A Taxonomy of Blockchain Technologies: Principles of Identification and Classification

admin

A Taxonomy of Blockchain Technologies: Principles of Identification and Classification Paolo Tasca, Claudio J. Tessone Abstract A comparative study across the most widely known blockchain technologies is conducted with a bottom-up approach. Blockchains are deconstructed into their building blocks. Each building block is then hierarchically classified into main and subcomponents. Then, varieties of the subcomponents…

A Taxonomy of Blockchain Technologies: Principles of Identification and Classification Paolo Tasca, Claudio J. Tessone Abstract
A comparative study across the most widely known blockchain technologies is conducted with a bottom-up approach. Blockchains are deconstructed into their building blocks. Each building block is then hierarchically classified into main and subcomponents. Then, varieties of the subcomponents are identified and compared. A taxonomy tree is used to summarise the study and provide a navigation tool across different blockchain architectural configurations.

Full Text: PDF OPEN REVIEW References
Adhami, S., Giudici, G., Martinazzi, S. “Why Do Businesses Go Crypto? An Empirical Analysis of Initial Coin Offerings.

” Journal of Economics and Business (in press) http://hdl.handle.net/11250/2453330.
Andrews, C., Broby, D.

, Paul, G., Whitfield, I. “Utilising Financial Blockchain Technologies in Advanced Manufacturing.” University of Strathclyde (2017) (accessed 29 October 2018) http://doi.

ieeecomputersociety.org/10.1109/MC.2017.3571064.
Atzei, N., Bartoletti, M.

, Cimoli, T.

“A Survey of Attacks on Ethereum Smart Contracts (SoK).” In M. Maffei, M. Ryan (Eds.), Principles of Security and Trust, 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings. Berlin: Springer 164–186 (2017) https://dx.

doi.org/10.22495/jgr_v6_i1_p5.
Badzar, A.

“Blockchain for Securing Sustainable Transport Contracts and Supply Chain Transparency: An Explorative Study of Blockchain Technology in Logistics.” Lund University (2016) (Master’s Thesis) https://doi.org/10.1007/978-3-642-32946-3_29.
Ben-Sasson, E., Chiesa, A.

, Tromer, E., Virza, M. “Scalable Zero Knowledge Via Cycles of Elliptic Curves.” In J. A. Garay, R. Gennaro (Eds.), Advances in Cryptology–CRYPTO 2014.

Berlin: Springer 276–294 (2014) https://doi.org/10.

1007/978-3-662-44381-1_16.
Ben-Sasson, E., et al. “Zerocash: Decentralized Anonymous Payments from Bitcoin.

” In 2014 IEEE Symposium on Security and Privacy. IEEE 459–474 (2014) https://doi.org/10.1109/SP.2015.

14.
Boudguiga, A., et al. “Towards Better Availability and Accountability for IoT Updates by Means of a Blockchain.” In IEEE Security & Privacy on the Blockchain (IEEE S&B 2017) an IEEE EuroS&P 2017 and Eurocrypt 2017 Affiliated Workshop.

(2017) https://doi.org/10.1109/EuroSPW.

2017.50.
Buterin, V., et al. “A Next-Generation Smart Contract and Decentralized Application Platform.” (2014) (accessed 29 October 2018) https://github.com/ethereum/wiki/wiki/Light-client-protocol#background-patricia-merkle-trees.

Carlsten, M. The Impact of Transaction Fees on Bitcoin Mining Strategies. (PhD Thesis) Princeton University (2016).
Castro, M.

, Liskov, B., et al. “Practical Byzantine Fault Tolerance.” In Proceedings of the Third Symposium on Operating Systems Design and Implementation, New Orleans, USA, February 1999. 173–186 (1999) https://ssrn.com/abstract=2874598.
Cawrey, D.

“Why New Forms of Spam Could Bloat Bitcoin’s Block Chain.” CoinDesk (2014) (accessed 13 January 2017) http://www.coindesk.

com/new-forms-spam-bloat-bitcoins-block-chain/.
Chakravorty, A., Rong, C. “Ushare: User Controlled Social Media Based on Blockchain.” In Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication.

New York: Association for Computing Machinery 99 (2017) http://dx.

doi.org/10.1145/3022227.3022325.

Chen, Z.-D., Zhuo, Y., Duan, Z.-B., Kai, H. “Inter-Blockchain Communication.” DEStech Transactions on Computer Science and Engineering https://arxiv.org/abs/1612.04496.
Conley, J.

P. “Blockchain and the Economics of Crypto-Tokens and Initial Coin Offerings.” Vanderbilt University Department of Economics Working Papers (2017) (accessed 29 October 2018) https://arxiv.org/abs/1706.00916.

Cristian, F. “Understanding Fault-Tolerant Distributed Systems.

” Communications of the ACM 34.2 56–78 (1991) https://www.appliedinnovationinstitute.org/blockchain-technology-beyond-bitcoin/.

Davidson, S., De Filippi, P., Potts, J. “Disrupting Governance: The New Institutional Economics of Distributed Ledger Technology.” SSRN (2016) (accessed 29 October 2018) https://ssrn.

com/abstract=2811995.
de Wit, J. “DAO, Can It Be Viable? An Exploratory Research on the Viability of a Blockchain Based Decentralized Autonomous Organization.” Radboud University (2017) (Master’s Thesis) https://doi.org/10.1007/978-3-319-21741-3_1.

Decker, C., Wattenhofer, R. “Information Propagation in the Bitcoin Network.” In 2013 IEEE Thirteenth International Conference onPeer-to-Peer Computing.

IEEE 1–10 (2013) https://arxiv.org/abs/1612.05491.

Dorri, A., Kanhere, S.

S., Jurdak, R. “Towards an Optimized BlockChain for IoT.

” In Proceedings of the Second International Conference on Internet-of-Things Design and Implementation. New York: Association for Computing Machinery 173–178 (2017) https://doi.org/10.

1145/3054977.3055003.
Douceur, J.

R. “The Sybil Attack.” In P.

Druschel, F. Kaashoek, A. Rowstron (Eds.), Peer-to-Peer Systems. Berlin: Springer 251–260 (2002) https://doi.org/10.

1007/3-540-45748-8_24.
Driscoll, K., Hall, B., Sivencrona, H.

, Zumsteg, P. “Byzantine Fault Tolerance: from Theory to Reality.” In S. Anderson, M.

Felici, B. Littlewood (Eds.), International Conference on Computer Safety, Reliability, and Security. Berlin: Springer 235–248 (2003) https://doi.org/10.1007/978-3-540-39878-3_19.

Dziembowski, S.

, Faust, S., Kolmogorov, V., Pietrzak, K. “Proofs of Space.” In R. Gennaro, M. Robshaw (Eds.

), Advances in Cryptology–CRYPTO 2015. Berlin: Springer 585–605 (2015) https://doi.

org/10.1007/978-3-662-48000-7_29.
Evans, C. “Bitcoin in Islamic Banking and Finance.

” Journal of Islamic Banking and Finance 3.1 1–11(2015) https://doi.org/10.1109/SP.2015.13.
Eyal, I., Sirer, E.

G. “Majority Is Not Enough: Bitcoin Mining Is Vulnerable.” In N.

Christin, R. Safavi-Naini (Eds.), Financial Cryptography and Data Security 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014. Berlin: Springer 436–454 (2014) https://doi.org/10.1007/3-540-12689-9_99.
Garcia, D., Tessone, C.

J., Mavrodiev, P., Perony, N. “The Digital Traces of Bubbles: Feedback Cycles Between Socio-Economic Signals in the Bitcoin Economy.” Journal of The Royal Society Interface 11.9920140623 (2014) https://www.

mail-archive.

com/bitcoin-dev@lists.linuxfoundation.org/msg03051.html.
Grinberg, R.

“Bitcoin: An Innovative Alternative Digital Currency.” Hastings Science & Technology Law Journal 4 159 (2012) https://ssrn.com/abstract=1817857.
Guegan, D.

“Public Blockchain Versus Private Blockchain.” Universite Pantheon-Sorbonne (Paris 1), Centre d’Economie de la Sorbonne working papers (2017) (accessed 29 October 2018) https://econpapers.repec.

org/RePEc:mse:cesdoc:17020.
Hackius, N., Petersen, M. “Blockchain in Logistics and Supply Chain: Trick or Treat?” In W. Kersten, T.

Blecker, C. M.

Ringle (Eds.), Proceedings of the Hamburg International Conference of Logistics (HICL). Hamburg: epubli 3–18 (2017) https://ssrn.com/abstract=2438299.
Hearn, M. “Corda: A distributed ledger.” Corda Technical White Paper.

Hearn, M. “Corda: A distributed ledger.” (2016) (accessed 29 November 2018) https://www.

r3.com/wp-content/uploads/2017/06/corda_technical_R3.pdf.
Kim, H., Laskowski, M. “A Perspective on Blockchain Smart Contracts: Reducing Uncertainty and Complexity in Value Exchange.

” arXiv (2018) (accessed 29 October 2018) https://ssrn.com/abstract=2975770.

Kotobi, K., Bilen, S. G. “Blockchain-Enabled Spectrum Access in Cognitive Radio Networks.” In 2017 Wireless Telecommunications Symposium. IEEE 1–6 (2017) https://dx.

doi.org/10.

1093/jamia/ocx068.
Lamport, L., Shostak, R.

, Pease, M.

“The Byzantine Generals Problem.” ACM Transactions on Programming Languages and Systems 4.3 382–401 (1982) https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2017-March/013921.html.

Lewenberg, Y.

, Bachrach, Y., Sompolinsky, Y., Zohar, A., Rosenschein, J. S. “Bitcoin Mining Pools: A Cooperative Game Theoretic Analysis.

” In Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems. Istanbul: International Foundation for Autonomous Agents and Multiagent Systems 919–927 (2015) http://dl.

acm.org/citation.cfm?id=2772879.2773270.
Lin, I.-C., Liao, T.

-C.

“A Survey of Blockchain Security Issues and Challenges.” International Journal of Network Security 19.5 653–659 (2017) https://github.com/bitcoin/bips/blob/master/bip-0141.mediawiki.
Luther, W. J. “Cryptocurrencies, Network Eeffects, and Switching Costs.” Contemporary Economic Policy 34.

3 553–571 (2016) http://journal.apee.org/index.php/2018_Journal_of_Private_Enterprise_Vol_33_No_1_Spring_parte3.

Mainelli, M., von Gunten, C. “Chain Of A Lifetime: How Blockchain Technology Might Transform Personal Insurance.” Long Finance and Z/Yen Group (2014) (accessed 29 October 2018) https://chicagounbound.uchicago.edu/uclrev_online/vol82/iss1/4.

Mattila, J. “The Blockchain Phenomenon–The Disruptive Potential of Distributed Consensus Architectures.

” The Research Institute of the Finnish Economy (2016) (accessed 29 October 2018) https://ideas.repec.org/p/rif/wpaper/38.

html.
Maurer, F. K. “A Survey on Approaches to Anonymity in Bitcoin and Other Cryptocurrencies.” In H. C.

Mayr, M. Pinzger (Eds.), 46. Jahrestagung der Gesellschaft f¨ur Informatik, Informatik 2016, 26-30 September 2016, Klagenfurt, O¨ sterreich. Bonn: Gesellschaft fu¨r Informatik 2145–2150 (2016) https://www.weforum.org/reports/the-future-of-financial-infrastructure-an-ambitious-look-at-how-blockchain-can-reshape-financial-services.

Meguerditchian, V. “Roadmap for Blockchain Standards Report–March 2017.

” Standards Australia (2017) (accessed 29 October 2018) http://arstweb.clayton.edu/interlex.
Meiklejohn, S., Orlandi, C. “Privacy-Enhancing Overlays in Bitcoin.

” In M. Brenner, N. Christin, B. Johnson, K. Rohloff (Eds.), Financial Cryptography and Data Security, FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers.

Berlin: Springer 127–141 (2015) https://doi.org/10.1007/3-540-48184-2_32.
Morrison, D. R.

“PATRICIA—Practical Algorithm To Retrieve Information Coded In Alphanumeric.” Journal of the ACM 15.

4 514–534 (1968) https://doi.

org/10.1145/321479.321481.
Moser, M., Bohme, R. “Anonymous Alone? Measuring Bitcoin’s Second-Generation Anonymization Techniques.

” In 2017 IEEE European Symposium on Security and Privacy Workshops. IEEE 32–41 (2017) https://doi.org/10.1007/978-3-662-48051-9_2.
Nakamoto, S.

“Bitcoin: A Peer-to-Peer Electronic Cash System.” (2008) (accessed 29 October 2018) https://bitcoin.org/bitcoin.

pdf.
No Author. “CoinJoin.” Bitcoin Wiki (accessed 1 June 2017) https://bitcoin.org/en/developer-guide#block-chain-overview.
No Author. “Developer Guide: Mining.” bitcoin.org (2015) (accessed 25 April 2017) https://bitcoin.org/en/developer-guide#mining.

No Author. “History Sharding.” Ripple (2018) (accessed 1 November 2018) https://en.bitcoin.it/wiki/Mixing_service.

No Author. “ripple.com.

” Ripple (2015) (accessed 1 June 2015) https://xrp.

media/validator-details/.
Noether, S., Mackenzie, A., Monero Research Lab. “Ring Confidential Transactions.

” Ledger 1 1–18 (2016) https://dx.doi.org/10.

1049/cp.2014.0699.

Otto, K. N.

, Wood, K.

L. “Product Evolution: A Reverse Engineering and Redesign Methodology.” Research in Engineering Design 10.

4 226–243 (1998) https://doi.org/10.

1007/s001639870003.
Park, S.

, Pietrzak, K., Alwen, J., Fuchsbauer, G., Gazi, P. “Spacecoin: A Cryptocurrency Based on Proofs of Space.

” IACR Cryptology ePrint Archive (2015) (accessed 29 October 2018) https://web.archive.org/web/20160304055454/https://bytecoin.

org/blog/proof-of-activity-proof-of-burn-proof-of-capacity.
Plant, L., et al. “Implications of Open Source Blockchain for Increasing Efficiency and Transparency of the Digital Content Supply Chain in the Australian Telecommunications and Media Industry.” Australian Journal of Telecommunications and the Digital Economy 5.

3 15 (2017) https://lightning.network/lightning-network-paper.pdf.
Quintana Diaz, J.

M. “The Merger of Cryptography and Finance-Do Cryptographic Economic Systems Lead to the Future of Money and Payments?” SSRN (2014) (accessed 29 October 2018) https://ssrn.com/abstract=2536876.
Rabbit.

“So You Want to Run Rippled?” Ripple (2018) (accessed 1 November 2018) https://xrpcommunity.blog/rippled/.

Reid, F., Harrigan, M. “An Analysis of Anonymity in the Bitcoin System.” In A.

Y., Y. Elovici, A. Cremers, N. Aharony, A. Pentland (Eds.), Security and Privacy in Social Networks.

New York: Springer 197–223 (2013) https://doi.org/10.1007/978-1-4614-4139-7_10.

Rivest, R., Shamir, A., Tauman, Y. “How to Leak a Secret.” In C. Boyd (Ed.

), Advances in Cryptology—ASIACRYPT 2001. Berlin: Springer (2001) https://ssrn.com/abstract=3048104.

Rosenfeld, M. “Overview of Colored Coins.” (2012) (accessed 29 October 2018) https://bitcoil.

co.il/BitcoinX.pdf.
Scott, B. “How Can Cryptocurrency and Blockchain Technology play a Role in Building Social and Solidarity Finance?” United Nations Research Institute for Social Development, Working Paper (2016) (accessed 29 October 2018) http://www.unrisd.

org/brett-scott.
Selgin, G. “Synthetic Commodity Money.” Journal of Financial Stability 17 92–99 (2015) https://doi.org/10.1145/3155112.3168362.
Stellnberger, M.

“Insurance Through Blockchain: A Hybrid Approach.” martinstellnberger.

co (2016) (accessed 29 October 2018) https://ssrn.com/abstract=2657598.
Tasca, P.

“The Dual Nature of Bitcoin as Payment Network and Money.” SUERF Conference Proceedings 2016/1 ”Cash on Trial”. (2016) https://www.

nytimes.com/2018/12/04/opinion/blockchain-bitcoin-technology-revolution.html.
Tasca, P., Liu, S., Hayes, A. “The Evolution of the Bitcoin Economy: Extracting and Analyzing the Network of Payment Relationships.

” The Journal of Risk Finance 19.2 94–126 (2016) https://bitfury.com/content/downloads/pos-vs-pow-1.

0.2.pdf.
Tsukerman, M. “The Block Is Hot: A Survey of the State of Bitcoin Regulation and Suggestions for the Future.” Berkeley Technology Law Journal 30 1127 (2015) https://www.

bu.edu/rbfl/files/2017/09/p729.pdf.
Wood, G. “Ethereum: A Secure Decentralised Generalised Transaction Ledger.

” Ethereum (2014) (accessed 29 October 2018) https://ethereum.github.io/yellowpaper/paper.pdf.

Wright, A., De Filippi, P. “Decentralized Blockchain Technology and the Rise of Lex Cryptographia.” SSRN (2015) (accessed 29 October 2018) https://ssrn.com/abstract=2580664.

Xu, Q., Aung, K. M.

M., Zhu, Y., Yong, K. L. “A Blockchain-Based Storage System for Data Analytics in the Internet of Things.” In R.
Yager, J.

Pascual Espada (Eds.), New Advances in the Internet of Things. Berlin: Springer 119–138 (2018) https://doi.org/10.1109/ICSA.2017.33.

.

Leave a Reply

Next Post

In the Daily: Coinbase Bug Bounty, Tradingview Crypto Dashboard, Bitfinex App Update - Bitcoin News

3.0.0.0.2 Lubomir Tassev Coinbase Pays $30,000 Bug Bounty Cryptocurrency exchange Coinbase has paid a bug bounty of $30,000 for a critical vulnerability in its systems. The problem has since been fixed, Hard Fork reported, quoting a spokesperson of the leading U.S. digital asset trading platform. The company representative did not provide further details about the…

Subscribe US Now