption to consolidate inter-consortium payments.

[00162] When a submitRing transaction is not confirm and still in the pending transaction pool, anyone can easily spot such a transaction and replace miner address with his own address (the filcher address), then he can re-sign the payload with filcher addres to replace the ring’s signature. The fincher can set a higher gas price and submit a new transaction hoping block miners will pick his new transaction into the a block instead of the original submitRing transaction.

[00163] In one solution to prevent filch, ring miners are allowed to call either batchSubmitRinghash or submitRinghash function to reserve ring hashes before submitting the actual rings. When a ring is submitted, as shown in FIG. 10, the protocol checks whether the hash of the ring has already been submitted/reserved by other miners, if so, the protocol rejects the ring and the submitRing transaction fails. There are some downsides in this solution: it requires more transactions thus cost miners more gas; and it takes at least twice the block time to settle a ring.

[00164] Dual Authoring Method

[00165] The solution of this example involves the mechanism of setting up two levels of authorization for orders: one for settlement, and one for mining, which is called dual authoring.

[00166] FIGS. 11-13 show an example how the dual authoring process works:

For each order, the wallet software generates a random public- key/private-key pair, and put the key pair into the order’s JSON snippet. (An alternative is to use the address derived from the public- key instead of the public-key itself to reduce byte size. Auth address is used to represent such an address, and auth_private_key to represent auth addres’s matching private- key).

[00167] All fields in the order except auth_private_key is signed using the

owner address’s private-key (not auth_private_key) as shown in the image below.

[00168] The wallet sends the order, together with the auth_private_key to miners

(relays) for matching. The miner verifies that auth_private_key and auth address are correctly paired and the order’s signature is valid with respect to owner address.

[00169] When a ring is identified, the miner uses each order’s auth_private_key to sign what miner address has to sign, namely ring hash, miner address, and all the

mining _parameters. As illustrated in FIG. 12, the ring contains 3 orders. Therefore, there are 3 signatures by the 3 auth_private_keys, which are called the auth signatures. The miner also needs to sign the ring hash together with all mining parameters using miner address’s private-key.

[00170] The miner calls the submitRing function with all the parameters, as well as the 3 extra auth signatures. Notably, auth_private_keys are not part of the on-chain transaction thus remain unknown to people other than the relay itself, as shown in FIG. 13.

[00171] The method verifies that each auth signature against the corresponding auth address of each order, and rejects the ring if any auth signature is invalid.

[00172] Now a ring cannot be stolen by anyone unless he has all the auth_private_keys of all enclosed orders. The is because: (1) The order’s signature (by the private-key of the ower address) guarantees the order cannot be modified, including the auth address; (2) The miner’s signature (by the private-key of the miner address) guarantees nobody can use his identity to mine a ring; (3) The auth signatures guarantees the entire ring cannot be modified, including miner address; and (4) since ring-filchers do not have access to auth_private_keys, they cannot re-generate a new set of auth signatures thus are unable to generate a filch transaction.