Blockchain Technology
Blockchain Technology
Blockchain Technology
Bitcoin is so far the best known blockchain
application, but the technology will soon give rise to
countless others. If, at the moment, blockchain
technology records financial transactions made with
digital currencies such as Bitcoin, it will in the future
serve as a registrar for things as different as birth and
death certificates, titles of ownership, marriage
licenses, educational degrees, insurance claims,
medical procedures and votes—essentially any kind of
transaction that can be expressed in code.
- Klaus Schwab
Distributed Ledger Technology and Blockchain
Blind Signature Scheme
1983
1989
To create a certificate for a document, the timestamp server
includes a hash pointer to the previous document’s certificate,
the current time, and signs these three data elements together.
Surety, LLC is an information assurance software and services company founded in
1994 by prominent Bellcore scientists, who pioneered the concept of trusted, digital
timestamping. Surety continually builds on our founders’ legacy by improving and
expanding our suite of independent, cryptographical time-stamp software and services.
A later paper by Haber and Stornetta proposed an efficiency improvement:
Instead of linking documents individually, we can collect them into blocks and
link blocks together in a chain.
Within each block, the documents would again be linked together, but in a tree
structure instead of linearly. [Merkel Tree]
This decreases the amount of checking needed to verify that a particular
document appears at a particular point in the history of the system.
Adam Back
New Cryptocurrencies
Cryptocurrency Demonetization Bitcoin Crash
Litecoin, Namecoin Bitcoin enters India
Exchanges in India and then Rise
and Swiftcoin
In 2013, the vintage era pizza shop known as Kolonial (Worli, Mumbai) became the first restaurant service in India to accept payments in
Bitcoin
P2P Network
and
Cryptography Transactions
and Hashing
Consensus
Algorithm
Blockchain Technology
Definition by NIST
Blockchains are distributed digital ledgers of
cryptographically signed transactions that are grouped into
blocks. Each block is cryptographically linked to the
previous one (making it tamper evident) after validation
and undergoing a consensus decision. As new blocks are
added, older blocks become more difficult to modify
(creating tamper resistance). New blocks are replicated
across copies of the ledger within the network, and any
conflicts are resolved automatically using established rules.
Cryptographic Hash Function
SHA 256
A cryptographic hash function is a special type of function which takes input of any size
and converts it to a small and fixed size output, called hash.
Cryptographic Properties:
Preimage Resistant (One way): Infeasible to determine x from Hash(x).
Collision Resistant: Infeasible to find and x and y where Hash(x) = Hash(y).
Avalanche Effect: Change x slightly and Hash(x) changes significantly.
Puzzle Friendliness: Knowing Hash(x) and part of x it is still very hard to find rest of
Block
Block
Voting required by members for any changes to be Depending on structure, changes can be demanded
implemented. from a sole party, or voting may be offered.
Votes tallied, and outcome implemented If voting allowed, votes are tallied internally, and
automatically without trusted intermediary. outcome of voting must be handled manually.