Block Chain
Block Chain
Abstract
In this chapter we provide an overview of the concept of blockchain technology and its
potential to disrupt the world of banking through facilitating global money remittance, smart
contracts, automated banking ledgers and digital assets. In this regard, we first provide a brief
overview of the core aspects of this technology, as well as the second-generation contract-based
developments. From there we discuss key issues that must be considered in developing such
ledger based technologies in a banking context.
1 Introduction
The 21st century has witnessed the emergence of a number of disruptive technologies. The advent
of the internet has made the rise of social media possible, and billions of people, as well as thousands
of corporations are now connected and interacting on a daily basis. The world has also been able
to leverage unused assets in the sharing economy, which in many cases is powered by financial
technology (fintech) firms, and this has also helped increase competitiveness in previously protected
fields. Blockchain holds promise for being the latest disruptive technology, and we argue in this
chapter that the technology may find applications in areas as varied as transaction processing,
government cash management, commercial bank ledger administration and clearing and settlement
of financial assets.
We have already seen how blockchain technologies have enabled the creation of crypto-currencies,
and their rise has been documented widely1 . The use of these currencies has prompted wide discus-
sions on the merits (or lack thereof) of decentralisation, disintermediation, anonymity and censor-
ship resistance in this setting, aspects which we discuss in this chapter also. One cannot, however,
dispute their potential to disrupt areas such as the global remittance industry, by facilitating near-
instantaneous global remittance with very low transaction fees.
1
Nakamoto [2008] introduced the first decentralised crypto-currency called Bitcoin, and related technology star-
tups have already attracted more than $1 billion in funding. The currency has been the subject of academic
considerations in topics such as privacy (Reid & Harrigan [2013]), security Barber et al. [2012], regulation (Peters
et al. [2014]) and monetary policy (Peters et al. [2015])
Decentralization describes conditions under which the actions of many agents cohere
and are effective despite the fact that they do not rely on reducing the number of people
whose will counts to direct effective action.
Another area we explore in the context of blockchain technologies is that of clearing and settle-
4
ity of securing the particular data/information entered into the ledger. This allows time stamping
to occur with an element of privacy for the data being secured and entered on the blockchain ledger.
In addition, just recording the hash is a more parsimonious representation of the information being
secured or recorded.
There exist parties such as Time-Stamping Authorities (TSA) that can provide a trusted third
party arrangement to provide a secure and safe cold or secured live storage of information relating
to the blockchain ledger recording. This digital notary signs with a private key for this data to
be recorded and the time when this data was communicated to the authority. Then the signature
address would be sent back to the original owner of the data. This simplified form is often performed
in blockchain technologies using more advanced approaches such as a TSA collecting and securing
in encrypted storage several agents data sets from within a fixed time period, then taking all data
from this period and providing a time stamp, and hashing all this data together via a method such
as a Merkle tree, see Merkle [1979, 1980]; Devanbu et al. [2001]. Then the resulting hash, for
instance the root of the Merkle tree would be hashed together with the final hash of the previous
time period and then published in the blockchain ledger.
• Permissionless blockchains, where anyone can participate in the verification process, i.e. no
prior authorisation is required and a user can contribute his/her computational power, usually
in return for a monetary reward.
• Public blockchains, where anyone can read and submit transactions to the blockchain.
In reality, most permissionless blockchains feature public access, while the intention of most
permissioned blockchains is to restrict data access to the company or consortium of companies that
operate the blockchain. For this reason, we collapse the categorisation into two types, permissioned
and permissionless blockchains, and we elaborate the distinction between them in the following
section.
5
Consensus within the network is achieved through different voting mechanisms, the most com-
mon of which is Proof-of-Work, which depends on the amount of processing power donated to the
network. The notion of Proof-of-Work allows the network to secure against malicious attempts to
tamper with the blockchain structure due to the computational power that has already been ap-
plied to create the blockchain ledger entries. If an attacker wished to tamper with the blockchain,
they would have to commit a computational effort equivalent or greater than all the power spent
from the reference point they wished to alter to the present time. In addition, they would have
to achieve this at a faster pace than the current legitimate network processing of new blockchain
entries. Proof-of-work concepts can come in many forms, for instance they may rely on solutions
to a computationally hard problem, a memory intensive problem or a problem that may require
user interventions. To be practically useful for a blockchain technology, such problems must be
computational challenging to solve, but efficient to verify a solution once obtained. Although these
algorithms are vital in ensuring the security of the network, they are also very costly in terms of
computation, and thus electricity usage also.
A permissionless blockchain is advantageous in that it can Swanson [2015] both accommodate
anonymous or ‘pseudonymous’ actors and protect against a Sybil (i.e. identity-forging) attack
Douceur [2002]. On the other hand, the incentive mechanism has to be carefully developed in order
to ensure that verifiers are incentivised to participate. In Bitcoin, for example, verifiers receive an
amount for verifying each transaction, as well as for publishing a block of transactions. However,
the latter is 2 orders of magnitude higher than the former. Since the incentive for publishing
transactions of blocks decreases according to a predefined schedule, means that verifiers will at
some point need to increase the amount they will require to process individual transactions, which
makes it more costly to transact in Bitcoin.
Besides Bitcoin, examples of permissionless blockchains include Ethereum4 , the platform that
is intended to provide access to smart contracts on the blockchain, as well as offer blockchain as a
service.
6
type of processing and verification will decrease, leading to more centralisation. In a permissioned
blockchain, only a smaller number of preselected participants will need to operate, and if these come
from large institutions they will be able to scale their computing power in line with the increase in
the number of transactions.
However, because of the smaller number of participants, it is much easier for a group of users
to collaborate and alter the rules, or revert transactions. In addition, it is easy for them to reject
transactions and in this sense it is not ‘censorship resistant’ as a permissionless blockchain would
be. Examples of permissioned blockchains include Eris6 , Hyperledger7 , Ripple8 and others.
7
Thus far, smart contracts are not legally enforceable, although there have been efforts in the di-
rection. Eris industries have recently proposed the idea of dual integration, or ‘ensuring a real world
legal contract overlay fused onto a specific smart contract’9 . Other initiatives include CommonAc-
cord10 , which attempts to create templates of legal texts and thus create contracts in a modular
fashion. The objective is to remove ambiguity as much as possible, having the smart contract
accurately reflect the written legal contract, so that it can be actionable in the real world11 .
• Relational databases, such as SQL and variants, which are based on set theory and imple-
mented as two-dimensional tables;
• Key-value stores, which store pairs of keys and values for fast retrieval;
• Columnar databases, which store data in columns, and can have more efficient representations
of sparse tables compared to relational databases;
Databases can be centralised (residing at a single site) or distributed over many sites and con-
nected by a computer network. We will focus on the latter, given the closer proximity to the
blockchain concept. The objective of a distributed database is to partition larger information re-
trieval and processing problems into smaller ones, in order to be able to solve them more efficiently.
In such databases, a user does not, as a general rule, need to be aware of the database network
topology or the distribution of data across the different nodes. It should also be noted that in a
distributed database, the connected nodes need not be homogeneous, in terms of the data that they
store (Elmasri & Navathe [2014]).
Because of the design of these databases and the replication of data across different nodes, such
a database has several advantages (Elmasri & Navathe [2014] (p. 882)):
• Better reliability and availability, where localised faults do not make the system unavailable;
• Easier expansion.
In every distributed database, however, there is the issue of how modifications to the databases
are propagated to the various nodes that should hold that data. The traditional approach is a
‘master-slave’ relationship, where updates to a master database are then propagated to the various
9
https://erisindustries.com/components/erislegal/
10
http://www.commonaccord.org/
11
http://p2pfoundation.net/Legal_Framework_For_Crypto-Ledger_Transactions
8
slaves. However, this means that the master database can become a bottleneck for performance. In
multi-master replication12 modifications can be made to any copy of the data, and then propagated
to the others. There is a problem in this case also, when two copies of the data get modified by
different write commands simultaneously.
A blockchain could be seen as a new type of distributed database which can help prevent such
conflicts. In the same way that the Bitcoin network will reject a transaction where the Bitcoin
balance to be transferred has already been ‘spent’, a blockchain can extend the operation of dis-
tributed databases by rejecting transactions which, e.g. delete a row that has already been deleted
by a previous transaction (where a modification is a deletion, followed by the creation of a new
row).
A second difference between blockchains and distributed databases lies in the ability to create
self-enforcing contracts that will modify the blockchain’s data. Many permissioned blockchains have
a built-in virtual machine, such that one can execute pieces of computer code on the network. If
this virtual machine is Turing-complete, this means that the machine can potentially solve a very
large set of problems, which is very useful for executing more complex transactions on the network,
possibly conditional on the state of certain off-chain variables.
The proliferation of databases as data stores has spawned considerations regarding data-related
aspects, such as security, confidentiality and integrity. We argue that discussions around these
issues will be important for blockchain technologies too, if they are to be successful in a business
enterprise setting. In the following section we discuss these security aspects in depth and comment
on blockchain attributes with regard to them.
9
3.1 Data integrity
Maintaining the integrity of data entails its protection from invalid modification, insertion or dele-
tion, thereby preserving the accuracy, consistency and validity of data over its life cycle. Ensuring
this integrity is important for the recoverability and searchability, as well as the traceability and
connectivity of financial data records. This process usually requires a set of constraints or rules that
define the correct states of a database or data set, and maintain correctness under operation. While
the wider area of data security is often discussed in the context of cryptography considerations
around blockchain technology, data integrity preservation in a blockchain structure has received
comparatively little attention.
When we discuss data integrity in this section we are referring to the accuracy and consistency
or validity of data over its life cycle. In general, when discussing data integrity it may take one of
two meanings, either referring to a state of the data or a to a process performed relating to the
data. Data integrity in the context of a state specification defines a data set that is both valid and
accurate, whereas data integrity as a process, describes protocols adopted to preserve validity and
accuracy of a data set.
In this section we argue that blockchain technologies can be structured to be consistent with
best practices currently adopted with regard to data integrity, and indeed such considerations are
only just starting to find their way into second generation blockchain technologies, with projects
such as Enigma in MIT, see Zyskind et al. [2015]. The first aspect of data integrity we consider
relates to the state of the data. In this context the state specification of the blockchain data records
would be defined such that the data is valid and accurate or that the smart contracts operating on
the blockchain are valid and accurate
The second aspect of data integrity relates to the transformation processes, which in this case
would be operating on either data recorded or linked to the blockchain or to smart contracts
operating on data on the blockchain. As with all applications in which data is a key ingredient, the
data in its raw form is often not directly utilised for decision making and interpretation within the
application. It must first undergo a variety of modifications and be put through different internal
processes to transform the raw data forms to more usable formats that are practical for identifying
relationships and facilitating informed decisions. Data integrity is then critical in ensuring that
these transformations preserve the validity of the data set. Modern enterprises reliant on data, such
as financial institutions, need to have confidence in the validity of their data, therefore they need to
ensure both the provenance of the data and the preservation of integrity through transformation.
Such transformations may also be included as part of smart contract structures in second generation
blockchain applications.
Another way of conceptualising data integrity notions is to consider its function in preventing
data modification by unauthorized parties, and maintaining internal and external consistency in
the data set. If data is compromised then its utility to business practice and its informative nature
may rapidly diminish. There are numerous places where such corruptions of data integrity may
arise, for instance during replication or transfer or the execution of a smart contract that operates
on a dataset to make contractual decisions.
One can minimise such issues through the adoption of error checking methods. In a blockchain,
these methods are inbuilt. The hash of each block of transactions is linked to the next, thus forming
a chain. Transactions that are present in these blocks cannot be altered, unless one generates all
blocks from that point onwards, which requires immense computational power. However, error
checking for second generation blockchain structures, where smart contracts contain computer code,
will be more involved.
Causes of corruption of data integrity include human error, which may or may not be intentional,
code errors, viruses/malware, hacking, and other cyber threats, compromised hardware, such as a
device or disk crash and the physical compromise to devices. From this list we see that some of these
10
issues with preservation of data integrity rely on data security, whilst others are non-resolved when
it comes to security solutions. We can easily see that data integrity and data security are related,
and that data security refers to the protection of data against unauthorized access or corruption
and is necessary to ensure data integrity. Hence, we see that data security is one of several measures
which can be employed to maintain data integrity, as unauthorized access to sensitive data can lead
to corruption or modification of records and data loss.
In addition to security considerations, it is also clear that to achieve data integrity there is a
strong case for data backup/ redundancy/ duplication. Often in practice, there are adopted best
practices that remove the other data integrity concerns, such as input validation to preclude the
entering of invalid data, error detection/data validation to identify errors in data transmission, and
security measures such as data loss prevention, access control, data encryption.
We have already discussed the advantages that distributed databases bring in resolving a num-
ber of these issues. A blockchain additionally brings cryptographic security, a solution to the
multi-master replication problem and facilitates more complex transactions through enabling smart
contracts.
Ge et al. [2004] note the following aspects of integrity for data stored in databases which we
believe would analogously apply to blockchain structures and architectures, as well as to perhaps
different smart contract structures that are designed to operate on blockchain backbone networks:
• Integrity and consistency should involve semantic integrity constraints which are rules defining
the correct states of the system during operation. Such semantic constraints are present
to ensure a level of automated protection against malicious or accidental modification of
data, and ensure the logical consistency of data. Rules can be defined on the static state
of the database, or on transitions (as conditions to be verified before data is modified). In
the context of blockchains, such rules would need to be applied at different levels, to the
raw processing of data and in addition, to the functioning of smart contracts or secondary
processes/transformations on blockchain related data records.
• Identification, Authentication, Audit. Before accessing a system, every user is identified and
authenticated, both for the audit trail and for access permission. Auditing is the process of
examining all security relevant events. Such features can be incorporated into blockchains
either publicly through colouring mechanisms on the blockchain records (see overview in
Rosenfeld [2012]) or through blockchain architectures such as permissioned blockchains.
• Authorisation (access control). Authorisation applies a set of rules that defines who has
what type of access to which information. Access control policies govern the disclosure and
modification of information. In the context of requirement engineering, security aspects should
not be afterthoughts of database design process and likewise should be included in many
applications in the blockchain settings. Authorisations that are of relevance in blockchain
settings can range from who can append data and what type to the blockchain, who can
verify blockchain transactions, who can perform or execute smart contracts, view existing
properties of smart contracts or initiate such smart contracts.
In fact, the specification of protocols for preservation of data integrity in general governance
structures has been a research topic since the early 70’s and several different approaches have been
proposed which include (not an exhaustive list):
1. The Bell LaPadula model (Bell & LaPadula [1973]);
3. The Graham-Denning model (Denning [1976]) and its extension the Harrison-Ruzzo-Ullman
model (Tripunitara & Li [2013]). Note, the Graham-Denning Model is a computer security
11
model that shows how subjects and objects should be securely created and deleted. It also
addresses how to assign specific access rights. It is mainly used in access control mechanisms
for distributed systems
4. Mandatory Access Control. Note, MAC often refers to an access control in which the operating
system constrains the ability of a subject or initiator to access or generally perform some sort
of operation on an object or target.
5. Multilevel security. Note, MLS usually involves the application of a computer system to
process information with different security levels, and prevents users from obtaining access
to information for which they lack authorization. MLS is typically adopted in one of two
settings, the first is to refer to a system that is adequate to protect itself from subversion and
has robust mechanisms to separate information domains. The second context is to refer to
an application of a computer that will require the computer to be strong enough to protect
itself from subversion and possess adequate mechanisms to separate information domains, i.e
a trusted system third party.
6. The take-grant protection model. Note, this is a formal graphical model structure and protocol
to establish or disprove the safety of a given computer system that follows specific rules.
We briefly highlight a few examples of these data integrity frameworks mentioned and then
comment on the ability to develop such frameworks within the context of a blockchain network.
We specifically chose two frameworks, the Clark-Wilson model and the Biba model, as variants of
them have wide spread uptake for the types of applications we will discuss.
12
which consistency and conformance to the real world are two of the most significant. Then UDI’s
represent all other data, such as the keyed input to transformational procedures.
Given these structures, the CW model then specifies 6 basic rules that must be adhered to in
order to maintain integrity of a system. We provide these below, along with a description of how
these pertain to a blockchain structure.
• The application of a transformation process to any CDI must maintain the integrity of the
CDI and it may only be changed by a transformation process.
Comment: A transformation process is a transaction, and transactions on blockchains are
unitary - it is impossible for one side of the transaction to happen without the other. Permis-
sionless blockchains such as Bitcoin feature eventual consistency, in the sense that there may
be some period of time for which the system is in an inconsistent state (e.g. due to a fork), but
it is guaranteed to return to a consistent state eventually. However, this does however require
consideration for structuring of smart contract and blockchain specific secondary application
functions.
In permissioned/private blockchains, it is of possible to have near-instantaneous consistency.
• Only certain subjects can perform transformation processes on prespecified CDI’s. This pre-
specification restriction must reflect governance enforced true separation of duties. The prin-
ciple of separation of duty requires that the certifier of a transaction and the implementer be
different entities.;
Comment: In any blockchain, subjects (users) are only enabled to transact with the tokens
belonging to them, and no other user is able to access these without knowledge of their
private key. Verifiers (miners) only ascertain whether transactions are valid. If however smart
contracts have access to such information or data pertaining to users, this must be considered
in their development on blockchain technology.
• There must be a write only audit file that records all the transaction processes.;
Comment: Clearly this exists in the case of blockchain. An advantage of the blockchain
is that it can provide guarantee of absence of modification. In the context of ownership,
the blockchain proves that an asset has been transferred to somebody, and has not been
transferred to somebody else subsequently. Because transactions can only be found on the
blockchain, if a transaction is not found there, from the blockchain’s perspective it does not
exist13 .
• It must be possible to upgrade some UDI’s to CDI’s through the application of a transaction
process.;
• Only a privileged subject in the system can alter the authorisations of subjects.
Comment: In the case of permissioned blockchains, there may be a consortium which may
determine whether another node can enter the network.
In most cases of blockchain architectures we have seen thus far the blockchains do not have
hierarchies of authorisations for read and write access. The data model differs from that envisioned
by Clark and Wilson, as there as many copies of the data as there are verifiers on the blockchain.
13
Factom whitepaper, available at https://raw.githubusercontent.com/FactomProject/FactomDocs/master/
Factom_Whitepaper.pdf
13
Anybody can change their own data unilaterally, but for this to become the accepted history of the
data, consensus has to be reached about the veracity of the new data. However, as people consider
data integrity issues, there are emerging forms of blockchain architecture that will consider such
features, such as the Enigma system developed in MIT, which will be discussed in this section.
Under the CW model, once subjects have been constrained so that they can gain access to
objects only through specified transformational procedures, the transformational procedures can be
embedded with whatever logic is needed to effect limitation of privilege and separation of duties.
The transformational procedures can themselves control access of subjects to objects at a level of
granularity finer than that available to the system. What is more, they can exercise finer controls
(e.g., reasonableness and consistency checks on unconstrained data items) for such purposes as
double-entry bookkeeping, thus making sure that whatever is subtracted from one account is added
to another so that assets are conserved in transactions.
• The subject should be able to read an object only if they have a higher than or equal security
status than the object. This is known as the Simple Integrity Axiom and stated in another
manner it says that a subject at a given level of integrity must not read an object at a lower
integrity level (no read down).;
• The subject should be able to write an object only if they have a lower than or equal security
protocol than the object they write too. This is known as the Star Integrity Axiom and when
stated in another manner it says that a subject at a given level of integrity must not write to
any object at a higher level of integrity (no write up).; and
• The final component is the Invocation Property which states that a process from a lower
integrity level can not request higher integrity level access. In otherwords it can only interface
with subjects at an equal or lower level of integrity status.
14
3.4 Integrity considerations in financial applications
There are blockchain technologies starting to emerge for financial applications which try to incor-
porate these notions of data integrity, security and confidentiality into their designs, we provide a
few examples, though our coverage is by no means exhaustive in this rapidly growing field.
For instance in the case of crypto currency applications in blockchain technologies there is
‘cryptoassets.core’ which includes ‘defensive programming principles to mitigate developer human
error, data integrity and security issues’. In particular, in this context the irreversibility of the
blockchain structure means one must be particularly cautious in financial processes to ensure that
there are protocols to mitigate against human-errors by the developers and external attackers trying
to exploit issues in the financial code. In this context, the following list of potential data integrity
issues for cryptoasset services is provided14 :
• Race conditions allowing over-balance withdrawals or account balance mix up (data integrity
issues);
• Improper cold wallet handling increases the risk of losing customer assets;
In the developments considered in cryptoassets.core they are able to overcome issues such as
race conditions through partitioned serialized transactions isolations. That is, the database trans-
actions are performed in a complete isolation, one after each another, and thus there cannot be
race conditions. If the database detects transactions touching the same data, only one of conflicting
transactions may pass through and the others are aborted with application-level exception. In addi-
tion they build in features such as allowing each crypto currency/asset to obtain its own collection
of database tables which contain “static-typing like limits making it less likely for a developer to
accidentally mix and match wrong...(assets)”. In addition they argue it is prudent to record in
the blockchain transaction level time stamps for when it was broadcast to a network for verifica-
tion or processing and a time stamp when this was completed, which a default of empty should
it fail to complete. This allows for rapid verification and audit process for the blockchain to find
non-processed transactions and then to recommit them for processing if they failed.
One of the disadvantages of using a blockchain as a data store in financial settings is that for
the different verifying nodes to be able to agree on the blockchain’s history, they have to store
all of it locally in many blockchain architectures. While replication has benefits in increasing the
resilience of the network against attacks, when the blockchain is predominantly used as a data
store, it becomes more difficult to increase the storage capacity of all nodes as the amount of data
increases.
One solution to this, which maintains the cryptographic security of the data store has been
proposed by MIT and their Enigma project (Zyskind et al. [2015]). This initiative has developed a
decentralized blockchain-like framework utilizing three components: A blockchain, which records a
complete history in append-only fashion, an off-chain distributed hash-table (DHT), which is acces-
sible through the blockchain, and which stores references to the data, but not the data themselves,
and a secure Multi Party Computation (MPC) component. Then any private data is encrypted on
the client-side before storage and access-control protocols are programmed into the blockchain.
14
http://cryptoassetscore.readthedocs.org/en/latest/integrity.html
15
Effectively, through this architecture the Enigma blockchain architecture provides a decentral-
ized computation platform with guaranteed privacy that does not require a trusted third party’s
intervention. It achieves this through the use of secure multi-party computation and it ensures that
data queries are computed in a distributed way, without a trusted third party. The actual data is
partitioned over different nodes in the network, and they each compute functions together without
leaking information to other nodes. Therefore, unlike blockchain approaches such as those created
for Bitcoin, this blockchain has no network member ever having access to data in its entirety and
instead each member has a seemingly meaningless chunk of the overall data. In addition, this lack
of complete replication and reduction in redundancy can provide greater scalability features for the
network and improve the speed. As noted in Zyskind et al. [2015] the ‘key new utility Enigma
brings to the table is the ability to run computations on data, without having access to the raw
data itself’. Clearly, a useful aspect for many financial processing applications of blockchain.
Basically, one can think of attaching Enigma to a particular type of blockchain architecture,
and deploying it to enforce on the blockchain a feature of data integrity and privacy. It will connect
to an existing blockchain and off-load private and intensive computations to an off-chain network.
All transactions are facilitated by the blockchain, which enforces access-control based on digital
signatures and programmable permissions. In this architecture the code to be executed (such as
a smart contract etc) is performed both on the public blockchain and on Enigma for the private
and computationally intensive components. It is argued that in this manner, Enigma can ensure
both privacy and correctness. In addition, one can provide verified proofs of correctness on the
blockchain for auditability purposes.
Unlike blockchain approaches such as those underpinning bitcoin, in which execution in blockchains
is decentralized but not distributed, meaning that every node redundantly executes common code
and maintains a common state, in Enigma, the computational work is efficiently distributed across
the network.
As detailed in Zyskind et al. [2015] the off-chain network they develop in Enigma overcomes
data integrity based issues that blockchain technology alone cannot handle as follows:
• The DHT, which is accessible through the blockchain, stores references to the data but not the
data themselves. Private data is encrypted on the client-side before storage and access-control
protocols are programmed into the blockchain.
16
event of disputes over contract settlements or deliverables etc.; and acting as agents on behalf
of associates or members. The blockchain can provide alternative solutions to fulfil these roles
through the provision of a verifiable public record of all transactions which is distributed and can
be decentralised in its administration.
In thinking about the possibilities of blockchain functionality within the banking sector, there
are a range of different potential avenues to explore that move beyond the typical discussion on
remittance services. Banking systems are large and complex, including a range of features such
as back-end bookkeeping systems, which record customer account details, transaction processing
systems, such as cash machine networks, all the way through to trading and sales, over the counter
trades and interbank money transfer systems. To date, we are however unaware of any papers that
go beyond this high level discussion and detail exactly how and what form blockchain technology
may provide benefit in these aspects in banking settings.
In this work we will aim to provide a greater detail to these possible applications of blockchain
technology. In particular we will discuss things related primarily to a few important unexplored
areas:
• Government cash management the central bank and treasury accounts in particular the Trea-
sure Single Account (TSA) of Pessoa & Williams [2013];
• automated and distributed Over The Counter (OTC) contracts/products and clearing and
settlement;
One of the potential incentives for financial institutions, banks, insurers and banking regulators
for the development of distributed blockchain technologies for these types of applications involves the
reduction of overhead and costs associated with audit and regulation. In addition, more automation
and efficiency in transaction processing, clearing and reconciliation can help to reduce counterparty
credit risks.
Before entering into specific examples, we outline some core features that blockchain approaches
share which can be both beneficial and detrimental. These require careful consideration when
developing the applications to be discussed, as we have seen in previous discussions above on data
integrity preservation.
• Transparency of information presented on the blockchain. Many blockchains being created are
publicly accessible by anyone with an internet connection and is replicated countless times on
participating nodes in the network, though private versions or restricted blockchain networks
are emerging also, as discussed previously. The question is to what extent the application
requires private versus public components. In modern regulatory changes on banking and
financial institutions there are numerous competing constraints which emphasize both the
17
importance of financial disclosure, such as Pillar III of Basel III banking regulations, requiring
financial institutions to demonstrate transparency in their reporting and their relationship
with regulators, and on the other side there are also fiduciary duties that institutions maintain
in upholding data privacy on behalf of their customers. Therefore, alternative approaches to
private versus publick blockchain networks are also being explored where instead the data on
a public ledger may have different levels of data integrity structure protocols which implement
possibilities such as encryption of data stored in blockchains, see project Enigma for example
(Zyskind et al. [2015]).
18
expenditure programs for development of the economy. It also extenuates the debt for such countries
since the available cash for expenditures is laying idle for extended periods in numerous bank
accounts that are fragmented and dispersed over different spending agencies, while in the meantime
the government will be borrowing additional funds and increasing debt in order to mistakenly fund
such projects and execute its budget plans.
As detailed in Pessoa & Williams [2013] if a country’s government has such inefficiencies by
lacking effective control over its cash resources there can be numerous consequences:
• Idle cash balances in bank accounts often fail to earn market-related remuneration.;
• The government, being unaware of these resources, incurs unnecessary borrowing costs on
raising funds to cover a perceived cash shortage.;
• Idle government cash balances in the commercial banking sector are not idle for the banks
themselves, and can be used to extend credit. Draining this extra liquidity through open
market operations also imposes costs on the central bank.
Clearly such inefficiencies can be improved with an automated trusted third party system such as
that offered by some permission style blockchain technologies working as a ledger for such accounts
under the auspice of a TSA structure.
Furthermore, one can argue for the TSA type structure since such a “financial pool” example is a
concept that segregates two important aspects of this process, the separation of the finance function
and the service delivery functions of sector offices and departments of regions, cantons and zones.
We have seen that establishing such a feature in a blockchain would require application of data
integrity functions. In concept such segregation of duties, is important as it allows public bodies
to focus on their core responsibilities whilst financial execution such as control of cash, payments,
accounting, reporting can be handled on their behalf by a pool of professionals or as we propose here,
the automation by a privacy preserving, permissioned, distributed blockchain structure. Clearly in
such a structure, public bodies still define and authorise their budgets and expenditures within
these budgets.
1. Unification of the governments banking structure which will enable the treasury to have
oversight of government cash flows in and out of these bank accounts and fungibility of all cash
resources. Note particularly in a blockchain type extension can include a real-time electronic
banking component and can also be private but remove the need for a single central oversight
component in a government, instead replacing it with a distributed verification system.
2. In traditional TSA structures there would be no other government agency operating bank
accounts outside the oversight of the treasury. In general the design of the TSA and access
to the TSA will depend on the banking structures in place in a given country. In this regard,
there are numerous different blockchain architectures that will be suitable for the blockchain
version of the TSA.
3. All government cash resources, both budgetary and extra-budgetary, should be included in
the consolidated TSA account and the “cash balance in the TSA main account is maintained
at a level sufficient to meet the daily operational requirements of the government (sometimes
together with an optional contingency, or buffer/reserve to meet unexpected fiscal volatility).”
(Pessoa & Williams [2013]). Such features could be automated in blockchain versions of such
19
an account through smart contract structures running on the blockchain TSA ledger. The
minimum accounts that should be included in the TSA should cover all central government
entities and their transactions. These include:
The structure of the TSA ledger should contain accounts which include:
• The treasury account, sometimes know as the TSA central account, which consolidates the
governments cash position.;
• TSA subsidiary accounts, which are netted off with the TSA main account, and which are
typically created for accounting purposes in order aggregate a set of transactions whilst al-
lowing the government to maintain the distinct accounting identity or ledger of its budget
ministries and agencies.;
• Transaction accounts for retail transaction banking operations which facilitate access indi-
rectly to the TSA for different government projects. Typically such accounts are either im-
prest accounts (accounts with a cash balance which is capped) or zero balance meaning that
their cash balances are aggregated back to the TSA main account on a regular schedule, such
as daily. Such zero balance accounts are advantageous as they do not interact with interbank
settlement processes for each transaction, further improving efficiency and access to funds.;
• Transit accounts for flows of cash into and out of the TSA main account.; and
20
There are two main categories for architecture for a TSA banking account which align well
with different architectural decisions for the blockchain version of the TSA, these involve either a
centralized or a distributed architecture. In the centralized structure, all revenue and expenditures
of the government are on a single ledger which is administered by a single trusted third party
such as the central bank, whereas, in the distributed TSA structure there will be a hierarchy of
organizational structures each with their own separate transaction accounts in the banking system,
but still a single TSA account that contains all balances by close of business each day. As detailed in
Pessoa & Williams [2013], the Sweedish TSA structure involves zero balance accounts in the central
bank which are authorised by the minister for finance and available for individual spending agencies.
In this case, money is transferred from the TSA to such accounts for payment of authorised project
expenditures as required. All these accounts are cleared/reconciled with the TSA account daily.
In addition to understanding the network structure and components of the TSA account, there
is also the aspect of revenue collection, remittance, payments and processing under the TSA account
to be discussed and to consider how blockchain technology can facilitate the functioning, automation
and decentralization of such important components. In traditional TSA structures there are two
possibilities as detailed in [Pessoa & Williams, 2013, Section II Part A] where they describe either
centralized transaction processing or decentralized approaches. Under the blockchain version of such
a TSA structure, all transactions processing and remittance could be performed in a decentralized
manner which would not require oversight of a particular trusted third party network member, as
all transaction processing would be automated on the blockchain.
Futhermore, such automation of these processes into the blockchain structure would be more
efficient and less costly than existing practices. Currently the best practice adopted for TSA ac-
count processing is to utilise the commercial banking network. That is, it is common to contract
the commercial banks for revenue collection purposes, these commercial banks transfer revenues
collected to the TSA main account daily (so as to avoid float or need of imprest cash amounts). As
noted in Pessoa & Williams [2013] such a system, though widely utilised, involves a remuneration
system which “...is not transparent and does not clearly indicate the cost of revenue collection ser-
vices provided by banks. The banks use the free float to invest in interest-bearing securities. This
process clearly distorts the TSA structure and concept”.
In this manner one could argue that the blockchain version of the TSA account structure can
further reduce costs associated with remittance services and revenue collection services currently
charged to the government on a fixed contractual basis. It is currently the case that such remittance
services, when provided in a blockchain structure such as in the bitcoin network, can be orders
of magnitude cheaper than those offered by traditional remittance providers in financial services
industries.
21
approach and then discuss some aspects.
A typical banking system has a range of different structures, including the account master file
containing all customers’ current account balances together with previous transactions for a specified
period, such as 90 days.; a number of ledgers in place to track cash and assets through the processing
system; a variety of journals to hold transactions that have been received from a range of different
sources not yet entered in ledgers; and an audit trail which records who did what, when they did
it and where they did it regarding transaction processing. There will also be a suite of processing
software that will operate on this data for overnight batch processing to apply transactions from
journals to various ledgers and account master file updating. In addition, there are audit processes
in place to scrutinize the functioning of all these systems. In automated systems there are different
approaches, one developed in 1987 and widely adopted is the Clarke-Wilson Security Policy Model,
see details in Clark & Wilson [1987] and the brief description made above in the section on data
integrity. Such an approach sets out how the data items in the system should be kept valid from
one state of the system to the next and specifies the capabilities of various principals in the system.
In addition to the component structures in the banking ledgers, there are also processes to
understand in how these ledgers are utilised. Therefore, to understand the ledger process better
we must first recall some basics of the financial reporting cycle. In the case of the financial cycle,
the accounting system records two economic events: the acquisition of capital from creditors and
owners and the use of that capital to acquire property to generate revenue. This cycle performs
also a third function - the financial reporting function.
We first note that the word ‘ledger’ refers to a book or set of records. In general, when work-
ing towards construction of the banking ledger, initially all transactions are recorded in what are
known as the books/ledgers of prime entry. These are records of the transaction, the relevant
customer/supplier and the amount of the transaction, which is essentially a daily list of transac-
tions. There are a range of different prime entry books which typically consist of different types of
transactions:
• Sales returns day book which records returns of goods sold on credit;
• Purchase returns day book which records goods returned bought on credit;
• Petty cash book which records all small cash transactions; and the
In general, the prime entry books/ledgers serve to ‘capture’ transactions as soon as possible so
that they are not subsequently lost or forgotten about. The cash book and the petty cash book
are part of the double entry system and record cash coming in and going out. Note, double entry
accounting systems are just those that record transactions in two different separate books, as a
credit in one and a debit in the other. However, the day books and journal are not part of the
double entry system, and entries are made from there to the ledgers. Then all these prime entry
books are summarised and the total of the daily transactions is recorded in the accounting ledgers
of the company, which is done in the standard ‘double entry’ format.
After the prime entry books/ledgers there are other key elements of the double entry system in
financial accounting. This system consists of the three basic components: the general ledger, the
cash book and the petty cash book. In addition, there are the receivables and payables ledgers to
22
be considered which provide details of the total receivables and payables that are recorded in the
nominal ledger.
The general or nominal ledger is responsible for the recording of all accounts such as wages,
sales, purchases, electricity, travel, advertising, rent, insurance, repairs, receivables, payables and
non-current assets. In addition, one typically in principle considers the cash and bank accounts as
forming part of this ledger, however they are typically physically recorded in a separate book since
the number of such transactions is usually very large for some businesses.
The total amounts owed to suppliers and to whom it is owed is recorded in the payables ledger.
Typically, there would be a separate account maintained in the ledger for each individual supplier.
Generally, the aggregate total of the outstanding amounts owed in the payable ledger should recon-
cile with the payables balance in the general ledger. Conversely, to record the total amount owed to
the business by customers there is the analogous ledger often called the receivables book. It provides
details of exactly what is owed and from whom, as with the payables ledger, it is common practice
to have a separate account for each customer. Again, there should be a reconciliation between the
total amounts owing in the receivables ledger and the receivables balance in the general ledger.
In the context of a banking financial institution, there is a primary concern regarding the debt
and equity capital records. These are the sources of such an organizations capital which includes
its creditors and owners. Such institutions typically distinguish three forms of capital transactions:
1. Bank Loans which are reported in the Notes Payable account and are to be utilised for short,
medium or long term financing and typically asset backed. The Notes Payable Ledgers record
outstanding notes and include aspects such as the identifier for the note, its holder, its maturity
and current interest rate, and the original and current balance.
2. Bond Issuances are summarized in the Bonds Payable balance sheet item and specific details
of each issuance are detailed in a journal entry record for each with individual separate long-
term liability accounts. Such issuances allow financial institutions to obtain medium and long
term capital, but they create a contractual obligation to pay a fixed amount of interest at
specified intervals in the future.
3. Stock Issues are recorded as par or stated value for issued shares in Common Stock and
Preferred Stock account ledger. Typically, a corporation will use different Capital Stock
accounts for each class of stock.
Apart from the debt and equity capital recording ledgers, there are also other key ledgers to
consider such as the Property and Systems records. These keep track of all depreciating property,
plant and equipment. Typically it would involve the recording of three primary types of transactions
which include:
1. Acquisition of property where an institution would use buildings and equipment to generate
revenue;
3. Disposition of property.
To complete the third key component of financial reporting systems we also mention the basic
idea of the Journal Entry and Financial Reporting Systems where insitutions are able to record
transaction in the general ledger using three types of accounting entries that summarize ‘High-
Volume’ transactions such as sales and purchases, ‘Low-Volume’ transactions such as changes in
debt and equity capital in order to remove depreciating property etc., and closing entries.
In the standard ledger systems described above different governance structures may be put in
place to resolve potential accounting malpractice and fraud from arising. This is typically achieved
23
by separating responsibilities for the double entry process, otherwise known as dual control systems
or decentralized responsibility. These are typically enactments of different data integrity processes
as described previously.
We note that with the development of blockchain ledger technologies and smart contracts, many
of these processes and ledgers/accounting books just described which make up the financial ac-
counting system can be automated through a blockchain structure. Such blockchains could take
many forms, they could be either distributed within an organisation or even available as a public
ledger (perhaps with some form of encryption for private data) that is shared between institutions,
regulators and government agencies undertaking oversight, taxation etc.
In developing blockchain ledgers, one will need to consider how often to consider constructing
hash entries, i.e. how often to aggregate data together before adding a hash entry to the blockchain
ledger, as described in the previous overview section. In the context of banking ledgers, this will
probably depend on the types of data being placed on the ledger, for instance, one may consider
such data as divided into the following components. Transaction data is one source of data that
must be considered, it is the records of information about each transaction and it is expected
to change regularly as transactions progress and are completed. Other less frequent data includes
aspects of standing or reference or meta data which is typically for all practical purposes permanent
and includes names and addresses, descriptions and prices of products. We would suggest that the
blockchain hashing for such financial records and ledger creation should follow a combination of
both batch processing and in some applications real-time processing.
There are a few developments of second generation blockchain ledgers being developed for such
banking ledger processing. For instance Balanc317 is a new blockchain technology being developed
based on smart contracts and a blockchain architecture with the purpose of performing acounting
ledger processing, in this case as a triple entry system, rather than the double entry systems de-
scribed above. It is argued that the non-repudiability and comprehensive audibility of the blockchain
can be utilised to guarantee the integrity of accounting records. The blockchain architecture in this
case utilises a range of different products for data integrity and security, they include EtherSign
combined with an IPFS decentralized data storage platform and smart contracts enacted through
Ethereum blockchain. In this way this account ledger is able to construct, store, manage, and
digitally sign documents. The admissible documents in this system include features such as self-
enforcing smart contracts like employment contracts or invoices, or traditional text agreements.
Invoicing through smart contracts automatically processes and records payments.
Before exploring other applications of blockchain, it is worth to observe that the immutability of
the blockchain record when automated for transactions must be carefully considered in some cases.
For instance, the issue of loss provisioning in the ledger of a banking institution must be carefully
considered. We briefly comment on this below.
24
• Classification and measurement. Any blockchain based ledger for banking settings must ensure
that its recording and processing of losses in the ledger are compliant with the IFRS 9 standard
classifications. These classifications determine how financial assets and financial liabilities are
accounted for in financial statements and importantly how they are measured on an ongoing
basis. This is particularly relevant in some blockchain architectures in which immutability
would not allow reversal of misclassifications. Under the IFRS 9 framework, there is a logical
classification structure for all financial assets which is driven by cash flow characteristics and
the business model in which an asset is held. Under such a framework, it standardizes the
management and reporting of such items in banking ledgers in a simplified fashion compared
to those of the previous rule-based requirements that are complex and difficult to apply,
and more importantly, complicated to automate into smart contract transformations on a
blockchain banking ledger.
IFRS 9 applies one classification approach for all types of financial assets, including those that
contain embedded derivative features, making the design of smart contracts based on such classi-
fications much more streamlined and simpler to automate. Under IFRS 9, one has four possible
classification categories for financial assets, which are now classified in their entirety rather than
being subject to complex bifurcation requirements, again making things much more streamlined for
smart contract based automations. The classification process can be potentially automated via a
smart contract structure, see page 7 process model for such classification automation 19 .
In addition, the smart contract implementation would need to be developed under IFRS 9 com-
pliance to apply two criteria to determine how financial assets should be classified and measured:
the entity’s business model for managing the financial assets; and the contractual cash flow charac-
teristics of the financial asset. It should be noted that unless an asset being classified meets both
test requirements, then it will be recorded on the blockchain banking ledger in terms of fair value
reporting in the profit and loss. If the asset passes the contractual cash flows test, the business
model assessment determines how the instrument is classified. For instance, if the instrument is be-
ing held to collect contractual cash flows only then it is classified as amortized cost. However, if the
instrument is to both collect contractual cash flows and potentially sell the asset, it is reported at
fair value through other comprehensive income (FVOCI). Further background on the requirements
of the IFRS 9 provisioning standards that blockchain ledgers and processing must adhere to can be
found at IASB documents, http://www.ifrs.org.
In addition to the role of blockchain in banking ledgers, blockchain and smart contracts may
also be utilised for other roles, such as the clearing and settlement processes. We briefly outline the
19
http://www.ifrs.org/current-projects/iasb-projects/financial-instruments-a-replacement-of-ias-39-fin
documents/ifrs-9-project-summary-july-2014.pdf
25
role of settlement processes in the following section.
• Trade valuation;
• Credit monitoring;
• Position management;
• Member reporting;
• Risk management;
• Collateral management;
• Tax handling;
• Failure handling.
The actual exchange of the money and securities is termed settlement, and completes the cycle -
this is typically 2 or 3 days after trade execution and can involve the services of institutions, such as
custodians, transfer agents, and others (Bliss & Steigerwald [2006]). In a typical trading-clearing-
settlement cycle, the following actors are involved:
– The clearing members, who have access to the clearing house in order to settle trades.
These firms are also trading members, and thus settle their own trades, but non-clearing
trading members have to settle through them.
– The clearing house / CCP, which stands between two clearing members.
20
Source: Risk management issues in central counterparty series, presentation by Priyanka Malhotra at the Sys-
temic Risk Centre at LSE.
26
• On the settlement side
– The two custodians, who are responsible for safeguarding the investors’ assets. This role
may also be played by a Central Securities Depository (CSD)
– The settlement system.
Clearing and settlement can be bilateral, i.e. settled by the parties to each contract. This
of course entails that risk management practices, such as collateralisation, are also dealt with
bilaterally (Bliss & Steigerwald [2006]). A large number of OTC (over-the-counter) derivatives used
to be settled in this way, until recent efforts by the G20 resulted in regulation to impose central
clearing 21 .
In central clearing, a third actor acts as a counterparty for the two parties in the contract and
is termed the central counterparty (CCP). This simplifies the risk management process, as firms
now have a single counterparty to their transactions. Through a process termed novation, the CCP
enters into bilateral contracts with the two counterparties, and these contract essentially replace
what would have been a single contract in the bilateral clearing case. This also leads to some
contract standardisation. In addition, there is a general reduction in the capital required, due to
multilateral netting of cash and fungible securities. Duffie & Zhu [2011] discusses the effects of
introducing a CCP for a particular class of derivatives. Examples of securities that are centrally
cleared include equities, commodities, bonds, swaps, repos etc.
There are two main risks that are exacerbated by a longer settlement cycle:
• Counterparty risk between trade execution and settlement, and associated margin require-
ments. Because of these risks, clearing members are required to maintain capital with the
CCP. One can see that faster execution times would minimise this risk, and thus minimise
these capital requirements. As an example of this reduction, note that a ‘move from T+3
to T+2 implies a 15% and 24% reduction in the average Clearing Fund amount, during the
typical and high volatility periods, respectively’22 .
• Settlement risk, or ‘the risk that one leg of the transaction may be completed but not the
other’(Bliss & Steigerwald [2006]). Certain payment methods have been proposed to combat
this issue, but it is obvious that a shorter settlement cycle would mitigate this further.
The two main types of settlement instructions are Delivery vs Payment (DvP) and Free of
Payment (FoP), also termed Delivery vs Free 23 . The former ensures that delivery of the assets will
only occur if the associated payment occurs. The latter method is simply a free delivery of assets,
i.e. it is not associated with a payment, which occurs in a separate transaction. This obviously
introduces a risk of non-payment by the buyer.
We next describe the possible blockchain structures that could be used to mitigate risks and
increase efficiency.
27
• At the financial exchange / multilateral trading facility level. For example, a consortium of
brokers can set up a distributed exchange, where each of them operate a node to validate
transactions. The investors still trade through a broker (due to naked access regulations), but
the exchange fees can be drastically reduced.
• At the clearing level. A consortium of clearing members can set up a distributed clearing
house, thus eliminating the need for a CCP. Clearing then becomes closer to bilateral clearing,
with the difference that the contract stipulations are administered through a smart contract,
and thus there is less scope for risk management issues.
A concrete example of how the entire lifecycle of a trade would look like is as follows: A buyer
submits an order to buy a particular amount of an asset, for which there is an equivalent selling
interest, through his broker. The buyer’s and seller’s brokers then create a transaction for the
transfer of that amount of the asset, which is then transmitted to the distributed exchange network
and verified. Once a block of transactions is verified, it is transmitted to the decentralised clearing
house, where a new transaction is created, involving the brokers’ clearing members. Once this
transaction is verified in the clearing house blockchain, it is then transmitted to the settlement
system, where a new transaction is created involving the custodians or CSDs, and the transfer of
assets occurs automatically once this transaction is confirmed.
Such a configuration would firstly increase the speed of the entire settlement cycle from days to
minutes or even seconds, where we would essentially have continuous settlement. There are a number
of industry initiatives already in the digital asset transfer and settlement space, and we mention
indicatively R3 CEV24 , Digital asset holdings25 , Symbiont26 , Chain27 and SETL28 . HitFin29 has
proposed an alternative approach from the one described here, where trades are cleared bilaterally on
a private blockchain, in less than 17 seconds. Besides the fast transaction settlement and automatic
settlement of contracts upon maturity, all reporting, compliance and collateral management can be
handled through the blockchain, thus reducing backoffice coss.
28
Figure 1: Clearing in a centralised and decentralised ledger. Image source: The Fintech 2.0 Pa-
per: rebooting financial services, available at http://www.finextra.com/finextra-downloads/
newsdocs/The%20Fintech%202%200%20Paper.PDF. In this instance, the blockchain version of clear-
ing is a complete decentralisation where the roles of the exchange, the clearing house and the set-
tlement system are no longer separated since they are combined into a single distributed blockchain
architecture. However, once could argue that for reasons governance it may be more appropriate
to consider intermediate architectures for blockchain decentralisation that still incorporates these
separations of roles, such as the ones discussed in this section.
29
Bitcoin payment services are only of the order of 0.01%-0.05%, largely due to the lower cost of not
needing to process or perform disputes in transactions. However, for more general applications,
this lack of reversibility can be problematic, see discussions in Buterin [2014a]. Certainly, in many
blockchain technology applications it may be beneficial to have an ability to make modifications or
amendments to disputed transactions.
Ideas to achieve this have begun to be explored in settings of blockchain technology such as
for payment or contract transfers involving multiple signatories via an Escrow service. An Escrow
service will provide an opportunity to perform a dispute resolution between two transactions in the
following manner. The two transacting parties identify a trusted intermediary party (Escrow service)
who then provides them each with an electronic “address” and maintains a private crytpographic
key to control this address. Then to perform the transactions, agent A sends the information/e-
property/e-money to a 2-of-3 multi-signature address. The addresses involved are those of the
other party (agent B), the agent (A) and the Escrow service provider, then one has three possible
outcomes to consider:
• The agent A may receive the information/e-property/e-money as agreed and in return they
verify a transaction that releases the renumeration or alert of receipt to agent B through the
2-of-3 multisignature address to the Escrow agents address. The Escrow agent then signs the
2-of-3 multisignature address with their own key and publishes it on the blockchain.;
• If there is a problem with the contractual obligations agreed from agent A’s perspective and
agent B agrees with this, then agent B would sign the 2-of-3 multisignature address and send
appropriate renumeration to agent A’s address. Then Agent A upon receipt of this signs the
2-of-3 multisignature address and publishes it on the blockchain.
• If there is a dispute between agent A and agent B as to the contractual agreements and
who should be renumerated, then the Escrow service provides an intervention. Here the
Escrow service decides the outcome of the funds by signing the 2-of-3 multisignature address
renumerating the appropriate party and then the party receiving renumeration signs the 2-
of-3 multisignature address and publishes this on the blockchain. Note, in this third case the
Escrow service would typically charge a fee.
We believe such approaches can be more widely abopted in blockchain technologies via automated
smart contract structures.
7 Conclusions
This chapter has served to first highlight some of the recent innovations in the space of blockchain
technologies. It has outlined some important aspects of blockchain architectures and their common-
ality and distinguishing features from different types of database structures. It has then described
a number of features that are vital from a financial application perspective, including permission-
ing, data integrity, data security and data authenticity as well as important regulatory require-
ments relating to account provisioning for financial asset reporting, and the blockchain aspects
that can help adhere to these. Then several innovative new areas of development for second gen-
eration blockchain techonologies are detailed, including central bank treasury ledgers, retail and
investment bank ledgers, trading, settlement and clearing processes, finishing with a discussion on
multi-signature Escrow services. Like all prior disruptive technologies there will be beneficial and
detrimental aspects of blockchain technologies that will need to be carefully considered prior to
development and commercialisation of the ideas presented in this chapter. However, we believe
that with the onset of the internet of money, the blockchain revolution will play an integral part in
this brave new world.
30
References
Barber, Simon, Boyen, Xavier, Shi, Elaine, & Uzun, Ersin. 2012. Bitter to betterhow to make
bitcoin a better currency. Pages 399–414 of: Financial cryptography and data security. Springer.
Bell, D Elliott, & LaPadula, Leonard J. 1973. Secure computer systems: Mathematical foundations.
Tech. rept. DTIC Document.
Benkler, Yochai. 2006. The wealth of networks: How social production transforms markets and
freedom. Yale University Press.
Biba, Kenneth J. 1977. Integrity considerations for secure computer systems. Tech. rept. DTIC
Document.
Bliss, Robert R, & Steigerwald, Robert S. 2006. Derivatives clearing and settlement: A comparison
of central counterparties and alternative structures. Economic Perspectives, 30(4).
Buterin, Vitalik. 2014a. Multisig: The Future of Bitcoin.
Buterin, Vitalik. 2014b. A next-generation smart contract and decentralized application platform.
White Paper.
Carter, J Lawrence, & Wegman, Mark N. 1977. Universal classes of hash functions. Pages 106–112
of: Proceedings of the ninth annual ACM symposium on Theory of computing. ACM.
Clark, David D, & Wilson, David R. 1987. A comparison of commercial and military computer
security policies. Pages 184–184 of: Security and Privacy, 1987 IEEE Symposium on. IEEE.
Coron, Jean-Sébastien, Dodis, Yevgeniy, Malinaud, Cécile, & Puniya, Prashant. 2005. Merkle-
Damgård revisited: How to construct a hash function. Pages 430–448 of: Advances in Cryptology–
CRYPTO 2005. Springer.
Czepluch, Jacob Stenum, Lollike, Nikolaj Zangenberg, & Malone, Simon Oliver. 2015. The Use of
Block Chain Technology in Different Application Domains.
Damgård, Ivan Bjerre. 1990. A design principle for hash functions. Pages 416–427 of: Advances in
CryptologyCRYPTO89 Proceedings. Springer.
Denning, Dorothy E. 1976. A lattice model of secure information flow. Communications of the
ACM, 19(5), 236–243.
Devanbu, Premkumar, Gertz, Michael, Martel, Charles, & Stubblebine, Stuart G. 2001. Authentic
third-party data publication. Pages 101–112 of: Data and Application Security. Springer.
Douceur, John R. 2002. The sybil attack. Pages 251–260 of: Peer-to-peer Systems. Springer.
Duffie, Darrell, & Zhu, Haoxiang. 2011. Does a central clearing counterparty reduce counterparty
risk? Review of Asset Pricing Studies, 1(1), 74–95.
Elmasri, Ramez, & Navathe, Shamkant B. 2014. Fundamentals of database systems. Pearson.
Franco, Pedro. 2014. Understanding Bitcoin: Cryptography, Engineering and Economics. John
Wiley & Sons.
Ge, Xiaocheng, Polack, Fiona, & Laleau, Régine. 2004. Secure databases: an analysis of Clark-
Wilson model in a database environment. Pages 234–247 of: Advanced Information Systems
Engineering. Springer.
31
Gilbert, Henri, & Handschuh, Helena. 2004. Security analysis of SHA-256 and sisters. Pages 175–193
of: Selected areas in cryptography. Springer.
Halevi, Shai, Harnik, Danny, Pinkas, Benny, & Shulman-Peleg, Alexandra. 2011. Proofs of owner-
ship in remote storage systems. Pages 491–500 of: Proceedings of the 18th ACM conference on
Computer and communications security. ACM.
Kosba, Ahmed, Miller, Andrew, Shi, Elaine, Wen, Zikai, & Papamanthou, Charalampos. 2015.
Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. Tech. rept.
Cryptology ePrint Archive, Report 2015/675, 2015. http://eprint. iacr. org.
Lamport, Leslie, Shostak, Robert, & Pease, Marshall. 1982. The Byzantine generals problem. ACM
Transactions on Programming Languages and Systems (TOPLAS), 4(3), 382–401.
Matusiewicz, Krystian, Pieprzyk, Josef, Pramstaller, Norbert, Rechberger, Christian, Rijmen, Vin-
cent, et al. . 2005. Analysis of simplified variants of SHA-256. WEWoRC, 74, 123–134.
Merkle, Ralph C. 1980. Protocols for public key cryptosystems. Page 122 of: null. IEEE.
Merkle, Ralph Charles. 1979. Secrecy, authentication, and public key systems.
National Institute of Standards and Technology. 2002. Secure Hash Standard (SHS). FIPS 180-2.
Pessoa, Mario, & Williams, Michael J. 2013. Government Cash Management: Relationship between
the Treasury and the Central Bank. International Monetary Fund.
Peters, Gareth W, Panayi, Efstathios, & Chapelle, Ariane. 2015. Trends in crypto-currencies
and blockchain technologies: A monetary theory and regulation perspective. arXiv preprint
arXiv:1508.04364.
Peters, Gareth William, Chapelle, Ariane, & Panayi, Efstathios. 2014. Opening discussion on
banking sector risk exposures and vulnerabilities from virtual currencies: An operational risk
perspective. Available at SSRN 2491991.
Redmond, Eric, & Wilson, Jim R. 2012. Seven databases in seven weeks: a guide to modern
databases and the NoSQL movement. Pragmatic Bookshelf.
Reid, Fergal, & Harrigan, Martin. 2013. An analysis of anonymity in the bitcoin system. Springer.
Sandhu, Ravi S. 1993. Lattice-based access control models. Computer, 26(11), 9–19.
Swan, Melanie. 2015. Blockchain: Blueprint for a New Economy. ” O’Reilly Media, Inc.”.
Szabo, Nick. 1997. Formalizing and securing relationships on public networks. First Monday, 2(9).
Tripunitara, Mahesh V, & Li, Ninghui. 2013. The foundational work of Harrison-Ruzzo-Ullman
revisited. Dependable and Secure Computing, IEEE Transactions on, 10(1), 28–39.
32
Yaker, Israel Fainboim, & Pattanayak, Sailendra. 2012. Treasury Single Account: An Essential Tool
for Government Cash Management. International Monetary Fund.
Zyskind, Guy, Nathan, Oz, & Pentland, Alex. 2015. Enigma: Decentralized Computation Platform
with Guaranteed Privacy. arXiv preprint arXiv:1506.03471.
33