Understanding Modern Banking Ledgers Through Blockchain Technologies: Future of Transaction Processing and Smart Contracts on the Internet of Money

  • Gareth W. PetersEmail author
  • Efstathios Panayi
Part of the New Economic Windows book series (NEW)


In this chapter we provide an overview of the concept of blockchain technology and its potential to disrupt the world of banking through facilitating global money remittance, smart contracts, automated banking ledgers and digital assets. In this regard, we first provide a brief overview of the core aspects of this technology, as well as the second-generation contract-based developments. From there we discuss key issues that must be considered in developing such ledger based technologies in a banking context.


Blockchain Smart contracts Banking ledgers Data integrity Data security Exchange clearing 


  1. Barber, S., Boyen, X., Shi, E., Uzun, E.: Bitter to betterhow to make bitcoin a better currency. Financial Cryptography and Data Security, pp. 399–414. Springer (2012)Google Scholar
  2. Bell, D.E., LaPadula, L.J.: Secure computer systems: mathematical foundations. Technical report. DTIC Document (1973)Google Scholar
  3. Benkler, Y.: The Wealth of Networks: how Social Production Transforms Markets and Freedom. Yale University Press (2006)Google Scholar
  4. Biba, K.J.: Integrity considerations for secure computer systems. Technical report. DTIC Document (1977)Google Scholar
  5. Bliss, R.R., Steigerwald, R.S.: Derivatives clearing and settlement: A comparison of central counterparties and alternative structures. Econ. Perspect. 30(4) (2006)Google Scholar
  6. Buterin, V.: Multisig: The Future of Bitcoin (2014a)Google Scholar
  7. Buterin, V.: A next-generation smart contract and decentralized application platform. White Paper (2014b)Google Scholar
  8. Carter, J.L., Wegman, M.N.: Universal classes of hash functions. In: Proceedings of the ninth annual ACM symposium on Theory of computing, pp. 106–112. ACM (1977)Google Scholar
  9. Clark, D.D., Wilson, D.R.: A comparison of commercial and military computer security policies. In: 1987 IEEE Symposium on. IEEE Security and Privacy, pp. 184–184 (1987)Google Scholar
  10. Czepluch, J.S., Lollike, N.Z., Malone, S.O.: The Use of Block Chain Technology in Di_erent Application Domains (2015)Google Scholar
  11. Denning, Dorothy E.: A lattice model of secure information ow. Commun. ACM 19(5), 236–243 (1976)MathSciNetCrossRefzbMATHGoogle Scholar
  12. Devanbu, P., Gertz, M., Martel, C., Stubblebine, S.G.: Authentic third-party data publication. In: Data and Application Security, pp. 101–112. Springer (2001)Google Scholar
  13. Douceur, J.R.: The sybil attack. In: Peer-to-peer Systems, pp. 251–260. Springer (2002)Google Scholar
  14. Duffe, D., Zhu, H.: Does a central clearing counterparty reduce counterparty risk? Review of Asset Pricing Studies, 1(1), 74–95 (2011)Google Scholar
  15. Elmasri, R., Navathe, S.B.: Fundamentals of Database Systems. Pearson (2014)Google Scholar
  16. Franco, P.: Understanding Bitcoin: Cryptography, Engineering and Economics. Wiley (2014)Google Scholar
  17. Ge, X., Polack, F., Laleau, R.: Secure databases: an analysis of Clark-Wilson model in a database environment. In: Advanced Information Systems Engineering, pp. 234–247. Springer (2004)Google Scholar
  18. Halevi, S., Harnik, D., Pinkas, B, Shulman-Peleg, A.: Proofs of owner- ship in remote storage systems. In: Proceedings of the 18th ACM conference on Computer and communications security, pp. 491–500. ACM (2011)Google Scholar
  19. Kosba, A., Miller, A., Shi, E., Wen, Z., Papamanthou, C.: Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. Technical report. Cryptology ePrint Archive, Report 2015/675, 2015 (2015).
  20. Lamport, Leslie, Shostak, Robert, Pease, Marshall: The Byzantine generals problem. ACM Trans. Program. Lang. Syst. (TOPLAS) 4(3), 382–401 (1982)CrossRefzbMATHGoogle Scholar
  21. Merkle, R.C.: Protocols for public key cryptosystems. In: Null, pp. 122. IEEE (1980)Google Scholar
  22. Merkle, R.C.: Secrecy, Authentication, and Public Key Systems (1979)Google Scholar
  23. Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008)Google Scholar
  24. Pessoa, M., Williams, M.J.: Government cash management: relationship between the treasury and the Central Bank. Int. Monetary Fund (2013)Google Scholar
  25. Peters, G.W., Panayi, E., Chapelle, A.: Trends in crypto-currencies and blockchain technologies: A monetary theory and regulation perspective (2015). arXiv preprint arXiv:1508.04364
  26. Peters, G.W., Chapelle, A., Panayi, E.: Opening discussion on banking sector risk exposures and vulnerabilities from virtual currencies: an operational risk perspective. Available at SSRN 2491991Google Scholar
  27. Redmond, E., Wilson, J.R.: Seven databases in seven weeks: a guide to modern databases and the NoSQL movement. Pragmatic Bookshelf (2012)Google Scholar
  28. Reid, F., Harrigan, M.: An Analysis of Anonymity in the Bitcoin System. Springer (2013)Google Scholar
  29. Rosenfeld, M.: Overview of colored coins. White paper, (2013)Google Scholar
  30. Sandhu, Ravi S.: Lattice-based access control models. Computer 26(11), 9–19 (1993)CrossRefGoogle Scholar
  31. Swan, M.: Blockchain: Blueprint for a New Economy. O’Reilly Media, Inc. (2015)Google Scholar
  32. Swanson, T.: (2015) Consensus-as-a-service: a brief report on the emergence of permissioned, distributed ledger systemsGoogle Scholar
  33. Szabo, Nick: Formalizing and securing relationships on public networks. First Monday 2(9), 31 (1997)CrossRefGoogle Scholar
  34. Tripunitara, Mahesh V., Li, Ninghui: The foundational work of Harrison-Ruzzo-Ullman revisited. IEEE Trans. Dependable Secure Comput. 10(1), 28–39 (2013)CrossRefGoogle Scholar
  35. Wood, G.: Ethereum: a secure decentralised generalised transaction ledger (2014)Google Scholar
  36. Yaker, I.F., Pattanayak, S.: . Treasury Single Account: an essential tool for government cash management. Int. Monetary Fund (2012)Google Scholar
  37. Zyskind, G., Nathan, O.z., Pentland, A.: Enigma: Decentralized Computation Platform with Guaranteed Privacy (2015). arXiv preprint arXiv:1506.03471

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  1. 1.Department of Statistical ScienceUniversity College LondonLondonUK
  2. 2.Department of Statistical ScienceOxford Mann Institute, Oxford UniversityOxfordUK
  3. 3.Systemic Risk CenterLondon School of EconomicsLondonUK
  4. 4.Department of Computer ScienceUCLLondonUK

Personalised recommendations