Abstract
In this chapter we provide an overview of the concept of blockchain technology and its potential to disrupt the world of banking through facilitating global money remittance, smart contracts, automated banking ledgers and digital assets. In this regard, we first provide a brief overview of the core aspects of this technology, as well as the second-generation contract-based developments. From there we discuss key issues that must be considered in developing such ledger based technologies in a banking context.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
Nakamoto (2008) introduced the first decentralised crypto-currency called Bitcoin, and related technology startups have already attracted more than $1 billion in funding. The currency has been the subject of academic considerations in topics such as privacy (Reid and Harrigan 2013), security Barber et al. (2012), regulation (Peters et al. 2014) and monetary policy (Peters et al. 2015).
- 2.
In the Byzantine Generals' problem, introduced by Lamport et al. (1982), a group of Byzantine Generals are camped around an enemy city in different locations. If they all attack simultaneously, then they have superior firepower to their enemy. The problem is that they need to agree a common battle plan, so that they attack at the same time, with the additional complication that there may be a traitor amongst their ranks.
- 3.
- 4.
- 5.
- 6.
- 7.
- 8.
- 9.
- 10.
- 11.
- 12.
- 13.
Factom whitepaper, available at https://raw.githubusercontent.com/FactomProject/FactomDocs/master/Factom_Whitepaper.pdf.
- 14.
- 15.
Cryptotechnologies, a major IT innovation and catalyst for change, available at https://www.abe-eba.eu/downloads/knowledge-and-research/EBA_20150511_EBA_Cryptotechnologies_a_major_IT_innovation_v1_0.pdf.
- 16.
Note: the technical note is not representing the direct views of the IMF.
- 17.
- 18.
- 19.
- 20.
Source: Risk management issues in central counterparty series, presentation by Priyanka Malhotra at the Systemic Risk Centre at LSE.
- 21.
For an example of EU regulation in this area, see http://www.fca.org.uk/firms/being-regulated/meeting-your-obligations/firm-guides/emir.
- 22.
BCG, Shortening the Settlement Cycle October 2012, available at http://www.dtcc.com/media/Files/Downloads/WhitePapers/CBA_BCG_Shortening_the_Settlement_Cycle_October2012.pdf.
- 23.
- 24.
- 25.
- 26.
- 27.
- 28.
- 29.
References
Barber, S., Boyen, X., Shi, E., Uzun, E.: Bitter to betterhow to make bitcoin a better currency. Financial Cryptography and Data Security, pp. 399–414. Springer (2012)
Bell, D.E., LaPadula, L.J.: Secure computer systems: mathematical foundations. Technical report. DTIC Document (1973)
Benkler, Y.: The Wealth of Networks: how Social Production Transforms Markets and Freedom. Yale University Press (2006)
Biba, K.J.: Integrity considerations for secure computer systems. Technical report. DTIC Document (1977)
Bliss, R.R., Steigerwald, R.S.: Derivatives clearing and settlement: A comparison of central counterparties and alternative structures. Econ. Perspect. 30(4) (2006)
Buterin, V.: Multisig: The Future of Bitcoin (2014a)
Buterin, V.: A next-generation smart contract and decentralized application platform. White Paper (2014b)
Carter, J.L., Wegman, M.N.: Universal classes of hash functions. In: Proceedings of the ninth annual ACM symposium on Theory of computing, pp. 106–112. ACM (1977)
Clark, D.D., Wilson, D.R.: A comparison of commercial and military computer security policies. In: 1987 IEEE Symposium on. IEEE Security and Privacy, pp. 184–184 (1987)
Czepluch, J.S., Lollike, N.Z., Malone, S.O.: The Use of Block Chain Technology in Di_erent Application Domains (2015)
Denning, Dorothy E.: A lattice model of secure information ow. Commun. ACM 19(5), 236–243 (1976)
Devanbu, P., Gertz, M., Martel, C., Stubblebine, S.G.: Authentic third-party data publication. In: Data and Application Security, pp. 101–112. Springer (2001)
Douceur, J.R.: The sybil attack. In: Peer-to-peer Systems, pp. 251–260. Springer (2002)
Duffe, D., Zhu, H.: Does a central clearing counterparty reduce counterparty risk? Review of Asset Pricing Studies, 1(1), 74–95 (2011)
Elmasri, R., Navathe, S.B.: Fundamentals of Database Systems. Pearson (2014)
Franco, P.: Understanding Bitcoin: Cryptography, Engineering and Economics. Wiley (2014)
Ge, X., Polack, F., Laleau, R.: Secure databases: an analysis of Clark-Wilson model in a database environment. In: Advanced Information Systems Engineering, pp. 234–247. Springer (2004)
Halevi, S., Harnik, D., Pinkas, B, Shulman-Peleg, A.: Proofs of owner- ship in remote storage systems. In: Proceedings of the 18th ACM conference on Computer and communications security, pp. 491–500. ACM (2011)
Kosba, A., Miller, A., Shi, E., Wen, Z., Papamanthou, C.: Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. Technical report. Cryptology ePrint Archive, Report 2015/675, 2015 (2015). http://eprint.iacr.org
Lamport, Leslie, Shostak, Robert, Pease, Marshall: The Byzantine generals problem. ACM Trans. Program. Lang. Syst. (TOPLAS) 4(3), 382–401 (1982)
Merkle, R.C.: Protocols for public key cryptosystems. In: Null, pp. 122. IEEE (1980)
Merkle, R.C.: Secrecy, Authentication, and Public Key Systems (1979)
Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008)
Pessoa, M., Williams, M.J.: Government cash management: relationship between the treasury and the Central Bank. Int. Monetary Fund (2013)
Peters, G.W., Panayi, E., Chapelle, A.: Trends in crypto-currencies and blockchain technologies: A monetary theory and regulation perspective (2015). arXiv preprint arXiv:1508.04364
Peters, G.W., Chapelle, A., Panayi, E.: Opening discussion on banking sector risk exposures and vulnerabilities from virtual currencies: an operational risk perspective. Available at SSRN 2491991
Redmond, E., Wilson, J.R.: Seven databases in seven weeks: a guide to modern databases and the NoSQL movement. Pragmatic Bookshelf (2012)
Reid, F., Harrigan, M.: An Analysis of Anonymity in the Bitcoin System. Springer (2013)
Rosenfeld, M.: Overview of colored coins. White paper, bitcoil.co.il (2013)
Sandhu, Ravi S.: Lattice-based access control models. Computer 26(11), 9–19 (1993)
Swan, M.: Blockchain: Blueprint for a New Economy. O’Reilly Media, Inc. (2015)
Swanson, T.: (2015) Consensus-as-a-service: a brief report on the emergence of permissioned, distributed ledger systems
Szabo, Nick: Formalizing and securing relationships on public networks. First Monday 2(9), 31 (1997)
Tripunitara, Mahesh V., Li, Ninghui: The foundational work of Harrison-Ruzzo-Ullman revisited. IEEE Trans. Dependable Secure Comput. 10(1), 28–39 (2013)
Wood, G.: Ethereum: a secure decentralised generalised transaction ledger (2014)
Yaker, I.F., Pattanayak, S.: . Treasury Single Account: an essential tool for government cash management. Int. Monetary Fund (2012)
Zyskind, G., Nathan, O.z., Pentland, A.: Enigma: Decentralized Computation Platform with Guaranteed Privacy (2015). arXiv preprint arXiv:1506.03471
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Peters, G.W., Panayi, E. (2016). Understanding Modern Banking Ledgers Through Blockchain Technologies: Future of Transaction Processing and Smart Contracts on the Internet of Money. In: Tasca, P., Aste, T., Pelizzon, L., Perony, N. (eds) Banking Beyond Banks and Money. New Economic Windows. Springer, Cham. https://doi.org/10.1007/978-3-319-42448-4_13
Download citation
DOI: https://doi.org/10.1007/978-3-319-42448-4_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-42446-0
Online ISBN: 978-3-319-42448-4
eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)