Position Paper on Blockchain Technology: Smart Contract and Applications

  • Weizhi MengEmail author
  • Jianfeng Wang
  • Xianmin Wang
  • Joseph Liu
  • Zuoxia Yu
  • Jin Li
  • Yongjun Zhao
  • Sherman S. M. Chow
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11058)


Blockchain technology enables a transaction to be handled in a decentralized fashion. In this position paper, we aim to introduce the background of blockchain technology, discuss one of its important component — smart contract, and present its recent applications in many fields such as cryptocurrency, financial services, risk management, and Internet of Things.


Blockchain technology Smart contract Practical applications Financial services Internet of Things Risk management 



Sherman S.M. Chow is supported by the General Research Fund (CUHK 14210217) of the Research Grants Council, University Grant Committee of Hong Kong.


  1. 1.
    Alexopoulos, N., Vasilomanolakis, E., Ivánkó, N.R., Mühlhäuser, M.: Towards blockchain-based collaborative intrusion detection systems. In: D’Agostino, G., Scala, A. (eds.) CRITIS 2017. LNCS, vol. 10707, pp. 1–12. Springer, Cham (2018)CrossRefGoogle Scholar
  2. 2.
    Atzei, N., Bartoletti, M., Cimoli, T.: A survey of attacks on ethereum smart contracts (SoK). In: Maffei, M., Ryan, M. (eds.) POST 2017. LNCS, vol. 10204, pp. 164–186. Springer, Heidelberg (2017). Scholar
  3. 3.
    Au, M.H., Chow, S.S.M., Susilo, W.: Short E-cash. In: Maitra, S., Veni Madhavan, C.E., Venkatesan, R. (eds.) INDOCRYPT 2005. LNCS, vol. 3797, pp. 332–346. Springer, Heidelberg (2005). Scholar
  4. 4.
    Bartoletti, M., Pompianu, L.: An empirical analysis of smart contracts: platforms, applications, and design patterns. In: Brenner, M., Rohloff, K., Bonneau, J., Miller, A., Ryan, P.Y.A., Teague, V., Bracciali, A., Sala, M., Pintore, F., Jakobsson, M. (eds.) FC 2017. LNCS, vol. 10323, pp. 494–509. Springer, Cham (2017). Scholar
  5. 5.
    Ben-Sasson, E., et al.: Decentralized anonymous payments from bitcoin. In: Proceedings of 2014 IEEE Symposium on Security and Privacy, SP 2014, 18–21 May 2014, pp. 459–474 (2014)Google Scholar
  6. 6.
    Buterin, V.: A state clearing FAQ (2016). Accessed 30 July 2016
  7. 7.
    Buterin, V.: Transaction spam attack: next steps (2016). Accessed 30 July 2016
  8. 8.
    Castillo, M.: The DAO attacked: code issue leads to \$60 million ether theft (2016).
  9. 9.
    Chaum, D.: Blind signatures for untraceable payments. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Advances in Cryptology: Proceedings of CRYPTO 1982, Santa Barbara, California, USA, August 23–25, pp. 199–203 (1982)Google Scholar
  10. 10.
    Chen, T., Li, X., Luo, X., Zhang, X.: Under-optimized smart contracts devour your money. In: Proceedings of SANER (2017)Google Scholar
  11. 11.
    Chen, T., et al.: An adaptive gas cost mechanism for ethereum to defend against under-priced DoS attacks. In: Liu, J.K., Samarati, P. (eds.) ISPEC 2017. LNCS, vol. 10701, pp. 3–24. Springer, Cham (2017). Scholar
  12. 12.
    Chen, T., et al.: Towards saving money in using smart contracts. In: Proceedings of ICSE (2018)Google Scholar
  13. 13.
    Chen, T., et al.: Understanding ethereum via graph analysis. In: Proceedings of INFOCOM (2018)Google Scholar
  14. 14.
    Chow, S.S.M.: Running on karma – P2P reputation and currency systems. In: Bao, F., Ling, S., Okamoto, T., Wang, H., Xing, C. (eds.) CANS 2007. LNCS, vol. 4856, pp. 146–158. Springer, Heidelberg (2007). Scholar
  15. 15.
    Chow, S.S.M., Hui, L.C.K., Yiu, S.-M., Chow, K.P.: Practical electronic lotteries with offline TTP. Comput. Commun. 29(15), 2830–2840 (2006)CrossRefGoogle Scholar
  16. 16.
    Chow, S.S.M., Lai, Z., Liu, C., Lo, E., Zhao, Y.,: Sharding blockchain (Invited Paper). In: The 2018 IEEE Internal Conference on Blockchain (2018)Google Scholar
  17. 17.
    Chow, S.S.M., Susilo, W., Yuen, T.H.: Escrowed linkability of ring signatures and its applications. In: Nguyen, P.Q. (ed.) VIETCRYPT 2006. LNCS, vol. 4341, pp. 175–192. Springer, Heidelberg (2006). Scholar
  18. 18.
    Cocco, L., Pinna, A., Marchesi, M.: Banking on blockchain: costs savings thanks to the blockchain technology. Future Internet 9(3), 25 (2017)CrossRefGoogle Scholar
  19. 19.
    Dinh, T.T.A., Wang, J., Chen, G., Liu, R., Ooi, B.C., Tan, K.: Blockbench: a framework for analyzing private blockchains. In: Proceedings of SIGMOD (2017)Google Scholar
  20. 20.
    Gu, J., Sun, B., Du, X., Wang, J., Zhuang, Y., Wang, Z.: Consortium blockchain-based malware detection in mobile devices. IEEE Access 6, 12118–12128 (2018)CrossRefGoogle Scholar
  21. 21.
    Juels, A., Kosba, A., Shi, E.: The ring of Gyges: investigating the future of criminal smart contracts. In: Proceedings of CCS (2016)Google Scholar
  22. 22.
    Kalra, S., Goel, S., Dhawan, M., Sharma, S.: Zeus: analyzing safety of smart contracts. In: Proceedings of NDSS (2018)Google Scholar
  23. 23.
    Kokoris-Kogias, E., Jovanovic, P., Gasser, L., Gailly, N., Syta, E. Ford, B.: Omniledger: a secure, scale-out, decentralized ledger via sharding. In: IEEE Symposium on Security and Privacy, pp. 583–598 (2018)Google Scholar
  24. 24.
    Koshy, P., Koshy, D., McDaniel, P.: An analysis of anonymity in bitcoin using P2P network traffic. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 469–485. Springer, Heidelberg (2014). Scholar
  25. 25.
    Lai, R.W.F., Tai, R.K.H., Wong, H.W.H., Chow, S.S.M.: Multi-key homomorphic signatures unforgeable under insider corruption. In: ASIACRYPT (2018, to appear)Google Scholar
  26. 26.
    Li, P.J.X., Chen, T., Luo, X., Wen, Q.: A survey on the security of blockchain systems. Future Generation Computer Systems (2017)Google Scholar
  27. 27.
    Liu, J.K., Wei, V.K., Wong, D.S.: Linkable spontaneous anonymous group signature for Ad Hoc groups. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol. 3108, pp. 325–335. Springer, Heidelberg (2004). Scholar
  28. 28.
    Luu, L., Chu, D.-H., Olickel, H., Saxena, P., Hobor, A.: Making smart contracts smarter. In: Proceedings of CCS (2016)Google Scholar
  29. 29.
    Luu, L., Narayanan, V., Zheng, C., Baweja, K., Gilbert, S., Saxena, P.: A secure sharding protocol for open blockchains. In: Proceedings of CCS (2016)Google Scholar
  30. 30.
    Maxwell, G.: Confidential transactions (2015).
  31. 31.
    Meng, W., Tischhauser, E., Wang, Q., Wang, Y., Han, J.: When intrusion detection meets blockchain technology: a review. IEEE Access 6, 10179–10188 (2018)CrossRefGoogle Scholar
  32. 32.
    Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008).
  33. 33.
    Novo, O.: Blockchain meets IoT: an architecture for scalable access management in IoT. IEEE Internet Things J. 5(2), 1184–1195 (2018)CrossRefGoogle Scholar
  34. 34.
    Rizzo, P.: Hong Kong’s central bank to test blockchain (2018). Accessed 30 July 2018
  35. 35.
    Sharma, P.K., Chen, M.Y., Park, J.H.: A software defined fog node based distributed blockchain cloud architecture for IoT. IEEE Access 6, 115–124 (2018)CrossRefGoogle Scholar
  36. 36.
  37. 37.
    Wood, G.: Ethereum: a secure decentralised generalised transaction ledger.
  38. 38.
    Zhang, Y., Wen, J.: The IoT electric business model: using blockchain technology for the internet of things. Peer-to-Peer Networking Appl. 10(4), 983–994 (2017)CrossRefGoogle Scholar
  39. 39.
    Zheng, P., Zheng, Z., Luo, X., Chen, X., Liu, X.: A detailed and real-time performance monitoring framework for blockchain systems. In: Proceedings of ICSE (2018)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  • Weizhi Meng
    • 1
    Email author
  • Jianfeng Wang
    • 2
  • Xianmin Wang
    • 3
  • Joseph Liu
    • 4
  • Zuoxia Yu
    • 5
    • 6
  • Jin Li
    • 3
  • Yongjun Zhao
    • 7
  • Sherman S. M. Chow
    • 7
  1. 1.Department of Applied Mathematics and Computer ScienceTechnical University of DenmarkCopenhagenDenmark
  2. 2.State Key Laboratory of Integrated Service Networks (ISN)Xidian UniversityXi’anPeople’s Republic of China
  3. 3.School of Computer ScienceGuangzhou UniversityGuangzhouChina
  4. 4.Faculty of Information TechnologyMonash UniversityMelbourneAustralia
  5. 5.Department of ComputingThe Hong Kong Polytechnic UniversityHung HomHong Kong SAR
  6. 6.Department of ComputingThe Hong Kong Polytechnic University Shenzhen Research InstituteShenzhenChina
  7. 7.Department of Information EngineeringThe Chinese University of Hong KongShatinHong Kong SAR

Personalised recommendations