Block Chain
Block Chain
Blockchain Introduction
Tracing Blockchain’s Origin
• The shortcomings of current transaction systems (During 2000’s financial crisis)
• Commerce on the Internet has come to rely almost exclusively on financial
institutions serving as trusted third parties to process electronic payments.
• While the system works well enough for most transactions, it still suffers
from the inherent weaknesses of the trust based model.
• Completely non-reversible transactions are not really possible, since financial
institutions cannot avoid mediating disputes. This impacts on
• The cost of mediation increases transaction costs,
• Limiting the minimum practical transaction size
• Cutting off the possibility for small casual transactions,
• There is a broader cost in the loss of ability to make non-reversible
payments for nonreversible services.
• While the possibility of reversal, impacts on the building the trust among the
parties.
Another wary of the merchants (due to Third Party Mitigation)
Merchants must be wary (attentive) of their customers,
• Hassling them for more information than they would otherwise
need.
• A certain percentage of fraud is accepted as unavoidable.
• These costs and payment uncertainties can be avoided in
person by using physical currency, but no mechanism exists to
make payments over a communications channel without a
trusted party.
Bitcoin Whitepaper: 10/31/2008
Bitcoin: A Peer-to-Peer Electronic Cash System
Satoshi Nakamoto
satoshin@gmx.com
www.bitcoin.org
Abstract. A purely peer-to-peer version of electronic cash would allow online payments to be sent directly
from one party to another without going through a financial institution. Digital signatures provide part
of the solution, but the main benefits are lost if a trusted third party is still required to prevent double-
spending. We propose a solution to the double-spending problem using a peer-to-peer network. The
network timestamps transactions by hashing them into an ongoing chain of hash-based proof-of-work,
forming a record that cannot be changed without redoing the proof-of-work. The longest chain not only
serves as proof of the sequence of events witnessed, but proof that it came from the largest pool of CPU
power. As long as a majority of CPU power is controlled by nodes that are not cooperating to attack the
network, they'll generate the longest chain and outpace attackers. The network itself requires minimal
structure. Messages are broadcast on a best effort basis, and nodes can leave and rejoin the network at
will, accepting the longest proof-of-work chain as proof of what happened while they were gone.
Solution Summary: Transacting Digital Currency
Source: https://www.edureka.co/blog/blockchain-tutorial/
What does a block look like?
4 Key Concepts of Blockchain
• Extensive
• Open development toolset and
• Framework to make developing Blockchain applications easier.
Bitcoin Transactions
• Electronic coin as a chain of digital signatures.
• Each owner transfers the coin to the next by digitally signing a
hash of the previous transaction and the public key of the next
owner and adding these to the end of the coin.
• A payee can verify the signatures to verify the chain of
ownership.
The problem of course is the payee can't verify that one of the
owners did not double-spend the coin.
• A common solution is to introduce a trusted central authority, or mint,
that checks every transaction for double spending.
• After each transaction, the coin must be returned to the mint to issue a
new coin, and only coins issued directly from the mint are trusted not
to be double-spent.
• The problem with this solution is that the fate of the entire money
system depends on the company running the mint, with every
transaction having to go through them, just like a bank.
• We need a way for the payee to know that the previous owners did
not sign any earlier transactions.
• For our purposes, the earliest transaction is the one that counts, so we
don't care about later attempts to double-spend.
• The only way to confirm the absence of a transaction is to be
aware of all transactions.
• In the mint based model, the mint was aware of all
transactions and decided which arrived first.
• To accomplish this without a trusted party, transactions must
be publicly announced, and we need a system for participants
to agree on a single history of the order in which they were
received.
• The payee needs proof that at the time of each transaction, the
majority of nodes agreed it was the first received.
Timestamp Server
• The solution begins with a timestamp server.
• A timestamp server works by taking a hash of a block of
items to be timestamped and widely publishing the hash,
such as in a newspaper or Usenet post .
• The timestamp proves that the data must have existed at the
time, obviously, in order to get into the hash.
• Each timestamp includes the previous timestamp in its hash,
forming a chain, with each additional timestamp reinforcing
the ones before it.
Proof-of-Work (1 of 4)
• To implement a distributed timestamp server on a peer-to-peer
basis, we will need to use a proof-of-work system similar to
Adam Back's Hashcash [6], rather than newspaper or Usenet
posts.
• The proof-of-work involves scanning for a value that when
hashed, such as with SHA-256, the hash begins with a number
of zero bits. The average work required is exponential in the
number of zero bits required and can be verified by executing a
single hash.
• The proof-of-work is implemented by incrementing a nonce in the
block until a value is found that gives the block's hash the required
zero bits.
• Once the CPU effort is made to satisfy the proof-of-work, the block
cannot be changed without redoing the work.
• If later blocks are chained after it, the work to change the block
would include redoing all the blocks after it.
Proof-of-Work (3 of 4)