A Fair Model of Identity Information Exchange Leveraging Zero-Knowledge

Total Page:16

File Type:pdf, Size:1020Kb

A Fair Model of Identity Information Exchange Leveraging Zero-Knowledge A Fair model of identity information exchange Leveraging Zero-Knowledge 1st Mohsen Rahnamaei 3rd Siavash Khorsandi Department of Computer Science and Engineering Department of Computer Science and Engineering Amirkabir University of Technology Amirkabir University of Technology Tehran, Iran Tehran, Iran [email protected] [email protected] 2nd Saeid Tousi Saeidi 4th Mehdi Shajari Department of Computer Science and Engineering Department of Computer Science and Engineering Amirkabir University of Technology Amirkabir University of Technology Tehran, Iran Tehran , Iran [email protected] [email protected] Abstract—Many companies use identity information for dif- In the present study, a model has been implemented by em- ferent goals. There are a lot of market places for identity ploying these algorithms. In this model, the selling of identity information. These markets have some practical issues such as information is managed by using the peers as intermediaries privacy, mutual trust and fairing exchange. The management of identity information is one of the most important applications for in the Ethereum blockchain [5]. blockchain, for which researchers have proposed a large number Our contribution is a blockchain-based model that helps an of models. In the present paper, an attempt has been made to entity to sell his/her identity information in a fair way and solve the problems that mentioned earlier to exchange identity protect his/her privacy. information on the blockchain. By using the game theory we propose a fair model of selling authorized identity information We proposed a dynamic game for this exchange that in the in an environment that include untrusted parties. Moreover we Nash action profile both owner and buyer properly deal with employ ZK-SNARK to protect users’ privacy. Also we use proxy each other, we can see a fair and an accurate trade in this re-encryption to record these information in IPFS. statement. We use smart contract to eliminate central trusted Index Terms—Blockchain, Privacy, ZK-SNARK, Smart con- third party and enforce game rule.In this game the buyer must tracts, Proxy re-encryption, Game theory, Identity information management prove that he/she get particular data, however, privacy rights prevent him/her to publish clear data, in order to solve this problem we employed ZK-SNARK [6]. I. INTRODUCTION The article structure is as follows: In Section II, we will Researchers in the field of blockchain technology has intro- explore some related works. In Section III-A, we will review duced several applications for blockchain . One of the most some researches and will discuss their weakness. Section important of these applications is the identity information III consists of basic concepts. We will review blockchain management [1] . Citizens need to share their information with technology and smart contract. In Section III-B, we review others in a certified and accredited manner. This action allows some concepts about privacy in the blockchain. We review them to take advantage of different social services. However, the basic concepts about zero-knowledge proof in III-C. The arXiv:2106.14180v1 [cs.CR] 27 Jun 2021 misuse of this information causes privacy violations [2]. proxy re-encryption algorithm is explained in Section III-D. In Blockchain is a distributed database on which the accuracy the next section, we describe our proposed solution. In IV-A, of the stored data can be guaranteed [3]. Researchers usually we present the basic concepts about our model. Also, in IV-B, use this technology for storing metadata. The architecture we discuss on the validity of our solution. Finally, in V, we and the way of employing this technology, along with some describe the conclusion. concerns about privacy and fairness , is the main challenge for researchers. In the present article, a new model has been II. RELATED WORK presented to maintain and enhance users’ privacy. The use of zero-knowledge proof algorithms and other en- In [7] authors develop smart contract that entities can cryption algorithms is a common tool in enhancing the privacy employ to trade IOT data. They use proxy re-encryption of blockchain-based applications. The proxy re-encryption [4] to improve scalability in this market. The confidentiality of algorithms used in the proposed model. A complete description data guaranteed with proxy re-encryption algorithm and the of the function of these algorithms is presented in Section financial transactions are automatically managed with smart III-D. contract. In this paper, writers supposed that all entities are trustable, in other word, they supposed the owner of informa- way that privacy to be improved. These studies often introduce tion send his/her data to the buyer without any dishonesty. Our new structures by applying encryption algorithms [13]. model develop the possibility of trading data in a situation The second category is related to research, in which the where buyer and seller don’t need any trust on each other. blockchain is used to improve privacy in other applications Notably, we have to emphasize that in each exchange of goods, [14]. In the second category, some of the models proposed fairness is very important, in another word seller must get the for identity information management on the blockchain, only money in exchange for goods and similarly for the buyer must stores metadata on the blockchain. In these models, the get goods in exchange of money. primary information is stored on centralized or distributed There are some researches that trying to improve fairness in storage, and the output of the hash function is placed on the blockchain based trading [8] [9] [10].The basic approaches the blockchain. Since it is challenging to make changes to to overcome fairness problem is Atomic Swap [10].Bigi et al. the information recorded on the blockchain, any unauthorized [8] use normal form game to work out fairness problem. In [8], changes to the information stored in the distributed database authors assume sent goods are accurate and authentic, while will be recognizable. owner may send defective goods. In this game if the owner send defective good the buyer prefer to be dishonest and verify C. Zero knowledge proof the transmission, while he get inaccurate good, because he One of the big problems in privacy was proving something want to increase his/her payoff. which prover didn’t want to reveal any information about real There exist different studies to facilitate trading data on things, for example, Alice wants to prove Bob, that she knows blockchain [11] [7] [9].Ari et al. [11] Published one of the first some secrets, but she doesn’t prefer to show that to Bob. paper that proposed criminal smart contract. These contracts Zero-knowledge proof devised to resolve this problem .This employ to handle financials transactions for criminals. For notion proposed in 1989 by MIT researchers Goldwasser et example leakage of secrets, key compromise and “calling- al. [15]. They explained the concept of knowledge, and how card” crimes, such as assassination. Their propose solution can convincingly prove the statement. In all zero-knowledge for document leakage is sophisticate in comparison with our protocols such as ZK-SNARK, we can see completeness, solution. We use game theory and ZK-SNARK to overcome soundness and zero-knowledge. this problem. • Completeness: If the statement is correct, then the verifier III. BASIC CONCEPTS will convince by an honest prover. • Soundness: If the statement is not true, any prover can’t A. Blockchain and Smart Contract convince the honest verifier, except some small probabil- Blockchain is a transparent distributed database that every- ity. one can use, and at the same time, no one has control over it. • Zero knowledge: Prover doesn’t disclose the private in- This database consists of a set of blocks connected by hash formation to verifier. algorithms. The connection of blocks improves the accuracy In this paper, the ZK-SNARK(Zero-Knowledge Succinct of the information contained in the blocks. These blocks are Non-Interactive Argument of Knowledge) is leveraged to updated by network peers. None of the peers has absolute preserve privacy in data transmission and proving of that. For control over the information recorded on the blockchain, and implementation phase, Zokrates [16] used to provide verifier attempts have been made to use motivational engineering smart contract and proof. This library provides high level algorithms so that the peers act in such a way that the blocks language to generating proofs of computation and verification to be updated [3].Storing metadata on the blockchain assist in Solidity. in ensuring the accuracy of these information related to this ZK-SNARK requires initial trusted setup phase which gen- metadata, which has been stored in other centralized and erates the common reference string and it must be done by distributed storage. a trusted entity. This is a challenging phase of the protocol. Ethereum smart contracts, as a distributed programs on Using a trusted entity is not irrational, but there is another peers available in the Ethereum blockchain, allow program- solution which can use to eliminate relying on the centralized mers to make sure their applications are running correctly. entity. Zcash generated ZK-SNARK parameters by using the With smart contracts, it is possible to build applications and trusted setup ceremony(multiparty computation) [17]. projects to have the capability of permanently functioning without intermediaries and corruption. Even a smart contract D. Proxy Re-Encryption programmer cannot change the smart contract code registered Proxy re-encryption algorithms [4] are a set of algorithms in the blockchain [12]. that allow an unreliable intermediary to re-encrypt an en- crypted text by another key. The unreliable intermediary can B. Privacy and Blockchain perform this process without knowing anything about the data. The research on blockchains’ privacy is divided into two Proxy re-encryption algorithms are similar to the public key general categories.
Recommended publications
  • A Study on Governance for Decentralized Finance Systems Using Blockchain Technologies
    A Study on Governance for Decentralized Finance Systems Using Blockchain Technologies Keio Research Institute at SFC May 22nd, 2020 Table of Contents BACKGROUND AND PURPOSE OF THE STUDY ..................................................................... 2 BACKGROUND OF THE STUDY ........................................................................................................ 2 SUMMARY OF THE STUDY .............................................................................................................. 3 1. RESEARCH AND ANALYSIS OF MULTI-STAKEHOLDER GOVERNANCE ON THE INTERNET (IMSG) ........................................................................................................................ 6 1.1. THE INTERNET, THE COMMUNITY, AND THE PROCESS OF ITS GOVERNANCE ........................... 6 1.2. COMMUNITIES AND THEIR CHALLENGES FROM AN INTERNET GOVERNANCE PERSPECTIVE .... 22 1.2.1. ICANN ................................................................................................................... 22 1.2.2. IGF ........................................................................................................................ 53 1.2.3. Internet Society ..................................................................................................... 58 1.2.4. IETF ...................................................................................................................... 62 1.2.5. W3C .....................................................................................................................
    [Show full text]
  • Strategies for Adopting DLT/ Blockchain Technologies in Arab Countries
    Arab Regional Fintech Working Group Strategies for adopting DLT/ Blockchain Technologies in Arab Countries No. 167 2021 Arab Regional Fintech Working Group Strategies for adopting DLT/ Blockchain Technologies in Arab Countries Arab Monetary Fund August 2021 Acknowledgement This policy guide was produced under the mandate of the Arab Regional Fintech Working Group (WG). The WG promotes the exchange of knowledge and expertise, strengthening the capacity of the Arab regulators, as well as building a network of Arab and international experts from the public and private sectors to promote the fintech industry and foster innovation. The “Strategies for adopting DLT/ Blockchain Technologies in Arab Countries” paper was by the following team: Dr. Ahmed Mansour Egypt Post – Executive Secretary General Dr. Houssem eddine Bedoui Islamic Development Bank Group – Head, Strategy Management and Policy (SMP) Unit Mr. Ishan Pandey KARM Legal Consultants – Legal Researcher Dr. Nouran Youssef Arab Monetary Fund – Senior Financial Specialist Mr. Ratul Roshan KARM Legal Consultants – Associate & Regulatory Advisor The document has benefited from valuable review, insightful comments and suggestions provided by Ms. Caroline Malcolm from the Organisation for Economic Cooperation and Developmennt (OECD), Mr. Ahmed Faragallah and Mr. Raunak Mittal from the World Bank Group (WBG), and Ms. Khathryn White a Fellow with the World Economic Forum (WEF). Moreover, the authors extend appreciation to the Arab Central Banks members of the Arab Regional Fintech WG for their usefull comments. In addition, special thanks go to KARM legal Consultamts, member of the Arab Regional Fintech WG, for their contribution to this document. Any queries regarding this report should be addressed to: Nouran Youssef, Doctorate of Business Administration Senior Financial Sector Specialist, Arab Monetary Fund Financial Sector Development Division, Economic Department Corniche Street, P.O Box 2818, Abu Dhabi, United Arab Emirates Tel.
    [Show full text]
  • (GDPR): a Delphi Study
    PEER Reviewed RESEARCH OPEN ACCESS ISSN Online: 2516-3957 ISSN Print: 2516-3949 https://doi.org/10.31585/JBBA-1-1-(4)2018 Blockchain and Privacy Protection in Case of The European General Data Protection Regulation (GDPR): A Delphi Study Simon Schwerin Berlin School of Economics and Law, Germany Correspondence: [email protected] Received: 28 March 2018 Accepted: 30 March 2018 Published: 18 April 2018 Abstract The present work deals with the interrelationships of blockchain technology and the new European General Data Protection Regulation, that will be intact after May 28th, 2018. The regulation harmonizes personal data protection across the European Union and aims to return the ownership of personal data to the individual. This thesis, therefore, addresses the question how this new technology that is characterized by decentralization, immutability and truly digitized values will be affected by the strict privacy regulation and vice versa. The aim of this work is to clarify whether blockchains can comply with the new regulation on the one hand and to identify how blockchain could support its compliance, on the other hand. The questions are validated through an extensive literature review and are further investigated by using a Delphi study that asks a panel of 25 renowned experts to find opportunities, limitations and general suggestions about both topics. In addition, a framework is proposed to support the assessment of privacy and related risks of blockchains. As a result, it becomes apparent that blockchains can become more privacy friendly and comply with the regulation if an active dialogue between blockchain developers and regulatory authorities helps to strengthen their mutual understanding and work.
    [Show full text]
  • Secure Identity Management on the Blockchain
    Eötvös Loránd University Faculty of Informatics SECURE IDENTITY MANAGEMENT ON THE BLOCKCHAIN Adám Nágy Kwadjo Anobaah Nyante Assistant Professor at ELTE Msc. Security & Privacy Advanced Cryptography Andreas Peter Assistant Professor / Study Coordi- nator – Cyber Security & Safety at University Of Twente Zoltán Hattyasy Senior PM & Architect Mission Critical Systems at E-GROUP Budapest, 2018. Summary One major topical issue that has generated a lot of controversy in the cyber security land- scape is Secure Identity Management. So serious is this issue that many educationists and academicians have expressed varying concerns, proposals, and solutions about the subject. Traditional Identity Management solutions delegate trusted centralized organizations / multiple centralized agencies (service providers) and task them with securely storing the private data of users and providing these users with identity tokens such as ID cards, cer- tificates, login credentials, hardware, and passports. With these identity tokens, users can uniquely access resources and services from the respective service providers. This approach has resulted in four main classes of problems namely: Individual user problems, Infor- mation Sharing problems, Governmental information coordination problems, and Privacy problems. These problems are particular conspicuous in the banking sector when it comes to Know- Your-Customer Processes (KYC). It is expensive and time consuming to do the necessary background checks on customers and their transactions for compliance agencies. At the same time, these background checks have create severe privacy issues that need to be ad- dressed. In this research, Distributed Ledger Technologies (blockchain) are used to solve these major problems. A hybrid solution is proposed, which is a combination of: 1. A blockchain Gateway Solution, which supports legal compliance and traditional Identity Management features that require strong authentication.
    [Show full text]
  • Protection of Personal Data in Blockchain Technology
    Protection of Personal Data in Blockchain Technology An investigation on the compatibility of the General Data Protection Regulation and the public blockchain Amelia Wallace Department of Law Master’s Thesis, 30 HE credits Area: Law and Informatics Master’s Program in Law (270 HE) Autumn term 2018 Group mentor: Johan Axhamn Swedish title: Personuppgiftsskyddet i Blockkedjeteknik – En utredning om förenligheten av dataskyddsförordningen och den publika blockkedjan Abstract On 25 May 2018 the General Data Protection Regulation, GDPR, came into force in the EU. The regulation strengthened the rights of the data subjects’ in relation to the data controllers and processors and gave them more control over their personal data. The recitals of the GDPR state that it was the rapid development in technology and globalisation that brought new challenges for the protection of personal data. Private companies and public authorities where making use of personal data on an unprecedented scale in order to pursue their own activities. The protection should be technologically neutral and not dependant on the technique used. This leads to questions on whether the protection that is offered through the GDPR is de facto applicable on all technologies. One particular technology which has caught interest of both private companies and public authorities is the blockchain. The public distributed blockchain is completely decentralized, meaning it is the users who decide the rules and its content. There are no intermediaries in power and the transactions of value or other information is sent peer to peer. By using asymmetric cryptography and advanced hash algorithms the transactions sent in the blockchain are secured.
    [Show full text]
  • The National Blockchain Roadmap. Progressing Towards a Blockchain
    THE NATIONAL BLOCKCHAIN ROADMAP: Progressing towards a blockchain-empowered future. INDUSTRY.GOV.AU/BLOCKCHAIN ACKNOWLEDGEMENTS The Department of Industry, Science, Energy and Resources (DISER) would like to acknowledge the assistance and guidance provided by the National Blockchain Roadmap Advisory Committee, comprising: • Ms Louise Talbot, General Manager, Digital Economy and Technology Division, Department of Industry, Science, Energy and Resources (DISER) (Chair) • Mr Nick Giurietto, CEO and Managing Director, Blockchain Australia (Deputy Chair) • Dr Mark Staples, Senior Research Scientist, CSIRO’s Data 61 • Ms Katie Ford, Head of Government Business, CSIRO’s Data61 • Professor Jason Potts, Economics, Finance and Marketing, RMIT University (RMIT) • Dr Chris Berg, Senior Research Fellow, Economics, Finance and Marketing, RMIT • Ms Leanne Kemp, Founder and CEO, Everledger • Ms Adriana Belotti, Head of Marketing and Community, Prismatik. DISER would also like to thank staff at Austrade, the Department of Agriculture and RMIT who developed the Sectoral Showcases in partnership with us. And a special thankyou to the blockchain sectoral community of Australia, who generously gave their time to engage and provide feedback on the Roadmap. 2 NATIONAL BLOCKCHAIN ROADMAP THE NATIONAL BLOCKCHAIN ROADMAP: Progressing towards a blockchain-empowered future. NATIONAL BLOCKCHAIN ROADMAP 3 Contents Foreword 5 Executive summary 6 Context and opportunity 8 What is blockchain? 8 The blockchain opportunity for Australia 8 The blockchain landscape in Australia
    [Show full text]
  • The Social Construction of Blockchain Privacy Platforms
    The social construction of blockchain privacy platforms by Jennifer Mentanko B.A., MacEwan University, 2015 Thesis Submitted in Partial Fulfillment of the Requirements for the DeGree of Master of Arts in the School of Communication Faculty of Communication, Art and TechnoloGy © Jennifer Mentanko 2020 SIMON FRASER UNIVERSITY Summer 2020 CopyriGht in this worK rests with the author. Please ensure that any reproduction or re-use is done in accordance with the relevant national copyright legislation. Declaration of Committee Name: Jennifer Mentanko Degree: Master of Arts (Communication) Title: The social construction of blockchain privacy platforms Examining Committee: Chair: Ahmed Al-Rawi Assistant Professor, Communication Peter Chow-White Supervisor Professor, Communication Andrew Feenberg Committee Member Professor, Communication Frederik Lesage Examiner Associate Professor, Communication ii Ethics Statement iii Abstract Our current Internet environment is characterized by online conGlomerates, predictive computinG and data mininG. With this, there is a GrowinG concern amonG users on how to protect their privacy and manaGe their identities online. Advocates for blockchain, the newest large-scale wave of Internet based platforms, argue it is hiGhly useful for privacy protection. Blockchain is an encrypted and decentralized public ledGer that verifies and stores information throuGh a peer-to-peer network. UsinG the social construction of technoloGy (SCOT) as a theoretical framework, I deploy a comparative discourse analysis of three blockchain platforms - Brave, Civic and Oasis Labs - alonG with user discourse on Reddit and Medium. This thesis explores how users socially construct this emerginG technoloGy by comparinG privacy discourse between blockchain platforms and motivated social aGents. I found blockchain privacy platforms and its users both value data ownership, ad-blockinG and safety and security.
    [Show full text]
  • Report on Data Privacy Regulations Applicable to Blockchain Technology in Various Jurisdictions Worldwide
    Report on Data Privacy Regulations Applicable to Blockchain Technology in Various Jurisdictions Worldwide By the Privacy Working Group of INATBA DECEMBER 2020 Report on Data Privacy Regulations Applicable to Blockchain Technology in Various Jurisdictions Worldwide December 2020 Contents 1. Executive Summary .......................................................2 2. Introduction ..............................................................3 3. Cross-country comparison .................................................5 4. Contributors ..............................................................7 5. EU General Data Protection Regulation .............................. 8 6. Country specific chapters ................................................15 Brazil .............................................................15 Canada .......................................................... 20 China ............................................................ 27 Hong Kong .......................................................41 India ............................................................46 Japan ........................................................... 57 Russia ........................................................... 62 Singapore ....................................................... 70 South Korea ..................................................... 75 Switzerland ......................................................80 Ukraine ..........................................................84 United Kingdom .................................................90
    [Show full text]
  • Multidisciplinary Aspects of Blockchain
    Multidisciplinary Aspects of Blockchain Natascha van Duuren LLM Victor de Pous LLM (eds.) MULTIDISCIPLINARY ASPECTS OF BLOCKCHAIN 1 © 2019, M.H. Blom, D. Dey, N.H.A. van Duuren, L.M. van Ekeren, J. van Helden, V.G Hoek, E.S.R. Johan, C. Konstapel, J.K.F. Nienhuis, H.J.P. Nouwens, V.A. de Pous, A. Reesink, L. Ruoff–van Welzen, R. Soetens, H.L. Souw, L.L.A.M. Thissen, S.R. Wallagh, D. de Wit. ISBN: 978-90-9031867-7 NUR: 820 Multidisciplinary aspects of blockchain 2 Index Foreword 5 Editorial 6 1 Societal and economic perspective 8 Victor de Pous 2 The first scope of application: cryptocurrencies 13 Laurens Thissen 3 Digital competences for blockchain 17 Liesbeth Ruoff–van Welzen 4 Blockchain from a cybersecurity perspective 21 Jan Nienhuis 5 Smart contracts; how smart really? 28 Natascha van Duuren 6 Healthcare sector and blockchain: a solution looking for an application? 32 Dirk de Wit 7 Blockchain in the payment system 36 Marnix Blom 8 Trends in digital law: what about blockchain? 40 Victor de Pous 9 Privacy and blockchain 44 Jeroen van Helden 10 Impact of blockchain on the Internet of Things 48 Diptish Dey and Serge Wallagh 11 From client to vendor relationship management 51 Leon van Ekeren 12 EDP Auditing and blockchain: blind faith or auditable trust? 55 Robbert Johan and Maarten Souw 13 Identity and authentication organised differently 59 Vincent Hoek 14 Programming blockchain software in open source 63 Victor de Pous 15 Technology and architecture for blockchain 67 Hans Nouwens & Christiaan Konstapel MULTIDISCIPLINARY ASPECTS OF
    [Show full text]
  • A Comparative Analysis of Distributed Ledger Technology Platforms
    Received September 25, 2019, accepted October 30, 2019, date of publication November 15, 2019, date of current version December 3, 2019. Digital Object Identifier 10.1109/ACCESS.2019.2953729 A Comparative Analysis of Distributed Ledger Technology Platforms MOHAMMAD JABED MORSHED CHOWDHURY 1, MD. SADEK FERDOUS 2,3, KAMANASHIS BISWAS4,5, (Member, IEEE), NIAZ CHOWDHURY6, A. S. M. KAYES 1, MAMOUN ALAZAB 7, AND PAUL WATTERS 1 1Department of Computer Science and Information Technology, La Trobe University, Melbourne, VIC 3086, Australia 2Department of Computer Science and Engineering, Shahjalal University of Science and Technology, Sylhet 3114, Bangladesh 3Business School, Imperial College London, London SW7 2AZ, U.K. 4Peter Faber Business School, Australian Catholic University, North Sydney, NSW 2060, Australia 5School of Information and Communication Technology, Griffith University, Gold Coast, QLD 4215, Australia 6Knowledge Media Institute, The Open University, Milton Keynes MK7 6AA, U.K. 7College of Engineering, IT and Environment, Charles Darwin University, Casuarina, NT 0810, Australia Corresponding author: Mohammad Jabed Morshed Chowdhury ([email protected]) ABSTRACT Distributed Ledger Technology (DLT) has emerged as one of the most disruptive technologies in the last decade. It promises to change the way people do their business, track their products, and manage their personal data. Though the concept of DLT was first implemented in 2009 as Bitcoin, it has gained significant attention only in the past few years. During this time, different DLT enthusiasts and commercial companies have proposed and developed several DLT platforms. These platforms are usually categorized as public vs private, general purpose vs application specific and so on. As a growing number of people are interested to build DLT applications, it is important to understand their underlying architecture and capabilities in order to determine which DLT platform should be leveraged for a specific DLT application.
    [Show full text]
  • Blockchain 101 – an Executive Introduction to Distributed Ledger Technology Abstract
    Blockchain 101 – An Executive Introduction to Distributed Ledger Technology Abstract This report is a starting point for enterprise executives and IT leaders to better understand the basics as to what blockchain is, how it works, how it compares and integrates with existing technologies, why it is of value to the enterprise, and potential enterprise use cases. We also describe some of the significant roadblocks that must be overcome to achieve the lofty potential of this industry movement. Blockchain is a simple concept that can be game changing as adoption increases and a supporting ecosystem is built. That said, it has the potential of disrupting many long-standing processes. Blockchain tends to be either over-hyped or totally dismissed by analysts and vendors because of their a vested self-interest. In contrast, we seek to provide a balanced, independent perspective for our enterprise clients. Throughout this report we address many aspects of blockchain technology. We start with some of the basics on the technology itself, provide five business reasons to at least evaluate blockchain, and we’ll share five roadblocks you may need to address. We’ll also share blockchain patterns that may help you discover opportunities in the context of your business needs and provide educational guidance. Finally, we’ll recommend an enterprise blockchain action plan for your consideration. Authors: Gary Zimmerman Gary Rowe CMO / Principal Consulting Analyst CEO / Principal Consulting Analyst [email protected] [email protected] Blockchain 101 Zimmerman & Rowe Table of Contents 2 © 2017 TechVision Research, all rights reserved www.techvisionresearch.com Blockchain 101 Zimmerman & Rowe 3 © 2017 TechVision Research, all rights reserved www.techvisionresearch.com Blockchain 101 Zimmerman & Rowe Introduction Most IT and business executives have or will shortly be exposed to blockchain.
    [Show full text]
  • Blockchain 101 – an Executive Introduction to Distributed Ledger Technology Abstract
    Blockchain 101 – An Executive Introduction to Distributed Ledger Technology Abstract This report is a starting point for enterprise executives and IT leaders to better understand the basics as to what blockchain is, how it works, how it compares and integrates with existing technologies, why it is of value to the enterprise, and potential enterprise use cases. We also describe some of the significant roadblocks that must be overcome to achieve the lofty potential of this industry movement. Blockchain is a simple concept that can be game changing as adoption increases and a supporting ecosystem is built. That said, it has the potential of disrupting many long-standing processes. Blockchain tends to be either over- hyped or totally dismissed by analysts and vendors because of their a vested self-interest. In contrast, we seek to provide a balanced, independent perspective for our enterprise clients. Throughout this report we address many aspects of blockchain technology. We start with some of the basics on the technology itself, provide five business reasons to at least evaluate blockchain, and we’ll share five roadblocks you may need to address. We’ll also share blockchain patterns that may help you discover opportunities in the context of your business needs and provide educational guidance. Finally, we’ll recommend an enterprise blockchain action plan for your consideration. Authors: Gary Zimmerman Gary Rowe CMO / Principal Consulting Analyst CEO / Principal Consulting Analyst [email protected] [email protected]
    [Show full text]