arxiv: v1 [q-fin.gn] 6 Dec 2016

Similar documents
L3. Blockchains and Cryptocurrencies

Surface Web/Deep Web/Dark Web

Computer Security. 13. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2018

Bitcoin. CS 161: Computer Security Prof. Raluca Ada Poipa. April 24, 2018

Bitcoin. CS 161: Computer Security Prof. Raluca Ada Popa. April 11, 2019

Will Bitcoin and the Block Chain change the way we Live and Work? Martyn Thomas CBE FREng Livery Company Professor of Information Technology

Bitcoin. Based on Bitcoin Tutorial presentation by Joseph Bonneau, Princeton University. Bonneau slides marked JB

A.J. Bahou, LLM, MSECE Bahou Miller PLLC

EVERYTHING YOU NEED TO KNOW ABOUT DIGITAL LEDGER TECHNOLOGY, THE BLOCKCHAIN AND CRYPTOCURRENCIESÓ (Part I June 2018)

Accounting for crypto assets mining and validation issues

Bitcoin, Blockchain Technology, Block Chain Ecosystem : What You Need to Know?

Will Blockchain Change the Audit? Zhiyong Li. Jianghan University, Wuhan, China. Introduction. The Blockchain Technology

Block chain Technology:Concept of Digital Economics

The Blockchain Identity

How Blockchain Technology Changes Marketing

Bitcoins and Blockchains

Blockchain made Simple

In this article, I describe the technology behind Bitcoin s blockchain, and

Blockchain Technology: Concepts. Whitepaper 1

CONTENTS DISCLAIMER... 3 EXECUTIVE SUMMARY... 4 INTRO... 4 ICECHAIN... 5 ICE CHAIN TECH... 5 ICE CHAIN POSITIONING... 6 SHARDING... 7 SCALABILITY...

Table of contents. 2

Journal of Multistate Taxation and Incentives (Thomson Reuters/Tax & Accounting) Volume 28, Number 4, July 2018

BITCOINS and CRYPTOCURRENCIES How It Works. Principal Consultant CISA, CISSP

Blockchain: Where are We and Where are We Heading?

The Blockchain Identity

an introduction to Blockchain Technology

The Blockchain Trevor Hyde

$110100$010. Crypto Currencies. Good or Evil? 10$ $100010

Auditing in the Crypto-Asset Sector

Blockchain: from electronic cash to redefining trust

Level 2, HTLC, SegWit

Blockchain in travel for beginners

Blockchain explained. by Jerome Kehrli

Blockchain and the Maritime Industry

In the future, many kinds of cryptocurrencies will be born, and service competition will increase.

Bitcoin Currency & Blockchain Technology

Distributed and automated exchange between cryptocurrency and traditional currency. Inventor: Brandon Elliott, US

Bitcoin and why it will change the world

White Paper. Bizanc Blockchain

AlloyCoin: A Crypto-Currency with a Guaranteed Minimum Value

Introduction to Blockchain Technology

Crypto-Philanthropy: Virtual Currency and the Future of Charitable Giving

Cisco Live /11/2016

The BitShares Blockchain

Block This Way: Securing Identities using Blockchain

Introduction to Blockchains. John Kelsey, NIST

Technical Line. A holder s accounting for cryptocurrencies. What you need to know. Overview

Universal Payment Channels

Secure Payment Transactions based on the Public Bankcard Ledger! Author: Sead Muftic BIX System Corporation

whitepaper Abstract Introduction Features Special Functionality Roles in DiQi network Application / Use cases Conclusion

Blockchain Technology for Next Generation ICT

Copyright Scottsdale Institute All Rights Reserved.

BitShares is. a decentralized network. All About BitShares in Infographics

Blockchain, data protection, and the GDPR

Cryptocurrency and Blockchain Technology

BLOCKCHAIN/CRYPTOCURRENCIES AND CYBERSECURITY, THREATS AND OPPORTUNITIES

Blockchain: An introduction and use-cases June 12 th, 2018

International Journal of Computer Engineering and Applications, Volume XII, Special Issue, April- ICITDA 18,

The Blockchain Identity

Blockchain Technology JAMES C. CONDOS

Tezos Contribution and XTZ Allocation Terms and Explanatory Notes. 1. Principles

An introduction. Dr Ken Boness

Lecture 23 Cryptocurrency. Stephen Checkoway University of Illinois at Chicago CS 487 Fall 2017 Slides from Miller s ECE 422

Blockchains. How crypto-currencies work. Luke Anderson. 19th May University Of Sydney.

Alexandros Fragkiadakis, FORTH-ICS, Greece

Lyves Trustworthy payments despite anonymity. Version 2.4.1

Hive Project Whitepaper

Campbell R. Harvey. Duke University and NBER

November 2018 Abstract

Sphinx WAY TO BE ULTRA SUCCESS WAY TO ULTRA SUCCESS

Transferring Data through an Ethereum Blockchain using Transactions

BLOCKCHAINS MINING NUMBERS NOT GOLD

CSCI 1800 Cybersecurity and International Relations. Bitcoins and Blockchains John E. Savage

Blockchain 2.0 SUMMIT 2017 GLOBAL RISK INSTITUTE

BITCOIN. sdffdfdfd. Fundamental Asset Overview

Blockchain Overview. Amr Eid Cloud Architect, Cloud Platform, MEA

Cryptocurrencies (Session I) Computer Science and Law

Color Pay : Next Paradigm for Instant Payment

Anonymity of E-Cash Protocols. Erman Ayday

Coin ing the Tax Bit By: Asmita Bedekar, MST Student

Global Financial Systems Chapter 21 Technology

Blockchain Demystified

II. THE FUNCTIONS OF SECURITIES CUSTODIANS.

Intermediate conversion for automated exchange between cryptocurrency and national currency. Inventor: Brandon Elliott, US

No se encuentran entradas de índice.

A block chain based decentralized exchange

Investing in the Blockchain Ecosystem

Blockchain for Education & Research Webinar. December 6, 2016

BOS Platform Foundation Donation and BOS Allocation Terms and Explanatory Note

Understanding Cryptocurrency (updated May 2018) Ari Paul CIO, Managing Partner BlockTower Capital

How Blockchain Will Change the Way You Develop Medical Devices

Blockchain Technology in Banking and Financial Services

February Highlights of this issue Interview with CEO of FIT. All rights reserved

chainfrog WHAT ARE SMART CONTRACTS?

The Time is now EPOS. Everything is Possible A new era has started. Don t pass it. It s your chance to make a change!

What is KEWI? What is cryptocurrency? Why invest in cryptocurrency? KEWI fact file. Why choose KEWI? Who should invest. Portfolio management

Blockchain Basics with focus on Energy

NEOGOLD whitepaper NEOGOLD NEOGOLD

Unisity Blockchain imperative for educational certificates

Understanding Blockchain & its implications for financial professionals

Transcription:

THE BLOCKCHAIN: A GENTLE FOUR PAGE INTRODUCTION J. H. WITTE arxiv:1612.06244v1 [q-fin.gn] 6 Dec 2016 Abstract. Blockchain is a distributed database that keeps a chronologicallygrowing list (chain) of records (blocks) secure from tampering and revision. While computerisation has changed the nature of a ledger from clay tables in the old days to digital records in modern days, blockchain technology is the first true innovation in record keeping that could potentially revolutionise the basic principles of information keeping. In this note, we provide a brief selfcontained introduction to how the blockchain works. Keywords: Data Security, Information Storage, Distributed Ledger, Blockchain, Bitcoin, Cryptocurrency 1. Introduction A record is any piece of evidence about the past especially an account kept in writing or some other resilient form which facilitates the accurate preservation of information through time. Traditionally, a specific and regularly updated record in paper or book form is referred to as a ledger. For any two individuals engaging in an information-dependent correspondence or exchange (as is almost always the case in business), record keeping presents a risk. Unless a) both parties are happy to rely on the records of a central authorised entity, b) or one of the parties is happy to rely fully on the record keeping of the other party (which is rather rare in business), careful comparison and matching of two independently held sets of records is the only possible solution. Blockchain technology promises a distributed database that keeps a continuouslygrowing list(chain) of records(blocks) secured from tampering and revision, making comparison and matching of any separately held records unnecessary. If successful, blockchain could therefore substantially facilitate (and therefore accelerate) almost every multi-party decision-making process, including business, governmental, and private. For example, the avoidance of past tampering of a transaction trail ensures that no new money has been unlawfully created. For cash, this is done through the use of bank notes that cannot (or are very hard to) be forged, and for electronic accounts, this is done by only allowing trusted participants (normally banks) to store balances. Evidently, it is central authorised entities that keep a ledger and prevent our financial systems from falling into chaos. Blockchain technology proposes Date: November 2016 Record Currency Management, Windsor, UK. 1

2 J. H. WITTE to use a distributed (and therefore democratic) confirmation process of financial transactions instead. 2. Technical Prerequisites A blockchain is designed based on two well-established mathematical ideas. 2.1. Public Key Encryption. Modern cryptography relies on the use of a public and a private key. Alice can share her public key freely with anyone (and maybe even publish it on her website), while her private key is known only to her. If Bob encrypts a message using Alice s public key, then no one except for Alice with her private key can ever decrypt the message as long as Alice keeps her private key safe, the communication between the two is unbreakable. 2.2. Hash Keys. A hash key is any fully-defined function which takes an alphanumeric sequence (i.e., a string of letters and numbers) of arbitrary length and reduces it to one of predefined finite length. Even though, in theory, this means that duplication (i.e. more than one input resulting in the same output) is possible, for modern hash keys this can be assumed to be extremely unlikely. One notable feature of hash keys is that they are (almost) impossible to invert. For example, if Bob is an internet provider who stores only the hash keys of user passwords (rather than the passwords themselves), than he can check Alice s userlogin correctly without even knowing Alice s actual password. 3. Bitcoin: The Beginnings In his 2008 paper Bitcoin: A Peer-to-Peer Electronic Cash System, a person calling themselves Satoshi Nakamoto (the name is a pseudonym and the real author is unknown) laid the foundation for the algorithmic network behind the crypto-currency bitcoin. Even though the bitcoin itself continues to function and circulate successfully, Nakamoto s ideas behind the creation of the bitcoin have since exceeded the original application by far and are now known independently as the blockchain. Nakamoto created the bitcoin by inventing the following architecture. i. We have a distributed network of participating agents all of whom store a copy of the blockchain. The blockchain (the distributed ledger) is a record of all transactions to date. (This is very important: the blockchain stores transactions, not balances.) ii. Participating agents also hold bitcoin wallets, which represent ownership of any received bitcoin payments. More specifically, every bitcoin transaction is represented in the blockchain as the public key of a cryptographic public/private key pair, while the transaction s private key is held in someones bitcoin wallet. Anyone in possession of the blockchain can use a transaction s public key to encode messages which only the transaction s rightful owner can decrypt correctly. For example, if Alice tells Bob that she owns 30 bitcoins (which she earlier received in a transaction from Charlie), then Bob(or anyone else) can instantly confirm Alice s claim to ownership by asking encrypted questions

THE BLOCKCHAIN 3 unless Alice truly owns the private key she claims to have, she cannot reply correctly. Up to this point, the described design creates a static distributed ledger. But imagine that now Alice wants to buy Bob s bike for 30 bitcoins, but that Bob is only willing to hand over the bike once both of them can independently confirm Alice s payment to Bob from their copies of the blockchain. To make the transaction possible, we have to extend and update the blockchain. iii. To initiate the transfer of 30 bitcoins to Bob, Alice requests a new public key from Bob and then sends her proposed transaction to all agents in the network. iv. For Alice s proposed transaction to be approved, one agent in the network now needs to a) confirm that Alice is the rightful owner of the 30 bitcoins she intends to transfer (see ii. above), b) and create a new hash key encoding both, the last previous hash key as well as the new transaction information. Unfortunately, if it was known in advance which agent was going to confirm the transaction, then Alice could secretly collaborate with this agent and therefore manipulate the blockchain through an illegitimate extension. To enforce a random choice of the confirming agent in the distributed network, the blockchain rules additionally require the newly generated hash key in b) to have a certain structure. For example, it may have to have a certain number of zeros at the beginning or end (or another similar specification). The distributed agents are then allowed to append the alpha-numeric string which is to be hashed by a personally chosen component called a nonce. A confirmation is accepted as soon as one agent in the network manages to propose a nonce which results in a hash key of the required format. The competition in which all agents in the network simultaneously try to find a suitable nonce to complete the given task is referred to as mining. The requirements of the new hash key can be chosen such that mining takes a certain average time (e.g., ten minutes) even for very fast computers. As long as a large number of participating agents in the distributed network have the computational ability to find the new hash key within the expected time, it is unlikely that one particular agent will be able to always dominate (and therefore manipulate) the process. Adding this detail to point iv. above, the more specifically phrased item b) becomes the following. b)* [...] and create a new hash key of specified format encoding the combined string of three items, the last previous hash key, the new transaction information, and a newly-mined nonce. In the original bitcoin design, the completion of b)* is rewarded with a payment of (newly created) bitcoin, to ensure that participation in the confirmation process is desireable for a large number of distributed agents (and hence the name mining). Suppose that a random agent called Charlie is the first to successfully confirm Alice s proposed transaction of 30 bitcoins. Charlie then immediately broadcasts the

4 J. H. WITTE new hash key together with Alice s new transaction to everyone in the distributed network a new block is being added to the blockchain (i.e., the distributed ledger is updated). As soon as his synchronised version of the blockchain contains Alice s confirmed bitcoin transfer, Bob can hand over his bike to Alice and complete the sale of the underlying physical good. 4. Blockchain: Electronic Transaction Without Intermediary A certain technological complexity (e.g., as ensuring instant synchronisation of information across a large distributed network) aside, the blockchain design allows the creation of a secure distributed database for almost any type of information. Three particular properties of the blockchain have to be kept in mind. 4.1. Network Size. It is crucial to have a large distributed network, which means agents have to be incentivised to participate in the mining process. In many cases, this may mean offering a small fee for every successfully confirmed transaction (or newly created block). 4.2. Blockchain Depth. All agents participating in the distributed network will always update their version of the blockchain to the longest prevailing one. This means that if someone managed to manipulate (i.e., break) the latest added block to re-route Alice s transfer after Bob has already seen it and then integrate it in a longer blockchain, then Bob might find himself handing over his bike even though his 30 bitcoins have actually been sent elsewhere. The repeated hashing resulting from the addition of new blocks to the blockchain means that past transactions become more impenetrable as they sink deeper and deeper into the blockchain. If Bob, before handing overhis bike, waits for a number of more blocks (the current standard is six) to be added after his own transaction, than he can be certain that his receipt of money has been logged as a permanent and unchangeable part of the blockchain. 4.3. 51% Attack. While the name 51% attack is misleading (as the number 51 is of no particular relevance), this refers to the risk of having a maliciously intended agent or group of agents who dominate the aggregate computational power available in the distributed network they could, therefore, manipulate the addition of new blocks by consistently leading the confirmation process. In practice, the true impact of this is smaller than widely believed, as it primarily requires waiting for more blockchain depth before moving physical goods or making further money transfers creating a speed rather than a security problem. 4.4. Theft. The blockchain technology does not prevent theft of property. Especially for the anonymous design of the bitcoin, where an individual s money is stored as a collection of private keys in a bitcoin wallet, property can be stolen if the electronic wallet is accessed illegally and bitcoins are spent.

THE BLOCKCHAIN 5 References [1] Satoshi Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System, originally published on mailinglist metzdowd.com in January 2009, now available on https://bitcoin.org/bitcoin.pdf DISCLAIMER The views expressed are those of the author and do not reflect the official policy or position of Record Currency Management. Record Currency Management, Windsor, UK E-mail address: jwitte@recordcm.com