An Introduction to Blockchain for Finance Professionals
1. An Introduction to
Blockchain
:for Finance Professionals
Srinath Perera, Ph.D.
VP Research WSO2, Apache Member,
( srinath@wso2.com)
@srinath_perera
2. Double Entry Book Keeping
ā¢ Created somewhere 70AD Rome and 13 century BC Italy
ā¢ Established current accounting as we know it
ā¢ In addition to avoiding mistakes, the main idea is each entry has a
corresponding entry somewhere, making it hard to forge
ā¢ Help us establish trust
!2
3. We can think of blockchain as an
indestructible append-only
ledger where entries canāt be
edited, repudiated, or destroyed.
4. Such a ledger let us establish
trust, and can redefine many
complicated processes in the
world.
5. Example: Land Registry
ā¢ We need
ā¢ Only owner to be able to sell
ā¢ The owner can only sell to one person
ā¢ Currently, we solve the problem via
regulations and professionals
ā¢ Land Registry
ā¢ Lawyers + Land registry checks
ā¢ Still issues: masquerading or selling the
same day to two people
ā¢ System works going back and catching
people who did fraud
!5
Photo. Credit: CC, https://www.ļ¬ickr.com/photos/tjc/6454659319
6. Ledger based Solution
ā¢ Check the ledger for ownership of the buyer
ā¢ Add an entry of the sale
ā¢ Both should happen without other operations in between
ā¢ Entry is added using ownerās key, which only he has ( Others canāt
masquerade, and the owner canāt repudiate)
!6
Image Credit: CC, https://www.ļ¬ickr.com/photos/moneymetals/31403416393
7. Trust Establishment
ā¢ We have many organizations,
processes, and regulations to
establish trust
ā¢ Government
ā¢ Banks
ā¢ Insurance Cooperations
ā¢ Brokers
ā¢ Blockchain by creating a ledger can
replace some of these systems
!7
8. How it works?
ā¢ Many participants
ā¢ Ledger records are stored Hash Chain
ā¢ Hash Chain canāt be changed, and can only add to the chain
ā¢ Participants agree on the next entry( using a special algorithm), and
everyone updates their own copy
ā¢ Conļ¬ict resolved using majority
ā¢ Canāt change the Ledger without
ā¢ Getting more than 50% of current participants to agree (e.g., Ethereum
Hack)
ā¢ Breaking current cryptography
!8
9. Public vs. Private Blockchains
ā¢ Bitcoin, original version is public; everyone can see and participate
in the blockchain
ā¢ Alternatively, there are restricted blockchains
ā¢ Only people with access can read
ā¢ Anyone can read, only people with access can write
ā¢ Anyone can read and write
ā¢ Public blockchains are decentralized, everyone is equal, and
operations canāt be reversed without more than 50% consent
ā¢ Restricted blockchains have admins and support reversals.
!9
10. Are Private Blockchains secure?
ā¢ They are not fully decentralised
ā¢ Yes, better than a centralized system
ā¢ e.g. to change a private blockchain that connect banks, a bank
has to get other banks to agree. It is much harder than having
your own books
!10
12. Typical use cases
ā¢ Record audit trails in the ledger, canāt be changed later
ā¢ (Certiļ¬cation, Provenance)
ā¢ Record execution in detail in a ledger (e.g., If you pay 80$ premium per
month, we will pay $30000 if the car is totaled)
ā¢ (Smart Contracts)
ā¢ Write ownership of assert to a ledger, and make the assert work by
reading the blockchain (e.g., Only car owner can unlock the car)
ā¢ Digitally control an assert (e.g., track car ownership) / Tokenization
ā¢ Create an ID and get authorities to explain myself in the ledger
ā¢ Digital ID and permission
!12
13. Four Common Motivations for Blockchain
ā¢ Foster Trust: Some companies face higher hurdles for engendering
trust due to the nature of their business.
ā¢ Avoid Coercion: Some organizations face risks because they can
be coerced into actions that harm them.
ā¢ Improve efļ¬ciency: In some cases, enterprises may choose to
implement blockchain to do things better
ā¢ Collaborate More Effectively: Blockchain allows better
collaborations with partners, suppliers, and other parties.
!13
14. Foster Trust: Auditing
ā¢ Record audit records in a
blockchain making it tamper-
proof
ā¢ When ļ¬nancial records are
sensitive, instead of sharing
ļ¬nancial records, record hash
of the records in a ledger,
which can be veriļ¬ed later.
!14
15. Foster Trust: Providing Supply Chain Visibility
ā¢ e.g., Organic Food,
Provence of artwork
ā¢ Get suppliers to record
transactions in a
blockchain to provide
visibility into the claims
made by the company
about how resources are
sourced.
!15
16. Foster Trust: Reputation Systems
ā¢ e.g., professional reputations such as doctors and lawyers, social
reputation, credit ratings
ā¢ Ratings are signed by actual users together with their veriļ¬able
claims, and therefore, they are hard to fake.
!16
17. Give up control to Avoid
Coercion
ā¢ Some organizations face risks
because they can be coerced into
actions that harm them.
ā¢ If all transactions recorded in a
blockchain, an accountant canāt be
coerced to cook the books
ā¢ A Certiļ¬cation Authority may put
the public certiļ¬cate in a blockchain
so that they canāt change it without
othersā consent. This reduces the
chance that they will be coerced
into creating certiļ¬cates for
activities, such as intelligence.
!17
18. To Improve Efficiency: Efficient Verification
ā¢ Replace documents by
recording them in the ledger
ā¢ Simplify processes
ā¢ Reduce paperwork
ā¢ Make compliance easy and
transparent
!18
19. To Improve Efficiency: Issuing
Customers Verifiable Claims
ā¢ Issuing Veriļ¬able Claims to
customers might enable
integration with other vendors,
and it can become a feature for
attracting customers.
ā¢ For example:
ā¢ Telco provider or water
provider can conļ¬rm your
address.
ā¢ Bank can conļ¬rm your income
ā¢ Bank can conļ¬rm withholding
Tax
!19
20. To Improve Efficiency:Trade
Finance
ā¢ Trade ļ¬nance enables parties
who do not know each other to
do business
ā¢ Typically provided through
Letters of Credit, Guarantees,
and Insurance
ā¢ Record them in the ledger to
ā¢ Make processing efļ¬cient
ā¢ Replace reduce or
intermediaries
!20
21. To Improve Efficiency: Tracking Software
Lifecycle
ā¢ An organization can improve its security by tracking aspects of
the software lifecycleāsuch as what libraries are used, what
version, and who built it for a given distributionāand verifying
them before deploying the software.
!21
22. Collaborate More Effectively: Audit a Business
Process
ā¢ Have the ability to track the
activities of each actor in a
business process later.
ā¢ Use case: Handle a dispute
after a failure or customer
complaint.
ā¢ Implementation: Each
participant in the process
record has hashes for incoming
and outgoing messages, which
they canāt deny and can prove
they indeed sent speciļ¬c
messages.
!22
23. Collaborate More Effectively:
KYC
ā¢ A group of organizations
ā¢ Each records their veriļ¬cation
in a ledger ( private to the
group)
ā¢ Each can decide to trust other
ā¢ Reduce veriļ¬cation overhead
using otherās ļ¬ndings
!23
24. Collaborate More Effectively: Global Decentralized Prediction
Markets
ā¢ Conduct research, consulting, analysis, and forecasting.
Blockchains can be used to build prediction markets to place
and monitor bets on anything from sports, to stocks and
elections in a decentralized way (e.g., AUGUR).
!24
25. Risks
ā¢ It is not Zero risk
ā¢ Liability if hacked
ā¢ Insurance, and get an insurance
company to audit
ā¢ User (human) is the weakest link
ā¢ Blockchain forks and chain splits and
50% attacks
ā¢ If the hacked potential impact is huge
ā¢ Too big to fail, the hack can lead to
the ļ¬nancial meltdown
!25
26. Utopia
ā¢ Everyone has a decentralized ID and all information recorded against them
ā¢ Processing and document veriļ¬cation is instantaneous
ā¢ All transaction (e.g. government, charity money spent), manufacturing, and value
additions are traced
ā¢ All decisions are recorded in the ledger, which is auditable, making fraud very hard
ā¢ All contracts are peer to peer without intermediaries.
ā¢ All assets are tokenized and managed via ledger
ā¢ The world is efļ¬cient, traceable, and understandable
!26
27. Reality
ā¢ Starting with low-risk use cases such as tracking and
collaboration
ā¢ Blockchain will coexist with current systems, adding value -
e.g., triple entry bookkeeping
ā¢ Will face natural resistance
ā¢ e.g., Listed companies in the US, reports given as images
ā¢ The critical use case will take time
!27
28. āPeople tend to overestimate what can
be done in one year and to underestimate
what can be done in five or ten years.ā