Ethereum is an open software platform based on blockchain technology that enables developers to
build and deploy decentralized applications.
Ethereum is a distributed public blockchain network.
While the Bitcoin blockchain is used to track ownership of digital currency (bitcoins), the Ethereum
blockchain focuses on running the programming code of any decentralized application.
Ether is a cryptocurrency whose blockchain is generated by the Ethereum platform. Ether can be
transferred between accounts and used to compensate participant mining nodes for computations
performed.
Understanding Proof of Work (PoW) and Proof of Stake (PoS) AlgorithmsGautam Anand
We will focus on understanding "Proof of Stake (PoS)" Algorithm, how it different from "Proof of Work" algorithm, the performance benefits and security overview. We will also discuss the upcoming blockchain protocols that are planning to move to PoS.
Apart from Proof of Work there are many other Consensus Mechanisms being discussed. What are they and what are their pros and cons. (Proof of Stake, Proof of Elapsed Time, Proof of Authority, Proof of Burn, Proof of Authority, Byzantine Fault Tolerance, Proof of Importance)
Ethereum is an open software platform based on blockchain technology that enables developers to
build and deploy decentralized applications.
Ethereum is a distributed public blockchain network.
While the Bitcoin blockchain is used to track ownership of digital currency (bitcoins), the Ethereum
blockchain focuses on running the programming code of any decentralized application.
Ether is a cryptocurrency whose blockchain is generated by the Ethereum platform. Ether can be
transferred between accounts and used to compensate participant mining nodes for computations
performed.
Understanding Proof of Work (PoW) and Proof of Stake (PoS) AlgorithmsGautam Anand
We will focus on understanding "Proof of Stake (PoS)" Algorithm, how it different from "Proof of Work" algorithm, the performance benefits and security overview. We will also discuss the upcoming blockchain protocols that are planning to move to PoS.
Apart from Proof of Work there are many other Consensus Mechanisms being discussed. What are they and what are their pros and cons. (Proof of Stake, Proof of Elapsed Time, Proof of Authority, Proof of Burn, Proof of Authority, Byzantine Fault Tolerance, Proof of Importance)
Distributed systems and blockchain technologyAlket Cecaj
An introduction to blockchain technology starting from the distributed systems and the CAP theorem. Consensus mechanisms explained on the bitcoin blockchain.
Innovation in Byzantine consensus protocols is helping decentralized networks scale up and become highly performant, possibly faster than centralized networks. Investment growth in Bitcoin and FinTech startups, and enterprise blockchain applications in development in multiple sectors
Master sequence diagrams with this sequence diagram guide. It describes everything you need to know on sequence diagram notations, best practices as well as common mistakes. It also explains how to draw a sequence diagram step by step. Plus it offers Creately sequence diagram templates you can click and edit right away.
Basics you need to know about Solidity and how it works. Learn the simple way of building a smart contract in Solidity. Tools that can be used with Solidity.
Basic introduction in blockchain, smart contracts, permissioned ledgersKoen Vingerhoets
Presented during Blockchain Vlaanderen #7 on 20/04/2017, organised by Kunstmaan and Antwerp Management School.
The assignment: host a basic introduction into blockchain, share some insights on smart contracts and explain why financial institutions choose other ledgers than bitcoin.
An introduction to Blockchain and covering :
-Blockchain vs cryptocurrency
-Bitcoin vs Ethereum
-Real life and industrial examples
-Business example
-Benefits & challenges
Ethereum Tutorial - Ethereum Explained | What is Ethereum? | Ethereum Explain...Simplilearn
This presentation on Ethereum will help you understand what is Ethereum, Ethereum features which includes cryptocurrency, smart contracts, Ethereum virtual machine, decentralized application, decentralized autonomous organization, applications of Ethereum and at the end you will see a demo on smart contract. Ethereum is a blockchain based distributed computing platform that enables developers to build and deploy their decentralized applications. Ether(ETH) is a cryptocurrency that runs on Ethereum network. It is used to pay for the computational resources and transaction fees on the Ethereum network. Ether can be utilized for building decentralized applications, smart contracts and making standard peer to peer payments. Now, lets deep dive into these slides and understand what is Ethereum and how does it work.
Below topics are explained in this Ethereum presentation:
1. What is Ethereum?
2. Ethereum features
- Cryptocurrency
- Smart contract
- Ethereum virtual machine
- Decentralized application
- Decentralized autonomous organization
3. Applications of Ethereum
4. Demo - Smart contract
Simplilearn’s Blockchain Certification Training has been designed for developers who want to decipher the global craze surrounding Blockchain, Bitcoin and cryptocurrencies. You’ll learn the core structure and technical mechanisms of Bitcoin, Ethereum, Hyperledger and Multichain Blockchain platforms, use the latest tools to build Blockchain applications, set up your own private Blockchain, deploy smart contracts on Ethereum and gain practical experience with real-world projects.
Why learn Blockchain?
Blockchain technology is the brainchild of Satoshi Nakamoto, which enables digital information to be distributed. A network of computing nodes makes up the Blockchain. Durability, robustness, success rate, transparency, incorruptibility are some of the enticing characteristics of Blockchain. By design, Blockchain is a decentralized technology which is used by a global network of the computer to manage Bitcoin transactions easily. Many new business applications will result in the usage of Blockchain such as Crowdfunding, smart contracts, supply chain auditing, Internet of Things(IoT), etc.
The Blockchain Certification Training Course is recommended for:
1. Developers
2. Technologists interested in learning Ethereum, Hyperledger and Blockchain
3. Technology architects wanting to expand their skills to Blockchain technology
4. Professionals curious to learn how Blockchain technology can change the way we do business
5. Entrepreneurs with technology background interested in realizing their business ideas on the Blockchain
Learn more at: https://www.simplilearn.com/
The Blockchain - The Technology behind Bitcoin Jérôme Kehrli
The blockchain and blockchain related topics are becoming increasingly discussed and studied nowadays. There is not one single day where I don't hear about it, that being on linkedin or elsewhere.
I interested myself deeply in the blockchain topic recently and this is the first article of a coming whole serie around the blockchain.
This presentation is an introduction to the blockchain, presents what it is in the light of its initial deployment in the Bitcoin project as well as all technical details and architecture concerns behind it.
We won't focus here on business applications aside from what is required to present the blockchain purpose, more concrete business applications and evolutions will be the topic of another presentation I'll post in a few weeks
Block chain and Bitcoin. A blockchain is a data structure that makes it possible to create a digital ledger of transactions and share it among a distributed network of computers.
Distributed systems and blockchain technologyAlket Cecaj
An introduction to blockchain technology starting from the distributed systems and the CAP theorem. Consensus mechanisms explained on the bitcoin blockchain.
Innovation in Byzantine consensus protocols is helping decentralized networks scale up and become highly performant, possibly faster than centralized networks. Investment growth in Bitcoin and FinTech startups, and enterprise blockchain applications in development in multiple sectors
Master sequence diagrams with this sequence diagram guide. It describes everything you need to know on sequence diagram notations, best practices as well as common mistakes. It also explains how to draw a sequence diagram step by step. Plus it offers Creately sequence diagram templates you can click and edit right away.
Basics you need to know about Solidity and how it works. Learn the simple way of building a smart contract in Solidity. Tools that can be used with Solidity.
Basic introduction in blockchain, smart contracts, permissioned ledgersKoen Vingerhoets
Presented during Blockchain Vlaanderen #7 on 20/04/2017, organised by Kunstmaan and Antwerp Management School.
The assignment: host a basic introduction into blockchain, share some insights on smart contracts and explain why financial institutions choose other ledgers than bitcoin.
An introduction to Blockchain and covering :
-Blockchain vs cryptocurrency
-Bitcoin vs Ethereum
-Real life and industrial examples
-Business example
-Benefits & challenges
Ethereum Tutorial - Ethereum Explained | What is Ethereum? | Ethereum Explain...Simplilearn
This presentation on Ethereum will help you understand what is Ethereum, Ethereum features which includes cryptocurrency, smart contracts, Ethereum virtual machine, decentralized application, decentralized autonomous organization, applications of Ethereum and at the end you will see a demo on smart contract. Ethereum is a blockchain based distributed computing platform that enables developers to build and deploy their decentralized applications. Ether(ETH) is a cryptocurrency that runs on Ethereum network. It is used to pay for the computational resources and transaction fees on the Ethereum network. Ether can be utilized for building decentralized applications, smart contracts and making standard peer to peer payments. Now, lets deep dive into these slides and understand what is Ethereum and how does it work.
Below topics are explained in this Ethereum presentation:
1. What is Ethereum?
2. Ethereum features
- Cryptocurrency
- Smart contract
- Ethereum virtual machine
- Decentralized application
- Decentralized autonomous organization
3. Applications of Ethereum
4. Demo - Smart contract
Simplilearn’s Blockchain Certification Training has been designed for developers who want to decipher the global craze surrounding Blockchain, Bitcoin and cryptocurrencies. You’ll learn the core structure and technical mechanisms of Bitcoin, Ethereum, Hyperledger and Multichain Blockchain platforms, use the latest tools to build Blockchain applications, set up your own private Blockchain, deploy smart contracts on Ethereum and gain practical experience with real-world projects.
Why learn Blockchain?
Blockchain technology is the brainchild of Satoshi Nakamoto, which enables digital information to be distributed. A network of computing nodes makes up the Blockchain. Durability, robustness, success rate, transparency, incorruptibility are some of the enticing characteristics of Blockchain. By design, Blockchain is a decentralized technology which is used by a global network of the computer to manage Bitcoin transactions easily. Many new business applications will result in the usage of Blockchain such as Crowdfunding, smart contracts, supply chain auditing, Internet of Things(IoT), etc.
The Blockchain Certification Training Course is recommended for:
1. Developers
2. Technologists interested in learning Ethereum, Hyperledger and Blockchain
3. Technology architects wanting to expand their skills to Blockchain technology
4. Professionals curious to learn how Blockchain technology can change the way we do business
5. Entrepreneurs with technology background interested in realizing their business ideas on the Blockchain
Learn more at: https://www.simplilearn.com/
The Blockchain - The Technology behind Bitcoin Jérôme Kehrli
The blockchain and blockchain related topics are becoming increasingly discussed and studied nowadays. There is not one single day where I don't hear about it, that being on linkedin or elsewhere.
I interested myself deeply in the blockchain topic recently and this is the first article of a coming whole serie around the blockchain.
This presentation is an introduction to the blockchain, presents what it is in the light of its initial deployment in the Bitcoin project as well as all technical details and architecture concerns behind it.
We won't focus here on business applications aside from what is required to present the blockchain purpose, more concrete business applications and evolutions will be the topic of another presentation I'll post in a few weeks
Block chain and Bitcoin. A blockchain is a data structure that makes it possible to create a digital ledger of transactions and share it among a distributed network of computers.
A Primer on Blockchain and its Potential, with a Focus on the GCCZeyad T. Al Mudhaf
During my summer internship at BECO Capital, a technology-focused Venture Capital firm based in Dubai, I put together this primer on blockchain that demystifies this hyped up technology, covers key investment trends in the space both globally and regionally within the GCC*, and highlights both the barriers and enablers for wider blockchain adoption in the region. *The GCC is the Gulf Cooperation Council - comprised of the United Arab Emirates, Saudi Arabia, Kuwait, Bahrain, Qatar, and Oman.
Block chains and crypto currencies - introductionInitio
Objectives and knowledge sharing
• What is blockchain? Why should we care?
• Cryptography: Shared secrets and the Blockchain
• Protocols: What’s in those blocks ?!
• Ethereum
• Bitcoin
• Hyperledger
Blockchain and BPM - Reflections on Four Years of Research and ApplicationsIngo Weber
In this keynote, delivered at the Blockchain Forum of BPM 2019, I summarized and reflected on research on BPM and blockchain over the last four years, including model-driven engineering, process execution, and analysis and process mining. I also covered selected use cases and applications, as well as recent insights on adoption. The keynote closed with a discussion of open research questions.
Introduction to blockchain is a presentation to demystify distributed ledger technology. Show and explain how the technology behind Bitcoin works and what are the pros and cons of it (at the time of creating this presentation June 2018)
An introductory presentation discussing the basics of technology behind blockchain, cryptocurrency mining, and an attempt to value a cryptocurrency. Further discussion on altcoins, and a preview on ICOs.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
2. Introduction to Blockchain
Technology
• The invention of Bitcoin in 2008, the world was introduced
to a new concept, which is now likely to revolutionize the
whole of society.
• The last few years, we notice that in 2013 some ideas
started to emerge that suggested usage of blockchain in
other areas than cryptocurrencies.
• Around that time the primary usage of blockchain was
cryptocurrencies, and many new coins emerged during that
time.
3. Graph shows a broad-spectrum outline of year wise
progression and adaption trend of blockchain Technology
4. • Already many projects are underway and set to replace
existing systems.
• for example, Australian Securities Exchange (ASX) is soon
to become the first organization to replace its legacy
clearing and settlement system with blockchain technology.
• There are various consortiums such as Enterprise
Ethereum Alliance (EEA), Hyperledger, and R3, which
have been established for research and development of
blockchain technology.
5. • A large number of start-ups are providing blockchain-
based solutions already.
• Various benefits of this technology are envisioned, such as
decentralized trust, cost savings, transparency, and
efficiency.
• However, there are multiple challenges too that are an
area of active research on blockchain, such as scalability
and privacy.
6. Distributed systems
• Distributed systems are a computing paradigm whereby
two or more nodes work with each other in a coordinated
fashion to achieve a common outcome.
• It is modeled in such a way that end users see it as a
single logical platform.
• For example, Google's search engine is based on a large
distributed system, but to a user, it looks like a single,
coherent platform.
7. • A node can be defined as an individual player in a distributed
system.
• All nodes are capable of sending and receiving messages to and
from each other.
• Nodes can be honest, faulty, or malicious, and they have memory
and a processor.
• A node that exhibits irrational behavior is also known as a
Byzantine node after the Byzantine Generals Problem.
Distributed systems
8. • This distributed system has six nodes out of which one (N4) is a
Byzantine node leading to possible data inconsistency.
• L2 is a link that is broken or slow, and this can lead to partition in
the network.
• The primary challenge in distributed system design is
coordination between nodes and fault tolerance.
• Distributed systems are so challenging to design that a hypothesis
known as the CAP theorem has been proven.
Distributed systems
10. CAP theorem
which states that a “distributed system cannot have all
three of the much-desired properties simultaneously; that
is, consistency, availability, and partition tolerance”.
11. The history of blockchain and Bitcoin
• Blockchain was introduced with the invention of Bitcoin in
2008.
• Bitcoin is the first application of blockchain technology.
• Its practical implementation then occurred in 2009.
• However, it is essential to refer to Bitcoin because, without
it, the history of blockchain is not complete.
• Bitcoin has started a revolution with the introduction of the
very first fully decentralized digital currency, and the one
that has proven to be extremely secure and stable from a
network and protocol point of view.
12. Electronic cash
• Electronic cash is also essential in order to appreciate
the first and astonishingly successful application of
blockchain, Bitcoin, or more broadly cryptocurrencies in
general.
• Two fundamental e-cash system issues need to be
addressed: accountability and anonymity.
Accountability: is required to ensure that cash is
spendable only once (double-spend problem) and that it
can only be spent by its rightful owner.
13. • Double spend problem arises when same money can be
spent twice. As it is quite easy to make copies of digital
data.
• This becomes a big issue in digital currencies as you can
make many copies of same digital cash.
• Anonymity is required to protect users' privacy. As with
physical cash, it is almost impossible to trace back
spending to the individual who actually paid the money.
Electronic cash Cont…
14. • David Chaum solved both of these problems during his work
in 1980s by using two cryptographic operations, namely
blind signatures and secret sharing.
• These terminologies and related concepts will be discussed
later, Symmetric Cryptography and, Public Key Cryptography.
• blind signatures allow for signing a document without
actually seeing it,
• secret sharing is a concept that enables the detection of
double spending, that is using the same e-cash token twice
(double spending).
Electronic cash Cont…
16. Blockchain
• The term chain of blocks evolved over the years into the
word blockchain.
• Block chain technology incorporates a multitude of
applications that can be implemented in various economic
sectors.
• In the finance sector, significant improvement in the
performance of financial transactions and settlements is
seen as resulting in desirable time and cost reductions.
17. Layman's definition: Blockchain is an ever-growing, secure,
shared record keeping system in which each user of the data
holds a copy of the records, which can only be updated if all
parties involved in a transaction agree to update.
Technical definition: Blockchain is a peer-to-peer, distributed
ledger that is cryptographically-secure, append-only,
immutable (extremely hard to change), and updateable only
via consensus or agreement among peers.
Blockchain
18. Peer-to-peer
• There is no central controller in the network, and all
participants talk to each other directly.
• This property allows for cash transactions to be exchanged
directly among the peers without a third-party involvement,
such as by a bank.
19. Distributed ledger
Means that a ledger is spread across the network among all
peers in the network, and each peer holds a copy of the
complete ledger.
20. Cryptographically-secure
• Means that cryptography has been used to provide
security services which make this ledger secure against
tampering and misuse.
• These services include non-repudiation, data integrity,
and data origin authentication.
21. Append-only
• Means that data can only be added to the blockchain in
time-ordered sequential order.
• This property implies that once data is added to the
blockchain, it is almost impossible to change that data and
can be considered practically immutable.
22. Updateable via consensus
Any update made to the blockchain is validated against
strict criteria defined by the blockchain protocol and
added to the blockchain only after a consensus has been
reached among all participating peers/nodes on the
network.
23. • Blockchain can be thought of as a layer of a
distributed peer-to-peer network running on top of
the internet, as can be seen in the following diagram
• It is analogous to SMTP, HTTP, or FTP running on
top of TCP/IP.
The network view of a blockchain shown in Next slide..
24.
25. • The internet, which provides a basic communication
layer for any network.
• A peer-to-peer network runs on top of the internet,
which hosts another layer of blockchain.
• The above layer contains transactions, blocks,
consensus mechanisms, state machines, and
blockchain smart contracts.
• All of these components are shown as a single logical
entity in a box, representing blockchain
• At the top, there are users or nodes that connect to the
blockchain and perform various operations such as
consensus, transaction verification, and processing.
26. • A block is merely a selection of transactions bundled
together and organized logically.
• A transaction is a record of an event, for example, the
event of transferring cash from a sender's account to a
beneficiary's account.
• A block is made up of transactions, and its size varies
depending on the type and design of the blockchain in
use.
• A reference to a previous block is also included in the
block unless it is a genesis block.
27. • A genesis block is the first block in the blockchain that is
hardcoded at the time the blockchain was first started.
• The structure of a block is also dependent on the type
and design of a blockchain.
• The attributes that are essential to the functionality of a
block:
• The block header, which is composed of pointer to
previous block, the timestamp, nonce, Merkle root, and
the block body that contains transactions.
29. • A nonce is a number that is generated and used only
once.
• A nonce is used extensively in many cryptographic
operations to provide replay protection, authentication,
and encryption.
• Merkle root is a hash of all of the nodes of a Merkle
tree.
• Merkle trees are widely used to validate the large data
structures securely and efficiently.
• In the blockchain world, Merkle trees are commonly
used to allow efficient verification of transactions.
30. Generic elements of a blockchain
• Address: Addresses are unique identifiers used in a
blockchain transaction to denote senders and recipients.
• An address is usually a public key or derived from a public
key.
• Transaction: A transaction is the fundamental unit of a
blockchain.
• A transaction represents a transfer of value from one
address to another.
• Block: A block is composed of multiple transactions and
other elements, such as the previous block hash (hash
pointer), timestamp, and nonce.
31. • Peer-to-peer network: As the name implies, a peer-to-
peer network is a network topology wherein all peers can
communicate with each other and send and receive
messages.
• Scripting or programming language: Scripts or programs
perform various operations on a transaction in order to
facilitate various functions.
For example:, in Bitcoin, transaction scripts are predefined in a
language called Script, which consist of sets of commands that
allow nodes to transfer tokens from one address to another.
Generic elements of a blockchain Cont..
32. • Virtual machine: This is an extension of the transaction
script introduced earlier.
• A virtual machine allows Turing complete code to be run
on a blockchain.
• Virtual machines are not available on all blockchains.
• Various blockchains use virtual machines to run programs
such as Ethereum Virtual Machine (EVM) and Chain
Virtual Machine (CVM).
• EVM is used in Ethereum blockchain.
• CVM is a virtual machine developed for and used in an
enterprise-grade blockchain called Chain Core.
Generic elements of a blockchain Cont..
33. • State machine: A blockchain can be viewed as a state
transition mechanism whereby a state is modified from its
initial form to the next one and eventually to a final form
by nodes on the blockchain network as a result of a
transaction execution, validation, and finalization
process.
• Node: A node in a blockchain network performs various
functions depending on the role that it takes on.
• A node can propose and validate transactions and
perform mining to facilitate consensus and secure the
blockchain,
• simple payment verification, validation, transaction signing
function done by Nodes.
34. • Smart contract: These programs run on top of the
blockchain and encapsulate the business logic to be
executed when certain conditions are met.
• These programs are enforceable and automatically
executable.
• Smart contracts have many use cases, including but
not limited to identity management, capital markets,
trade finance, record management, insurance, and
e-governance.
35. How blockchain works
• Nodes are either miners who create new blocks and mint
cryptocurrency (coins) or block signers who validates
and digitally sign the transactions.
• A critical decision that every blockchain network has to
make is to figure out that which node will append the
next block to the blockchain
• This decision is made using a consensus mechanism.
36. How blockchain accumulates blocks
A General idea of how blocks are generated and what
the relationship is between transactions and blocks:
1. A node starts a transaction by first creating and then
digitally signing it with its private key.
A transaction can represent various actions in a blockchain.
Most commonly this is a data structure that represents
transfer of value between users on the blockchain network.
37. 2. A transaction is propagated (flooded) by using a flooding
protocol, called Gossip protocol, to peers that validate the
transaction based on preset criteria. Usually, more than
one node are required to verify the transaction.
3. Once the transaction is validated, it is included in a
block, which is then propagated onto the network. At this
point, the transaction is considered confirmed.
How blockchain accumulates blocks Cont..
38. 4. The newly-created block now becomes part of the
ledger, and the next block links itself cryptographically back
to this block.
• This link is a hash pointer.
• At this stage, the transaction gets its second
confirmation and the block gets its first confirmation.
5. Transactions are then reconfirmed every time a new
block is created. Usually, six confirmations in the Bitcoin
network are required to consider the transaction final.
How blockchain accumulates blocks Cont..
39. Benefits and limitations of blockchain
Decentralization: No third party to validate transactions, a
consensus mechanism is used to agree on the validity of
transactions.
Transparency and trust: blockchains are shared and
everyone can see what is on the blockchain,this allows the
system to be transparent. As a result, trust is established.
• This will be more relevant in scenarios such as the
disbursement of funds or benefits where personal
discretion in relation to selecting beneficiaries needs to be
restricted.
40. Immutability: once data has been written, it is extremely
difficult to modify.
High availability: As the system is based on thousands of
nodes in a peer-to-peer network, and the data is replicated
and updated on every node, the system becomes highly
available.
• Even if some nodes leave the network or become
inaccessible, the network as a whole continues to work.
Highly secure: All transactions on a blockchain are
cryptographically secured and thus provide network integrity.
Benefits and limitations of blockchain
41. Simplification of current paradigms: blockchain can
serve as a single shared ledger among many interested
parties, which simplifying the model by reducing the
complexity of managing the separate systems maintained
by each entity.
Faster dealings: blockchain enables the quick settlement
of trades, since it does not require a lengthy process of
verification, reconciliation, and clearance because a single
version of agreed-upon data is already available on a
shared ledger between financial organizations.
Benefits and limitations of blockchain
42. Cost saving: As no trusted third party or clearing house
is required in the blockchain model, this can massively
eliminate overhead costs in the form of the fees which
are paid to such parties.
The most sensitive blockchain problems are as follows:
• Scalability
• Adaptability
• Regulation
• Relatively immature technology
• Privacy
Benefits and limitations of blockchain
43. Distributed ledgers
• All blockchains are fundamentally distributed ledgers, all
distributed ledgers are not necessarily a blockchain.
• It is distributed among its participants and spread across
multiple sites or organizations.
• This type of ledger can be either private or public.
• The fundamental idea here is that, unlike many other
blockchains, the records are stored contiguously instead
of being sorted into blocks.
• This concept is used in Ripple which is a blockchain
and cryptocurrency based global payment network.
44. Distributed Ledger Technology (DLT)
• Used to describe blockchain in finance industry.
• blockchain and DLT are used interchangeably.
• DLT are very active and thriving area of research in the
financial sector.
• financial sector point of view, DLTs are permissioned
blockchains that are shared and used between known
participants.
• DLTs usually serve as a shared database, with all
participants known and verified.
• They do not have a cryptocurrency or do not require
mining to secure the ledger.
45. Public blockchains
• public blockchains are not owned by anyone.
• They are open to the public, and anyone can participate as
a node in the decision-making process.
• Users may or may not be rewarded for their participation.
• All users of these permissionless or unpermissioned
ledgers maintain a copy of the ledger on their local nodes
and use a distributed consensus mechanism to decide the
eventual state of the ledger.
• Bitcoin and Ethereum are both considered public
blockchains.
46. Private blockchains
• They are open only to a consortium or group of individuals
or organizations who have decided to share the ledger
among themselves.
• There are various blockchains now available in this
category, such as HydraChain and Quorum.
• Optionally, both of these blockchains can also run in public
mode if required, but their primary purpose is to provide a
private blockchain.
47. Semiprivate blockchains
• Part of the blockchain is private and part of it is public.
• This is still just a concept today, and no real world have yet
been developed.
• With a semi-private blockchain, the private part is controlled by
a group of individuals, while the public part is open for
participation by anyone.
• This type of blockchain can also be called a semi-
decentralized model, where it is controlled by a single entity
but still allows for multiple users to join the network by
following appropriate procedures.
48. Sidechains
• More precisely known as pegged sidechains, this is a
concept whereby coins can be moved from one
blockchain to another and moved back again.
• Typical uses include the creation of new altcoins
(alternative cryptocurrencies) whereby coins are burnt as
a proof of an adequate stake.
• Burnt or burning the coins in this context means that the
coins are sent to an address which is unspendable and
this process makes the burnt coins irrecoverable.
49. • This mechanism is also called Proof of Burn (PoB) and is
used as an alternative method for distributed consensus to
PoW and Proof of Stake (PoS).
• This process enables the building of smart contracts for the
Bitcoin network.
• Rootstock is one of the leading examples of a sidechain,
which enables smart contract development for Bitcoin using
this paradigm.
• It works by allowing a two-way peg for the Bitcoin
blockchain, and this results in much faster throughput.
Sidechains
50. Permissioned ledger
• A permissioned ledger is a blockchain where participants
of the network are already known and trusted.
• Permissioned ledgers do not need to use a distributed
consensus mechanism; instead, an agreement protocol
is used to maintain a shared version of the truth about
the state of the records on the blockchain
• For example, Bitcoin can become a permissioned ledger
if an access control layer is introduced on top of it that
verifies the identity of a user and then allows access to
the blockchain.
51. Shared ledger
This is a generic term that is used to describe any
application or database that is shared by the public or a
consortium. Generally, all blockchains, fall into the
category of a shared ledger.
52. Fully private and proprietary blockchains
• They deviate from the core concept of decentralization in
blockchain technology.
• Nonetheless, in specific private settings within an
organization, there could be a need to share data and
provide some level of guarantee of the authenticity of the
data.
• An example of this type of blockchain might be to allow
for collaboration and the sharing data between various
government departments.
53. Tokenized blockchains
• These blockchains are standard blockchains that
generate cryptocurrency as a result of a consensus
process via mining or initial distribution.
• Bitcoin and Ethereum are prime examples of this type of
blockchain.
54. Tokenless blockchains
• These blockchains are designed in such a way that they do
not have the basic unit for the transfer of value.
• This is similar to full private blockchains, the only difference
being that use of tokens is not required.
• This can also be thought of as a shared distributed ledger
used for storing data.
• It does have its benefits when it comes to immutability,
security, and consensus driven updates but are not used for
common blockchain application of value transfer or
cryptocurrency.
55. Consensus
• Consensus is a process of agreement between distrusting
nodes on the final state of data.
• To achieve consensus, different algorithms are used.
• It is easy to reach an agreement between two nodes (in
client-server systems, for example), but when multiple
nodes are participating in a distributed system and they
need to agree on a single value,
• It becomes quite a challenge to achieve consensus.
• This process of attaining agreement common state or value
among multiple nodes despite the failure of some nodes is
known as distributed consensus
56. Consensus mechanism
• A consensus mechanism is a set of steps that are taken
by most or all nodes in a blockchain to agree on a
proposed state or value.
• There are various requirements that must be met to
provide the desired results in a consensus mechanism
57. • Agreement: All honest nodes decide on the same value
• Termination: All honest nodes terminate execution of the
consensus process and eventually reach a decision
• Validity: The value agreed upon by all honest nodes must be
the same as the initial value proposed by at least one honest
node
• Fault tolerant: The consensus algorithm should be able to run
in the presence of faulty or malicious nodes (Byzantine nodes)
• Integrity: This is a requirement that no node can make the
decision more than once in a single consensus cycle
Consensus mechanism
58. CAP theorem and blockchain
• CAP theorem, also known as Brewer's theorem, was
introduced by Eric Brewer in 1998 as conjecture.
• In 2002, it was proven as a theorem by Seth Gilbert and
Nancy Lynch.
• The theory states that “any distributed system cannot
have consistency, availability, and partition tolerance
simultaneously”
59. CAP theorem and blockchain
Consistency is a property which ensures that all nodes in a
distributed system have a single, current, and identical copy of
the data.
Availability means that the nodes in the system are up,
accessible for use, and are accepting incoming requests and
responding with data without any failures as and when required.
Partition tolerance ensures that if a group of nodes is unable
to communicate with other nodes due to network failures, the
distributed system continues to operate correctly. This can
occur due to network and node failures.
60. CAP theorem and blockchain
• This is strange because somehow blockchain manages to
achieve all of these properties.
• To achieve fault tolerance, replication is used.
• Consistency is achieved using consensus algorithms in
order to ensure that all nodes have the same copy of the
data. This is also called state machine replication.
• The blockchain is a means for achieving state machine
replication.