Abstract
Since the introduction of Bitcoin in 2009 and its immense resonance in media, we have seen a plethora of envisioned blockchain solutions. Usually, such blockchain solutions claim to be disruptive. Often, such disruptiveness takes the form of a proclaimed blockchain revolution. In this paper, we want to look at blockchain technology from a neutral, analytical perspective. Our aim is to understand technological and socio-economic barriers to blockchain solutions that are intrinsic in the blockchain technology stack itself. We look into the permissionless blockchain as well as the permissioned blockchain. We start with a characterization of cryptocurrency as one-tiered uncollateralized M1 money. We proceed with defining essential modes of business communications (message authentication, signature, registered letter, contract, order etc.) and how they are digitized classically. We review potential blockchain solutions for these modes of communications, including socio-economic considerations. At the technical level, we discuss scalability issues and potential denial-of-service attacks. On the other hand, we also look into four successful blockchain solutions and explain their design. Now: what is the blockchain revolution and how realistic is it? Will it shake up of our institutions? Or, vice versa: does it have to rely on a re-design of our institutions instead? Can we design useful blockchain solutions independent of fundamental institutional re-design? It is such questions which have motivated us to compile this paper and we hope that we are able to bring some light to them.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008). https://bitcoin.org/bitcoin.pdf
Williamson, O.: Transaction cost economics: how it works; where it is headed. De Econ. 146, 23–58 (1998)
Koppenjan, J., Groenewegen, J.: Institutional design for complex technological systems. Int. J. Technol. Policy Manag. 5(3), 240–257 (2005)
Campbell-Verduyn, M. (ed.): Bitcoin and Beyond: Cryptocurrencies. Blockchains and Global Governance. Routledge, Abingdon (2017)
Narayanan, A., Clark, J.: Bitcoin’s academic pedigree. Commun. ACM 60(12), 36–45 (2017)
Mendling, J., Weber, I., van der Aalst, W., et al.: Blockchains for business process management - challenges and opportunities. ACM Trans. Manag. Inf. Syst. 9(1), 1–16 (2018)
Rikken, O., Janssen, M., Kwee, Z.: Governance challenges of blockchain and decentralized autonomous organizations. Inf. Polity 24(4), 397–417 (2019)
Janssen, M., Weerakkody, V., Ismagilova, E., Sivarajah, U., Irani, Z.: A framework for analysing blockchain technology adoption: integrating institutional, market and technical factors. Int. J. Inf. Manag. 50, 302–309 (2020)
Upadhyay, N.: Demystifying blockchain: a critical analysis of challenges, applications and opportunities. Int. J. Inf. Manag. 54, 1–26 (2020)
Voshmgir, S.: Token Economy - How the Web3 reinvents the Internet, 2nd edn. BlockchainHub Berlin, Berlin (2020)
Antonopoulos, A.M.: Mastering Bitcoin: Programming the Open Blockchain. O’Reilly, Sebastopol (2017)
Hughes, E.: A cypherpunk’s manifesto. In: Schneier, B., Banisar, D. (eds.) The Electronic Privacy Papers: Documents on the Battle for Privacy in the Age of Surveillance, pp. 285–287. Wiley, Hoboken (1997)
DuPont, Q.: Experiments in algorithmic governance: a history and ethnography of “The DAO,” a failed decentralized autonomous organization. In: Campbell-Verduyn, M. (ed.) Bitcoin and Beyond: Cryptocurrencies, Blockchains and Global Governance, pp. 1–18. Routledge (2017)
Hammer, M., Champy, J.: Reengineering the Corporation. HarperCollins, New York (1993)
Schein, E.H.: Organizational Culture and Leadership. Wiley, Hoboken (2016)
Lips, S., Aas, K., Pappel, I., Draheim, D.: Designing an effective long-term identity management strategy for a mature e-state. In: Kő, A., Francesconi, E., Anderst-Kotsis, G., Tjoa, A.M., Khalil, I. (eds.) EGOVIS 2019. LNCS, vol. 11709, pp. 221–234. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-27523-5_16
Pappel, I., Pappel, I., Tepandi, J., Draheim, D.: Systematic digital signing in Estonian e-government processes - influencing factors, technologies, change management. Trans. Large Scale Data Knowl. Cent. Syst. 16 (2017)
Tsap, V., Pappel, I., Draheim, D.: Key success factors in introducing national e-identification systems. In: Dang, T.K., Wagner, R., Küng, J., Thoai, N., Takizawa, M., Neuhold, E.J. (eds.) FDSE 2017. LNCS, vol. 10646, pp. 455–471. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-70004-5_33
Emmelhainz, M.A.: EDI: A Total Management Guide. Van Nostrand Reinhold, New York (1993)
Martinson, P.: Estonia – The Digital Republic Secured by Blockchain. PricewaterhouseCoopers, London (2019)
Bayer, D., Haber, S., Stornetta, W.S.: Improving the efficiency and reliability of digital time-stamping. In: Capocelli, R., De Santis, A., Vaccaro, U. (eds.) Sequences II, pp. 329–334. Springer, New York (1993). https://doi.org/10.1007/978-1-4613-9323-8_24
Merkle, R.: Protocols for public key cryptosystems. In: Proceedings of the 1st IEEE Symposium on Security and Privacy, S&P 1980, p. 122 (1980)
Buldas, A., Saarepera, M.: Document verification with distributed calendar infrastructure. US Patent Application Publication No.: US 2013/0276058 A1 (2013)
Buldas, A., Kroonmaa, A., Laanoja, R.: Keyless signatures’ infrastructure: how to build global distributed hash-trees. In: Riis Nielson, H., Gollmann, D. (eds.) NordSec 2013. LNCS, vol. 8208, pp. 313–320. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-41488-6_21
Mota, C.: The rise of personal fabrication. In: Proceedings of the the 8th ACM Conference on Creativity and Cognition, C&C 2011, pp. 279–288. ACM (2011)
Tao, F., Cheng, Y., Zhang, L., Nee, A.Y.C.: Advanced manufacturing systems: socialization characteristics and trends. J. Intell. Manuf. 28(5), 1079–1094 (2015). https://doi.org/10.1007/s10845-015-1042-8
Vedeshin, A., Dogru, J.M.U., Liiv, I., Draheim, D., Ben Yahia, S.: A digital ecosystem for personal manufacturing: an architecture for a cloud-based distributed manufacturing operating system. In: Proceedings of the 11th International Conference on Management of Digital EcoSystems, MEDES 2019, pp. 224–228. ACM (2019)
Vedeshin, A., Dogru, J.M., Liiv, I., Ben Yahia, S., Draheim, D.: A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method. IEEE Access 8, 40039–40056 (2019)
Vedeshin, A., Dogru, J.M.U., Liiv, I., Yahia, S.B., Draheim, D.: Smart cyber-physical system for pattern recognition of illegal 3D designs in 3D printing. In: Hamlich, M., Bellatreche, L., Mondal, A., Ordonez, C. (eds.) SADASC 2020. CCIS, vol. 1207, pp. 74–85. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-45183-7_6
Brian Heater: Zap brings the manufacturing process to the cloud (2016). https://techcrunch.com/2016/09/12/zap/
Isbjörnssund, K., Vedeshin, A.: Secure streaming method in a numerically controlled manufacturing system, and a secure numerically controlled manufacturing system. U.S. Patent 2014111587 A3, 3 December 2015
3D Control Systems Inc.: 3DPrinterOS cloud world statistics (2020). https://cloud.3dprinteros.com/dashboard/#/world-statistics
Androulaki, E., Barger, A., Bortnikov, V., et al.: Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the 13th European Conference on Computer Systems, EuroSys 2018, pp. 1–15. ACM (2018)
FinancesOnline: 47 Essential e-Signature Statistics: 2020 Market Share Analysis & Data (2020). https://financesonline.com/25-essential-e-signature-statistics-analysis-of-trends-data-and-market-share/
Everis: Study on the Use of Electronic Identification (eID) for the European Citizens’ Initiative. Final Assessment Report. Everis, European Commission (2017)
Tsap, V., Pappel, I., Draheim, D.: Factors affecting e-ID public acceptance: a literature review. In: Kő, A., Francesconi, E., Anderst-Kotsis, G., Tjoa, A.M., Khalil, I. (eds.) EGOVIS 2019. LNCS, vol. 11709, pp. 176–188. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-27523-5_13
Cavallini, S., Bisogni, F., Gallozzi, D., Cozza, C., Aglietti, C.: Study on the supply-side of EU e-signature market: Final Study Report. Fondazione FORMIT, European Commission, Directorate-General Information Society and Media of the European Commission (2012)
Alzahrani, L., Al-Karaghouli, W., Weerakkody, V.: Analysing the critical factors influencing trust in e-government adoption from citizens’ perspective: a systematic review and a conceptual framework. Int. Bus. Rev. 26(1), 164–175 (2017)
Carter, L., Liu, D.: Technology humanness, trust and e-government adoption. In: Proceedings of the 18th Australasian Conference on Information Systems, ACIS 2018. Association for Information Systems (2018)
Agrello: Agrello ID - Identity based digital signatures (2020). https://www.agrello.id
Liu, Yu., Liu, T.: A novel threshold signature scheme based on elliptic curve with designated verifier. In: Sun, X., Pan, Z., Bertino, E. (eds.) ICAIS 2019. LNCS, vol. 11635, pp. 332–342. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-24268-8_31
The EU Parliament and the Council of the Eurpean Comission: Regulation (EU) No 910/2014 of the European Parliament and of the Council of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999/93/EC. Official Journal of the European Union L 257/73 (2014)
Wood, G., et al.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum Proj. Yellow Pap. 151, 1–32 (2014)
Veriff: Veriff - identity verification done in seconds (2020). https://www.veriff.com. Accessed 05 Sept 2020
Thinnect: Thinnect - IoT Edge of Network Service Provider (2020). https://www.thinnect.com
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Buldas, A., Draheim, D., Nagumo, T., Vedeshin, A. (2020). Blockchain Technology: Intrinsic Technological and Socio-Economic Barriers. In: Dang, T.K., Küng, J., Takizawa, M., Chung, T.M. (eds) Future Data and Security Engineering. FDSE 2020. Lecture Notes in Computer Science(), vol 12466. Springer, Cham. https://doi.org/10.1007/978-3-030-63924-2_1
Download citation
DOI: https://doi.org/10.1007/978-3-030-63924-2_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-63923-5
Online ISBN: 978-3-030-63924-2
eBook Packages: Computer ScienceComputer Science (R0)