Blockchain Technology

Comments Off on Blockchain Interoperability & Survivability

Blockchain Interoperability & Survivability

Part 2: How Interoperability is Key to Survivability The idea that a blockchain network can withstand a concerted attack simply because it consists of physically distributed nodes appears to be an untested and unproven proposition. We have not yet seen the extent of attacks possible on blockchain networks. Attacks can range from classic network-level attacks Read More

Comments Off on Survivability of Blockchain Systems

Survivability of Blockchain Systems

Part 1: The Goals of the Internet Architecture Currently there is considerable interest (real and hype) in blockchain systems as a promising technology for the future infrastructure of a global value-exchange network – or whatsome refer to as the “Internet of value”. The original blockchain idea of Haber and Stornetta is now a fundamental construct Read More

Comments Off on Public keys on blockchains: confusing existence with trust

Public keys on blockchains: confusing existence with trust

Today Identity and Access Management (IAM) represents a core component of the Internet infrastructure,  without which users would not be able to obtain online services in a timely and scalable manner. Enterprise IAM infrastructures are well integrated into other enterprise infrastructure services — such as directory services — which provide control over employees and assets. Read More

Comments Off on Blockchains: Evidence of Mediated Computation

Blockchains: Evidence of Mediated Computation

In writing of the report of the Kantara BSC group (Blockchain and Smart Contracts) – a group that has been meeting bi-weekly for the past 7 months – we have come across numerous use-cases proposed by members who are looking closely at blockchain technology (or more generally from distributed ledger technology). To enable classification of these Read More

Comments Off on Query Smart Contracts: Bringing the Algorithm to the Data

Query Smart Contracts: Bringing the Algorithm to the Data

One paradigm shift being championed by the MIT OPAL/Enigma community is that of using (sharing) algorithms that have been analyzed by experts and have been vetted to be “safe” from the perspective of privacy-preservation. The term “Open Algorithm” (OPAL) here implies that the vetted queries (“algorithms”) are made open by publishing them, allowing other experts to review Read More