Blockchain for real world applications

"Distributed Ledger Technology (DLT) is a technical infrastructure and protocol that allows simultaneous access, verification and updating of records in an irreversible manner over a network spanning multiple entities or locations. It can be a Blockchain, Directed Acylic Graph, Hashgraph, Holoc...

Descripción completa

Detalles Bibliográficos
Otros Autores: Garg, Rishabh, author (author)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Hoboken, New Jersey : John Wiley & Sons [2023]
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009755210406719
Tabla de Contenidos:
  • Intro
  • Blockchain for Real World Applications
  • Contents
  • Illustrations
  • Foreword
  • Preface
  • 1 Introduction
  • 2 Distributed Ledger Technology
  • 2.1 Different Types of Distributed Ledger Technology
  • 2.1.1 Blockchain
  • 2.1.2 Directed Acyclic Graph
  • 2.1.3 Hashgraph
  • 2.1.4 Holochain
  • 2.1.5 Tempo (Radix)
  • 2.2 Chronological Evolution
  • 2.2.1 Blockchain 1.0
  • 2.2.2 Blockchain 2.0
  • 2.2.3 Blockchain 3.0
  • 2.2.4 Blockchain 4.0
  • 2.3 Blockchain Architecture
  • 2.3.1 Block
  • 2.3.2 Hash Function
  • 2.3.3 Encryption
  • 2.3.3.1 Problems
  • 2.3.4 Keys: Public and Private
  • 2.3.5 Decentralized Identifier
  • 3 Blockchain Ecosystem
  • 3.1 Working of Blockchain
  • 3.2 Key Characteristics
  • 3.2.1 Decentralization
  • 3.2.2 Persistence
  • 3.2.3 Anonymity
  • 3.2.4 Auditability
  • 3.3 Unspent Transaction Output
  • 3.4 Classification of Blockchain on Access Management
  • 3.4.1 Public Blockchain
  • 3.4.2 Private Blockchain
  • 3.4.3 Consortium Blockchain
  • 3.5 Consensus
  • 3.5.1 Proof-of-Work
  • 3.5.2 Proof-of-Stake
  • 3.5.3 Peercoin
  • 3.5.4 Practical Byzantine Fault Tolerance
  • 3.5.5 Delegated Proof-of-Stake
  • 3.5.6 Ripple
  • 3.5.7 Tendermint
  • 3.5.8 Consensus Algorithms: A Comparison
  • 3.5.8.1 Node Identity Management
  • 3.5.8.2 Energy Saving
  • 3.5.8.3 Tolerated Power of Adversary
  • 3.5.9 Advances in Consensus Algorithms
  • 3.6 Payment Verification in Blockchain
  • 3.6.1 Simple Payment Verification
  • 3.6.1.1 Key Features
  • 3.6.2 Full Payment Verification
  • 3.6.2.1 Key Features
  • 3.7 Hashgraph
  • 3.7.1 Elements of Hashgraph
  • 3.7.2 Diagrammatic Representation
  • 3.7.3 How Does Hashgraph Work?
  • 3.8 Scalability
  • 4 Transactions in Bitcoin Blockchain
  • 4.1 Coinbase Transactions
  • 4.1.1 Structure
  • 4.1.2 Key Features of Coinbase Transactions
  • 4.1.3 Computation of Transaction Value
  • 4.2 Transactions Involving Fiat Currency.
  • 4.2.1 Cryptocurrency Exchanges
  • 4.2.2 Bitcoin Debit Card
  • 4.2.3 Bitcoin ATMs
  • 4.2.4 Metal Pay
  • 4.2.5 Peer-to-Peer Exchanges
  • 4.3 Top Fiat Currencies for Bitcoin Transactions
  • 4.3.1 US Dollar
  • 4.3.2 Japanese Yen
  • 4.3.3 Euro
  • 4.3.4 Korean Won
  • 4.3.5 Chinese Yuan
  • 4.3.6 Indian National Rupee
  • 4.4 Price Determination for Bitcoin in Transactions
  • 4.4.1 Cost of Mining Bitcoin
  • 4.4.2 Market Supply and Demand
  • 4.4.3 Bitcoin Rewards
  • 4.4.4 Exchanges
  • 4.4.5 Competing Cryptocurrencies
  • 4.4.6 Regulatory Provisions
  • 4.4.7 Internal Governance
  • 4.4.8 Value of Bitcoin
  • 4.4.9 Can the Bitcoin Price Be Zero?
  • 4.4.10 Why Is Bitcoin's Price Volatile?
  • 4.5 Controlling Transaction Costs in Bitcoin
  • 4.5.1 History of Bitcoin Cash
  • 4.5.2 Concerns about Bitcoin Cash
  • 4.5.3 Bitcoin Cash Core Features
  • 4.5.4 Utility of Bitcoin Cash
  • 4.5.5 Advancements over Bitcoin
  • 4.5.5.1 Maximum Block Size
  • 4.5.5.2 Cost Efficiency
  • 4.5.5.3 Smart Contract Support
  • 4.5.5.4 Issue of Token
  • 4.5.5.5 Nonfungible Tokens
  • 4.5.5.6 No Replacement-by-Fee
  • 4.5.5.7 Schnorr Signatures
  • 4.5.5.8 Difficulty Adjustment Algorithm
  • 4.5.6 Bitcoin Cash - Ease of Use
  • 4.5.7 Challenges to Bitcoin Cash
  • 5 Ethereum and Hyperledger Fabric
  • 5.1 Early Attempts to Program Cryptocurrencies
  • 5.2 Smart Contracts
  • 5.3 Working of Ethereum
  • 5.3.1 Gas
  • 5.3.2 Ether
  • 5.4 Hyperledger
  • 5.5 Working of Hyperledger
  • 5.5.1 Components
  • 5.5.2 Workflow
  • 5.5.2.1 Proposal
  • 5.5.2.2 Endorsement
  • 5.5.2.3 Transmission to Ordering Service
  • 5.5.2.4 Updating the Ledger
  • 5.5.3 Industrial Applications of Hyperledger Fabric
  • 5.5.3.1 Production
  • 5.5.3.2 B2B Contract
  • 5.5.3.3 Supply Chain
  • 5.5.3.4 Asset Depository
  • 5.5.3.5 Trading and Asset Transfer
  • 5.5.3.6 Insurance
  • 5.5.3.7 Real Estate
  • 5.5.4 Benefits of Hyperledger Fabric.
  • 5.5.4.1 Open Source
  • 5.5.4.2 Private and Confidential
  • 5.5.4.3 Access Control
  • 5.5.4.4 Chaincode Functionality
  • 5.5.4.5 Performance
  • 5.5.4.6 Modular Design
  • 5.6 Ethereum Versus Hyperledger
  • 5.6.1 Purpose
  • 5.6.2 Cryptocurrency
  • 5.6.3 Participation
  • 5.6.4 Privacy
  • 5.6.5 Governance
  • 5.6.6 Computer Code
  • 5.6.7 Smart Contracts
  • 5.6.8 Consensus Mechanism
  • 5.6.9 Rate of Transactions
  • 5.6.10 Use-cases
  • 5.7 Decentralized Applications
  • 5.7.1 Merits of Decentralized Applications
  • 5.7.1.1 Zero Downtime
  • 5.7.1.2 Privacy
  • 5.7.1.3 Resistance to Censorship
  • 5.7.1.4 Absolute Data Integrity
  • 5.7.2 Demerits of Decentralized Applications
  • 5.7.2.1 Maintenance
  • 5.7.2.2 Performance Overhead
  • 5.7.2.3 Network Congestion
  • 5.7.2.4 User Experience
  • 5.7.2.5 Centralization
  • 5.8 Tokens
  • 6 Identity as a Panacea for the Real World
  • 6.1 Identity Systems
  • 6.1.1 Contemporary ID Systems
  • 6.2 Centralized Model
  • 6.2.1 A Case Study of World's Largest Biometric ID System - Aadhaar
  • 6.2.1.1 Salient Features of Aadhaar
  • 6.2.1.2 Biometric and Demographic Standards
  • 6.2.1.3 Enrollment Set-up
  • 6.2.1.4 Entities and Their Roles
  • 6.2.1.5 Process of Authentication
  • 6.2.1.6 Budget and Outlay
  • 6.2.1.7 Enrollment Status and Saturation
  • 6.3 Cost and Benefits
  • 6.3.1 Merits
  • 6.3.2 Demerits
  • 6.3.2.1 Waste of Resources
  • 6.3.2.2 Lack of Neutrality
  • 6.3.2.3 Technical Glitches
  • 6.3.2.4 Security Procedures
  • 6.3.2.5 Unauthorized Access
  • 6.3.2.6 Absence of Data Protection Act
  • 6.3.2.7 Involvement of Private Players
  • 6.3.2.8 Freedom of Choice as an Illusion
  • 6.3.2.9 Implicit Coercion
  • 6.4 Quest for One World - One Identity
  • 7 Decentralized Identities
  • 7.1 Identity Models
  • 7.1.1 Centralized Identity
  • 7.1.2 Federated Identity
  • 7.1.3 User-centric Identity
  • 7.1.4 Self-sovereign Identity.
  • 7.2 Blockchain-based Solutions
  • 7.3 Identity Management
  • 7.3.1 Current Challenges
  • 7.3.1.1 Absence of Compatibility
  • 7.3.1.2 Identity Theft
  • 7.3.1.3 KYC Onboarding and Weak Authentication Protocols
  • 7.3.1.4 Lack of Control
  • 7.4 Identity Storage | Interplanetary File System
  • 7.4.1 How Does IPFS Access the Documents?
  • 7.4.2 Transactions Involved in Accessing Documents on IPFS
  • 7.4.3 IPFS Commands
  • 7.5 Biometric Solutions
  • 7.5.1 Fingerprint Verification
  • 7.5.2 Iris Scan
  • 7.5.3 Vascular Technology
  • 7.5.4 Palm Vein Pattern
  • 7.5.5 Facial Recognition
  • 7.5.1.1 Verification of Government ID
  • 7.5.1.2 Verification of a User
  • 7.5.1.3 Creation of a Digital ID
  • 7.5.2 System Overview
  • 7.5.2.1 Identify Creator
  • 7.5.2.2 Identity User
  • 7.5.2.3 Identity Manager
  • 7.5.2.4 Identity Device
  • 7.5.3 Blockchain Identity Protocol
  • 7.5.3.1 Creation of Digital ID
  • 7.5.3.2 Use of Digital ID
  • 7.5.3.3 Digital ID Management
  • 7.5.4 Security Audit
  • 7.5.4.1 Binding
  • 7.5.4.2 Privacy
  • 7.5.5 Authentication Protocol
  • 7.6 Identity Access
  • 7.6.1 Identity Encryption
  • 7.6.2 Zero Knowledge Proof
  • 7.6.3 Revocation
  • 7.7 Merits of a Proposed System
  • 7.7.1 Seamless Navigation
  • 7.7.2 Accessibility
  • 7.7.3 Easy and Secure
  • 7.7.4 Decentralized Public Key Infrastructure
  • 7.7.5 Decentralized Storage
  • 7.7.6 Manageability and Control
  • 7.7.7 Data Portability
  • 7.7.8 Prevention of Identity Theft
  • 7.8 Disadvantages of the Proposed System
  • 7.8.1 Privacy Leakage
  • 7.8.2 Selfish Mining
  • 7.8.3 Admin Conflicts
  • 7.9 Challenges
  • 7.9.1 Storage Optimization and Redesign
  • 7.9.2 Privacy Protection
  • 7.9.3 Random Beacons and Timestamps
  • 7.10 Solutions with Hyperledger Fabric
  • 7.10.1 Warning Pointers
  • 7.10.2 Safety Protocols
  • 8 Encryption and Cybersecurity
  • 8.1 Cryptography.
  • 8.1.1 Different Types of Cryptography
  • 8.1.1.1 Symmetric Key Cryptography
  • 8.1.1.2 Asymmetric Key Cryptography
  • 8.1.1.3 Hash Functions
  • 8.1.2 Cryptographic Schemes
  • 8.1.2.1 Simple Substitution Cipher
  • 8.1.2.2 Caesar Cipher
  • 8.1.2.3 Vigenère Cipher
  • 8.1.2.4 Transposition Cipher
  • 8.2 Playfair Cipher
  • 8.2.1 Encryption Algorithm
  • 8.2.1.1 Step 1 - Generate Squares (5 * 5)
  • 8.2.1.2 Step 2 - Algorithm to Encrypt Plaintext
  • 8.2.2 Decryption Algorithm
  • 8.2.2.1 Step 1 - Generate Squares (5 * 5)
  • 8.2.2.2 Step 2 - Algorithm to Decrypt the Ciphertext
  • 8.2.3 Advantages and Disadvantages
  • 8.2.3.1 Advantages
  • 8.2.3.2 Disadvantages
  • 8.3 Hill Cipher
  • 8.3.1 Substitution Scheme
  • 8.3.1.1 Encryption
  • 8.3.1.2 Decryption
  • 8.4 RSA Algorithm in Cryptography
  • 8.4.1 Working Mechanism
  • 8.4.1.1 Generating the Public Key
  • 8.4.1.2 Generating a Private Key
  • 8.5 Multiple Precision Arithmetic Library
  • 8.5.1 GNU Multiple Precision Arithmetic Library
  • 8.5.2 RSA Algorithm Implementation Using GMP Library
  • 8.5.3 Weak RSA Decryption with Chinese Remainder Theorem
  • 8.6 SHA-512 Hash in Java
  • 8.7 Cybersecurity
  • 8.7.1 Common Cyberattacks
  • 8.7.1.1 Denial-of-Service Attacks
  • 8.7.1.2 Malware
  • 8.7.1.3 Man-in-the-Middle Attack
  • 8.7.1.4 Phishing
  • 8.7.1.5 Structured Language Query Injection
  • 8.7.1.6 Latest Cyberthreats
  • 8.7.2 Key Cybersecurity Features
  • 8.7.3 Blockchain for Cybersecurity
  • 8.7.4 Pros and Cons of Blockchain in Cybersecurity
  • 8.7.4.1 Pros
  • 8.7.4.2 Cons
  • 8.7.5 Real-world Examples
  • 8.7.5.1 Australian Government
  • 8.7.5.2 Barclays
  • 8.7.5.3 Chinese Military
  • 8.7.5.4 Cisco
  • 8.7.5.5 Coinbase
  • 8.7.5.6 Colorado State
  • 8.7.5.7 Founders Bank
  • 8.7.5.8 Health Linkage
  • 8.7.5.9 JP Morgan
  • 8.7.5.10 Mobile Coin
  • 8.7.5.11 Philips Healthcare
  • 8.7.5.12 Santander Bank
  • 8.7.5.13 Wall Street.
  • 9 Data Management.