Skip to main content Accessibility help
×
Hostname: page-component-cd9895bd7-jkksz Total loading time: 0 Render date: 2024-12-26T23:10:22.893Z Has data issue: false hasContentIssue false

3 - Blockchains

The Foundation

from Part II - Technological Underpinnings of Web3

Published online by Cambridge University Press:  21 November 2024

Ken Huang
Affiliation:
DistributedApps.ai
Youwei Yang
Affiliation:
Bit Mining Limited
Fan Zhang
Affiliation:
Yale University, Connecticut
Xi Chen
Affiliation:
New York University
Feng Zhu
Affiliation:
Harvard Business School
Get access

Summary

Chapter 3 provides a comprehensive overview of the foundational blockchain technology stack. It begins by examining the consensus layer, which enables a decentralized network to agree on the state of a shared ledger. The consensus layer is highlighted as the core foundation, with a deep dive into the breakthrough Nakamoto consensus protocol. Nakamoto consensus leverages proof of work for leader election and the longest-chain rule for transaction confirmation to achieve decentralized consensus in permissionless settings. The chapter then explores the computer layer, which defines the blockchain’s computational model, and the application layer where decentralized apps are built. It uses Bitcoin and Ethereum as examples to demonstrate how these layers work together in real-world systems. Bitcoin implements a simple UTXO model and scripting language, while Ethereum provides a Turing complete virtual machine. Finally, the chapter discusses elements such as wallets and RPC services involved in the user-facing experience. Overall, the chapter provides a comprehensive technical grounding across all layers of blockchain systems.

Type
Chapter
Information
Web3
Blockchain, the New Economy, and the Self-Sovereign Internet
, pp. 73 - 94
Publisher: Cambridge University Press
Print publication year: 2024

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Buterin, Vitalik, Hernandez, Diego, Kamphefner, Thor, Pham, Khiem, Qiao, Zhi, Ryan, Danny, Sin, Juhyeok, Wang, Ying, and Zhang, Yan X.. 2020. “Combining GHOST and Casper.” arXiv. https://doi.org/10.48550/arXiv.2003.03052.CrossRefGoogle Scholar
Castro, Miguel, and Barbara Liskov, . 2002. “Practical Byzantine Fault Tolerance and Proactive Recovery.” ACM Transactions on Computer Systems 20 (4): 398461. https://doi.org/10.1145/571637.571640.CrossRefGoogle Scholar
Croman, Kyle, Decker, Christian, Eyal, Ittay, Gencer, Adem Efe, Juels, Ari, Kosba, Ahmed, Miller, Andrew, et al. 2016. “On Scaling Decentralized Blockchains.” In Financial Cryptography and Data Security, edited by Clark, Jeremy, Meiklejohn, Sarah, Ryan, Peter Y.A., Wallach, Dan, Brenner, Michael, and Rohloff, Kurt, 106125. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer. https://doi.org/10.1007/9783662533574_8.CrossRefGoogle Scholar
Daian, Phil, Pass, Rafael, and Shi, Elaine. 2019. “Snow White: Robustly Reconfigurable Consensus and Applications to Provably Secure Proof of Stake.” In Financial Cryptography and Data Security, edited by Goldberg, Ian and Moore, Tyler, 2341. Lecture Notes in Computer Science. Cham: Springer International Publishing. https://doi.org/10.1007/9783030321017_2.CrossRefGoogle Scholar
Dwork, Cynthia, Nancy Lynch, , and Larry Stockmeyer, . 1988. “Consensus in the Presence of Partial Synchrony.” Journal of the ACM 35 (2): 288323. https://doi.org/10.1145/42282.42283.CrossRefGoogle Scholar
Dwork, Cynthia, and Naor, Moni. 1993. “Pricing via Processing or Combatting Junk Mail.” In Advances in Cryptology – CRYPTO’ 92, edited by Brickell, Ernest F., 139147. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer. https://doi.org/10.1007/3540480714_10.CrossRefGoogle Scholar
Fischer, Michael J., Nancy A. Lynch, , and Michael S. Paterson, . 1985. “Impossibility of Distributed Consensus with One Faulty Process.” Journal of the ACM 32 (2): 374382. https://doi.org/10.1145/3149.214121.CrossRefGoogle Scholar
Gilad, Yossi, Hemo, Rotem, Micali, Silvio, Vlachos, Georgios, and Zeldovich, Nickolai. 2017. “Algorand: Scaling Byzantine Agreements for Cryptocurrencies.” In Proceedings of the 26th Symposium on Operating Systems Principles, 51–68. SOSP’17. New York, NY, USA: Association for Computing Machinery. https://doi.org/10.1145/3132747.3132757.Google Scholar
Kiayias, Aggelos, Russell, Alexander, David, Bernardo, and Oliynykov, Roman. 2017. “Ouroboros: A Provably Secure Proof of Stake Blockchain Protocol.” In Advances in Cryptology – CRYPTO 2017, edited by Katz, Jonathan and Shacham, Hovav, 357388. Lecture Notes in Computer Science. Cham: Springer International Publishing. https://doi.org/10.1007/9783319636887_12.CrossRefGoogle Scholar
Kwon, Jae. 2014. “Tendermint: Consensus without Mining.” Tendermint.com. https://tendermint.com/static/docs/tendermint.pdf.Google Scholar
Lamport, Leslie. 1998. “The Part Time Parliament.” ACM Transactions on Computer Systems 16 (2): 133169. https://doi.org/10.1145/279227.279229.CrossRefGoogle Scholar
Lamport, Leslie, Robert Shostak, , and Marshall Pease, . 2019. “The Byzantine Generals Problem.” In Concurrency: The Works of Leslie Lamport, 203226. New York, NY, USA: Association for Computing Machinery. https://doi.org/10.1145/3335772.3335936.Google Scholar
Micali, S., Rabin, M., and Vadhan, S.. 1999. “Verifiable Random Functions.” In 40th Annual Symposium on Foundations of Computer Science (Cat. No. 99CB37039), 120–130. https://doi.org/10.1109/SFFCS.1999.814584.CrossRefGoogle Scholar
Nakamoto, Satoshi. 2008. “Bitcoin: A Peer to Peer Electronic Cash System.” https://bitcoin.org/bitcoin.pdf.Google Scholar
Ongaro, Diego, and Ousterhout, John. 2014. “In Search of an Understandable Consensus Algorithm.” In 2014 USENIX Annual Technical Conference (USENIX ATC 14), 305–319.Google Scholar
Pass, Rafael, and Shi, Elaine. 2017. “Rethinking Large Scale Consensus.” In 2017 IEEE 30th Computer Security Foundations Symposium (CSF), 115–129. https://doi.org/10.1109/CSF.2017.37.CrossRefGoogle Scholar
Schneider, Fred B. 1990. “Implementing Fault Tolerant Services Using the State Machine Approach: A Tutorial.” ACM Computing Surveys 22 (4): 299319. https://doi.org/10.1145/98163.98167.CrossRefGoogle Scholar
Shi, Elaine. 2020. Foundations of Distributed Consensus and Blockchains. www.distributedconsensus.net/Google Scholar
Spiegelman, Alexander, Giridharan, Neil, Sonnino, Alberto, and Kogias, Lefteris Kokoris. 2022. “Bullshark: DAG BFT Protocols Made Practical.” In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2705–18. CCS’22. New York, NY, USA: Association for Computing Machinery. https://doi.org/10.1145/3548606.3559361.CrossRefGoogle Scholar
Wensley, J.H., Lamport, L., Goldberg, J., Green, M.W., Levitt, K.N., Melliar Smith, P.M., Shostak, R.E., and Weinstock, C.B.. 1978. “SIFT: Design and Analysis of a Fault Tolerant Computer for Aircraft Control.” Proceedings of the IEEE 66 (10): 12401255. https://doi.org/10.1109/PROC.1978.11114.CrossRefGoogle Scholar
Yin, Maofan, Malkhi, Dahlia, Reiter, Michael K., Gueta, Guy Golan, and Abraham, Ittai. 2019. “HotStuff: BFT Consensus with Linearity and Responsiveness.” In Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing, 347–356. PODC’19. New York, NY, USA: Association for Computing Machinery. https://doi.org/10.1145/3293611.3331591.CrossRefGoogle Scholar

Save book to Kindle

To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • Blockchains
  • Ken Huang, DistributedApps.ai, Youwei Yang, Bit Mining Limited, Fan Zhang, Yale University, Connecticut, Xi Chen, New York University, Feng Zhu, Harvard Business School
  • Book: Web3
  • Online publication: 21 November 2024
  • Chapter DOI: https://doi.org/10.1017/9781009375665.008
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • Blockchains
  • Ken Huang, DistributedApps.ai, Youwei Yang, Bit Mining Limited, Fan Zhang, Yale University, Connecticut, Xi Chen, New York University, Feng Zhu, Harvard Business School
  • Book: Web3
  • Online publication: 21 November 2024
  • Chapter DOI: https://doi.org/10.1017/9781009375665.008
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • Blockchains
  • Ken Huang, DistributedApps.ai, Youwei Yang, Bit Mining Limited, Fan Zhang, Yale University, Connecticut, Xi Chen, New York University, Feng Zhu, Harvard Business School
  • Book: Web3
  • Online publication: 21 November 2024
  • Chapter DOI: https://doi.org/10.1017/9781009375665.008
Available formats
×