Science and Technology Briefings– No

Total Page:16

File Type:pdf, Size:1020Kb

Science and Technology Briefings– No Briefing ___ Understanding Blockchain s ___ April 4 2 0 1 8 How A Blockchain Works Summary The protocol that powers Bitcoin appeared 10 years ago as a combination of existing technologies. The blockchain enables decentralized and secure transactions without the need for a trusted third party. The potential applications are much broader than just cryptocurrencies and while they are extremely promising, today the technology is generally not yet mature enough for large scale solutions. Further research and innovation are needed to solve blockchain’s scalability limitations as well as its high energy consumption. Source : OPECST from Blockchain France Mrs Valéria Faure-Muntian and Mr Claude de Ganay, Members of the National Assembly, Mr Ronan Le Gleut, Senator Context This memo answers a request from the common fact- The invention of hashcash by Adam Back in 1997 was a finding mission on “Use cases of the blockchain and significant achievement in the idea of validating other data certification technologies” created by the transactions using cryptographic hashes, called “proof National Assembly. It will be followed by a more of work”(4). The goal of these technologies is to remove advanced memo. What we refer to as the blockchain the need for “trusted third parties”, by relying instead are the technologies for storing and transmitting on a distributed network of trust based on an data allowing the creation of distributed, immutable “digital ledger”. duplicated ledgers, without a centralized authority, The obstacle to overcome lies in the problem of secured through cryptography, and organized into double spending (the risk that the same asset could be linked blocks of information at regular intervals of spent twice) and, more generally, around network fault time. tolerance, whether accidental or intentional(5). In order to understand how these digital ledgers work, The answer to these difficulties arrived in 2008 in an utilising distributed peer-to-peer networks and article by Satoshi Nakamoto(6). The article explained forming the technological basis powering an unhackable protocol running on a peer-to-peer (1) “cryptocurrency”, a specific type of digital currencies , network, the blockchain, as the technological stack (2) it is necessary to understand its origins . behind a new digital currency, Bitcoin. Blockchain’s Origins How the blockchain works The emergence of cryptocurrencies is partially linked Bitcoin runs on a technology protocol that we now call to the open source software movement, created in blockchain. This refers to a chain of blocks as the the 1980’s by Richard Stallman, as well as the transactions occurring between users of a network are (3) “cypherpunk” movement , with the goal of leveraging grouped in “time-stamped blocks”(7). encryption technology to create a digital currency and Once a block has been validated, currently every guarantee anonymous transactions. The first attempts 10 minutes, the transaction becomes visible by – David Chaum in 1983 with e-cash then in 1990 with everyone who has downloaded a copy of the ledger, digicash, Wei Dai in 1998 with b-money and, especially, potentially all of the network’s users, who will update Nick Szabo with bitgold – all failed. their copy of the blockchain with the new block. Assemblée nationale - 101 rue de l’Université - Bât F. - 75355 Paris 07 SP – Tél : 01 40 63 26 81 – Mél : [email protected] Sénat - 15 rue de Vaugirard - 75291 Paris Cedex 06 – Tél : 01 42 34 25 58 – Mél : [email protected] Science and Technology Briefings– no. 4– Understanding blockchains – April 2018 P a g e 2 Each transaction uses asymmetrical cryptography, blockchains practically indestructible. A “consensus originally appearing in the Diffie-Hellman protocol in mechanism” decides who validates the next block to 1976, relying on a pair of keys, one private and the be added to the chain. In the case of Bitcoin, this is other public, linked together by an elliptical curve called “proof of work” because it is linked to a algorithm (ECDSA). The public key can be shared and complex cryptographic problem successfully resolved allows you to receive transactions, the private key must through “mining”, which is repeated on average every be kept secret. Protecting these private keys is the 10 minutes(12). singular way to securely keep control of your bitcoins. Mining starts by obtaining a hash, beginning with a Although it is possible to trace all of the transactions certain number of zeros, of the block that the miner linked to a public key, it is still an anonymous system wishes to solve. This operation, extremely resource as the owner of that public key is not necessarily intensive in terms of computer processing power, is known. The time and date information encoded in a motivated by the reward in Bitcoins for the winning block is referred to as its “timestamp”. miner. The validated block is then transmitted from Each block, besides the transaction and timestamp, has peer-to-peer to each node which adds it to its copy of a unique identifier (Block 90 with a black background the blockchain. in the graphic below) composed of a “hash” If two blocks are validated at the exact same moment, (8) connecting blocks to each other . Technically, miners use either one and two parallel chains are “hashing” converts a specific group of data into a hash, created. The protocol expects that rapidly only the meaning a short digital signature unique to itself. The longest chain will survive, practically meaning the encryption algorithm used is called a “cryptographic blockchain that the majority of nodes have adopted. hash function”. The hash of a set of data can be Mining revenue is complemented by fees taken for considered a digital fingerprint, smaller and less each transaction that they add to the blockchain. The complex than the original data, but identifying it amount is theoretically determined freely by the users, uniquely and precisely. but miners prioritize the highest fees, which vary as a Hashing is considered to be “one-way”: it is designed function of the number of transactions in the queue. so that once a hash is created, meaning a fixed-length The organisation of miners into “pools”(13) creates a digital fingerprint created from an input of variable risk that an organised majority controls the validation length data, it is impossible to reverse engineer the of new blocks. User trust in the system is a shared goal (9) original data . The hashing algorithm used by bitcoin among miners, intending to guarantee respect of the is one of the most common: the Secure Hash rules, along with the idea of an invisible hand Algorithm-256 (SHA-256), so-named because it protecting private interests. It is important to highlight produces 256 bit hashes. however that four pools, 3 of which are Chinese, rely on massive mining farms control more than 60 % of Blockchain Structure the necessary processing power required for Bitcoin’s blockchain and can use this dominant position against the interests of other users. Bitcoin mining pools Others Source : Blockchain France Network nodes, « miners » and consensus Each block is validated by users known as “miners” (a reference to gold miners), and is then communicated Source : Blockchain.info (5-9 april 2018) to network nodes, users that possess copies of the entire ledger, who continuously update it. This Consensus methods other than “proof of work” exist validation of blocks prevents the risk of malicious (14) (10) and are often more centralised : the main alternative, attacks . There is no centralized authority of trust as (15) which presents a greater risk of malicious use , is users observe and manage one other. This security, a “proof of stake”, based on ownership of the specific source of trust, is one of the cornerstone ideas of the cryptocurrencies, which is divided into several methods blockchain(11). That fact that hundreds of copies of the such as “proof of hold”, based on the time you’ve held ledger are simultaneously and regularly updated the token, “proof of use” based on the quantity of through a cryptographic competition, renders Science and Technology Briefings– no. 4– Understanding blockchains – April 2018 P a g e 3 transactions, and “proof of importance” based on technological solution. Ethereum provides an reputation. infrastructure adapted to these tools in the form of Two other methods, that are less used but should be smart contracts written into the blockchain that mentioned, are: “proof of space” based on the execute autonomously, decentralized applications (16) amount of storage space available and “proof of called “dapps” as well as Decentralized Autonomous (17) burn”, regarding the destruction of cryptoassets, in Organizations or “DAO” . order to obtain the trust of the network. Programming the blockchain : smart contracts Reforming the blockchain : hard and soft forks Smart Contracts are programs written into the It is possible to modify the rules governing a blockchain. In reality, it is possible to add blockchain, which we refer to as a fork. This means that programming code in the same way as transaction a modification of the programming code must be data. These are not contracts in the legal sense, but updated by the entire network. Any individual can programming code that verify or execute a contract propose modifications but they generally originate during its negotiation or application. Compared to from few developers (a group of around 40 in the case typical programs, smart contracts have the advantages of Bitcoin). There are two types of evolutions: “soft specific to the blockchain. Also, their execution is forks”, when blocks produced by the new version can irreparable and their code is freely verifiable by the be added to nodes functioning under the old version, different network nodes. Notably, this allows the and “hard forks”, where no backwards compatibility is verifiability of escrow funds.
Recommended publications
  • Blockchain Healthcare & Policy Synopsis
    Blockchain Healthcare & Policy Synopsis AN EXECUTIVE REPORT OF THE U.S. DEPARTMENT OF HEALTH AND HUMAN SERVICES & NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY’S BLOCKCHAIN CHALLENGE October 2016 digitalchamber.org Table of Contents PART I: Blockchain in Healthcare and Research Workshop | 3 | I. Overview & Key Takeaways | 3 | II. Introduction: The White House II.I. Tim Polk, The White House, Office of Science and Technology Policy | 4 | III. Blockchain Level Setting III.I. John Kelsey, National Institute of Standards and Technology | 4 | III.II. Lily Chen, National Institute of Standards and Technology | 5 | IV. Blockchain Reality Check - Alternative IV.I. Evaluating Blockchain and Alternatives: Mance Harmon, Ping Identity | 5 | IV.II. Blockchain Challenges in Real Life: Stephen Wilson, Constellation Research | 6 | IV.III. “Fit for Purpose” Distributed Ledger Technology: Drummond Reed, Respect Network | 6 | V. Blockchain Reality Check - Challenges V.I. DHS Identity Innovations Grants: Many Sporny, Digital Bazaar | 7 | V.II. IoT Device Identity: Tiana Laurence and Andrew Yashchuk, Factom IRIS | 7 | V.III. Decentralized Identifiers (DIDs): Solving the Root Identity Problem, Drummond Reed, Respect Network | 7 | V.IV. Decentralized Certification Service, Adam Migus, XCELERATE Solutions | 8 | VI. Blockchain Challenge Presentations VI.I. Blockchain: The Chain of Trust and its Potential to Transform Healthcare – IBM’s Point of View Srini Attili and Shahram Ebdollahi, IBM Global Business Service Public Sector | 8 | VI.II. Blockchain: Securing
    [Show full text]
  • Chancen Und Herausforderungen Von DLT (Blockchain) in Mobilität Und Logistik
    Chancen und Herausforderungen von DLT (Blockchain) in Mobilität und Logistik FRAUNHOFER-INSTITUT FÜR ANGEWANDTE INFORMATIONSTECHNIK FIT CHANCEN UND HERAUSFORDERUNGEN VON DLT (BLOCKCHAIN) IN MOBILITÄT UND LOGISTIK Prof. Dr. Gilbert Fridgen Prof. Dr. Nikolas Guggenberger Prof. Dr. Thomas Hoeren Prof. Wolfgang Prinz (PhD) Prof. Dr. Nils Urbach Johannes Baur, Henning Brockmeyer, Wolfgang Gräther, Elisaweta Rabovskaja, Vincent Schlatt, André Schweizer, Johannes Sedlmeir, Lars Wederhake Vielen Dank den weiteren Mitwirkenden: Matthias Babel, Martin Brennecke, Patrick Camus, Benedict Drasch, Tobias Guggenberger, Luis Lämmermann, Jannik Lockl, Sven Radszuwill, Alexander Rieger, Marco Schmidt, Nico Thanner, Patrick Troglauer, Florian Vogt, Malte Weißert, Felix Würmseher Inhalt 1 Management Summary .......................................................................................................... 1 1.1 Zielsetzung des Gutachtens ..............................................................................................................1 1.2 Allgemeine Analyse..........................................................................................................................2 1.2.1 Technische Betrachtung ...................................................................................................................................... 2 1.2.2 Gesellschaftlich-ökonomische Perspektive ......................................................................................................... 3 1.2.2.1 Status quo ......................................................................................................................................................
    [Show full text]
  • 2016-05-31 Overview of Swirlds Hashgraph
    Overview of Swirlds Hashgraph Leemon Baird [email protected] May 31, 2016 The hashgraph data structure and Swirlds consensus algorithm provide a new platform for distributed consensus. This paper gives an overview of some of its properties, and comparisons with the Bitcoin blockchain. In this paper, the term “blockchain” will generally refer to the system used in Bitcoin, rather than the large number of variants that have been proposed. The goal of a distributed consensus algorithm is to allow a community of users to come to an agreement on the order in which some of them generated transactions, when no single member is trusted by everyone. In this way, it is a system for generating trust, when individuals do not already trust each other. The Swirlds hashgraph system achieves this along with being fair, fast, provable, Byzantine, ACID compliant, efficient, inexpensive, timestamped, DoS resistant, and optionally non-permissioned. This is what those terms mean: The hashgraph is fair, because no individual can manipulate the order of the transactions. For example, imagine a stock market, where Alice and Bob both try to buy the last available share of a stock at the same moment for the same price. In blockchain, a miner might put both those transactions in a single block, and have complete freedom to choose what order they occur. Or the miner might choose to only include Alice’s transaction, and delay Bob’s to some future block. In the hashgraph, there is no way for an individual to affect the consensus order of those transactions. The best Alice can do is to invest in a better internet connection so that her transaction reaches everyone before Bob’s.
    [Show full text]
  • Smart Contracts: Building Blocks for Digital Markets
    1/25/2018 Nick Szabo -- Smart Contracts: Building Blocks for Digital Markets Smart Contracts: Building Blocks for Digital Markets Copyright (c) 1996 by Nick Szabo permission to redistribute without alteration hereby granted Glossary (This is a partial rewrite of the article which appeared in Extropy #16) Introduction The contract, a set of promises agreed to in a "meeting of the minds", is the traditional way to formalize a relationship. While contracts are primarily used in business relationships (the focus of this article), they can also involve personal relationships such as marraiges. Contracts are also important in politics, not only because of "social contract" theories but also because contract enforcement has traditionally been considered a basic function of capitalist governments. Whether enforced by a government, or otherwise, the contract is the basic building block of a free market economy. Over many centuries of cultural evolution has emerged both the concept of contract and principles related to it, encoded into common law. Algorithmic information theory suggests that such evolved structures are often prohibitively costly to recompute. If we started from scratch, using reason and experience, it could take many centuries to redevelop sophisticated ideas like property rights that make the modern free market work [Hayek]. The success of the common law of contracts, combined with the high cost of replacing it, makes it worthwhile to both preserve and to make use of these principles where appropriate. Yet, the digital revolution is radically changing the kinds of relationships we can have. What parts of our hard-won legal tradition will still be valuable in the cyberspace era? What is the best way to apply these common law principles to the design of our on-line relationships? Computers make possible the running of algorithms heretofore prohibitively costly, and networks the quicker transmission of larger and more sophsiticated messages.
    [Show full text]
  • The Performance, Interoperability and Integration of Distributed Ledger Technologies
    LICENTIATE T H E SIS Emanuel Palm Palm Emanuel Department of Computer Science and Electrical Engineering Division of EISLAB The Performance, Interoperability ISSN 1402-1757 The Performance, Interoperability and Integration of Distributed Ledger Technologies and Integration Interoperability of Distributed Ledger The Performance, and Integration of ISBN 978-91-7790-402-1 (print) ISBN 978-91-7790-403-8 (pdf) Luleå University of Technology 2019 Distributed Ledger Technologies Emanuel Palm Industrial Electronics The Performance, Interoperability and Integration of Distributed Ledger Technologies EmanuelK.Palm Dept. of Computer Science and Electrical Engineering Lule˚a University of Technology Lule˚a, Sweden Supervisors: Ulf Bodin, Olov Schel´en and Jerker Delsing Printed by Luleå University of Technology, Graphic Production 2019 ISSN 1402-1757 ISBN 978-91-7790-402-1 (print) ISBN 978-91-7790-403-8 (pdf) Luleå 2019 www.ltu.se To my beloved wife, Sofia. iii iv Abstract In the wake of the financial crisis of 2008, Bitcoin emerged as a radical new alternative to the fiat currencies of the traditional banking sector. Through the use of a novel kind of probabilistic consensus algorithm, Bitcoin proved it possible to guarantee the integrity of a digital currency by relying on network majority votes instead of trusted institutions. By showing that it was technically feasible to, at least to some extent, replace the entire banking sector with computers, many significant actors started asking what else this new technology could help automate. A subsequent, seemingly inevitable, wave of efforts produced a multitude of new distributed ledger systems, architectures and applications, all somehow attempting to leverage distributed consensus algorithms to replace trusted intermediaries, facilitating value ownership, transfer and regulation.
    [Show full text]
  • Crypto Garage Developed and Executed the Contract of a P2P
    April 19, 2019 Crypto Garage, Inc. NEWS RELEASE Crypto Garage Developed and Executed the Contract of a P2P Protocol Based Crypto Asset Derivative Settled in Bitcoin 〜Executed First Derivative Contract with Blockstream〜 Crypto Garage, Inc. (HQ: Tokyo; Representative Director: Masahito Okuma; Crypto Garage), a Fintech company developing blockchain financial services and also a subsidiary of Digital Garage, Inc. (TSE first section: 4819; HQ: Tokyo; Representative Director, President Executive Officer and Group CEO: Kaoru Hayashi; DG) developed a peer-to- peer crypto asset derivative contract protocol and executed a contract based on this protocol on the Bitcoin Blockchain. Blockstream Corporation (HQ: Victoria Canada; CEO: Adam Back; Blockstream), the global leader in blockchain technology and financial cryptography, and Crypto Garage entered into a derivative contract that locks the future Bitcoin price [on a collared basis] in order to hedge the Bitcoin price fluctuation risk against the US dollar. Crypto Garage developed a P2P derivative technology based on the Discreet Log Contracts (https://dci.mit.edu/smart-contracts) that Thaddeus Dryja from MIT Digital Currency Initiatives proposed. This contract is a smart contract applied on the Bitcoin Blockchain and requires the agreement and posting of collateral by both parties. The agreed terms and collateral are defined on the Bitcoin Blockchain. Since settlement is cryptographically secured, this contract minimizes counterparty risk, such as breach of contract and other contract termination events. Contact: Hiroshi Ikemoto, Leo Shiraishi, Corporate Communication Dept., Digital Garage, Inc. Email: [email protected], TEL: +81-3-6367-1101 April 19, 2019 Crypto Garage, Inc. NEWS RELEASE The bitcoin price for the maturity date is determined by the ICE Cryptocurrency Data Feed, as agreed upon by both parties in advance.
    [Show full text]
  • Joseph Gao EAS 499: Senior Thesis Advisor: Brett Hemenway [DRAFT]
    Joseph Gao EAS 499: Senior Thesis Advisor: Brett Hemenway [DRAFT] Introduction to Cryptocurrencies for Retail Investors 1. ABSTRACT In the year 1998, roughly seven years before the smartphone revolution, (2007 marked the release of the iPhone, which arguably kicked off the ‘always online’ era that we live in today), Wei Dai published a proposal for an “anonymous, distributed electronic cash system”.(http://www.weidai.com/bmoney.txt). In the paper, Dai introduced two protocols to ​ ​ achieve his proposal - the first using a proof of work function as a means of creating money, and the second defining a set of servers responsible for keeping accounts, which must be regularly published, and verify balances for the other participants in the decentralized system. While B-money never took off, in part due to the impractical requirement of the first protocol that asks for a broadcast channel that is synchronous and unjammable, Wei Dai’s proposal planted the seeds of an idea that would later inspire Satoshi Nakamoto to publish the Bitcoin: A Peer-to-Peer Electronic Cash System white paper. This publication sparked a renewed wave of interest in distributed payment systems and resulted in thousands and thousands of new proposals and protocols to be developed in the next ten years. 2. INTRODUCTION The year of 2017 showed immense mainstream adoption in a number of cryptocurrencies. However, while mainstream chatter of these various cryptocurrencies has become nearly impossible to avoid, many retail investors are unfamiliar with the underlying technology powering each coin, according to studies performed by CoinDesk, Blockchain Capital, and The 1 University of Cambridge .
    [Show full text]
  • Read the Report Brief
    A REVOLUTION IN TRUST Distributed Ledger Technology in Relief & Development MAY 2017 “The principal challenge associated with [DLT] is a lack of awareness of the technology, especially in sectors other than banking, and a lack of widespread understanding of how it works.” - Deloitte Executive Summary1 The Upside In 2016, the blockchain was recognized as one of the top 10 In a recent report, Accenture surveyed emerging technologies by the World Economic Forum.2 The cost data from eight of the world’s ten potential of the blockchain and distributed ledger technology largest investment banks, with the goal of putting a dollar figure against potential (hereinafter “DLT”) to deliver benefits is significant. Gartner cost savings that might be achieved with estimates that DLT will result in $176 billion in added business DLT. The report concluded that the value by 2025; that total reaches $3.1 trillion by 2030.3 banks analyzed could reduce infrastructure costs by an average $8 to Investment in the field reflects the widespread belief that the $12 billion a year. The survey mapped technology can deliver value. Numerous trials, and some more than 50 operational cost metrics deployments, can be found across multiple sectors. and found the savings would break down as follows: Over two dozen countries are investing in DLT 70% savings on central financial More than 2,500 patents have been filed in the last 3 reporting 4 30-50% savings on compliance years 50% savings on centralized operations As of Q4, 2016, 28 of the top 30 banks were engaged in 50% savings on business blockchain proofs-of-concept operations.
    [Show full text]
  • On Trade-Offs of Applying Block Chains for Electronic Voting Bulletin
    On Trade-offs of Applying Block Chains for Electronic Voting Bulletin Boards Sven Heiberg1, Ivo Kubjas1, Janno Siim3;4, and Jan Willemson2;3 1 Smartmatic-Cybernetica Centre of Excellence for Internet Voting Ulikooli¨ 2, 51003 Tartu, Estonia fsven,[email protected] 2 Cybernetica AS, Ulikooli¨ 2, 51003 Tartu, Estonia [email protected] 3 Software Technology and Applications Competence Center Ulikooli¨ 2, 51003 Tartu, Estonia 4 Institute of Computer Science, University of Tartu Ulikooli¨ 18, 50090 Tartu, Estonia [email protected] Abstract. This paper takes a critical look at the recent trend of building electronic voting systems on top of block chain technology. Even though being very appealing from the election integrity perspective, block chains have numerous technical, economical and even political drawbacks that need to be taken into account. Selecting a good trade-off between de- sirable properties and restrictions imposed by different block chain im- plementations is a highly non-trivial task. This paper aims at bringing some clarity into performing this task. We will mostly be concentrating on public permissionless block chains and their applications as bulletin board implementations as these are the favourite choices in majority of the recent block chain based voting protocol proposals. 1 Introduction In virtually all of the modern democratic societies, democracy (translated from Greek roughly as rule of the people) is implemented via some sort of public opinion polling e.g. voting on the elections of representative bodies. Regrettably, the process of public polling is very fragile. Many things can go wrong, and have gone wrong in the history of elections. To address the his- torically experienced problems, many requirements have been put forward and many measures have been developed to meet them.
    [Show full text]
  • Smart Contracts and Distributed Ledger Technology: a Lawyer’S Guide
    Smart Contracts and Distributed Ledger Technology: A Lawyer’s Guide Presented by: Ken Moyle Clear Law Institute | 4601 N. Fairfax Dr., Ste 1200 | Arlington | VA | 22203 www.clearlawinstitute.com Questions? Please call us at 703-372-0550 or email us at [email protected] All-Access Membership Program ● Earn continuing education credit (CLE, CPE, SHRM, HRCI, etc.) in all states at no additional cost ● Access courses on a computer, tablet, or smartphone ● Access more than 75 liVe webinars each month ● Access more than 750 on-demand courses Register within 7 days after the webinar using promo code “7member” to receive a $200 discount off the $799 base price. Learn more and register here: http://clearlawinstitute.com/member Clear Law Institute, © 2018 Smart Contracts and Distributed Ledger Technology A Lawyer’s Guide Agenda Smart Contracts: Theory and Reality Concepts and Confusion • Legal vs. Technical viewpoints The Lexicon • Common Accord • Distributed Ledger Initial Coin Offerings and SAFTs • Blockchain Regulatory Developments • Cryptocurrency • State blockchain statutes • Smart Contracts • Delaware Resources www.ClearLawInstitute.com (703) 372-0550 Clear Law Institute, © 2018 “ The digital revolution is radically changing the kinds of relationships we can have. What parts of our hard- won legal tradition will still be valuable in the cyberspace era? ” - Nick Szabo, 1996 “What is the best way to apply these common law principles to the design of our on-line relationships?” Integrity of record Trust in the Enforceability outcome
    [Show full text]
  • What's Next in Blockchain Research?
    What’s Next in Blockchain Research? – An Identification of Key Topics Using a Multidisciplinary Perspective Horst Treiblmaier, Melanie Swan, Primavera de Filippi, Mary Lacity, Thomas Hardjono, Henry Kim To cite this version: Horst Treiblmaier, Melanie Swan, Primavera de Filippi, Mary Lacity, Thomas Hardjono, et al.. What’s Next in Blockchain Research? – An Identification of Key Topics Using a Multidisciplinary Perspective. Database for Advances in Information Systems, In press. hal-03098483 HAL Id: hal-03098483 https://hal.archives-ouvertes.fr/hal-03098483 Submitted on 5 Jan 2021 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. The Data Base for Advances in Information Systems What’s Next in Blockchain Research? – An Identification of Key Topics Using a Multidisciplinary Perspective Horst Treiblmaier [email protected] Melanie Swan [email protected] Primavera de Filippi [email protected] Mary Lacity [email protected] Thomas Hardjono [email protected] Henry Kim [email protected] Date of Acceptance: 6/23/2020 This file is the unedited version of a manuscript that has been accepted for publication in The Data Base for Advances in Information Systems. Feel free to distribute this file to those interested in reading about this forthcoming research.
    [Show full text]
  • What Is the Upper Limit of Value?
    WHAT IS THE UPPER LIMIT OF VALUE? Anders Sandberg∗ David Manheim∗ Future of Humanity Institute 1DaySooner University of Oxford Delaware, United States, Suite 1, Littlegate House [email protected] 16/17 St. Ebbe’s Street, Oxford OX1 1PT [email protected] January 27, 2021 ABSTRACT How much value can our decisions create? We argue that unless our current understanding of physics is wrong in fairly fundamental ways, there exists an upper limit of value relevant to our decisions. First, due to the speed of light and the definition and conception of economic growth, the limit to economic growth is a restrictive one. Additionally, a related far larger but still finite limit exists for value in a much broader sense due to the physics of information and the ability of physical beings to place value on outcomes. We discuss how this argument can handle lexicographic preferences, probabilities, and the implications for infinite ethics and ethical uncertainty. Keywords Value · Physics of Information · Ethics Acknowledgements: We are grateful to the Global Priorities Institute for highlighting these issues and hosting the conference where this paper was conceived, and to Will MacAskill for the presentation that prompted the paper. Thanks to Hilary Greaves, Toby Ord, and Anthony DiGiovanni, as well as to Adam Brown, Evan Ryan Gunter, and Scott Aaronson, for feedback on the philosophy and the physics, respectively. David Manheim also thanks the late George Koleszarik for initially pointing out Wei Dai’s related work in 2015, and an early discussion of related issues with Scott Garrabrant and others on asymptotic logical uncertainty, both of which informed much of his thinking in conceiving the paper.
    [Show full text]