Versum builds on the groundbreaking Lambda-Auth paper by Andrew Miller. Lambda-Auth is a breakthrough in cybersecurity because it provides Authenticated Data Structures.
Lambda-Auth Abstract:Abstract
An authenticated data structure (ADS) is a data structure whose
operations can be carried out by an untrusted prover, the results of
which a verifier can efficiently check as authentic. This is done
by having the prover produce a compact proof that the verifier
can check along with each operation’s result. ADSs thus support
outsourcing data maintenance and processing tasks to untrusted
servers without loss of integrity. Past work on ADSs has focused
on particular data structures (or limited classes of data structures),
one at a time, often with support only for particular operations.
Authenticated Data Structures allow cybersecurity by correctness and verifiability. Programs are "Proofs", and proofs are verifiable. Verifiable computation is the holy grail, it allows the blockchain to outsource computation to nodes with verifiable security. This is a similar approach to Codius but potentially dramatically better because anyone can contribute computation and become a node through a decentralized market and exchange.
VerSum Abstract:ABSTRACT
VERSUM allows lightweight clients to outsource expensive computations
over large and frequently changing data structures, such as
the Bitcoin or Namecoin blockchains, or a Certificate Transparency
log. VERSUM clients ensure that the output is correct by comparing
the outputs from multiple servers. VERSUM assumes that at least
one server is honest, and crucially, when servers disagree, VERSUM
uses an efficient conflict resolution protocol to determine which
server(s) made a mistake and thus obtain the correct output.
VERSUM’s contribution lies in achieving low server-side overhead
for both incremental re-computation and conflict resolution,
using three key ideas: (1) representing the computation as a functional
program, which allows memoization of previous results; (2)
recording the evaluation trace of the functional program in a carefully
designed computation history to help clients determine which
server made a mistake; and (3) introducing a new authenticated data
structure for sequences, called SEQHASH, that makes it efficient
for servers to construct summaries of computation histories in the
presence of incremental re-computation. Experimental results with
an implementation of VERSUM show that VERSUM can be used
for a variety of computations, that it can support many clients, and
that it can easily keep up with Bitcoin’s rate of new blocks with
transactions.
The algorithms behind VerSum and Lambda Auth open up an entire new field of computer science, is a breakthrough, and a game changer.
This to me suggests that Ethereum developers took a less than optimal approach to smart contracts because the security risks of Turing completeness outweigh the benefits if they are any. Bitshares developers and entrepreneurs who might be interested in this include but are not limited to anyone interested in implementing smart contracts, such as Bytemaster, Toast, DataSecurityNode, Fuzzy.
References
lambda-auth
https://www.cs.umd.edu/~amiller/gpads/gpads.pdfhttps://amiller.github.io/lambda-auth/VerSum
https://people.csail.mit.edu/nickolai/papers/vandenhooff-versum.pdfcomputational trinitarianism
http://ncatlab.org/nlab/show/computational%20trinitarianismcodius
https://codius.org/MC2 Researchers Receive $1.2M NSF Grant for Verifiable Computation
https://www.umiacs.umd.edu/about-us/news/mc2-researchers-receive-12m-nsf-grant-verifiable-computationSafeguarding Computations in the Cloud
https://www.youtube.com/watch?v=XrjO7N5uv04&feature=youtu.beAlgorithmica
DOI 10.1007/s00453-014-9968-3
Authenticated Hash Tables Based on Cryptographic
Accumulators
http://www.ece.umd.edu/~cpap/published/algorithmica15.pdf