Blockchain An Exploded View
Blockchain An Exploded View
Blockchain: An Exploded View
Rasmus Bøgelund Christiansen
Enterprise Services Special Project 2016
59771 characters with spaces. 24,9 pages.
Abstract
In this paper, I investigated the limitations of the blockchain, as well as the question on
where does the technology break. In order to do that, I applied the method of use case
research. Through five qualitative interviews with subject matter experts in different
industries, I found three main issues in regards to the limitations on blockchain: scalability,
transparency and redundancy, and hype. The main conclusion is that the blockchain is very
young, and issues need to be dealt with before its faith can be determined, and thereby,
answer where blockchain can change the current status quo.
Introduction
The name Blockchain origins from the making of Bitcoin. Blockchain was, and still is, the “tracking database
underlying the digital currency bitcoin” (John Plansky, 2016; Swan, 2015, pp. xxi). This database is regularly
showing the most recent transactions, which are all collected in a chain of blocks, hence the name blockchain.
1
Literature Review
When investigating Blockchain as an emergent technology, which promises the disruption of several industries, a
typical pure academic approach can not be applied. There are limited academic resources available. The reason
for that is that the technology is still to gain momentum. So to investigate the research question we need to resort
to other means. Since we cannot stand on the shoulders of giants to respond to the research question, Bitcoin and
Blockchain can only be considered to be a fringe technology, which has to be dealt with accordingly.
The type of literature used is very diverse. For creating the theoretical part, I used, when available,
academic resources, such as published articles as well as books. However, since Bitcoin was a creation focused on
the disruption of the financial sector, most of the literature available is written by the creators such as Sathoshi
Nakamoto and Vitalik Buterin. That meant that a lot of information was gathered from sites that utters these
thoughts behind the creation. I furthermore made use of a bachelor project written by students of the
ITUniversity of Copenhagen. The resources used for the methodology are chosen amongst books introduced to
me earlier in my education. I see these resources as best practices and well known amongst scholars.
When browsing through literature, it would be, under normal circumstances, preferable to choose the
articles from the kind of academic discipline it derived from. However, since Blockchain has the potential to
disrupt several industries, I opted to include every article regardless of discipline.
The use of literature search is two folded. When looking for the theory, first academic articles were sought,
however, it became apparent that there almost no resources. Next, books explaining Bitcoin were sought, and
here there were a lot more. When I initiated the search, I used Google Scholar to get an overview of the articles
available. For seeking out books, I also used Google.
2
Theory: Exploded Drawing of Blockchain
The components of Bitcoin (Blockchain 1.0)
To understand how blockchain works, let us first look at how bitcoin works through an example of a simple
transaction.
A simple transaction
1. New transactions are broadcast to all nodes.
2. Each node collects new transactions into a block.
3. Each node works on finding a difficult proofofwork1 for its block.
4. When a node finds a proofofwork, it broadcasts the block to all nodes.
5. Nodes accept the block only if all transactions in it are valid and not already spent.
6. Nodes express their acceptance of the block by working on creating the next block in the chain, using the hash of
the accepted block as the previous hash. (Nakamoto, 2008, p. 3)
In the original white paper on blockchain, a transaction has four components; Owner Public Key, Hash, Owner of
Signature and Owner’s Private Key. The four components are explained below.
Blockchain from 1.0 to Blockchain 2.0
Blockchain was first introduced in the source code of Bitcoin. For the sake of the discussion, Blockchain and
Bitcoin are distinguished from each other although some authors seem to see it as the same, as blockchain is only
1
Explained in detail on page 7
3
alive because of Bitcoin. One could argue that Blockchain 1.0 is used because of Bitcoin, which was a counter
attack to the centralized financial world, whilst Blockchain 2.0 and smart contracts move away from Bitcoin and
have created alternative Blockchains such as Ethereum Frontier (Block Chain (Database), Wikipedia. N.p., 2016).
Thereby, Blockchain 1.0 was introduced in the usage of Bitcoin, while Blockchain 2.0 was communicated from
Satoshi Nakamoto (the creator of Bitcoin), as an opportunity to create alternative technological innovations using
the same technology from which Bitcoin was created (Swan, 2015, p. 9). Smart contracts have a longer history
Smart contract
than just Blockchain. Smart contracts as a term was coined by Nick Szabo in 1993 ( , 2016).
With the transformation from Blockchain 1.0 to Blockchain 2.0 a crucial element was needed, if one
wanted to use Blockchain for other things than just handling coin it needed a more robust scripting system:
Turing Completeness. A computer is “Turing complete if it can solve any problem that a Turingmachine can, given
an appropriate algorithm and the necessary time and memory” (Turing complete, 2016; Kepser, 2004, p. 1)). That
means that it is a complete scripting language that can run any coin, script or cryptocurrency project. (Swan, 2015,
p. 21). Blockchain 2.0 has an extended functionality to the predecessor Blockchain 1.0; Swan (2015) explains
Ethereum as being “... a fundamental underlying infrastructure platform that can run all blockchains and
protocols, rather like a unified universal development platform. “ (Swan, 2015, p. 21).
Having established the historical context, the next section will focus on the individual parts of Blockchain.
Blockchain and its parts
Distributed network
As one might know, the database, as well as the network in the Blockchain, is a distributed one. Blockchain is
often described as “... the public ledger of all Bitcoin transactions that have ever been executed. It is constantly
growing as miners add new blocks to it (every 10 minutes) to record the most recent transactions.” (Swan, 2015,
pp. ixx). That said, the blockchain is a giant spreadsheet (ledger) that collects all transactions.
Let us use the example of a bank to explain the term distributed network. When we have a bank, we
need to access the bank somehow to make a transaction. That means that we need to go through a centralized
entity to do so, and this is what we call a centralized network. However, what if we want to transfer money to a
person in the different country that has a different bank? Then we will have more centralized nodes in the
network because all transactions have to go through the banks of the sender and the receiver. The way the
Blockchain works is to remove the centralized entity (the bank) and distribute the access to all the nodes in the
network. That means that if one wants to transfer something to a receiver, the bank does not have to accept the
transfer, but all the nodes in the network do.
Cryptography
One of the reason for blockchain to be so secure is be because of cryptography which “... arose as a means to
enable parties to maintain the privacy of the information they send to each other, even in the presence of an
adversary with access to the communication channel.“ (Bellare & Rogaway, 2005, p. 7). Cryptography derives from
4
Greek, and it means hidden language. The art of cryptography is to hide language and thereby secure
communication, so that no third party can interfere when a message is sent from A to B. For this to happen we
make use of protocols. The protocol is “ ... a collection of programs (equivalently, algorithms, software), one for
each party involved. “ (Bellare & Rogaway, 2005, p. 8). Regardless, for the parties to communicate, they need to
speak the same language. These protocols make sure that the sender and the receiver speak the same language
when the sender encrypts the message, and the receiver decrypts the message to read it. However, this is not that
simple, and there is more to this than explained here. In cryptography, there are two trust models: Symmetric
(shared key model) and the asymmetric (public key model). This paper will only go into depth with the asymmetric
model since this is the one used in the Blockchain technology.
Public Key, Private Key and Digital Signature
Hash
5
Timestamp Server
Nakamoto explains a timestamp server as a server that “... works by taking a hash of a block of items to be
timestamped and widely publishing the hash, such as in a newspaper or Usenet post [25].“ (Nakamoto, 2008, p.
2). To understand it better let us look at an example: when we use our NetBank, we trust in a central entity to
make sure that the money we spend can only be spent once. That is done by the bank, which checks the accounts
of sender and receiver to see if there is enough on the correct account to make the transaction. Since in the
blockchain we have ruled out the centralized entity, we need another way to account for the doublespending
problem: A TimeStamp Server.
A timestamp server is: “... the process of securely keeping track of the creation and modification time of
a document. Security here means that no one – not even the owner of the document – should be able to change it
once it has been recorded provided that the timestamp's integrity is never compromised."(Trusted
Timestamping", Wikipedia, 2016). That means that every time we make a transaction, a timestamp is created.
That facilitates that we can make sure that every part of the transaction is approved accordingly to a given
moment. That means that even though a block only happens when there is enough transaction to create a block,
one will still get the benefit of making the transaction at a specific moment, and not when the transaction goes
through.
Miners
The last part of the Blockchain is also an important one. The name is taken as an analogy of Gold Miners
(Nakamoto, 2008, p. 4), which is due to that fact that when Bitcoin was created, the resources were limited, and
these resources had to be ‘mined’ to be put into use. Miners work “to create a block, a node ... (...) to solve a
computationally intense proofofwork problem (the proofofwork computation essentially consists of guessing
inputs to a cryptographic hash function which succeeds only probabilistically (...)” (Lewenberg et al., 2015, p. 2).
That means that the miners either work alone or in pools to compute a complex mathematical equation. This is, as
explained above, a part of the verification process to secure the transaction in the block. Miners have to be seen
in the context of a process, and they do work for the network, hence the reason the one(s) who solves the
6
mathematical equation is awarded a prize. That is, in Bitcoin Universe, done by awarding them an amount of
Bitcoin for their work.
There are two ways of mining: Proofofwork and ProofofStake. These are both explained beneath.
Proofofwork
ProofofWork is not a new thing and is dated back to 1993 by Dwork & Naor (1993). Proofofwork was first
introduced as a way of fighting spam in Emails (Liu & Camp, 2006, p. 3). Proofofwork works a bit differently in
the Blockchain because it is done with the use of merkletree. That was introduced as “... a new proofofwork
solutionverification scheme based on Merkle trees with an almost constant effort and null variance for the
client.” (Coelho, 2008, p. 1).
The requester returns such a partial tree to show that selected leaves belong to the tree and were
indeed computed. However, what particular leaves are needed must not be known in advance, otherwise, it
would be easy to generate a partial tree just with those leaves. Returned leaves are selected based on the root
hash, so as to depend on the tree computation. With this method, we can make sure that the packages of data
are not altered, and find blocks of data that are fake or malicious.
Hash trees can be used to verify any data stored, handled and transferred in and between computers.
Currently, the main use of hash trees is to make sure that data blocks received from other peers in a peertopeer
network are received undamaged and unaltered and even to check that the other peers do not lie and send fake
blocks. (Merkle, 1998). The server does the verification and checks the tree by recomputing the hashes and leaf
numbers. These have to add up to the root hash (Coelho, 2008, p. 1).
To put this in the context of blockchain: “you earn coin and transaction fee rewards according to the
number of blocks you mine” (Coin Pursuit, 2016).
ProofOfStake
ProofofStake (PoS) is similar to the way that companies give away stocks to high profile employees as part of
their salary. That is done with the thought that if they have a significant stake in the company, hopefully that will
make them perform better.
While PoW works with the idea that people who own 5 percent will mine 5 percent, the ProofofStake
works a bit differently. A "proofofstake (POS) systems varies in that a person can “mine” depending on how
many coins they hold." So instead of dividing the work through ownership, PoS divides that work accordingly to
the stake people have in the currency. The more stake one has in the currency, the more one can earn. One of the
reasons for alternative cryptocurrencies to use PoS instead of PoW is that a 51% attack is less likely to happen
Slock.It Takes DAO to 'IoT', 12:20
(Graydon, C. & Graydon, C., 2014; ).
Methodology
To answer the research question: “What are the limitations of Blockchain and where does the technology break?”,
the paper uses case study research. According to Yin (2003), case study research is “when the investigator has
7
Case Study Research
This paper makes use of qualitative interviews. The reason for not choosing a survey as part of the paper is due to
the diversity related to the respondents and their occupations, which is why their answers can be both very long
and grounded in an opinion. That is, of course, due to the fact that there are not many people who can act as a
spokesperson on Blockchain, by knowing of its complexity and the nature of the technology, which require a
relatively good understanding to be able to answer questions about it.
The paper made use of case study research as the interesting claims from the recipients seem to lie in
the investigation of the perceptions and thought of individuals. Furthermore, this method will allow testing the
theory as well as to generate theory (Eisenhardt, 1989, p. 555).
Qualitative Interviews
Sampling
The sampling started by getting in touch with people to participate in interviews. If they asked about the overall
topics, the interview guide would be sent to them, albeit communicating that the interview would be around
those questions but not limited to them. That is because I did not want to limit possible interesting questions by
sticking to a structured interview form that would not allow jumping back and forth.
My sample optimal sampling size was between 46 interviews, and these were to be found by
convenience sample (Deacon, 1999, p. 54). For the sampling, I have primarily made use of people and their
connections to individual clusters in which participants were to be found. However, I have also gained access to
respondents through the use of social media such as Twitter, Quora, LinkedIn, and Facebook. Even though I have
made use of convenience sampling, I have managed to get a diverse sampling, containing companies such as
Implement Consulting, PwC, Deloitte, ETHZ and Blockchain Capital.
Instruments for conducting interviews
Recording
For conducting the interviews, a laptop was used as the primary instrument. However, this was both used to
establish communication, as well as facilitating the interviews. All the interviews were recorded with the consent
of the respondents. The method of recording changed from interview to interview, due to technical difficulties.
For the first and the fifth interview, all the incoming and outcoming sounds of the computer was recorded
through QuickTime Player. Due to some difficulties connecting to the respondent through Skype during the
second and the third interviews, we then conducted the interview through a normal call on an iPhone. The
8
interview was then instead recorded through a HiFi dictaphone, by putting the call on speakers. The fourth
interview was held on location in Implement Consulting and for that a Dictaphone was used.
Transcription
Analysis
In this analysis, I will explain how I approached the five interviews I have conducted. Inspired by the fivestep
analytical process in Piercy (2015) and McCracken (1988) that argues that each step represent a higher level of
generality (Piercy, 2015, p. 3), I will start at a macrolevel and then work my way to the details. The first part
consists of a data analysis of the text. The second contains a brief summary of each interview, and the third part
has a more indepth analysis of the five most important characteristics of Blockchain as well as the perceived
problems with Blockchain.
Text Analysis
To get an overview of the five interviews conducted, all the interviews were transcribed and uploaded to a text
analyzer: Voyant Tools (Sinclair & Rockwell, 2016). This gave me a good overview in two levels, which I will
describe below.
9
The Voyant analyzer autogenerated the five most frequent words in the whole corpus and placed them on a
timeline. As we can see the terms: BC (Blockchain), Bitcoin, Network, Think and Transactions are divided
throughout the entire interview. BC (Blockchain) is the most frequent word that comes as no surprise since all
the interview questions contained it as well as most the answers. The second most used is Bitcoin, which tends to
be a mandatory word to explain the Blockchain. The third is Network since both Blockchain and Bitcoin are
connected to a network. The fourth, which is the most interesting, is Think. This word usage is interesting as all of
the recipients made use of imagery explanation, most likely due to the fact that the Blockchain is a complicated
matter to explain. It furthermore seems to be a word that is associated with “think of the possibilities”.
If we zoom in on the above timeline visualization, we can then go into each of the interviews, and use
this as an opportunity to briefly present the data from each of them.
Most frequent words in the corpus:
bc
(200);
think
(62);
network
(51);
transactions
(47);
bitcoin
(45)
Most frequent words in the corpus:
1. Interview 1 (1)
:
side
(4),
global
(4),
code
(6),
verifiable
(3),
scaling
(3).
2. Interview 2
:
tackle
(8),
performance
(8),
sector
(7),
entire
(10),
multiple
(9).
3. Interview 3
:
transactional
(6),
enterprise
(5),
writing
(4),
peer
(4),
shared
(6).
4. Interview 4
:
looking
(11),
hash
(5),
voting
(4),
stock
(4),
learn
(4).
5. Interview 5
:
easy
(6),
stakeholders
(5),
criminal
(4),
provides
(6),
update
(3).
The interactive graph can be found here:
http://voyanttools.org/?corpus=c911d47c77cbcb63accd5cb843816323&view=Summary
Interview 1
10
5 most important characteristics of Blockchain
When the recipient in interview 1 was asked about the five most important characteristics of Blockchain, he
answered the following:
The immutability (Interview 1, 7:01) is the Blockchain’s ability to create a database that is unchangeable. Hence,
why the term
unalterable is also there.
Public verifiability is related to all the nodes on the network, miners, which
have to verify each and every single transaction to become part of the chain of blocks.
Cryptographically Secure
(Interview 1, 11:23; 12:23) is the ability to secure the verification of transactions through algorithms, as well of the
anonymity of the users through cryptography.
Global is the reach of technology that makes it possible to transfer
information at a global level. This basically means that the Blockchain is not limited to a local market.
Problems mentioned
When asked about problems on the Blockchain, Jeremy Gardner said that there are more problems than good
things (Interview 1, 13:07). However, in the interview, he focused solely on the scalability problem: Blockchain
needs to be able to scale. Jeremy Gardner suggested three possible solutions to this: Sharding, The Lightning
Network and Segregated Witness. These will be explained later on. All of these solutions have the potential to
change the current state of the Blockchain, if they can fix the scalability problem (Interview 1, 13:07).
Interview 2
Interview 2 was with Henry Chan from the consultancy house of Deloitte. As in the first interview, what came as a
surprise was the pragmatic approach to the usage and the applicability of Blockchain in the industry. His most
Tackle
used words were: Performance
, Sector
, , Multiple
Entire and . A central subject of this interview was how to
find a ‘killer usecase' (Interview 2, 21:52), which meant to find a suitable usecase to make the best use of
Blockchain in the industry.
5 most important characteristics of Blockchain
When the recipient in interview 2 was asked about the five most important he answered the following:
decentralization
The first characteristic mentioned was (Interview 2, 7:49), which refers to one of the best known
reasons for the usage of Blockchain: cut out the middleman or third party and transact directly with the user. As
11
Problems mentioned
Again, the recipient started by saying that there are multiple flaws in Blockchain as a technology (Interview 2,
13:15). The first thing mentioned was the 1mb Block size limit on the Bitcoin Blockchain (Ibid). Henry Chan then
mentioned that the need for speed in the financial sector or highfrequency trading (ibid) is crucial, and it is
something that Blockchain can not reach at this point. That means that Blockchain needs to scale to accommodate
these requirements if we are to use it in that industry. The second thing Henry Chan mentioned was the problem
of transparency and redundancy (Interview 2, 14:18): there are way too much data generated. We should only
generate the data we need. However, this means that the whole architecture around Blockchain has to change to
meet this requirement.
Interview 3
Interview 3 was with Alan Morrison from PWC. I first talked with Alan Morrison, when I put up my research
question on Quora.com. When Alan answered quickly, I asked if he wanted to participate in an interview about
Blockchain and its limitations. Alan Morrison works with Emergent Technologies, which was why he had a good
understanding of the Blockchain.
Just as Henry Chan, Alan Morrison had a very pragmatic approach to Blockchain. During the interview he
used a lot of unpublished research, probably conducted during his work, to answer the questions. That adds
another level of expert knowledge since he was not the only expert, but he referred to others. His most used
Transactional
words were: Enterprise
, Writing
, Peer
, Shared
(topeer) and .
5 most important characteristics of Blockchain
Verification (Interview 3, 8:35)
, in the Blockchain, refers to the act of verifying transactions within the Blockchain.
The unalterability is ensuring data is secure for alterations. The
fine grain control of document and contracts is
referring to smart contracts, and to the Blockchain 2.0 and Ethereum. To
preserve transaction data is comparable
to the unalterableness (ibid). However, this refers more to the fact that no data is ever deleted, and will always
stay in the Blockchain. In regards to that, we can, of course, go back for audits if all data is preserved.
12
Problems mentioned
He mentioned that Blockchain applications are built for people who do not want to have anything to do with
HEXstrings or other computer terms (Interview 3, 16:12). They just want Blockchain to work, and not knowing the
technical part of the Blockchain can be a big gap to jump. Alan Morrison then suggested a problem with the
password not being just a password on the Blockchain (Interview 3, 17:43) it is the whole user identity. People
may not be ready for this identification. Furthermore, even though there is a security built into the Blockchain via
cryptography, transactions are still a matter of privacy, which then have to be incorporated into the Blockchain.
Interview 4
Interview 4 was with Romain Witomski from Implement Consulting, and the interview was conducted at the
Implement offices in Copenhagen. It was the longest interview, and it the most giving due to the face to face
interaction. Romain Witomski was very humble, and mentioned numerous times that he was not an expert, and
he still has to read and learn about Blockchain (Interview 4, 37:42). That observation was interesting as it
confirmed the suspicion that Denmark is lagging in regards to people who work with Blockchain, compared to
America. His most used words were: Coding, Hash, Voting, Stock, and Learn.
5 most important characteristics of Blockchain
trustlessness
The first characteristic mentioned was (Interview 4, 17:46) and, just like in interview 2, it is the
disintermediation (ibid)
system’s ability to work without trust. The second characteristic is , which relates to
‘cutting out the middleman’, which again can be coupled with the trustlessness, since the Blockchain does not
Truly Free
need intermediation. refers to Blockchain as an attempted renaissance of the original idea of the
internet: being truly free (Interview 4, 26:17). The act of touching upon a transaction between two parties without
Fundamental economic concept of transactions. No Boundaries
trust is what is meant by refers to what are the
limits of application, which is, at this point “the sky is the limit”.
Problems mentioned
13
Interview 5
Interview 5 was the last interview. The recipient of the interview was Dominic Wörner from ETH Zurich. It did not
take long to realize that Dominic was the one with the most technical approach, which makes sense when 3 out of
5 recipients were from consultancies. As the interview went on, it became apparent that Dominic Wörner knew a
lot about certain details of Bitcoin and Blockchain, which made the conversation touch upon subjects such as
security (interview 5, 11:44; 13:14). Dominic Wörner most used words were:
Easy, Stakeholders, Criminal,
Providers, and Update.
5 most important characteristics of Blockchain
When asking about the five most important characteristics,
trustlessness came up as in the previous interviews.
Censorship resistance
(Interview 5, 4:21) means that it is not possible to tamper with data already been processed
in the Blockchain. As well as the recipient in interview 4, an important factor was the
introduction of economic
incentives auditability
, as well as the censorship resistance
, which is highly connected to the . Lastly,
security was
mentioned, which is in relation to the security that the construction of Blockchain ensures.
Problems mentioned
Once again, the scalability was the problem discussed. Also, the redundancy (Interview 5, 8:31) of replicating
everything to everyone came up as a problem, which makes the system slow and costly compared to centralized
systems, such as VISA. Then Dominic Wörner mentioned how currently there is a problem with the anonymization
of the users (Interview 5, 13:14): if one is not careful with the protection of one's identity, one can easily be
found. Lastly, however not less striking, was how to govern such a system that is open?
Overall summary
All the recipients had a very pragmatic approach to the usage and applicability of blockchain, however some were
more skeptic. Some had more field experience in the application of the idea of the blockchain, where others were
much more humble and needed to learn more about the technology. One thing they all seemed to agree on was
how to view blockchain: as a protocol.
Conceptualisation
As presented in the previous section, there is a lot of different topics being discussed in the five interviews.
However, as one might imagine, it is not possible to deal with them all. That means a cut has to be made to
14
As well as the conceptualization of the five most important characteristics, here is a conceptualization of the
problems mentioned in the interviews.
Interview 1 Scalability
Results
The findings consist of the three main problems: scalability, transparency/redundancy and hype.
15
Scalability
Scalability was a prominent used term for the problem in regards to the blockchain and its future. This was
mentioned in 4 out of 5 interviews and always came up in the interviews. When asked about the flaws or
problems related to the blockchain, scalability was the first to be mentioned.
Transparency / Redundancy
Hype
Hype was the least mentioned problem. 2 out of 5 recipients mentioned that blockchain has gotten much hype,
even though the theory and knowledge behind its usage have been put in the background. This, therefore, tends
to be the reason for saying that blockchain can solve everything.
Discussion
Scalability
The Bitcoin Blockchain
Bitcoin has a 1mb block limit, which means that a block created by miners that is larger than one megabyte, will
be declared invalid (Block size limit controversy Bitcoin Wiki, 2016). This problem can only be solved by a
hardfork (Hardfork Bitcoin Wiki, 2016). A Hardfork is when "the bitcoin protocol that makes previously invalid
blocks/transactions valid, and therefore requires all users to upgrade". That means that the Bitcoin protocol has
to be changed to allow a different block size limit, for a block to be greater than one megabyte. However, this also
means that a consensus has to be reached in order implement such change. There has been numerous proposals
on a solution to the 1mb limitation, which cover various arguments and methods of increasing the block size on
the Bitcoin Blockchain (Block size limit controversy Bitcoin Wiki, 2016).
It seems that the 1mb limitation of the Bitcoin Blockchain started a search for a solution to this problem.
However, since a consensus is needed to change this hardcoded rule, it seems unlikely it will be changed any time
soon. This limitation on the Bitcoin Blockchain might be the reason of existence of the alternative chains.
While the miners are still to reach a consensus on the block size limit on the Bitcoin Blockchain, The
Lightning Network (Poon, 2015) made a workaround on the issue. They knew that this could not be changed, so
an alternative approach was sought. The Lightning Network and the creators are acknowledging the scalability
issue, as each node in the network has to know everything, it "... may create a significant drag on the ability of the
16
The Ethereum Blockchain
With similar problems to the Bitcoin Blockchain, scalability is also an issue on the Ethereum Blockchain, although
they seem to have solved the problem of the block size (Interview 2, 18:46). As mentioned in interview 2 ,
Ethereum has done this differently, and after some research, it was apparent that Ethereum does not have a block
size limit.
Ethereum operates with a price list of how much gas a certain action will cost to execute (Wood, 2014;
Maximum block size, 2015). On the Ethereum Forum is it explained by user StephanTual as "There's no block size
limit in Mb, Ethereum is not Bitcoin ... However, the 'number' of contract calls and standard transactions is limited
by the gas limit, which is 1.20x of the exponential moving average. So there's only so much gas that can be
expended per block, even though it can grow, of course." (Maximum block size, 2015).
Ethereum might thereby have solved one part of the limitations of the Bitcoin Blockchain. However,
there seems to be another problem regarding scalability, as each node in the network still has to agree on each
17
transaction, which means that "the whole network, in effect, cannot be more powerful than each of its
computers" (CoinFox, 2016). Ethereum is aiming to solve this problem with Lightning Networks, which is where "...
participants of the blockchain won’t have to validate your transactions as long as everything is all right." (ibid.) On
top of that, Ethereum wants to implement sharding which is the idea that not all the nodes in the network but
"just some of them have to agree" (Interview 1, 14:38, Interview X; DEVCON1, 2016). That means that not only
does valid transactions go through without writing to the Blockchain, but sharding works by "splitting a huge
database into a network of smaller ones" (ConFox, 2016). If Ethereum is being Turing complete and being able to
scale, it will then move into another age, which we can call Blockchain 3.0 (Interview 1, 16:15, Interview 2, 28:20;
CoinFox, 2016).
Ethereum is distancing itself even further from the Bitcoin Blockchain by introducing ProofofStake (PoS)
instead of ProofofWork (PoW) (CoinFox, 2016). However, ProofofStake is something that is to be implemented,
when the change is hardforked. No cryptocurrency is perfect. However, there are certain problems with using the
PoW, such as malicious attacks, which was the concern of Romain Witomski in interview 4. PoW is when "you
earn coin and transaction fee rewards according to the number of blocks you mine successfully" (Coin Pursuit,
2016), whereas in the PoS is where "Your earnings are based on the number of coins, or “stake,” you hold” (ibid.).
By using the PoW, a socalled 51%attack can happen (Learn Cryptography 51% Attack, 2016). A 51% attack is
when miners can take control over which blocks to validate because they own the largest majority. A 51% attack
can in theory still happen on PoS. However, it is much more expensive to execute.
Transparency and redundancy
The immutability of the Blockchain is a vital part. The importance of immutability has been especially evident in
the interviews (Interview 1, Interview 2, Interview 3) as they all mentioned this in the context of the five
characteristics. The immutability is the ability to store everything that happened on the Blockchain, which is
remarkable. Like only a few other systems, blockchain has a builtin transparency through the distribution of a
shared database.
However, what are we to do with all the data? Yes, the Blockchain creates an almost bulletproof audit
trail of all that ever happened on the blockchain, which would be perfect for Blockchain in the financial industry
where third parties hold the responsibility of either stock or assets.
In interview 5, Dominic Wörner said "In a distributed system or a BCsystem, we have now everything
replicated across the whole network. So there is a lot of redundancy, and therefore, the systems do not scale and
are slow and expensive compared to centralized trusted third parties." (Interview 5, 8:31). That means that,
interestingly, the very nature of the security feature in Blockchain is also limiting the scalability of it. The audit
trails that are to create trust in a trustless environment is a bottleneck for the scalability of the system. As
mentioned earlier, The Lightning Network has made a workaround. The workaround made scaling possible, but to
make scaling possible, The Lightning Network is going against the most vital features of the technology: the
writing of every transaction on the blockchain.
18
Needless to say, in a professional environment, where auditing is something that happens quite
frequently, the audit trails are important. But in a small transaction between two parties, do we need to write this
on the blockchain and take up space?
I think this a good argument for creating tailored chains, where we can customize the granularity of the
audit trails. That said, if we are using the blockchain in a professional setting, the audit trail is of course necessary.
If we are to use the audit trail when two parties interact, perhaps. It is hard to say whether or not to use this
feature since it is builtin. However, the problem occurs when builtin functions are "overwritten" by third party
applications to accommodate the activity on the blockchain, like The Lightning Network.
Hype and Blockchain
For people who have been following Blockchain as a technology, it will come as no surprise that there is a
considerable amount of hype around Blockchain. However, just like any technology, one could put Blockchain into
the context of the book Crossing the Chasm by Geoffrey Moore, as Jeremy Gardner in Interview 1 suggested. It is
interesting considering that we have now, for several years, followed and heard plenty about how Blockchain will
be disruptive for numerous industries but how can we make it do so? Apparently, there are still many issues we
have to deal with before we can call it something more than a fringe innovation, which also then places it at the
start of the bell curve (Moore, 2002).
It became apparent that professionals are still looking for where Blockchain can gain enough momentum
to become a conventional technology. Romain Witomski in interview 4 said that: “People are starting to look at
what should be the protocol of the future (...) So it is just mushrooming all the way” (Interview 4, 30:28). In
interview 2, Henry Chan said that "if we are able to identify a killer usecase, where the BC is significantly more
impactful than the current status quo, I think that should be our area of focus" (Interview 2, 21:52). However,
instead of just trying to apply the Blockchain everywhere Henry Chan also said that "it will obviously not work
when the traditional database solution will work, so when you have one single party, that requires a BC, you do
not require a BC. If a simple DB can suit you." (Interview 2, 04:07). That said, for Blockchain to change the current
status quo, we need to deal with an application that requires multiple database lookups.
Alan Morrison explains the hype as "... a catalyst to start working on process improvement, from a
transactional point of view" (Interview 3, 1:18). He continues then with "... I think it is a consensus building that is
the foundation for it." (Interview 3, 03:00). That could imply that the hype around blockchain is about process
improvement, which will also explain the interest from the financial sector that sees this as a way to save
resources. So, what the blockchain has done so far is to make us aware that there is a different way of doing
things. And maybe this way is better than the one we have now. We saw when the banks were introduced to this
idea of handling money without a centralized entity: they just shook their heads, but as Ethereum and Blockchain
2.0 were introduced, it opened people's eyes.
In interview 3 (5:41), Alan Morrison was asked if he could get closer to what has to be done to make
blockchain work. He quoted an interview he made, stating one of the problems as "You are telling people about
Bitcoin and BC, and these people are afraid to see a 46 character hex string ... they will bounce right over that...
19
Blockchain as an application or a protocol
It was evident in the interviews that Blockchain can work on more than one level, in the context of th OSI Model. I
will, in this section discuss how to perceive Blockchain from both an applicationlevel, as well as a protocollevel.
And since the Blockchain is "... being used as an infrastructure, as protocol and as the means for transactions."
(Interview 4, 16:48) that can create a confusion of what is an application and what is infrastructure.
Romain Witomski in interview 4 said that "... the BC [for him] is very much the infrastructure and the
protocol." (Interview 4, 16:48). The reason for this is that he sees the blockchain as the underlying machinery that
makes Bitcoin work, whereas, one can argue that the firm GuardTime.com (GuardTime, 2016), mentioned in
Interview 4,, is an application implemented on top of an existing infrastructure. The same goes for Dominic
Wörner in interview 5 that says "It [the BC] is censorship resistance; it really introduces economic incentives,
deepdown in the protocollevel." (Interview 5, 4:21).
If we take Bitcoin, we see Blockchain as an underlying protocol, which is then placed at the lower level at
OSI. However, if we look at GuardTime.com, we will see a network security application that uses blockchain
technology to assure that all nodes in a physical computer network work as they should. It sends packages back
and forth, and if any error occurs all the nodes in the network are notified. One might think that this is an
application and can therefore not be placed on the lower level, however, if we go back to the OSI level, we see
that third layer is dealing with network and routing, and the second layer is error detection. That means that the
functionality of the application yields the placement at the lower level, but it could easily be placed at a higher
one to maintain security there. GuardTime.com is an excellent example of how we can use blockchain, and move
away from explaining blockchain through the terminology of bitcoin. It is furthermore a splendid example of why
there might be confusion about whether to package the blockchain as a protocol or application because some of
these might just work as both. The same goes with bitcoin. Now it is a protocol, but perhaps someday a new
business model will make use of a payment method using the blockchain, and then we will see blockchain as an
application.
20
Additional thoughts
Need for customizability
Blockchain has potential, but security and the inalterability of the code make it hard to tailor blockchain to
everyone's needs. One could argue that a third party application is nothing more than a symptomatic treatment
to a problem that we at some point have to deal with. It seems as if for the blockchain to work as a protocol, in a
nonpublic enterprise environment, we need to change the code.
The blockchain is a young technology that experiences growing pain. However, the very democracy that
enables bitcoin to gain so much momentum as an alternative financial service is the same reason that a consensus
on the bitcoin blockchain cannot be reached. For blockchain to work in an enterprise setting, it has to be a
solution which can be tailored.
Global
Global
was mentioned in interview 1, as one of the five most important characteristics (Interview 1, 11:23).
Global
can have many connotations. However, one way of looking at it is to see that the development of blockchain can
go in pretty much all directions. So, to find a use case where the usage of the blockchain can change the current
status quo, people need to alter the idea of blockchain being an easy solution to world process problems. If we
look at some of the most promising applications using blockchain, the inventors are all young, however,
knowledgeable people. Therefore, we need more academic studies that question the blockchain, the
functionality, and the features. By doing that, we will create more tension on the subject as well as competition,
which will drive the innovation even further. Therefore, people need to educate themselves about
computerscience to understand blockchain and how and where to use it.
Conclusion
So what are the limitations of blockchain and where does it break? I have in this case study research, by
approaching subject matter experts, found that blockchain has a potential for disruption of various industries.
However, for it to do so, the communities around the development of blockchain need to address the limitations
discussed: Scalability, Transparency/Redundancy, and Hype. Lastly, the blockchain technology breaks when the
faith, applicability and usage are still to be determined in regards to how the future of the Ethereum network is
settled. Therefore, the blockchain has to find its shape. When blockchain knows what to be, a use case can be
built around it.
These main topics came about in just five interviews, and I am convinced that more will follow if
expanded the sample. Therefore, more research in this field is required if we are to know more about the nature
and possibilities of the blockchain. Moreover, published academic papers can push the technology in the right
21
direction, by creating educational information about the blockchain and thereby transforming it from a fringe
technology to a trusted one.
References
Articles
Barab, S., & Squire, K. (2004)
. Designbased research: Putting a stake in the ground. The journal of the learning
sciences, 13(1), 114.
Beck, R., Weber, S., & Gregory, R. W. (2013)
. Theorygenerating design science research. Information Systems
Frontiers, 15(4), 637651.
Coelho, F. (2008)
. An (almost) constanteffort solutionverification proofofwork protocol based on merkle trees.
In Progress in Cryptology–AFRICACRYPT 2008 (pp. 8093). Springer Berlin Heidelberg.
Czepluch, J. S., Lollike, N. Z., & Malone, S. O. (2015)
. The Use of Block Chain Technology in Different Application
Domains. Retrieved 16 April 2016, from
http://www.lollike.org/bachelor.pdf
Dwork, Cynthia; Naor, Moni (1993)
. "Pricing via Processing, Or, Combatting Junk Mail, Advances in Cryptology".
CRYPTO’92: Lecture Notes in Computer Science No. 740 (Springer): 139–147.
Eisenhardt, K. M. (1989)
. Building theories from case study research. Academy of management review, 14(4),
532550.
Hype springs eternal
. (2016) The Economist
. . Retrieved 16 April 2016, from
http://www.economist.com/news/financeandeconomics/21695068distributedledgersarefuturetheir
adventwillbeslowhypesprings
IBM ADEPT Practictioner Perspective Pre Publication Draft 7 Jan 2015
. (2016) Scribd
. . Retrieved 17 March
2016, from
http://www.scribd.com/doc/252917347/IBMADEPTPractictionerPerspectivePrePublicationDraft7Jan
2015
Kepser, S. (2004)
. A Simple Proof for the TuringCompleteness of XSLT and XQuery. In Extreme Markup
Languages®.
Kosba, A., Miller, A., Shi, E., Wen, Z., & Papamanthou, C. (2015)
. Hawk: The blockchain model of cryptography
and privacypreserving smart contracts. Cryptology ePrint Archive, Report 2015/675, 2015. http://eprint.
iacr. org.
Kramer, A. D., Fussell, S. R., & Setlock, L. D. (2004)
. Text analysis as a tool for analyzing conversation in online
support groups. In CHI'04 Extended Abstracts on Human Factors in Computing Systems (pp. 14851488).
ACM.
Lewenberg, Y., Sompolinsky, Y., & Zohar, A. (2015)
. Inclusive block chain protocols. In Financial Cryptography and
Data Security (pp. 528547). Springer Berlin Heidelberg
Liu, D., & Camp, L. J. (2006)
. Proof of Work can Work. In WEIS.
22
Books
Bellare, M., & Rogaway, P. (2005)
. Introduction to modern cryptography. UCSD CSE, 207, 207.
Chuen, D. L. K. (2015)
. Handbook of digital currency: Bitcoin, innovation, financial instruments, and big data (D. L.
K. Chuen). Academic Press.
Deacon, D., Pickering, M., Golding, P., & Murdock, G. (1999).
Researching communication. London: Arnold.
Katz, J., & Lindell, Y. (2014)
. Introduction to modern cryptography. CRC Press.
McCracken, G. (1988)
. The long interview (Vol. 13). Sage.
Swan, M. (2015)
. Blockchain: Blueprint for a New Economy. " O'Reilly Media, Inc.".
Wattenhofer, R. (2016)
. The Science of the Blockchain (1 edition ed., Inverted Forest Publishing). CreateSpace
Independent Publishing Platform.
Yin, R. K. (2013)
. Case study research: Design and methods. Sage publications.
Webpages
Bitcoin – CFB Scientific Translations And Consulting.Cfbtranslations.com
. N.p., 2016. Web. 19 Mar. 2016.
Block Chain (Database) Wikipedia
. . N.p., 2016. Web. 17 Mar. 2016.
Buterin, V. (2014).Side Chains: The How, The Challenges and the Potential
Bitcoin Magazine
. . Retrieved 23 April
2016, from
https://bitcoinmagazine.com/articles/sidechainschallengespotential1397614121
Cryptography.Wikipedia
. N.p., 2016. Web. 19 Mar. 2016.
Ethereum Project
. (2016) Ethereum.org
. . Retrieved 30 March 2016, from
https://www.ethereum.org/
23
Bitcoin's Future: Proofofstake vs Proofofwork
Graydon, C. & Graydon, C. (2014). .
CCN: Financial Bitcoin &
Cryptocurrency News
. Retrieved 10 May 2016, from
https://www.cryptocoinsnews.com/bitcoinsfutureproofofstakevsproofofwork/
Hash En.bitcoin.it
Bitcoin Wiki. . N.p., 2016. Web. 21 Mar. 2016.
IBMVoice: How To Provide Secure And Trustworthy Blockchain Networks In The Cloud
. (2016).Forbes
. Retrieved
3 May 2016, from
http://www.forbes.com/sites/ibm/2016/04/29/howtoprovidesecureandtrustworthyblockchainnetwo
rksinthecloud/#51f3faf7e82d
John Plansky, and Kimberly Richards. "A Strategist’S Guide To Blockchain" strategy+business
. . N.p., 2016. Web.
17 Mar. 2016.
Ledger Wikipedia
. . N.p., 2016. Web. 21 Mar. 2016.
Merkle, Ralph C
. "A Digital Signature Based On A Conventional Encryption Function".
Advances in Cryptology —
CRYPTO ’87
(1988): 369378. Web. 21 Mar. 2016.
ProofofWork and ProofofStake Mining
| Coin Pursuit Coinpursuit.com
. (2016). . Retrieved 9 May 2016, from
https://www.coinpursuit.com/pages/proofofworkproofofstakebitcoinmining/
Public Key Infrastructure.Wikipedia
. N.p., 2016. Web. 19 Mar. 2016.
Public Keys And Private Keys comodo.com
Comodo. . N.p., 2016. Web. 19 Mar. 2016.
PublicKey Cryptography For NonGeeks blog.vrypan.net
. . N.p., 2013. Web. 19 Mar. 2016.
Slock.It Takes DAO to 'IoT
' Decentralized Autonomous Organizations 101 YouTube
. (2016). . Retrieved 14 May
2016, from
https://www.youtube.com/watch?v=3gEMvhyES1k
Smart contract
. (2016) Wikipedia
. . Retrieved 15 May 2016, from https://en.wikipedia.org/wiki/Smart_contract
Trusted Timestamping Wikipedia
. . N.p., 2016. Web. 21 Mar. 2016.
Turing complete
. (2016) Wikipedia
. . Retrieved 29 March 2016, from
https://simple.wikipedia.org/wiki/Turing_complete
Tools
Sinclair, S. & G. Rockwell. (2016)
. Links. Voyant Tools. Retrieved April 24, 2016, from
http://voyanttools.org
24
Appendix
Appendix 1
25
Appendix 2
26
Appendix 3
27
Appendix 4
New knowledge that came about in the interviews
Research Repository
Repository of research conducted on Bitcoin and Blockchain. This is not listed since it contains over +500
references, but the full list can be found on link below.
https://docs.google.com/spreadsheets/d/1VaWhbAj7hWNdiE73PWwrl5a0WNgzjofmZXe0Rh5sg/edit
Articles and media
Block size limit controversy Bitcoin Wiki . (2016) En.bitcoin.it
. . Retrieved 7 May 2016, from
https://en.bitcoin.it/wiki/Block_size_limit_controversy
Boroujerdi, R. D., & Wolf, C. (2015) . What if I told you. Goldman Sachs Global Investment Research, 125.
Retrieved 26 April 2016, from
http://www.goldmansachs.com/ourthinking/pages/macroeconomicinsightsfolder/whatifitoldyou/rep
ort.pdf
Buterin, V. (2014). A nextgeneration smart contract and decentralized application platform. White Paper.
Retrieved 26 April 2016, from http://vbuterin.com/ethereum.html
DEVCON1: Scalable Blockchains & Asynchronous Programming Vitalik Buterin . (2016).YouTube
. Retrieved 19
April 2016, from https://www.youtube.com/watch?v=QIt3mKLIYU
Ethereum founder: Now we can scale the system | Coinfox. (2016). Coinfox.info
. Retrieved 16 April 2016, from
http://www.coinfox.info/news/5171ethereumfoundernowwecanscalethesyste
Guard Time (2016) Guardtime.com
. . Retrieved 12 May 2016, from https://guardtime.com/en
Hardfork Bitcoin Wiki. (2016).En.bitcoin.it. Retrieved 7 May 2016, from https://en.bitcoin.it/wiki/Hardfork
Learn Cryptography 51% Attack . (2016) Learncryptography.com
. . Retrieved 9 May 2016, from
https://learncryptography.com/cryptocurrency/51attack
Lightning Network . (2016 Lightning.network
). . Retrieved 19 April 2016, from https://lightning.network/
28
29