Advertisement

Inter-family Communication in Hyperledger Sawtooth and Its Application to a Crypto-Asset Framework

  • Luke Owens
  • Benoit Razet
  • W. Bryan Smith
  • Theodore C. TannerJr.
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11319)

Abstract

Hyperledger Sawtooth is a general purpose blockchain project featuring pluggable consensus mechanisms and smart contracts that can be written in any general purpose programming language. We introduce a design pattern that enables communication between smart contracts for Hyperledger Sawtooth. The pattern is called Inter-Family Communication and we apply it to build a general crypto-asset framework where assets can be controlled by secondary smart contracts. The pattern is designed secure with formal models for Hyperledger Sawtooth and relevant concepts to the Inter-family Communication design pattern.

References

  1. 1.
    Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). http://bitcoin.org/bitcoin.pdf
  2. 2.
    Bitcoin Script. https://en.bitcoin.it/wiki/Script. Accessed Aug 2018
  3. 3.
    Wood, G.: Ethereum: A Secure Decentralized Generalised Transaction Ledger - EIP-150 Revision (2017). http://yellowpaper.io/
  4. 4.
    Hyperledger. Blockchain for Business. https://hyperledger.org/. Accessed Aug 2018
  5. 5.
    Hyperledger Sawtooth, v1.0 (2018). https://github.com/hyperledger/sawtooth-core. Accessed Aug 2018
  6. 6.
    Hyperledger Fabric, version 1.0. https://hyperledger.org/projects/fabric, https://github.com/hyperledger/fabric. Accessed Aug 2018
  7. 7.
    Hyperledger Iroha. http://iroha.tech/, https://github.com/hyperledger/iroha. Accessed Aug 2018
  8. 8.
    ERC20 Token Standard. https://theethereum.wiki/w/index.php/ERC20_Token_Standard. Accessed Nov 2017
  9. 9.
    Poon, J., Dryja, T.: The Bitcoin Lightning Network: Scalable Off-Chain Instant Payments, Version 0.5.9.2 (2016)Google Scholar
  10. 10.
    Ethereum. Security Considerations. https://solidity.readthedocs.io/en/develop/security-considerations.html. Accessed Aug 2018
  11. 11.
    Hildenbrandt, F.N., et al.: KEVM: A Complete Semantics of the Ethereum Virtual Machine (2017). http://hdl.handle.net/2142/97207
  12. 12.
    Hirai, Y.: Defining the Ethereum virtual machine for interactive theorem provers. In: 1st Workshop on Trusted Smart Contracts (2017)Google Scholar
  13. 13.
    Daian, P.: DAO attack (2016). http://hackingdistributed.com/2016/06/18/analysis-of-the-dao-exploit/. Accessed Aug 2018
  14. 14.
    The Coq Development Team: The Coq Reference Manual, version 8.6 (2017). https://coq.inria.fr/
  15. 15.
    Lamport, L.: Specifying Systems. Addison-Wesley (2002). http://www.lamport.org/. Accessed Nov 2017
  16. 16.
    Swamy, N., et al.: Dependent types and multi-monadic effects in F*. In: 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2016, pp. 256–270. ACM (2016)Google Scholar
  17. 17.
    Intel: Intel Software Guard Extensions (Intel SGX) SDK (2018). https://software.intel.com/en-us/sgx-sdk
  18. 18.
    Lind, J., Eyal, I., Kelbert, F., Naor, O., Pietzuch, P.R., Sirer, E.G.: Teechain: scalable blockchain payments using trusted execution environments. In: The 4th Workshop on Bitcoin and Blockchain Research, BITCOIN 2017 (2017)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Luke Owens
    • 1
  • Benoit Razet
    • 1
  • W. Bryan Smith
    • 1
  • Theodore C. TannerJr.
    • 1
  1. 1.PokitDokCharlestonUSA

Personalised recommendations