Course details
Blockchain Systems and Consensus Protocols
BSD Acad. year 2025/2026 Summer semester
This course provides a comprehensive theoretical and practical introduction to the design and implementation of blockchain systems, applications, and the consensus protocols that underpin them. We will explore the core principles of distributed ledger technology, delve into the cryptographic building blocks, and analyze various consensus mechanisms used to achieve agreement in a trustless environment. The course will cover topics from the foundational concepts of Bitcoin and Ethereum to more advanced subjects like scalability solutions, privacy-preserving techniques, and the future of decentralized systems.
Doctoral state exam - topics:
- Properties of centralized and decentralized systems
- Types and generations of consensus protocols
- Smart contracts languages, expressiveness, vulnerabilitites, security
- Authentication schemes, threshold multisignatures, privacy, web3 vs. web2 usability
- Anonymity and Privacy, mixing services, zero-knowledge proofs, privacy-oriented cryptocurrencies
- Decentralized Finance (DeFi) applications and security
- Scalability and interoperability challenges
- Decentralized e-voting
- Decentralized identity management
- Blockchain-based zk-SNARK and SNARK applications and principles
Guarantor
Course coordinator
Language of instruction
Completion
Time span
- 39 hrs lectures
- 10 hrs projects
Department
Learning objectives
- Design and deploy novel decentralized applications (DAPPs) and smart contracts, focusing on architectural patterns and secure coding practices.
- Evaluate and modify existing consensus protocols and design new ones to meet specific performance and security requirements.
- Analyze the security and privacy vulnerabilities of blockchain systems and apply advanced cryptographic and algorithmic techniques to mitigate them.
- Demonstrate a deep understanding of core blockchain principles, including peer-to-peer networking, cryptographic primitives, and data integrity.
- Construct a fully functional, small-scale decentralized application from the ground up, integrating a custom consensus protocol.
Fundamental literature
- I. Homoliak, S. Venugopalan, D. Reijsbergen, Q. Hum, R. Schumi and P. Szalachowski, "The Security Reference Architecture for Blockchains: Toward a Standardized Model for Studying Vulnerabilities, Threats, and Defenses," in IEEE Communications Surveys & Tutorials, vol. 23, no. 1, pp. 341-390, Firstquarter 2021, doi: 10.1109/COMST.2020.3033665.
- Douceur, John R. "The sybil attack." International workshop on peer-to-peer systems. Springer, Berlin, Heidelberg, 2002.
- Cachin, C., & Vukolić, M. (2017). Blockchain consensus protocols in the wild. arXiv preprint arXiv:1707.01873.
- Miers, I., Garman, C., Green, M., & Rubin, A. D. (2013, May). Zerocoin: Anonymous distributed ecash from bitcoin. In 2013 IEEE Symposium on Security and Privacy (pp. 397-411). IEEE.
- Solidity Documentation, https://solidity.readthedocs.io/
- Sapirshtein, A., Sompolinsky, Y., & Zohar, A. (2016, February). Optimal selfish mining strategies in bitcoin. In International Conference on Financial Cryptography and Data Security (pp. 515-532). Springer, Berlin, Heidelberg.
- Luu, L., Narayanan, V., Zheng, C., Baweja, K., Gilbert, S., & Saxena, P. (2016, October). A secure sharding protocol for open blockchains. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (pp. 17-30).
Study supports
- I. Homoliak, S. Venugopalan, D. Reijsbergen, Q. Hum, R. Schumi and P. Szalachowski, "The Security Reference Architecture for Blockchains: Toward a Standardized Model for Studying Vulnerabilities, Threats, and Defenses," in IEEE Communications Surveys & Tutorials, vol. 23, no. 1, pp. 341-390, Firstquarter 2021, doi: 10.1109/COMST.2020.3033665.
- Douceur, John R. "The sybil attack." International workshop on peer-to-peer systems. Springer, Berlin, Heidelberg, 2002.
- Cachin, C., & Vukolić, M. (2017). Blockchain consensus protocols in the wild. arXiv preprint arXiv:1707.01873.
- Miers, I., Garman, C., Green, M., & Rubin, A. D. (2013, May). Zerocoin: Anonymous distributed ecash from bitcoin. In 2013 IEEE Symposium on Security and Privacy (pp. 397-411). IEEE.
Solidity Documentation, https://solidity.readthedocs.io/ - Sapirshtein, A., Sompolinsky, Y., & Zohar, A. (2016, February). Optimal selfish mining strategies in bitcoin. In International Conference on Financial Cryptography and Data Security (pp. 515-532). Springer, Berlin, Heidelberg.
- Luu, L., Narayanan, V., Zheng, C., Baweja, K., Gilbert, S., & Saxena, P. (2016, October). A secure sharding protocol for open blockchains. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (pp. 17-30).
Syllabus of lectures
- Introduction to decenralized and distributed systems, cryptographic foundations
- The blockchain concepts: ledgers, blocks, and chains, transactions and Merkle trees
- Traditional consenus protocols in distributed computing
- Consensus protocols I: Proof-of-Work (PoW) and Proof-of-Resource (PoR)
- Consensus protocols II: Proof-of-Stake (PoS) and Proof-of-Authority (PoA)
- Smart contracts and the Ethereum Virtual Machine (EVM), vulnerabilities, secure coding practices
- Categories of blockchain applications and their security models
- Authentication schemes, cryptocurrency wallets, web3
- Scalability and interoperability challenges
- Privacy and Anonymity in Blockchains
- Blockchain-based zk-SNARK and SNARK applications and principles
- Decentralized e-voting and identity management
- Decentralized Finance (DeFi) applications and security
Progress assessment
Submission of the project on time, exam. During the course, it is necessary to submit the project (or draft of the article) and pass the exam. Teaching is performed as lectures or controlled self-study; the missed classes need to be replaced by self-study.