A Survey on Block chain Technology beyond Bitcoin
Keywords:
Blockchain, Bitcoin, Public Ledger, Distributed Consensus.Abstract
A Blockchain (BC) is essentially a distributed database of records or public ledger of all transactions or digital events that have been executed and shared among participating parties. Each transaction in the public ledger is verified by consensus of a majority of the participants in the system. And, once entered, information can never be erased. The BC contains a certain and verifiable record of every single transaction ever made. Bitcoin, the decentralized peer to peer digital currency, is the most popular example that uses BC technology. The digital currency bitcoin itself is highly controversial but the underlying BC technology has worked flawlessly and found wide range of applications in both financial and nonfinancial world. The main hypothesis is that the BC establishes a system of creating a distributed consensus in the digital online world. This allows participating entities to know for certain that a digital event happened by creating an irrefutable record in a public ledger. It opens the door for developing a democratic open and scalable digital economy from a centralized one. There are tremendous opportunities in this disruptive technology and revolution in this space has just begun. This white paper describes BC technology and some compelling specific applications in both financial and nonfinancial sector. We then look at the challenges ahead and business opportunities in this fundamental technology that is all set to revolutionize our digital world.
Downloads
References
―State of blockchain q1 2016: Blockchain funding overtakes bitcoin,‖ 2016. [Online]. http://www.coindesk.com/ state- of-blockchain-q1-2016
S. Nakamoto, ―Bitcoin: A peer-to-peer electronic cash system,‖ 2008. [Online]. Available: https://bitcoin.org/bitcoin.pdf
M. H. Miraz, M. Ali, Applications of Blockchain Technology beyond Cryptocurrency, Annals of Emerging Technologies in Computing (AETiC) Vol. 2(1) 2018,1-6.
M. H. Miraz, "Blockchain: Technology Fundamentals of the Trust Machine," Machine Lawyering, Chinese University of Hong Kong, 23rd December 2017, Available http://dx.doi.org//10.13140/RG.2.2.22541.64480/2
. Z.Zheng, S. Xie, H. Dai, X. Chen, H. Wang, An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends, 2017 IEEE 6th International Congress on Big Data, 557-564.
G. Foroglou and A.-L. Tsilidou, ―Further applications of the blockchain,‖ 2015.
A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Papamanthou, ―Hawk: The blockchain model of cryptography and privacy- preserving smart contracts,‖ in Proceedings of IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA, 2016,839–858.
Y. Zhang and J. Wen, ―An iot electric business model based on the protocol of bitcoin,‖ in Proceedings of 18th International Conference on Intelligence in Next Generation Networks (ICIN), Paris, France, 2015, 184–191.
S. Meiklejohn, M. Pomarole, G. Jordan, K. Levchenko, D. McCoy, G. M. Voelker, and S. Savage, ―A fistful of bitcoins: Characterizing payments among men with no names,‖ in Proceedings of the 2013 Conference
on Internet Measurement Conference (IMC’13), New York, NY, USA, 2013.
A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Papamanthou, ―Hawk: The blockchain model of cryptography and privacy- preserving smart contracts,‖ in Proceedings of IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA, 2016, 839–858.
J. Barcelo, ―User privacy in the public bitcoin blockchain,‖ 2014.
A. Biryukov, D. Khovratovich, and I. Pustogarov, ―Deanonymisation of clients in bitcoin p2p network,‖ in Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, New York, NY, USA, 2014, pp. 15– 29.
M. M¨oser, ―Anonymity of bitcoin transactions: An analysis of mixing services,‖ in Proceedings of M¨unster Bitcoin Conference, M¨unster, Germany, 2013, pp. 17–18.
NRI, ―Survey on blockchain technologies and related services,‖ Tech. Rep., 2015. [Online]. Available: http://www.meti.go.jp/english/press/ 2016/pdf/0531 01f.pdf
K. Nayak, S. Kumar, A. Miller, and E. Shi, ―Stubborn mining: Generalizing selfish mining and combining with an eclipse attack,‖ in Proceedings of 2016 IEEE European Symposium on Security and Privacy (EuroS&P), Saarbrucken, Germany, 2016, pp. 305–320.
S. Solat and M. Potop-Butucaru, ―ZeroBlock: Timestamp-Free Prevention of Block-Withholding Attack in Bitcoin,‖ Sorbonne
Universites, UPMC University of Paris 6, Technical Report, May 2016. [Online]. Available: https://hal.archives- ouvertes.fr/hal-01310088
N. Szabo, ―The idea of smart contracts,‖ 1997.
B. W. Akins, J. L. Chapman, and J. M. Gordon, ―A whole new world: Income tax considerations of the bitcoin economy,‖ 2013. [Online]. Available: https://ssrn.com/abstract=2394738.
Y. Zhang and J. Wen, ―An iot electric business model based on the protocol of bitcoin,‖ in Proceedings of 18th International Conference on Intelligence in Next Generation Networks (ICIN), Paris, France, 2015, 184–191.
C. Noyes, ―Bitav: Fast anti-malware by distributed blockchain consensus and feedforward scanning,‖ arXiv preprint arXiv:1601.01405, 2016.
I. Eyal and E. G. Sirer, ―Majority is not enough: Bitcoin mining is vulnerable,‖ in Proceedings of International Conference on Financial Cryptography and Data Security, Berlin, Heidelberg, 2014, 436– 454.
Downloads
Published
How to Cite
Issue
Section
License
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.