In 2008, a white paper titled ‘Bitcoin: A Peer-to-Peer Electronic Cash System’ mysteriously appeared under the pseudonym Satoshi Nakamoto.[1] Said paper explained the infrastructure of using a cryptographic blockchain that would remove or limit the reliance on intermediaries involved in financial transactions. Currently, blockchain technology is undergoing an evolutionary process. This is primarily due to the limitations of underlying methods deployed for adding a block to the chain. However, there are other potential uses for blockchain where different structures of blockchain technology are utilised, such as identity management for sectors outside of nance. This article reviews the essential functions and principles of blockchain technology as they relate to both Bitcoin and possible future applications.

Blockchain technology
Throughout human history, our species has found different ways to exchange goods and services. From direct bartering to third party intermediaries, over time we have discovered that one of the cornerstones of our social system is trust. As such, we have devised ways to record transactions with the most commonly used method being our accounting systems that use ledgers to store written (and now digital) data.

Fast forward to the 21st century where the amount of digital data winding its way through the internet and stored on a collection of distant servers is now measured in zettabytes; and this data is only increasing in size and scope. The essential digital infrastructure of these servers is similar to the aforementioned accounting ledgers whereby the input and output of transactions are recorded. The third party intermediaries who monitor and verify the transactions tend to be large institutions such as banks, who are tasked with the responsibility to ensure:

  • the validation of the transaction: the currency, product or service does exist and is not spoofed for fraudulent purposes;
  • transaction oversight: if there is a dispute about the transaction between buyer and seller, the inter- mediary has regulations in place to find an agreement and take action if necessary;
  • the recording of the transaction: the intermediary has specific methods and processes for recording the transaction as part of a permanent and secure transaction record.[2]

Blockchain technology was first introduced through a white paper that surfaced in 2008. Using the pseudonym Satoshi Nakamoto, the individual(s) who penned the document established the idea of a peer-to-peer electronic cash system with several primary objectives:[1]

  • to increase the trust between parties involved in a transaction through cryptographic proof that the transaction is, indeed, real
  • to implement a direct transaction method between two parties by removing the need for the intermediary
  • to decrease the costs of transactions that would normally incur due to an intermediary being involved in validating, overseeing, and recording the transaction as well as acting as a mediator, should a dispute arise
  • to prevent reversals of a transaction that may occur due to fraudulent intent by either party

Though there were earlier technological innovations that preceded the formalising and establishing blockchain technology, most within the blockchain community consider Satoshi Nakamoto’s paper to be the first clearly defining the blockchain architecture.

At its core, blockchain technology is “essentially a distributed database of records, or public ledger of all transactions or events that have been executed and shared among participating parties.”[3] The data – the transactions – within the blockchain are separated into blocks, each of which has a dependency on the prior blocks in the chain. Instead of the intermediary being a single entity, the blockchain network has ‘nodes’, computers connected to the network that are tasked with the responsibility of adding new blocks to the chain.[4] As outlined by Nakamoto, in terms of currency, the transactions take place as follows:

  1. Transactions are publicly announced to all of the nodes.
  2. The nodes gather the new transactions into a single block.
  3.  Each node works to decrypt the complex, mathematical proof-of-work.
  4. When the algorithm is successfully solved, the node that has solved the proof-of-work announces this to all of the other network nodes.
  5. The block then goes through a process of acceptance which includes only accepting a block if every transaction within the block is valid and spent only once.
  6. The longest chain in the block is assumed to be valid and is the one the nodes work to approve – this aligns with the ‘one-CPU-one-vote’ protocol.
  7. The demonstration of a block’s acceptance occurs when the nodes move to create the next block in that particular blockchain. This is done by “using the hash of the accepted block as the previous hash.”[1]

Blocks are almost impossible to forge due to the dependency of each in the chain upon the hash of all the prior blocks. Merkle trees are often used as an extra layer of cryptographic protection against hackers who wish to divert the proof-of-work nodal system. There is version control in the sense that if any of the nodes signal a variegated version of the block at the same time, they work on the block they received first.[1] However, they hold on to the prior version should it become the longer block and will switch to the proof- of-work for the saved version should that block become longer.

Notably, the blockchain format used for Bitcoin, specifically, is a permissionless system due to the fact that anyone can connect to the network and become a node – also referred to as a ‘miner’ within the cryptocurrency realm. There is a permissioned form of the blockchain system where users can only access the blockchain if granted to do so by a central authority. A use case of the permissioned blockchain system is for the purpose of verifying and adding transactions connected to a chain of custody for evidence secured from a crime scene. Only certain personnel within the legal system are allowed access to the blockchain for validating or adding data to the block. Depending on how the blockchain is structured, there may or may not be a proof-of-work present for the permissioned blockchain system.

Pros and cons of early blockchain technology
Ideally, detaching from a single, large-scale intermediary has at least two bene ts. Foremost is the removing of data control from a concentrated source. Considering the increasing onslaught of hackers who breach government and nancial institutions on a regular basis, maintaining control of an individual’s private information is becoming of paramount concern. The level of encryption required regarding the public and secret keys for digital signature veri cation can be a greater deterrent. Additionally, the reversibility of transactions has become a concern. It is not di cult for either party to dispute the transaction by appealing to the primary intermediary. Though banks and other institutions have a speci c process for repealing a transaction, it is far easier than calculating an extensive proof-of-work algorithm and attempting to convince at least 51% of the nodes to reverse the transaction.[5]

However, there are distinct issues with blockchain technology as presented in the Bitcoin use case. Since the transaction is “copied onto every member computer”,[5] and there is a proof-of-work involved– along with a need for approval by a majority of the CPUs involved within the verification process – an increase in transactions causes a bottleneck in trans- action processing. Only so many nodes are available to expend the time and energy required for the original blockchain system delineated by Nakamoto. This underscores the inefficiency of the protocol. While the layers of cryptographic verification and block addition are promising for deterring hackers, the centralised third party intermediary system still reigns supreme in terms of cost and efficiency in transaction processing.

Furthermore, the way cryptocurrency is set up, the nodes compete to complete the proof-of-work because they will be paid via Bitcoin to do so. Whichever node solves the proof-of-work first is awarded some amount of the network’s currency. What happens with a backlog of transactions? Consumers will be less likely to use the system due to increased processing time. This can de nitively lead to a devaluation of the cryptocurrency, thus decreasing the incentive for the nodes to complete the proof-of-work.

There are, however, uses for blockchain technology outside of the Bitcoin system that leverage the positive components of verification and access management.

Identity management and blockchain technology
As it stands now, identity management at the individual level is not sovereign; meaning governmental and nancial institutions store sensitive data about their citizens and consumers. Social security numbers, driving licence numbers, and even medical data are largely controlled by third parties. As such, private permissioned blockchain technology o ers a within network solution for identity management at both the individual and institutional level.

Blockchain technology use for identity management relies upon the allowance of a single identity. As such, it is not the transaction that matters, but the proof of identity. Indeed, at the individual level, blockchain identification protocols are already being created for passport verification whereby a series of hashes for the individual photo, a complete photo of the entire passport, and the public PGP signature are uploaded to the blockchain, and the individual can choose who has access to the information for verification. Either a closed or public blockchain can be deployed for identity verification purposes.

As an example, if a company has employed remote workers to access their database, they are likely to use a closed blockchain platform where all users have uploaded their identity to the specific blockchain with the specifics of the type of information required remaining at the discretion of the employer. This still gives individuals the option to release the size and scope of their encrypted information. Additionally, individual users can also verify the company asking for their identity information. Thus, blind trust is removed from the relationship.

Conclusion
While there are extensive use case scenarios for block- chain technology, it remains in the early stages of the evolutionary process. There are still issues with the possibility of hackers accessing personal information and wreaking havoc on both individuals and institu- tions. With this in mind, additional research, including comprehensive penetration testing, will reveal the challenges that need to be solved prior to a widespread institution of blockchain technology as a pervasive tool for transactional and identity management.

Further reading
Mattila, J. (2016). The blockchain phenomenon: The disruptive potential of distributed consensus architectures. ETLA Working Papers No. 38, pp.1-­26. https://www.etla.fi /wp­content/ uploads/ETLA­Working­Papers­38.pdf [Accessed 12 July 2017].

References
1 Nakamoto, S. (2008). Bitcoin: A peer­to­peer electronic cash system.
https://bitcoin.org/bitcoin.pdf
2 Mainelli, M. and Smith, M. (2015). Sharing ledgers for sharing economies: An exploration of mutual distributed ledgers (aka blockchain technology). The Journal of Financial Perspectives: FinTech, Vol. 3(3). http://www.zyen.com/Articles/Journal%20of%20Financial %20Perspectives%20­%20Sharing%20Ledgers%20for% 20Sharing%20Economie….pdf
3 Crosby, M., Pattanayak, P., Verma, S. and Kalyanaraman, V. (2016). Blockchain technology: Beyond Bitcoin. Applied Innovation Review, Issue 2 pp. 6­19. http://scet.berkeley.edu/wp­content/uploads/AIR­2016­ Blockchain.pdf
4 Muller, C. and Hasic, D. (2016). Blockchain: Technology and applications. In: SE Seminar aus Informatik via Dr. Wolfgang Pree. http://www.softwareresearch.net/ leadmin/src/docs/ teaching/SS16/Seminar/Seminar_Paper_Hasic_Mueller.pdf
5 Ammous, S. ( 2016). Blockchain technology: What is it good for? https://papers.ssrn.com/sol3/papers.cfm?abstract_id =2832751

Mussie Ogbai Haile
+ posts

Mussie Ogbai Haile is the founder of Moya Technologies, Inc., a consulting services company providing secure communications solutions. He has over 20 years’ experience as a seasoned technologist whose expertise includes enterprise architecture, identity management, service-oriented architecture and cross-domain security solutions. Mussie has also founded RevoltCypher LLC, a blockchain platform & services company with a mission to enable smarter and more connected systems with the use of blockchain services.

Previous articleThe future of identity management
Next articleScience delivers input for identity domain