Topic 1 Highlights - Introduction DLT

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

Introduction to Distributed Ledger Technology

Roles of Money
1. Medium of exchange: A value carrier between two independent transactions.
2. Means of payment: Exchanging money for goods or services.
3. Store of value: The value of wealth remains relatively stable over time.
4. Unit of account: A measure for economic quantities, such as GDP.
5. Natural co-option on goods and services: No expiration date or restriction on when
money can be spent.
Centralized, Decentralized, and Distributed Databases
 Centralized: A single, central database where all nodes are connected to the
database.
 Decentralized: Databases are distributed across different storage devices and
interconnected.
 Distributed: All nodes store data and access the database, requiring a consensus
algorithm to synchronize data across the network.
Distributed Ledger Technology (DLT)
 DLT is a set of technologies that enable a consistent representation of data across
multiple nodes without a central authority.
 It allows for a distributed record or ledger in which transactions are stored in a
permanent, immutable way using cryptographic techniques.
 DLT is essentially a database with different ways of recording and adding new
information, resulting in various types of DLT.
Types of DLT
1. Blockchain: Transactions are recorded with an unchangeable cryptographic signature
called a hash, and data is stored in blocks chained together.
2. Directed Acyclic Graph (DAG): Transactions are entered sequentially, and each
transaction needs to endorse two previous transactions to be considered valid.
3. Hashgraph: A gossip protocol is used to relay transaction information, and virtual
voting is used for validation.
4. Holochain: Each node maintains its own ledger, and a set of rules called DNA is used
to verify individual ledgers.
5. Radix or Tempo: The system relies on the sequence of transactions to reach
consensus, and each node keeps a shard with a unique ID.
Key Characteristics of DLT
1. Decentralized
2. Immutable
3. Append-only
4. Distributed
5. Shared

Blockchain Ecosystem
Nodes and Miners
 Nodes are computers or servers that maintain copies of the ledger, communicate
with each other, and help with data entry and verification.
 Miners create new blocks through the mining process and are designated nodes that
add new blocks to the blockchain.
Wallets, Public Keys, and Private Keys
 A blockchain wallet is a software program that allows users to buy, sell, and monitor
balances for their digital assets.
 Public keys are derived from private keys using known algorithms and are made
available through public directories.
 Private keys allow users to access their cryptocurrency and are kept secret. If lost, the
user can no longer access their wallet.
Hash Functions
 Hash functions are mathematical algorithms that transform information bits into a
string of alphanumeric values.
 They have a high avalanche effect, meaning a small change in the input results in a
significantly different output.
 Common hashing functions include SHA-256 and SHA-512.
 Merkle trees are hash-based data structures used to verify the contents of blocks and
links between blocks.
Nonce and Difficulty
 A nonce is a number that is generated and used only once, providing replay
protection, authentication, and encryption in cryptographic operations.
 Miners must find the correct nonce capable of generating a valid block hash that
meets specific requirements.
 Difficulty is a mechanism for regulating the time it takes to mine a block, ensuring
that blocks are added at regular intervals even as more miners join the network.
 The difficulty level is adjusted by the system every two weeks to maintain a
consistent block creation rate (e.g., every 10 minutes for Bitcoin).

Byzantine Generals Problem and Consensus


Byzantine Generals Problem
 A group of generals needs to reach a consensus on whether to attack or retreat, but
some of them may be traitors sending conflicting messages to others.
 In the blockchain network, all nodes are connected, so they can verify and check
transactions, solving the Byzantine Generals Problem.
Double-Spending and the Longest Chain Rule
 Double-spending occurs when someone tries to spend the same funds in multiple
transactions.
 The blockchain solves this problem by using a decentralized ledger that all users can
access and examine the full history of transactions.
 Three scenarios for double-spending:
1. If transaction A is validated first, transaction B will be rejected.
2. If A and B reach the new block at the same time, the transaction in the block
that gets the next block validated will be confirmed.
3. If no new block is built on A or B, the network waits until six blocks are
confirmed after A or B to validate the transaction.
 The Longest Chain Rule: The chain with the most accumulated work (measured by
the number of hashes and difficulty level) is considered the valid chain.
Limitations of Blockchain
1. Scalability: Blockchain networks are not as scalable as current financial networks.
2. Adoption: Blockchain is seen as a nascent technology, and challenges like scalability
must be solved to increase adoption.
3. Regulation: Due to its decentralized nature, regulation is almost impossible on
blockchain.
4. Relatively immature technology: Blockchain is still a new technology compared to
traditional IT systems.
5. Privacy and confidentiality: Public blockchains like Bitcoin lack privacy, which is a
concern for many industries.
6. High energy consumption: Blockchain, especially proof-of-work, consumes a lot of
energy.

Consensus Protocols
Definition and Key Properties
 Consensus protocols are a way to reach an agreement between different parties in a
blockchain network.
 Key properties: Safety and consistency, liveness, and fault tolerance.
Types of Consensus Protocols
 66 known consensus algorithms, with Bitcoin using proof-of-work.
 Proof-of-Work (PoW): Miners compete to find a nonce that satisfies a difficulty level,
requiring significant computational power.
 Proof-of-Stake (PoS): Validators stake their coins to propose blocks and secure the
network, consuming less power than PoW.
 Proof-of-Importance (PoI): A variation of PoS where each account is given an
importance score similar to a credit score.
Comparison of Consensus Protocols
 The choice of consensus protocol depends on the type of blockchain network (public,
private, or consortium).
 The comparison table in the reading material helps determine which consensus
protocol is suitable for a given network type.

Use Cases and Discussion


Facebook/Meta and the Libra Cryptocurrency
 In 2019, Facebook announced its own cryptocurrency called Libra (now renamed
Diem).
 Students are asked to research and discuss why Libra was not successful.
Other use cases mentioned include:
 AiGang, Tokio Marine Insurance, Generali Group
 Winding Tree, TUI Bedshare
 JPM Quorum
 Alibaba E-commerce, Walmart

You might also like