Explaining Ark with a jigsaw puzzle

This article is machine translated
Show original

Author: Roy Sheinfeld

Source: https://bitcoinmagazine.com/technical/spark-explained-like-youre-five

Some readers may recall that I wrote an article years ago titled " Understanding the Lightning Network with an Abacus ," which I wrote after realizing that many people didn't fully understand the Lightning Network. At that time, my aim wasn't to explain the cryptography and implementation details of the Lightning Network, but rather to elucidate the core concepts behind payment channels. I used an abacus as a metaphor to focus the reader's attention on the concepts rather than the mechanisms. It worked quite well, and people have since used this abacus analogy to explain Lightning channels to beginners.

Recently, I have been feeling a strong sense of frustration.

I noticed a similar situation when discussing Spark. Some people knew to say " statechain " ( the Chinese translation ), but for most, that was about it. Just like with the Lightning Network, the problem wasn't a lack of intelligence or laziness, but simply a lack of understanding of the underlying mental model. So, I'll try the same thing again: explaining how Spark works from a conceptual perspective, without using cryptographic jargon.

Two puzzle pieces

Spark's core feature is enabling users to receive and send Bitcoin without broadcasting transactions to the blockchain. In other words, when ownership of the Bitcoin changes, from the blockchain network's perspective, it doesn't appear to move. Instead, only the individuals who can jointly authorize the spending of that Bitcoin change. This joint authorization is shared between the user and a group of operators (called "Spark Entities (SEs)").

To explain how this works, imagine spending a set of Bitcoins from your Spark device, which requires solving a simple two-piece puzzle:

  • One piece of the puzzle is held by the user;
  • The other piece of the puzzle is held by SE.

Bitcoins can only be spent when two matching puzzle pieces are put together. Different currencies use different puzzles.

Now, let's take a look at what the process of changing ownership looks like.

Initially, Alice held a puzzle piece that was a pair with a puzzle piece held by a SE. She could spend her Bitcoin in the Spark device by matching the two puzzle pieces together. When Alice wanted to send her Bitcoin to Bob, she had Bob create a new puzzle set with the SE. Importantly, the puzzle itself didn't change: the old puzzle and the new puzzle (the shapes) were the same; only the shapes of the pieces that made it up changed. The new puzzle set was designed for Bob: one piece went with Bob, and the other went with the SE. From then on, only the puzzle piece in Bob's hand could be paired with the one in the SE's hand. Alice might still hold her old puzzle piece, but that was useless. Because the SE had destroyed the puzzle piece that was paired with Alice's, Alice's piece couldn't be paired with anyone's puzzle piece and couldn't be used to spend the Bitcoin. Therefore, ownership was effectively transferred to Bob, even though the Bitcoin controlled by the Spark device didn't move within the blockchain.

image-27

Bob can then repeat the same process, sending the same set of Bitcoins to Carol; and so on. Each transfer is accomplished by replacing pieces of the puzzle (rather than broadcasting the transaction within the blockchain).

This naturally raises the question: what if SE hadn't discarded its old piece? In this scenario, SE could collude with the previous owner (like Alice) to spend Bitcoin that should belong to the new owner (like Bob). We need to trust SE—that it will destroy its original piece while assisting with the transfer of ownership. However, it's important to understand that an SE isn't a single person; it's a group of operators, and the pieces on SE's side aren't held by a single operator. Replacing a piece requires cooperation among multiple operators. Each party can secretly hold an old piece or recreate it afterward. Therefore, as long as one operator is honest during the transfer, it's sufficient to prevent an old piece from being reactivated.

image-26

The key idea is simple: Spark doesn't transfer Bitcoin within the blockchain; when it does, it simply replaces the person with spending privileges. The position of the Bitcoin it controls within the chain remains unchanged; only the pieces that fit together are altered.

To keep the explanation concise, I've intentionally omitted Spark's unilateral exit mechanism , a crucial part of its security model, but discussing it would deviate from the core concept I want to emphasize. Importantly, Spark is not a system where users are perpetually dependent on the SE. While everyday transfers rely on federated authorization, Spark still provides users with the option to spend their own funds independently within the blockchain without SE cooperation. This escape pod was designed from the outset, but it's beyond the scope of this article.

(over)

Source
Disclaimer: The content above is only the author's opinion which does not represent any position of Followin, and is not intended as, and shall not be understood or construed as, investment advice from Followin.
Like
Add to Favorites
Comments