Blockchain Technology: Introduction
Total Page:16
File Type:pdf, Size:1020Kb
Blockchain Technology: Introduction Ashley Lannquist World Economic Forum 0 Blockchain Technology • A record log with distributed ownership that can host and record transactions between multiple parties in a peer-to-peer, verifiable, and permanent way. 1 Features • Distributed and synchronized • Peer-to-Peer Transmission • Transparency • Traceability • Irreversibility of Records • Automated “smart contract” execution Features • Globally Shared Record Log ➢ Transactions continually synced across participants ➢ Common, shared view of transaction history ➢ Facilitates interparty reconciliation, agreement on transaction activity Transactions = transfer / sending of value, information, records, etc. ~ Main mode of interaction in blockchain networks Features • Distributed/decentralized functionality & data storage ➢ Record logs stored in distributed manner across computer “nodes” ➢ No single party controls data/info ➢ Reduces risk of fraud, corruption, other misbehavior by centralized database owners ➢ Database robustness from redundancy Features • Transaction Transparency ➢ Transactions visible to all network participants ➢ (Network can be public or permissioned) ➢ (Can overlay privacy features for confidentiality) Features • Transaction & Asset Traceability ➢ Movement of funds and goods across transactions visible and traceable ➢ Provenance/origin/supply chain tracking capability Features • Irreversibility of Records (“Immutability”) ➢ Using cryptography, data is tamper- proof ➢ Multiple parties can access and write to the ledger but no one can manipulate or delete written data Features • Automated contract-like functionality (“smart contracts”) ➢ “Smart contracts” can automate transactions between parties ➢ Digital, self-enforcing ➢ Pre-arranged terms ➢ Smart contracts: code that facilitates, verifies, or enforces the negotiation or execution of a digital contract Blockchain Technology: Key Potential Capabilities 1. Transparency 3. Censorship and fraud resistance • Records, transaction details and processes viewable • Absence of central administrator reduces censorship and fraud opportunity 2. Coordination over shared database 4. Database Resilience • Parties can share database as single source of • Data redundancy on thousands of nodes truth • Provides data storage and process continuity in • Cryptography provides confidence in data case of hardware fault or external attacks record integrity • Coordination among competitors, industry providers, regulators, etc. on same system 10 Blockchain Technology: Technical Downsides 1. Slow transaction times 3. Access Management • "Consensus” mechanism underlying • “Private keys” may be required as “passwords” to decentralized databases inherently slower use accounts and send transactions • Key management difficult • Data redundancy: All/many “nodes” • Key revocation, dissemination difficult independently process, sync, download all/many transactions 4. Readiness 2. Data Confidentiality/Privacy • DLTs very much in-development to meet security, scalability, transaction speed needs • Reduced data privacy and increased transparency vs centralized databases (potential/risk for more access by others) 11 Public, Permissionless ---- Public, Permissioned ---- Private, Permissioned Decentralized TRADE-OFFS Centralized • Participation open, public • Participation by invite-only • Transparent records • Private records • Participants unknown: High security • Participants known: against malicious actions Low security against malicious actions • Slower • Faster • Needs cryptocurrency • Does not need cryptocurrency • More proof-of-work, proof-of- stake, federated, etc. • More proof-of-authority, etc. 12 Consensus Mechanisms • Federated BFT • Greener, faster • Proof-of-work • Ripple, Stellar • Energy intensive, slow • Bitcoin, Ethereum (for next 1-2 yrs), Litecoin, Monero, MimbleWimble, etc. • Paxos/Raft • Greener, faster • JPM Quorum, IPFS • Proof-of-stake • Greener, faster • Proof-of-space/capacity • EOS, Lisk, Steemit, Ethereum (later), etc. (including • Greener delegated PoS) • CyberVein, Chia, etc. • Proof-of-authority • DAGs • Greener, faster • Greener, faster • Gossip protocols (HashGraph, Avalanche) • VeChain, etc. • Cybervein, IOT (tangle) 13 APPENDIX 14 Potential use cases in development to solve long- standing problems • Healthcare pharmaceutical supply chain • Tracking vehicle odometer & data history • International aid flows • Personal digital identity • Tracking government complaints • Interbank clearing and settlements • Register land/real estate ownership • Track conflict minerals and stones in supply chain 15 Potential use cases in development to solve long- standing problems Observations • Healthcare pharmaceutical supply chain • Coordination of multiple parties around • Tracking vehicle odometer & data history trusted ledger • International aid flows • Improves transparency, reduce fraud or • Personal digital identity abuse • Tracking government complaints • Blockchain solves dilemma of where data sits and who can control it • Interbank clearing and settlements • Register land/real estate ownership • Not about cryptocurrency • Track conflict minerals and stones in supply chain 16 Almost all industry applications are in prototype or pilot mode; important weaknesses to be worked out Blockchain is a *tool* and must be designed and implemented carefully Not sufficient as off-the-shelf solution in most cases • Security • Scalability • Privacy • Inclusiveness • Usability • Multi-party approach 17 Quantum Cryptography and Blockchain Networks • Shor’s Algorithm • ~2027, 10-minute time to solve ECDSA • Factors numbers quickly (also relevant for RSA cryptography) • Grover’s Algorithm • Reverse hashes to find inputs (“pre-image attack”) • Blockchains must pursue secure transition to quantum-resistant signature schemes • Post-quantum cryptography rapidly expanding but still uncertain and in-development Solutions: • Short-term: Longer keys to resist growth in computational power • Medium-term: Shift to quantum-resistant cryptographic schemes • Long-term: Leverage quantum computing and cryptography within blockchains directly 18 General Data Protection Regulation (GDPR): Threat or Opportunity? • GDPR: Any company doing business with EU countries must comply by May 2018 • ”Digital declaration of rights” for citizens • Encourages firms to architect solutions with: • Built-in data privacy, protection, and user revocation capabilities • Considerations and capabilities for user control of data • Common data standards to facilitate transfer and sharing of data between individuals, agencies • Complication: “global right to be forgotten” article • Challenges to comply with GDPR? • Many articles aligned with use of blockchain • Challenge: Storing personal identifying information on permanent databases • Solutions: • A: Store personal details on-chain within a cryptographic hash plus pointer • B: Do not store PII on-chain, but on off-chain centralized database • C (hybrid - BEST): Store details on-chain but hashed, and off-chain in user-owned device and account 19.