Abstract
Although there are many versions of blockchain technology today, it was first introduced in 2008 as the technology supporting Bitcoin, the first successful virtual currency system. Yet in and of itself, blockchain technology is much more than the underpinning for Bitcoin (and other cryptocurrencies) and has found many applications beyond its initial purpose. The goal of this advanced primer is to review the current state of this technology and to discuss some of its advantages and drawbacks in settings beyond cryptocurrencies.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Interested readers can find more information on Hedera at https://www.hederahashgraph.com/
- 2.
Interested readers can experiment with hash functions on sites such as FileFormatInfo (https://www.fileformat.info/tool/hash.htm)
- 3.
Merkle trees are created by repeatedly hashing pairs of nodes until there is only one hash left (this hash is called the Root Hash, or the Merkle Root). They are constructed from the bottom up, from hashes of individual transactions (known as Transaction IDs) (see Ray (2017) for more details).
- 4.
Pretty Good Privacy (PGP) is a software that provides cryptographic privacy and authentication for data communication. PGP enables the signature, encryption and decryption of files and messages for a greater level of privacy and security of electronic communications.
- 5.
Interested readers can obtain more information at https://www.pluralsight.com/guides/blockchain-architecture
- 6.
An old CD may have a size of 700 MB.
- 7.
Interested readers can follow the evolution of the blockchain size at https://www.blockchain.com/charts/blocks-size
- 8.
Interested readers can follow the Bitcoin energy consumption at https://digiconomist.net/bitcoin-energy-consumption consulted on June 7, 2020.
- 9.
As of May 2018, the reward is 12.50 bitcoins per block.
- 10.
I discuss forks and Sybil attacks below.
- 11.
See Vermeulen (2016). However, Visa baseline capacity is typically lower.
- 12.
I elaborate on smart contracts below.
- 13.
LiteCoin has been developed through a Bitcoin’s fork. I elaborate below on what forks involve.
- 14.
Smart contracts are called “chaincodes” in the Fabric environment.
- 15.
The concept of smart contract was originally proposed by Nick Szabo.
- 16.
See Valenta and Sandner (2017) for more details on Corda. Interested readers can also find more technical details on Corda at https://docs.corda.net/key-concepts-tradeoffs.html
- 17.
An actuator is a component of a machine that is responsible for moving and controlling a mechanism or system, for example by activating a switch.
- 18.
Interested readers can obtain more details at https://ethereum.stackexchange.com/questions/379/what-is-a-sidechain
- 19.
The numbers were comparable in May 2017 (see https://bitnodes.earn.com/ for the current statistics).
- 20.
The number for Ethereum is close to 7500 (https://www.ethernodes.org/ consulted on June 7, 2020).
- 21.
The number of nodes decreased to seven (see https://neo.org/consensus to see the evolution over time).
- 22.
See https://blockchain.info/pools to follow the hashrate distribution.
- 23.
In this case, network participants receive both sets of crypto-assets.
- 24.
A decentralized autonomous organization (DAO) is a generic term for organizations that operate exclusively through smart contracts. “The DAO” was an example of such an organization that ultimately failed.
- 25.
The required percentage varies and can be more or less than 50%.
- 26.
- 27.
A more formal analysis of zk-SNARKs can be found in Ben-Sasson et al. (2019).
- 28.
Interested readers can find more information at https://en.wikipedia.org/wiki/Zcash
- 29.
The founder of Z-cash executed an elaborate “ceremony” to convince the rest of the world this was not an issue for the cryptocurrency (a video can be found at https://www.youtube.com/watch?v = D6dY-3x3teM).
- 30.
Naturally, no solution is fool-proof (see Tramer, Boneh and Paterson(2020)).
- 31.
The bug called CVE-2010-5139 was a number overflow error that led to the creation of at least 92 million irregular bitcoins. The bug was subsequently corrected.
- 32.
The site was hacked for the first time in 2011 for a smaller amount (see Sharma (2017)).
- 33.
More specifically, the private key allows the verification of ownership for the public key and the assets connected to it. This allows for transfer of ownership to happen without the revelation of the private key to a third party.
- 34.
Ransomware is a form of malicious software that threatens to publish the victim’s data or perpetually block access to it (usually by encrypting it) unless a ransom is paid.
- 35.
James Howells lost £4.2 million when he trashed a hard drive containing the private keys for 7500 bitcoins without realizing what it contained.
- 36.
Naturally, no system is fool-proof (see Steel (2019)).
References
Accenture, Press Release, Sept. 20, 2016., https://newsroom.accenture.com/news/accenture-debuts-prototype-of-editable-blockchain-for-enterprise-and-permissioned-systems.htm.
Al Jawaheri, H., Al Sabah, M., Boshmaf, Y., Erbad, A. (2019). Deanonymizing Tor hidden service users through Bitcoin transactions analysis, working paper, https://arxiv.org/pdf/1801.07501.pdf
Aru, I. (2017). Tokenization: The force behind blockchain technology, from https://cointelegraph.com/news/tokenization-the-force-behind-blockchain-technology
Baird, L. (2018). Hashgraph consensus: Detailed examples, from https://www.swirlds.com/downloads/SWIRLDS-TR-2016-02.pdf.
Ben-Sasson, E., Chiesa, A., Tromer, E., and Virza, M. (2019). Succinct non-interactive zero knowledge for a von Neumann architecture, https://eprint.iacr.org/2013/879.pdf
Brown, R. (2016). On distributed databases and distributed ledgers, from https://gendal.me/2016/11/08/on-distributed-databases-and-distributed-ledgers/
Buterin, V. (2015). Merkling in Ethereum, https://blog.ethereum.org/2015/11/15/merkling-in-ethereum/
Cameron-Huff, A. (2017). How tokenization is putting real-world assets on blockchains, from https://bitcoinmagazine.com/articles/op-ed-how-tokenization-putting-real-world-assets-blockchains/
Castor, A. (2017). A short guide to bitcoin forks, from https://www.coindesk.com/short-guide-bitcoin-forks-explained/
Cheng, E. (2017). Cyberattack temporarily hits bitcoin exchange Bitfinex, from https://www.cnbc.com/2017/12/04/cyberattack-temporarily-hits-bitcoin-exchange-bitfinex.html
Gheorghiu, V., Gorbunov, S., Mosca, M., and Munson, B. (2017). Quantum-proofing the blockchain, from https://evolutionq.com/assets/mosca_quantum-proofing-the-blockchain_blockchain-research-institute.pdf
Greenspan, G. (2016). Understanding zero knowledge blockchains, from https://www.multichain.com/blog/2016/11/understanding-zero-knowledge-blockchains/
Hilary, G., Blockchain: Security and confidentiality. (December 1, 2018). French Military Police Journal (Revue de la Gendarmerie Nationale), Issue 4, 2018, 99-103, https://ssrn.com/abstract=3327248 or doi:https://doi.org/10.2139/ssrn.3327248.
Kalodner, H., Goldfeder, S., Chator, A., Möser, M., Narayanan, A. (2017). BlockSci: Design and applications of a blockchain analysis platform, working paper, https://arxiv.org/pdf/1709.02489.pdf.
Kar, I. (2016). The developers behind Ethereum are hacking the hacker that hacked it, from https://qz.com/713078/the-developers-behind-ethereum-are-hacking-the-hacker-that-hacked-it/
Light, J. (2017). The differences between a hard fork, a soft fork, and a chain split, and what they mean for the future of bitcoin, from https://medium.com/@lightcoin/the-differences-between-a-hard-fork-a-soft-fork-and-a-chain-split-and-what-they-mean-for-the-769273f358c9
Lundkvist, C. (2017). Introduction to zk-SNARKs with Examples, https://media.consensys.net/introduction-to-zksnarks-with-examples-3283b554fc3b
Lundkvist, C. (2019). SimpleMultiSig updates: EIP712 and security audit, from https://www.coindesk.com/zk-starks-new-take-on-zcash-tech-could-power-truly-private-blockchains/
Matzutt, R., Hiller, J., Henze, M., Ziegeldorf, J. H., Mullmann, D., Hohlfeld, O., and Wehrle, K. (2018). Quantitative analysis of the impact of arbitrary blockchain content on Bitcoin, Proc. 22nd International Conference on Financial Cryptography and Data Security 2018.
Mercer, R. (2016). Privacy on the Blockchain: Unique ring signatures, https://arxiv.org/abs/1612.01188
O’Ham, T. (2018). NEO blockchain goes down after a single node disconnects temporarily, from https://bitsonline.com/neo-blockchain-tanks/
Ray, S. (2017). Merkle trees, from https://hackernoon.com/merkle-trees-181cb4bc30b4
Rutlan, E. (2017). Blockchain Byte, R3 Research, https://www.finra.org/sites/default/files/2017_BC_Byte.pdf
Sandner (2017). Comparison of Ethereum, Hyperledger Fabric and Corda, http://explore-ip.com/2017_Comparison-of-Ethereum-Hyperledger-Corda.pdf
Sharma, M. (2017). 5 Bitcoin disasters of all time; why it's never safe to invest in virtual currency businesstoday.in/exclusive/rebrain-or-rot/bitcoin-disasters-virtual-currency-cryptocurrency-invest-in-bitcoin/story/265555.html
Steel, G. (2019). How ledger hacked an HSM, from https://cryptosense.com/blog/how-ledger-hacked-an-hsm
Tanzarian, A. (2014). #bitcoinfail: Top 10 Failures in Bitcoin History, from https://cointelegraph.com/news/bitcoinfail-top-10-failures-in-bitcoin-history
Thomsen, S. (2018). Ethereum wallet in a trusted execution environment/secure enclave, from https://medium.com/weeves-world/ethereum-wallet-in-a-trusted-execution-environment-secure-enclave-b200b4df9f5f
Town, S. (2018). Introduction to Chainlink (LINK)—The decentralized oracle network, from https://cryptoslate.com/chainlink/
Tramer, F., Boneh, D. and Paterson, K. G. (2020). Remote side-channel attacks on anonymous transactions, working paper, from https://crypto.stanford.edu/timings/
Valenta, M. and Sandner, P. (2017). Comparison of Ethereum, Hyperledger Fabric and Corda, FSBC Working Paper, http://explore-ip.com/2017_Comparison-of-Ethereum-Hyperledger-Corda.pdf
Vermeulen (2016). VisaNet—handling 100,000 transactions per minute, from https://mybroadband.co.za/news/security/190348-visanet-handling-100000-transactions-per-minute.html
Vermeulen (2017). Bitcoin and Ethereum vs visa and PayPal—transactions per second, from https://mybroadband.co.za/news/banking/206742-bitcoin-and-ethereum-vs-visa-and-paypal-transactions-per-second.html
Wong, J. I. and Kar, I. (2016). Everything you need to know about the Ethereum “hard fork”, from https://qz.com/730004/everything-you-need-to-know-about-the-ethereum-hard-fork/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 Editors
About this chapter
Cite this chapter
Hilary, G. (2022). Blockchain and Other Distributed Ledger Technologies, an Advanced Primer. In: Babich, V., Birge, J.R., Hilary, G. (eds) Innovative Technology at the Interface of Finance and Operations. Springer Series in Supply Chain Management, vol 11. Springer, Cham. https://doi.org/10.1007/978-3-030-75729-8_1
Download citation
DOI: https://doi.org/10.1007/978-3-030-75729-8_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-75728-1
Online ISBN: 978-3-030-75729-8
eBook Packages: Economics and FinanceEconomics and Finance (R0)