UNIT1ANS Merged
UNIT1ANS Merged
A)
2) Crypto currency and how it is different from digital
currency?
A)
Traditional Bookkeeping Method:
Distributed ledger technology has the potential to effectively improve these traditional methods
of bookkeeping by updating and modifying fundamental methods of how data is collected,
shared, and managed in the ledger. To understand this, traditionally paper-based and
conventional electronic ledgers were used to manage data that had a centralized point of
control. These types of system require high computing resource and labour to maintain ledgers
and also had many points of failure. Points of failure like:
However, DLT allows real-time sharing of data with transparency which gives trust that data
in the ledger is up to date and legitimate. Also Distributed Ledger Technology eliminates the
single point of failure which prevents data in the ledger from being manipulations and errors.
In DLT, there is no need for a central authority to validate transactions here different consensus
mechanisms are used to validate transactions which eventually makes this process very fast
and real-time. Similarly, DLT can reduce the cost of transactions because of this process.
It is abbreviated as ‘number only used once’ and it is a number which blockchain miners are
finding and on average, it takes almost 10 times to find out the correct nonce. A nonce is a 32-
bit number, having the maximum value as 2^ (32) total possible value, so the job of the bitcoins
miners is to find out the correct integer value which is a random integer between 0 and 2^(32),
so it becomes computationally expensive.
2. Difficulty Target: The difficulty target is a value set by the network that
determines how difficult it is to find a valid hash. Miners must find a hash
value that is below the target difficulty to create a valid block. As the difficulty
target represents a specific number of leading zeros in the block hash, miners
adjust their nonce values to produce hashes that meet this requirement.
Secure Hashing Algorithm: SHA-256 is the most famous of all cryptographic hash functions
because it’s used extensively in blockchain technology. The SHA-256 Hashing algorithm was
developed by the National Security Agency (NSA) in 2001.
The blockchain has a number of different uses for hash functions. Some of the most common
uses of the hash function in blockchain are:
• Merkle Tree: This uses hash functions to make sure that it is infeasible to find two
Merkle trees with the same root hash. This helps to protect the integrity of the block
header by storing the root hash within the block header and thus protecting the integrity
of the transactions.
• Proof of Work Consensus: This algorithm defines a valid block as the one whose
block header has a hash value less than the threshold value.
• Digital signatures: Hash functions are the vital part of digital signatures that ensures
data integrity and are used for authentication for blockchain transactions.
• The chain of blocks: Each block header in a block in the blockchain contains the hash
of the previous block header. This ensures that it is not possible to change even a single
block in a blockchain without being detected. As modifying one block requires
generating new versions of every following block, thus increasing the difficulty.
Thus, it can be concluded hash functions are a vital part of the blockchain technology used to
protect the integrity and immutability of the data stored on the blockchain.
Blockchain is the backbone technology of the digital cryptocurrency Bitcoin. The blockchain
is a distributed database of records of all transactions or digital events that have been executed
and shared among participating parties. Each transaction is verified by many participants of the
system. It contains every single record of each transaction. A blockchain is a digital data storage
concept. This information is presented in chunks. These blocks are linked together to make the
data unchangeable. When a data block is linked with the other blocks, the data in that block
can never be altered again.
Consider the following picture, which depicts a collection of transaction data blocks.
A hash is a mathematical function that transforms an arbitrary length input into a fixed-length
encrypted output. This consensus algorithm is a collection of rules that regulates the operation
of a blockchain network. Aside from cryptocurrency, the most prevalent application of hash
functions is password storage.
The cryptographic functions have the traditional functions along with some security traits,
making them difficult to predict and determine the underlying content of the text or the
transaction.
Putting in simple words, just take any length input string and then end up with a string of a
fixed length through some work every time the hashing process needs to be done. That work is
hashing. To understand it better, look at the diagram below:
Figure 4. Understanding the Block Hash.
Example: Let’s say, for example, there is a hashing algorithm that takes an input string and
generates an output hash value.
Note: Even the slightest change in the structure of anything could have a huge impact on the
output charset generated by the hashing block.
Output: rVuSuWYq3oE1z0ROjBPjunQ7SJbMSPTgnj7slb2Uvo9Td4Tgay
1. Property #1: The definiteness: This means that no matter how many times a given input is
parsed using a hash function, the result will always be the same. This is essential since it will
be hard to keep track of the input if different hashes are obtained every time.
2. Property #2: Easy yet Rapid Generation: The hash function should be able to rapidly
return the hash of input. If the procedure is not rapid enough, the system will be inefficient.
3. Property #3: Former Image Resistance: As seen in the example above, the generated hash
should have no pre or former image resistance, even a small change should be able to create a
different hash block, else it will be easy to decode the transactions, something which is not
wanted.
4. Property #4: Data Integrity Check: The most typical use of hash functions is data integrity
checking. It is used to compute checksums for data files. This program offers the user assurance
that the data is correct. The integrity check assists the user in detecting any modifications to
the original file. It does not, however, guarantee the originality of the work. Instead of changing
file data, the attacker can update the entire file, compute a new hash, and deliver it to the
recipient. This integrity testing program is only useful if the user is confident in the file’s
authenticity.
5. Property #5: Password Storage: Password storage is protected using hash functions.
Instead of saving passwords in clear text, most login procedures save password hash values to
a file. The Password file is made up of a table of pairs in the form (user ID, h(P)).
1. Distributed Ledger:
3. Cryptographic Security:
• Bitcoin uses the SHA-256 cryptographic hash function. This function takes an
input (in this case, the block data) and produces a fixed-size string of
characters. This hash acts as a unique digital fingerprint of the data. Even a
slight change in the input will produce a significantly different hash, which
helps in maintaining the immutability and security of the blockchain.
5. Transaction Verification:
• Each transaction is verified by multiple nodes within the network. Nodes use
digital signatures to validate the authenticity of the transactions, ensuring that
bitcoins are not spent more than once (preventing double-spending) and that
the sender has sufficient balance to make the transaction.
1. Public Blockchain:
A public blockchain is a concept where anyone is free to join and take part in the core activities
of the blockchain network. Anyone can read, write, and audit the ongoing activities on a public
blockchain network, which helps to achieve the self-determining, decentralized nature often
authorized when blockchain is discussed. Data on a public blockchain is secure as it is not
possible to modify once they are validated.
The public blockchain is fully decentralized, it has access and control over the ledger, and its
data is not restricted to persons, is always available and the central authority manages all the
blocks in the chain. There is publicly running all operations. Due to no one handling it singly
then there is no need to get permission to access the public blockchain. Anyone can set his/her
own node or block in the network/ chain.
After a node or a block settled in the chain of the blocks, all the blocks are connected like peer-
to-peer connections. If someone tries to attack the block, then it forms a copy of that data and
it is accessible only by the original author of the block.
Advantages:
1. A public network operates on an actuate scheme that encourages new persons to join
and keep the network better.
2. There is no agreement in the public blockchain.
3. This means that a public blockchain network is immutable.
4. It has Rapid transactions.
Disadvantages:
Miners need permission to access a private blockchain. It works based on permissions and
controls, which give limit participation in the network. Only the entities participating in a
transaction will have knowledge about it and the other stakeholders not able to access it.
By it works on the basis of permissions due to this it is also called a permission-based
blockchain. Private blockchains are not like public blockchains it is managed by the entity that
owns the network. A trusted person is in charge of the running of the blockchain it will control
who can access the private blockchain and also controls the access rights of the private chain
network. There may be a possibility of some restrictions while accessing the network of the
private blockchain.
Advantages:
1. In a private blockchain, users join the network using the invitations and all are verified.
2. Only permitted users/ persons can join the network.
3. Private Blockchain is partially immutable.
Disadvantages:
1. A private blockchain has trust issues, due to exclusive information being difficult to
access it.
2. As the number of participants increases, there is a possibility of an attack on the
registered users.
3. Consortium Blockchain
Advantages:
1. Consortium blockchain providers will always try to give the fastest output as compared
to public blockchains.
2. It is scalable.
3. A consortium blockchain is low transaction costs.
Disadvantages:
SHA-256 in Bitcoin
SHA-256 is a cryptographic algorithm that takes an input (or message) and produces
a fixed-size string of characters, which is typically a 64-character hexadecimal
number. Regardless of the size of the input, the output will always be 256 bits long.
2. Deterministic:
• For any given input, SHA-256 will always produce the same output. This
determinism ensures that the same transaction will always hash to the
same value, which is vital for verifying data integrity .
3. Collision Resistance:
• It is computationally infeasible to find two different inputs that produce
the same hash output. This property, known as collision resistance,
ensures that each transaction can be uniquely identified by its hash .
4. Avalanche Effect:
• A small change in the input drastically changes the output hash. This
means that even a tiny alteration in a transaction's data will result in a
completely different hash, making it easy to detect changes and
ensuring data integrity
Working of SHA-256
1. Input Processing:
• The input message is first padded to ensure its length is a multiple of 512 bits.
Padding involves appending a single '1' bit followed by a series of '0' bits, and
finally, appending the length of the original message as a 64-bit integer.
2. Message Scheduling:
• The padded message is divided into 512-bit blocks. Each block is further
divided into 16 words of 32 bits each. These words are then expanded into a
schedule array of 64 words using bitwise operations.
3. Initialization:
• SHA-256 uses eight 32-bit initial hash values, which are derived from the
fractional parts of the square roots of the first eight prime numbers.
4. Compression Function:
• After all blocks have been processed, the final hash value is obtained by
concatenating the eight 32-bit words. This results in a 256-bit hash value.
Role of SHA-256 in Bitcoin
1. Block Hashing:
• In Bitcoin, each block contains a header, which includes metadata such as the
timestamp, the Merkle root (a hash of all transactions in the block), and the
hash of the previous block’s header. The block header is hashed twice using
SHA-256 to produce a unique identifier for the block, known as the block
hash.
3. Transaction Integrity:
SHA-256 Hash:
f8c2b5af27b874b16d4c89ff7819d4e8c317e6d50a70c8c1c8c3e7885a226d1a
In this example, the input string "Hello, Bitcoin!" is processed by the SHA-256
algorithm to produce a unique 256-bit hash.
10) Note on i) distributed ledger ii) consensus iii)
reward (incentive) iv) miner
A)
Distributed Ledger
A distributed ledger is a decentralized database that is shared and synchronized
across multiple sites, institutions, or geographies. It allows transactions to have public
"witnesses," thereby making a cyberattack more difficult. Each participant on the
network can access the recordings shared across that network and own an identical
copy of it. This decentralization ensures that no single entity has control over the
entire database, promoting transparency and reducing the risk of data tampering .
Consensus
Consensus in a blockchain context refers to the fault-tolerant mechanism used to
achieve agreement on a single state of the network among distributed processes or
systems. This is essential for validating and verifying transactions without a central
authority. Several types of consensus mechanisms exist, including Proof of Work
(PoW), Proof of Stake (PoS), and others. These protocols ensure that all nodes in the
network agree on the validity of transactions and maintain the integrity of the
blockchain .
Reward (Incentive)
In blockchain networks, particularly those using consensus mechanisms like Proof of
Work (PoW), miners or validators are incentivized through rewards. These rewards
often come in the form of newly created cryptocurrency tokens. For instance, in
Bitcoin, miners receive a block reward for solving complex mathematical problems
and adding a new block to the blockchain. This incentive system encourages
participation and helps secure the network by ensuring a continuous effort to
validate and record transactions .
Miner
A miner in the context of blockchain is a participant who uses computational power
to solve complex cryptographic puzzles, which allows them to add new blocks to the
blockchain. This process is typically associated with the Proof of Work (PoW)
consensus mechanism. Miners compete to solve these puzzles, and the first to solve
it gets the right to add the block to the blockchain and receive a reward. Miners play
a crucial role in maintaining the blockchain by validating transactions and securing
the network against attacks .
11) Consensus algorithms
A)
Proof-of-work (PoW)
PoW is the most common consensus mechanism used by the most popular cryptocurrency like Litecoin
and Bitcoin. The PoW is known as mining and the participated nodes in the process are known as
miners. In this, miners solve complex and difficult mathematical problems and puzzles with the help of
high computation power and high processing time. The first miner who solves the puzzle to create a
block gets a reward with cryptocurrency.
PoW is required to solve a complex problem. The node that can solve the problem obtains the right to
add a new block into the blockchain.
Figure 1 shows the flowchart of the PoW consensus process. A miner computes the SHA256 of a block
header which contains a fixed value and a variable value (nonce). The fixed value is computed apriori
from the transaction information in all blocks. The miner obtains all rights to add a block to the
blockchain network, if the computed value is less than the target value. For computed value greater than
the target value, the value of nonce is changed, and the hash of the header is computed. The above
process continues until the header’s computed hash value is less than the target value. Solving the
problem is an intensive task. Nodes adjust the nonce value and compute the hash of the header until it
is less than the target value.
Figure: 1 Proof-of Work Consensus Protocol
Proof-of-Stake (PoS)
PoS is the second most common consensus mechanism alternative to PoW. It uses low energy, less
processing time, low cost, low computational power than PoW. In this consensus mechanism, it uses a
randomized method to choose who gets to create a next new block in the chain. Instead of miners,
validators are present in PoS. The users can stake their tokens to become a validator which means they
lock their money for a certain period to create a new block.
In PoW, nodes invest their resources and computation power in solving a complex problem. PoW
algorithm requires a high computation of power for mining, which leads to increased energy usage.
Moreover, the transaction rate of PoW is low. In PoS, nodes put a certain coin at stake to become a part
of the validation process. The more a node has a stake, the higher the chance of becoming a validator.
The validator is chosen pseudo-randomly and becomes a part of the consensus algorithm. A node having
the highest stake can monopolize the validation process.
Figure: 2 Proof-of Stake Consensus Protocol
• Tolerates Malicious Actors: BFT systems are designed to function correctly even
when some nodes in the system are compromised and behave arbitrarily or
maliciously.
• Consensus Mechanism: BFT consensus algorithms require more complex
mechanisms to ensure that all non-faulty nodes agree on the same state. Examples
include Practical Byzantine Fault Tolerance (PBFT) and Delegated Byzantine Fault
Tolerance (dBFT).
• Higher Overhead: Due to the need to handle malicious behavior, BFT systems often
have higher computational and communication overhead compared to simpler
consensus mechanisms like those used in CFT.
Crash Fault Tolerance (CFT)
Crash Fault Tolerance refers to the ability of a distributed system to handle failures
where nodes simply crash and stop functioning but do not act maliciously or send
incorrect data.
• Handles Non-Malicious Failures: CFT systems are designed to handle nodes that
fail by crashing but not those that exhibit arbitrary or malicious behavior.
• Simpler Consensus Mechanisms: CFT systems typically use simpler and less
resource-intensive consensus mechanisms such as Paxos or Raft.
• Lower Overhead: Because they only need to handle crash failures, CFT systems
generally have lower computational and communication overhead compared to BFT
systems.
Summary
• BFT is more robust as it can handle both crashes and malicious behavior but requires
more complex and resource-intensive consensus algorithms.
• CFT is simpler and more efficient but can only handle crashes and not malicious
behavior
1. Immutability:
• Once a block is added to the blockchain, it cannot be altered. This is crucial
for maintaining the integrity of the data stored within the blockchain.
2. Cryptography:
3. Consensus Protocols:
• Consensus mechanisms like Proof of Work (PoW) and Proof of Stake (PoS) are
used to validate transactions and add them to the blockchain. These protocols
ensure that all nodes in the network agree on the state of the blockchain,
preventing fraudulent activities.
4. Decentralization:
5. Secure Transactions:
1. Anonymity:
2. Data Encryption:
3. Permissioned Blockchains:
• In permissioned blockchains, access to the network is restricted to certain
verified participants. This ensures that only authorized individuals can
participate in the network, providing an additional layer of privacy and
security.
4. Selective Disclosure:
5. Privacy-Preserving Techniques:
Merkle tree also known as hash tree is a data structure used for data verification and
synchronization.
It is a tree data structure where each non-leaf node is a hash of its child nodes. All the leaf
nodes are at the same depth and are as far left as possible.
It maintains data integrity and uses hash functions for this purpose.
Hash Functions:
So before understanding how Merkle trees work, we need to understand how hash functions
work.
A hash function maps an input to a fixed output and this output is called hash. The output is
unique for every input and this enables fingerprinting of data. So, huge amounts of data can be
easily identified through their hash.
This is a binary Merkle tree, the top hash is a hash of the entire tree.
• This structure of the tree allows efficient mapping of huge data and small changes made
to the data can be easily identified.
• If we want to know where data change has occurred, then we can check if data is
consistent with root hash and we will not have to traverse the whole structure but only
a small part of the structure.
• The root hash is used as the fingerprint for the entire data.
Applications:
• Merkle trees are useful in distributed systems where same data should exist in multiple
places.
• Merkle trees can be used to check inconsistencies.
• Apache Cassandra uses Merkle trees to detect inconsistencies between replicas of entire
databases.
• It is used in bitcoin and blockchain.
UNIT-2
1) permissioned and permissionless blockchain
A)
A peer-to-peer (P2P) network is based on the concept of decentralisation, which allows the
participants to conduct transactions without needing a central server. The peers or nodes
(usually a computer) communicate with each other on the network freely without an
intermediary. Unlike the traditional client-server model, where the client makes a request,
and the server completes the request, the P2P network model allows the nodes to function as
both the client and the server, giving them equal power and making them perform the same
tasks in a network. Blockchain is a P2P network that acts as a decentralised ledger for digital
assets.
As we know, a P2P network has no central server overlooking them; the users or nodes are
responsible for maintaining the network. Every node participating in the network acts as a
server that can upload, download, and share files with other nodes. The nodes use their hard
drives instead of a central server to store this data. As these capabilities to transmit, receive
and store files lie with each node, the P2P network is more secure, fast and efficient.
It is important to note that to make peer nodes easily locatable to new peers that join the
network, the P2P architecture must have many active nodes in the blockchain network, as this
is when it functions best.
• Low cost
In a P2P network, every node acts as a server, and there is no central server. This saves the
cost of buying an expensive server, making it a cost-effective network.
• Scalable
Bottlenecks faced in a centralised server model, when the number of clients increases, are
eliminated in a P2P network as each node can be a server. The P2P network is designed to be
scalable, as an increase in the number of clients results in an equal increase in the number of
servers.
• Resilient
Compared to centralised networks, a P2P network is more resilient to failure as the loss of a
single node does not bring down the entire network.
• Slow performance
Every node or computer in the P2P network is accessed by other nodes, slowing down the
user’s performance.
• Data is vulnerable
The absence of a central server sometimes makes this network hard to manage, as controlling
or monitoring illegal or prohibited activity is difficult. No central authority manages
operations, so data becomes vulnerable to malware attacks.
A huge amount of computing power is required for P2P networks since each node acts as
both the client and the server.
Conclusion
Peer-to-peer architecture is going to be around for a long time. Its reliable decentralised
framework has made it a popular technology for several applications and services, such as
online marketplaces, file-sharing applications and open-source software. One of its
significant uses is in blockchain technologies in the form of cryptocurrencies and other
blockchain solutions. It allows blockchains to offer immutability, more security,
decentralisation and freedom.
6) Nodes of Hyperledger: i) Committing Node ii)
Endorsing Node iii) Ordering Node
A)
7) sequence: Endorse, Order and Validate a
transaction in Hyperledger
A)
8) Endorsement policy in Hyperledger with an
example
A)
9) Validation of a transaction in Hyperledger
A)
10) Note on i) ordering service ii) channels iii) Fabric
peer iv) Fabric certificate authority
A)
11) Note on i) Smart contract ii) Ledger with respect to
Hyperledger
A)
12) Endorsement process in hyper ledger with an
example
A)
8TH ANSWER
13) Channels in Hyperledger.
A)
14) Chaincode and the steps involved in life cycle of
chaincode.
A)
15) Fabric SDK.
A)
Blockchain technology has a wide range of potential applications across various industries.
Here are some of the most prominent ones:
Supply Chain Management: Blockchain can be used to create transparent and tamper-
proof supply chains. By recording every transaction and movement of goods on the
blockchain, companies can trace the journey of products from their origin to the end consumer,
ensuring authenticity and preventing counterfeiting.
Voting Systems: Blockchain can enhance the security and transparency of voting systems by
providing a tamper-proof record of votes. This can help prevent fraud and ensure the
integrity of elections, especially in areas where trust in traditional voting systems is low.
Asset Tokenization: Blockchain enables the tokenization of assets such as real estate, stocks,
and commodities. By representing these assets as digital tokens on a blockchain, they can be
traded more efficiently, fractionalized, and accessed by a wider range of investors.
Decentralized Finance (DeFi): DeFi refers to financial services and applications built on
blockchain technology that aim to disrupt traditional finance. This includes lending, borrowing,
trading, and derivatives markets that operate without intermediaries, offering greater
accessibility and lower barriers to entry.
Supply Chain Finance: Blockchain can streamline supply chain finance by providing
transparent and secure financing solutions based on real-time data from supply chain
transactions. This can help suppliers access financing more easily and reduce the risk for
lenders.
These are just a few examples of how blockchain technology can be applied across different
sectors. As the technology continues to evolve, new use cases are likely to emerge, further
expanding its potential impact on various industries.
Cross-border payments facilitate the transfer of funds or assets between two different countries
or jurisdictions. They play a crucial role in international trade, remittances, and global financial
transactions. Traditionally, these payments have been slow, expensive, and prone to
inefficiencies due to the involvement of multiple intermediaries, differing regulatory
frameworks, and currency exchange processes. However, advancements in financial
technology (fintech) and the emergence of blockchain-based solutions have started to
revolutionize this landscape.
Traditional international bank transfers between a sender and receiver are connected by an
interwoven banking network, including but not limited to commercial banks, clearing houses,
credit unions and other financial services institutions, thereby complicating and slowing down
the process.
On the other hand, smart contracts automatically enforce blockchain cross-border payment
transactions as per predefined rules. This removal of intermediaries results in instantaneous
transactions with full transparency.
Consensus Protocol: Stellar employs the Federated Byzantine Agreement (FBA) consensus
algorithm, allowing for quick transaction settlement without the need for mining.
Anchors: Entities known as "anchors" act as bridge entities between the Stellar network and
traditional financial systems, issuing digital tokens representing fiat currencies or other assets.
Tokenization: Stellar supports the creation and issuance of custom tokens, enabling a wide
range of financial instruments and applications such as stablecoins, asset-backed tokens, and
tokenized securities.
Smart Contracts: Stellar supports simple smart contracts, known as "Stellar Smart Contracts,"
allowing for programmable conditions to be attached to transactions.
In financial use cases, Stellar has been utilized for remittances, micropayments, tokenization
of assets, cross-border transfers, and providing access to financial services in underserved
regions.
Ripple is another blockchain-based payment protocol and network designed to facilitate fast,
low-cost cross-border transactions. Unlike many other blockchain projects, Ripple primarily
targets financial institutions and banks with its solutions.
Consensus Protocol: Ripple uses the Ripple Protocol Consensus Algorithm (RPCA), which
enables high throughput and fast transaction finality.
XRP Ledger: Ripple operates on the XRP Ledger, a decentralized blockchain that enables
near-instant cross-border payments.
On-Demand Liquidity (ODL): Formerly known as xRapid, ODL is Ripple's solution for
sourcing liquidity during cross-border transactions using XRP as a bridge currency. This
eliminates the need for pre-funded nostro accounts, reducing liquidity costs and settlement
times.
Interledger Protocol (ILP): Ripple contributes to the development of ILP, an open protocol
suite for connecting different ledgers and payment networks, thereby facilitating
interoperability between various financial systems.
Ripple's solutions have gained adoption among banks, payment providers, and remittance
companies seeking to improve the efficiency and cost-effectiveness of their cross-border
payment processes. However, Ripple has faced regulatory challenges, particularly regarding
the classification of its native cryptocurrency, XRP, which has impacted its partnerships and
market adoption in some regions.
Access Control: Permissioned networks restrict access to authorized participants only. This
ensures that all participants are known entities and comply with regulatory requirements.
Scalability and Performance: Permissioned networks can be optimized for higher throughput
and lower latency compared to public blockchains. This allows for faster transaction processing
and settlement, which is critical in financial markets.
Security Token Offerings (STOs): Permissioned networks are employed for issuing and
trading security tokens, enabling compliant fundraising and secondary market trading of digital
securities.
Trade Finance: Permissioned networks are utilized in trade finance for streamlining the
process of issuing and managing trade instruments such as letters of credit and bills of lading.
Efficiency: Permissioned networks can streamline payment and settlement processes, reducing
costs, and settlement times by eliminating intermediaries and automating manual tasks.
Overall, permissioned networks offer a viable alternative to traditional payment and settlement
systems, providing financial institutions with the benefits of blockchain technology while
addressing regulatory and privacy concerns.
5) compliance in financial blockchain applications
A)
Compliance in financial blockchain applications is crucial due to the regulatory
requirements imposed by various jurisdictions to ensure transparency, security, and
accountability in financial transactions. Compliance in these applications involves adhering to
regulatory standards, such as anti-money laundering (AML), know your customer (KYC),
counter-terrorism financing (CTF), and others, while leveraging blockchain technology to
facilitate secure and efficient transactions. Here's how compliance is obtained in financial
blockchain applications:
AML Compliance: Financial blockchain applications implement AML measures to detect and
prevent money laundering activities. This includes monitoring transactions for suspicious
behavior, conducting customer due diligence, and reporting suspicious activities to regulatory
authorities.
5. Consortium Governance:
Consensus Mechanisms: Financial blockchain applications often operate within consortia or
networks governed by a predefined set of rules and consensus mechanisms. Participants in
these networks agree to abide by the established governance framework, which includes
compliance with regulatory requirements.
Integration with Legacy Systems: Financial blockchain applications integrate with existing
financial infrastructure and systems to ensure interoperability and regulatory compliance. This
integration enables seamless data exchange between blockchain-based and traditional systems
while ensuring compliance with regulatory standards.
Supply chain compliance in blockchain applications involves ensuring that all participants
in a supply chain adhere to regulatory standards, industry best practices, and contractual
obligations. Blockchain technology offers several mechanisms to achieve supply chain
compliance effectively. Here's how compliance is obtained in blockchain applications for
supply chains:
1. Traceability and Transparency:
Real-Time Auditing: Blockchain enables real-time auditing of supply chain transactions and
processes, allowing auditors to access transparent and verifiable data without relying on manual
record-keeping or third-party intermediaries.
Regulatory Reporting: Blockchain-based supply chain solutions can generate accurate and
auditable reports for regulatory compliance purposes. These reports provide regulators with
comprehensive insights into supply chain operations, including provenance, product
traceability, and compliance with regulatory standards.
Industry Consortia: Supply chain blockchain networks often operate within consortia or
industry alliances that establish governance frameworks, standards, and best practices for
participants. These consortia facilitate collaboration among stakeholders and ensure that all
participants adhere to common compliance standards and protocols.
Integration with Existing Systems: Blockchain solutions integrate with existing supply chain
management systems and enterprise resource planning (ERP) systems to ensure
interoperability and seamless data exchange. This integration streamlines supply chain
processes while maintaining compliance with established business practices and regulatory
requirements.
Implement Controls: Implement robust internal controls and best practices to prevent fraud.
This may include segregation of duties, dual authorization for financial transactions,
background checks for employees and suppliers, and regular audits of supply chain processes.
Contractual Safeguards: Include clauses in contracts with suppliers and service providers that
outline expectations regarding transparency, ethical conduct, and compliance with regulatory
requirements. Establish clear terms and conditions for transactions, deliveries, and payments.
Data Analytics: Use data analytics and monitoring tools to detect irregular patterns, anomalies,
or discrepancies in supply chain data. Analyze transactional data, inventory levels, shipment
tracking information, and financial records to identify potential signs of fraud.
Audits and Inspections: Conduct regular audits and inspections of supply chain activities to
verify compliance with policies, procedures, and contractual obligations. This may involve on-
site visits, physical inspections of inventory, and documentation reviews.
Supplier Due Diligence: Perform ongoing due diligence on suppliers and third-party vendors
to assess their financial stability, reputation, and compliance with regulatory requirements.
Monitor changes in supplier behavior, ownership structure, or business operations that could
indicate potential fraud.
Investigation: Promptly investigate any suspected instances of supply chain fraud. Gather
evidence, interview stakeholders, and analyze transactional data to determine the extent and
impact of the fraud. Involve internal audit teams, legal counsel, and law enforcement
authorities as necessary.
Containment: Take immediate steps to contain the impact of supply chain fraud and prevent
further losses. This may involve suspending transactions with the implicated supplier, securing
affected assets or inventory, and implementing corrective actions to address vulnerabilities in
the supply chain.
Remediation: Implement corrective measures to remediate the effects of supply chain fraud
and prevent recurrence. This may include strengthening internal controls, revising contractual
agreements, enhancing employee training and awareness programs, and implementing
advanced fraud detection technologies.
Collaborate with Stakeholders: Work closely with internal stakeholders, external partners,
industry associations, and regulatory authorities to address supply chain fraud collaboratively.
Share information, best practices, and lessons learned to strengthen fraud prevention efforts
across the supply chain ecosystem.
Monitor and Adapt: Continuously monitor the effectiveness of fraud prevention measures and
adapt strategies in response to emerging threats and changing regulatory requirements. Stay
informed about industry trends, new technologies, and evolving fraud schemes to proactively
mitigate risks.
Training and Awareness: Provide regular training and awareness programs to educate
employees, suppliers, and other stakeholders about the risks of supply chain fraud and their
roles in preventing and detecting fraudulent activities. Encourage a culture of ethics, integrity,
and accountability throughout the organization.
Supply chain visibility refers to the ability to track and monitor the flow of goods, information,
and finances across the entire supply chain in real-time. It provides stakeholders with insights
into the status, location, and performance of products and processes, enabling them to make
informed decisions, optimize operations, and respond effectively to disruptions. Here's a
detailed exploration of supply chain visibility:
Risk Mitigation: Enhanced visibility allows organizations to identify potential risks and
disruptions in the supply chain, such as inventory shortages, production delays, or
transportation bottlenecks, and take proactive measures to mitigate their impact.
Physical Visibility: Tracking the physical movement of goods through the supply chain using
technologies such as barcodes, RFID tags, GPS tracking, and IoT sensors to monitor inventory
levels, shipment locations, and transportation conditions.
Data Visibility: Capturing, analyzing, and sharing data from various sources, including
suppliers, manufacturers, logistics providers, and customers, to gain insights into demand
patterns, production schedules, inventory levels, and market trends.
Financial Visibility: Integrating financial data, such as purchase orders, invoices, payments,
and transaction records, into supply chain processes to monitor costs, manage cash flow, and
ensure transparency in financial transactions.
Big Data Analytics: Advanced analytics tools and algorithms analyze large volumes of supply
chain data to identify patterns, trends, and anomalies, enabling predictive insights, scenario
planning, and prescriptive recommendations for decision-making.
Cloud Computing: Cloud-based platforms and software solutions centralize and integrate
supply chain data from disparate sources, enabling real-time access, collaboration, and
visibility across geographically dispersed teams and partners.
Artificial Intelligence (AI) and Machine Learning (ML): AI and ML technologies automate
data analysis, predictive modeling, and decision-making processes in the supply chain,
enabling proactive risk management, demand forecasting, and optimization of supply chain
operations.
Supply chain visibility is a critical enabler of operational excellence, customer satisfaction, and
competitive advantage in today's global and dynamic business environment. By leveraging
advanced technologies, collaborative partnerships, and data-driven insights, organizations can
enhance visibility across their supply chains, mitigate risks, optimize performance, and drive
sustainable growth and innovation.
1. End-to-End Visibility:
Smart contracts are self-executing contracts with predefined rules and conditions encoded on
the blockchain. They automate and enforce contractual agreements, such as purchase orders,
delivery schedules, and payment terms, eliminating manual intervention and reducing the risk
of errors or disputes. Smart contracts streamline supply chain processes, improve efficiency,
and ensure compliance with contractual obligations.
Blockchain enables traceability and provenance by recording the entire lifecycle of products,
from raw material sourcing to final delivery, on a decentralized and tamper-resistant ledger.
Each transaction or event is timestamped and cryptographically linked, providing an immutable
audit trail that verifies the authenticity, origin, and journey of products. This enhances
transparency, accountability, and trust among supply chain stakeholders and consumers.
Blockchain facilitates seamless collaboration and data sharing among supply chain partners,
including suppliers, manufacturers, logistics providers, and customers. Participants can
securely exchange information, update inventory records, and coordinate activities in real-time,
enhancing communication, visibility, and coordination across the supply chain ecosystem.
Blockchain-based supply chain financing solutions leverage the transparency and efficiency of
blockchain technology to streamline trade finance processes, such as invoice factoring, supply
chain finance, and letter of credit issuance. By digitizing and tokenizing trade assets on the
blockchain, supply chain participants can access faster, more cost-effective financing options,
improve cash flow, and mitigate counterparty risks.
Blockchain enhances risk management and compliance by providing real-time insights into
supply chain operations and identifying potential risks, such as counterfeit goods, fraud, or
supply chain disruptions. Smart contracts can enforce regulatory compliance, automate
auditing procedures, and trigger alerts or notifications for deviations from predefined standards
or thresholds, enabling proactive risk mitigation and regulatory reporting.
Interoperability standards and protocols enable seamless integration and data exchange
between different blockchain networks and legacy systems used by supply chain participants.
Standards such as GS1, W3C, and ISO facilitate the interoperability of data formats, protocols,
and interfaces, ensuring compatibility and consistency across heterogeneous supply chain
environments.
Attributes: These are the characteristics or attributes associated with an individual's identity,
such as name, date of birth, address, biometric data, and credentials (e.g., driver's license,
passport, educational qualifications).
Credentials: These are digital proofs or tokens that attest to the authenticity and validity of an
individual's attributes. Credentials can be issued by trusted entities, such as government
agencies, educational institutions, or employers, and can be verified by relying parties to
establish trust.
Providing Digital Identity on Blockchain:
Self-Sovereign Identity (SSI): SSI is a concept that emphasizes individuals' ownership and
control over their digital identities. In an SSI model, individuals store their identity attributes
and credentials in a digital wallet or repository under their control, allowing them to selectively
disclose information to third parties as needed.
uPort: uPort is a decentralized identity platform built on the Ethereum blockchain that enables
users to create and manage their digital identities, control access to personal data, and interact
securely with decentralized applications (dApps) and services.
Hyperledger Indy: Hyperledger Indy is an open-source project under the Linux Foundation
that provides a framework for building decentralized identity solutions using blockchain
technology. It offers tools, libraries, and protocols for managing digital identities, credentials,
and verifiable claims.
1. Identity Proofing:
Identity proofing involves verifying the authenticity of an individual's identity before granting
them access to digital services or resources. This process typically involves collecting and
verifying identity attributes, such as personal information, biometric data, or government-
issued credentials, to establish the identity of the individual.
2. Authentication:
3. Authorization:
Privacy and consent principles ensure that individuals have control over the use and sharing of
their personal information in digital interactions. This includes obtaining explicit consent from
users before collecting, processing, or sharing their data and implementing privacy-enhancing
technologies to protect sensitive information from unauthorized access or disclosure.
5. Security:
Security principles focus on protecting digital identities and associated data from unauthorized
access, fraud, and cyber threats. This includes implementing robust security measures, such as
encryption, multi-factor authentication, secure protocols, and regular security audits, to
safeguard identity-related information and prevent data breaches.
6. Interoperability:
7. User-Centricity:
User-centricity principles prioritize the needs, preferences, and rights of individuals in the
design and delivery of digital identity solutions. This involves designing intuitive user
interfaces, providing transparency and control over identity-related data, and enabling self-
service options for identity management tasks.
Trust and transparency principles build confidence in digital identity systems by promoting
transparency, accountability, and integrity in identity management processes. This includes
providing clear and transparent information about how identity data is collected, used, and
shared, as well as implementing mechanisms for auditing, accountability, and recourse in case
of misuse or breaches of trust.
9. Lifecycle Management:
By adhering to these fundamental principles, organizations can develop and implement digital
identity management systems that are secure, privacy-preserving, user-friendly, and
interoperable, thereby enabling individuals to assert their identities online with confidence and
trust.
Businesses register on the blockchain-based GST platform, providing necessary identity and
business information.
Each registered business is issued a unique digital identity (DID) stored on the blockchain,
which serves as their immutable and tamper-proof digital identity.
Businesses generate invoices for the goods or services they provide, specifying the GST rate
applicable to each item.
The invoice data is recorded as a transaction on the blockchain, creating an immutable and
auditable record of the transaction details, including the seller, buyer, invoice amount, and
applicable GST.
Smart contracts are used to automate GST calculations and compliance processes.
When an invoice is created, a smart contract automatically calculates the GST amount based
on the applicable rates and rules defined by tax authorities.
The smart contract verifies the authenticity and validity of the invoice data, ensuring that it
complies with GST regulations and has not been tampered with.
At the end of the tax period, businesses file their GST returns on the blockchain platform,
providing details of their sales, purchases, and GST liabilities.
The blockchain platform automatically reconciles the data provided by businesses, verifies the
accuracy of the information, and calculates the total GST liability or refund amount owed by
each taxpayer.
Taxpayers authorize the payment of GST liabilities using digital signatures or cryptographic
keys, triggering a payment transaction on the blockchain.
Auditors use blockchain analytics tools to analyze transaction data, identify patterns, detect
anomalies, and investigate potential cases of tax evasion or non-compliance.
Any changes or updates to transaction data are recorded as new blocks on the blockchain,
ensuring a complete and immutable audit trail of all GST-related activities.
6. Cross-Border Transactions:
For cross-border transactions, the blockchain platform facilitates seamless GST compliance by
automating the calculation and reporting of integrated GST (IGST) and customs duties.
Smart contracts verify the origin, destination, and value of imported/exported goods, apply the
appropriate GST rates, and generate compliant documentation for customs clearance.
Blockchain-based GST applications ensure data privacy and security by encrypting sensitive
information, such as taxpayer identities and transaction details, and restricting access to
authorized parties only.
The blockchain-based GST platform integrates with existing tax systems, financial
infrastructure, and business applications to ensure interoperability and seamless data exchange.
APIs and standards-based protocols facilitate the integration of third-party services, such as
accounting software, ERP systems, and tax compliance tools, into the blockchain ecosystem.
1. Lack of Transparency:
Without blockchain, the GST application may lack transparency in transaction recording and
reporting. Centralized databases can be susceptible to manipulation or tampering, leading to
discrepancies in tax records and undermining trust in the tax system.
3. Limited Auditability:
Traditional GST applications may have limited auditability, making it difficult for tax
authorities to verify the accuracy and integrity of tax records. Manual record-keeping processes
and paper-based documentation can result in errors, omissions, or inconsistencies that are
challenging to detect and rectify.
4. Compliance Challenges:
Centralized GST applications may lack real-time visibility into tax transactions and trends,
making it difficult for tax authorities to monitor tax collection, detect anomalies, and respond
promptly to compliance issues or revenue leaks.
6. Limited Automation:
Traditional GST applications may rely on manual data entry and processing, leading to
inefficiencies, delays, and errors in tax administration. Manual processes can be labor-
intensive, error-prone, and costly to maintain, resulting in delays in tax processing and refunds.
7. Compliance Costs:
8. Lack of Trust:
Centralized GST applications may lack trust among taxpayers, businesses, and other
stakeholders due to concerns about data privacy, security, and integrity. Without transparent
and tamper-proof records, taxpayers may question the accuracy, fairness, and reliability of tax
assessments and enforcement actions.
9. Limited Interoperability:
Traditional GST applications may lack interoperability with other tax systems, financial
institutions, or government agencies, leading to data silos, duplication of efforts, and
inefficiencies in information exchange. Lack of interoperability can hinder collaboration, data
sharing, and decision-making across different departments or jurisdictions.
Centralized GST applications may be vulnerable to corruption, bribery, or collusion among tax
officials, taxpayers, and third parties. Lack of transparency and accountability in tax
administration can create opportunities for abuse of power, favoritism, and illicit activities,
undermining the integrity of the tax system.
Implementing blockchain in land registry is not only about digitizing records but fundamentally
transforming the way property ownership is recorded, verified, and transacted, leading to a
more transparent, secure, and efficient real estate ecosystem.
Blockchain, a decentralized and tamper-resistant ledger, offers an ideal platform for recording
and managing land titles and property records. Each property transaction is recorded as a block
on the blockchain, cryptographically linked to previous blocks, creating an immutable and
transparent record of ownership history.
Eliminate multiple layers of cost and friction, reduce the time spent on verification, and achieve
increased flexibility for modular products. Gain broader access to fractional property
ownership and proof of the origin of a traded fractional property.
The current land registration process involves a lot of vulnerabilities and people uses it to cheat
the common people and the government. This paper discusses about a secure land registry
implemented using blockchain which works based on majority consensus. By implementing
the land registry in blockchain, the security issue is largely resolved. The hash value calculated
for each block will be unique as it is linked to the hash of the previous block. The algorithm
that is used for hashing is SHA256. Along with SHA256, Proof Of Work(PoW) algorithm is
also used which makes the information related to each transaction more secure. Message digest
that is generated for each block is of fixed size and each hash represents a complete set of
transaction within a given block. The proposed land registry blockchain network consists of 12
nodes which calculates the proof of work. Nodes are responsible for verifying a transaction,
mining a new block and adding the new block to the blockchain. A total of 200 land transactions
are recorded using the blockchain methodology which offers a tamper proof and updated
version of land registry. Elliptic curve cryptographic algorithm is used for signature generation
which is used for verifying whether the transaction is signed by the owner or not. Merkle tree
is used for linking the transactions using hash and in turn reduces the disk usage. The proposed
implementation of land registry using blockchain thus offers a 99% reduction in manual effort
spent in record keeping.
In India, currently the ownership of a property is proved through presumptive land titling
(RoR)-chain of documents that provide evidence of the transfer of title from person to person
over the years all the way to the current owners. Registration is only recognized as an
agreement between two parties for transfer of property. An important constraint is that any one
of these intermediate transactions is liable to be challenged as the office of sub-registrar(SRO)
is only undertaking deed registration under the central registration act 1908 and does not verify
the ownership of the land. Property fraud is also rampant in many forms in our country.
The revenue department/ Revenue & Panchayati Raj department is the custodian of the land
records. They are the authority to maintain the land record details. The various other
transactions related to change of ownership through sale, loan, mortgage, release of mortgage,
crop updation initiated by other departments are approved by the revenue department officials
and the RoR gets updated. Land records is under the jurisdiction of state laws.
The Land records system deployed in the various states facilitate the mutation of land. The
change in ownership of the land, the cultivators, the crop grown, the source of irrigation, rights
and liabilities are what is stored and maintained. The Record of Rights document is what is
required for farmers to obtain benefit from the Government in the form of subsidy for seeds,
fertilizers and for other purposes like securing loan, for sale etc.
The Registration departments in the country use a software independent of the land records
system. The complete document pertaining to the property to be registered is uploaded along
with meta data by the citizen. It undergoes approval process and at final stage ,biometrics of
the parties is taken. Then the sale deed document is printed, signature is obtained from
purchaser and seller and uploaded again into the system for future issuance of certified copy.
Challenges
Some of the major challenges faced in this sector include increase in the number of Land related
litigations, difficulty to track double selling of the same land or landed property , non-existence
of unique record or golden record of ownership, lack of system to facilitate citizens to verify
the land records, lot of paper work for obtaining loan from banks using land as collateral
security, financial institutions do not get the factual picture of the piece of land for providing
loan as they rely heavily on property for collateral security, delay in the obtaining documents
from revenue and financial institutions etc.
The farmer has to spend time and money to collect all the documents such as RoR, mutation
extract, crop certificate etc that are necessary for securing loan, subsidy and any other benefit
from the Government.
There is a need to ensure that the data in the land records system, registration system etc. are
not susceptible to alteration as each of these departments rely totally on the integrity of the
other to initiate transactions. Hence there is a need for trust to use a common source of data to
perform approvals for different activities so as to avoid the problem.
History shows that duplicate registration documents are generated by tampering original
documents and the properties are being sold on the basis of the tampered documents. Also one
property is being sold to multiple purchasers by keeping each other under dark.
Proposed System
As compared to other data, Land records data need to be accurately stored in the blockchain.
The existing history of transactions on a piece of land first needs to be inserted into the
blockchain after approval by Revenue functionaries in the State. The approved data will be
digitally signed and stored. This will be a starting point for any mutation.
The certificates issued by the Revenue Department will be stored in the blockchain and can be
used by the other agencies like the bank for any of the verification process during a transaction
on the land parcel / farmer.
The transactions related to change of ownership through sale, loan, mortgage, release of
mortgage, crop updation is initiated by other departments. During the initiation of above
mentioned transactions, the verification of the details need to be done using the blockchain
data. After the approval of transaction in the respective database such as completion of deed
registration / approval of loan by the bank, the transaction details should be stored in the
blockchain.
Specifically, the registration department will fetch details w.r.t a survey number from the
blockchain and ensure that the ownership of the land parcel indeed rests with the prospective
seller before initiating a sale. After obtaining the signature of the purchaser and seller in the
sale deed, the scanned document should be moved in to Blockchain Network to create a block.
Once the block is created it cannot be edited or tampered. Likewise the chain of block is created
every time the property title is changed from one person to another.
By implementing smart contracts, certain events such as registration of the land can
automatically initiate the mutation request in the land record, the approval of loan by the bank
can update the rights and liabilities, crop details updation can trigger the updation of cultivators
and crop details in RTC. Smart contracts can also facilitate the payment of subsidy to farmers
on failure of crops. In cases when the entitlement is only for certain types of farmers, the
eligibility can be ascertained from the blockchain.
Benefits
• The availability of data in a central location that can be accessed by all departments
would enable faster disposal of requests for subsidy, mutation,
• There would be no need for trusted authority like notaries to provide attested copies of
documents.
• The farmers will be assured that their land ownership cannot be changed by spurious
persons.
• The farmers can obtain loans quickly. The updation of the details related to liabilityin
the Record of Rights can be done as soon as the farmer repays the loan. This is facilitate
the farmer to avail other benefits / services.
• The facilities provided to the farmer from the agriculture / Horticulture departments /
Animal Husbandry department when recorded in the blockchain will facilitate these
departments to ensure that same benefit / multiple benefits do not reach the same farmer
multiple times or might not receive multiple benefits as per the terms & conditions laid
down.
• Blockchain data of the property registration will be made available in the work flow
system of the Registration software as well as the public for verification. This will
provide the complete details of the property chain right from the first purchaser to latest
one. The Purchaser need not depend on any non-reliable personnel/agency to verify the
authenticity of the document provided by the seller.
• A repository of a transparent, trusted and a tamper proof Property Registration
documents would be available for use by citizens & the registration department.
• Citizens can verify the ownership details & complete history of the property before
going in for purchase of the property
• The availability of document chain will eliminate registration based on bogus
Benefits
• Transparency and Trust: Blockchain provides a transparent and tamper-proof
record of property transactions, reducing the risk of fraud and ensuring that
ownership details are accurate and verifiable.
• Efficiency: The availability of data in a central, immutable ledger allows for faster
processing of transactions and requests for subsidies or loans.
• Reduced Manual Effort: Automation through smart contracts and real-time updates
drastically reduces the need for manual intervention and paperwork.
• Enhanced Security: The use of cryptographic algorithms and consensus mechanisms
ensures that land records are secure and cannot be altered maliciously.
• Broader Access and Flexibility: Blockchain enables fractional property ownership
and easy verification of ownership history, making it easier to trade and manage
properties.
Implementation in India
• Current System: In India, property ownership is typically proved through a chain of
documents (Record of Rights) that trace ownership history. However, this system is
prone to challenges such as double selling and document tampering.
• Proposed System: The new system would integrate land records into a blockchain,
ensuring that ownership details are accurate and cannot be tampered with. It would
also streamline processes like loan approvals and subsidy distribution.
UNIT-4
1) security concerns in an enterprise
blockchain application
A)
Security vulnerabilities in blockchain:
Despite its robust design, blockchain technology is not immune to security vulnerabilities.
Some common security vulnerabilities and risks associated with blockchain systems include:
A)
Secure cryptographic protocols play a vital role in ensuring the integrity and confidentiality
of data on blockchain networks, especially in sensitive applications like financial transactions.
Privacy and security are critical considerations for blockchain networks, especially in
applications where sensitive data such as financial transactions and personal identities are
involved. However, several challenges exist in ensuring privacy and security on blockchain
networks
Pseudonymity vs. Anonymity: While blockchain networks offer pseudonymity, meaning that
participants are represent
ted by cryptographic addresses rather than real-world identities, achieving complete anonymity
can be challenging. Transactions on public blockchains are visible to all participants, making
it possible to analyze transaction patterns and potentially identify users. This can compromise
the privacy of participants, especially in applications where anonymity is essential.
Definition of Channels: Channels are created by defining a subset of network participants who
need to interact privately. Each channel operates as an independent blockchain network within
the broader Hyperledger Fabric network, with its ledger, smart contracts (chaincode), and
access control policies.
Endorsement Policy: Each channel has its own endorsement policy, which specifies the set
of peers required to endorse transactions within the channel. Only the endorsing peers
participate in the transaction validation process, ensuring that sensitive data is not exposed to
unnecessary network participants.
Access Control: Access control policies can be enforced at the channel level to restrict access
to data and resources within the channel. Participants must be explicitly invited to join a
channel, and they can only access the ledger data and execute transactions that are relevant to
the channel they belong to.
Here are some key points regarding data privacy using encryption within chaincode:
Confidentiality: Encryption ensures that sensitive data stored within the blockchain network
remains confidential and inaccessible to unauthorized parties. By encrypting data before it is
stored on the blockchain, only authorized parties with the decryption keys can access the
plaintext information.
Data Encryption: Chaincode can employ various encryption techniques such as symmetric
and asymmetric encryption to secure data. Symmetric encryption uses a single key for both
encryption and decryption, while asymmetric encryption uses a pair of keys (public and private
keys) for encryption and decryption respectively.
End-to-End Encryption: Implementing end-to-end encryption ensures that data is encrypted
at its source and remains encrypted until it reaches its intended recipient. This approach
prevents unauthorized access to sensitive data at any point in the data transmission process.
Key Management: Effective key management is essential for maintaining the security of
encrypted data within chaincode. Proper key generation, storage, rotation, and access control
mechanisms must be implemented to prevent unauthorized access to encryption keys.
Selective Disclosure: Encryption can also be used to enable selective disclosure of information
within chaincode. By encrypting specific data fields or records, blockchain participants can
control who has access to which parts of the data, thus preserving privacy while still allowing
for transparency and auditability.
Regulatory Compliance: Encryption within chaincode can help blockchain networks comply
with data protection regulations such as GDPR, HIPAA, and CCPA by ensuring that sensitive
data is adequately protected from unauthorized access and disclosure.
In summary, encryption within chaincode is a critical component for ensuring data privacy in
blockchain networks. By employing encryption techniques and best practices, organizations
can protect sensitive information, comply with regulations, and build trust among blockchain
participants.
5) smart contract confidentiality
A) gpt answer
Smart contracts have gained significant importance for the following reasons.
- They remove the need for any third-party intermediary, ensuring that only the
transacting parties have control of the transaction.
- They also ensure the execution of the transaction is error-free thanks to a complete
record of the contract stored on the blockchain.
- Smart contracts ensure that sensitive data and other crucial information are secure.
1. Data Privacy:
2. Transaction Privacy:
3. Access Control:
1. Data Encryption:
4. Off-Chain Computation:
1. Ethereum:
• While the Ethereum blockchain is public, there are efforts to introduce privacy
through technologies like zk-SNARKs and TEEs.
• Private Ethereum Networks: Enterprises can use private or consortium
blockchains where access is restricted and data privacy can be better
managed.
2. Hyperledger Fabric:
3. Quorum:
Scalability becomes a concern when the network grows in terms of the number of nodes
participating in the consensus process or the volume of transactions being processed. If the
consensus mechanism cannot scale effectively, it may lead to bottlenecks, increased transaction
confirmation times, higher costs, or even network instability.
Limited Throughput: Many blockchain networks, especially public ones like Bitcoin and
Ethereum, have limited throughput, meaning they can only process a small number of
transactions per second (TPS). This constraint arises from the consensus mechanisms and block
size limits inherent in these networks. As a result, blockchain networks may struggle to handle
high transaction volumes, leading to delays and increased transaction fees during peak times.
Block Size and Block Interval: The block size and block interval directly impact a
blockchain's throughput and scalability. Increasing the block size can accommodate more
transactions per block, but it also increases the storage and bandwidth requirements for network
participants. Similarly, reducing the block interval can decrease transaction confirmation times
but may introduce network congestion and reduce decentralization. Balancing these factors is
crucial for optimizing blockchain scalability.
Network Congestion: During periods of high demand, blockchain networks may experience
congestion, resulting in delays and higher fees for transaction processing. Network congestion
can occur due to increased transaction volume, inefficient resource allocation, or limitations in
the network's architecture. Scalability solutions are needed to alleviate congestion and ensure
consistent performance under varying loads.
Storage and Bandwidth Requirements: As blockchain networks grow in size, the storage
and bandwidth requirements for participating nodes increase proportionally. Storing the entire
blockchain ledger and synchronizing with the network can become impractical for nodes with
limited resources, leading to reduced network participation and decentralization. Scalability
solutions must address these resource constraints to ensure broad network participation and
resilience.
Security and Consensus Overhead: Scalability solutions must not compromise the security
and consensus mechanisms of blockchain networks. Introducing off-chain scaling solutions or
increasing transaction throughput may weaken network security or undermine the trust model.
Maintaining a balance between scalability and security is crucial for preserving the integrity
and resilience of blockchain networks.
Optimizing existing algorithms: This involves refining the consensus algorithm to make it
more efficient in handling a larger number of participants and transactions.
Parallelization: Breaking down the consensus process into smaller tasks that can be executed
concurrently across multiple nodes, thereby increasing throughput.
Sharding: Dividing the network into smaller subsets called shards, each responsible for
processing a portion of the transactions. This can reduce the computational load on individual
nodes.
Consensus algorithm upgrades: Introducing new consensus algorithms that are inherently
more scalable, such as proof of stake (PoS) or delegated proof of stake (DPoS), which typically
require less computational resources than proof of work (PoW).
By implementing these strategies, blockchain networks can improve their consensus scalability
and accommodate a larger user base and transaction volume without sacrificing performance
or decentralization.
PoW has proven to be robust and secure, it faces challenges in scaling efficiently as the network
grows. Here's an explanation of PoW scalability:
Scalability Solutions: To address PoW scalability challenges, various scaling solutions have
been proposed and implemented. These include:
1. Layer 2 solutions: Off-chain protocols like the Lightning Network enable faster and
cheaper transactions by conducting most transactions off the main blockchain.
2. Optimization of mining algorithms: Tweaking PoW algorithms to make them more
efficient or switching to alternative consensus mechanisms like Proof of Stake (PoS)
can reduce the computational requirements and improve scalability.
3. Sharding: Breaking the blockchain into smaller partitions (shards) that can process
transactions independently can increase throughput and scalability.
Performance: PoW consensus is known for its robust security but tends to have lower
performance compared to some other consensus mechanisms. The computational-intensive
nature of PoW, where miners compete to solve complex puzzles to validate transactions and
add blocks to the blockchain, leads to slower transaction processing times. This can result in
longer confirmation times for transactions and lower throughput.
Scalability: PoW scalability faces challenges due to its resource-intensive nature. As the
network grows and more transactions are processed, the computational power required to solve
cryptographic puzzles increases. This can lead to network congestion, higher transaction fees,
and longer confirmation times during periods of high demand. Additionally, the centralization
of mining power among large mining pools can hinder scalability efforts, as smaller miners
may struggle to compete.
Performance: BFT consensus algorithms typically offer higher performance compared to PoW.
BFT algorithms aim to achieve consensus among a network of nodes by tolerating a certain
number of faulty or malicious nodes. By design, BFT algorithms can achieve low latency and
high throughput, as they do not rely on resource-intensive mining activities like PoW.
Transactions can be confirmed quickly, making BFT suitable for applications requiring fast
transaction finality, such as financial systems or real-time data processing.
Scalability: BFT consensus mechanisms are generally more scalable than PoW, especially in
terms of transaction throughput and confirmation times. BFT algorithms can handle a larger
number of transactions per second without sacrificing performance or security. However, BFT
scalability can still be limited by factors such as network latency, communication overhead,
and the number of participating nodes. Increasing the number of nodes in a BFT network can
potentially impact scalability, as the consensus process may become slower due to the need for
more extensive communication and agreement among nodes.
In summary, while PoW offers robust security, it often sacrifices performance and scalability
due to its resource-intensive nature. BFT consensus mechanisms, on the other hand, prioritize
performance and scalability, making them suitable for applications requiring fast and efficient
transaction processing. However, the choice between PoW and BFT depends on the specific
requirements of the blockchain application, including considerations of security,
decentralization, and performance.
8) secure multiparty computation over
blockchain
A)
Secure Multiparty Computation (SMAC)
Situation: Three coworkers —Allie, Brian, and Caroline— want to compute their average
salary.
Complication: Each person does not want to reveal their individual salary information to each
other or a trusted third-party during the computation.
Resolution: Allie, Brian, and Caroline use a secure multiparty computation protocol to
calculate the average without ever revealing their private salary information during the process.
The secure multiparty computation protocol leverages a well-established cryptographic
concept called additive secret sharing, which refers to the division of a secret and its distribution
among a group of independent, willing participants.
In our example, say Allie’s salary is $100k. In additive secret sharing, $100k is split into three
randomly-generated pieces (or “secret shares”): $20k, $30k, and $50k for example. Secret
sharing is a way to encrypt data while it is in use. Allie keeps one of these secret shares ($50k)
for herself, and distributes one secret share to each Brian ($30k) and Caroline ($20k). Brian
and Caroline also secret-share their salaries while following the same process (see table below
for example secret shares). When the secret sharing is completed, each person holds three secret
shares: one from Allie’s salary, one from Brian’s, and one from Caroline’s.
Note that when the three salaries are secret shared across the participants (as shown above),
they know nothing about each other’s salaries. Each secret share provides no useful information
on its own; a secret share, after all, is just a piece of incomplete information about the initial
secret value from which it was derived.
However, secret shares provide valuable information when added up (hence, the “additive” in
additive secret sharing). Each participant locally sums their secret shares to calculate a partial
result; in our example, each partial result is one third of the necessary information to calculate
the final answer. The partial results are then recombined, summing the complete set of secret
shares previously distributed. As you can see below, the recombined sum divided by the
number of participants yields our answer; Allie, Brian, and Caroline’s average salary is $200k.
https://inpher.io/technology/what-is-secure-multiparty-computation/
Key Features:
1. Immutability: Once deployed, the code of a smart contract cannot be changed. This
ensures the terms of the contract remain as initially agreed upon.
2. Autonomy: Smart contracts eliminate the need for intermediaries, reducing the risk
of manipulation and lowering transaction costs.
3. Trust: The execution of the contract is guaranteed by the blockchain, making it
transparent and tamper-proof.
4. Security: Smart contracts are encrypted and distributed across the network, making
them resistant to single points of failure and hacking attempts.
Applications:
Advantages:
1. Efficiency: Automating transactions and agreements saves time and reduces the
likelihood of errors.
2. Cost Reduction: Reduces the need for intermediaries, thereby lowering costs.
3. Transparency and Trust: The transparent nature of blockchain fosters trust among
parties.
Challenges:
Strengths:
Weaknesses:
- Scalability challenges high gas fees and network congestion during peak usage.
- Security vulnerabilities in smart contracts have led to significant hacks and exploits in
the past.
- Concerns about centralization due to concentration of mining power and governance
decisions.