New Kids on the Blocks: an Analysis of Modern Blockchains

Total Page:16

File Type:pdf, Size:1020Kb

New Kids on the Blocks: an Analysis of Modern Blockchains New kids on the block: an analysis of modern blockchains Luke Anderson∗, Ralph Holz∗, Alexander Ponomarev†, Paul Rimba†, Ingo Weber† ∗University of Sydney, Sydney, Australia †Data61/CSIRO, Sydney, Australia ∗{l.anderson,ralph.holz}@sydney.edu.au †fi[email protected] ABSTRACT a network of untrusted nodes. A majority of these nodes Half a decade after Bitcoin became the first widely used need to act faithfully to the respective blockchain pro- cryptocurrency, blockchains are receiving considerable in- tocol in order to secure the operation of the blockchain terest from industry and the research community. Modern as a whole. blockchains feature services such as name registration and Bitcoin’s asset is the Bitcoin currency (BTC) and the smart contracts. Some employ new forms of consensus, such trusted centralised entity it attempts to replace is the as proof-of-stake instead of proof-of-work. However, these traditional bank. Newer blockchains provide more intri- blockchains are so far relatively poorly investigated, despite cate features, such as Namecoin’s attempt at providing the fact that they move considerable assets. In this paper, we decentralised name registration, or Ethereum’s globally explore three representative, modern blockchains—Ethereum, distributed Ethereum Virtual Machine that allows ex- Namecoin, and Peercoin. Our focus is on the features that ecuting code in the form of so-called smart contracts set them apart from the pure currency use case of Bitcoin. on the Ethereum network. Perceptions of blockchains We investigate the blockchains’ activity in terms of trans- are varied, with opinions ranging from highly sceptical actions and usage patterns, identifying some curiosities in to enthusiastic. Success of the technology would have the process. For Ethereum, we are mostly interested in the broad implications for legislation, policy-making, and smart contract functionality it offers. We also carry out a financial processes, due to the inherently decentralised brief analysis of issues that are introduced by negligent de- nature of the technology. We believe it is too early to sign of smart contracts. In the case of Namecoin, our focus make a definitive call; however, blockchains are already is how the name registration is used and has developed over used to move assets on a large scale. Now is the time to time. For Peercoin, we are interested in the use of proof- investigate them: at the time of writing, the total value of-stake, as this consensus algorithm is poorly understood of all existing bitcoin currency equates roughly USD 7B; yet used to move considerable value. Finally, we relate the Ethereum’s Ether follows in second place with approx- 1 above to the fundamental characteristics of the underlying imately USD 750M . peer-to-peer networks. We present a crawler for Ethereum In this paper, we carry out analyses for three block- and give statistics on the network size. For Peercoin and chains that have considerably extended Bitcoin’s origi- Namecoin, we identify the relatively small size of the net- nal mechanism. Ethereum has added a Turing-complete works and the weak bootstrapping process. scripting language that makes it possible to define pro- grams that are executed by participants of the blockchain. Categories and Subject Descriptors Namecoin has added a decentralised name registration arXiv:1606.06530v1 [cs.CR] 21 Jun 2016 service. Peercoin, finally, has made a switch to a new C.2.2 [Computer-Communication Networks]: Net- consensus mechanism to ensure the security of the blockchain, work Protocols; C.2.4 [Computer-Communication namely proof-of-stake. For the blockchains whose asset Networks]: Distributed Systems is a service that is provided in a decentralised fashion— General Terms Namecoin and Ethereum—we focus on how the service is used and supported by the blockchain. An analy- Measurement, Experimentation, Human Factors sis of Ethereum is one of our main contributions: we show the development of the blockchain and give fun- 1. INTRODUCTION damental statistics that describe its use. In particular, Since the advent of Nakamoto’s Bitcoin in 2008 [14], a we explore the smart contracts and uncover oddities, diverse range of blockchain implementations have emerged. including some security-related (so far low-impact) is- The common goal of blockchain-based technologies is to sues. We also provide a first analysis of similarity be- decentralise control of a particular asset, typically re- placing one or a small set of trusted central entities with 1Data from http://coinmarketcap.com/ on 3/5/2016. 1 tween contracts on the blockchain, which gives hints at they are connected to. This is insufficient to prevent how they have been developed. For the ‘pure-currency’ double-spending, however, as an attacker could always blockchain, Peercoin, we investigate how much the new try to partition the network and spend the same coin in- proof-of-stake algorithm is involved in moving currency dependently in each partition. Hence, Bitcoin requires around. Finally, we investigate briefly some core prop- all nodes to achieve consensus regarding which trans- erties of the networks that keep these blockchains run- actions have been made or rejected, e.g., due to insuf- ning, including peer crawling data and tests of the boot- ficient balance. This is solved by block mining. Nodes strapping process. collect transactions into a block and compute a hash The remainder of this paper is organised as follows. over the whole block, together with a nonce of their In the next section, we provide the necessary back- choosing. A block will only be accepted by the entire ground to understand the blockchains we investigate network if the hash value, interpreted as a number, is and discuss previous related work. Section3 presents smaller than a given target value, which depends on the our methodology and provides an overview of our data previous blocks’ hash values, and which each node can sets. Section4 presents our results for Ethereum, Name- compute independently and deterministically. coin, and Peercoin. We offer our conclusions in Section When a miner finds a valid hash, the block header 5. containing the valid hash is announced to the network. Other miners in the network then validate the new block 2. BACKGROUND AND RELATED WORK header before accepting it. Acceptance is indicated by We provide the necessary background on blockchain miners starting to work on subsequent blocks, incorpo- technology in this section and discuss related work. rating the newly mined block as the parent. To mine a block, a node must thus invest computational resources 2.1 Background to find a nonce that when used in the hashing process will yield the necessary block hash. A blockchain is an append-only, public ledger that It may occasionally happen that two miners find a keeps track of transactions relating to an asset. In Bit- block at the same time (a ‘fork’). In that case, the coin, for instance, a transaction is the transfer of some blockchain is not ‘in consensus’ until the next block is amount of Bitcoin currency (BTC) from one account found, which takes one of the two candidates as its cho- to another. An account is expressed as a public key; sen previous block. The new, longest blockchain is then ownership of the corresponding private key proves own- accepted by the network as the ‘consensus view’. ership of the account. Transactions are grouped into By requiring not just one, but a number of blocks to blocks, which are cryptographically linked—i.e., block have been found since the first inclusion of a transac- n contains a hash value of block n − 1. Transactions tion, it becomes exceedingly unlikely that an attacker is are digitally signed: only the holder of the private key able to forge a different, longer blockchain that contains can create a valid signature, but all participants of the a different set of transactions: to change a transaction blockchain can verify its validity with the known pub- in an already confirmed block, one must recompute the lic key2. All participants maintain the entire history hashes for all subsequent blocks. Bitcoin’s author sug- of the blockchain, and in most blockchains every par- gested that an attacker would need to control strictly ticipant knows the ownership status of all assets and more than 50% of the network’s computational power all accounts. However, one typically does not know the for this attack to succeed [14], although more recent re- identity of an account owner by only looking at this search has identified attacks that succeed with less [6]. data. A major assumption is that miners are incentivised to A serious problem that all early crypto-currency pro- act faithfully. As a reward for mining a block, a miner posals shared was the need to maintain a trusted au- may assign a certain amount of thus newly generated thority that could issue cryptographic coins and track currency to itself in the new block. In Bitcoin, the ex- transactions so as to ensure that no digital coin could act amount is currently 25 BTC and this reward halves be spent twice, and that the payer is able to transact at certain intervals (52,500 blocks), with the next halv- if her balance permits. One of Bitcoin’s declared goals ing expected to occur in July 2016. Senders of trans- was to remove this central authority. The key insight actions may also choose to pay transaction fees that was that double-spending can be prevented if all partic- the block miner can claim. The input of a transaction ipants in the digital currency are able to maintain the must be the output of a previous transaction (except same, correct view of all transactions in the network. for the aforementioned currency generation). The out- Proof-of-work Bitcoin introduced the blockchain as put is one or more currency values with the public keys a cryptographic ledger that stores all transactions ever of the receivers, all signed by the sender.
Recommended publications
  • YEUNG-DOCUMENT-2019.Pdf (478.1Kb)
    Useful Computation on the Block Chain The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation Yeung, Fuk. 2019. Useful Computation on the Block Chain. Master's thesis, Harvard Extension School. Citable link https://nrs.harvard.edu/URN-3:HUL.INSTREPOS:37364565 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Other Posted Material, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#LAA 111 Useful Computation on the Block Chain Fuk Yeung A Thesis in the Field of Information Technology for the Degree of Master of Liberal Arts in Extension Studies Harvard University November 2019 Copyright 2019 [Fuk Yeung] Abstract The recent growth of blockchain technology and its usage has increased the size of cryptocurrency networks. However, this increase has come at the cost of high energy consumption due to the processing power needed to maintain large cryptocurrency networks. In the largest networks, this processing power is attributed to wasted computations centered around solving a Proof of Work algorithm. There have been several attempts to address this problem and it is an area of continuing improvement. We will present a summary of proposed solutions as well as an in-depth look at a promising alternative algorithm known as Proof of Useful Work. This solution will redirect wasted computation towards useful work. We will show that this is a viable alternative to Proof of Work. Dedication Thank you to everyone who has supported me throughout the process of writing this piece.
    [Show full text]
  • Linking Wallets and Deanonymizing Transactions in the Ripple Network
    Proceedings on Privacy Enhancing Technologies ; 2016 (4):436–453 Pedro Moreno-Sanchez*, Muhammad Bilal Zafar, and Aniket Kate* Listening to Whispers of Ripple: Linking Wallets and Deanonymizing Transactions in the Ripple Network Abstract: The decentralized I owe you (IOU) transac- 1 Introduction tion network Ripple is gaining prominence as a fast, low- cost and efficient method for performing same and cross- In recent years, we have observed a rather unexpected currency payments. Ripple keeps track of IOU credit its growth of IOU transaction networks such as Ripple [36, users have granted to their business partners or friends, 40]. Its pseudonymous nature, ability to perform multi- and settles transactions between two connected Ripple currency transactions across the globe in a matter of wallets by appropriately changing credit values on the seconds, and potential to monetize everything [15] re- connecting paths. Similar to cryptocurrencies such as gardless of jurisdiction have been pivotal to their suc- Bitcoin, while the ownership of the wallets is implicitly cess so far. In a transaction network [54, 55, 59] such as pseudonymous in Ripple, IOU credit links and transac- Ripple [10], users express trust in each other in terms tion flows between wallets are publicly available in an on- of I Owe You (IOU) credit they are willing to extend line ledger. In this paper, we present the first thorough each other. This online approach allows transactions in study that analyzes this globally visible log and charac- fiat money, cryptocurrencies (e.g., bitcoin1) and user- terizes the privacy issues with the current Ripple net- defined currencies, and improves on some of the cur- work.
    [Show full text]
  • Blocksci: Design and Applications of a Blockchain Analysis Platform
    BlockSci: Design and applications of a blockchain analysis platform Harry Kalodner Steven Goldfeder Alishah Chator [email protected] [email protected] [email protected] Princeton University Princeton University Johns Hopkins University Malte Möser Arvind Narayanan [email protected] [email protected] Princeton University Princeton University ABSTRACT to partition eectively. In fact, we conjecture that the use of a tra- Analysis of blockchain data is useful for both scientic research ditional, distributed transactional database for blockchain analysis and commercial applications. We present BlockSci, an open-source has innite COST [5], in the sense that no level of parallelism can software platform for blockchain analysis. BlockSci is versatile in outperform an optimized single-threaded implementation. its support for dierent blockchains and analysis tasks. It incorpo- BlockSci comes with batteries included. First, it is not limited rates an in-memory, analytical (rather than transactional) database, to Bitcoin: a parsing step converts a variety of blockchains into making it several hundred times faster than existing tools. We a common, compact format. Currently supported blockchains in- describe BlockSci’s design and present four analyses that illustrate clude Bitcoin, Litecoin, Namecoin, and Zcash (Section 2.1). Smart its capabilities. contract platforms such as Ethereum are outside our scope. Second, This is a working paper that accompanies the rst public release BlockSci includes a library of useful analytic and visualization tools, of BlockSci, available at github.com/citp/BlockSci. We seek input such as identifying special transactions (e.g., CoinJoin) and linking from the community to further develop the software and explore addresses to each other based on well-known heuristics (Section other potential applications.
    [Show full text]
  • Merged Mining: Curse Or Cure?
    Merged Mining: Curse or Cure? Aljosha Judmayer, Alexei Zamyatin, Nicholas Stifter, Artemios Voyiatzis, Edgar Weippl SBA Research, Vienna, Austria (firstletterfirstname)(lastname)@sba-research.org Abstract: Merged mining refers to the concept of mining more than one cryp- tocurrency without necessitating additional proof-of-work effort. Although merged mining has been adopted by a number of cryptocurrencies already, to this date lit- tle is known about the effects and implications. We shed light on this topic area by performing a comprehensive analysis of merged mining in practice. As part of this analysis, we present a block attribution scheme for mining pools to assist in the evaluation of mining centralization. Our findings disclose that mining pools in merge-mined cryptocurrencies have operated at the edge of, and even beyond, the security guarantees offered by the underlying Nakamoto consensus for ex- tended periods. We discuss the implications and security considerations for these cryptocurrencies and the mining ecosystem as a whole, and link our findings to the intended effects of merged mining. 1 Introduction The topic of merged mining has received little attention from the scientific community, despite having been actively employed by a number of cryptocurrencies for several years. New and emerging cryptocurrencies such as Rootstock continue to consider and expand on the concept of merged mining in their designs to this day [19]. Merged min- ing refers to the process of searching for proof-of-work (PoW) solutions for multiple cryptocurrencies concurrently without requiring additional computational resources. The rationale behind merged mining lies in leveraging on the computational power of different cryptocurrencies by bundling their resources instead of having them stand in direct competition, and also to serve as a bootstrapping mechanism for small and fledgling networks [27, 33].
    [Show full text]
  • Artificial Intelligence Integrated Blockchain Technology for Decentralized Applications and Smart Contracts
    International Journal of Advanced Science and Technology Vol. 29, No.02, (2020), pp. 1023-1031 Artificial Intelligence Integrated Blockchain Technology for Decentralized Applications and Smart Contracts MAAN NAWAF ABBOOD Al-Imam Al-Adham college Abstract In the present period, Blockchain Technology is one of the key regions of research just as execution explicitly in the space of Cryptocurrency. Presently days, various advanced digital forms of money are very conspicuous and shared all through the world in spite of enormous analysis and debates. These cryptographic forms of money incorporate BitCoin, Ethereum, LiteCoin, PeerCoin, GridCoin, PrimeCoin, Ripple, Nxt, DogeCoin, NameCoin, AuroraCoin, Dash, Neo, NEM, PotCoin, TitCoin, Verge, Stellar, VertCoin, Tether, Zcash and numerous others. These blockchain based digital forms of money don't have any middle of the road bank or installment passage to record the log of the transactions. That is the primary reason in light of which numerous nations are not permitting the cryptographic forms of money as legitimate cash transaction. In any case, these blockchain based cryptographic forms of money are extremely celebrated and utilized as a result of colossal security highlights. This manuscript is focusing on the blockchain technology that is directly associated as the application domain of artificial intelligence. Keywords: Artificial Intelligence, AI, AI based Blockchain, Blockchain Security Introduction The blockchain organize is having a square of records in which every single record is related with the dynamic cryptography so every one of the transactions can be scrambled with no likelihood of sniffing or hacking endeavors [1, 2]. In current situation, the blockchain innovation is progressively engaged towards cryptographic forms of money in which the disseminated record is kept up for the transactions [3, 4].
    [Show full text]
  • Decentralized Reputation Model and Trust Framework Blockchain and Smart Contracts
    IT 18 062 Examensarbete 30 hp December 2018 Decentralized Reputation Model and Trust Framework Blockchain and Smart contracts Sujata Tamang Institutionen för informationsteknologi Department of Information Technology Abstract Decentralized Reputation Model and Trust Framework: Blockchain and Smart contracts Sujata Tamang Teknisk- naturvetenskaplig fakultet UTH-enheten Blockchain technology is being researched in diverse domains for its ability to provide distributed, decentralized and time-stamped Besöksadress: transactions. It is attributed to by its fault-tolerant and zero- Ångströmlaboratoriet Lägerhyddsvägen 1 downtime characteristics with methods to ensure records of immutable Hus 4, Plan 0 data such that its modification is computationally infeasible. Trust frameworks and reputation models of an online interaction system are Postadress: responsible for providing enough information (e.g., in the form of Box 536 751 21 Uppsala trust score) to infer the trustworthiness of interacting entities. The risk of failure or probability of success when interacting with an Telefon: entity relies on the information provided by the reputation system. 018 – 471 30 03 Thus, it is crucial to have an accurate, reliable and immutable trust Telefax: score assigned by the reputation system. The centralized nature of 018 – 471 30 00 current trust systems, however, leaves the valuable information as such prone to both external and internal attacks. This master's thesis Hemsida: project, therefore, studies the use of blockchain technology as an http://www.teknat.uu.se/student infrastructure for an online interaction system that can guarantee a reliable and immutable trust score. It proposes a system of smart contracts that specify the logic for interactions and models trust among pseudonymous identities of the system.
    [Show full text]
  • A Survey on Volatility Fluctuations in the Decentralized Cryptocurrency Financial Assets
    Journal of Risk and Financial Management Review A Survey on Volatility Fluctuations in the Decentralized Cryptocurrency Financial Assets Nikolaos A. Kyriazis Department of Economics, University of Thessaly, 38333 Volos, Greece; [email protected] Abstract: This study is an integrated survey of GARCH methodologies applications on 67 empirical papers that focus on cryptocurrencies. More sophisticated GARCH models are found to better explain the fluctuations in the volatility of cryptocurrencies. The main characteristics and the optimal approaches for modeling returns and volatility of cryptocurrencies are under scrutiny. Moreover, emphasis is placed on interconnectedness and hedging and/or diversifying abilities, measurement of profit-making and risk, efficiency and herding behavior. This leads to fruitful results and sheds light on a broad spectrum of aspects. In-depth analysis is provided of the speculative character of digital currencies and the possibility of improvement of the risk–return trade-off in investors’ portfolios. Overall, it is found that the inclusion of Bitcoin in portfolios with conventional assets could significantly improve the risk–return trade-off of investors’ decisions. Results on whether Bitcoin resembles gold are split. The same is true about whether Bitcoins volatility presents larger reactions to positive or negative shocks. Cryptocurrency markets are found not to be efficient. This study provides a roadmap for researchers and investors as well as authorities. Keywords: decentralized cryptocurrency; Bitcoin; survey; volatility modelling Citation: Kyriazis, Nikolaos A. 2021. A Survey on Volatility Fluctuations in the Decentralized Cryptocurrency Financial Assets. Journal of Risk and 1. Introduction Financial Management 14: 293. The continuing evolution of cryptocurrency markets and exchanges during the last few https://doi.org/10.3390/jrfm years has aroused sparkling interest amid academic researchers, monetary policymakers, 14070293 regulators, investors and the financial press.
    [Show full text]
  • Impossibility of Full Decentralization in Permissionless Blockchains
    Impossibility of Full Decentralization in Permissionless Blockchains Yujin Kwon*, Jian Liuy, Minjeong Kim*, Dawn Songy, Yongdae Kim* *KAIST {dbwls8724,mjkim9394,yongdaek}@kaist.ac.kr yUC Berkeley [email protected],[email protected] ABSTRACT between achieving good decentralization in the consensus protocol Bitcoin uses the proof-of-work (PoW) mechanism where nodes earn and not relying on a TTP exists. rewards in return for the use of their computing resources. Although this incentive system has attracted many participants, power has, CCS CONCEPTS at the same time, been significantly biased towards a few nodes, • Security and privacy → Economics of security and privacy; called mining pools. In addition, poor decentralization appears not Distributed systems security; only in PoW-based coins but also in coins that adopt proof-of-stake (PoS) and delegated proof-of-stake (DPoS) mechanisms. KEYWORDS In this paper, we address the issue of centralization in the consen- Blockchain; Consensus Protocol; Decentralization sus protocol. To this end, we first define ¹m; ε; δº-decentralization as a state satisfying that 1) there are at least m participants running 1 INTRODUCTION a node, and 2) the ratio between the total resource power of nodes Traditional currencies have a centralized structure, and thus there run by the richest and the δ-th percentile participants is less than exist several problems such as a single point of failure and corrup- or equal to 1 + ε. Therefore, when m is sufficiently large, and ε and tion. For example, the global financial crisis in 2008 was aggravated δ are 0, ¹m; ε; δº-decentralization represents full decentralization, by the flawed policies of banks that eventually led to many bank which is an ideal state.
    [Show full text]
  • TITLE PAGE Bitcoin and Stock Markets. Are They Connected? Evidence from Asean Emerging Economies Abdollah Ah Mand*1, Hassanudin
    Bitcoin and Stock Markets: Are They Connected? Evidence from Asean Emerging Economies Abdollah Ah Mand ( [email protected] ) Sunway University Hassanudin Mohd Thas Thaker Sunway University Research Keywords: Cryptocurrencies, bitcoin, stock market, emerging economies Posted Date: May 12th, 2020 DOI: https://doi.org/10.21203/rs.3.rs-25524/v1 License: This work is licensed under a Creative Commons Attribution 4.0 International License. Read Full License TITLE PAGE Bitcoin and Stock Markets. Are they Connected? Evidence from Asean Emerging Economies Abdollah Ah Mand*1, Hassanudin Mohd Thas Thaker2 Email of corresponding author: [email protected] 1,2 Sunway University, Malaysia Abstract Background: Cryptocurrencies, especially Bitcoin, has become popular for investors in recent years. The volatility of bitcoin and time horizon are the center point for investment decisions. However, attention is not often drawn to the relationship between bitcoin and equity indices. This study investigates the volatility and time frequency domain of bitcoin among five Asean countries through a rich database which covers daily data from July 2010 until April 2019. Methods: Advanced econometrics and Wavelets Cross-Coherence Spectrograms, this study investigates the existence of long run association between bitcoin and the studied market indices. M-GARCH analysis is been employed to investigate the unconditional volatility of market indices and Bitcoin. Results: The findings present the long run association with positive (Philippines) and negative (Japan, Korea, Singapore, Hong Kong) relations. Moreover, only one market (KOREA) shows a short run association with bitcoin. The M- GARCH analysis reveals, most of the selected Asean countries have a low unconditional volatility with bitcoin.
    [Show full text]
  • Blockchain-Based Address Alias System
    Article Blockchain-Based Address Alias System Norbert Bodziony , Paweł Jemioło * , Krzysztof Kluza and Marek R. Ogiela AGH University of Science and Technology, Faculty of Electrical Engineering, Automatics, Computer Science and Biomedical Engineering, al. A. Mickiewicza 30, 30-059 Krakow, Poland; [email protected] (N.B.); [email protected] (K.K.); [email protected] (M.R.O.) * Correspondence: [email protected] Abstract: In recent years, blockchains systems have seen massive adoption in retail and enterprise environments. Cryptocurrencies become more widely adopted, and many online businesses have decided to add the most popular ones, like Bitcoin or Ethereum, next to Visa or Mastercard payments. Due to the decentralized nature of blockchain-based systems, there is no possible way to revert confirmed transactions. It may result in losses caused by human error or poor design of the user interface. We created a cryptocurrency wallet with a full on-chain solution for aliasing accounts and tokens to improve user experience and avoid unnecessary errors. The aliasing system consists of a number of smart contracts deployed on top of the blockchain network that give the ability to register aliases to accounts and tokens and use them instead of opaque addresses. Our solution shows how performant modern blockchains are and presents a way of building fully decentralized applications that can compete with centralized ones in terms of performance. Keywords: blockchain; cryptocurrency; wallet; aliasing system; Solana Citation: Bodziony, N.; Jemioło, P.; 1. Introduction Kluza, K.; Ogiela, M.R. Blockchain- Blockchain [1,2] space is one of the most rapidly growing ecosystems right now.
    [Show full text]
  • Popping the Bitcoin Bubble: an Application of Log-Periodic Power Law Modeling to Digital Currency
    Popping the Bitcoin Bubble: An application of log-periodic power law modeling to digital currency Alec MacDonell University of Notre Dame April 1, 2014 Abstract The year 2013 witnessed a remarkable increase in public interest and awareness of digital currencies such as Bitcoin. Hailed by some as the currency of the future, these “cryptocurrencies” have gained notoriety for their use in online black markets, but have yet to gain widespread acceptance. Given their novelty and lack of central regulating authorities, digital currencies experience high volatility and uncertainty regarding value. Taking Bitcoin as a representative example, this paper first uses autoregressive moving average (ARMA) functions to explain trading values, then applies log-periodic power law (LPPL) models in an attempt to predict crashes. The results of ARMA modeling show that Bitcoin values react to the CBOE Volatility Index, suggesting that a primary force currently driving Bitcoin values is speculation by investors looking outside traditional markets. In addition, the LPPL models accurately predict ex-ante the crash that occurred in December 2013, making LPPL models a potentially valuable tool for understanding bubble behavior in digital currencies. *I would like to thank Steven Lugauer for advising me during the research and writing of this paper. His instruction and guidance has been invaluable. Table of Contents 3 Introduction 6 Background 8 Data and ARMA Model Construction 17 Financial Bubbles 20 The LPPL Model 26 Application to December 2013 Bitcoin Crash 29 Conclusions 33 References 2 1 Introduction Traditional instruction in economics teaches that currency takes one of two forms – commodity money or fiat money.
    [Show full text]
  • Research and Applied Perspective to Blockchain Technology: a Comprehensive Survey
    applied sciences Review Research and Applied Perspective to Blockchain Technology: A Comprehensive Survey Sumaira Johar 1,* , Naveed Ahmad 1, Warda Asher 1, Haitham Cruickshank 2 and Amad Durrani 1 1 Department of Computer Science, University of Peshawar, Peshawar 25000, Pakistan; [email protected] (N.A.); [email protected] (W.A.); [email protected] (A.D.) 2 Institute of Communication Systems, University of Surrey, Guildford GU2 7JP, UK; [email protected] * Correspondence: [email protected] Abstract: Blockchain being a leading technology in the 21st century is revolutionizing each sector of life. Services are being provided and upgraded using its salient features and fruitful characteristics. Businesses are being enhanced by using this technology. Countries are shifting towards digital cur- rencies i.e., an initial application of blockchain application. It omits the need of central authority by its distributed ledger functionality. This distributed ledger is achieved by using a consensus mechanism in blockchain. A consensus algorithm plays a core role in the implementation of blockchain. Any application implementing blockchain uses consensus algorithms to achieve its desired task. In this paper, we focus on provisioning of a comparative analysis of blockchain’s consensus algorithms with respect to the type of application. Furthermore, we discuss the development platforms as well as technologies of blockchain. The aim of the paper is to provide knowledge from basic to extensive from blockchain architecture to consensus methods, from applications to development platform, from challenges and issues to blockchain research gaps in various areas. Citation: Johar, S.; Ahmad, N.; Keywords: blockchain; applications; consensus mechanisms Asher, W.; Cruickshank, H.; Durrani, A.
    [Show full text]