Professional Documents
Culture Documents
Blockchain Essentials Core Concepts and Implementations Epub Convert 1St Edition Ramchandra Sharad Mangrulkar Full Chapter
Blockchain Essentials Core Concepts and Implementations Epub Convert 1St Edition Ramchandra Sharad Mangrulkar Full Chapter
Blockchain Essentials
Core Concepts and Implementations
Ramchandra Sharad Mangrulkar
Mumbai, Maharashtra, India
This work is subject to copyright. All rights are solely and exclusively
licensed by the Publisher, whether the whole or part of the material is
concerned, specifically the rights of translation, reprinting, reuse of
illustrations, recitation, broadcasting, reproduction on microfilms or in
any other physical way, and transmission or information storage and
retrieval, electronic adaptation, computer software, or by similar or
dissimilar methodology now known or hereafter developed.
The publisher, the authors, and the editors are safe to assume that the
advice and information in this book are believed to be true and accurate
at the date of publication. Neither the publisher nor the authors or the
editors give a warranty, expressed or implied, with respect to the
material contained herein or for any errors or omissions that may have
been made. The publisher remains neutral with regard to jurisdictional
claims in published maps and institutional affiliations.
This Apress imprint is published by the registered company APress
Media, LLC, part of Springer Nature.
The registered company address is: 1 New York Plaza, New York, NY
10004, U.S.A.
To our cherished daughter, Mansi:
Your unwavering support, encouragement, and constant sympathy were
invaluable during the creation of this book. Without you, it would have
been completed in half the time.
Preface
Blockchain has become the buzzword of the day. Developers are
focusing on more user-friendly applications with the help of blockchain,
achieving decentralization and a trustless environment without third-
party involvement. This includes diverse concepts and tools that play
major roles in developing crypto-based applications in various
programming languages. The distributed ledger and smart contracts
involved reveal the importance of blockchain in creating immutable and
transparent, cryptographically secure record-keeping of transactions.
The programming approach helps to shed light on the core concepts of
blockchain and relevant applications in easy steps. This helps to
motivate learners to become part of the solution to most of the
applications demanding trustless and independent autonomous
systems. The identification and examination of blockchain technology
beyond cryptocurrency will help to investigate alternative solutions
using many blockchain-supportive tools.
The main purpose of this book is to present the difficult concepts of
blockchain technology in very accessible and easy-to-understand
language using a programming approach so that learners can easily
grasp the key concepts arising from the emerging notion of blockchain
technology. Another purpose of this book is to make available the
experience of academia and industry to the target audience through
hands-on programming.
This book presents the concepts of blockchain technology in a
concise manner with clear and easy examples using trending
blockchain programming languages. The book fills a gap of address
issues surrounding the practical implementation of blockchain
concepts using case studies. The book also highlights the usefulness of
blockchain technology beyond its current applications.
Mumbai, India Ramchandra Sharad Mangrulkar
September 2023 Pallavi Vijay Chavan
Any source code or other supplementary material referenced by the
author in this book is available to readers on GitHub (https://github.
com/Apress). For more detailed information, please visit https://www.
apress.com/gp/services/source-code.
Acknowledgments
We extend our sincere gratitude to the dedicated contributors and
accomplished researchers in the field of blockchain for their invaluable
contributions and pioneering work.
Contents
1 Introduction to Blockchain
1.1 Prerequisites
1.2 Blockchain Myths
1.3 Blockchain and Decentralization
1.4 What Is Blockchain?
1.5 Disruptive Technology
1.6 History
1.6.1 Milestones in Blockchain Development
1.7 Features of Blockchain
1.8 Present Growth
1.9 Predicted Market
1.10 Blockchain Types
1.10.1 Public
1.10.2 Private
1.10.3 Federated
1.10.4 Hybrid
1.10.5 Difference Between Public and Private Blockchains
1.11 Blockchain Framework
1.11.1 Hardware/Infrastructure Layer
1.11.2 Data Layer
1.11.3 Network Layer
1.11.4 Consensus Layer
1.11.5 Application and Presentation Layer
1.12 A Block and Its Structure
1.12.1 A Block
1.12.2 Block Structure
1.12.3 Ledger
1.12.4 Distributed
1.12.5 Transparency
1.12.6 Confirmation
1.12.7 Proof of Work
1.12.8 Block Awards
1.12.9 Transactions and UTXOs
1.12.10 Consensus
1.13 Scaling Blockchain
1.13.1 Issues in Scaling
1.13.2 Off-Chain Computation
1.13.3 Sharding in Blockchain
1.14 Blockchain DApps and Usecases
1.15 Laboratory Work
1.15.1 Program for Implementing Blockchain in Python
1.15.2 Program for Mining a New Block in Blockchain and
Printing It
1.15.3 Program for Creating Four Blocks in Blockchian and
Printing and Traversing
1.15.4 Implementing Blockchain and Printing All Fields as
per Etherscan.io
1.15.5 Implementing Blockchain and UTXo in Python
1.15.6 Explanation of Code
1.15.7 Implementation of PoW Algorithm in Python
1.15.8 Implementation of PoS Algorithm in Python
1.15.9 Program to Fetch the Latest Block Information from
Ethereum Blockchain Using Etherscan API
1.15.10 Explanation of Code
1.16 Summary
1.17 Exercise
1.17.1 Multiple Choice Questions
1.17.2 Short Answer Questions
1.17.3 Long Answer Questions
1.17.4 Practical Questions
1.17.5 Answer Set of MCQ
2 Essentials of Blockchain Programming
2.1 Cryptography Primitives
2.1.1 Hash Function
2.2 Hash Functions
2.2.1 Properties of Hash Functions
2.2.2 Hash Pointers and Data Structures
2.2.3 Tampering Is Computationally Challenging
2.2.4 Role of Hashes in Blockchain
2.3 Secure Hash Algorithm (SHA)
2.3.1 SHA Algorithm
2.3.2 Hashing Patterns
2.4 Public Key Cryptography
2.4.1 Secure Hash Algorithm-3 (Keccak)
2.5 Merkle Tree
2.5.1 Merkle Tree Creation
2.5.2 Role of Merkle Tree in Blockhain
2.5.3 Structure of Merkle Tree
2.5.4 Merkle Proof
2.5.5 Proof of Membership
2.5.6 Proof of Nonmembership
2.5.7 Advantages of Merkle Trees
2.5.8 Applications of Merkle Trees
2.5.9 Merkle Tree Proof of Reserves
2.6 Public Key Cryptography
2.6.1 Public and Private Keys
2.6.2 Public Key Encryption Algorithms
2.6.3 Digitally Signed Transaction
2.6.4 Digital Signing in Blockchain
2.7 Laboratory Work
2.7.1 Program in Python that Demonstrates the Use of
Hashlib Library to Generate the SHA-3 Hash of a Message
2.7.2 Python Program that Takes a String and the Desired
Number of Leading Zeros from the User and Outputs the
Input String, the Nonce Value for Which the Leading Zeros
Puzzle Is Solved, and the Corresponding Hash Generated
2.7.3 Program to Create Hash Code from Given Input String
2.7.4 Program in Python that Demonstrates How to Use the
SHA-256 Hash Function and Its Application in a Simple
Blockchain
2.7.5 Write a Program in Python to Verify Hash Properties
2.7.6 Program to Demonstrate a Simple Implementation of a
Blockchain Using Hash Codes as a Chain of Blocks
2.7.7 Program to Demonstrate the Mining Process in
Blockchain
2.7.8 Program to Create a Merkle Tree in Blockchain
2.7.9 Program to Prove Membership and Nonmembership
in a Merkle Tree Blockchain
2.7.10 Explanation of Code
2.7.11 Program to Demonstrate How to Prove the
Membership and Nonmembership of an Element in a
Merkle Tree Blockchain
2.7.12 Program in Python that Demonstrates RSA Digital
Signature Scheme
2.8 Summary
2.9 Exercise
2.9.1 Multiple Choice Questions
2.9.2 Short Answer Questions
2.9.3 Long Answer Questions
2.9.4 Practical Questions
2.9.5 Programming Questions
3 Bitcoin
3.1 What Is Bitcoin
3.2 History
3.3 Predicted Market
3.4 Wallet
3.4.1 Bitcoin Wallets
3.4.2 Custodial Wallet
3.4.3 Noncustodial Wallet
3.4.4 Software Wallet
3.4.5 Hardware Wallet
3.4.6 Features of Digital Wallet
3.4.7 Difference Between Digital Wallet and Bank Accounts
3.4.8 Top Digital Wallet
3.5 Digital Keys and Addresses
3.5.1 Private Keys
3.5.2 Public Keys
3.6 Addresses in Bitcoin
3.7 Transaction
3.7.1 Transaction Lifecycle
3.7.2 Creating Transactions
3.7.3 Broadcasting Transactions to the Bitcoin Network
3.7.4 Propagating Transactions on the Bitcoin Network
3.7.5 Data Structures for Transaction
3.7.6 Types of Transactions
3.7.7 Transaction Input and Output
3.8 Digital Signature
3.9 Mining and Consensus in Bitcoin
3.9.1 Mining
3.9.2 Consensus
3.9.3 Decentralized Consensus in Bitcoin
3.9.4 Mining and Racing in Bitcoin
3.9.5 Cost of Mining in Bitcoin
3.9.6 Consensus Attacks in Bitcoin
3.10 Forking
3.10.1 Hard Fork
3.10.2 Soft Fork
3.11 Laboratory Work
3.11.1 Program to Generate Private Keys Securely on a
Hardware Wallet
3.11.2 Program to Generate Public-Private Key Pairs,
Encrypting and Storing Private Keys Securely and Signing
Transactions Using the Private Key
3.11.3 Program to Demonstrate Some of the Features of a
Digital Wallet
3.11.4 Program to Compare the Features of Popular Digital
Wallets, Rank Them Based on User Reviews and Ratings,
and Recommend a Digital Wallet Based on User Preferences
3.11.5 Program to Deploy a Smart Contract to Blockchain
Using a Tool Like Remix IDE
3.11.6 Program that Measures the Transaction Throughput
of EOA–EOA Transactions and CA–CA Transactions Using
Various Gas Limits on the Ethereum Network
3.11.7 Program that Uses Web3 to Categorize Ethereum
Addresses as EOA or Contract Addresses and Evaluates Its
Accuracy and Performance on a Large Dataset of Addresses
3.11.8 Program that Simulates the Life Cycle of a
Transaction on the Ethereum Network and Measures the
Time and Resources Required
3.11.9 Program for Implementing ECDSA
3.11.10 Program to Create a Bitcoin Transaction and Sign It
with a SIGHASH Flag Using the bitcoinlib Library
3.11.11 Program for Bitcoin Mining
3.11.12 Program that Demonstrates How to Identify 51%
Attackson a Blockchain
3.11.13 Program to Demonstrate the Concept of Forking
3.11.14 Program to Detect and Deal with 51% Attacks in the
BitcoinBlockchain
3.12 Summary
3.13 Exercise
3.13.1 Multiple Choice Questions
3.13.2 Short Answer Questions
3.13.3 Long Answer Questions
4 Ethereum Blockchain
4.1 Overview of Ethereum Blockchain
4.1.1 Key Features
4.1.2 EVM
4.2 History of Ethereum
4.2.1 Ledger to State Machine
4.2.2 Ethereum Network
4.3 Smart Contracts
4.4 Challenges in Implementing Smart Contracts
4.4.1 Smart Contract Life Cycle
4.4.2 Introducing Solidity
4.4.3 Global Variables
4.5 Ethereum Development Tools
4.6 Ethereum Transactions
4.6.1 Transaction Life Cycle
4.7 Gas and Transaction Fees
4.7.1 Addressing Gas Fees
4.7.2 Factors Affecting Gas Price
4.7.3 Calculating Gas Costs
4.7.4 Gas Fee Calculation
4.7.5 Implications of Base Fee
4.7.6 Transaction Cost Predictability
4.7.7 Future with PoS
4.7.8 Gas Fees and Orchid
4.7.9 Example 1:Wallet-to-Wallet Transfer
4.7.10 Example 2:Deploying a Simple Contract
4.7.11 Avoiding Ethereum Gas Fees
4.8 Laboratory Work
4.8.1 Solidity Program for Displaying Hello Message
4.8.2 Program for Demonstrating Simple Increment and
Decrement Functions
4.8.3 Smart Contract Development with Solidity
4.8.4 Implementing Security Measures in Smart Contracts
4.8.5 Developing an ERC-20 Token
4.8.6 Building a Simple DApp
4.8.7 Interacting with Off-Chain Data Using Oracles
4.8.8 Program to Demonstrate a Basic Example of Smart
Contract Interaction and Ownership Management on
Ethereum Blockchain
4.8.9 Program to Create a Decentralized Blind Auction
Smart Contract on the Ethereum Blockchain, Enabling
Participants to Place Concealed Bids, Reveal Them, and
Determine the Highest Bidder While Ensuring Secure Fund
Management and Transparent Auction Outcomes.This
Contract Facilitates a Trustless and Tamper-Resistant
Auction Mechanism, Promoting Fairness and Efficiency in
Auction Processes
4.8.10 Program to Showcase the Vulnerability of Reentrancy
Attacks in a Smart Contract Context and Demonstrate the
Implementation of a Solution Using a Reentrancy Guard
4.9 Mist Browser
4.9.1 Guidlines for Using Mist Browser
4.9.2 Mist and Geth
4.9.3 Geth’s Role
4.10 Summary
4.11 Exercise
4.11.1 Multiple Choice Questions
4.11.2 Long Answer Questions
5 Hyperledger
5.1 Introduction to Hyperledger
5.1.1 The Purpose of Hyperledger
5.2 Hyperledger Architecture
5.2.1 Infrastructure Layer
5.2.2 Framework Layer
5.2.3 Tool Layer
5.3 Hyperledger Community and Development
5.4 Hyperledger Smart Contracts (Chaincode)
5.5 The Functioning of Hyperledger
5.5.1 Contributor
5.5.2 Endorser
5.5.3 Consenter
5.5.4 Example
5.5.5 Advantages of Hyperledger
5.5.6 Limitations of Hyperledger
5.6 Hyperledger Projects
5.6.1 Comparison of Hyperledger with Other Blockchain
Frameworks
5.6.2 Hyperledger Fabric in Blockchain
5.6.3 Consensus in Hyperledger Fabric
5.7 Hyperledger Consortiums and Networks
5.8 Hyperledger and Blockchain as a Service (BaaS)
5.8.1 Hyperledger Adoption Through BaaS
5.8.2 Advantages and Considerations
5.9 Laboratory Work
5.9.1 Program to Demonstrate Interaction with a
Hyperledger Fabric Blockchain Network Using the
Hyperledger Fabric JavaScript SDK
5.9.2 Program to Demonstrate How Hyperledger Fabric
Could Be Used in a Healthcare Context to Manage Patient
Medical Records
5.9.3 Program to Demonstrate the Implementation of a
Basic Government Application Using Hyperledger Fabric
5.9.4 Program to Demonstrate Finance Application Using
Hyperledger Fabric
5.9.5 Program to Demonstrate the Implementation of a
Finance and Payments System Using Hyperledger Fabric
5.9.6 Explanation of Code
5.9.7 Program to Demonstrate Simple Interoperability
Using the Hyperledger Fabric JavaScript SDK to Interact
with the Network and Demonstrate How Two Different
Smart Contracts Can Work Together
5.9.8 Program to Demonstrate Smart Contract Modeling
with Composer and Docker
5.9.9 Program for Demonstrating Hyperledger Caliper, a
Benchmarking Tool That Measures the Performance of
Hyperledger Blockchain Applications Under Various
Conditions
5.9.10 Running Caliper Benchmarks with Docker
5.10 Summary
5.11 Exercise
5.11.1 Multiple Choice Questions
5.11.2 Short Answer Questions
5.11.3 Long Answer Questions
5.11.4 Programming Questions
6 Case Studies Using Blockchain
6.1 Blockchain – The Technology for Document Management
6.1.1 The Ownership
6.1.2 Introduction and Background
6.1.3 Problem Statement
6.1.4 Use Case Description
6.1.5 Solution Architecture
6.1.6 Implementation Steps
6.1.7 Smart Contracts
6.1.8 Data Management and Security
6.1.9 Interoperabilityand Integration
6.1.10 User Experience
6.1.11 Results and Benefits
6.1.12 Challenges and Lessons Learned
6.1.13 Future Enhancements and Scalability
6.1.14 Conclusion
6.2 Case Study 2:Blockchain in the Food Supply Chain
6.2.1 Introduction and Background
6.2.2 Problem Statement
6.2.3 Use Case Description
6.2.4 Solution Architecture
6.2.5 Implementation Steps
6.2.6 Smart Contracts
6.2.7 Data Management and Security
6.2.8 Interoperabilityand Integration
6.2.9 User experience
6.2.10 Results and Benefits
6.2.11 Challenges and Lessons Learned
6.2.12 Future Enhancements and Scalability
6.2.13 Conclusion
6.3 Case Study 3:Blokchain in the Insurance Industry
6.3.1 Introduction and Background
6.3.2 Problem Statement
6.3.3 Use Case Description
6.3.4 Solution Architecture
6.3.5 Implementation Steps
6.3.6 Smart Contracts
6.3.7 Data Management and Security
6.3.8 Interoperabilityand Integration
6.3.9 User Experience
6.3.10 Analysis
6.3.11 Conclusion
6.4 Case Study 4:India’s Income Tax Department’s
Simplification of Tax Procedures
6.4.1 Introduction and Background
6.4.2 Problem Statement
6.4.3 Use Case Description
6.4.4 Solution Architecture
6.4.5 Implementation Steps
6.4.6 Smart Contracts
6.4.7 Tax Authority Interaction (Not Implemented in This
SimplifiedExample)
6.4.8 Event Log
6.4.9 Data Management and Security
6.4.10 Interoperabilityand Integration
6.4.11 User Experience
6.4.12 Analysis
6.4.13 Conclusion
6.5 Case Study 5:Retail Banking
6.5.1 Introduction and Background
6.5.2 Problem Statement
6.5.3 Use Case Description
6.5.4 Solution Architecture
6.5.5 Implementation
6.5.6 Data Management and Security
6.5.7 Network Security
6.5.8 Incident Response
6.5.9 Interoperabilityand Integration
6.5.10 User Experience
6.5.11 Analysis
6.5.12 Conclusion
6.6 Summary
6.7 Exercise
6.7.1 Multiple Choice Questions
6.7.2 Short/Long Answer Questions
7 Beyond Blockchain
7.1 Blockchain for the Metaverse
7.2 Emergence of the Metaverse
7.3 Understanding the Metaverse
7.4 Metaverse Layers
7.4.1 Spatial Computing
7.4.2 Metaverse Components
7.5 Metaverse Through Immersive Technologies
7.5.1 Challenges in Metaverse Implementation
7.6 Blockchain’s Role in the Metaverse
7.6.1 Why Blockchain Technology Is Crucial for the
Metaverse
7.6.2 Interoperabilityand Standards
7.6.3 Security and Trust
7.6.4 Monetization and Incentives
7.7 Digital Scarcity and Ownership of Virtual Assets
7.8 Building Trust and Security in the Decentralized Metaverse
7.8.1 Trustless Nature of the Metaverse
7.8.2 Zero Trust Security in the Metaverse
7.9 Data Hub for Crypto, DeFi, NFT, Metaverse
7.9.1 Real-Time Data Streaming
7.10 Digital Trust Networks
7.10.1 Diverse Applications of Digital Trust Networks
7.10.2 Peer-to-Peer Marketplaces
7.10.3 Platform Ecosystems
7.10.4 Zero Trust Security Systems
7.10.5 Digital Identity Platforms
7.10.6 Decentralized Autonomous Organizations
7.11 Beyond Cryptocurrency:Transforming ESG, Digital
Assets,and Financial Markets
7.11.1 Environmental, Social, and Governance (ESG)
7.11.2 Digital Assets and Currency
7.11.3 Central Bank Digital Currencies
7.11.4 Blockchain Modernizing Financial Markets
7.11.5 Blockchain and AI:A Synergy for Trust and
Intelligence
7.11.6 Data Analysis and Predictive Insights
7.11.7 Smart Contract Automation
7.11.8 Enhanced Security
7.11.9 Scalability and Performance
7.12 The Future of Banks
7.12.1 Instant and Efficient Cross-Border Payments
7.12.2 Streamlined Trade Finance
7.12.3 Innovative Revenue Streams
7.13 Blockchain and Sustainable Technologies
7.13.1 Renewable Energy Trading
7.13.2 Environmental Conservation
7.14 Tangle
7.15 Summary
7.16 Short/Long Answer Questions
Bibliography
Index
About the Authors
Ramchandra Mangrulkar
is a Professor in the Department of Information
Technology in the Dwarkadas J. Sanghvi College of
Engineering in Mumbai, India. He holds various
memberships in professional organizations such as IEEE,
ISTE, ACM, and IACSIT. He completed his Doctor of
Philosophy (Ph.D.) in Computer Science and Engineering
from S.G.B. Amravati University in Maharashtra and
Master of Technology (MTech) in Computer Science and Engineering
from the National Institute of Technology, Rourkela. Dr. Mangrulkar is
proficient in several technologies and tools, including Microsoft’s Power
BI, Power Automate, Power Query, and Power Virtual Agents, Google’s
Dialog Flow, and Overleaf. With over 22 years of combined teaching and
administrative experience, Dr. Mangrulkar has established himself as a
knowledgeable and skilled professional in his field. He has also
obtained certifications like Certified Network Security Specialist
International CyberSecurity Institute (ICSI) – Certified Network
Security Specialist (CNSS) from ICSI, UK. Dr. Mangrulkar has an
extensive publication record, with 95 publications including
refereed/peer-reviewed international journal publications, book
chapters with international publishers (including ones indexed in
Scopus), and international conference publications.
1. Introduction to Blockchain
Ramchandra Sharad Mangrulkar1 and Pallavi Vijay Chavan1
(1) Mumbai, Maharashtra, India
Readers of this book are likely to have some knowledge and basic idea
about the enormous potential of the trending, decentralizing, and
trustworthy technology called blockchain. This technology represents
an innovation in the digital ecosystem that has significantly impacted
trusted computing activities, resulting in an enhanced level of protection
from cyber security threats.
This chapter lays out the fundamentals of blockchain technology,
presenting its theoretical background, historical milestones, and present
growth trends. Further, the conceptual view of a block in blockchain and
the types of blockchain are described. The chapter discusses the basic
skill set and libraries required to start doing “blockchain programming,”
which is a key objective of this book. The chapter ends with a few
examples and their implementation in Python.
1.1 Prerequisites
The prerequisites for blockchain technology include:
Understanding of cryptography: Cryptography is the foundation of
blockchain technology. A basic understanding of cryptographic
concepts, such as hashing, public-key encryption, and digital
signatures, is necessary.
Distributed systems: Blockchain is a distributed system that runs on
multiple nodes. Therefore, it is essential to have a good understanding
of distributed systems to build and deploy blockchain applications.
Data structures and algorithms: Blockchain technology relies on
complex data structures such as Merkle trees and algorithms such as
consensus algorithms. Understanding of these concepts is crucial for
building a robust blockchain system.
Networking and security: Blockchain technology requires a good
understanding of networking protocols, such as TCP/IP, HTTP, and
HTTPS. Additionally, a solid understanding of security concepts, such
as firewalls, encryption, and authentication, is necessary to develop
secure blockchain applications.
Smart contracts: Smart contracts are self-executing contracts with the
terms of the agreement between buyer and seller directly written into
lines of code. Knowledge of smart contract programming languages,
such as Solidity, is necessary for building decentralized applications.
Business and economics: Blockchain technology is disrupting
traditional business models and creating new opportunities.
Understanding the economics of blockchain and how it can be applied
to business is essential for leveraging its potential.
Legal and regulatory dimensions: Blockchain technology operates in a
regulatory gray area in many countries, and regulations are constantly
evolving. Understanding the legal and regulatory environment in
which blockchain operates is critical for creating compliant and
successful blockchain applications.
1. Immutable
Immutability lies at the core of blockchain technology, rendering
it an unchangeable and enduring network. By operating through a
network of nodes, the blockchain ensures that once a transaction is
recorded, it becomes permanent and resistant to modification. This
immutability characteristic establishes the blockchain as a secure
and trustworthy ledger, bolstering confidence in its integrity and
authenticity.
Figure 1-4 Features of blockchain
2. Distributed
Transparency is a fundamental feature of blockchain technology,
as all network participants possess a copy of the ledger, ensuring
complete visibility. By employing a public ledger, the blockchain
offers comprehensive information regarding participants and
transactions. The distributed computational power across multiple
computers enhances the efficiency and reliability of the network,
leading to improved outcomes in terms of security and consensus.
3. Decentralized
Blockchain technology operates as a decentralized system,
devoid of a central authority, whereby numerous nodes collaborate
to authenticate and validate transactions. Every node within a
blockchain network possesses an identical copy of the ledger,
ensuring consistency and eliminating the need for a central point of
control. This decentralized architecture enhances the security,
resilience, and transparency of the network, making it resistant to
single points of failure or manipulation.
4. Secure
In a blockchain, each record undergoes individual encryption,
bolstering the overall security of the network. The absence of a
central authority does not grant unrestricted access to add, update,
or delete data on the network. Cryptographic hashing assigns a
unique identity to every piece of information on the blockchain,
ensuring the integrity and immutability of the data. Each block
contains a distinctive hash along with the hash of the preceding
block, creating cryptographic links between blocks. Modifying the
data would require changing all the hash IDs, an exceedingly
challenging and practically infeasible task.
5. Consensus
Consensus plays a vital role in blockchain networks by enabling
efficient and impartial decision-making. It involves the use of
algorithms that allow a group of active nodes to reach swift and
reliable agreements, ensuring the smooth operation of the system.
Although nodes may lack trust in one another, they rely on the
consensus algorithm at the heart of the network to facilitate
consensus. Various consensus algorithms exist, each with its own
advantages and disadvantages. A consensus algorithm is essential
for any blockchain to maintain its value and integrity.
6. Unanimous
In a blockchain network, agreement on the validity of records is
crucial before their inclusion. When a node intends to add a block, it
requires majority consensus through voting, ensuring that the block
can be added to the network. Unauthorized addition, modification,
or deletion of information is prevented. Updates to records occur
simultaneously, rapidly propagating throughout the network.
Therefore, any changes without the consent of the majority of nodes
are practically impossible due to the stringent consensus
requirements in place.
7. Smart Contract
Smart contracts are agreements whose provisions are encoded
in computer code and automatically execute. Without
intermediaries, they automate, facilitate, and enforce contractual
agreements. Smart contracts augment a blockchain with
programmable capabilities, allowing actions and transactions to be
activated automatically when predefined conditions are met. This
function improves the efficacy and independence of blockchain
applications, such as financial services and supply chain
management.
1.8 Present Growth
The growth of blockchain technology has continued to accelerate in
recent years. Here are some examples of its present growth:
Investment: According to a report by CB Insights, global investment in
blockchain startups has increased steadily, with over USD billion
raised across 342 deals in 2021 alone.
Enterprise adoption: Major corporations, including IBM, Walmart, and
Visa, are investing in and implementing blockchain technology for
supply chain management, payment processing, and other
applications.
Cryptocurrency adoption: Cryptocurrencies such as Bitcoin and
Ethereum have seen significant increases in adoption and investment.
In 2021, the total market capitalization of all cryptocurrencies
surpassed USD 2 trillion.
Government interest: Several governments around the world are
exploring the use of blockchain technology for various applications,
including the development of CBDCs and voting systems.
NFTs: The emergence of nonfungible tokens (NFTs) on blockchain
platforms has created a new market for digital assets and has the
potential to revolutionize the art, music, and gaming industries.
Increased scalability: The development of new blockchain
technologies, such as sharding and layer-2 solutions, is addressing the
issue of scalability, making it possible to process more transactions
per second and enabling more widespread adoption.
1.10.1 Public
A public blockchain is a type of blockchain technology that is open to
anyone, and anyone with Internet facilities is eligible to participate. It
operates in a decentralized manner, allowing participants to validate
blocks and send transactions without the need for permission from a
central authority. Public blockchains often use two major consensus
algorithms: proof of work (PoW) and proof of stake (PoS).
They are characterized by their openness, transparency, and lack of
central authority. Nodes can join and leave a network freely, and all
nodes can verify new data added to the blockchain.
Public blockchains employ incentive mechanisms to ensure the
correct operation of the system. They are permissionless, meaning
anyone can access the blockchain without requiring permission, and the
ledger is shared and transparent. Participants in a public blockchain can
remain anonymous, as real names and identities are not necessary.
Public blockchains offer users greater freedom and flexibility in how
they use the platform, without the limitations imposed by regulations.
Another random document with
no related content on Scribd:
Watt, from old stern-hearted but at last relenting Tanna. The Church
of Victoria has again summoned me to visit the Colonial
Congregations, to tell the story of my Mission life, and to promote
the interests of its now grand and growing Foreign Scheme. It is in
the midst of such labours, while addressing at least one meeting
every day, and three or four every Sabbath day, that I have penned
the preceding pages; and I leave them to speak for themselves,
without any attempt at ornament or style. The Lord whom I serve in
the Gospel knows my motive and my hope, and I very calmly leave
this book to His disposal, and the succeeding volume to His
guidance, if such there shall ever be—as the reader well knows I have
had to leave heavier and darker issues in the same blessed Hands. I
offer every one, who has done me the favour to read or to listen, my
kindly greeting. May you and I meet in the glory of Jesus, and
continue our fellowship there! Good-bye.
APPENDIX.
APPENDIX A.
(See p. 354.)
VERY-DAY LIFE IN CHINA, or, Scenes along River and Road in the
Celestial Empire. By Edwin J. Dukes. Illustrations from the author’s
sketches. 12mo., with embellished cover, $2.00.
That China is a mysterious problem to all who interest themselves in its affairs is
the only excuse for offering another book on the subject.
• MISSIONARY PUBLICATIONS •
1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside
the United States, check the laws of your country in addition to
the terms of this agreement before downloading, copying,
displaying, performing, distributing or creating derivative works
based on this work or any other Project Gutenberg™ work. The
Foundation makes no representations concerning the copyright
status of any work in any country other than the United States.