SlideShare una empresa de Scribd logo
1 de 13
A n a t o m y o f a B l o c k c h a i n
D r . A v t a r S e h r a
A N ATO M Y O F A
B L O C K C H A I N
1 . B i t c o i n
2 . E v o l u t i o n o f t h e I n t e r n e t
3 . B l o c k c h a i n
4 . C o m p o n e n t s o f a B l o c k
5 . U n s p e n t T r a n s a c t i o n s
6 . M i n i n g B l o c k s
7 . E t h e r e u m N e t w o r k
8 . S m a r t C o n t r a c t O v e r v i e w
Bitcoin
Created in 2009 the current market capitalization
of Bitcoins in circulation is >$10billion
• Bitcoin is a digital currency that can be directly transferred from one person to another
• If you own Bitcoins the updated ledger shows how many coins you have in your account (i.e. address)
• If you have Bitcoins in your account you can transfer them to another account, and the ledger is updated appropriately
• What’s so different from a normal payment network?
User 1:
User 2:
User 3:
User 4:
User 5:
User 6:
100
0
200
10
1
50
Ledger
User 1:
User 2:
User 3:
User 4:
User 5:
User 6:
70
30
200
10
1
50
Ledger
User 1 transfers
30Btc to User 2
Evolution of the Internet
The internet revolutionized P2P sharing of
information over network, removing the need
for centralization and intermediation
The internet made P2P Transaction of Information possible
The Blockchain makes P2P Transaction of Value possible
A
Blockchain
Owner A: 100
Owner B: 100
Owner C: 0
Hash of #2
A –> B: 50
B –> C: 10
Hash of #1
A –> C: 10
B –> C: 50
Hash of #0
C –> A: 100
C –> B: 100
Owner A: 90
Owner B: 50
Owner C: 60
Owner A: 40
Owner B: 90
Owner C: 70
Block 1
Block 2
Block 3
Blockchain data structure Data structure replicated across network of participants
Owner A: 0
Owner B: 0
Owner C: 200
0 –> C: 200
Block 0
A
B
C
Key Drivers for use of Blockchain
• Network of Participants: Number of stakeholders want to execute transactions between each other
• Transfer of Value: Network participants want to transfer something of value securely and immutably
• No Transfer Intermediary: All value transfers between network participants is executed peer to peer
Blockchain is a cryptographic linked list data structure,
replicated across a network using a consensus mechanism,
enabling secure value transfer between participants
A single block in the Blockchain is constructed using a
number of key elements related to identification
information and the list of transactions being stored
Components of a Block
BLOCK
Blocks are units of the Blockchain
HEADER
Version
Merkle Root
Difficulty
Previous Block Hash
Timestamp
Nonce
TRANSACTION COUNT
BLOCK CONTENT
Coinbase TX Bitcoin TX
Total Bitcoin + Coinbase TX
Transaction
Each transaction is a Bitcoin payment
TECHNICAL DATA
Version
Number of Inputs
Lock Time (delay)
Number of Outputs
INPUTS
OUTPUTS
Previous TX Hash / Output Index
Private Unlock Script Script Length
Amount
Script LengthPublic Locking Script
Mining Blocks
Each full node in the network provides computing power to
secure the network by receiving, authenticating, storing and
sharing transactions through the consensus mechanism
Hash of #2
A –> B: 50
B –> C: 10
Hash of #1
A –> C: 10
B –> C: 50
Hash of #0
C –> A: 100
C –> B: 100
0 –> C: 200
Hash
Calculated:
121232
Block 1
Block 2
Block 3
Block 0
Block 4
Hash
Calculated:
121232
??
?? ??
??
??
??
??
• Transmission: New transactions are sent to the network and stored by each node
• Structuring: Nodes select transactions and form a structured Block object (using a nonce)
• Hashing: Block is hashed, which means a calculation is performed to generate a single number
• Check: If hash number is below Difficulty Block is distributed to network, else process is repeated (new nonce)
• Recording: If the Block meets key criteria, it is accepted by other nodes and added to their Blockchain
• Confirmation: As more Blocks are added to the chain previous Blocks become increasingly secure
A
Unspent Transactions
Bitcoin stores data about users' balances in a
structure based on unspent transaction outputs
(UTXOs), where each output has an owner and a
value
• Input: Every referenced input
must be valid and not yet spent
• Signature: transaction must
have signature matching owner
of the input for every input
• Inputs>=Output: Total value of
inputs must equal or exceed the
total value of the outputs
• UTXO: A user's "balance" in the
system is the total value of the
set of UTXO coins for which the
user has a private key
• Structure: Each UTXO is stored
with: Address, TXID and Value
Ethereum Network
Ethereum is a Blockchain based network, similar
to Bitcoin, but in addition to value transactions it
enables smart contract functionality
Ethereum Transaction
TECHNICAL DATA
To (Null for Contract)
Gas Price
Ether to Transfer
Start Gas
DATA
Smart Contract Code for Execution on Chain
General Text
Nonce Signature
• Transaction: An Ether payment transaction can be sent from
one address to another address like in Bitcoin
• Contract: Insert code into transaction Data field, and send to
null address – mined as a Contract
• Interaction: Users and contracts can interact with other
contracts by sending transactions to their addresses
• System: Complex contract structures can be created that are
triggered based on transactions from each other
• Compute: On-chain calculations can be performed and data
stored but costs ether (measured in Gas)
• Accounts: No UTXO, state stores a list of accounts
(addresses), where each account has a balance
• Balance: Transaction is valid if sender account has balance,
then sending account debited and receiving credited
Complex contracts can be constructed that
enable execution of standard transactions
based on agreed trigger events
Smart Contracts for Bonds
CATASTOPHE BOND
SMART CONTRACT
INVESTORISSUER
Cat Bond Principal
Premium
(and Principal)
Contingent Payment
Premium
CATASTROPHE
TRIGGER
AGENT
Cat Trigger Event
TS1
TS2
TS3
TS4
TS5
TS6
TS8
TS7
• TS1: Bond Contract Setup
• TS2: Fund Transfer by Investor
• TS3: Subscription Confirmation
• TS4: Recurrent Payment to Contract
• TS5: Recurrent Payment to Investor
• TS7: Trigger Event Confirmation
• TS6: Principal Payment to Investor
• TS8: Principal Payment to Issuer
Transparency Cost Flexibility Risk
Exchange Markets
Blockchain Enabled
OTC Markets
Blockchain based CCP and depository enables
transparency and settlement risk control of exchange
markets with flexibility and low cost of OTC markets
Blockchain and Finance
• The information provided by Nivaura in this document (Response) is proprietary and confidential to Nivaura.
• Without Nivaura’s prior written permission, our Response, either in whole or in part, must not be reproduced in any form or by any means or disclosed to others or used for purposes other than its evaluation by the intended party. It may not be disclosed to any third party
even for the purposes of evaluation, except as expressly authorised by Nivaura in each case.
• Where we have mentioned other Clients or Partners by name we stipulate that no contact be made with any such Client or Partners without the prior approval of Nivaura in each case.
• Where this Response makes reference to trademarks that may be owned by others, the use of such trademarks herein is not an assertion of ownership of such trademarks by Nivaura and is not intended to represent or imply the existence of an association between Nivaura and
the lawful owners of such trademarks.
• This Response and any document to which it is attached is subject to (i) completion of each party’s internal review process and; (ii) subject to contract, where applicable.
• Whilst care and attention has been exercised in the preparation of this Response, Nivaura do not accept responsibility for any inaccuracy or error or any action taken in reliance on the information. This Response remains subject to contract and all warranties whether express
or implied by statute, law or otherwise are hereby disclaimed and excluded to the extent permitted at law.
• Any pricing or valuation information provided in this document is provided on a budgetary basis for evaluation purposes only. Any final agreement by the parties on pricing or valuations shall be agreed via an appropriate contract (to be agreed).
© Nivaura 2016
D r . A v t a r S e h r a
a v t a r @ n i v a u r a . c o m

Más contenido relacionado

La actualidad más candente

Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]David Sweigert
 
Technical Approach to Red Team Operations
Technical Approach to Red Team OperationsTechnical Approach to Red Team Operations
Technical Approach to Red Team OperationsEduardo Arriols Nuñez
 
Easy and simple concept of IP Address
Easy and simple concept of IP AddressEasy and simple concept of IP Address
Easy and simple concept of IP AddressLearn with Arsl khan
 
WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and ProtectionChandrak Trivedi
 
Prensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection toolPrensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection toolIssar Kapadia
 
HARDENING OF WINDOWS 10 OS.pptx
HARDENING OF WINDOWS 10 OS.pptxHARDENING OF WINDOWS 10 OS.pptx
HARDENING OF WINDOWS 10 OS.pptxssuser80ad2d
 
Packet sniffing & ARP Poisoning
 Packet sniffing & ARP Poisoning  Packet sniffing & ARP Poisoning
Packet sniffing & ARP Poisoning Viren Rao
 
Chapter 1 introduction to-information_security
Chapter 1   introduction to-information_securityChapter 1   introduction to-information_security
Chapter 1 introduction to-information_securitySyaiful Ahdan
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness PresentationCristian Mihai
 
Transposition cipher
Transposition cipherTransposition cipher
Transposition cipherAntony Alex
 
Social Media and Law Enforcement - Presentation by Central Bureau of Investi...
Social Media and Law Enforcement  - Presentation by Central Bureau of Investi...Social Media and Law Enforcement  - Presentation by Central Bureau of Investi...
Social Media and Law Enforcement - Presentation by Central Bureau of Investi...Nagarajan M
 
SOME ve SOC Ekipleri İçin Açık Kaynak Çözümler
SOME ve SOC Ekipleri İçin Açık Kaynak ÇözümlerSOME ve SOC Ekipleri İçin Açık Kaynak Çözümler
SOME ve SOC Ekipleri İçin Açık Kaynak ÇözümlerBGA Cyber Security
 
Tatil Öncesi Güvenlik Kontrol Listesi.pdf
Tatil Öncesi Güvenlik Kontrol Listesi.pdfTatil Öncesi Güvenlik Kontrol Listesi.pdf
Tatil Öncesi Güvenlik Kontrol Listesi.pdfBGA Cyber Security
 
امن المعلومات المحاضرة الرابعه
امن المعلومات المحاضرة الرابعهامن المعلومات المحاضرة الرابعه
امن المعلومات المحاضرة الرابعهايمن البيلي
 
Sergio Silva - CyberS3c - OSL19
Sergio Silva - CyberS3c - OSL19Sergio Silva - CyberS3c - OSL19
Sergio Silva - CyberS3c - OSL19marketingsyone
 

La actualidad más candente (20)

Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
Technical Approach to Red Team Operations
Technical Approach to Red Team OperationsTechnical Approach to Red Team Operations
Technical Approach to Red Team Operations
 
Easy and simple concept of IP Address
Easy and simple concept of IP AddressEasy and simple concept of IP Address
Easy and simple concept of IP Address
 
Cyber Security Layers - Defense in Depth
Cyber Security Layers - Defense in DepthCyber Security Layers - Defense in Depth
Cyber Security Layers - Defense in Depth
 
Fortinet sandboxing
Fortinet sandboxingFortinet sandboxing
Fortinet sandboxing
 
WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and Protection
 
Prensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection toolPrensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection tool
 
HARDENING OF WINDOWS 10 OS.pptx
HARDENING OF WINDOWS 10 OS.pptxHARDENING OF WINDOWS 10 OS.pptx
HARDENING OF WINDOWS 10 OS.pptx
 
Packet sniffing & ARP Poisoning
 Packet sniffing & ARP Poisoning  Packet sniffing & ARP Poisoning
Packet sniffing & ARP Poisoning
 
Chapter 1 introduction to-information_security
Chapter 1   introduction to-information_securityChapter 1   introduction to-information_security
Chapter 1 introduction to-information_security
 
Threat Hunting with Cyber Kill Chain
Threat Hunting with Cyber Kill ChainThreat Hunting with Cyber Kill Chain
Threat Hunting with Cyber Kill Chain
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
NMAP - The Network Scanner
NMAP - The Network ScannerNMAP - The Network Scanner
NMAP - The Network Scanner
 
Transposition cipher
Transposition cipherTransposition cipher
Transposition cipher
 
Social Media and Law Enforcement - Presentation by Central Bureau of Investi...
Social Media and Law Enforcement  - Presentation by Central Bureau of Investi...Social Media and Law Enforcement  - Presentation by Central Bureau of Investi...
Social Media and Law Enforcement - Presentation by Central Bureau of Investi...
 
Crowdstrike .pptx
Crowdstrike .pptxCrowdstrike .pptx
Crowdstrike .pptx
 
SOME ve SOC Ekipleri İçin Açık Kaynak Çözümler
SOME ve SOC Ekipleri İçin Açık Kaynak ÇözümlerSOME ve SOC Ekipleri İçin Açık Kaynak Çözümler
SOME ve SOC Ekipleri İçin Açık Kaynak Çözümler
 
Tatil Öncesi Güvenlik Kontrol Listesi.pdf
Tatil Öncesi Güvenlik Kontrol Listesi.pdfTatil Öncesi Güvenlik Kontrol Listesi.pdf
Tatil Öncesi Güvenlik Kontrol Listesi.pdf
 
امن المعلومات المحاضرة الرابعه
امن المعلومات المحاضرة الرابعهامن المعلومات المحاضرة الرابعه
امن المعلومات المحاضرة الرابعه
 
Sergio Silva - CyberS3c - OSL19
Sergio Silva - CyberS3c - OSL19Sergio Silva - CyberS3c - OSL19
Sergio Silva - CyberS3c - OSL19
 

Destacado

Cognitive Content Marketing: The Path to a More (Artificially) Intelligent Fu...
Cognitive Content Marketing: The Path to a More (Artificially) Intelligent Fu...Cognitive Content Marketing: The Path to a More (Artificially) Intelligent Fu...
Cognitive Content Marketing: The Path to a More (Artificially) Intelligent Fu...PR 20/20
 
A Guide to Social Media Marketing Measurement
A Guide to Social Media Marketing MeasurementA Guide to Social Media Marketing Measurement
A Guide to Social Media Marketing MeasurementMark Schaefer
 
How to Build a Data-driven Social Media Marketing Strategy
How to Build a Data-driven Social Media Marketing StrategyHow to Build a Data-driven Social Media Marketing Strategy
How to Build a Data-driven Social Media Marketing StrategyKissmetrics on SlideShare
 
Content Marketing in the UK 2017: Budgets, Benchmarks and Trends
Content Marketing in the UK 2017: Budgets, Benchmarks and TrendsContent Marketing in the UK 2017: Budgets, Benchmarks and Trends
Content Marketing in the UK 2017: Budgets, Benchmarks and TrendsContent Marketing Institute
 
75 [More] Content Marketing Examples
75 [More] Content Marketing Examples75 [More] Content Marketing Examples
75 [More] Content Marketing ExamplesAlexandre Pallota
 
How To Sell Content Marketing To Executives
How To Sell Content Marketing To ExecutivesHow To Sell Content Marketing To Executives
How To Sell Content Marketing To ExecutivesMichael Brenner
 
Social Media Marketing Trends 2017 by Socialbakers
Social Media Marketing Trends 2017 by SocialbakersSocial Media Marketing Trends 2017 by Socialbakers
Social Media Marketing Trends 2017 by SocialbakersJeraldine Phneah
 
Technology Content Marketing 2017 - Benchmarks, Budgets & Trends - North America
Technology Content Marketing 2017 - Benchmarks, Budgets & Trends - North AmericaTechnology Content Marketing 2017 - Benchmarks, Budgets & Trends - North America
Technology Content Marketing 2017 - Benchmarks, Budgets & Trends - North AmericaContent Marketing Institute
 
2017 Social Media & Content Marketing Predictions from 70 Marketing Leaders
2017 Social Media & Content Marketing Predictions from 70 Marketing Leaders 2017 Social Media & Content Marketing Predictions from 70 Marketing Leaders
2017 Social Media & Content Marketing Predictions from 70 Marketing Leaders Bryan Kramer
 
Create a Content Marketing Strategy Your Customers will LOVE, in 7 Steps
Create a Content Marketing Strategy Your Customers will LOVE, in 7 StepsCreate a Content Marketing Strategy Your Customers will LOVE, in 7 Steps
Create a Content Marketing Strategy Your Customers will LOVE, in 7 StepsJay Baer
 
How To Plan And Build A Successful Content Marketing Strategy
How To Plan And Build A Successful Content Marketing StrategyHow To Plan And Build A Successful Content Marketing Strategy
How To Plan And Build A Successful Content Marketing StrategyMichael Brenner
 
The X factor: The Secret to Better Content Marketing
The X factor: The Secret to Better Content Marketing The X factor: The Secret to Better Content Marketing
The X factor: The Secret to Better Content Marketing Mathew Sweezey
 

Destacado (14)

Cognitive Content Marketing: The Path to a More (Artificially) Intelligent Fu...
Cognitive Content Marketing: The Path to a More (Artificially) Intelligent Fu...Cognitive Content Marketing: The Path to a More (Artificially) Intelligent Fu...
Cognitive Content Marketing: The Path to a More (Artificially) Intelligent Fu...
 
A Guide to Social Media Marketing Measurement
A Guide to Social Media Marketing MeasurementA Guide to Social Media Marketing Measurement
A Guide to Social Media Marketing Measurement
 
How to Build a Data-driven Social Media Marketing Strategy
How to Build a Data-driven Social Media Marketing StrategyHow to Build a Data-driven Social Media Marketing Strategy
How to Build a Data-driven Social Media Marketing Strategy
 
Content Marketing in the UK 2017: Budgets, Benchmarks and Trends
Content Marketing in the UK 2017: Budgets, Benchmarks and TrendsContent Marketing in the UK 2017: Budgets, Benchmarks and Trends
Content Marketing in the UK 2017: Budgets, Benchmarks and Trends
 
75 [More] Content Marketing Examples
75 [More] Content Marketing Examples75 [More] Content Marketing Examples
75 [More] Content Marketing Examples
 
How To Sell Content Marketing To Executives
How To Sell Content Marketing To ExecutivesHow To Sell Content Marketing To Executives
How To Sell Content Marketing To Executives
 
Social Media Marketing Trends 2017 by Socialbakers
Social Media Marketing Trends 2017 by SocialbakersSocial Media Marketing Trends 2017 by Socialbakers
Social Media Marketing Trends 2017 by Socialbakers
 
Content Marketing Predictions 2017
Content Marketing Predictions 2017Content Marketing Predictions 2017
Content Marketing Predictions 2017
 
Technology Content Marketing 2017 - Benchmarks, Budgets & Trends - North America
Technology Content Marketing 2017 - Benchmarks, Budgets & Trends - North AmericaTechnology Content Marketing 2017 - Benchmarks, Budgets & Trends - North America
Technology Content Marketing 2017 - Benchmarks, Budgets & Trends - North America
 
2017 Social Media & Content Marketing Predictions from 70 Marketing Leaders
2017 Social Media & Content Marketing Predictions from 70 Marketing Leaders 2017 Social Media & Content Marketing Predictions from 70 Marketing Leaders
2017 Social Media & Content Marketing Predictions from 70 Marketing Leaders
 
The 2017 Content Marketing Framework
The 2017 Content Marketing FrameworkThe 2017 Content Marketing Framework
The 2017 Content Marketing Framework
 
Create a Content Marketing Strategy Your Customers will LOVE, in 7 Steps
Create a Content Marketing Strategy Your Customers will LOVE, in 7 StepsCreate a Content Marketing Strategy Your Customers will LOVE, in 7 Steps
Create a Content Marketing Strategy Your Customers will LOVE, in 7 Steps
 
How To Plan And Build A Successful Content Marketing Strategy
How To Plan And Build A Successful Content Marketing StrategyHow To Plan And Build A Successful Content Marketing Strategy
How To Plan And Build A Successful Content Marketing Strategy
 
The X factor: The Secret to Better Content Marketing
The X factor: The Secret to Better Content Marketing The X factor: The Secret to Better Content Marketing
The X factor: The Secret to Better Content Marketing
 

Similar a Anatomy of a blockchain

Blockchain presentation.pptx
Blockchain presentation.pptxBlockchain presentation.pptx
Blockchain presentation.pptxSwarnaSLcse
 
Cryptocurrency guide.pptx
Cryptocurrency guide.pptxCryptocurrency guide.pptx
Cryptocurrency guide.pptxMarina Ibrahim
 
BlockChain (1).pptxbhbhbhhbhjbhbhgghbhjbhhg
BlockChain (1).pptxbhbhbhhbhjbhbhgghbhjbhhgBlockChain (1).pptxbhbhbhhbhjbhbhgghbhjbhhg
BlockChain (1).pptxbhbhbhhbhjbhbhgghbhjbhhgDevkumarKardamVIT
 
Click Ventures Blockchain Ecosystem Report 2018
Click Ventures Blockchain Ecosystem Report 2018Click Ventures Blockchain Ecosystem Report 2018
Click Ventures Blockchain Ecosystem Report 2018Frederick Ng
 
Payment Protocols - Block Chain & Beyond
Payment Protocols - Block Chain & BeyondPayment Protocols - Block Chain & Beyond
Payment Protocols - Block Chain & BeyondAlexander Kiriakou
 
OVERVIEW ON CRYPTOCURRENCY
OVERVIEW ON CRYPTOCURRENCYOVERVIEW ON CRYPTOCURRENCY
OVERVIEW ON CRYPTOCURRENCYdrrammohan
 
Blockchain Essentials and Blockchain on Azure
Blockchain Essentials and Blockchain on AzureBlockchain Essentials and Blockchain on Azure
Blockchain Essentials and Blockchain on AzureNuri Cankaya
 
Report on Bitcoin- The cryptocurrency (November 2017)
Report on Bitcoin- The cryptocurrency (November 2017)Report on Bitcoin- The cryptocurrency (November 2017)
Report on Bitcoin- The cryptocurrency (November 2017)AJSH & Co LLP
 
От прорывной концепции до комплексного решения для компаний
От прорывной концепции до комплексного решения для компанийОт прорывной концепции до комплексного решения для компаний
От прорывной концепции до комплексного решения для компанийPositive Hack Days
 
Block chain technology and its applications
Block chain technology and its applications Block chain technology and its applications
Block chain technology and its applications ABHISHEK JAIN
 
A primer on Bitcoin Technology
A primer on Bitcoin TechnologyA primer on Bitcoin Technology
A primer on Bitcoin TechnologySebin Benjamin
 
IEEE Blockchain Summit Korea 2018 - Commercial Blockchain Application & Scala...
IEEE Blockchain Summit Korea 2018 - Commercial Blockchain Application & Scala...IEEE Blockchain Summit Korea 2018 - Commercial Blockchain Application & Scala...
IEEE Blockchain Summit Korea 2018 - Commercial Blockchain Application & Scala...ICON Foundation
 

Similar a Anatomy of a blockchain (20)

Blockchain presentation.pptx
Blockchain presentation.pptxBlockchain presentation.pptx
Blockchain presentation.pptx
 
Bitcoin 2.0
Bitcoin 2.0 Bitcoin 2.0
Bitcoin 2.0
 
Cryptocurrency guide.pptx
Cryptocurrency guide.pptxCryptocurrency guide.pptx
Cryptocurrency guide.pptx
 
BlockChain (1).pptxbhbhbhhbhjbhbhgghbhjbhhg
BlockChain (1).pptxbhbhbhhbhjbhbhgghbhjbhhgBlockChain (1).pptxbhbhbhhbhjbhbhgghbhjbhhg
BlockChain (1).pptxbhbhbhhbhjbhbhgghbhjbhhg
 
blockchain.pptx
blockchain.pptxblockchain.pptx
blockchain.pptx
 
Click Ventures Blockchain Ecosystem Report 2018
Click Ventures Blockchain Ecosystem Report 2018Click Ventures Blockchain Ecosystem Report 2018
Click Ventures Blockchain Ecosystem Report 2018
 
Blockchain
BlockchainBlockchain
Blockchain
 
Payment Protocols - Block Chain & Beyond
Payment Protocols - Block Chain & BeyondPayment Protocols - Block Chain & Beyond
Payment Protocols - Block Chain & Beyond
 
OVERVIEW ON CRYPTOCURRENCY
OVERVIEW ON CRYPTOCURRENCYOVERVIEW ON CRYPTOCURRENCY
OVERVIEW ON CRYPTOCURRENCY
 
Blockchain Essentials and Blockchain on Azure
Blockchain Essentials and Blockchain on AzureBlockchain Essentials and Blockchain on Azure
Blockchain Essentials and Blockchain on Azure
 
Report on Bitcoin- The cryptocurrency (November 2017)
Report on Bitcoin- The cryptocurrency (November 2017)Report on Bitcoin- The cryptocurrency (November 2017)
Report on Bitcoin- The cryptocurrency (November 2017)
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Introduction to Blockchain and Cryptocurrencies
Introduction to Blockchain and CryptocurrenciesIntroduction to Blockchain and Cryptocurrencies
Introduction to Blockchain and Cryptocurrencies
 
Let’s Talk Crypto
Let’s Talk CryptoLet’s Talk Crypto
Let’s Talk Crypto
 
От прорывной концепции до комплексного решения для компаний
От прорывной концепции до комплексного решения для компанийОт прорывной концепции до комплексного решения для компаний
От прорывной концепции до комплексного решения для компаний
 
Block chain technology and its applications
Block chain technology and its applications Block chain technology and its applications
Block chain technology and its applications
 
A primer on Bitcoin Technology
A primer on Bitcoin TechnologyA primer on Bitcoin Technology
A primer on Bitcoin Technology
 
Bit Coin.pptx
Bit Coin.pptxBit Coin.pptx
Bit Coin.pptx
 
IEEE Blockchain Summit Korea 2018 - Commercial Blockchain Application & Scala...
IEEE Blockchain Summit Korea 2018 - Commercial Blockchain Application & Scala...IEEE Blockchain Summit Korea 2018 - Commercial Blockchain Application & Scala...
IEEE Blockchain Summit Korea 2018 - Commercial Blockchain Application & Scala...
 
Blockchain.docx
Blockchain.docxBlockchain.docx
Blockchain.docx
 

Más de Avtar Sehra

Nivaura Reinsurance Contract Deployment 2016
Nivaura Reinsurance Contract Deployment 2016Nivaura Reinsurance Contract Deployment 2016
Nivaura Reinsurance Contract Deployment 2016Avtar Sehra
 
Ethereum Classic and Crypto Monetary Policy London Event
Ethereum Classic and Crypto Monetary Policy London EventEthereum Classic and Crypto Monetary Policy London Event
Ethereum Classic and Crypto Monetary Policy London EventAvtar Sehra
 
Fundonomy线路图与团队
Fundonomy线路图与团队Fundonomy线路图与团队
Fundonomy线路图与团队Avtar Sehra
 
Fundonomy Overview and Roadmap
Fundonomy Overview and RoadmapFundonomy Overview and Roadmap
Fundonomy Overview and RoadmapAvtar Sehra
 
Ethereum Classic Shanghai: Products and Services
Ethereum Classic Shanghai: Products and ServicesEthereum Classic Shanghai: Products and Services
Ethereum Classic Shanghai: Products and ServicesAvtar Sehra
 
Ethereum Classic 18 August 2016
Ethereum Classic 18 August 2016 Ethereum Classic 18 August 2016
Ethereum Classic 18 August 2016 Avtar Sehra
 

Más de Avtar Sehra (6)

Nivaura Reinsurance Contract Deployment 2016
Nivaura Reinsurance Contract Deployment 2016Nivaura Reinsurance Contract Deployment 2016
Nivaura Reinsurance Contract Deployment 2016
 
Ethereum Classic and Crypto Monetary Policy London Event
Ethereum Classic and Crypto Monetary Policy London EventEthereum Classic and Crypto Monetary Policy London Event
Ethereum Classic and Crypto Monetary Policy London Event
 
Fundonomy线路图与团队
Fundonomy线路图与团队Fundonomy线路图与团队
Fundonomy线路图与团队
 
Fundonomy Overview and Roadmap
Fundonomy Overview and RoadmapFundonomy Overview and Roadmap
Fundonomy Overview and Roadmap
 
Ethereum Classic Shanghai: Products and Services
Ethereum Classic Shanghai: Products and ServicesEthereum Classic Shanghai: Products and Services
Ethereum Classic Shanghai: Products and Services
 
Ethereum Classic 18 August 2016
Ethereum Classic 18 August 2016 Ethereum Classic 18 August 2016
Ethereum Classic 18 August 2016
 

Último

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 

Último (20)

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 

Anatomy of a blockchain

  • 1. A n a t o m y o f a B l o c k c h a i n D r . A v t a r S e h r a
  • 2. A N ATO M Y O F A B L O C K C H A I N
  • 3. 1 . B i t c o i n 2 . E v o l u t i o n o f t h e I n t e r n e t 3 . B l o c k c h a i n 4 . C o m p o n e n t s o f a B l o c k 5 . U n s p e n t T r a n s a c t i o n s 6 . M i n i n g B l o c k s 7 . E t h e r e u m N e t w o r k 8 . S m a r t C o n t r a c t O v e r v i e w
  • 4. Bitcoin Created in 2009 the current market capitalization of Bitcoins in circulation is >$10billion • Bitcoin is a digital currency that can be directly transferred from one person to another • If you own Bitcoins the updated ledger shows how many coins you have in your account (i.e. address) • If you have Bitcoins in your account you can transfer them to another account, and the ledger is updated appropriately • What’s so different from a normal payment network? User 1: User 2: User 3: User 4: User 5: User 6: 100 0 200 10 1 50 Ledger User 1: User 2: User 3: User 4: User 5: User 6: 70 30 200 10 1 50 Ledger User 1 transfers 30Btc to User 2
  • 5. Evolution of the Internet The internet revolutionized P2P sharing of information over network, removing the need for centralization and intermediation The internet made P2P Transaction of Information possible The Blockchain makes P2P Transaction of Value possible A
  • 6. Blockchain Owner A: 100 Owner B: 100 Owner C: 0 Hash of #2 A –> B: 50 B –> C: 10 Hash of #1 A –> C: 10 B –> C: 50 Hash of #0 C –> A: 100 C –> B: 100 Owner A: 90 Owner B: 50 Owner C: 60 Owner A: 40 Owner B: 90 Owner C: 70 Block 1 Block 2 Block 3 Blockchain data structure Data structure replicated across network of participants Owner A: 0 Owner B: 0 Owner C: 200 0 –> C: 200 Block 0 A B C Key Drivers for use of Blockchain • Network of Participants: Number of stakeholders want to execute transactions between each other • Transfer of Value: Network participants want to transfer something of value securely and immutably • No Transfer Intermediary: All value transfers between network participants is executed peer to peer Blockchain is a cryptographic linked list data structure, replicated across a network using a consensus mechanism, enabling secure value transfer between participants
  • 7. A single block in the Blockchain is constructed using a number of key elements related to identification information and the list of transactions being stored Components of a Block BLOCK Blocks are units of the Blockchain HEADER Version Merkle Root Difficulty Previous Block Hash Timestamp Nonce TRANSACTION COUNT BLOCK CONTENT Coinbase TX Bitcoin TX Total Bitcoin + Coinbase TX Transaction Each transaction is a Bitcoin payment TECHNICAL DATA Version Number of Inputs Lock Time (delay) Number of Outputs INPUTS OUTPUTS Previous TX Hash / Output Index Private Unlock Script Script Length Amount Script LengthPublic Locking Script
  • 8. Mining Blocks Each full node in the network provides computing power to secure the network by receiving, authenticating, storing and sharing transactions through the consensus mechanism Hash of #2 A –> B: 50 B –> C: 10 Hash of #1 A –> C: 10 B –> C: 50 Hash of #0 C –> A: 100 C –> B: 100 0 –> C: 200 Hash Calculated: 121232 Block 1 Block 2 Block 3 Block 0 Block 4 Hash Calculated: 121232 ?? ?? ?? ?? ?? ?? ?? • Transmission: New transactions are sent to the network and stored by each node • Structuring: Nodes select transactions and form a structured Block object (using a nonce) • Hashing: Block is hashed, which means a calculation is performed to generate a single number • Check: If hash number is below Difficulty Block is distributed to network, else process is repeated (new nonce) • Recording: If the Block meets key criteria, it is accepted by other nodes and added to their Blockchain • Confirmation: As more Blocks are added to the chain previous Blocks become increasingly secure A
  • 9. Unspent Transactions Bitcoin stores data about users' balances in a structure based on unspent transaction outputs (UTXOs), where each output has an owner and a value • Input: Every referenced input must be valid and not yet spent • Signature: transaction must have signature matching owner of the input for every input • Inputs>=Output: Total value of inputs must equal or exceed the total value of the outputs • UTXO: A user's "balance" in the system is the total value of the set of UTXO coins for which the user has a private key • Structure: Each UTXO is stored with: Address, TXID and Value
  • 10. Ethereum Network Ethereum is a Blockchain based network, similar to Bitcoin, but in addition to value transactions it enables smart contract functionality Ethereum Transaction TECHNICAL DATA To (Null for Contract) Gas Price Ether to Transfer Start Gas DATA Smart Contract Code for Execution on Chain General Text Nonce Signature • Transaction: An Ether payment transaction can be sent from one address to another address like in Bitcoin • Contract: Insert code into transaction Data field, and send to null address – mined as a Contract • Interaction: Users and contracts can interact with other contracts by sending transactions to their addresses • System: Complex contract structures can be created that are triggered based on transactions from each other • Compute: On-chain calculations can be performed and data stored but costs ether (measured in Gas) • Accounts: No UTXO, state stores a list of accounts (addresses), where each account has a balance • Balance: Transaction is valid if sender account has balance, then sending account debited and receiving credited
  • 11. Complex contracts can be constructed that enable execution of standard transactions based on agreed trigger events Smart Contracts for Bonds CATASTOPHE BOND SMART CONTRACT INVESTORISSUER Cat Bond Principal Premium (and Principal) Contingent Payment Premium CATASTROPHE TRIGGER AGENT Cat Trigger Event TS1 TS2 TS3 TS4 TS5 TS6 TS8 TS7 • TS1: Bond Contract Setup • TS2: Fund Transfer by Investor • TS3: Subscription Confirmation • TS4: Recurrent Payment to Contract • TS5: Recurrent Payment to Investor • TS7: Trigger Event Confirmation • TS6: Principal Payment to Investor • TS8: Principal Payment to Issuer
  • 12. Transparency Cost Flexibility Risk Exchange Markets Blockchain Enabled OTC Markets Blockchain based CCP and depository enables transparency and settlement risk control of exchange markets with flexibility and low cost of OTC markets Blockchain and Finance
  • 13. • The information provided by Nivaura in this document (Response) is proprietary and confidential to Nivaura. • Without Nivaura’s prior written permission, our Response, either in whole or in part, must not be reproduced in any form or by any means or disclosed to others or used for purposes other than its evaluation by the intended party. It may not be disclosed to any third party even for the purposes of evaluation, except as expressly authorised by Nivaura in each case. • Where we have mentioned other Clients or Partners by name we stipulate that no contact be made with any such Client or Partners without the prior approval of Nivaura in each case. • Where this Response makes reference to trademarks that may be owned by others, the use of such trademarks herein is not an assertion of ownership of such trademarks by Nivaura and is not intended to represent or imply the existence of an association between Nivaura and the lawful owners of such trademarks. • This Response and any document to which it is attached is subject to (i) completion of each party’s internal review process and; (ii) subject to contract, where applicable. • Whilst care and attention has been exercised in the preparation of this Response, Nivaura do not accept responsibility for any inaccuracy or error or any action taken in reliance on the information. This Response remains subject to contract and all warranties whether express or implied by statute, law or otherwise are hereby disclaimed and excluded to the extent permitted at law. • Any pricing or valuation information provided in this document is provided on a budgetary basis for evaluation purposes only. Any final agreement by the parties on pricing or valuations shall be agreed via an appropriate contract (to be agreed). © Nivaura 2016 D r . A v t a r S e h r a a v t a r @ n i v a u r a . c o m