Blockchain Technology and its Applications A Promise Theory view-V 0 . 11 ∗

Blockchain amounts to a form of public voting on the acceptance of transactions, submitted to some kind of ledger, in such a way that an official record, based on a majority decision, is kept permanently for all voluntary participants to see. We are assembling these notes to discuss blockchains and cryptocurrency applications from the perspective of Promise Theory. The aim is to discuss and document salient issues about blockchain technology in a semi-formal way, and with a minimum level of technical rigour (perhaps to offer some sobriety to the more unbridled claims). We place a special emphasis on the role of trust, particularly in light of claims that blockchain is a trust-free technology, run by democratic and transparent principles rather, than elite opaque institutions. We also seem to arrive at a tentative view that what might be valuable about blockchains today could turn into future liabilities. Our notes are still quite rough, and are best read in conjunction with an overview of the state of the field, e.g. see [1].

[1]  George Danezis,et al.  SoK: Consensus in the Age of Blockchains , 2017, AFT.

[2]  George Danezis,et al.  Chainspace: A Sharded Smart Contracts Platform , 2017, NDSS.

[3]  George Danezis,et al.  The Road to Scalable Blockchain Designs , 2017, Login: The Usenix Magazine.

[4]  Prateek Saxena,et al.  Making Smart Contracts Smarter , 2016, IACR Cryptol. ePrint Arch..

[5]  Mark Burgess,et al.  Federated Multi-Tenant Service Architecture for an Internet of Things , 2016 .

[6]  Christian Cachin,et al.  Architecture of the Hyperledger Blockchain Fabric , 2016 .

[7]  Mark Burgess,et al.  Thinking in Promises , 2015 .

[8]  M. Burgess Spacetimes with Semantics (II) , 2015 .

[9]  John K. Ousterhout,et al.  In Search of an Understandable Consensus Algorithm , 2014, USENIX ATC.

[10]  Jan A. Bergstra,et al.  Bitcoin: a Money-like Informational Commodity , 2014, ArXiv.

[11]  Mark Burgess,et al.  Promise Theory: Principles and Applications , 2014 .

[12]  Jan A. Bergstra,et al.  Bitcoin and Beyond: Exclusively Informational Monies , 2013, ArXiv.

[13]  Mark Burgess,et al.  On system rollback and totalized fields: An algebraic approach to system change , 2011, J. Log. Algebraic Methods Program..

[14]  Flavio Paiva Junqueira,et al.  Zab: High-performance broadcast for primary-backup systems , 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN).

[15]  Jan A. Bergstra,et al.  Local and Global Trust Based on the Concept of Promises , 2009, ArXiv.

[16]  S. Nakamoto,et al.  Bitcoin: A Peer-to-Peer Electronic Cash System , 2008 .

[17]  Leslie Lamport,et al.  Consensus on transaction commit , 2004, TODS.

[18]  Sang Joon Kim,et al.  A Mathematical Theory of Communication , 2006 .

[19]  Mark Burgess,et al.  An Approach to Understanding Policy Based on Autonomy and Voluntary Cooperation , 2005, DSOM.

[20]  Matt Bishop,et al.  Computer Security: Art and Science , 2002 .

[21]  Leslie Lamport,et al.  Paxos Made Simple , 2001 .

[22]  Barbara Liskov,et al.  Viewstamped Replication: A New Primary Copy Method to Support Highly-Available Distributed Systems , 1999, PODC '88.

[23]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[24]  Maurice Herlihy,et al.  Linearizability: a correctness condition for concurrent objects , 1990, TOPL.

[25]  David D. Clark,et al.  A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.

[26]  H. T. Kung,et al.  An optimality theory of concurrency control for databases , 1979, SIGMOD '79.

[27]  Leslie Lamport,et al.  Time, clocks, and the ordering of events in a distributed system , 1978, CACM.

[28]  D. Elliott Bell,et al.  Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .