Blockchain Technology In the U.S. Government by Michael Erbschloe - HTML preview

PLEASE NOTE: This is an HTML preview only and some elements such as links or page numbers may be incorrect.
Download the book in PDF, ePub, Kindle for a complete version.

Table of Contents

182 Executive Summary ..................................................................................................... iv

183 1 Introduction ............................................................................................................ 9

184 1.1 Background and History.................................................................................. 9

185 1.2 Purpose and Scope ...................................................................................... 10

186 1.3 Notes on Terms ............................................................................................ 10

187 1.4 Document Structure...................................................................................... 10

188 2 Blockchain Architecture...................................................................................... 12

189 2.1 Hashes.......................................................................................................... 12

190 2.2 Transactions ................................................................................................. 13

191 2.3 Asymmetric-Key Cryptography ..................................................................... 13

192 2.4 Addresses and Address Derivation............................................................... 14

193 2.4.1 Private Key Storage............................................................................ 14

194 2.5 Ledgers......................................................................................................... 15

195 2.6 Blocks ........................................................................................................... 19

196 2.7 Chaining Blocks ............................................................................................ 23

197 3 Blockchains in Operation.................................................................................... 23

198 4 Consensus............................................................................................................ 26

199 4.1 Proof of Work Consensus Model .................................................................. 26

200 4.2 Proof of Stake Consensus Model ................................................................. 29

201 4.3 Round Robin Consensus Model ................................................................... 30

202 4.4 Ledger Conflicts and Resolutions ................................................................. 30

203 5 Forking.................................................................................................................. 33

204 5.1 Soft Forks ..................................................................................................... 33

205 5.2 Hard Forks .................................................................................................... 33

206 5.3 Cryptographic Changes and Forks ............................................................... 34

207 6 Smart Contracts ................................................................................................... 35

208 7 Blockchain Categorization .................................................................................. 36

209 7.1 Permissioned ................................................................................................ 36

210 7.1.1 Application Considerations for Permissioned Blockchains ................. 36

211 7.1.2 Use Case Examples........................................................................... 37

212 7.2 Permissionless.............................................................................................. 38

213 7.2.1 Application Considerations for Permissionless Blockchains............... 38

NISTIR 8202 (DRAFT) BLOCKCHAIN TECHNOLOGY OVERVIEW

vii

214 7.2.2 Use Case Examples........................................................................... 38

215 8 Blockchain Platforms .......................................................................................... 40

216 8.1 Cryptocurrencies........................................................................................... 40

217 8.1.1 Bitcoin (BTC) ...................................................................................... 40

218 8.1.2 Bitcoin Cash (BCC) ............................................................................ 41

219 8.1.3 Litecoin (LTC)..................................................................................... 41

220 8.1.4 Ethereum (ETH) ................................................................................. 41

221 8.1.5 Ethereum Classic (ETC)..................................................................... 41

222 8.1.6 Dash (DASH)...................................................................................... 42

223 8.1.7 Ripple (XRP) ...................................................................................... 42

224 8.2 Hyperledger .................................................................................................. 42

225 8.2.1 Hyperledger Fabric............................................................................. 42

226 8.2.2 Hyperledger Sawtooth........................................................................ 43

227 8.2.3 Hyperledger Iroha............................................................................... 43

228 8.2.4 Hyperledger Burrow............................................................................ 43

229 8.2.5 Hyperledger Indy ................................................................................ 43

230 8.3 MultiChain..................................................................................................... 43

231 9 Blockchain Limitations and Misconceptions..................................................... 44

232 9.1 Blockchain Control ........................................................................................ 44

233 9.2 Malicious Users............................................................................................. 44

234 9.3 No Trust ........................................................................................................ 45

235 9.4 Resource Usage ........................................................................................... 45

236 9.5 Transfer of Burden of Credential Storage to Users....................................... 46

237 9.6 Private/Public Key Infrastructure and Identity ............................................... 46

238 10 Conclusions.......................................................................................................... 47

239

240 List of Appendices

241 Appendix A— Acronyms ............................................................................................ 48

242 Appendix B— Glossary .............................................................................................. 50

243 Appendix C— References .......................................................................................... 55

244

245 List of Tables and Figures

246 Table 1: Examples of Inputs and SHA-256 Digest Values ............................................ 12

NISTIR 8202 (DRAFT) BLOCKCHAIN TECHNOLOGY OVERVIEW

viii

247 Table 2: Example Transaction....................................................................................... 13

248 Figure 1 - A simple network maintaining a copy of a ledger across nodes.................... 16

249 Figure 2 - Submitting a Transaction to a Node, waiting in the Pending Transaction List

250 ............................................................................................................................... 17

251 Figure 3 - Transaction 4 information transmitted from node to node............................. 18

252 Figure 4 - Transaction 4 has been included into a block, nodes are transmitting the

253 information; the final node has not yet received the latest information................... 19

254 Figure 5: Example of a Merkle Tree .............................................................................. 21

255 Figure 6: Blockchain with Merkle Tree .......................................................................... 22

256 Figure 7: Generic Chain of Blocks................................................................................. 23

257 Figure 8: Transaction Being Added to Unspent Transaction Pool................................. 24

258 Figure 9: Finalized Block (Generalized) ........................................................................ 25

259 Figure 10: Distributed Network in Conflict ..................................................................... 31

260 Figure 11: Blockchains in Conflict ................................................................................. 31

261 Figure 12: Chain B Adds the Next Block ....................................................................... 32

262 Table 3: Impact of Quantum Computing on Common Cryptographic Algorithms .......... 34

263

 

Find Your Next Great Read

Describe what you're looking for in as much detail as you'd like.
Our AI reads your request and finds the best matching books for you.

Showing results for ""

Popular searches:

Romance Mystery & Thriller Self-Help Sci-Fi Business