0% found this document useful (0 votes)
8 views21 pages

Blockchains For Government

This document reviews the use of blockchain technology in government, exploring its concepts, use cases, and associated challenges. It discusses the evolution of blockchain, its decentralized nature, and how it can enhance security and trust in governmental processes, particularly in sectors like healthcare and energy. The article also highlights the technical and adoption challenges faced by governments in implementing blockchain solutions and provides insights into potential solutions for these issues.

Uploaded by

Rhea Susan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views21 pages

Blockchains For Government

This document reviews the use of blockchain technology in government, exploring its concepts, use cases, and associated challenges. It discusses the evolution of blockchain, its decentralized nature, and how it can enhance security and trust in governmental processes, particularly in sectors like healthcare and energy. The article also highlights the technical and adoption challenges faced by governments in implementing blockchain solutions and provides insights into potential solutions for these issues.

Uploaded by

Rhea Susan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

Blockchains for Government: Use Cases and Challenges

JAMES CLAVIN, SISI DUAN, HAIBIN ZHANG, VANDANA P. JANEJA, KARUNA P. JOSHI,
and YELENA YESHA, University of Maryland, Baltimore County
LUCY C. ERICKSON, American Association for the Advancement of Science
JUSTIN D. LI, Department of Homeland Security, Science and Technology Directorate

Blockchain is the technology used by developers of cryptocurrencies, like Bitcoin, to enable exchange of financial “coins” be-
tween participants in the absence of a trusted third party to ensure the transaction, such as is typically done by governments.
Blockchain has evolved to become a generic approach to store and process data in a highly decentralized and secure way.
In this article, we review blockchain concepts and use cases, and discuss the challenges in using them from a governmental
viewpoint. We begin with reviewing the categories of blockchains, the underlying mechanisms, and why blockchains can
achieve their security goals. We then review existing known governmental use cases by regions. To show both technical and
deployment details of blockchain adoption, we study a few representative use cases in the domains of healthcare and energy
infrastructures. Finally, the review of both technical details and use cases helps us summarize the adoption and technical
challenges of blockchains.

CCS Concepts: • Computer systems organization → Redundancy; • Computing methodologies → Distributed com-
puting methodologies; • Security and privacy → Distributed systems security;

Additional Key Words and Phrases: Blockchains, applications, security, e-health, e-government, critical infrastructure 22
security

ACM Reference format:


James Clavin, Sisi Duan, Haibin Zhang, Vandana P. Janeja, Karuna P. Joshi, Yelena Yesha, Lucy C. Erickson, and Justin D.
Li. 2020. Blockchains for Government: Use Cases and Challenges. Digit. Gov.: Res. Pract. 1, 3, Article 22 (November 2020), 21
pages.
https://doi.org/10.1145/3427097

This research was supported by an NSF Workshop supplement to NSF award 1747724, Phase I IUCRC UMBC: Center for Accelerated Real-
Time Analytics (CARTA). For J. Li, this activity was supported by a U.S. Department of Homeland Security (DHS) American Association for
the Advancement of Science (AAAS) Fellowship, sponsored by DHS and administered by the Oak Ridge Institute for Science and Education
(ORISE) for the DOE under contract number DE-SC0014664. All opinions expressed in this article are those of the authors and do not
necessarily reflect the policies and views of DHS, ORAU, or ORISE.
Authors’ addresses: J. Clavin, S. Duan, H. Zhang, V. P. Janeja, K. P. Joshi, and Y. Yesha, University of Maryland, Baltimore County, 1000 Hilltop
Circle, Baltimore, MD 21250; emails: {jclavin, sduan, hbzhang, vjaneja, karuna.joshi, yeyesha}@umbc.edu; L. C. Erickson, American Associ-
ation for the Advancement of Science, 1200 New York Ave, NW Washington, DC 20005; email: lcerickson@gmail.com; J. D. Li, Department
of Homeland Security, Science and Technology Directorate, 245 Murray Lane, SW Washington, DC 20528; email: jdli@alumni.stanford.edu.
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that
copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first
page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy
otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions
from permissions@acm.org.
© 2020 Association for Computing Machinery.
2639-0175/2020/11-ART22 $15.00
https://doi.org/10.1145/3427097

Digital Government: Research and Practice, Vol. 1, No. 3, Article 22. Publication date: November 2020.
22:2 • J. Clavin et al.

1 INTRODUCTION
Blockchain is technology that builds a trustworthy service in an untrustworthy environment. It uses replication
of distributed systems to build a decentralized service that achieves the same goals with a trusted centralized one.
Since 2008, blockchain implementation has exploded, primarily driven by its native ability to support any type of
digital transaction. Blockchains have been adopted by Wall Street investment firms to enable transaction cost re-
duction, Silicon Valley startups as an alternative means of raising funds through initial coin offerings, and by one
government, Venezuela, to encourage global investment into the country. The algorithms that power these dis-
tributed transactions have given rise to an altogether new method for securely storing data in a digital world that
is oftentimes adversarial. Because blockchain guarantees high service availability as well as data integrity, any
industry in which transactions or processes rely on the use of a trusted third party, or where a strong guarantee
of security is required, can consider implementing blockchain solutions, as should governments worldwide.
What attributes of a blockchain may be of use in government? Blockchain provides a means to ensure that any
copy of the data will always be available, verifiable, and trustworthy. It functions like an old Xerox machine in
terms of data dispersion, in the sense that it can make copies of any item available to anyone who uses it. With
respect to trust, it acts more like a notary public, guaranteeing that any copy of data is authentic and that the
copies cannot be forgotten or counterfeited. Finally, in terms of transaction processing, it functions like a general
ledger in which transactions must be recorded in the same order.
To handle data sharing, transaction processing, and validation, there is a set of replicated servers, called nodes.
Each node runs a consensus algorithm, which provides a way to reach agreement with every other node about
a given transaction, without any human intervention. The algorithm must enable the system to proceed even
when some percentage of the nodes arbitrarily fail. There are various algorithms, discussed in detail later, but
it is noteworthy that democratic concepts such as quorum and majority voting are incorporated into them. The
overarching goal of such a system is to use replication to provide security (specifically availability and integrity),
and to enable the distributed servers to behave like a centralized decision maker.
How many failures blockchains can withstand—or the percentage of nodes that can fail without compromising
security—depends upon the particular use case and the types of failures. For example, a distributed file system
may need to withstand “crash” failures, or those failures that occur when faulty nodes simply stop processing
requests. Such systems (e.g., Google File System [54]) are commonly able to mask the failures of up to one-half
of the nodes. Failures like software bugs, hardware errors, and adversarial (cyber) attacks cause Byzantine faults.
Byzantine Fault Tolerance (BFT) systems withstand up to one-third of their nodes failing by providing stronger
guarantees between nodes through cryptographic techniques.
Blockchain history. The distributed systems technical concepts that underpin blockchain were proven in 1982
by Leslie Lamport. Lamport introduced and solved the distributed consensus problem for BFT, in a proof he
named the Byzantine Generals Problem [76]. The solution states that to tolerate one arbitrary failure, the system
requires at least four replicated nodes so that they can reach a consensus on a specific decision. A more general-
ized statement is that to tolerate f Byzantine failures, the system has to have n ≥ 3f + 1 nodes. In 1999, Miguel
Castro and Barbara Liskov became the first to apply Lamport’s consensus in a functioning algorithm they called
Practical Byzantine Fault Tolerance (PBFT). [30] In 2008, a pseudonymous individual, or group, named “Nako-
moto” used consensus protocols, similar to BFT, to create Bitcoin. Bitcoin’s innovation was to build a decentral-
ized system as a trusted broker for exchanging money, and acts in a similar way as government and banking
systems do with cash. Viewed historically, people used different types of exchange for trading things of value. In
the case of Bitcoin, one of the most famous first purchases was pizza. Purchasing that same pizza over the ages
would have been done differently, as is shown in Figure 1, each with different trust providers.
Bitcoin uses an approach called Proof-of-Work (PoW)-based consensus (described in greater detail later) to
allow users to exchange digital “coins” with each other with confidence. Different from the classic BFT protocols
that tolerate a fraction of node failures, PoW assumes a slightly different failure model called the computational

Digital Government: Research and Practice, Vol. 1, No. 3, Article 22. Publication date: November 2020.
Blockchains for Government: Use Cases and Challenges • 22:3

Fig. 1. The evolution of how people exchange products (from exchanging products directly to using currency, credit, and
cryptocurrency, up to the possible future, with Facebook proposing “Libra.”).

threshold failure model. The system is considered valid as long as no adversary controls more than 51% of the total
computational power. Through PoW, the system supports an open and transparent pseudonymous environment
where any user can participate. However, PoW requires a lot of compute power, as the Bitcoin system retools
itself constantly to keep the algorithm tuned to enforce time restrictions on transaction validation.
In this article, we review what a blockchain is, how the underlying mechanism works, the technical and
adoption challenges, and the governmental use cases. There are several survey works in the literature, [36,
116], including ones about the consensus mechanisms for both permissionless [89, 115] and permissioned
blockchains [26], as well as for BFT protocols [36, 99]; some works have reviewed blockchain applications with
a focus on e-government [11, 21]. Compared with existing survey works, we aim to review the governmental
applications of blockchains, with a focus on the technical perspective of the applications. Indeed, one of the
major challenges for blockchain adoption is the gap between the underlying technology and the understanding
of the capabilities [26, 33]. Therefore, reviewing the use cases and applications of blockchains from the technical
perspective can help both technical developers better understand how the technology could be improved and
also decision makers better understand the pain points of the technology limitations and capabilities.
The rest of the article is organized as follows with an aim to answer the following questions:
• What is blockchain, its security goals, and its underlying mechanism? This is not considered as a new
contribution. Indeed, many online and research articles have introduced blockchain concepts. However,
we found that a lot of existing articles provide inaccurate information or describe the concepts in detail,
which makes it challenging for the general audience. Therefore, we answer the question by introducing
different layers of blockchains, their capabilities, and how each layer is composed technically. Specifically,
in Section 2, we lay out in detail a three-layer view of the technology used in both permissionless and
permissioned blockchains and discuss their capabilities and limitations. With a slant toward government
usage, the section will provide a foundation to discuss applications built on top of the technology.

Digital Government: Research and Practice, Vol. 1, No. 3, Article 22. Publication date: November 2020.
22:4 • J. Clavin et al.

• What are the governmental use cases for blockchains? What is the best blockchain model for each use case?
What are the lessons learned? In Section 3, we present use cases from both researchers and white papers in
the field, as well as those applied by decision makers around the world. We aim to group the applications
by regions and countries to observe the trend in the adoption of blockchains. For each type of use case,
we also aim to discuss whether it is appropriate to use blockchain as a solution, the technical challenges,
and how the challenges could potentially be solved.
• How are blockchains deployed in practice? What features of blockchains are unique in each use case? To show
in detail how blockchains can be used in practice, in Section 4 we study governmental projects in two
major sectors: healthcare and critical infrastructures (with a focus on energy infrastructures). We review
different aspects in each sector how blockchains are used, present the benefits of using blockchains in
each use case, and discuss the adoption and technical challenges.
• What are the adoption and technical challenges? Blockchains cannot solve all problems. In fact, blockchain
is not mature yet, as challenges exist for both adoption and technology development. It is desirable to
discuss the challenges from both adoption and technology development perspectives. Understanding the
adoption challenges can greatly help developers and researchers improve the technology. However, un-
derstanding the technical challenges will benefit decision makers in learning the capability of the tech-
nology and foster the adoption of the technology. In Section 5, we summarize and discuss both adoption
and technical challenges, and discuss the potential solutions to address these problems.

2 BLOCKCHAIN CONCEPTS
All blockchains work to make decentralized nodes achieve an agreement on the total order of transactions
through cryptography and an underlying consensus mechanism. Technically, blockchains generally fall into
one of two categories: permissionless or permissioned. Permissionless blockchains allow anyone to participate,
are considered “open,” and have trust provided by algorithms. In contrast, permissioned blockchains are usually
“private” or “consortium” and all participant identities are known but no participant needs to be trusted.
In practice, variants exist where there is no clear line between different types of blockchains. For instance,
Ethereum, a typically permissionless blockchain, can be set up as a private blockchain called the Ethereum
private network [48]. Efforts have also been made to achieve anonymity for permissioned blockchains [24, 61].

2.1 A Layered View of Blockchain


Blockchains can be abstracted into three different layers [7], as illustrated in Figure 2. At the core of blockchain
is layer 1: BFT consensus—also known as state machine replication—which is a generic approach to tolerate
failures. BFT consensus has different forms, ranging from conventional BFT protocols to PoW-based consensus.
Despite fundamental differences in how consensus is achieved, any form must solve the same problem: how
to enable nodes to reach consensus on the total order (i.e., consistency) of transactions submitted by clients in
the form of requests. After nodes reach a consensus about the order, the data/operations of the transactions are
then processed according to the order of the transactions. As a result, distributed nodes functionally behave as
if there were one centralized node. This ensures that there is only one sequence of client transactions, known
as “the longest chain.” Layer 2 of blockchain is the smart contract, which is essentially software code. A smart
contract provides an interface for blockchain developers to implement new functions. Smart contracts can then
facilitate, verify, or enforce the execution of business transactions. A smart contract can be viewed as a program
that connects the underlying consensus protocols with layer 3, applications and use cases.

2.2 Building the Hash Chain


The cryptographic concepts of “hashing” and “digital signatures” provide tamper proofing and validation. One
way hash functions generate a unique output of alphanumeric text given an input of a list of transactions. Change

Digital Government: Research and Practice, Vol. 1, No. 3, Article 22. Publication date: November 2020.
Blockchains for Government: Use Cases and Challenges • 22:5

Fig. 2. Overview of blockchains: categories, underlying techniques, and use cases.

a single thing about the list of transactions and the resulting hash is significantly different. Digital signatures
like Rivest–Shamir–Adleman or Elliptic Curve Digital Signature Algorithm are used to “sign” transactions. The
hashes are then linked together in a chain of blocks, with any block except the first one, called the genesis block,
pointing to prior hashes and signatures. Such a hash chain ensures that no one can manipulate the contents of
any block or reverse the chain order.

2.3 Permissioned Blockchains


Permissioned blockchains provide consensus and security using provably secure distributed consensus protocols.
The consensus protocols do not involve expensive procedures such as in PoW. Therefore, permissioned systems
have low latency (the time between the client sending a transaction until the client receives a reply), they are
also scalable (both in the number of clients and transactions as well as the number of servers) [112], and they
consume less energy than permissionless blockchains (described in detail later).
Most permissioned blockchains, especially those widely employed or piloted by government, use provably
secure BFT protocols. Among these BFT solutions, the leader-based protocols are widely used, such as PBFT [30]
and its variants [106, 108]. In these types of protocols, there is a specific leader, which proposes the order of
transactions. The nodes then communicate with each other in several steps to reach agreement on the order.
In most leader-based protocols, each node sends messages to all other nodes in each step and collects matching
messages from a fraction of nodes before moving to the next step. If the leader is potentially faulty or malicious,
other nodes will run a leader change protocol until a new leader is elected.
On top of the consensus protocols, blockchains have different approaches to store the transactions. Figure 3
illustrates a typical system architecture used by permissioned blockchains. Specifically, after receiving requests
from the clients, a number of nodes run a BFT protocol to assign order to the transactions. The transactions and
their order are then forwarded to all other nodes in the system. Finally, the transactions are stored and processed
according to that order. In this architecture, the nodes that store the transactions act as learners that passively
learn the order from the consensus nodes.

Digital Government: Research and Practice, Vol. 1, No. 3, Article 22. Publication date: November 2020.
22:6 • J. Clavin et al.

Fig. 3. The normal operation for a permissioned blockchain running PBFT [30]. Control messages refer to the messages for
nodes to reach a consensus.

Numerous BFT protocols have been proposed in the literature [34, 37, 41, 43, 59, 106]. Chain-based approaches
organize nodes in a logical chain where a node only needs to communicate with its previous node and its sub-
sequent node, if any [42], avoiding the all-to-all communication described previously, resulting in performance
improvements. Another approach is a hybrid that combines BFT protocols, such as Aliph [59]. The reason Aliph
takes a hybrid approach is to combine the best features from more than one BFT protocol is because there is no
one-size-fits-all consensus protocol. In Aliph, the protocol can use one cheap protocol to achieve great perfor-
mance with fewer failures. When failures occur or become more frequent, the system switches to another more
expensive one to guarantee system security.

2.4 Permissionless Blockchains


Most permissionless blockchains adopt a “Proof-of-Something” strategy. In the case of Bitcoin, this is PoW, a
mathematical challenge offered to all nodes in the system to try to overcome (or work through) by an activ-
ity called mining. Once mined, a node can propose a block of transactions and get rewarded in Bitcoin if the
proposal is accepted. The drawback to this approach is that throughput (the number of transactions processed
per second) is limited, and the energy consumption is high. Furthermore, collusion occurs—nodes form cartel-
like entities called mining pools—concentrating mining activity under the control of one group. With mining
pools, the blockchain becomes less decentralized and therefore less secure, and more susceptible to attack and
manipulation.
Compared with BFT-based consensus, PoW-based consensus does not have a fixed leader and can be viewed
as a system where the leader changes after each block of transactions. To propose a new transaction, a node
needs to first solve PoW from the previous transaction. When a node proposes a transaction n, it also generates
a pseudorandom number that is called a cryptographic nonce. As illustrated in Figure 4, the nonce is broadcast
to all other nodes. Nodes compete to become the next leader by selecting random pending transactions and
generating a hash of the selected transactions. The node that first generates a hash smaller than the nonce value
is the winner and becomes the next leader. Compared with BFT consensus, PoW-based consensus involves fewer
messages for nodes to reach a consensus on the transactions. The blockchains based on it can easily scale to
thousands of nodes. The challenge is that more than one node might solve the puzzle at the same time, creating
a fork of the hash chain. Nodes in the PoW consensus will detect the fork, eventually agree on the longest hash
chain, and use it. It takes time for each transaction to be finalized after it has been proposed, usually after six
blocks, each taking about 10 minutes, in the case of Bitcoin—about an hour. This finalization time can be reduced
using different approaches.

Digital Government: Research and Practice, Vol. 1, No. 3, Article 22. Publication date: November 2020.
Blockchains for Government: Use Cases and Challenges • 22:7

Fig. 4. The message flow for PoW-based blockchains. Control messages are the messages for nodes to compete for PoW.

Table 1. Permissionless Systems/Cryptocurrency and the Proof They Use to Come to a Consensus

System/Cryptocurrency Proof-of-Something Strategy


Bitcoin [87], Ethereum [117] Proof-of-Work Computing a nonce
Ethereum-PoS, Hybrid Consensus [98], Elastico [80] Proof-of-Stake PoW with weighted value
Hyperledger Sawtooth [95] Proof-of-Elapsed-Time PoW done by computer processors
PoA Network [100] Proof-of-Authority PoS with weighted reputation

Multiple Proof-of-Something approaches have been proposed to enhance the performance of PoW-based con-
sensus, some of which are shown in Table 1. The workflow usually remains the same, but the protocols use other
strategies. For instance, Proof-of-Elapsed-Time replaces PoW with trusted hardware, using Intel Software Guard
Extension (SGX), a trusted execution environment. Specifically, computers running an Intel SGX processor have
a set of security-related instruction codes built into them that makes the piece of hardware protected. Instead of
generating a hash to solve PoW, every node utilizes SGX to wait for a random amount of time. The node that
finishes waiting earlier than all other nodes “wins” and can propose new transactions. Proof-of-Elapsed Time is
in use as a consensus option in the Hyperledger Sawtooth platform [95]. The major benefit is a greatly improved
system performance. The drawback is that each trusted execution environment has its own vulnerability, and
one has to trust a single vendor to use the blockchain. Other examples include Proof-of-Stake (PoS) and Proof-
of-Authority (PoA). PoS and PoA are each designed to improve the performance of Ethereum, and in both a small
group of nodes is selected as representatives. PoA selects the representatives based on their reputation, whereas
PoS selects representatives using one of several approaches. In Delegated PoS, nodes can vote for certain replicas
to select them as representatives. After the group of representatives is selected, the nodes have the authority
to propose new transactions and notify others of the results. The major challenge with representative-based
systems is that the selected representatives must behave correctly to ensure system correctness. For instance, in
PoA, the reputation system must be trusted, and one has to assume that malicious nodes do not have motivation
to build up their reputation and then corrupt the entire system.

2.5 Smart Contracts


Smart contracts are programs that automatically fire when nodes come to consensus, without any human inter-
vention. Smart contracts are not the normal contracts people use. Instead, the nodes in a blockchain are config-
ured to check a series of conditions to see whether the triggering criteria has been met. If the requirements are
met, then the nodes execute an agreed upon contract, a program that executes business-defined functions. Smart

Digital Government: Research and Practice, Vol. 1, No. 3, Article 22. Publication date: November 2020.
22:8 • J. Clavin et al.

contracts allow users to deploy new capabilities and functions while the blockchains are running; services do
not have to be stopped. Specifically, developers could write a new smart contract that includes a set of functions.
After the contract is deployed on the blockchain, authorized users could call the contract to use those functions.
Other running services on the blockchain do not have to be interrupted at all to support these new functions.
The most popular smart contract platforms include the Ethereum Virtual Machine (written in a language called
Solidity) and Hyperledger Fabric’s Chaincode (written using a combination of the languages Go, node.js, and
Java). Since all blockchain transactions are included in the hash chain, and therefore unchangeable, having a
bug in the contract, or a flaw that can be exploited, introduces risk into the system. It is also worth noting that
the use of smart contracts will likely degrade the performance of the system, as observed by several research
works [15, 60].

2.6 Blockchain vs. Databases


Modern databases are frequently designed to be replicated and distributed to achieve high reliability. The most
typical method is primary-backup replication, in which the data are replicated as copies across multiple servers
or virtual machines. When one copy is lost, additional copies are available to continue the service. This shares
certain similarities with blockchain systems, with three major differences. First, distributed databases focus
on the management of data. In contrast, blockchains aim to ensure data security. Second, blockchain systems
aim to tolerate Byzantine/arbitrary failures, whereas distributed databases usually handle only crash failures.
Third, blockchain systems aim to achieve the strongest guarantee of data consistency across multiple machines,
whereas distributed databases usually only achieve weaker guarantees of data consistency, such as causal con-
sistency [25]. In causal consistency, data can be written concurrently by different nodes, introducing potential
conflicts to be resolved later. In comparison, blockchain systems guarantee linearizability, the strongest consis-
tency guarantee in distributed systems [62]. Informally, linearizability ensures that the data are always consistent
across all nodes, so the distributed nodes behave like a centralized one.

3 GOVERNMENT ADOPTION OF BLOCKCHAIN


We have done a review of the known projects and use cases supported by governments across the world. Our
goal is to provide a comprehensive and representative, but not exhaustive, list. Our purpose is to discuss several
applications that are both representative and meaningful. Indeed, with the increasing interest in blockchains,
applications can be discovered in potentially all industries. A lot of them, however, are far away from being
practical or useful. Therefore, we select the representative use cases and group them by countries and regions.
In this way, we will be able to better see the trend in government use cases. Government adoption of blockchain
can be viewed from regulatory, consumer, and developer perspectives. As a governing body, a state may wish to
monitor how blockchains are used, as in the case of cryptocurrencies. As a user of applications, governments may
use blockchains to improve processes. And in some instances, a government may develop its own blockchain-
based application to address an internal need.
In this section, we review the governmental efforts made by countries worldwide in piloting blockchain so-
lutions, the setup, and lessons learned. Since blockchains are widely used by cryptocurrencies, most of the ap-
plications reviewed were financial. In Table 2, we include other domains such as medical, infrastructure, city
governance, asset and data management, and education.

3.1 U.S. Government


The U.S. Health and Human Services (HHS) department has developed an application called Accelerate for
management of contract billing that utilizes blockchain, AI, ML, and process automation. Accelerate is designed
to better manage the HHS portfolio of 100,000 contracts worth around $25B across about 50 systems. The
blockchain within Accelerate captures a pointer to unstructured data (e.g., documents) rather than storing the

Digital Government: Research and Practice, Vol. 1, No. 3, Article 22. Publication date: November 2020.
Blockchains for Government: Use Cases and Challenges • 22:9

Table 2. Blockchain Use Cases Adopted by Governments and the Focus of Blockchain Applications

Use Cases Representative Countries Focus


Medical and healthcare China, United States, Switzerland, Supply chain, Internet-of-Things, etc.
Phillippines, Japan, Brazil, etc.
Financial applications (Almost) All Cryptocurrencies, asset management, etc.
Critical infrastructures South Korea Asset management, optimization, etc.
Blockchain city Malaysia Cryptocurrency, data management
Asset management Georgia, Sweden, Switzerland Land registry, property transactions, etc.
Education Japan, Malta Certificate management
Data management Phillipines, Australia Cloud data management

Fig. 5. Pubmed.gov keyword “blockchain” search results January 2008 through December 2019, as of August 2020.

data itself. Accelerate was able to get contract information dispersed across the entire bureaucracy through repli-
cation of data and became the first federal blockchain-based application to be certified by a designated approving
authority, an internal senior management official, as having the authorization to operate [49], indicating that the
system had an acceptable level of risk and may be used in government applications. Accelerate was expanded to
acquisition management—getting contract information to researchers more readily so they could find suitable
materials for their research. HHS has projected savings at the point of purchase of up to $720M over time and may
expand Accelerate into clinical data—HHS leadership discussed using blockchain for tracking sepsis data [104].
Research is being done by the U.S. Centers for Disease Control and Prevention (CDC) to use blockchain to
help track public health outbreaks such as hepatitis A [96]. In 2017, the chief software architect for the CDC’s
Center for Surveillance Epidemiology and Laboratory Services began building proofs of concept for improving
surveillance across state lines. Since then, the CDC and IBM have come together to work on a blockchain-backed
solution for tracking the ongoing opioid disease crisis [83]. We assume that using blockchain to track COVID-19
is a consideration. Figure 5 shows that interest in blockchain for use in biomedical applications is growing rapidly
after many years of no published research. Most of these publications are for theoretical research, with few
discussing deployment of blockchain at the point of care. Several discuss blockchain’s tamper resistant property,
as well as its distributed nature—attributes relevant for health data interoperability. These blockchains tend to be
private permissioned ones; Ethereum is studied because of its smart contract capability, and Hyperledger Fabric
because it is open source and has some support from large companies such as IBM.

Digital Government: Research and Practice, Vol. 1, No. 3, Article 22. Publication date: November 2020.
22:10 • J. Clavin et al.

3.2 Asian Governments


In 2019, the Filipino government approved the adoption of an Ethereum-based solution for approximately 80
rural banks to get access to financial services. Motivating the effort is the fact that only 42% of Filipinos aged 15
or older have a bank account due to a combination of factors [38, 120].
The concept of blockchain city has been used and made live at Malaysia’s Melaka Straits city, a tourist city
funded by the Chinese government. The project aims to use blockchain to track tourist visas, passengers, luggage,
and booking services [102]. The city will also manage its own token, the DMI coin, for tourists to exchange their
money into digital currencies for payment in the city via their mobile phones.
South Korea’s government announced a 4B Korean won (about $3.5 million) award to set up a blockchain-
enabled virtual power plant in the city of Busan, the country’s second-most populous city [97]. The power plant
is to be cloud based and should integrate multiple energy resources to optimize power generation.

3.3 European Governments


The European Horizon program supports blockchain projects across the European Union [111]. Luxembourg
launched a digital Luxembourg initiative in 2017, with a focus of building a blockchain governance framework.
The purpose is to build a blockchain competence community and develop blockchain governance standards; the
project is ongoing.
The e-Estonia program [45] supports multiple features such as e-identity, e-healthcare, and e-governance.
Most are already operational, with 98% of Estonians filing tax declarations completed online, and 99% of their
health data is digitized and stored on blockchain. Although issues and concerns remain [93, 107], blockchains
have indeed revolutionized the way this government stores and processes data.
Countries such as Georgia and Sweden (and non-European Union countries like Switzerland) use blockchains
to manage assets [13]. Georgia (at the juncture of Asia and Europe) has implemented blockchain for land title
registry and related property transactions; the technology has helped make the process more efficient [105].
Sweden has also created a blockchain-based application for land registration and real estate transactions [78].
Blockchain in education has been applied as well [56, 57]. The Maltese government recently completed the
first national pilot of a blockchain to manage academic credentials such as diplomas, school certificates, and
transcripts. This has been shown to improve the safety of personal information, minimize bureaucracy, and
allow students to access their credentials more easily.

3.4 Others
Several major Australian government departments use cloud-based blockchain solutions, or Blockchain-as-
a-Service [88]. The Canadian government launched a pilot recently to use blockchain for digital credentials
management, allowing employees to maintain a permanent, self-owned, and secure record of their digital
credentials [77]. Anti-money laundering is another major initiative for several governments [69, 71, 75, 101].
For instance, the Financial Action Task Force, an intergovernmental entity, issued guidelines on virtual asset,
anti-money laundering and counter-terrorist financing regulations [69]. It has been shown that existing
approaches are effective in balancing between the threats and opportunities. Continuous monitoring and
investigation are desirable as the technology rapidly changes [27].

4 USE CASE STUDIES


During our review, we found that the majority of the announced government-supported blockchain projects
do not provide enough technical details about the setup or system architecture, among others. This is in part
because a lot of the projects are ongoing or in their initial phases. In this section, we review two use cases in two
sectors in detail: healthcare, and critical infrastructure. We review the use cases, present how blockchains are
used in each use case, and discuss potential challenges. Note that although we focus on healthcare and critical

Digital Government: Research and Practice, Vol. 1, No. 3, Article 22. Publication date: November 2020.
Blockchains for Government: Use Cases and Challenges • 22:11

infrastructure sectors, the use cases involve domains beyond these two, such as finance and Internet-of-Things
(IoT). Therefore, we consider only these two representative sectors and discuss the applications in detail.

4.1 Healthcare
As measured by the number of articles published on PubMed, the National Institute of Health’s search engine of
medical references, interest in blockchain for use in biomedical applications has almost doubled year over year
from 2015 to 2019. Blockchain usage in Electronic Health Records (EHRs) holds promise, with five characteristics
of EHRs that must be addressed by any blockchain solution: governance, interoperability, privacy, scalability,
and security [29, 82]. The blockchain characteristics to meet those needs include immutability, cryptography,
distribution, decentralization, transparency, auditability, and nonrepudiation [82].
Technical solutions for guaranteeing privacy and security in biomedical blockchain applications using
blockchain have been proposed, including using the cryptocurrency Ethereum along with the Onion Router
for remote health monitoring [10], as well as a novel blockchain called Enigma, designed for exchanging EHR
data [121].
The use of blockchain as an overarching health information exchange for protected health information to be
exchanged nationally in the United States was proposed, with a theoretical blockchain-based technology to be
used as a record locator service pointing to demographic copies of medical records stored in a shared set of
servers called Patient Identity Brokers [51]. Such a design lends itself well to recent regulatory changes in the
United States. The 21st Cures Act not only gave patients a right to their health data but also said that healthcare
systems cannot information block that data. The legislation was made in 2016, and it was not until March 2020
that a final rule was issued by the Office of the National Coordinator detailing how the information exchange
from the provider to the patient was to work. That office created a technical framework and compliance structure
for enabling protected health information to flow securely as the patient directs it. The technical framework is
essentially a distributed system that lends itself to the possibility of blockchain usage, with interoperability be-
tween IT systems more possible than ever through the creation of a standardized core dataset that all participants
must use.
Most of the projects in the healthcare sector focus on utilizing blockchain as a reliable platform for data shar-
ing. Indeed, the critical nature of healthcare data makes blockchains unique in facilitating secure data sharing.
However, implementing a large-scale EHR data exchange system is not easy, with or without using blockchains.
Effort from multiple disciplines and across stakeholders are necessary to make it possible, and realizing that
vision in a final system, while also maintaining security, will be challenging. Perhaps, though, now more than
ever such a system is possible, as the global pandemic has made it a necessity that health data flow more freely
than ever before. New technology is needed to address both public health needs and the need for the individual’s
medical chart to be readily accessible to the patient or provider.

4.2 Critical Infrastructures (Energy Sector)


The U.S. Department of Homeland Security defines 16 critical infrastructures including energy, food and agri-
culture, and transportation, among others. It is stated that “the security and resilience advances a national policy
to strengthen and maintain secure, functioning, and resilient critical infrastructure” [91]. Due to the nature of
critical infrastructures, blockchain application in critical infrastructures has been widely explored. Besides the
financial and healthcare sectors (also considered critical infrastructures), other domains such as the energy sec-
tor are under investigation by governments around the world. As an example, the U.S. Department of Energy
awarded several projects to both industry and academia to create the “Energy Internet” [66]. The purpose is to
build an advanced management framework for distributed energy resources to support fast, scalable, and secure
peer-to-peer communications.

Digital Government: Research and Practice, Vol. 1, No. 3, Article 22. Publication date: November 2020.
22:12 • J. Clavin et al.

Table 3. Blockchain Use Cases in the Energy Sector

Areas Blockchain Usage Benefits


Energy trading Transaction management Real-time and peer-to-peer exchange
Smart energy IoT management, resource management Secure asset management
System protection (SCADA) Data and service protection Intrusion tolerance

Blockchain in the energy sector can involve multiple aspects, ranging from energy trading to management
of IoT devices and energy resources management [14, 85]. In Table 3, we present the representative areas of
blockchain adoption in the energy sector.
Energy trading, especially renewable energy trading and management, is one of the main areas found in
current blockchain projects in several countries [35, 67, 70]. For instance, a project supported by the Japanese
Ministry of the Environment aims at building a system for measuring and managing self-consumed renewable
energy [35]. The project utilizes the cryptocurrency side of the blockchain technology to build the trading system.
Specifically, the self-consumed renewable energy is first converted into tradable values and sent to the blockchain
network. The real-time trading prices are then calculated according to the exchange cost and demand. When the
transactions are finalized, energy can be exchanged locally without having to be transmitted to a central location.
Similar methods have been used in projects from other countries such as the United States and Australia [67, 70]
that have been shown to greatly reduce the management and trading cost. Besides other components such as
energy resource management, such a use case shares a lot of similarity with blockchains in the financial domain.
In other words, the adoption of blockchain could potentially reduce the cost for any financial transaction in the
energy sector and remove the need for a trusted single party.
Smart energy involves the management of IoT devices and energy assets. Research projects, industrial projects,
and governmental pilots have been found [46, 68, 92]. Such projects usually involve efforts from both industry
and academia to be successful. For instance, in the past few years, the Department of Energy announced funding
for both university-led and industry-led research projects to integrate IoT technologies with the energy infras-
tructure, several of which focus on blockchain and IoT integration [47, 66]. The purpose is to provide robust and
scalable infrastructure in the energy sector. This use case is similar with managing IoT assets using blockchain
as used in other application domains, such as supply chain and healthcare. There are still many challenges, be-
cause the integration of energy-related infrastructure and blockchain software is not easy. Energy-related devices
suffer from numerous physical threats since the deployment environments are heterogeneous. Despite the chal-
lenges, such an integration can greatly benefit energy infrastructure by enhancing the security and efficiency of
resource management, potentially disrupting different aspects in the energy sector such as energy sharing [114]
and electric vehicle charging [72].
Another noteworthy aspect in the energy sector is the protection of mission critical systems, although the
available approaches do not directly utilize the “blockchain” technology. For instance, several works focus on
building intrusion-tolerant Supervisory Control and Data Acquisition (SCADA) systems [18, 19, 90], where
SCADA is the core control system for the power grid. Such approaches use BFT to build an intrusion-tolerant
SCADA system. Since BFT is the core mechanism for permissioned blockchains and some hybrid blockchains,
BFT-based SCADA can provide the same security guarantee with blockchains (i.e., high availability and in-
tegrity). The benefits of using only BFT instead of blockchains include better performance and more flexible
system design.

5 CHALLENGES AND CONSIDERATIONS


In a 2018 report on cryptocurrencies and blockchain in Europe and Central Asia, the World Bank states that
“policy makers should strike a balance between curbing the hype surrounding these new technologies and un-
leashing potentially transformational new opportunities. While encouraging and facilitating these innovations,

Digital Government: Research and Practice, Vol. 1, No. 3, Article 22. Publication date: November 2020.
Blockchains for Government: Use Cases and Challenges • 22:13

they should prepare to craft new regulations to create a level playing field for new and old industries, by ad-
justing financial oversight, consumer protection, and tax administration” [58]. The following year, the European
Commission summarized to the World Trade Organization’s Global Trade and Blockchain Forum what the tech-
nical and legal challenges for government use of blockchain are: integration with existing systems, scalability,
blockchain-to-blockchain interoperability, lack of a policy framework for cryptocurrencies, and the enforceabil-
ity of smart contracts [2]. That lack of a framework was also mentioned at the 2019 Organisation for Economic
Co-operation and Development Global Blockchain Policy Forum [3]. Without such a framework, the economic
implications of central government usage of so-called stablecoins (e.g., Facebook’s Libra) would be unpredictable
and wide ranging [3]. The lessons learned from government adoption of blockchain range from addressing the
security implications of ledger transparency through cryptography to planning for the increased costs of imple-
menting blockchain relative to more mature technology [5, 63]. In this section, we review adoption challenges
and how governments have faced them to encourage innovation, provide information about the technical chal-
lenges and close with a brief discussion.

5.1 Adoption Challenges


Industry and government adoption. Grasping the different implementations of blockchain and their capabilities
pose challenges for decision makers when it comes to data governance, privacy and security regulations, and
standards [110, 113]. To address such issues, policy makers should take time to assess the technology, look for
standards to be developed, and gather experience with the technology [40, 113]. Academic and industrial efforts
have been made to discuss and create standards for blockchains to be used in different domains [12, 40, 65].
The International Standards Organization Technical Committee 307 has published three standards, including a
vocabulary, a privacy and personally identifiable protection consideration, and a smart contract overview [86].
Another concern is interoperability of blockchains, which includes both exchanging data among blockchains
and transferring assets between different blockchain systems. Both research and industry efforts have been made
to create such a service [22, 79]. Yet due to the rapidity with which blockchains types are being developed and
adapted, it remains to be seen whether interoperability will create new development opportunities for developers,
and—if so—whether governmental decision makers will wish to fund the work.
Governmental role in adoption. Governments worldwide have started to develop policies or government strate-
gies for the adoption of solutions [1, 109]. The experience that they have gained with cryptocurrencies has given
them insight into how they could use blockchain to reduce transaction costs [52]. They may determine that it is
more efficient to execute cross-border trade transactions via blockchain through cryptocurrency. The realization
of such transactions, however, requires complex integration work and a conducive regulatory environment. Gov-
ernments that utilize blockchain technology should partner with private firms to both encourage innovation and
develop a flexible regulatory framework [3]. An example is the United Arab Emirates’ support of blockchain, in
which they created a regulatory sandbox for technology companies to test blockchain solutions for FinTech and
for streamlining data interoperability across government services [4]. In the United States, the Boldline Acceler-
ator program is similar in its support of public-private collaboration and has discussed how to use blockchain for
identity management, tracking human trafficking, Visas, and shipping fraud [39]. Public-private collaborations
should focus on developing blockchain interoperability and standardization, as applied to a carefully selected set
of inefficient bureaucratic use cases [16, 94].
Cost of blockchain. The potential for blockchain to reduce transaction costs is appealing to government, as
noted earlier [52]. For digital platforms, blockchain can reduce the cost to start up new marketplaces, as well
as audit the validity of transactions [31]. However, their decentralized nature can introduce new inefficiencies
and data governance issues [31]. Blockchains’ strength in guaranteeing data integrity through immutability may
come at a premium, relative to having the same guarantee in a centralized application [64]. Transaction costs
have been found to be higher for permissionless blockchains when compared to centralized solutions [13], and

Digital Government: Research and Practice, Vol. 1, No. 3, Article 22. Publication date: November 2020.
22:14 • J. Clavin et al.

blockchain applications can cost significantly more to operate than a cloud-based centralized equivalent, even
after controlling for cloud service utilization fees [103].
Data quality. Blockchain does not protect against data from untrustworthy sources, such as authorized but
potentially tainted parties. It cannot prevent well-formatted but incorrect or inaccurate data from being sent and
stored in the system [119]. As a result, blockchain may be used as an illegal content distribution channel. The
system may also consist of data with low quality or high inaccuracy. Such data quality issues might be harmful
in applications where transparency of the data is desirable, especially in government applications [5]. Although
blockchain can be used as an auditing system for validating these data, the data are already distributed and cannot
be retrieved from all parties with certainty. A decentralized system that allows any two parties to anonymously
exchange assets may provide a haven for those wishing to perform illicit activities without fear of reprisal. As a
result, existing solutions usually involve additional layers to detect or ensure data quality [28, 119]. It is not clear
whether such a layer will provide the desirable analysis and become generic enough to ensure data quality.
Correctness and security of the system. Several blockchain systems intentionally make their consensus pro-
tocols proprietary, making it difficult to trust in the correctness and security of the platforms [26]. Consensus
protocols are complicated and the implementation in a complex real system requires extensive development,
which may introduce unintended consequences, as has been observed [32]. Before adopting a blockchain so-
lution, the underlying mechanism and the system implementation should be carefully reviewed. Even though
most peer-reviewed works have been carefully reviewed by experts, errors in some solutions are still found
later [6]. Therefore, it is important to evaluate whether the implementation matches the theory and design of
the blockchain. Some efforts have been made for e-government applications [53]. It is yet to be seen whether the
solutions are generic and useful enough to fully evaluate the systems.

5.2 Technical Challenges


The performance trade-offs and blockchain standards. There is no one-size-fits-all blockchain system [20, 37, 59,
112]. Different approaches have been proposed to meet different needs, such as improved latency, throughput,
scalability, and bandwidth [34, 37, 42, 59]. Indeed, each protocol has made trade-offs—for example, to reduce the
number of messages nodes needed to exchange in the protocol, the consensus usually involves more steps to
complete. In other words, such a protocol has longer latency to achieve higher throughput. Before widespread
development and adoption, some innovative first movers must implement solutions that consider the trade-offs
among security, efficiency, and robustness.
Although significant effort has been put into developing new blockchain platforms, it is not easy to develop
both correct and efficient systems. In fact, developing consensus protocols is like engineering cryptographic
systems, which require expertise in cryptography, security, and the theory of distributed systems [26]. Therefore,
expert review, validation of both the theory and implementation of new blockchain platforms, and standards
recommendation [65] (e.g., cryptocurrency exchanges, running blockchains in applications like clinical trials,
etc.) are desirable if the full potential of blockchain is to be realized.
Scalability. Scalability can be interpreted as the number of nodes and the number of clients. The number of
nodes is a concern during blockchain deployment—how many nodes should one use to start the service? The
number of clients is a concern for the workload—how many requests should one expect and what are the sizes of
the requests? Both permissionless and permissioned blockchains have scalability limits [112]. The open nature
of the consensus mechanisms of permissionless blockchains allows anyone to join and therefore usually involves
thousands of nodes. The problem for such blockchains is that they usually suffer from long transaction latency
(where it takes longer for the transaction to be available) and have not scaled to many client transactions in
real-world applications. However, permissioned blockchains can scale to a large number of clients with less
latency, but they rely upon a small number of blockchain servers. Hybrid blockchains address the scalability

Digital Government: Research and Practice, Vol. 1, No. 3, Article 22. Publication date: November 2020.
Blockchains for Government: Use Cases and Challenges • 22:15

problem [8, 50, 73, 74, 80, 98, 118], but each has its own challenges and most have a sufficiently large number of
representatives to guarantee correctness of the system (safety and liveness)—for example, greater than 600 [80].
A BFT protocol of such a size, however, can be impractical. Other BFT algorithms, such as the cryptocurrency
Algorand [55], remove the need to run PoW by applying proven cryptographic techniques along with verifiable
random functions and committees, but, again, have a limitation. Algorand relies upon the number of coins, which
might limit its practicality in real-world deployment. The optimal blockchain that balances scalability for both
clients and servers has yet to be found.
Privacy and compliance. Privacy and compliance are always major concerns in governmental applications.
Although conventional blockchains provide availability and integrity, the data are essentially transparent—all
participants may freely review transactions. This means that an architect should be careful in selecting the type
of blockchain and perform a use case analysis that includes privacy and security guarantees relative to perfor-
mance needs. With the current regulatory climate of governments focused on protecting user data, blockchains
become especially problematic given their open and immutable nature. At the same time, laws designed to safe-
guard the privacy and security of individuals’ information do provide a roadmap for designers. Generalized
examples include the California Consumer Privacy Act of 2018 and the European Union’s General Data Protec-
tion Regulation of 2016. In the healthcare space, the Health Insurance Portability and Accountability Act and
the Health Information Technology for Economic and Clinical Health Act are the basis for interoperability rule
changes proposed by the Office of the National Coordinator, as well as the Centers for Medicare and Medicaid
Services. With the preceding two acts in mind, researchers at MIT built a PoW consensus protocol called Medrec
for mining patient information. This type of clinical data is becoming standardized through the implementation
of EHR systems that leverage messaging protocols, such as Health Level 7 [17].
Timing assumptions. Most permissionless blockchains assume a synchronous network (i.e., all replicas know
the message transmission time), which is not a practical assumption. For the system to be correct (safety and
liveness), there must be a large number of nodes that actively participate. Therefore, the correctness of such a
system in a small-scale or private setting can be questionable. However, most permissioned blockchain protocols
assume something called partial synchrony [44], in which the network delay and processing delay by the nodes
are bounded by an upper limit unknown to all nodes. It is assumed that each node in the network will eventually
respond, and if a given node does not respond, other nodes will handle it according to the protocol, providing an
answer and ensuring that the network will not get stuck waiting indefinitely. The shortcoming of this approach is
that it introduces performance and security issues—what if an adversary can somehow manipulate this network
delay in such a way that causes nodes to misbehave or to give up information? In this type of network, the system
may simply stop processing any requests just like a crashed service, even if all nodes in the system are correct. A
potential solution to this may be the use of what is known as a purely asynchronous BFT consensus protocol, in
which nodes have no upper bound in response time so the protocols are resilient to all kinds of attacks. Research
into this area is ongoing and includes several possible solutions [9, 43, 81, 84].

5.3 Discussion
Permissioned vs. permissionless. Most of the government blockchain implementations are permissioned. Al-
though some use permissionless blockchain, in these cases the blockchain is still deployed in a closed, private
setting. Many of the countries we studied for blockchain adoption have either banned or regulated cryptocur-
rencies, which are fully permissionless. We conclude that the development of cryptocurrencies by governments
is unlikely unless the adoption is a specialized use case such as critical infrastructure. Even in such a case, the
blockchain would likely be tethered to the currency of the given nation-state.
The quest for high performance. We have not found any published results that have measured performance, or
assessed the performance needs, in government blockchain implementations. Many applications are new, and

Digital Government: Research and Practice, Vol. 1, No. 3, Article 22. Publication date: November 2020.
22:16 • J. Clavin et al.

the long-term feasibility will depend upon a cost-benefit analysis. Many use cases involve large volumes of data,
however, so we expect scalability and throughput needs for these systems to drive changes to their blockchain
implementation.
The quest for technology improvement. We have found little information regarding the feedback or lessons
learned based upon government blockchain implementations. We believe this to be in part because most projects
are still in their early stages. We advocate for research and industry to continue to collaborate and improve
systems based upon our observations of past successes [26, 32].
Cryptocurrencies regulation. Many countries have developed regulations for cryptocurrencies, and yet no coun-
try has fully determined how to implement the regulations. Part of the challenge is how to classify cryptocur-
rencies using existing financial constructs. Taxing or regulating a cryptocurrency as a currency, a security, or an
asset is difficult, as a cryptocurrency can be any one or all three.

6 FUTURE OF BLOCKCHAIN AND CONCLUSION


Blockchains have evolved beyond cryptocurrencies to general purpose and can be used across an array of ap-
plications, particularly those that need high service availability and data integrity. If their adoption increases,
then blockchain-based solutions may reintroduce a trusted broker: the data center, whether in the cloud or on
premise. A cloud-based blockchain system makes the cloud provider into a new type of trusted broker. If instead
nodes are on premise but are used by the public, then whatever entity is hosting them becomes the trusted bro-
ker, and the system becomes vulnerable to any failures that may render the entire system unreliable. Therefore,
replacing a fallible human or bureaucracy with a blockchain may shift risk rather than eliminate it [23].
The technical challenges for blockchains, such as being fully privacy preserving, ensuring compliance when
necessary, and being scalable, have yet to be fully solved, and more work is needed to address them. Yet despite
these challenges, blockchains can make applications better and will begin to be the solution for use case–specific
distributed systems problems. Most blockchain applications were financial at first, just as many good and proven
technologies have been. Blockchains are now being used in other spaces, such as government. They may be the
best technology to deploy when a need to distribute data through a system that needs to guarantee data integrity
and service availability exists, but the ability to make it happen is limited.

REFERENCES
[1] Bundesministerium fur Wirtschaft und Energie and Bundesministerium der Finanzen. 2019. Blockchain Strategy of the Federal Gov-
ernment: We Set Out the Course for the Token Economy. Retrieved October 21, 2020 from https://www.bmwi.de/Redaktion/EN/
Publikationen/Digitale-Welt/blockchain-strategy.pdf?__blob=publicationFile&v=2.
[2] European Commission. 2019. European Union Leadership in Blockchain. Retrieved October 21, 2020 from https://www.wto.org/
english/res_e/reser_e/00_b_helen_kopman_global_trade_and_blockchain.pdf.
[3] OECD. 2019. The Policy Environment for Blockchain Innovation and Adoption: 2019 OECD Global Blockchain Policy Forum Summary
Report. Retrieved October 21, 2020 from https://www.oecd.org/finance/2019-OECD-Global-Blockchain-Policy-Forum-Summary-
Report.pdf.
[4] PWC. 2020. Establishing Blockchain Policy: Strategies for the Governance of Distributed Ledger Technology Ecosystems. Retrieved
October 21, 2020 from https://www.pwc.com/m1/en/publications/establishing-blockchain-policy.html.
[5] IDB. 2020. Exploring Blockchain Technology for Government Transparency: Blockchain-Based Public Procurement to Reduce Cor-
ruption. Retrieved October 21, 2020 from http://www3.weforum.org/docs/WEF_Blockchain_Government_Transparency_Report.pdf.
[6] Ittai Abraham, Guy Gueta, Dahlia Malkhi, Lorenzo Alvisi, Rama Kotla, and Jean-Philippe Martin. 2017. Revisiting fast practical Byzan-
tine fault tolerance. arXiv:1712.01367
[7] Ittai Abraham and Dahlia Malkhi. 2017. The blockchain consensus layer and BFT. Bulletin of EATCS 3, 123 (2017), 1–22.
[8] Ittai Abraham, Dahlia Malkhi, Kartik Nayak, Ling Ren, and Alexander Spiegelman. 2017. Solida: A blockchain protocol based on
reconfigurable Byzantine consensus. In Proceedings of the 21st International Conference on Principles of Distributed Systems (OPODIS’17).
[9] Ittai Abraham, Dahlia Malkhi, and Alexander Spiegelman. 2019. Asymptotically optimal validated asynchronous Byzantine agreement.
In Proceedings of the Symposium on Principles of Distributed Computing. ACM, New York, NY, 337–346.

Digital Government: Research and Practice, Vol. 1, No. 3, Article 22. Publication date: November 2020.
Blockchains for Government: Use Cases and Challenges • 22:17

[10] Muhammad Salek Ali, Massimo Vecchio, Guntur D. Putra, Salil S. Kanhere, and Fabio Antonelli. 2020. A decentralized peer-to-peer
remote health monitoring system. Sensors 20, 6 (2020), 1656.
[11] Ahmed Alketbi, Qassim Nasir, and Manar Abu Talib. 2018. Blockchain for government services—Use cases, security benefits and
challenges. In Proceedings of the 2018 15th Learning and Technology Conference (L&T’18). IEEE, Los Alamitos, CA, 112–119.
[12] Darcy W. E. Allen, Chris Berg, Sinclair Davidson, Mikayla Novak, and Jason Potts. 2019. International policy coordination for
blockchain supply chains. Asia & the Pacific Policy Studies 6, 3 (2019), 367–380.
[13] David Allessie, Maciej Sobolewski, and Lorenzino Vaccari. 2019. Blockchain for Digital Government: An Assessment of Pioneering Im-
plementations in Public Services. Technical Report. Joint Research Centre (Seville site).
[14] Merlinda Andoni, Valentin Robu, David Flynn, Simone Abram, Dale Geach, David Jenkins, Peter McCallum, and Andrew Peacock.
2019. Blockchain technology in the energy sector: A systematic review of challenges and opportunities. Renewable and Sustainable
Energy Reviews 100 (2019), 143–174.
[15] Elli Androulaki, Artem Barger, Vita Bortnikov, Christian Cachin, Konstantinos Christidis, Angelo De Caro, David Enyeart, et al. 2018.
Hyperledger fabric: A distributed operating system for permissioned blockchains. In Proceedings of the 13th EuroSys Conference. ACM,
New York, NY, 30.
[16] Christiana Aristidou and Evdokia Marcou. 2019. Blockchain standards and government applications. Journal of ICT Standardization
7, 3 (2019), 287–312.
[17] Asaph Azaria, Ariel Ekblaw, Thiago Vieira, and Andrew Lippman. 2016. MedRec: Using blockchain for medical data access and
permission management. In Proceedings of the 2016 2nd International Conference on Open and Big Data (OBD’16). IEEE, Los Alamitos,
CA, 25–30.
[18] Amy Babay, John Schultz, Thomas Tantillo, and Yair Amir. 2018. Toward an intrusion-tolerant power grid: Challenges and opportu-
nities. In Proceedings of the 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS’18). IEEE, Los Alamitos,
CA, 1321–1326.
[19] Amy Babay, John Schultz, Thomas Tantillo, Samuel Beckley, Eamon Jordan, Kevin Ruddell, Kevin Jordan, and Yair Amir. 2019. De-
ploying intrusion-tolerant SCADA for the power grid. In Proceedings of the 2019 49th Annual IEEE/IFIP International Conference on
Dependable Systems and Networks (DSN’19). IEEE, Los Alamitos, CA, 328–335.
[20] Jean-Paul Bahsoun, Rachid Guerraoui, and Ali Shoker. 2015. Making BFT protocols really adaptive. In Proceedings of the 2015 IEEE
International Parallel and Distributed Processing Symposium (IPDPS’15). IEEE, Los Alamitos, CA, 904–913.
[21] F. Rizal Batubara, Jolien Ubacht, and Marijn Janssen. 2018. Challenges of blockchain technology adoption for e-government: A sys-
tematic literature review. In Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in
the Data Age. 1–9.
[22] Rafael Belchior, André Vasconcelos, Sérgio Guerreiro, and Miguel Correia. 2020. A survey on blockchain interoperability: Past, present,
and future trends. arXiv:2005.14282
[23] Spencer Bogart. 2019. The past and future of blockchain: Where we’re going and why. Blockchain Capital Blog. Retrieved October 21,
2020 from https://medium.com/blockchain-capital-blog/the-past-future-of-blockchain-where-were-going-and-why-2b26acb45091.
[24] Christian Cachin, Daniel Collins, Tyler Crain, and Vincent Gramoli. 2019. Byzantine fault tolerant vector consensus with anonymous
proposals. arXiv:1902.10010
[25] Christian Cachin, Rachid Guerraoui, and Luís Rodrigues. 2011. Introduction to Reliable and Secure Distributed Programming. Springer
Science & Business Media.
[26] Christian Cachin and Marko Vukolić. 2017. Blockchain consensus protocols in the wild. In Proceedings of the International Symposium
on Distributed Computing (DISC’17). Article 1, 16 pages.
[27] Malcolm Campbell-Verduyn. 2018. Bitcoin, crypto-coins, and global anti-money laundering governance. Crime, Law and Social Change
69, 2 (2018), 283–305.
[28] Roberto Casado-Vara, Fernando de la Prieta, Javier Prieto, and Juan M. Corchado. 2018. Blockchain framework for IoT data quality
via edge computing. In Proceedings of the 1st Workshop on Blockchain-Enabled Networked Sensor Systems. 19–24.
[29] Fran Casino, Thomas K. Dasaklis, and Constantinos Patsakis. 2019. A systematic literature review of blockchain-based applications:
Current status, classification and open issues. Telematics and Informatics 36 (2019), 55–81.
[30] Miguel Castro and Barbara Liskov. 2002. Practical Byzantine fault tolerance and proactive recovery. ACM Transactions on Computer
Systems 20, 4 (2002), 398–461.
[31] Christian Catalini and Joshua S. Gans. 2016. Some Simple Economics of the Blockchain. Technical Report. National Bureau of Economic
Research.
[32] Tushar D. Chandra, Robert Griesemer, and Joshua Redstone. 2007. Paxos made live: An engineering perspective. In Proceedings of the
26th Annual ACM Symposium on Principles of Distributed Computing (PODC’07). 398–407.
[33] James Clavin and Sisi Duan. 2019. Global Transformation with Blockchain: From Lab to App: Workshop Summary. Retrieved October
21, 2020 from https://carta.umbc.edu/workshops/workshopsblockchain-workshop2018/.

Digital Government: Research and Practice, Vol. 1, No. 3, Article 22. Publication date: November 2020.
22:18 • J. Clavin et al.

[34] Allen Clement, Edmund L. Wong, Lorenzo Alvisi, Michael Dahlin, and Mirco Marchetti. 2009. Making Byzantine fault tolerant systems
tolerate Byzantine faults. In Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation (NSDI’09),
Vol. 9. 153–168.
[35] Digital Grid Corporation. 2018. Demonstration of Blockchain-Based Trading of Renewable Energy Value. Retrieved October 21, 2020
from https://www.digitalgrid.com/index.html.
[36] Miguel Correia, Giuliana Santos Veronese, Nuno Ferreira Neves, and Paulo Verissimo. 2011. Byzantine consensus in asynchronous
message-passing systems: A survey. International Journal of Critical Computer-Based Systems 2, 2 (2011), 141–161.
[37] James Cowling, Daniel Myers, Barbara Liskov, Rodrigo Rodrigues, and Liuba Shrira. 2006. HQ replication: A hybrid quorum protocol
for Byzantine fault tolerance. In Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI’06). 177–190.
[38] Asli Demirguc-Kunt, Leora Klapper, Dorothe Singer, Saniya Ansar, and Jake Hess. 2018. The Global Findex Database 2017: Measuring
Financial Inclusion and the FinTech Revolution. World Bank.
[39] Department of Homeland Security. 2020. Blockchain and Suitability for Government Applications. Retrieved from https://www.dhs.
gov/sites/default/files/publications/2018_AEP_Blockchain_and_Suitability_for_Government_Applications.pdf.
[40] Advait Deshpande, Katherine Stewart, Louise Lepetit, and Salil Gunashekar. 2017. Overview Report: Distributed Ledger Technolo-
gies/Blockchain: Challenges, Opportunities and the Prospects for Standards. British Standards Institution (BSI).
[41] Sisi Duan, Karl Levitt, Hein Meling, Sean Peisert, and Haibin Zhang. 2014. ByzID: Byzantine fault tolerance from intrusion detection.
In Proceedings of the 2014 IEEE 33rd International Symposium on Reliable Distributed Systems (SRDS’14). IEEE, Los Alamitos, CA,
253–264.
[42] Sisi Duan, Hein Meling, Sean Peisert, and Haibin Zhang. 2014. BChain: Byzantine replication with high throughput and embedded
reconfiguration. In Proceedings of the International Conference on Principles of Distributed Systems (OPODIS’14). 91–106.
[43] Sisi Duan, Michael K. Reiter, and Haibin Zhang. 2018. BEAT: Asynchronous BFT made practical. In Proceedings of the 2018 ACM
SIGSAC Conference on Computer and Communications Security (CCS’18). 2028–2041.
[44] Cynthia Dwork, Nancy Lynch, and Larry Stockmeyer. 1988. Consensus in the presence of partial synchrony. Journal of the ACM 35,
2 (1988), 288–323.
[45] e Estonia. n.d. Home Page. Retrieved October 21, 2020 from https://e-estonia.com.
[46] ElectriCChain. n.d. Home Page. Retrieved October 21, 2020 from http://www.electricchain.org/.
[47] Energy.gov. 2020. Department of Energy Announces $6.7 Million for IoT Integration Research. Retrieved October 21, 2020 from
https://www.energy.gov/articles/department-energy-announces-67-million-iot-integration-research.
[48] Ethereum. n.d. Ethereum Private Network. Retrieved October 21, 2020 from https://github.com/ethereum/go-ethereum/wiki/Private-
network.
[49] Executive.gov. 2018. Report: HHS Obtains Authority to Operate AI, Blockchain-Based Acquisition Tool. Retrieved October 21, 2020
from https://www.executivegov.com/2018/12/report-hhs-obtains-authority-to-operate-ai-blockchain-based-acquisition-tool/.
[50] Ittay Eyal, Adem Efe Gencer, Emin Gün Sirer, and Robbert Van Renesse. 2016. Bitcoin-NG: A scalable blockchain protocol. In Proceed-
ings of the 13th USENIX Conference on Networked Systems Design and Implementation (NSDI’16). 45–59.
[51] Michael L. Gagnon and Grant Stephen. 2018. A pragmatic solution to a major interoperability problem: Using blockchain for the
nationwide patient index. Blockchain in Healthcare Today 1 (2018). https://doi.org/10.30953/bhty.v1.28.
[52] Emmanuelle Ganne. 2018. Can Blockchain Revolutionize International Trade? Retrieved October 21, 2020 from https://www.wto.org/
english/res_e/booksp_e/blockchainrev18_e.pdf.
[53] Dimitris Geneiatakis, Yannis Soupionis, Gary Steri, Ioannis Kounelis, and Igor Nai-Fovino. 2020. Blockchain performance analysis for
supporting cross-border E-government services. IEEE Transactions on Engineering Management PP, 99 (2020), 1–13.
[54] Sanjay Ghemawat, Howard Gobioff, and Shun-Tak Leung. 2003. The Google File System. In Proceedings of the ACM Symposium on
Operating Systems Principles (SOSP’03). 29–43.
[55] Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, and Nickolai Zeldovich. 2017. Algorand: Scaling Byzantine agreements for
cryptocurrencies. In Proceedings of the 26th Symposium on Operating Systems Principles (SOSP’17). ACM, New York, NY, 51–68.
[56] Wolfgang Gräther, Sabine Kolvenbach, Rudolf Ruland, Julian Schütte, Christof Torres, and Florian Wendland. 2018. Blockchain for
education: Lifelong learning passport. In Proceedings of 2018 1st ERCIM Blockchain Workshop.
[57] Alexander Grech and Anthony F. Camilleri. 2017. Blockchain in Education. European Commission.
[58] World Bank Group. 2018. Cryptocurrencies and Blockchain. Retrieved October 21, 2020 from http://documents.worldbank.org/
curated/en/293821525702130886/pdf/Cryptocurrencies-and-blockchain.pdf.
[59] Rachie Guerraoui, Nikola Knežević, Vivien Quéma, and Marko Vukolić. 2015. The next 700 BFT protocols. ACM Transactions on
Computer Systems 32, 4 (2015), Article 12, 45 pages.
[60] Guy Golan Gueta, Ittai Abraham, Shelly Grossman, Dahlia Malkhi, Benny Pinkas, Michael K. Reiter, Dragos-Adrian Seredinschi, Orr
Tamir, and Alin Tomescu. 2019. SBFT: A scalable decentralized trust infrastructure for blockchains. In Proceedings of the 48th IEEE/IFIP
International Conference on Dependable Systems and Networks (DSN’19).
[61] Thomas Hardjono and Alex Pentland. 2019. Verifiable anonymous identities and access control in permissioned blockchains.
arXiv:1903.04584

Digital Government: Research and Practice, Vol. 1, No. 3, Article 22. Publication date: November 2020.
Blockchains for Government: Use Cases and Challenges • 22:19

[62] Maurice P. Herlihy and Jeannette M. Wing. 1990. Linearizability: A correctness condition for concurrent objects. ACM Transactions
on Programming Languages and Systems 12, 3 (1990), 463–492.
[63] Heng Hou. 2017. The application of blockchain technology in E-government in China. In Proceedings of the 2017 26th International
Conference on Computer Communication and Networks (ICCCN’17). IEEE, Los Alamitos, CA, 1–4.
[64] Laurie Hughes, Yogesh K. Dwivedi, Santosh K. Misra, Nripendra P. Rana, Vishnupriya Raghavan, and Viswanadh Akella. 2019.
Blockchain research, practice and policy: Applications, benefits, limitations, emerging research themes and research agenda. Interna-
tional Journal of Information Management 49 (2019), 114–129.
[65] IEEE. n.d. IEEE Blockchain Standards Initiatives. Retrieved October 21, 2020 from https://blockchain.ieee.org/standards.
[66] Ledger Insights. 2019. US Department of Energy Makes Blockchain Grant. Retrieved October 21, 2020 from https://www.
ledgerinsights.com/department-of-energy-blockchain-bem-comed/.
[67] Ledger Insights. 2020. Department of Energy Researchers Say Blockchain May Be Revolutionary for Renewable Energy. Retrieved
October 21, 2020 from https://www.ledgerinsights.com/department-of-energy-nrel-blockchain-revolutionary-renewable-energy/.
[68] IOTA. n.d. IOTA Blockchain. https://www.iota.org/.
[69] Yurika Ishii. 2019. Blockchain Technology and Anti-Money Laundering Regulations Under International Law. Retrieved October 21,
2020 from https://asil.org/insights/volume/23/issue/1/blockchain-technology-and-anti-money-laundering-regulations-under.
[70] Frank Jossi. n.d. Could blockchain make it easier to buy and sell renewable energy certificates? Insights.Retrieved October 21, 2020
from https://energynews.us/2020/04/17/midwest/could-blockchain-make-it-easier-to-buy-and-sell-renewable-energy-certificates/.
[71] Heejung Kang, Hye Ri Kim, and Seng-Phil Hong. 2018. A study on the design of smart contracts mechanism based on the blockchain
for anti-money laundering. Journal of Internet Computing and Services 19, 5 (2018), 1–11.
[72] Fabian Knirsch, Andreas Unterweger, and Dominik Engel. 2018. Privacy-preserving blockchain-based electric vehicle charging with
dynamic tariff decisions. Computer Science-Research and Development 33, 1–2 (2018), 71–79.
[73] Eleftherios Kokoris Kogias, Philipp Jovanovic, Nicolas Gailly, Ismail Khoffi, Linus Gasser, and Bryan Ford. 2016. Enhancing Bitcoin
security and performance with strong consistency via collective signing. In Proceedings of the 25th USENIX Security Symposium. 279–
296.
[74] Eleftherios Kokoris-Kogias, Philipp Jovanovic, Linus Gasser, Nicolas Gailly, and Bryan Ford. 2017. OmniLedger: A secure, scale-out,
decentralized ledger. IACR Cryptology ePrint Archive 2017 (2017), 406.
[75] Karry Lai. 2018. Blockchain as AML tool: A work in progress. International Financial Law Review. Retrieved October 21, 2020 from
https://www.iflr.com/article/b1lp1w9qwqhjh8/blockchain-as-aml-tool-a-work-in-progress.
[76] Leslie Lamport, Robert Shostak, and Marshall Pease. 1982. The Byzantine Generals Problem. ACM Transactions on Programming
Languages and Systems 4, 3 (1982), 382–401.
[77] Natalie Leal. 2019. Canada pilots blockchain staff records. Global Government Forum. Retrieved October 21, 2020 from https://www.
globalgovernmentforum.com/canada-pilots-blockchain-staff-records/.
[78] Victoria L. Lemieux. 2017. Evaluating the use of blockchain in land transactions: An archival science perspective. European Property
Law Journal 6, 3 (2017), 392–440.
[79] Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao, Bihan Wen, and Yih-Chun Hu. 2019. HyperService:
Interoperability and programmability across heterogeneous blockchains. arXiv:1908.09343
[80] Loi Luu, Viswesh Narayanan, Chaodong Zheng, Kunal Baweja, Seth Gilbert, and Prateek Saxena. 2016. A secure sharding protocol
for open blockchains. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS’16). ACM,
New York, NY, 17–30.
[81] Ethan MacBrough. 2018. Cobalt: BFT governance in open networks. arXiv:1802.07240
[82] André Henrique Mayer, Cristiano André da Costa, and Rodrigo da Rosa Righi. 2019. Electronic health records in a blockchain: A
systematic review. Health Informatics Journal 26, 2 (2019), 1273–1288.
[83] S. Melendez. 2018. How IBM and the CDC are testing blockchain to track health issues like the opioid crisis. Fast Company.
Retrieved October 21, 2020 from https://www.fastcompany.com/90231255/how-ibm-and-the-cdc-are-testing-blockchain-to-track-
health-issues-like-the-opioid-crisis.
[84] Andrew Miller, Yu Xia, Kyle Croman, Elaine Shi, and Dawn Song. 2016. The honey badger of BFT protocols. In Proceedings of the 2016
ACM SIGSAC Conference on Computer and Communications Security (CCS’16). ACM, New York, NY, 31–42.
[85] Muhammad Baqer Mollah, Jun Zhao, Dusit Niyato, Kwok-Yan Lam, Xin Zhang, Amer MYM Ghias, Leong Hai Koh, and Lei Yang. 2019.
Blockchain for future smart grid: A comprehensive survey. arXiv:1911.03298
[86] Clare Naden. 2020. Getting Big on Blockchain. Retrieved October 21, 2020 from https://www.iso.org/news/ref2540.html.
[87] Satoshi Nakamoto. Bitcoin: A Peer-to-Peer Electronic Cash System. Retrieved October 21, 2020 from https://nakamotoinstitute.org/
bitcoin/.
[88] Micky News. 2018. WORLD FIRST: Blockchain System Developed to Secure Australia’s ‘National Capabilities.’ Retrieved October 21,
2020 from https://micky.com.au/world-first-blockchain-system-developed-to-secure-australias-national-capabilities.
[89] Giang-Truong Nguyen and Kyungbaek Kim. 2018. A survey about consensus algorithms used in blockchain.Journal of Information
Processing Systems 14, 1 (2018), 101–128.

Digital Government: Research and Practice, Vol. 1, No. 3, Article 22. Publication date: November 2020.
22:20 • J. Clavin et al.

[90] André Nogueira, Miguel Garcia, Alysson Bessani, and Nuno Neves. 2018. On the challenges of building a BFT SCADA. In Proceedings
of the 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN’18). IEEE, Los Alamitos, CA,
163–170.
[91] White House. 2013. Presidential policy directive/PPD 21–Critical infrastructure security and resilience. Washington, DC (2013).
[92] Chain of Things. n.d. Home Page. Retrieved October 21, 2020 from https://www.chainofthings.com/.
[93] Adegboyega Ojo and Samuel Adebayo. 2017. Blockchain as a next generation government information infrastructure: A review of
initiatives in D5 countries. In Government 3.0–Next Generation Government Technology Infrastructure and Services. Springer, 283–298.
[94] Svein Ølnes, Jolien Ubacht, and Marijn Janssen. 2017. Blockchain in government: Benefits and implications of distributed ledger
technology for information sharing. Government Information Quarterly 34, 3 (2017), 355–364.
[95] Kelly Olson, Mic Bowman, James Mitchell, Shawn Amundson, Dan Middleton, and Cian Montgomery. 2018. Sawtooth: An Introduction.
Linux Foundation.
[96] Mike Orcutt. 2017. Why the CDC Wants in on Blockchain. Retrieved October 21, 2020 from https://www.technologyreview.com/2017/
10/02/148864/why-the-cdc-wants-in-on-blockchain/.
[97] Helen Partz. 2018. Major South Korean City to Build Blockchain-Enabled Virtual Power Plant. Retrieved October 21, 2020 from
https://cointelegraph.com/news/major-south-korean-city-to-build-blockchain-enabled-virtual-power-plant.
[98] Rafael Pass and Elaine Shi. 2017. Hybrid consensus: Efficient consensus in the permissionless model. In Proceedings of the International
Symposium on Distributed Computing (DISC’17).
[99] Marco Platania, Daniel Obenshain, Thomas Tantillo, Yair Amir, and Neeraj Suri. 2016. On choosing server-or client-side solutions for
BFT. ACM Computing Surveys 48, 4 (2016), 61.
[100] POA. n.d. Home Page. Retrieved October 21, 2020 from https://www.poa.network/.
[101] Michael J. Rennock, Alan Cohn, and J. R. Butcher. 2018. Blockchain technology and regulatory investigations. Journal of Practical Law
2-3 (2018), 33–44.
[102] Asia Blockchain Review. 2019. Malaysia’s Melaka Straits City to Become World’s First Blockchain City. Retrieved October 21, 2020
from https://www.asiablockchainreview.com/malaysias-melaka-straits-city-to-become-worlds-first-blockchain-city/.
[103] Paul Rimba, An Binh Tran, Ingo Weber, Mark Staples, Alexander Ponomarev, and Xiwei Xu. 2020. Quantifying the cost of distrust:
Comparing blockchain and cloud services for business process execution. Information Systems Frontiers 22, 2 (2020), 489–507.
[104] Benjamin Ross. 2018. US health and human services looks to blockchain to manage unstructured data. Clinical Research News.
Retrieved October 21, 2020 from https://www.clinicalresearchnewsonline.com/2018/11/29/us-health-and-human-services-looks-to-
blockchain-to-manage-unstructured-data.
[105] Qiuyun Shang and Allison Price. 2019. A blockchain-based land titling project in the Republic of Georgia: Rebuilding public trust and
lessons for future pilot projects. Innovations: Technology, Governance, Globalization 12, 3–4 (2019), 72–78.
[106] João Sousa, Eduardo Alchieri, and Alysson Bessani. 2014. State machine replication for the masses with BFT-SMaRT. In Proceedings
of the 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN’14). 355–362.
[107] Clare Sullivan and Eric Burger. 2017. E-residency and blockchain. Computer Law & Security Review 33, 4 (2017), 470–481.
[108] GitHub. n.d. Tendermint Core. Retrieved October 21, 2020 from https://github.com/tendermint/tendermint.
[109] Vireshwar Tomar. 2020. Indian Government Policy Think Tank Releases National Blockchain Strategy. Retrieved Oc-
tober 21, 2020 from https://www.sogou.com/link?url=hedJjaC291NkOxbQNuXMB_nRsnvCuFsHmUKUW9aQsdinz6rcJcF8y0N9k-
jvbtNZrOikAlNPoSaqnToFhvMpKRTGFj4YBy-jPjYADeHxrOY1r_fE_MTlUjIrDt87lpriH26743_pKm8ut5pUc3zy0dg.
[110] David Treat, Giuseppe Giordano, Luca Schiatti, Aspyn Cole Palatnick, and Zixuan Zhang. 2019. Blockchain interoperability. US Patent
10,298,585.
[111] Trustnodes. 2018. The European Blockchain Partnership Signed, €300 Million Allocated to Blockchain Projects. Retrieved
October 21, 2020 from https://www.trustnodes.com/2018/04/11/european-blockchain-partnership-signed-e300-million-allocated-
blockchain-projects.
[112] Marko Vukolic. 2015. The quest for scalable blockchain fabric: Proof-of-work vs. BFT replication. In Proceedings of the International
Workshop on Open Problems in Network Security (iNetSec’15). 112–125.
[113] Angela Walch. 2016. The path of the blockchain lexicon (and the law). Review of Banking & Financial Law 36 (2016), 713.
[114] Susi Wallner. 2017. Developing Decentralized Digital Intelligence AdptEVE to Understand Energy Systems. Retrieved October 21,
2020 from https://magazine.startus.cc/developing-decentralized-digital-intelligence-adpteve-to-understand-energy-systems/.
[115] Wenbo Wang, Dinh Thai Hoang, Zehui Xiong, Dusit Niyato, Ping Wang, Peizhao Hu, and Yonggang Wen. 2018. A survey on consensus
mechanisms and mining management in blockchain networks. arXiv:1805.02707
[116] Xu Wang, Xuan Zha, Wei Ni, Ren Ping Liu, Y Jay Guo, Xinxin Niu, and Kangfeng Zheng. 2019. Survey on blockchain for Internet of
Things. Computer Communications 136 (2019), 10–29.
[117] Gavin Wood. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151 (2014),
1–32.
[118] Mahdi Zamani, Mahnush Movahedi, and Mariana Raykova. 2018. RapidChain: A fast blockchain protocol via full sharding. In Pro-
ceedings of the ACM Symposium on Computer and Communications Security (CCS’18). 931–948.

Digital Government: Research and Practice, Vol. 1, No. 3, Article 22. Publication date: November 2020.
Blockchains for Government: Use Cases and Challenges • 22:21

[119] Xiaochen Zheng, Raghava Rao Mukkamala, Ravi Vatrapu, and Joaqun Ordieres-Mere. 2018. Blockchain-based personal health data
sharing system using cloud storage. In Proceedings of the 2018 International Conference on E-Health Networking, Application, and
Services (HealthCom’18). IEEE, Los Alamitos, CA, 1–6.
[120] Siegfried Zottel, Bilal Zia, and Fares Khoury. 2016. Enhancing Financial Capability and Inclusion in Sénégal: A Demand-Side Survey.
World Bank.
[121] Guy Zyskind, Oz Nathan, and Alex Pentland. 2015. Enigma: Decentralized computation platform with guaranteed privacy.
arXiv:1506.03471

Received March 2020; revised September 2020; accepted September 2020

Digital Government: Research and Practice, Vol. 1, No. 3, Article 22. Publication date: November 2020.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy