Blockchain and Cryptocurrency

Total Page:16

File Type:pdf, Size:1020Kb

Blockchain and Cryptocurrency Blockchain and Cryptocurrency: A comparative framework of the main Architectural Drivers Martin Garriga Maxmiliano Arias Alan De Renzis CONICET, National Council for Fidtech Fidtech Scientific and Technical Research Independencia 596 Independencia 596 Buenos Aires 1400 Neuquen 8300, Argentina Neuquen 8300, Argentina Neuquen 8300, Argentina maximiliano.arias@fidtech.net alan.derenzis@fidtech.net martin.garriga@fi.uncoma.edu.ar ABSTRACT the success of Bitcoin cryptocurrency [13]. Its main goal is to Blockchain is a decentralized transaction and data manage- create a decentralized environment where no third party is in ment solution, the technological weapon-of-choice behind the control of the transactions and data [26]. This technology is success of Bitcoin and other cryptocurrencies. As the number now mainstream because it solves problems in a way people and variety of existing blockchain implementations continues could not before, generating a business value-add that will 1 to increase, adopters should focus on selecting the best one to reach about $176 billion by 2025 and $3.1 trillion by 2030 . support their decentralized applications (dApps), rather than The prime reason behind this expansion is the already wide- developing new ones from scratch. In this paper we present spread adoption of blockchain in financial transactions and a framework to aid software architects, developers, tool se- cross-border payments [6]. lectors and decision makers to adopt the right blockchain Even though the most popular blockchain implementation technology for their problem at hand. The framework ex- is Bitcoin, a myriad others are currently running or still poses the correlation between technological decisions and in development. Different implementations vary in many architectural features, capturing the knowledge from existing ways such as their purpose, governance and efficiency, among industrial products, technical forums/blogs, experts’ feed- others. back and academic literature; plus our own experience using However, no single blockchain by itself can meet the require- and developing blockchain-based applications. We validate ments for all usage scenarios, e.g., those that require real-time our framework by applying it to dissect the most outstand- processing. When building blockchain-based applications, we ing blockchain platforms, i.e., the ones behind the top 10 need to systematically consider the key technological features cryptocurrencies apart from Bitcoin. Then, we show how we and configurations, and assess their impact on quality at- applied it to a real-world case study in the insurtech domain. tributes for the overall systems [25]. Moreover, to determine which blockchain implementation should be leveraged (or CCS CONCEPTS even if a new one is needed) for a given application, it is crucial to be familiar with the differences among them [7]. •Computer systems organization → Embedded systems; Re- In this paper we propose a framework to help software dundancy; Robotics; •Networks → Network reliability; architects, developers, tool selectors and decision makers to 2 KEYWORDS adopt the right blockchain technology for their problem at hand. Even though new blockchains increased exponen- Blockchain, Cryptocurrencies, Software Architectures tially up to 2017, nowadays it makes no sense to “reinvent ACM Reference format: the wheel” by building a custom blockchain from scratch Martin Garriga, Maxmiliano Arias, and Alan De Renzis. 2018. every time; but rather to leverage, and probably combine arXiv:1812.08806v1 [cs.CR] 29 Nov 2018 Blockchain and Cryptocurrency: A comparative framework of the existing, battle-hardened solutions to support new applica- main Architectural Drivers. In Proceedings of Sample Conference, tions. For crafting our framework, we surveyed the knowledge , November, 2018 (CONF), 8 pages. from existing industrial products, technical forums/blogs, aca- DOI: xx.xxx/xxx x demic literature and our own experience using and developing blockchain-based applications. 1 INTRODUCTION Afterwards, we applied the framework to analyze and score the most outstanding solutions in the real-world market — Blockchain is a decentralized transaction and data manage- 3 ment solution, well-known for being the technology behind i.e., the technology behind the top 11 cryptocurrencies , giving an overview of the current ecosystem of mainstream Permission to make digital or hard copies of part or all of this work blockchain solutions. We then show how such an assessment for personal or classroom use is granted without fee provided that framework can be applied through a real-world case study in copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. the insurtech domain. Copyrights for third-party components of this work must be honored. 1 For all other uses, contact the owner/author(s). https://www.gartner.com/doc/3627117/ CONF, forecast-blockchain-business-value-worldwide 2 © 2018 Copyright held by the owner/author(s). xxx-x-xxxx-xxxx- For the sake of simplicity we will use the word blockchain to refer to x/xx/xx. $15.00 any distributed ledger implementation, except when explicitly clarified. DOI: xx.xxx/xxx x 3According to their market cap. See: https://coinmarketcap.com CONF, November, 2018, M. Garriga et al. The rest of the paper is organized as follows. Section 2 but parameterisably expensive to compute. Given the ludi- provides an overview of key concepts in blockchain and cryp- crous energy consumption of PoW5, other blockchains opted tocurrencies, as well as related work. Section 4 details our for greener but rather centralized options such as Proof-of- framework for assessment of blockchain technologies. Sec- Stake [8] (PoS), where miner are limited to a percentage of tion 5 assesses the top blockchain solutions by means of our transactions that is reflective of his or her ownership stake framework and then applies it to a real-world case study. of the token, and lately Delegated Proof of Stake (DPoS). Finally, Section 6 concludes the paper. Finally, several blockchains provided their own hybrid or ad-hoc protocols [16]. 2 BACKGROUND The first generation of blockchains (e.g., Bitcoin) provided very limited capability to support programmable transac- A blockchain is a distributed ledger, in the form of a totally tions, apart from value transfer from one account to another. ordered, back-linked list of blocks [13]. Each block contains The second generation (e.g., Ethereum [3]) aims to provide transactions that are hashed into a binary hash tree (also a general-purpose programmable infrastructure, whose pro- called a merkle tree), with the top (root) of the tree stored grams are known as smart contracts [21, 25]. Originally, alongside the transactions. Each block also contains the smart contracts were defined as the digital equivalent of a previous block’s hash, thus guaranteeing integrity and deter- paper contract: an agreement between parties with a set of minism — i.e., any node replaying all blocks starting from promises that are legally enforceable [21]. Nowadays, any the first one (genesis block) should end up with the same general purpose computation that takes place on a blockchain state as every other node [3]. This forbids to call external or distributed ledger is considered a smart contract. APIs whose responses may change over time4. Blockchain distribution is coupled with trust creation and a consensus 3 RELATED WORK mechanism for determining agreement on the next block to add. Cryptocurrencies have emerged as the first generation of Yli-huumo et al. [26] identified that a majority of the blockchain- blockchain-based applications, as digital currencies that are related papers focused on certain technical challenges: through- based on cryptography techniques and peer-to-peer networks. put, latency, size and bandwidth, security, wasted resources, The first and most popular example is Bitcoin [1, 13]. usability, versioning, hard forks, and multiple chains [20]. One of the fundamental disruptions that blockchain tech- In addition, they identified privacy, smart contracts, new nology is causing is the redefinition of digital trust, which cryptocurrencies, botnets, consensus protocols and trust- manifests itself in a fully distributed way without anyone worthiness. As future research directions, authors highlight having to trust any single member of the network. The only scalability issues; other uses beyond cryptocurrency systems trust required is that, on average, the participants of the (i.e., dApps) and effectiveness of the proposed solutions –. network are not colluding against the others in a coordinated the latter being one of the contributions of our paper. In a manner [25]. similar direction, Alharby and Van Morsel [1] present a sys- Transactions are data packages that store information tematic mapping study of smart contracts. They identified — e.g., monetary value for cryptocurrencies, or results of four groups according to the challenges tackled: codifying, function calls for other decentralized applications (dApps). security, privacy and performance. The integrity of a transaction is checked by algorithmic rules Scriber [18] performed a literature review and evaluated 23 and cryptographic techniques. A transaction, signed by blockchain implementation projects. This evaluation revealed its initiator, is sent to a node connected to the blockchain 10 architectural or blockchain characteristics that can help network, which validates the transaction and
Recommended publications
  • Initial Coin Offerings: Financing Growth with Cryptocurrency Token
    Initial Coin Offerings: Financing Growth with Cryptocurrency Token Sales Sabrina T. Howell, Marina Niessner, and David Yermack⇤ June 21, 2018 Abstract Initial coin offerings (ICOs) are sales of blockchain-based digital tokens associated with specific platforms or assets. Since 2014 ICOs have emerged as a new financing instrument, with some parallels to IPOs, venture capital, and pre-sale crowdfunding. We examine the relationship between issuer characteristics and measures of success, with a focus on liquidity, using 453 ICOs that collectively raise $5.7 billion. We also employ propriety transaction data in a case study of Filecoin, one of the most successful ICOs. We find that liquidity and trading volume are higher when issuers offer voluntary disclosure, credibly commit to the project, and signal quality. s s ss s ss ss ss s ⇤NYU Stern and NBER; Yale SOM; NYU Stern, ECGI and NBER. Email: [email protected]. For helpful comments, we are grateful to Bruno Biais, Darrell Duffie, seminar participants at the OECD Paris Workshop on Digital Financial Assets, Erasmus University, and the Swedish House of Finance. We thank Protocol Labs and particularly Evan Miyazono and Juan Benet for providing data. Sabrina Howell thanks the Kauffman Foundation for financial support. We are also grateful to all of our research assistants, especially Jae Hyung (Fred) Kim. Part of this paper was written while David Yermack was a visiting professor at Erasmus University Rotterdam. 1Introduction Initial coin offerings (ICOs) may be a significant innovation in entrepreneurial finance. In an ICO, a blockchain-based venture raises capital by selling cryptographically secured digital assets, usually called “tokens.” These ventures often resemble the startups that conventionally finance themselves with angel or venture capital (VC) investment, though there are many scams, jokes, and tokens that have nothing to do with a new product or business.
    [Show full text]
  • Consent Order: HDR Global Trading Limited, Et Al
    Case 1:20-cv-08132-MKV Document 62 Filed 08/10/21 Page 1 of 22 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK USDC SDNY DOCUMENT ELECTRONICALLY FILED COMMODITY FUTURES TRADING DOC #: COMMISSION, DATE FILED: 8/10/2021 Plaintiff v. Case No. 1:20-cv-08132 HDR GLOBAL TRADING LIMITED, 100x Hon. Mary Kay Vyskocil HOLDINGS LIMITED, ABS GLOBAL TRADING LIMITED, SHINE EFFORT INC LIMITED, HDR GLOBAL SERVICES (BERMUDA) LIMITED, ARTHUR HAYES, BENJAMIN DELO, and SAMUEL REED, Defendants CONSENT ORDER FOR PERMANENT INJUNCTION, CIVIL MONETARY PENALTY, AND OTHER EQUITABLE RELIEF AGAINST DEFENDANTS HDR GLOBAL TRADING LIMITED, 100x HOLDINGS LIMITED, SHINE EFFORT INC LIMITED, and HDR GLOBAL SERVICES (BERMUDA) LIMITED I. INTRODUCTION On October 1, 2020, Plaintiff Commodity Futures Trading Commission (“Commission” or “CFTC”) filed a Complaint against Defendants HDR Global Trading Limited (“HDR”), 100x Holdings Limited (100x”), ABS Global Trading Limited (“ABS”), Shine Effort Inc Limited (“Shine”), and HDR Global Services (Bermuda) Limited (“HDR Services”), all doing business as “BitMEX” (collectively “BitMEX”) as well as BitMEX’s co-founders Arthur Hayes (“Hayes”), Benjamin Delo (“Delo”), and Samuel Reed (“Reed”), (collectively “Defendants”), seeking injunctive and other equitable relief, as well as the imposition of civil penalties, for violations of the Commodity Exchange Act (“Act”), 7 U.S.C. §§ 1–26 (2018), and the Case 1:20-cv-08132-MKV Document 62 Filed 08/10/21 Page 2 of 22 Commission’s Regulations (“Regulations”) promulgated thereunder, 17 C.F.R. pts. 1–190 (2020). (“Complaint,” ECF No. 1.)1 II. CONSENTS AND AGREEMENTS To effect settlement of all charges alleged in the Complaint against Defendants HDR, 100x, ABS, Shine, and HDR Services (“Settling Defendants”) without a trial on the merits or any further judicial proceedings, Settling Defendants: 1.
    [Show full text]
  • Cryptocurrency: the Economics of Money and Selected Policy Issues
    Cryptocurrency: The Economics of Money and Selected Policy Issues Updated April 9, 2020 Congressional Research Service https://crsreports.congress.gov R45427 SUMMARY R45427 Cryptocurrency: The Economics of Money and April 9, 2020 Selected Policy Issues David W. Perkins Cryptocurrencies are digital money in electronic payment systems that generally do not require Specialist in government backing or the involvement of an intermediary, such as a bank. Instead, users of the Macroeconomic Policy system validate payments using certain protocols. Since the 2008 invention of the first cryptocurrency, Bitcoin, cryptocurrencies have proliferated. In recent years, they experienced a rapid increase and subsequent decrease in value. One estimate found that, as of March 2020, there were more than 5,100 different cryptocurrencies worth about $231 billion. Given this rapid growth and volatility, cryptocurrencies have drawn the attention of the public and policymakers. A particularly notable feature of cryptocurrencies is their potential to act as an alternative form of money. Historically, money has either had intrinsic value or derived value from government decree. Using money electronically generally has involved using the private ledgers and systems of at least one trusted intermediary. Cryptocurrencies, by contrast, generally employ user agreement, a network of users, and cryptographic protocols to achieve valid transfers of value. Cryptocurrency users typically use a pseudonymous address to identify each other and a passcode or private key to make changes to a public ledger in order to transfer value between accounts. Other computers in the network validate these transfers. Through this use of blockchain technology, cryptocurrency systems protect their public ledgers of accounts against manipulation, so that users can only send cryptocurrency to which they have access, thus allowing users to make valid transfers without a centralized, trusted intermediary.
    [Show full text]
  • Blockchain & Cryptocurrency Regulation
    Blockchain & Cryptocurrency Regulation Third Edition Contributing Editor: Josias N. Dewey Global Legal Insights Blockchain & Cryptocurrency Regulation 2021, Third Edition Contributing Editor: Josias N. Dewey Published by Global Legal Group GLOBAL LEGAL INSIGHTS – BLOCKCHAIN & CRYPTOCURRENCY REGULATION 2021, THIRD EDITION Contributing Editor Josias N. Dewey, Holland & Knight LLP Head of Production Suzie Levy Senior Editor Sam Friend Sub Editor Megan Hylton Consulting Group Publisher Rory Smith Chief Media Officer Fraser Allan We are extremely grateful for all contributions to this edition. Special thanks are reserved for Josias N. Dewey of Holland & Knight LLP for all of his assistance. Published by Global Legal Group Ltd. 59 Tanner Street, London SE1 3PL, United Kingdom Tel: +44 207 367 0720 / URL: www.glgroup.co.uk Copyright © 2020 Global Legal Group Ltd. All rights reserved No photocopying ISBN 978-1-83918-077-4 ISSN 2631-2999 This publication is for general information purposes only. It does not purport to provide comprehensive full legal or other advice. Global Legal Group Ltd. and the contributors accept no responsibility for losses that may arise from reliance upon information contained in this publication. This publication is intended to give an indication of legal issues upon which you may need advice. Full legal advice should be taken from a qualified professional when dealing with specific situations. The information contained herein is accurate as of the date of publication. Printed and bound by TJ International, Trecerus Industrial Estate, Padstow, Cornwall, PL28 8RW October 2020 PREFACE nother year has passed and virtual currency and other blockchain-based digital assets continue to attract the attention of policymakers across the globe.
    [Show full text]
  • Blockchain and Cryptocurrency in Africa a Comparative Summary of the Reception and Regulation of Blockchain and Cryptocurrency in Africa
    Blockchain and Cryptocurrency in Africa A comparative summary of the reception and regulation of Blockchain and Cryptocurrency in Africa 2018 Baker McKenzie, Johannesburg IMPORTANT DISCLAIMER: The material in this report is of the nature of general comment only. It is not offered as legal advice on any specific issue or matter and should not be taken as such. Readers should refrain from acting on the basis of any discussion contained in this report without obtaining specific legal advice on the particular facts and circumstances at issue. While the authors have made every effort to provide accurate and up-to-date information on laws and policy, these matters are continuously subject to change. Furthermore, the application of these laws depends on the particular facts and circumstances of each situation, and therefore readers should consult their lawyer before taking any action. Information contained herein is as at November 2018. CONTENTS PREFACE ............................................................................................................................................1 GEOGRAPHICAL OVERVIEW ....................................................................................................... 2 COUNTRY PROFILES ..................................................................................................................... 3 1. Botswana ................................................................................................................................................................... 3 2. Ghana .........................................................................................................................................................................4
    [Show full text]
  • Bitcoin and Cryptocurrency Technologies
    © Copyright, Princeton University Press. No part of this book may be distributed, posted, or reproduced in any form by digital or mechanical means without prior written permission of the publisher. CHAPTER 1 Introduction to Cryptography and Cryptocurrencies All currencies need some way to control supply and enforce various security properties to prevent cheating. In fiat currencies, organizations like central banks control the money supply and add anticounterfeiting features to physical currency. These security features raise the bar for an attacker, but they don’t make money impossible to coun- terfeit. Ultimately, law enforcement is necessary for stopping people from breaking the rules of the system. Cryptocurrencies too must have security measures that prevent people from tamper- ing with the state of the system and from equivocating (that is, making mutually incon- sistent statements to different people). If Alice convinces Bob that she paid him a digital coin, for example, she should not be able to convince Carol that she paid her that same coin. But unlike fiat currencies, the security rules of cryptocurrencies need to be en- forced purely technologically and without relying on a central authority. As the word suggests, cryptocurrencies make heavy use of cryptography. Cryptogra- phy provides a mechanism for securely encoding the rules of a cryptocurrency system in the system itself. We can use it to prevent tampering and equivocation, as well as to encode, in a mathematical protocol, the rules for creation of new units of the currency. Thus, before we can properly understand cryptocurrencies, we need to delve into the cryptographic foundations that they rely on.
    [Show full text]
  • IRS, Will You Spare Some Change?: Defining Virtual Currency for the FATCA
    Valparaiso University Law Review Volume 50 Number 3 Spring 2016 pp.863-911 Spring 2016 IRS, Will You Spare Some Change?: Defining Virtual Currency for the FATCA Elizabeth M. Valeriane Valparaiso University Law School, [email protected] Follow this and additional works at: https://scholar.valpo.edu/vulr Part of the Law Commons Recommended Citation Elizabeth M. Valeriane, IRS, Will You Spare Some Change?: Defining Virtual Currency for the FATCA, 50 Val. U. L. Rev. 863 (2016). Available at: https://scholar.valpo.edu/vulr/vol50/iss3/10 This Notes is brought to you for free and open access by the Valparaiso University Law School at ValpoScholar. It has been accepted for inclusion in Valparaiso University Law Review by an authorized administrator of ValpoScholar. For more information, please contact a ValpoScholar staff member at [email protected]. Valeriane: IRS, Will You Spare Some Change?: Defining Virtual Currency for t IRS, WILL YOU SPARE SOME CHANGE?: DEFINING VIRTUAL CURRENCY FOR THE FATCA I. INTRODUCTION The founding father commemorated on the one-dollar bill said, “[t]o be prepared for war is one of the most effectual means of preserving peace.”1 Although the quote relates to war, we adopt the underlying message as it relates to law. Arguably, creating law is the most effective means of resolving future legal disputes, especially issues that emerge when applying yesterday’s law to the ever changing norms of today’s society. Cryptocurrency, a type of electronic money, presents many legal issues as this new medium of currency has found its way into the world’s economy.2 Not to be confused with other digital currency, such as game awards or airline miles, cryptocurrency is not confined to a defined 1 George Washington, President, State of the Union Address (Jan.
    [Show full text]
  • Mining Pool Selection Under Block Withholding Attack †
    applied sciences Article Mining Pool Selection under Block WithHolding Attack † Kentaro Fujita, Yuanyu Zhang * , Masahiro Sasabe and Shoji Kasahara Graduate School of Science and Technology, Nara Institute of Science and Technology, Takayama-cho, Ikoma, Nara 630-0192, Japan; [email protected] (K.F.); [email protected] (M.S.); [email protected] (S.K.) * Correspondence: [email protected] † This paper is an extended version of our paper presented in the 2020 IEEE International Conference on Blockchain (IEEE Blockchain 2020). Abstract: In current Proof-of-Work (PoW) blockchain systems, miners usually form mining pools to compete with other pools/miners in the mining competition. Forming pools can give miners steady revenues but will introduce two critical issues. One is mining pool selection, where miners select the pools to join in order to maximize their revenues. The other is a Block WithHolding (BWH) attack, where pools can inject part of their hash/mining power into other pools to obtain additional revenues without contributing to the mining process of the attacked pools. Reasoning that the BWH attack will have significant impacts on the pool selection, we therefore investigate the mining pool selection issue in the presence of a BWH attack in this paper. In particular, we model the pool selection process of miners as an evolutionary game and find the Evolutionarily Stable States (ESSs) of the game (i.e., stable pool population states) as the solutions. Previous studies investigated this problem from the perspective of pool managers and neglected the revenues from attacked pools (attacking revenues), leading to less accurate and insightful findings.
    [Show full text]
  • The Lightning Network - Deconstructed and Evaluated
    The Lightning Network - Deconstructed and Evaluated Anti-Money Laundering (AML) and Anti-Terrorist Financing (ATF) professionals, especially those working in the blockchain and cryptocurrency environment, may have heard of the second layer evolution of Bitcoin's blockchain - the Lightning Network, (LN). This exciting new and rapidly deploying technology offers innovative solutions to solve issues around the speed of transaction times using bitcoin currently, but expandable to other tokens. Potentially however, this technology raises regulatory concerns as it arguably makes, (based on current technical limitations), bitcoin transactions truly anonymous and untraceable, as opposed to its current status, where every single bitcoin can be traced all the way back to its coinbase transaction1 on the public blockchain. This article will break down the Lightning Network - analyzing how it works and how it compares to Bitcoin’s current system, the need for the technology, its money laundering (ML) and terrorist financing (TF) risks, and some thoughts on potential regulatory applications. Refresher on Blockchain Before diving into the Lightning Network, a brief refresher on how the blockchain works - specifically the Bitcoin blockchain (referred to as just “Bitcoin” with a capital “B” herein) - is required. For readers with no knowledge or those wishing to learn more about Bitcoin, Mastering Bitcoin by Andreas Antonopoulos2 is a must read, and for those wishing to make their knowledge official, the Cryptocurrency Certification Consortium, (C4) offers the Certified Bitcoin Professional (CBP) designation.3 Put simply, the blockchain is a growing list of records that can be visualized as a series of blocks linked by chains. Each block contains specific information - in Bitcoin’s case, a list of transactions and their data, which includes the time, date, amount, and the counterparties4 of each transaction.
    [Show full text]
  • Blockchain Consensus: an Analysis of Proof-Of-Work and Its Applications. Amitai Porat1, Avneesh Pratap2, Parth Shah3, and Vinit Adkar4
    Blockchain Consensus: An analysis of Proof-of-Work and its applications. Amitai Porat1, Avneesh Pratap2, Parth Shah3, and Vinit Adkar4 [email protected] [email protected] [email protected] [email protected] ABSTRACT Blockchain Technology, having been around since 2008, has recently taken the world by storm. Industries are beginning to implement blockchain solutions for real world services. In our project, we build a Proof of Work based Blockchain consensus protocol and evauluate how major applications can run on the underlying platform. We also explore how varying network conditions vary the outcome of consensus among nodes. Furthermore, to demonstrate some of its capabilities we created our own application built on the Ethereum blockchain platform. While Bitcoin is by and far the first major cryptocurrency, it is limited in the capabilities of its blockchain as a peer-to-peer currency exchange. Therefore, Ethereum blockchain was the right choice for application development since it caters itself specifically to building decentralized applications that seek rapid deployment and security. 1 Introduction Blockchain technology challenges traditional shared architectures which require forms of centralized governance to assure the integrity of internet applications. It is the first truly democratized, universally accessible, shared and secure asset control architecture. The first blockchain technology was founded shortly after the US financial collapse in 2008, the idea was a decentralized peer-to-peer currency transfer network that people can rely on when the traditional financial system fails. As a result, blockchain largely took off and made its way into large public interest. We chose to investigate the power of blockchain consensus algorithms, primarily Proof of Work.
    [Show full text]
  • Performance Analysis of Cryptographic Hash Functions Suitable for Use in Blockchain
    I. J. Computer Network and Information Security, 2021, 2, 1-15 Published Online April 2021 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2021.02.01 Performance Analysis of Cryptographic Hash Functions Suitable for Use in Blockchain Alexandr Kuznetsov1 , Inna Oleshko2, Vladyslav Tymchenko3, Konstantin Lisitsky4, Mariia Rodinko5 and Andrii Kolhatin6 1,3,4,5,6 V. N. Karazin Kharkiv National University, Svobody sq., 4, Kharkiv, 61022, Ukraine E-mail: [email protected], [email protected], [email protected], [email protected], [email protected] 2 Kharkiv National University of Radio Electronics, Nauky Ave. 14, Kharkiv, 61166, Ukraine E-mail: [email protected] Received: 30 June 2020; Accepted: 21 October 2020; Published: 08 April 2021 Abstract: A blockchain, or in other words a chain of transaction blocks, is a distributed database that maintains an ordered chain of blocks that reliably connect the information contained in them. Copies of chain blocks are usually stored on multiple computers and synchronized in accordance with the rules of building a chain of blocks, which provides secure and change-resistant storage of information. To build linked lists of blocks hashing is used. Hashing is a special cryptographic primitive that provides one-way, resistance to collisions and search for prototypes computation of hash value (hash or message digest). In this paper a comparative analysis of the performance of hashing algorithms that can be used in modern decentralized blockchain networks are conducted. Specifically, the hash performance on different desktop systems, the number of cycles per byte (Cycles/byte), the amount of hashed message per second (MB/s) and the hash rate (KHash/s) are investigated.
    [Show full text]
  • Knowledge Discovery in Cryptocurrency Transactions
    Knowledge Discovery in Cryptocurrency Transactions: A Survey Xiao Fan Liua,∗, Xin-Jian Jiangb, Si-Hao Liub, Chi Kong Tsec aDepartment of Media and Communication, City University of Hong Kong, Hong Kong SAR, China bSchool of Computer Science and Engineering, Southeast University, Nanjing, China cDepartment of Electrical Engineering, City University of Hong Kong, Hong Kong SAR, China Abstract Cryptocurrencies gain trust in users by publicly disclosing the full creation and transaction history. In return, the transaction history faithfully records the whole spectrum of cryptocurrency user behaviors. This article analyzes and summarizes the existing research on knowledge discovery in the cryptocurrency transactions using data mining techniques. Specifically, we classify the exist- ing research into three aspects, i.e., transaction tracings and blockchain address linking, the analyses of collective user behaviors, and the study of individual user behaviors. For each aspect, we present the problems, summarize the methodolo- gies, and discuss major findings in the literature. Furthermore, an enumeration of transaction data parsing and visualization tools and services is also provided. Finally, we outline several future directions in this research area, such as the current rapid development of Decentralized Finance (De-Fi) and digital fiat money. Keywords: cryptocurrency, Bitcoin, Ethereum, transaction analysis, data mining, complex network Contents arXiv:2010.01031v1 [cs.CR] 2 Oct 2020 1 Introduction 2 2 Preliminaries 4 2.1 Thecryptocurrencyeconomy . 4 2.2 DataModels ............................. 5 3 Traceability and Linkability Issues 8 3.1 Tracingcryptocurrencytransactions . 8 ∗Corresponding author Email address: [email protected] (Xiao Fan Liu) Preprint submitted to Elsevier October 5, 2020 3.2 Counter-tracingmeasures . 9 3.3 Taint analysis techniques .
    [Show full text]