Updates from October, 2016 Toggle Comment Threads | Keyboard Shortcuts

  • user 7:35 am on October 6, 2016 Permalink | Reply
    Tags: , , supply chain,   

    Blockchain: The Next Great Leap in Supply Chain Transparency 

    It’s no secret that transparency is the name of the game in today’s world-class Supply Chains. More and more consumers are demanding accountability and openness about where their products come from. More world-beating companies are recognizing that the goodwill you get from transparency in your can be a major source of competitive advantage – while also helping to make the world a more humane place.

    Today, we wanted to write about an emerging Supply Chain – as we love to do – that’s poised to offer unparalleled transparency to companies and consumers. It’s a technology that the Supply Chain trade press is buzzing about, and also one that lots of companies are taking a closer look at:

    .

    If you’re a Supply Chain professional and you haven’t heard of Blockchain yet, it’s fairly safe to assume you’ll be hearing a lot more about it soon (starting with us!). It can be slightly difficult to wrap one’s head around, but maybe not for all those Supply Chain professionals who are at this point quite used to understanding the new software and database systems that have been providing additional value to Supply Chains for years. If you’ll follow us into the weeds for a second here, you’ll probably start to see some of the huge possibilities for transparency that this technology allows:

    Blockchain is a database technology with its origins in , the popular encrypted, decentralized alternative currency that seemed quite close to catching on in the mainstream a few years ago, but hasn’t quite made it there yet. Put simply, Blockchain began as the technology behind Bitcoin that allows the electronic currency to record transactions in a fool-proof way without a central entity (say, a central bank) keeping track of, and verifying, every transaction. It’s an encrypted ledger that’s distributed across a network, providing a concrete and verifiable record of transactions.

    This Wall Street Journal definition works pretty well: “A blockchain is a data structure that makes it possible to create and share a digital ledger of transactions. It uses cryptography to allow anyone granted access to add to the ledger in a secure way without the need for a central authority. Once a block of data is recorded on the blockchain ledger, it’s extremely difficult to change or remove.”

    In the past few years, Financial Services companies have begun to see the possibilities of Blockchain technology – not just for Bitcoin. Blockchains are full of transaction data that are extremely difficult to modify because the data exists on a number of systems at once. Any change in a Blockchain has to be verified by a majority of other systems on the network, and the data is also encrypted. This makes the technology ideal for secure, fast transactions like verifying contracts and cross-border payments. In Financial Services, another key factor is that the ledger data behind Blockchains is open. It’s transparent, which makes it valuable for audits.

    Which is where the applications for Supply Chain transparency start appearing as well. More companies are recognizing that Blockchain has immense potential as a technology to boost Supply Chain transparency. More startups and social enterprises are offering Blockchain-based solutions to help companies track and monitor exactly where their products are coming from, with the goal of helping eliminate unsustainable practices, slavery and environmental degradation in their Supply Chains.

    An article in CIPS’ Supply Management magazine recently profiled a social enterprise called Provenance, which has deployed Blockchain technology on a trial basis to help provide transparency in the notoriously opaque Tuna fishing industry – a sector that’s been known to carry a high risk of modern slavery in some east Asian countries. At the point of catch, fishermen used SMS to record the name of the fisherman, where it was caught, its material attributes, and other relevant audit info. This info then followed the product throughout the Supply Chain through RFID tag or QR code, and Provenance piloted a few different ways of making this data available to consumers. Another startup called Everledger has set up Blockchain technology to create a permanent record of transactions in the Supply Chain for diamonds, a notoriously slavery and conflict-prone good.

    Pretty cool.

    While the ideas behind Blockchain and its application still goes over the head of many in the corporate world, it’s clear that those who are able to harness this technology can make huge gains in innovation and transparency.


    [linkedinbadge URL=”https://www.linkedin.com/in/bronwenhannargentussearch” connections=”off” mode=”icon” liname=” Bronwen Hann”], Bronwen Hann has over 35 years experience in the recruitment industry. She’s the President and Senior Partner at Argentus Supply Chain Recruiting, a Toronto-based recruitment firm that specializes in Supply Chain Management, Procurement, Logistics, Operations and Planning. Prior to starting Argentus, Bronwen founded The Pinstripe Group of Companies, which became one of the largest temporary staffing agencies in Canada.

     
  • user 11:35 am on October 4, 2016 Permalink | Reply
    Tags: , , , financial service, , ,   

    Blockchain, Real Smart Contracts?! 

    aaeaaqaaaaaaaaixaaaajdk3otqxowjjltazmwytndk5ys1hzmu2lty4odringuyndjhzq

    and well integrated provide

    Real .

    Summary. The main blog, “Blockchain will change the world..?!”, proposes three fundamental research questions. In this blog and following blogs the third of these questions “How to apply blockchain?” or “How to do it..?!” is investigated.

    In order to apply blockchain well, it must be well understood what blockchain provides us and what not. In the blog “Blockchain, what does it provide us..?!” is shown by observation that blockchain is a notarization system, explicitly not a transaction system. But notarization of documents and transactions are closely related. In this blog the relations between DEMO (Design and Engineering methodology for Organizations) transactions, notarization and real smart contracts is explained. It “fits like a glove”.

    First the real world is observed to understand what transactions are and how they are related in the real world. Then the notions of Real Smart Contracts (RSC) and DEMO transactions are described. The functional perspective of a RSC is to represent the things in the real world by documents, transactions, contracts, communication, commitments, etc, with blockchain’s notarization capability, as good as possible. There are quality criteria defined.

    Finally some aspects of the construction of the RSC, the relation between all kinds of information that may be notarized and a transaction is described. The next blog “Blockchain, how to do it..?!” shows how enterprises can be engineered using DEMO and how blockchain notarization is supported.

    This blog and the related blogs are intended for the professionals, those who have to apply the blockchain and design better services and enterprises. In most cases they have a background in economics, management and not so often in engineering. This nature of the blogs is informal and explanatory, making clear what is available and what can be done with it. Much emphasis is placed on how good engineering works and on what good observation of the real world provides us.

    1. Introduction

    There is a widely accepted perception that the potential impact of blockchain for society is huge and a game changer for many industries. However, there are many touted benefits that are questionable and probably will not be realized if we do not understand well what it is. In the root blog “Blockchain will change the World..?!” it is discussed that these benefits will not be realized if state of the art modeling technologies are applied to develop systems. Further, three fundamental research questions have been postulated;

    1.1. What can we do with blockchain? The blog “Robust world financial blockchain systems..?!” states that society would probably benefit most from robust and fault tolerant financial systems in the world. The “Keeping the cyber criminal out” now enhanced with “Once the cyber criminal is inside, make sure that he cannot do much harm”, but doing it in a much better way than state of the art. Using a good engineering methodology to design and implement enterprises and applying the benefits of blockchain.

    1.2. What does blockchain provide us? In that blog has been argued that blockchain provides trust-less authenticity of documents, or notarization of documents. It is that and nothing more, but this is already very valuable. The blockchain technology is not a transaction executing system.

    Failure to understand this has serious consequences. First, blockchain experiments that apply blockchain as the core transaction system will be faced with large engineering problems, notably unmanageable complexity, and are therefor prone to failure. Secondly, a number of the promised and touted benefits of blockchain are based on the wrong assumption that blockchain is a transaction based system.

    1.3. Blockchain, Real Smart Contracts..?!. In this blog is shown that there is a close relation between notarization and transactions. Blockchain notarizes results of transactions, such as communication, commitments, contracts, transaction related documents and the production of a transaction etc. The DEMO methodology, part of the enterprise engineering discipline, is strongly based on transactions. DEMO transactions have sophisticated capabilities. We need both capabilities. So, a good alignment and integration of blockchain notarization and DEMO transactions provides us the Real Smart Contracts (RSC’s).

    2.  The world of actors, transactions, communication and commitments.

    As in most of these blogs, a careful and good observation of the things and their relations in the real world is mandatory if we want to build systems and enterprises that work well in that real world.

    2.1 The notion of an actor. An actor is “somebody”, either carbon-human or silicon-computer, who does “something” in the real world. An actor “acts”, which results in “facts” in the real world. Actors fulfill roles. A role is the fulfillment of a specific task that is part of a specific service to a specific customer. There is an abstraction between actor and a role. Multiple actors can fulfill multiple roles. At run time a role can be assigned to an actor. This is represented for example in natural language, “Joe, will you do this job for me?..”, which is a Request.

    2.2 The notion of a transaction. In this blog we do not use the notion of an economic transaction, with a transfer of products in one way and a matching transfer in finance the other way. An example of an economic transaction is the purchase and payment of a product. The notion of transaction applied here is an atomic or an elementary transfer. A purchase and a payment involve two elementary transactions. Any matching compensation for some payment or the delivery of some service may exist but is out of our scope of a specific transaction.

    Any (atomic) transaction involves two parties, or actors, with mutual communication, commitments and some exchange, typically some kind of production or transfer of value. The mutual communication is typically expressed in natural language and involves very important notions such as negotiations, commitments, obligations, intentions and more. Part of the communication in a transaction is a mutually binding agreement or commitment to deliver the ‘production’ of the transaction from one actor to the other actor. In a legal sense this is a binding contract. Contracts are important entities, trust-less authenticity of all commitments and contracts is clearly a valuable asset. Another important part is the finalization of the contract; both actors agree that the transfer has been made and accepted (or not, or not yet). Transactions may embed other transactions in an ever recursive way. For example, a transaction for the delivery of a car demands that the transactions for the production of the engine and the wheels must have been performed and delivered before the car can be assembled, which is another transaction. Only, then, after completion of all the previous transactions in production, the transaction for the delivery of the car can be finalized. We see that transactions are often organized in a tree structure. The notion of a DEMO transaction between two actors is a very suitable building block for enterprises. There is much empirical experience, good theory, proven results. This works very well.

    2.3 Observation of the world of transactions

    Our world of interest is composed of transactions, transactions are everywhere.

    An example: Assume that 2 people – actors communicate and agree to meet at the Liberty Statue on Thursday. There is a Request and a Promise and together that is a (legally or moral) binding contract, actually two contracts because each actor commits himself to the other to be there. They execute a transaction and the result of that transaction is that each of the two people actually meet there. The binding contract(s) may be fulfilled, or not, if one or both does not show up.

    Many other transactions must be fulfilled before the actors can fulfill their transaction. A ticket and a hotel room must be booked, more transactions. The aircraft carrier must fulfill many other transactions first, etc. We observe that the world is composed of transactions and that these transaction are highly structured and inter dependent in a hierarchical way. The “lower” transactions must be finished before the “higher” transactions can be fulfilled.

    This real world of transactions between individuals and enterprises is not much different from the world of transactions within enterprises. Within enterprises all the transactions are usually a bit better defined and organized, but there is no fundamental difference.

    With this notion of a transaction, all transactions between financial services, , insurance companies, customers etc. at a macro scale are captured. At a micro scale, within these enterprises, we also see an ocean of structured, nested and related transactions, in the finest details. The name of the game is to organize these transactions in such a way that the enterprise performs as good as possible.

    Our world of interest consists of transactions, transactions are related or embed other transactions. Transactions are everywhere! If we understand the notion of transactions very well then we can realize huge benefits.

    3.  Real Smart Contracts

    3. 1 The notion of a Real Smart Contract

    Real Smart Contract = Blockchain + DEMO

    Real. Refers to the requirement that all situations hat occur and all things that may happen around contracts in the real world around us, must be captured well. First the real world must be observed very well and well represented. Then must be shown that DEMO transactions provide the needed capabilities to capture the phenomena in the real world well.

    Smart. Refers to the qualities of the RSC:

    1. Captures all binding obligations related to the contract in any way;
    2. The RSC is much more than a contract. It captures the execution of any kind of transaction and relates to “everything” that is in some way connected to a transaction;
    3. It applies blockchain’s notarization capability to provide guaranteed completeness and correctness, with trust-less authenticity, of all information related to the transaction and the contract;
    4. RSC’s can be stacked like brick stones on each other to build any imaginable enterprise; they cooperate automatically with guaranteed formal correctness, controlled by a software engine, called the enterprise operating system.

    Contracts. The DEMO transaction captures communication and commitments that represent a contract and the fulfillment of that contract, plus much more. The RSC is a well aligned integration of a transaction, a DEMO transaction and the blockchain notarization capabilities.

    RSC’s are the building blocks of any enterprise that needs blockchain notarization.

    The DEMO methodology is the engineering way to build enterprises using RSC’s like brick stones.

    3.2  The notion of a DEMO transaction

    DEMO is based on communication and commitments. Typically the communication is in natural language, but not necessarily. Communication here is any exchange between two actors that creates binding commitments in some way. The seemingly simple question in a shop “Give me some of these flowers” has the effect that the shopkeeper must reply, either to Decline the Request and Promise the Request. Also the customer is now committed by this simple phrase. The power of social media shows us how important communication is. However, communication with binding commitments that must be kept, and will be kept with the help of a software engine, is probably a new paradigm.

    The picture on the left is an informal representation of a simple transaction. On the right is a formal representation in a conceptual language.

    The picture shows the most simple pattern of a transaction execution. The customer, initiator of the transaction, issues a Request for some flowers. The producer, the executor of the transaction issues a Promise to deliver the flowers. The Request and the Promise constitute a binding agreement, a contract. The fulfillment of the transaction is realized when the executor states that the flowers are there and the customer initiator accepts the flowers. Both actors agree that the initial contract has been fulfilled.

    A more precise version of a transaction pattern is followed when there is a negotiation between the two actors, The Request may be followed by a Decline, for example if there are no flowers. The contract will not be agreed upon. Similarly, there may be a dispute about the fulfillment of the contract; the customer initiator may decide that these flowers are not what he wanted, he may Decline the flowers. Also here is a negotiation and a dispute may follow.

    In an even more sophisticated transaction pattern the actors are also capable to revoke their earlier commitments. For example: the producer executor may first issue a Promise for the flowers – the contract has been signed by both actors – but decides for some reason that this was not a good decision. He revokes his earlier Promise and wants to issue a Decline, not bound to this contract. For this revoke, a contract termination, the permission from the other actor is needed. So, here is also a sophisticated communication pattern with negotiations.

    In this way, with the several transaction patterns, all events that occur around a transaction, the things that may happen in the real world, are quite well captured. If our RSC’s would not be that real smart, then the appropriateness of it would be affected. It is not that suitable anymore. Empirical evidence shows that these transaction patterns have a very good degree of appropriateness.

    3.3. The integration of blockchain notarization and a DEMO transaction

    Observation of the execution of a DEMO transaction shows which elements of that transactions can be notarized. Assume a transaction for some , provided by a bank for a customer.

    For each communicative act (a Request / Promise / Decline / State / Reject / Accept) usually some relevant documents that must be provided. A Request for a mortgage is typically accompanied with additional information such as the real estate, the identity of the customer, salary information etc. All these related documents must be notarized, together with the Request itself, at the moment the Request is issued.

    The production of the financial service is represented by a document – it is not yet a contract! – that contains things like calculations, obligations, commitments, legal texts, conditions that may occur the real world later, etc. This document must be notarized immediately after it becomes available, independent from any communicative acts, though they are closely related. The unsigned contract must be notarized first! Then the customer gets access to the document and may decide to commit and sign or or not.

    The contract is actually signed and agreed upon when the customer has confirmed his Request by placing his signature on the paper document and the service provider has confirmed his Promise also by signing the paper document.

    Often there are other related documents that are part of financial service that may be notarized, such as interest rate calculations, approval of supervisors. In fact, a mortgage is a fairly complex financial service that is composed of a number of structured supporting transactions, RSC’s. For each of these transactions may be specified at modeling time what should be notarized, or not.

    After signing, represented by a Request and a Promise by the parties, the contract must be fulfilled by the two parties. This encompasses in practice many other transactions, monthly payments, mandatory insurance, approvals, etc. In special cases some of these transactions may demand a partial roll-back, which must be carried out with formal correctness. Failure to realize this could result in a deadlock situation.

    This shows how DEMO transactions and blockchain’s notarization capability are closely related and well integrated into RSC’s. From a software engineering perspective the implementation of notarization in a transaction is even remarkable simple. It is a simple extension to the DEMO engine as will be shown.

    3.4. Some more capabilities of DEMO transactions

    Observing the real world we see that transactions are nested in a structured hierarchical way both between and inside enterprises. The “lower” level transactions must be completed before the production of a higher transaction can be completed. This defines a close relationship between transactions, transaction may be stacked like brick stones.

    Example: the delivery and manufacturing of a bicycle by a manufacturer. The transactions to produce wheels and a frame must be completed before the assembly of the bike can be done. After completion of the transaction for the assembly of the bike, only then, the bike can be sold and delivered via the transaction between customer and bike manufacturer.

    If one of the lower transactions cannot be completed – assume there is a problem at the wheel manufacturer. The wheel manufacturer cannot deliver the wheels. The bike can not be assembled. The bike can not be delivered to the customer. It means that the transaction tree must exhibit several kinds of roll-back capabilities with mathematical correctness. Any deadlocks or anomalies should not occur. Looking closer at the total number of different execution path’s in models of more than two transactions shows exponentially growing complexity, far beyond our small brains to capture this. This is the reason that models with more than two transactions should be calculated by a software engine, not by human programmers. It shows also why the industry standard BPMN (Business Processes Modeling Notation) is only suitable to model the simplest “happy flows” in production and fails to handle any exceptional conditions such as roll-back phenomena.

    DEMO transactions support business rules that control the execution of the transaction. An example is a Request from a customer to his bank for a loan. The bank must carry out all kinds of checks, each controlled by a transaction. A business rule could state that for an amount more than 1000,- USD the approval of a colleague must be given. The business rule would enforce the transaction with the colleague to be completed – approval given or refused – before the transaction with the customer may continue. This precise definition and control of each actor in the enterprise is of great importance to improve the quality of the daily operation.

    3.5. DEMO modeling provides high quality enterprise specifications

    DEMO theory provides also clear specifications of the notions of authority, competences and responsibilities for each actor role. The human actor who fulfills an actor role must meet these criteria. It supports the matching of employee competences to functions.

    The qualities of communication between actors are defined by claims of truth, claim of justice, and claim for sincerity, that are provided by the Habermas communicative theory. Actors are assumed to communicate the objective truth; be sincere though they can be mistaken (subjective); and should only communicate what is allowed.

    DEMO theory provides a methodology for constructional decomposition which provides clear specifications for each production part in production. This is typically a product blueprint with a BOM (Bill of Materials).

    The Real Smart Contracts have these capabilities to capture the real world well and to be a good building block for enterprises. The other part of the equation is the methodology to do this.

    4. Conclusions

    The alignment and integration of blockchain and DEMO models matches in a conceptual way very well, is very straightforward and offers great advantages when sophisticated enterprises have to be designed and modeled that apply blockchain well.

    The DEMO modeling methodology is very sophisticated and powerful. Instead of using DEMO transactions as the core building block of enterprises, the augmented Real Smart Contract is the building block of enterprises that need notarization.

    In the next blog “Blockchain, how to do it..?!” is shown how DEMO models of enterprises are modeled, what they provide, how blockchain notarization can be modeled and how enterprises are driven and controlled by DEMO models in production.

    More practical blogs on how to do it will be: “Banking transactions – PSD2 with blockchain” and “Co-creation and co-production in production chains using blockchain”.

    The author, Steven J.H. van Kervel, Ph.D. computer science, is with Formetis Consultants BV in The Netherlands. Formetis are enterprise engineers. They develop methodologies, tools and software systems for the engineering of enterprises with supporting IT systems, applying and supporting the blockchain technology. Formetis participates in the CIAO! community of scientists and engineers on the field of enterprise engineering.

    Formetis seeks partnerships to bring this technology to the real world.

    Contact: [email protected]


    [linkedinbadge URL=”https://www.linkedin.com/in/steven-j-h-van-kervel-0615671″ connections=”off” mode=”icon” liname=”Steven J.H. van Kervel”] is consultant at Formetis

     
  • user 10:40 pm on October 1, 2016 Permalink | Reply
    Tags: , , , , ,   

    Switzerland & the Blockchain: A Match Made in Heaven 

    aaeaaqaaaaaaaaepaaaajdjiodu2mdu1ltcxmzatndazzc04yze1ltviyjnjzguzy2m4yq

    The is a revolutionary that’s likely to change our lives even more than the internet has over the last twenty years. Ironically – or perhaps appropriately – it was born at a time when the global economy was hitting rock bottom with the collapse of Lehman Brothers in fall 2008.

    In November that year, somebody called Satoshi Nakamoto published the white paper ‘: A Peer-to-Peer Electronic Cash system’. The paper boldly proclaimed that, in the future, online payments could be sent directly from one party to another without going through a financial institution.

    With the release of this whitepaper, the Blockchain technology was born and the 1999 vision of legendary economist Milton Friedman became reality: “One thing that’s missing but will soon be developed is a reliable e-cash, a method whereby on the Internet you can transfer funds from A to B without A knowing B or B knowing A – the way I can take a $20 bill and hand it over to you, and you may get that without knowing who I am”

    Since then, Bitcoin has had a rocky ride due to a number of scandals and a lot of price volatility. Despite these problems the technology has grown in popularity. It has run stably without any outages since the first Bitcoin was mined (i.e. self-sufficiently produced) in January 2009. The total market capitalization of all Bitcoins mined since its release is now approx. US$10bn (September 2016).

    In the meantime, many different versions of the original Bitcoin Blockchain have been developed and released – the most prominent examples being Ethereum and Ripple. Even the middlemen that were supposed to be replaced by it – financial institutions – have begun to embrace the Blockchain’s ‘distributed ledger technology’. They see the benefits of an efficiently run, shared, self-sufficient and self-governing distributed ledger infrastructure, and have begun to embrace it with a view to saving billions of dollars in future infrastructure costs.

    Unfortunately however, many have yet to understand the benefits of the original version of the technology – the Bitcoin Blockchain. This original version has the potential to open up radical new ways of doing business, allowing cross-border payment services that, through using Bitcoin and other cryptocurrencies, could eventually become free – just as communication via emails, voice over IP and other communication services became free through the internet.

    The key principles behind the original Bitcoin Blockchain include decentralization (the network of participants run the technology and everybody can participate with their computer by downloading the open-source software package), trust (through algorithms and cryptography rather than middlemen like corporations acting as ‘agents of trust’), immutability (all transactions in the ledger are non-revocable once confirmed by the consensus mechanism of the Blockchain), transparency (all transactions are publicly observable) and privacy (the only aspect that is not publicly visible are the parties involved in the transactions).

    So what does have to do with all of this?

    Among the core values of Swiss society are neutrality, politicoeconomic stability,empowermentof its citizens through direct democracy and federalism and, above all, the right to privacy. While the latter is often confused internationally with the ‘right to hide and cheat’ when it comes to financial matters, this right is close to every Swiss citizen’s heart and has a strong historical pedigree. The fact that this right was abused by many, leading to the abolition of the Swiss banking secrecy law (for non-Swiss domiciled clients) in 2012 after severe international pressure has left many Swiss worried that this may be the beginning of the end of Swiss privacy laws. The loudest critics already believe Switzerland is heading in the direction of an NSA-like future of total government surveillance, and have launched a referendum campaign around protecting the privacy of the Swiss population through constitutional law.

    When one compares the key principles of Blockchain technology with these traditional Swiss values, it becomes clear that there’s an almost magical symbiosis between the two. Blockchain aims to empower the individuals who use it, for the first time allowing peer-to-peer transactions to take place without the need for a middleman as an ‘agent of trust’. Early participants in the Bitcoin movement even dreamed of a future without banks and nation states. That future may be some way off. For now, a political system like the Swiss one, with its federalism and direct democracy, would already constitute a step forward for citizens that are suffering under government and public sector corruption.

    Blockchain technology provides the possibility of transacting peer-to-peer in the public eye, thus preventing theft, fraud and corruption while theoretically* protecting the individual’s privacy in such transactions. These features of Blockchain technology go hand-in-hand with Swiss privacy laws that protect individuals from government surveillance while also defending them with from criminal activity.

    Switzerland has a wonderful opportunity to build on this magical symbiosis between a revolutionary technology and the nation’s core values. In an area around Lake Zug, an area called the ‘Crypto Valley’ is emerging. The valley is home to a myriad Bitcoin and Blockchain companies. It counts more than 20 Blockchain companies, making it one of the biggest clusters in the world for this unique technology. Globally leading companies like Xapo and Ethereum are already calling the Crypto Valley their home.

    Another key ingredient making Switzerland a leading Blockchain hub is that it’s home to some of the world’s best universities, both technical, like ETH Zurich and EPFL Lausanne, and business universities, like the University of Zurich and the University of St. Gallen. All these universities have already established dedicated teams that look closely into the technical and business aspects of Blockchain technology and how it will affect future business models of Switzerland’s Financial Services companies.

    Switzerland boasts a vibrant innovation ecosystem which takes top spots in global league tables when it comes to competitiveness and innovation. As one of the world’s leading financial centers, Switzerland could play a leading role in supporting the development of Blockchain technology, with a view to making it a competitive advantage for its financial center and beyond. Switzerland could reap the benefits of the Blockchain in other key sectors of its economy too – such as its strong pharmaceutical and watch industries – by proactively embracing this technology for securing supply chains of medical and luxury goods.

    But Blockchain technology will not only impact the Swiss economy – it will eventually impact every company and individual on this planet once Blockchain services for supply chain management and digital identity have matured. Once the provenance of any good can be publicly and safely registered on the Blockchain, counterfeiting goods will be a thing of the past.

     

    • Access to Blockchain services can and should be regulated to protect consumers from criminals and as such KYC/AML rules should become applicable to Blockchain services as well.

    [linkedinbadge URL=”https://www.linkedin.com/in/gasteiger” connections=”off” mode=”icon” liname=”Daniel Gasteiger”] is Co-Founder of nexussquared – Accelerating Blockchain Ideas

     
  • user 8:24 pm on September 24, 2016 Permalink | Reply
    Tags: , ,   

    Be careful, Blockchain is not a wild card. 

    aaeaaqaaaaaaaafzaaaajdi2ztzhmtu4lte3zjmtndhlmy04otg1ltixmja5m2m5y2mwoa

    Every tool has been designed to accomplish a certain task or purpose. is not different from other tools and it has a specific functionality. As you will see below, it provides a set of properties that are very useful to protect information.

    Blockchain is not something new in cryptography.

    Blockchain is, in essence, a signed hash chain. This is a combination of data, hashes and signatures composing an interwoven chain. Although Blockchain is a hot topic nowadays, its underlying has been used for years to protect information. The generation of immutable audit logs is a good example of this.

    The idea behind Blockchain consists in signing the content of every data record together with the result of a hash function of the previous stored record. In this way, signatures become successively connected by themselves allowing anyone to check their correctness.

    From a security point of view, Blockchain provides data integrity, data authenticity, non-repudiation, record immutability, verifiability, and fault-tolerance.

    Each of these digital signatures provides data integritydata authenticity and non-repudiation to its corresponding record: (i) When the data of a record is signed, it cannot be modified once generated without detection (data integrity); (ii) only the issuer of a signature is able to prove that the signature belongs to her (data authenticity); and (iii) the issuer of a signature cannot deny her authorship (non-repudiation).

    Meanwhile, the hash included in each signature links such record with the previous one. This hash together with the digital signature offer record immutability. In other words, records cannot be added, modified or deleted without detection. This is because any fraudulent change can be detected by verifying from the last to the first linked signature of the chain. Anyone who possesses the public key of the signatures is able to check it (verifiability). In fact, this is the reason why Blockchain is not anonymous.

    In addition, Blockchain provides data redundancy, which consists in storing a copy of every record in several peers. Therefore, if a server fails, the other servers still have the whole data (fault-tolerance).

    All these properties make Blockchain a good tool to store information in a secure way. But, as each tool, Blockchain has limited properties and functionalities. It cannot solve as many problems as we would like.

    Analyse what security requirements have to be met by your system, and decide then what cryptographic techniques to use.

    For this reason, it is important to figure out what functional as well as security requirements have to be accomplished by your system and whether Blockchain is your suitable tool.

    Is Blockchain what you need?

    Keep in mind that there is not a magic tool able to deal with all your system requirements. On the contrary, an improper use of a security tool could lead to your system a serious security fault.


     [linkedinbadge URL=”https://www.linkedin.com/in/rogerjc” connections=”off” mode=”icon” liname=”Roger Jardí Cedó, Ph.D”] is Information Security & Privacy Architect at Dinube
     
  • user 7:35 am on September 22, 2016 Permalink | Reply
    Tags: , , , , ,   

    Blockchain will change the World?! 

    blockchaincoin3

    What can we do with ?

    What does blockchain provide us?

    How to apply blockchain?

    Can we afford not to answer these three fundamental questions?

    Introduction. There is a widely accepted perception that the potential impact of blockchain for society is huge and a game changer for many industries. Almost all major are involved in some kind of research on blockchain. There is something going on. We apply Socratic questioning; a good question is more valuable than a good answer. Three related good questions are proposed that must be answered well before we can do any new and valuable things with blockchain. Because, without good research questions good R&D is not possible.

    What can we do with blockchain? The first question is well answered in more detail by some visionary authors who describe the new things, products and services, and the impact on business and society on many areas. In financial and government services there are the promises of a better production of existing services. In short, “doing the same things in a better way”. There is also a new dimension, “doing totally new things” using disruptive business models. There are plenty of these examples based on social media. Blockchain is closely related to social media, communication and to documents, as will be shown in later blogs. So it is reasonable to expect that blockchain may have an impact in all these areas.

    There are more urgent reasons to apply blockchain. Experts agree that the world financial system of transactions is a geopolitical battlefield for state sponsored cyber crime. Blockchain promises a radically new way to realize resilience to cyber crime and a reduction of costs due to a reduction of complexity. A much more resilient and robust world financial transaction system can be and must be realized.

    What does blockchain provide us? This question is answered today by a number of good articles on the inner construction and working of blockchain, mainly for (s). This is fine and we can trust our fellow engineers and cryptographers to provide us good solid blockchain platforms. However, this is not our prime interest, we are interested in what blockchain provides us as a black box, without knowing its inner construction and working. Some authors state that it is “trust-less authenticity”, or “trust-less consensus”, or use comparable terms. Since this is new and enables those new services, the trust-less authenticity is the new paradigm. So, the term ‘blockchain’ refers here to ‘trust-less authenticity’. The new paradigm is enabled using good software engineering and cryptography but these are not the new paradigm; they provide us the new paradigm trust-less authenticity. What trust-less authenticity is must be understood and described well enough (very well). Then, and only then, we can make any good use of it from an engineering perspective, for example building robust and fault tolerant world financial systems. So far any good specifications have not been found in the literature. To answer this question well, we need a high quality conceptual specification of blockchain’s trust-less authentication. This is a subject for later blogs.

    How to apply blockchain? The third question is about the application of blockchain’s trust-less authenticity – and we must understand this first – as a key component to construct and produce the new services and new financial service providers. No good answers to this engineering question have been found in the literature so far. The answer consists of three major parts and a conclusion.

    The first is that we have existing services (products) that we would like to produce in a better way. We also see that a range of totally new services is possible. We must start by describing the functional qualities of our services ‘well enough’. What is the value of our service to our customers, as seen by our customers? We must ask them because it is highly subjective. We need this functional specification because we must check, validate, that our actual production meets these functional specifications. If our actual production does not match the functional requirements, it will not provide the desired value for the customers, and we are in deep trouble with a dissatisfied customer.

    The second part is that we must specify the construction of the services in an appropriate way. The term ‘appropriate’ is not vague; it means also a truthful, coherent, concise, consistent and comprehensive specification. Without a good specification of the construction of the services we are not able to find out how toproduce the services in new enterprises. As said already, we must check, validate that if we construct our service in this way, it meets the functional requirements for the customer.

    The third part is the observation that services are produced by enterprises. An enterprise must be well designed to produce the services, based on the construction specifications of the service. Example: an automotive production line is very carefully designed and tuned to produce a specific car type. If another type of car must be produced, the production line must be redesigned, adapted, tuned in many places. If the production line must produce radio’s, the whole production line must be redesigned from scratch. These enterprises must be specified also in an appropriate way, otherwise we cannotconstruct these enterprises and let them operate well in production.

    These answers show that if we use the special qualities of a new component in our services, blockchain’s trust-less authenticity with all of its benefits, the construction of our services must be totally redesigned from scratch. We produce the same service, same functional specifications, but in a different way. And, if we produce services in a totally new way, we must redesign and rebuild our enterprises also from scratch. The conclusion is that the application of blockchain typically demands a totally new (re)design, from scratch, of the construction of the services and therefor theconstruction of the financial service enterprises. In other words; if you want to apply blockchain well, it is better to redesign the services and rebuild the whole enterprise from scratch.

    Is this about ? Yes and No. Yes, because it is innovative, based on two new paradigms (one is blockchain – trust-less authenticity) and the benefits will probably most visible in financial services. It’s most valuable benefit for society is likely a robust and fault tolerant world financial system. No, this is not some new potentially disruptive financial service. It is how to apply blockchain well, better than state of the art technologies, using better engineering.

    Can we afford not to answer these three fundamental questions? The three questions are interconnected and are also umbrella questions for many more detailed questions – see below. Without an appropriate answer the next question cannot be answered. So, without three appropriate answers we cannot deliver the new services. To provide appropriate answers to the three questions we need also better engineering methods for enterprises and their supporting IT systems, which is in the domain of the discipline of enterprise engineering, based on another new paradigm.

    Blockchain will the World..?! No, not if we continue the old way of doing things. Looking at the state of the art in IT systems development [much literature] in for example financial services, we observe that these IT systems are too expensive, have been developed over many years using trial and error methods, resist agility, are increasingly difficult to maintain and have a limited functional value (business-IT alignment). If we continue to work in this way, we will realize similar bad results. 

    If, as some visionaries are rightfully saying, we are going to machine to machine financial services in production chains, then we need really much better engineering.

    Future blogs. The following future blogs discuss the answers to the three fundamental questions, based on good engineering. Subjects include:

    • How to build more robust and fault tolerant financial enterprises and their information systems? “Keeping the cyber criminal out”, enhanced by “Once the cyber criminal is inside, make sure he cannot do much harm”.
    • What is trust-less authenticity (precisely)? What does it guarantee? How and when is it created? By whom? How should blockchain be embedded in business procedures?
    • What is business procedural risk or systemic risk. What are the causes? How to identify, mitigate or eliminate procedural risk, at design time or in production?
    • What is total factual knowledge of the enterprise operation – containing digital fingerprinting, total audit knowledge, communication and commitments made, documents produced?
    • What do the new blockchain platforms provide us, and what not?
    • How to specify new blockchain based services in an appropriate way? For whom? Customer’s identity?
    • How to engineer enterprises, addressing governance, risk, compliance (GRC), efficiency and effectiveness issues?
    • How to construct IT systems that support the operation of enterprises and support the new blockchain platforms?
    • What is communication between human actors and how does it relate to commitments, intentions, contracts, obligations, rights, permissions, authorizations and delegation? What are social media and chatbots doing?
    • What are ‘documents’; what do they contain, represent, do, how are they designed and produced?
    • How does enterprise engineering support the application of blockchain’s trust-less authenticity?
    • What is the enterprise operating system? How does it work? What does it do? How is blockchain supported?

    The new discipline of enterprise engineering is based on the (quite) new paradigm of communication and commitments between human actors in social systems, enterprises. It is ‘solid’ engineering, just like electronics, aviation, mechanical engineering, no place for BS or hype. Enterprise Engineering must provide good answers to these questions.


    [linkedinbadge URL=”https://www.linkedin.com/in/steven-j-h-van-kervel-0615671″ connections=”off” mode=”icon” liname=”Steven J.H. van Kervel”]

    The author, Steven J.H. van Kervel, Ph.D. computer science, is with Formetis Consultants BV in The Netherlands. Formetis develops methodologies, tools and software systems for the engineering of enterprises with supporting IT systems, applying blockchain .

    Formetis participates in the CIAO! community of scientists and engineers on the field of enterprise engineering.

    Formetis seeks partnerships to bring this technology to the real world.

    Contact: [email protected]

     
  • user 9:42 pm on September 21, 2016 Permalink | Reply
    Tags: , , ,   

    RGAx-AURA Blockchain Hackathon 

    aaeaaqaaaaaaaaixaaaajdy1n2i5ywuzlwnjnzqtndm2my04n2u1ltq0mtkxnmzkntuxna

    Myself and a few of my colleagues recently traveled to St. Louis to support the first RGAx-AURA . From September 8-10 we were hosted by the Reinsurance Group of America (RGA), one of the world’s largest life reinsurance companies, and provided mentorship to teams discovering how blockchain could impact the future of insurance. It was a very rewarding experience and hopefully one of many blockchain hackathons I will be privileged to support in the near future.

    On a personal note, I saw first hand the challenges facing developers of blockchain applications. Weather they were using Hyperledger on Bluemix, Ethereum, or a bespoke solution, teams first had to be comfortable with what makes blockchain so valuable. Not everyone recognized the best uses of the and I even found myself steering a team away from an idea that was best suited for ‘centralized’ solutions. Blockchain is a new technology and there is a long runway before this plane takes off, particularly in financial use cases like insurance. I digress.

    Reinsurance contracts can be very transaction intensive. Administering a single contract can last several years and present multiple challenges due to slow, missing or incomplete documentation exchange among parties. Detailed financial transactions, letters of credit creation, renewal requirements, collateralization needs and collateral drawdown can add increased layers of complexity. Using blockchain allows an insurer and its reinsurers to share a common, permissioned ledger that streamlines the process through consensus. Smart contracts establish reinsurance terms and conditions, and authorized transactions provide triggers and conditions for coverage and payments, as well as collateral creation and drawdown. The result—fewer disputes, easier reinsurance audits and lower volatility.

    To apply the potential of blockchain to insurance, 60 developers, designers, and entrepreneurs from RGA, RGAx, Aura and Global IT, as well as select student groups and partner companies (like Daugherty Business Solutions), the event was a resounding success. The cafeteria and adjoining conference room were quickly transformed into a hacker-space. was there to provide mentorship and support, and I was able to give a talk on what we are doing and seeing in this space.

    On Saturday afternoon the 12 surviving projects submitted and demoed in front of a panel of judges, and a crowd of talented individuals, eager to see what kind of projects emerged from just over 36 hours of hacking!

    The Grand Prize winner ($15,000 and the chance to pitch to RGAx Execs) was the AURAAMERENteam BeXchange, a x2x mobile insurance exchange platform connecting consumers who are in need of coverage with a distributed network of potential investors.

    The runner up team was Daugherty team Facultative Underwriting Solutions (aka fReMarket), who created a moderated marketplace for facultative underwriting. They will receive $2,500 from Daugherty Business Solutions.

    Honorable Mentions:

    Find My Funds Daugherty team: Suzanne Zimmerman, Mark Schilling, Andrew Maxwell and Ted Berger.

    Simply Carrots AURA team: Caroline Specter, Brian Compton, Praveen Kota and Shawn Crain.

    New Kids On The Blockchain RGA team: Jonathan Bolhofner, Christina Gerst, Charles McKiel III, Curtis Keller, Bobby Buddha.

    Best use of IBM BlueMix:

    Healthchain Daugherty – RGA team: Lucia Del Pino, Joseph Ondrus, Venus Patel, Alex Gillete. The solution concept of Healthchain revolves around collecting data from wearable devices and storing on a block. Multiple blocks can then be added to the blockchain. The person can then give access to that information to Doctors, Insurance companies, Gym & Fitness companies, Health Monitoring Emergency companies, etc. as needed. This will enable Usage based Insurance, discounts on Insurance premiums, Gym memberships, and even emergency health monitoring services for seniors. This team won an opportunity to meet and have lunch with the IBM Blockchain team in St. Louis. You can find the code for this solution at: https://github.com/SgtRock91/marbles-chaincode.git

    Overall, it was a fantastic event to be a part of and I look forward to seeing what comes out of IBM’s next Blockchain hackathon in NYC October 7-8. Further, I will be supporting the Moovel Blockchain hackathon in Austin on September 23, 2016. Hope to see a great turnout at both!


     [linkedinbadge URL=”https://www.linkedin.com/in/sbrakev” connections=”off” mode=”icon” liname=”Sloane Brakeville”] is Blockchain Specialist at IBM
     
  • user 11:40 pm on September 17, 2016 Permalink | Reply
    Tags: , , , , ,   

    Blockchain and the real sharing economy: ‘Uberisation’ demystified 

    aaeaaqaaaaaaaalraaaajdcwowq5mgm2ltniotytngq2nc1im2m2ltgwyzlknwy1ogfjzq

    Uber/AirBnB are often referred to as the poster kids of the ‘sharing economy’ which consequently, yet deceivingly, became synonymous with ‘Uberisation’. Harvard Professor and Guru, Yochai Benkler sheds light on the misconception in an interview with the authors of Blockchain Revolution (p. 134): “It is indeed ‘nonsense’ to call Uber or AirBnB ‘sharing economy’ companies. Uber has used the availabilityof mobile to create a business that lowers the cost of transportation for consumers. That’s all it has done.” These centralized platforms are but service aggregators which use mobile technologies to tap into unused value (be it vacant rooms or be it seats in a car) while creating value for the platform owners, rather than for the participants in the exchange. While some Internet companies, such as Wikipedia, have facilitated genuine sharing, others have appropriated and commoditized the social relationships and vocabulary of sharing. Uber and Air BnB have cracked the code for large scale service aggregation and distribution at global scale, but all this at a cost to the users. Both Uber and Air BnB leverage the value found in excess capacity via participatory platforms which are designed to reward the platform owners. Uber drivers create considerable value but get to keep only part of it. The company retains a significant share of the price paid for every ride, not to mention the retention of user information involved in transactions as well as their moving patterns to be lateron commercialized with no returns to the users – or the risks that that personal information be hacked, which already happened to Uber drivers.

    Uber, Air BnB and the likes are smart intermediary platforms that create value for their owners. Namely the value collected from those who use its intermediation capacity to find a ride / a place to stay (or any other service mediated by similar platforms). Users help build such a private network by simply creating a profile with personal information as requested, and the network consists of all the people who exposed their profile to that private network. However, when they try to do business with other people in the network they have to pay network operators in order to do that (ask any Uber driver how frustrating and demoralizing that is!). This begs the question: what would aplatform enabling true sharing economy, with the value created being returned back to reward the value creators, look like? Are there principles which can guide the design of such platforms? To understand the paradigm shift that demystifies the sharing economy lets go back to the basics of communication networks. In such networks decentralization leads to faster innovation, greater openness, and lower cost while it also creates the conditions for competition and diversity in the services the network provides.

    This is not the case with the good old landline telephone network. The telephone itself was a very primitive, or as Andreas Antonopoulos calls it – a ‘dumb’ device. The telephone network was a ‘smart network’ offering services dependent entirely on the central switches owned by the phone company, and consumed via ‘dumb’ devices that gave users no opportunity to improve nor change their network providers.

    A glimpse into the highly specialized and service-specific networks on which the financial services industry is built, reveals the same pattern. Most of these are layered atop the Internet, but they are architected as closed, centralized, and “smart” networks with limited intelligence on the edge. All these networks mediate the services by interposing the service provider between the “users,” and they allow minimal innovation or differentiation at the edge. The have built closed network systems on top of the decentralized Internet. Only banks can be members, and the network services are highly centralized. Centralized innovation means slow innovation. It also means innovation directed by the goals of a single company.

    Enter the to change all this through an open network platform for financial services on top of the open and decentralized Internet. The financial services built on top of blockchain are themselves open because they are not “services” delivered by the network; they are “apps” running on top of the network.

    But how can you tell if a network is decentralized, and what makes it more likely to be decentralized? To the novice, Uber-like networks seem to be decentralized… After all, aren’t they running on “smart” devices? Here comes the deception. While Uber indeed runs on a ‘smart’ phone, it does so via a … quite dumb app which is completely controlled by and supports the goals of the company.

    Decentralizing that network means to detach people’s profiles from the apps themselves, and expose those profiles to a public shared network. The blockchain offers a secure infrastructure on which this can be done, so the costs of establishing trust become NIL. On blockchain trust does not rest with the organization owning the platform (such as in the case of Uber and AirBnB) but rather it comes with the functionality, security and auditability of the underlying code and the mass collaboration of the countless people securing the blockchain. In fact, the blockchain offers a basic dumb network that connects peers from anywhere in the world. It doesn’t require membership registration or identification. It doesn’t control the types of devices or applications that can live on its edge. It offers one service: securely time-stamped scripted transactions. Everything else is built on the edge-devices as an application. It allows any application to be developed independently, without permission, on the edge of the network. A developer can create a new application using the transactional service as a platform and deploy it on any device. This arrangement opens a market for applications, putting the end user in a position of power to choose the right application without restrictions.

    By eliminating intermediaries, the cost for every participant in the network lowers dramatically. Users are no longer needed to pay to private network operators with money, their digital footprint, or by consuming advertisements extensively.

    What happens when an industry transitions from using one or more “smart” and centralized networks to using a common, decentralized, open, and dumb network? First of all, the internal costs shrink considerably. The costs of contracting are reduced via software contracts which take care of policing, timely payments, transaction execution, bargain, etc. On this foundation a tsunami of innovation that was pent up for decades is suddenly released. All the applications that could never get permission in the closed network can now be developed and deployed without permission. At first, this change involves reinventing the previously centralized services with new and open decentralized alternatives, which involves the removal of entire layers of intermediaries which are no longer necessary.

    The Internet effected such disintermediation by replacing brokers, classified ads publishers, real estate agents, car salespeople, and many others with search engines and online direct markets. In the financial industry, the blockchain creates a similar wave of disintermediation by making clearinghouses, exchanges, and wire transfer services obsolete.

    The time has come for the ‘smart’ platform intermediaries, such as Uber and Air BnB to be disrupted.

    Where the Internet reduced the cost of search and coordination, the blockchain cuts the costs of bargaining, contracting, policing, and enforcing these contracts. Platform users are peers able to negotiate the best deals and get the service from any entity that is registered on the blockchain platform. Where in contributing to Wikipedia peers do so altruistically, for the fun of it, as a hobby – the blockchain enables reputation systems and other incentives which can reward the peers per the value of their contribution.

    For Uber and AirBnB, blockchain technology provides the platform users (aka the suppliers and consumers of these services, namely drivers and their cars, and passengers) a means to collaborate that delivers a greater share of the value back to them. The blockchain can make platform building cheaper through its open APIs (standard common data base) and more manageable through standard common contracts. The common database offer transparency which consumer and suppliers can use to obtain the best terms and also to cooperate as peers to create their own platform rules. If drivers want to set up their own network on blockchain – they do not need the intermediary services of Uber any longer, they can share for good the value they create together.

    With this clarified lets return to our initial question and quest for demystification of the sharing economy. The new models would look more like a member owned cooperative. In a car-sharing cooperative most people don’t own cars but rather share vehicles in a commons. All revenue, except for the overhead would go to its members, who would also control the sharing software platform and make decisions. If this were a blockchain-enabled car-sharing platform, it would consists of a set of smart contracts that store data on the cars in the fleet. The initial entry and registration of each driver would contain criminal record, record of previous driving, vehicle ownership, safety inspections and insurance, etc. Smart contracts would continuously watch for timely reinspection/insurance and permit renewals. The drivers have thus created a blockchain cooperative and they receive all the wealth they create.  A room sharing coop would consist of a home listings blockchain which also maintains reputations scores and has a similar interface with AirBnB where pictures and info about the rental places can be uploaded. So, the user experience is identical to AirBnB  – the difference is that the communication is done peer to peer on the network via cryptographically signed messages that only you and the room renters can see, not stored on AirBnB data base any longer.

    In regard to privacy protection, the blockchain enabled sharing platforms do not track nor store all the transactions in a database (as in the case of Uber / AirBnB). They simply return a True or False when an identity request needs to be confirmed, which is validated via a separate service. This separation of identity from the transactions carried between the identities implicitly resolves the privacy issues while reducing risks associated with hacking private information. Smart contracts working in the background also enable personalization of service, such as insurance for the renters based on ther reputation of both owner and renter, house / car value, etc.

    These cooperative blockchain empowered platforms enable the rental of excess capacity beyond rooms or car seats. In a true sharing economy, on such platforms people can share anything, such as the examples listed in the book Blockchain Revolution:“expensive power tool or farming equipment used seasonally, as well as garage / parking space, woodwork shop space, a plane / boat or even fishing gear. Further one can rent their commodities such as Wi-Fi hot spots, computing power or storage capacity, the heat generated by our computers, excess energy from our solar panels, extra mobile minutes, and even our expertise. When you travel your WiFi can rent itself out in your absence, charging for every second of usage; further, your subscriptions, physical space and energy sources can become sources of income metering their use directly to a counterparty and charging them for it through micropayments. The blockchain’s decentralized value transfer protocol allows them to securely transact with one another. In the case of a car cooperative people can reserve, unlock and use a car for a certain amount of time metered on the blockchain which will take care of the charges seamlessly per smart contract specifications.”

    The blockchain offers a foundation for peer to peer organizations that enable economic models for shared value creation – and open possibilities of ‘prosperity for the many’ through distribution of value creation and value participation, solving the ‘wealth for the few’ prosperity paradox plaguing our society today in spite of increased wealth creation by corporations. To achieve this, Luis Fernando Molina and colleagues propose the following pillars to sustain a sharing economy enabling platform:

    ●     Decentralized: Like the internet, a sharing economy enabling platform is not owned by anyone in particular. Any individual can own some nodes, but not the network itself.

    ●     Open Standard: It is possible for anyone to implement the network protocol. This protocol must be defined by a standards organization where anyone can participate in.

    ●     Open System: Different apps of the same type using the platform can interoperate between each other.

    ●     Permissionless: Anyone can run a network node. Anyone can use the network. Anyone can write apps that consume the network services.

    ●     Dumb (Antonopoulos article from above): It is a dumb network that pushes innovation to the edge, giving end-users control over the pace and direction of innovation.

    ●     Shared Asset: The resulting network of people is a shared commons asset anyone can use. The cost of contacting these people is transferred directly to the people without intermediaries.

    ●     Inclusive: The technology enables maximum connectivity independent of node location.

    ●     Incentivized: There is an economic incentive to run a network nodes.

    Molina is working with peers to deploy such platforms which are user controlled, censorship resistant, flexible and scalable – enabling person to person exchange of goods, services, assets and data, and free from the whims, risks, costs and interference of unwanted, self-interested third parties who are no longer needed to facilitate the exchange. Sharing economy blockchain-enabled platforms reward through an open ended stream of micropayments to authors of reusable software components that can be perpetually combined and recombined to create an ever-expanding library of useful, highly customizable, peer to peer commercial applications (‘apps’).

    Mike Hearn envisioned such a sharing economy and used the example of an autonomous car to illustrate it. Residents of a particular neighborhood could invest in such an autonomous car and be rewarded with free or discounted rides for a prescribed period. The car owns itself — or, more precisely, the operating computer program owns it. This program would pay the car’s running costs and take in its own revenue on blockchain (from users, investors, etc). The funding itself resonates with the sharing economy – since everyone would share the risk via ‘cryptocurrency assurance contracts’, a blockchain- based version of the popular crowdfunding model in which organizers pledge a certain amount when others’ donations reach target levels. Further, any programmer or niche business can customize ‘apps’ for the car. Such ‘apps’ could post offers on rates, or rank those offers to help the passenger make choices depending various factors (such as if they are willing to pay for faster routes e.g. toll roads etc.) Apps can identify parking options and prices and even book parking spaces in advance. The blockchain-enabled sharing platform could also support safety controls, such as prevention of unqualified or inebriated drivers from taking control of the wheel.

    Models for using the blockchain as foundation for the sharing economy are being currently arduously explored, mainly from the perspective of the commons, where thework of Bollier brings forth novel perspectives regarding the deployment of collaborative entities that issue blockchain-based shares—or crypto-equity tokens—that give the holders ownership or membership rights in a type of decentralized cooperative.

    I’m still at a loss when it comes to coining a nickname for the “Blockchain-enabled sharing economy” – but I can state for sure that to equate Uber and AirBnB with the ‘sharing economy’ and consequently name it Uberisation is a regrettablemisconception!…


    [linkedinbadge URL=”https://www.linkedin.com/in/mihaelaulieru” connections=”off” mode=”icon” liname=”Dr. Mihaela Ulieru”] is Global Technology Policy Innovator

     
  • user 11:35 am on September 17, 2016 Permalink | Reply
    Tags: , , , ,   

    How to start with blockchain – helpful resources you should know 

    aaeaaqaaaaaaaakyaaaajddjm2rkntrkltblmzetndzmnc1imwzmlwm4ndywote5ndk3yg

    More and more regularly I am asked about good ways to looking at in more detail. Inspired by Arno’s reading list I decided to share my own version.

    While there is obviously a gargantuan amount of information available, not everything is equally suited to do the job. Especially if you are new to the topic or don’t sport a technical background. Additionally blockchain meanwhile features a certain span and so does the interest and perspective of people looking at it.

    The following should help to point in a good direction and give you the necessary foundation to understand better what you don’t know. So you can ask the right questions afterwards.

    The Basics:

    Here is a list of the fundamental resources to warm-up.

     

    The Industry and Line of Business Perspective:

    Now if you are more interested in use cases and scenarios where blockchain could be applied this information will help. There are far more reports and analysis out than anybody can read in a reasonable time frame though.

    • The best report to cover Financial Services – if you are not from the industry – is by far and large the UBS whitepaper “Building the trust engine”. It is even an entertaining read by report standards.
    • The World Economic Forum published the most comprehensive research so far. While it is with a Financial Services focus I highly recommend at least skimming through it until something catches your eye. This is at least a year worth of work by six people and the report shows it.
    • Goldman Sachs spreads the topic across industries and gives detailed insights that also covers case studies from utilities, real estate and reputation management.

     

    The Perspective:

    Here is the section for the techies amongst you that would like to understand the mechanics and information technology at work.

     

    Self-Assessment:

    Here is a basic list of topics for you to assess your level of understanding after you covered some or all of the above.

    • Where does blockchain originate from and what is the relationship to Bitcoin?
    • How did blockchain evolve over the last years?
    • What are the differences between public, private and consortium blockchain?
    • What are criteria for scenarios where each of the above would be the ‘best’ technical solution?
    • Why blockchain was picked-up by Financial Services first and is most prominent in that industry?
    • What are smart contracts and how could they be used?
    • What happened during THE DAO incident and what implications did it have to the concept of smart contracts? Here is a hint.

    Do you have any more resources that you think are helpful to get started with blockchain? Post them in the comments along with a brief statement why you believe they help.


    [linkedinbadge URL=”https://www.linkedin.com/in/raimundgross” connections=”off” mode=”icon” liname=”Raimund Gross”] is Innovation Manager | Digital Change Agent | Futurist at SAP

     
  • user 8:03 pm on September 12, 2016 Permalink | Reply
    Tags: , , , ,   

    The Trend Towards Blockchain Privacy: Zero Knowledge Proofs 

     

    One of the bigger trends in the world, particularly when it comes to financial services and specifically capital markets operations, has been a need for and confidentiality in the course of daily business. This has meant that blockchain solutions are being designed with this primary need in mind. This has led to all the private blockchain solutions being developed today.

    When you build for privacy and confidentiality there are tradeoffs that come with that. Mainly you lose transparency, which was the major feature of the the first blockchain: . As originally designed a blockchain is a transparency machine. In this system, the computers are distributed and no one entity controls the network. Not only this but anyone can be a validator and anyone can write to or read from the network. Clients and validators can be anonymous and all the data gets stored locally in every node. (replication). This makes all transaction data public. The security of Bitcoin is made possible by a verification process in which all participants can individually and autonomously validate transactions. While Bitcoin addresses the privacy problem by issuing pseudonymous addresses, it is still possible to find out who’s addresses they are through various techniques.

    This is the polar opposite of what is happening in the private blockchain world, where decentralization and transparency are not deemed as necessary for many capital markets use cases. What is important is privacy and confidentiality, latency (speed) and scalability (able to maintain high performance as more nodes are added are added to the blockchain). Encrypted node to node (n2n) transactions where only the two parties involved in the transaction receive data. In many of these systems there are opt ins for third party nodes (regulators) to be a part of the transaction. Other systems being developed for similar purposes, which have been written about on this blog, have one designated block generator which collects and validates proposed transactions, periodically batching them together into a new-block proposal. Consensus is provided by a Generator that applies rules (validates) agreed to by the nodes (chain cores) to the block and designated block signors.

    In these systems, decentralization is simply not necessary because all the nodes are known parties. In private blockchains the nodes must be known in order to satisfy certain regulatory and compliance requirements. The focus has been on how to preserve privacy and confidentiality while achieving speed, scalability, and network stability. Therefore, there are ways for legal recourse even between parties who don’t necessarily trust each other.

    Strong, Durable Cryptographic Identification

    What is Cryptography and Encryption?

    As noted above with privacy and confidentiality being pivotal, encryption has become a major focus for all blockchains. Many of these solutions are using advanced cryptographic techniques that provide strong mathematically provable guarantees for the privacy of data & transactions.

    In a recent blog post  titled “A Gentle Reminder About Encryption” by Kathleen Breitman of R3CEV, she succintly provides a great working definition:

    “Encryption refers to the operation of disguising plaintext, information to be concealed. The set of rules to encrypt the text is called the encryption algorithm. The operation of an algorithm depends on the encryption key, or an input to the algorithm with the message. For a user to obtain a message from the output of an algorithm, there must be a decryption algorithm which, when used with a decryption key, reproduces the plaintext.”

    If this encryption uses ciphertext to decrypt this plaintext, you get homomorphic encryption and this (combined with digital signature techniques) is the basis for the cryptographic techniques which will be discussed in this post. Homomorphic encryption allows for computations to be done on encrypted data without first having to decrypt it. In other words, this technique allows the privacy of the data/transaction to be preserved while computations are performed on it, without revealing that data/transaction.  Only those with decrypt keys can access what exactly that data/transaction was.

    Homomorphic encryption means that decrypt(encrypt(A) + encrypt(B)) == A+B. This is known as homomorphic under addition.

    So a computation performed on the encrypted data when decrypted is equal to a computation performed on the encrypted data.

    The key question being asked is: How can you convince a system of a change of state without revealing too much information?

    After all, blockchains want to share a (change of) state; not information. On a blockchain, some business process is at state X and now moves to state Y, this needs to be recorded and proved while preserving privacy and not sharing a lot of information. Furthermore, this change of state needs to happen legally, otherwise there is a privacy breach.

    Cryptographic techniques like zero knowledge proofs (ZKPs), which use different types of homomorphic encryption, separate:

    1) reaching a conclusion on a state of affairs

    2) the information needed to reach that state of affairs

    3) show that that state is valid.

    The rest of this post will discuss how the trend towards privacy has led to cryptographic techniques, some old and some new, being used to encrypt transactions and the data associated with them from everyone except the parties involved.  The focus will be on Zero Knowledge Proofs, zk SNARKs, Hawk, confidential signatures, state channels and homomorphic encryption.

    The privacy problem on a blockchain is the main gap for deployment for all of the cryptographic solutions talked about below.

    Outside of a blockchain, there are examples of homomorphic encryption in practice. CryptDB is an example of system that uses homomorphic encryption and other attribute preserving encryption techniques to query databases securely. It is used in production at Google and Microsoft amongst other places. It does have limitations though: you have to define the kinds of queries you want ahead of time and it is easy to leak data. CryptDB provides confidentiality for data content and for names of columns and tables; however CryptDB does not hide the overall table structure, the number of rows, the types of columns, or theapproximate size of data in bytes. One method CryptDB uses to encrypt each data items is by onioning. This allows each data item to be placed in layers of increasingly stronger encryption.

    Confidential Transactions

    Gregory Maxwell designed a cryptographic tool (CT) to improve the privacy and security of Bitcoin-style blockchains. It keeps the amounts transferred visible only to participants in the transaction. CT’s make the transaction amounts and balances private on a blockchain through encryption, specifically additively homomorphic encryption.  What users can see is is the balances of their own accounts and transactions that they are receiving. Zero knowledge proofs are needed to demonstrate to the blockchain that none of the encrypted outputs contain a negative value.

    The problem with Confidential Transactions is that they only allow for very limited proofs as mentioned above. zkSNARKs and Zero Knowledge Proofs (ZKPs) which will be described in detail below, allow you to prove virtually any kinds of transaction validation while keeping all inputs private.

    Zero Knowledge Proofs(ZKPs) 

    Zero Knowledge Proofs (ZKPs) are not new. They were first conceptualized in 1985 in a paper The Knowledge Complexity of Interactive Systems.” A ZKP is a cryptographic technique which allows two parties (a prover and a verifier) to prove that a proposition is true, without revealing any information about that thing apart from it being true. In the case of cryptocurrencies and blockchains this will generally be data about transactional information.

    “A zero-knowledge proof must satisfy three properties:

    1. Completeness: if the statement is true, the honest verifier (that is, one following the protocol properly) will be convinced of this fact by an honest prover.
    2. Soundness: if the statement is false, no cheating prover can convince the honest verifier that it is true, except with some small probability.
    3. Zero-knowledge: if the statement is true, no cheating verifier learns anything other than this fact. This is formalized by showing that every cheating verifier has some simulator that, given only the statement to be proved (and no access to the prover), can produce a transcript that “looks like” an interaction between the honest prover and the cheating verifier.

    The first two of these are properties of more general interactive proof systems. The third is what makes the proof zero-knowledge.”

    zk-SNARKs

    A zk-SNARK (zero-knowledge Succinct Non-Interactive Arguments of Knowledge) is a Zero Knowledge proof that is a way to prove some computational fact about data without revealing the data. Zk-SNARKs are the underlying cryptographic tool used in Zcash and Hawk both of which are building blockchains with ZKPs and both will be explained later. In the case of Zcash these SNARKs are used for verifying transactions and in the case of Hawk they are used for verifying smart contracts. This is done while still protecting users privacy.

    A zk-SNARK is a non-interactive zero-knowledge proof of knowledge that is succinct and for which proofs are very short and easy to verify. They can be thought of as little logic circuits that need to generate a proof of statement to verify each and every transaction. They do this by taking a snapshot of of each transaction, generate a proof and then need to convince the receiving side that the calculation was done correctly without revealing any data except the proof itself. The basic operation of a SNARK execution is a coded input into this circuit which can be decrypted.

    Since zk-SNARKs can be verified quickly, and the proofs are small, they can protect the integrity of the computation without burdening non-participants. It should be noted that this is just now starting to mature but still has limitations. They are very CPU intensive to generate proofs and it takes up to 1 minute to generate new proofs, so scaling is still an issue that needs to be resolved.

    The very first data points for zk-SNARKs will be Zcash which is a combo of distributed state and proof that you own the assets.

    Zcash

    Zcash can be described as an encrypted open, permissionless, replicated ledger.  A cryptographic protocol for putting private data on a public blockchain. Zcash can be thought of as an extension of the bitcoin protocol.  Basically Zcash added some fields to the bitcoin transaction format to support encrypted transactions. Zcash uses SNARKs (ZKPs) to encrypt all of the data and only gives decryption keys to authorized parties to see that data. This could not be done on a public blockchain until now because if you encrypted everything in the past it would prevent miners from checking to see if transactions are valid. ZKPs have made this possible by allowing the creator of a transaction to make a proof that the transaction is true without revealing the sender’s address, the receiver’s address and the transaction amount. Zooko describes this by saying bitcoin has 3 columns, which are the three mentioned above (sender address, receiver address, transaction amount) and Zcash has 4. The 4th column proof doesn’t know the sender address, the receiver address and amount transferred, but it does know that nobody could have created the proof that comes with the encrypted values unless they have a secret key which has sufficient value to cover the amount amount being transacted. This is a proof that the data inside the encryption correctly satisfies the validity constructs. This allows the prevention of double spends and transactions of less than zero.

    Zcash is mostly the same as bitcoin. The miners and full nodes are transaction validators. Zcash uses POW that has miners checking ZKP’s attached to each transaction and getting a reward for validating those transactions. Full nodes are the same except that if you have the private keys you can detect if some transactions have money that is there for you. SNARKs make it so that miners can reject a transaction from someone if their private key doesn’t have enough money for that transaction. By keeping all data private except for the 4th column it omits information from leaking onto a private blockchain which allows for everyone to view information about transactions. zCash has selective transparency while bitcoin has mandatory transparency. This means that Zcash can reveal specific things to specific people by permissioning. It reveals specific transactions that anyone looking at them can verify in the blockchain.

    Some differences from the zCash whitepaper include:

    “Value in Zcash is carried by notes, which specify an amount and a paying key. The paying key is part of a payment address, which is a destination to which notes can be sent. As in Bitcoin, this is associated with a private key that can be used to spend notes sent to the address; in Zcash this is called a spending key.

    A payment address includes two public keys: a paying key matching that of notes sent to the address, and a transmission key for a key-private asymmetric encryption scheme. “Key-private” means that ciphertexts do not reveal information about which key they were encrypted to, except to a holder of the corresponding private key, which in this context is called the viewing key. This facility is used to communicate encrypted output notes on the block chain to their intended recipient, who can use the viewing key to scan the block chain for notes addressed to them and then decrypt those notes.

    The basis of the privacy properties of Zcash is that when a note is spent, the spender only proves that some commitment for it had been revealed, without revealing which one. This implies that a spent note cannot be linked to the transaction in which it was created.”

    Zcash is what’s known as a decentralized anonymous payment schemes (DAP schemes). A DAP scheme enables users to directly pay each other privately: the corresponding transaction hides the payment’s origin, destination, and transferred amount. In Zcash, transactions are less than 1 kB and take under 6 ms to verify — orders of magnitude more efficient than the less-anonymous Zerocoin and competitive with Bitcoin. However the privacy achieved is significantly greater than with Bitcoin. De-anonymizing bitcoin has become much easier through services that track and monitor bitcoin movements and the data associated with it. Mixer services allow for coins to be changed as they move through the system via a central party but this still is not sufficient enough. The zCash whitepaper states:

    “mixes suffer from three limitations: (i) the delay to reclaim coins must be large to allow enough coins to be mixed in; (ii) the mix can trace coins; and (iii) the mix may steal coins. For users with “something to hide,” these risks may be acceptable.  But typical legitimate users (1) wish to keep their spending habits private from their peers, (2) are risk-averse and do not wish to expend continual effort in protecting their privacy, and (3) are often not sufficiently aware of their compromised privacy.”

    The major motivations for ZKPs and the Zcash protocol are 1)privacy and 2)fungibility. Fungibility is being able to substitute individual units of something like a commodity or money for an equal amount. This can be a real problem when some units of value are deemed less because they are considered “dirty”. Hiding the metadata history doesn’t allow for a coin with a bad history to be rejected by a merchant or exchange.  Gregory Maxwell said “Insufficient privacy can also result in a loss of fungibility–where some coins are treated as more acceptable than others–which would further undermine Bitcoin’s utility as money.”

    Zcash is expected to launch soon and with that the genesis block of the Zcash blockchain. This will allow, like the bitcoin blockchain anyone in the world to mine, for Zcash. It will be an open, permissionless system (fully decentralized). Users will be able to send it to anyone using zero-knowledge privacy.

    ZCash’s use of cutting edge cryptographic techniques comes with substantial risks. A cryptographic attack that permits the forging of zero knowledge proofs would allow an attacker to invisibly create unlimited currency and debase the value of Zcash. Attacks of this kind have been found and fixed in the recent past. Fortunately, the metadata hiding techniques used in Zcash tread are more production-hardened and can be considered less risky.

     

    Hawk

    Andrew Miller in his whitepaper“Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts” has developed a programmable smart contract system which works in much the same way as zCash for smart contracts. Hawk does not store financial transactions on the blockchain and keeps the code of the contract private, data sent to the contract and money sent and received by the contract from the public. It is only the proof that can seen and all other useful information is hidden. Like Zcash, transparency is selective in Hawk and wouldn’t need to be used by all smart contracts but based on use cases and the preferences of the parties involved. It also aims to tackle the isssues of privacy and fungibility in much the same way as the zCash protocol.

    The Hawk whitepaper does a great job of describing the motivation for contractual security it seeks to provide for financial transactions:

    “While on-chain privacy protects contractual parties’ privacy against the public (i.e., parties not involved in the financial contract), contractual security protects parties in the same contractual agreement from each other. Hawk assumes that contractual parties act selfishly to maximize their own financial interest. In particular, they can arbitrarily deviate from the prescribed protocol or even abort prematurely. Therefore, contractual security is a multi-faceted notion that encompasses not only cryptographic notions of confidentiality and authenticity, but also financial fairness in the presence of cheating and aborting behavior.”

    According to Andrew Miller, Hawk is based on several cryptographic primitives. It uses the same zero knowledge proof library as Zcash, which is called libsnark. Hawk also uses custom implementations of a lattice-based hash function, and public key encryption. Hawk uses a jSnark tool which is open sourced.

    In Hawk, each party generates their own secret keys. Miller stated that “For each contract, there is also a trusted public parameter, similar to Zcash. The only way to generate these parameters is a process that involves generating a secret value in an intermediate step, which needs to be erased at the end of the protocol. To borrow Zcash’s term for this, it’s like a “toxic waste byproduct” of the setup procedure, and like all industrial waste, it must be securely disposed of. There are many options… we could do what Zcash does and use a multi-party computation to generate these parameters, simply let a trusted party do it (the trusted party only needs to be used once and can go offline afterwards), or use trusted hardware like SGX.”

    Miller has said there are some differences between Ethereum contracts and Hawk contracts. Unlike Ethereum, the input language for private contracts in Hawk is C code. A private Hawk contract is not a long running stateful process like an Ethereum contract, but rather a 1-shot contract that proceeds in phases, where it first receives the inputs from each party, and then it computes the outputs for each party. After the outputs are computed, the contract is finished and no longer holds any balance. So, it is a slightly different computing model. Hawk supports both private contracts as described above, as well as public contracts which are exactly like those in Ethereum. (No privacy guarantees are provided for the public contracts, though).

    As in Zcash, there are some challenges to blockchain scaling and optimizing cryptographic schemes so they are efficient when using ZKPs. Hawk tries to do as much computation off chain as possible. This is done because in public blockchains on chain computing gets replicated to every node and slows things down dramatically. Producing the proof can take up to several minutes (which is long) and can be costly. Nodes checking the proof only take milliseconds to do that. Data from the whitepaper: In Hawk, it takes about a minute of CPU time for each participant in a Hawk contract. On chain computation takes about 9 to 20 milliseconds.

    Hawk has not announced a release date yet as they are still working on optimizing their snark compiling tools to enhance performance.

    State Channels

    State channels allow for a payment channels that are off chain and allow for updates to any type of applications that have a change of state. Like the Lightning Network,  two or more users can exchange payments that would normally require a blockchain transaction without needing to publish them on the blockchain or wait for confirmations except when setting up or closing out the channel.

    Vitalik Buterin explains this in his paper for R3CEV Ethereum Platform Review

    “State channels are a strategy that aims to solve the scalability challenge by keeping the underlying blockchain protocol the same, instead changing how the protocol is used: rather than using the blockchain as the primary processing layer for every kind of transaction, the blockchain is instead used purely as a settlement layer, processing only the final transaction of a series of interactions, and executing complex computations only in the event of a dispute.

    State channels are not a perfect solution; particularly, it is less clear how they extend to massively-multi-user applications, and they offer no scalability improvements over the original blockchain in terms of its ability to store a large state size – they only increase de-facto transaction throughput. However, they have a number of benefits, perhaps the most important of which is that on top of being a scalability solution they are also a privacy solution, as the blockchain does not see any of the intermediate payments or contracts except for the final settlement and any disputes, and a latency solution, as state channel updates between two parties are instant – much faster than any direct on-blockchain solution, private or public, possibly could be, and potentially even faster than centralized approaches as channel updates from A to B can be secure without going through a centralized server.”

    State channels aim to address the scalability issues, privacy issues and confirmation delays associated with public blockchains while allowing actors who don’t necessarily trust each other to transact.

     

    Do You Need A Blockchain At All? Is Consensus Needed?

    For many people all of these cryptographic methods which mask all of the transactional data will come as a surprise.  The blockchain is supposed to be a transparency machine in which anyone can join the network and as a result view all information on that network. Even in private blockchains, there is a more open view into the data then the protocols that have been mentioned in this post. Another question which might come to mind is if consensus is even needed since everything is private but the proof. If the proof is only between the two parties involved in the transaction why is consensus needed and why use a public blockchain. It may seem counterintuitive, but the answer is that yes a public blockchain is needed and so is consensus and its due to the privacy of the proofs. Essentially, complete transparency is needed to maintain the privacy of the proofs.

    ZKPs and blockchains complement each other.  You can’t just use one to replace the other. A blockchain is used to make sure the entire network can agree on some state which may or may not be encrypted. ZKPs allow you to be confident about some properties of that state.  In this scenario, you still need a canonical source of truth. A view key that reveals all incoming transactions but not outgoing ones. In order for this to happen, you need a fully decentralized ledger with consensus where everyone agrees with the data written there.

    For example, Zcash has data which contains information which is useless and unreadable to most actors. It’s a database of commitments and opaque pieces of data. It’s just a way to synchronize data between actors. (Zooko Wilcox has publicly stated that if Chainalysis graphed this out it would just be a series of timestamps of when a transaction occurred.) In cases where the number of transactions are low, then timing attacks could reveal the originator of transactions, imagine this to be equivalent of just one node connected to a Tor network.

    The real emphasis is on the wallet side for actors because this allows them to spend money and move assets around, in bitcoin you can take a private key and move bitcoin. Now it’s more. It’s a private key and a set of secrets you keep to prove previous proof and generate a new proof that you use to convince others. For this, a fully decentralized ledger is needed with consensus where everyone agrees with the data written there.

    A blockchain is necessary because you need consensus layer from everyone: It is necessary to have an agreement of proofs in the ledger to move assets around later on, if that proof isn’t available in every node then you can’t convince anyone of the proof when you need to move assets later on. These proofs need to be stored in an open way so the proofs can be seen as being verified and accepted by receiving parties.

    There are two different layers: 1) Needs to be agreement on what proofs everyone accepts 2) Needs to be agreement on what you can prove and what happens on proof of zero knowledge and what happens once you know the information. How do you generate proof and pass that information to the next person?  The key is to get authority of the transaction by adding a proof or metadata to the transaction with some type of conditional script (if then statements for transaction acceptance). This code contains transaction validity rules. A person sees proof from outside but they don’t know if the rule itself has been triggered or not.  Now that have you privacy from ZKPs,  in order to comply with the transaction, you need to prove that the transaction abides by the rules. So you can take 2 proofs and create new proofs that the person receiving them can point at and verify that the proof is accepted by the entire network. Once the proofs have a meaning to you based on the rules, you can agree they were proved in the past and can be used in the future to transact and transfer money.

    Limitations

    ZKPs are moving out of the realm of theory and becoming production strength. Now is the time to see how practical they are. They are only now going to start having really world tests and they still suffer from big scalability issues. The work of developing a proof is enormous and has massive computation costs. As mentioned before, in Zcash in order to create a proof and move money from someone else it takes between 45 seconds and 1 minute on a really strong computer. Presently, people are working on making SNARKs and ZKPs more efficient by allowing for more proofs per second or for more elaborate proofs in the same amount of time.

    Deep changes need to be made architecturally in blockchain technology in order to understand knowledge of ZKP architecture. You need to understand the constraints of what you can prove and at what scale.

    Very Special Thanks to Zaki Manian (@zmanian), Andrew Miller (@socrates1024) Jonathan Rouach (@jonrouach), Anish Mohammed (@anishmohammed)


    Hawk section provided by Andrew Miller from a series of questions I asked.


    [linkedinbadge URL=”https://www.linkedin.com/in/georgesamman” connections=”off” mode=”icon” liname=”George Samuel Samman”] is Blockchain Consultant & Advisor

     

     
  • user 7:35 am on September 9, 2016 Permalink | Reply
    Tags: , ,   

    Shifting Values? Millennials, the Sharing Economy and the (Exaggerated) Death of Asset Ownership 

    AAEAAQAAAAAAAAhrAAAAJDViOTBmMWVjLWVlZjAtNDljNC1iN2VjLWUxNDAxZTU1Y2JmNAA millennial friend of mine recently mentioned the shift from CapEx to OpEx in the millennials as something that was likely to define new models in lots of industries.

    ‘The what now?’ I asked

    ‘No one buys anything any more,’ he said. ‘The most visible are ride-sharing apps like Uber, but it’s everywhere.’

    The corporate world has been doing it for years, starting with sale and lease back, then business process outsourcing and all manner of ‘servisification’, which migrated to cloud based models for service delivery. Now the suggestion is that it’s infecting consumer models too. While home ownership rates worldwide have in general been rising, they have been in decline in the US for some time. While there are other examples of similar declines, it is too early to say whether this represents a millennial shift, or more part of the fallout from the 2008 financial crisis. In addition, the most significant declines in home ownership in the US have actually been with 35 to 44 year olds.

    There remains a good degree of data on car ownership declines among millennials, and Uber’s stated objective is to eliminate private car ownership altogether. The Atlantic published a wonderful piece in 2012 about how millennials were the cheapest generation, and Time magazine labelled them lazy and entitled narcissists, but the theory doesn’t seem to be holding water – Millenials are buying more cars than ever for their age group, even in the US. Ultimately, economically, it’s better for the world that we don’t own cars. They’re parked for 95% of their lives, and as such represent an appalling waste of resources. But it’s not quite happening yet.

    The has a lot going on besides cars and houses. Cryptocurrencies and have the potential to scale community currencies, which have been in operation for decades. There’s a bunch of Marxist theory attached, and certainly political concern at the notion that currency control should somehow be diluted by uppity anarchists. So there’s real potential for significant social and political change with these concepts; the reactions we’ve seen to AirBnB and Uber in relation to trades unions, licensing authorities, tax controllers and other regulators represent merely the tip of the iceberg.

    So, the data doesn’t really support a death of car ownership, and the jury’s still out on whether home ownership has really been impacted by some Millennial cultural shift. But these are cultural changes on a grand scale. Those of us who have been alive for the early years of the Internet will probably not be around to see its most profound impacts on the world – but there’s still a lot going to happen in the next few decades!


     [linkedinbadge URL=”https://www.linkedin.com/in/anthonybehan1″ connections=”off” mode=”icon” liname=”Anthony Behan”] is Telecommunications Industry Offering Leader, Watson IoT Division at IBM

     
c
compose new post
j
next post/next comment
k
previous post/previous comment
r
reply
e
edit
o
show/hide comments
t
go to top
l
go to login
h
show/hide help
shift + esc
cancel
Close Bitnami banner
Bitnami