Build Your Own Blockchain: A Practical Guide to Distributed Ledger Technology
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer International Publishing AG
2020
|
Schriftenreihe: | Management for Professionals Ser
|
Schlagworte: | |
Online-Zugang: | HWR01 |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 Online-Ressource (194 pages) |
ISBN: | 9783030401429 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV048222697 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 220516s2020 |||| o||u| ||||||eng d | ||
020 | |a 9783030401429 |9 978-3-030-40142-9 | ||
035 | |a (ZDB-30-PQE)EBC6191384 | ||
035 | |a (ZDB-30-PAD)EBC6191384 | ||
035 | |a (ZDB-89-EBL)EBL6191384 | ||
035 | |a (OCoLC)1153846372 | ||
035 | |a (DE-599)BVBBV048222697 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-2070s | ||
082 | 0 | |a 5.74 | |
100 | 1 | |a Hellwig, Daniel |e Verfasser |4 aut | |
245 | 1 | 0 | |a Build Your Own Blockchain |b A Practical Guide to Distributed Ledger Technology |
264 | 1 | |a Cham |b Springer International Publishing AG |c 2020 | |
264 | 4 | |c ©2020 | |
300 | |a 1 Online-Ressource (194 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Management for Professionals Ser | |
500 | |a Description based on publisher supplied metadata and other sources | ||
505 | 8 | |a Intro -- Preface -- Introduction to DLT: Build Your Own Blockchain -- Acknowledgements -- Contents -- Blockchain Fundamentals -- 1 Blockchain Foundations -- 1.1 Introduction -- 1.1.1 Terminology -- 1.1.2 The First Use Case -- 1.1.3 Currencies: Traditional and Crypto -- 1.1.4 Ownership -- 1.2 Cryptocurrencies -- 1.2.1 Control Mechanisms -- 1.2.2 Cryptography -- 1.2.3 Cryptographic Hashing -- 1.2.4 Asymmetric Cryptography -- 1.2.5 Digital Signatures -- 1.3 Network Architecture Basics -- 1.4 The Blockchain -- 1.4.1 Operations -- 1.4.2 Blocks -- 1.5 Data Integrity -- 1.5.1 Ledger Propagation -- 1.5.2 Transaction Validation -- 1.5.3 Merkle Trees -- 1.6 Types of Blockchains -- 1.6.1 Public Blockchains -- 1.6.2 Private Blockchains -- 1.6.3 Consortium-Controlled Blockchains -- 1.6.4 Selection Framework -- 1.7 Exercise -- 1.7.1 Introduction -- 1.7.2 Environment Setup -- 1.7.3 Build Your Own Blockchain -- References -- 2 Cryptocurrencies -- 2.1 Introduction -- 2.1.1 Overview -- 2.1.2 Crypto Properties -- 2.1.3 Transactions -- 2.1.4 Double Spending -- 2.2 Miners -- 2.2.1 Process Overview -- 2.2.2 Transaction Confirmation -- 2.2.3 Mining Process -- 2.2.4 The Nonce -- 2.3 Coins and Tokens -- 2.3.1 Introduction -- 2.3.2 Altcoins -- 2.3.3 Tokens -- 2.3.4 ERC-20 Standard -- 2.4 Market Makers/Exchanges -- 2.4.1 Introduction -- 2.4.2 Brokers -- 2.4.3 Traditional Exchanges -- 2.4.4 Decentralized Exchanges -- 2.4.5 Trading Platforms -- 2.4.6 Offline Exchanges -- 2.5 Wallets -- 2.5.1 Introduction -- 2.5.2 Hardware Wallets -- 2.5.3 Software Wallets -- 2.5.4 Exchange Wallets -- 2.6 Exercise -- 2.6.1 Introduction -- 2.6.2 Standard Transfer -- References -- 3 Consensus Mechanisms -- 3.1 Introduction -- 3.1.1 Definition -- 3.1.2 Objectives -- 3.1.3 Variations -- 3.2 The CAP Theorem -- 3.2.1 The Trilemma -- 3.2.2 CAP Theorem and Blockchains -- 3.2.3 CAP Theorem in Practice | |
505 | 8 | |a 3.3 Byzantine Fault -- 3.3.1 Background -- 3.3.2 Byzantine Generals' Problem -- 3.3.3 An Example -- 3.4 Common Consensus Protocols -- 3.4.1 Proof of Work (PoW) -- 3.4.2 Proof of Stake (PoS) -- 3.4.3 Proof of Capacity/Proof of Space -- 3.4.4 Delegated Proof of Stake (DPoS) -- 3.4.5 Proof of Authority (PoA) -- 3.4.6 Practical Byzantine Fault Tolerance (PBFT) -- 3.4.7 Proof of Elapsed Time (PoET) -- 3.4.8 Other Mechanisms -- 3.5 Exercise -- 3.5.1 Introduction -- 3.5.2 Set up PoA Genesis Block -- 3.5.3 Create a PoA Network -- References -- 4 Smart Contracts -- 4.1 Introduction -- 4.2 Ethereum-An Alternative to Bitcoin -- 4.2.1 Introduction -- 4.2.2 Ethereum Versus Bitcoin Applications -- 4.2.3 Ethereum Approach -- 4.2.4 Gas -- 4.2.5 The Price of Gas -- 4.3 Solidity Programming Language -- 4.3.1 Syntax -- 4.3.2 Coin Toss Example -- 4.4 Oracles -- 4.4.1 Introduction -- 4.4.2 Smart Contract Integration -- 4.4.3 Oracles and Security -- 4.4.4 Types of Oracles -- 4.4.5 Oracle Contract Example -- 4.5 Decentralized Applications (dApps) -- 4.5.1 Introduction -- 4.5.2 dApp Example: The Decentralized Autonomous Organization (DAO) -- 4.6 Turing Completeness -- 4.6.1 Background -- 4.6.2 Turing Completeness and Ethereum -- 4.7 Legal Perspective -- 4.7.1 Smart Contract Interpretation -- 4.7.2 Open Questions -- 4.7.3 Conclusion -- 4.8 Exercise ("Piggy Bank") -- 4.8.1 Introduction -- 4.8.2 Opcode -- 4.8.3 Bytecode -- 4.8.4 Application Binary Interface (ABI) -- 4.8.5 Piggy Bank Deployment -- References -- 5 Privacy and Anonymity -- 5.1 Introduction -- 5.1.1 Anonymity -- 5.1.2 Unlinkability -- 5.1.3 Anonymity Versus Pseudonymity -- 5.1.4 Taint Analysis -- 5.2 De-anonymization -- 5.2.1 Introduction -- 5.2.2 Transaction Graph Analysis -- 5.2.3 Network-Layer De-anonymization -- 5.3 The Onion Router (TOR) Network -- 5.3.1 Background -- 5.3.2 TOR Approach -- 5.3.3 TOR Usage | |
505 | 8 | |a 5.3.4 Limitations -- 5.4 Mixing Models -- 5.5 Decentralized Mixing -- 5.5.1 Motivation -- 5.5.2 Coinjoin Model -- 5.5.3 Coinjoin Anonymity -- 5.6 Zero-Knowledge Proofs -- 5.6.1 Introduction -- 5.7 Privacy and Security Protocols -- 5.7.1 Introduction -- 5.8 Privacy Coins -- 5.8.1 Introduction -- 5.8.2 The Zero Currencies -- 5.8.3 Zerocoin -- 5.8.4 Zerocash -- 5.9 Exercise -- 5.9.1 Introduction -- References -- Cryptography Foundations -- 6 Blockchain Cryptography: Part 1 -- 6.1 Introduction -- 6.1.1 Cryptography Fundamentals -- 6.1.2 Secrecy Prerequisites -- 6.1.3 Blockchain and Cryptography -- 6.2 Classic Ciphers -- 6.2.1 Substitution -- 6.2.2 Transposition -- 6.3 Modern Cryptographic Algorithms -- 6.3.1 Introduction -- 6.3.2 Vulnerabilities -- 6.4 Hashing -- 6.4.1 Introduction -- 6.4.2 Hash Collisions -- 6.4.3 Merkle-Damgård Construction -- 6.4.4 Length Extension Attack -- 6.5 Secure Hash Algorithm (SHA) -- 6.5.1 Introduction -- 6.5.2 Hash Example -- 6.6 Symmetric Encryption -- 6.6.1 Single Encryption Keys -- 6.6.2 The Hill Cipher -- 6.6.3 The Pohlig-Hellman Cipher -- 6.7 Exercise -- 6.7.1 Introduction -- 6.7.2 Message Prep -- 6.7.3 OpenSSL Setup -- 6.7.4 Message Encryption -- 6.7.5 Message Decryption -- References -- 7 Blockchain Cryptography: Part 2 -- 7.1 Asymmetric Key Schemes -- 7.1.1 Introduction -- 7.1.2 Illustrative Example -- 7.2 Diffie-Hellman-Merkle Key Agreement -- 7.2.1 Introduction -- 7.2.2 An Example -- 7.2.3 Limitations -- 7.3 Rivest, Shamir, and Adelman (RSA) -- 7.3.1 Introduction -- 7.3.2 Key Pairs -- 7.3.3 Intuition -- 7.3.4 An Example -- 7.4 Digital Signatures -- 7.4.1 Introduction -- 7.4.2 Motivation -- 7.4.3 Usage -- 7.4.4 Signatures -- 7.4.5 An Example -- 7.5 Quantum Resistance -- 7.5.1 Introduction -- 7.5.2 Mechanism -- 7.5.3 Shor's Algorithm -- 7.5.4 Grover's Algorithm -- 7.5.5 Imminence -- 7.5.6 Security Considerations | |
505 | 8 | |a 7.5.7 Quantum Resistance -- 7.6 Exercise -- 7.6.1 Introduction -- 7.6.2 Message Prep -- 7.6.3 Key Generation (RSA) -- 7.6.4 Digital Signatures (RSA) -- 7.6.5 Key Generation (Elliptic Curves) -- 7.6.6 Digital Signatures (Elliptic Curves) -- References -- Real-World Applications -- 8 Blockchain in Action: Real-World Applications -- 8.1 Introduction -- 8.2 Currencies -- 8.3 Cross-Border Transfers -- 8.4 Tokenization -- 8.5 Asset Tracking -- 8.6 Commodity Trading -- 8.7 Looking Ahead -- 8.7.1 Humble Beginnings -- 8.7.2 A Word of Caution -- 8.7.3 The Jury Is Still Out -- References -- Index | |
650 | 4 | |a Blockchains (Databases) | |
700 | 1 | |a Karlic, Goran |e Sonstige |4 oth | |
700 | 1 | |a Huchzermeier, Arnd |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Hellwig, Daniel |t Build Your Own Blockchain |d Cham : Springer International Publishing AG,c2020 |z 9783030401412 |
912 | |a ZDB-30-PQE | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-033603430 | ||
966 | e | |u https://ebookcentral.proquest.com/lib/hwr/detail.action?docID=6191384 |l HWR01 |p ZDB-30-PQE |q HWR_PDA_PQE |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804184004218322944 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Hellwig, Daniel |
author_facet | Hellwig, Daniel |
author_role | aut |
author_sort | Hellwig, Daniel |
author_variant | d h dh |
building | Verbundindex |
bvnumber | BV048222697 |
collection | ZDB-30-PQE |
contents | Intro -- Preface -- Introduction to DLT: Build Your Own Blockchain -- Acknowledgements -- Contents -- Blockchain Fundamentals -- 1 Blockchain Foundations -- 1.1 Introduction -- 1.1.1 Terminology -- 1.1.2 The First Use Case -- 1.1.3 Currencies: Traditional and Crypto -- 1.1.4 Ownership -- 1.2 Cryptocurrencies -- 1.2.1 Control Mechanisms -- 1.2.2 Cryptography -- 1.2.3 Cryptographic Hashing -- 1.2.4 Asymmetric Cryptography -- 1.2.5 Digital Signatures -- 1.3 Network Architecture Basics -- 1.4 The Blockchain -- 1.4.1 Operations -- 1.4.2 Blocks -- 1.5 Data Integrity -- 1.5.1 Ledger Propagation -- 1.5.2 Transaction Validation -- 1.5.3 Merkle Trees -- 1.6 Types of Blockchains -- 1.6.1 Public Blockchains -- 1.6.2 Private Blockchains -- 1.6.3 Consortium-Controlled Blockchains -- 1.6.4 Selection Framework -- 1.7 Exercise -- 1.7.1 Introduction -- 1.7.2 Environment Setup -- 1.7.3 Build Your Own Blockchain -- References -- 2 Cryptocurrencies -- 2.1 Introduction -- 2.1.1 Overview -- 2.1.2 Crypto Properties -- 2.1.3 Transactions -- 2.1.4 Double Spending -- 2.2 Miners -- 2.2.1 Process Overview -- 2.2.2 Transaction Confirmation -- 2.2.3 Mining Process -- 2.2.4 The Nonce -- 2.3 Coins and Tokens -- 2.3.1 Introduction -- 2.3.2 Altcoins -- 2.3.3 Tokens -- 2.3.4 ERC-20 Standard -- 2.4 Market Makers/Exchanges -- 2.4.1 Introduction -- 2.4.2 Brokers -- 2.4.3 Traditional Exchanges -- 2.4.4 Decentralized Exchanges -- 2.4.5 Trading Platforms -- 2.4.6 Offline Exchanges -- 2.5 Wallets -- 2.5.1 Introduction -- 2.5.2 Hardware Wallets -- 2.5.3 Software Wallets -- 2.5.4 Exchange Wallets -- 2.6 Exercise -- 2.6.1 Introduction -- 2.6.2 Standard Transfer -- References -- 3 Consensus Mechanisms -- 3.1 Introduction -- 3.1.1 Definition -- 3.1.2 Objectives -- 3.1.3 Variations -- 3.2 The CAP Theorem -- 3.2.1 The Trilemma -- 3.2.2 CAP Theorem and Blockchains -- 3.2.3 CAP Theorem in Practice 3.3 Byzantine Fault -- 3.3.1 Background -- 3.3.2 Byzantine Generals' Problem -- 3.3.3 An Example -- 3.4 Common Consensus Protocols -- 3.4.1 Proof of Work (PoW) -- 3.4.2 Proof of Stake (PoS) -- 3.4.3 Proof of Capacity/Proof of Space -- 3.4.4 Delegated Proof of Stake (DPoS) -- 3.4.5 Proof of Authority (PoA) -- 3.4.6 Practical Byzantine Fault Tolerance (PBFT) -- 3.4.7 Proof of Elapsed Time (PoET) -- 3.4.8 Other Mechanisms -- 3.5 Exercise -- 3.5.1 Introduction -- 3.5.2 Set up PoA Genesis Block -- 3.5.3 Create a PoA Network -- References -- 4 Smart Contracts -- 4.1 Introduction -- 4.2 Ethereum-An Alternative to Bitcoin -- 4.2.1 Introduction -- 4.2.2 Ethereum Versus Bitcoin Applications -- 4.2.3 Ethereum Approach -- 4.2.4 Gas -- 4.2.5 The Price of Gas -- 4.3 Solidity Programming Language -- 4.3.1 Syntax -- 4.3.2 Coin Toss Example -- 4.4 Oracles -- 4.4.1 Introduction -- 4.4.2 Smart Contract Integration -- 4.4.3 Oracles and Security -- 4.4.4 Types of Oracles -- 4.4.5 Oracle Contract Example -- 4.5 Decentralized Applications (dApps) -- 4.5.1 Introduction -- 4.5.2 dApp Example: The Decentralized Autonomous Organization (DAO) -- 4.6 Turing Completeness -- 4.6.1 Background -- 4.6.2 Turing Completeness and Ethereum -- 4.7 Legal Perspective -- 4.7.1 Smart Contract Interpretation -- 4.7.2 Open Questions -- 4.7.3 Conclusion -- 4.8 Exercise ("Piggy Bank") -- 4.8.1 Introduction -- 4.8.2 Opcode -- 4.8.3 Bytecode -- 4.8.4 Application Binary Interface (ABI) -- 4.8.5 Piggy Bank Deployment -- References -- 5 Privacy and Anonymity -- 5.1 Introduction -- 5.1.1 Anonymity -- 5.1.2 Unlinkability -- 5.1.3 Anonymity Versus Pseudonymity -- 5.1.4 Taint Analysis -- 5.2 De-anonymization -- 5.2.1 Introduction -- 5.2.2 Transaction Graph Analysis -- 5.2.3 Network-Layer De-anonymization -- 5.3 The Onion Router (TOR) Network -- 5.3.1 Background -- 5.3.2 TOR Approach -- 5.3.3 TOR Usage 5.3.4 Limitations -- 5.4 Mixing Models -- 5.5 Decentralized Mixing -- 5.5.1 Motivation -- 5.5.2 Coinjoin Model -- 5.5.3 Coinjoin Anonymity -- 5.6 Zero-Knowledge Proofs -- 5.6.1 Introduction -- 5.7 Privacy and Security Protocols -- 5.7.1 Introduction -- 5.8 Privacy Coins -- 5.8.1 Introduction -- 5.8.2 The Zero Currencies -- 5.8.3 Zerocoin -- 5.8.4 Zerocash -- 5.9 Exercise -- 5.9.1 Introduction -- References -- Cryptography Foundations -- 6 Blockchain Cryptography: Part 1 -- 6.1 Introduction -- 6.1.1 Cryptography Fundamentals -- 6.1.2 Secrecy Prerequisites -- 6.1.3 Blockchain and Cryptography -- 6.2 Classic Ciphers -- 6.2.1 Substitution -- 6.2.2 Transposition -- 6.3 Modern Cryptographic Algorithms -- 6.3.1 Introduction -- 6.3.2 Vulnerabilities -- 6.4 Hashing -- 6.4.1 Introduction -- 6.4.2 Hash Collisions -- 6.4.3 Merkle-Damgård Construction -- 6.4.4 Length Extension Attack -- 6.5 Secure Hash Algorithm (SHA) -- 6.5.1 Introduction -- 6.5.2 Hash Example -- 6.6 Symmetric Encryption -- 6.6.1 Single Encryption Keys -- 6.6.2 The Hill Cipher -- 6.6.3 The Pohlig-Hellman Cipher -- 6.7 Exercise -- 6.7.1 Introduction -- 6.7.2 Message Prep -- 6.7.3 OpenSSL Setup -- 6.7.4 Message Encryption -- 6.7.5 Message Decryption -- References -- 7 Blockchain Cryptography: Part 2 -- 7.1 Asymmetric Key Schemes -- 7.1.1 Introduction -- 7.1.2 Illustrative Example -- 7.2 Diffie-Hellman-Merkle Key Agreement -- 7.2.1 Introduction -- 7.2.2 An Example -- 7.2.3 Limitations -- 7.3 Rivest, Shamir, and Adelman (RSA) -- 7.3.1 Introduction -- 7.3.2 Key Pairs -- 7.3.3 Intuition -- 7.3.4 An Example -- 7.4 Digital Signatures -- 7.4.1 Introduction -- 7.4.2 Motivation -- 7.4.3 Usage -- 7.4.4 Signatures -- 7.4.5 An Example -- 7.5 Quantum Resistance -- 7.5.1 Introduction -- 7.5.2 Mechanism -- 7.5.3 Shor's Algorithm -- 7.5.4 Grover's Algorithm -- 7.5.5 Imminence -- 7.5.6 Security Considerations 7.5.7 Quantum Resistance -- 7.6 Exercise -- 7.6.1 Introduction -- 7.6.2 Message Prep -- 7.6.3 Key Generation (RSA) -- 7.6.4 Digital Signatures (RSA) -- 7.6.5 Key Generation (Elliptic Curves) -- 7.6.6 Digital Signatures (Elliptic Curves) -- References -- Real-World Applications -- 8 Blockchain in Action: Real-World Applications -- 8.1 Introduction -- 8.2 Currencies -- 8.3 Cross-Border Transfers -- 8.4 Tokenization -- 8.5 Asset Tracking -- 8.6 Commodity Trading -- 8.7 Looking Ahead -- 8.7.1 Humble Beginnings -- 8.7.2 A Word of Caution -- 8.7.3 The Jury Is Still Out -- References -- Index |
ctrlnum | (ZDB-30-PQE)EBC6191384 (ZDB-30-PAD)EBC6191384 (ZDB-89-EBL)EBL6191384 (OCoLC)1153846372 (DE-599)BVBBV048222697 |
dewey-full | 5.74 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 5.74 |
dewey-search | 5.74 |
dewey-sort | 15.74 |
dewey-tens | 000 - Computer science, information, general works |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>07826nmm a2200457zc 4500</leader><controlfield tag="001">BV048222697</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">220516s2020 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783030401429</subfield><subfield code="9">978-3-030-40142-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC6191384</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PAD)EBC6191384</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL6191384</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1153846372</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048222697</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-2070s</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">5.74</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hellwig, Daniel</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Build Your Own Blockchain</subfield><subfield code="b">A Practical Guide to Distributed Ledger Technology</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing AG</subfield><subfield code="c">2020</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (194 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Management for Professionals Ser</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Intro -- Preface -- Introduction to DLT: Build Your Own Blockchain -- Acknowledgements -- Contents -- Blockchain Fundamentals -- 1 Blockchain Foundations -- 1.1 Introduction -- 1.1.1 Terminology -- 1.1.2 The First Use Case -- 1.1.3 Currencies: Traditional and Crypto -- 1.1.4 Ownership -- 1.2 Cryptocurrencies -- 1.2.1 Control Mechanisms -- 1.2.2 Cryptography -- 1.2.3 Cryptographic Hashing -- 1.2.4 Asymmetric Cryptography -- 1.2.5 Digital Signatures -- 1.3 Network Architecture Basics -- 1.4 The Blockchain -- 1.4.1 Operations -- 1.4.2 Blocks -- 1.5 Data Integrity -- 1.5.1 Ledger Propagation -- 1.5.2 Transaction Validation -- 1.5.3 Merkle Trees -- 1.6 Types of Blockchains -- 1.6.1 Public Blockchains -- 1.6.2 Private Blockchains -- 1.6.3 Consortium-Controlled Blockchains -- 1.6.4 Selection Framework -- 1.7 Exercise -- 1.7.1 Introduction -- 1.7.2 Environment Setup -- 1.7.3 Build Your Own Blockchain -- References -- 2 Cryptocurrencies -- 2.1 Introduction -- 2.1.1 Overview -- 2.1.2 Crypto Properties -- 2.1.3 Transactions -- 2.1.4 Double Spending -- 2.2 Miners -- 2.2.1 Process Overview -- 2.2.2 Transaction Confirmation -- 2.2.3 Mining Process -- 2.2.4 The Nonce -- 2.3 Coins and Tokens -- 2.3.1 Introduction -- 2.3.2 Altcoins -- 2.3.3 Tokens -- 2.3.4 ERC-20 Standard -- 2.4 Market Makers/Exchanges -- 2.4.1 Introduction -- 2.4.2 Brokers -- 2.4.3 Traditional Exchanges -- 2.4.4 Decentralized Exchanges -- 2.4.5 Trading Platforms -- 2.4.6 Offline Exchanges -- 2.5 Wallets -- 2.5.1 Introduction -- 2.5.2 Hardware Wallets -- 2.5.3 Software Wallets -- 2.5.4 Exchange Wallets -- 2.6 Exercise -- 2.6.1 Introduction -- 2.6.2 Standard Transfer -- References -- 3 Consensus Mechanisms -- 3.1 Introduction -- 3.1.1 Definition -- 3.1.2 Objectives -- 3.1.3 Variations -- 3.2 The CAP Theorem -- 3.2.1 The Trilemma -- 3.2.2 CAP Theorem and Blockchains -- 3.2.3 CAP Theorem in Practice</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">3.3 Byzantine Fault -- 3.3.1 Background -- 3.3.2 Byzantine Generals' Problem -- 3.3.3 An Example -- 3.4 Common Consensus Protocols -- 3.4.1 Proof of Work (PoW) -- 3.4.2 Proof of Stake (PoS) -- 3.4.3 Proof of Capacity/Proof of Space -- 3.4.4 Delegated Proof of Stake (DPoS) -- 3.4.5 Proof of Authority (PoA) -- 3.4.6 Practical Byzantine Fault Tolerance (PBFT) -- 3.4.7 Proof of Elapsed Time (PoET) -- 3.4.8 Other Mechanisms -- 3.5 Exercise -- 3.5.1 Introduction -- 3.5.2 Set up PoA Genesis Block -- 3.5.3 Create a PoA Network -- References -- 4 Smart Contracts -- 4.1 Introduction -- 4.2 Ethereum-An Alternative to Bitcoin -- 4.2.1 Introduction -- 4.2.2 Ethereum Versus Bitcoin Applications -- 4.2.3 Ethereum Approach -- 4.2.4 Gas -- 4.2.5 The Price of Gas -- 4.3 Solidity Programming Language -- 4.3.1 Syntax -- 4.3.2 Coin Toss Example -- 4.4 Oracles -- 4.4.1 Introduction -- 4.4.2 Smart Contract Integration -- 4.4.3 Oracles and Security -- 4.4.4 Types of Oracles -- 4.4.5 Oracle Contract Example -- 4.5 Decentralized Applications (dApps) -- 4.5.1 Introduction -- 4.5.2 dApp Example: The Decentralized Autonomous Organization (DAO) -- 4.6 Turing Completeness -- 4.6.1 Background -- 4.6.2 Turing Completeness and Ethereum -- 4.7 Legal Perspective -- 4.7.1 Smart Contract Interpretation -- 4.7.2 Open Questions -- 4.7.3 Conclusion -- 4.8 Exercise ("Piggy Bank") -- 4.8.1 Introduction -- 4.8.2 Opcode -- 4.8.3 Bytecode -- 4.8.4 Application Binary Interface (ABI) -- 4.8.5 Piggy Bank Deployment -- References -- 5 Privacy and Anonymity -- 5.1 Introduction -- 5.1.1 Anonymity -- 5.1.2 Unlinkability -- 5.1.3 Anonymity Versus Pseudonymity -- 5.1.4 Taint Analysis -- 5.2 De-anonymization -- 5.2.1 Introduction -- 5.2.2 Transaction Graph Analysis -- 5.2.3 Network-Layer De-anonymization -- 5.3 The Onion Router (TOR) Network -- 5.3.1 Background -- 5.3.2 TOR Approach -- 5.3.3 TOR Usage</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">5.3.4 Limitations -- 5.4 Mixing Models -- 5.5 Decentralized Mixing -- 5.5.1 Motivation -- 5.5.2 Coinjoin Model -- 5.5.3 Coinjoin Anonymity -- 5.6 Zero-Knowledge Proofs -- 5.6.1 Introduction -- 5.7 Privacy and Security Protocols -- 5.7.1 Introduction -- 5.8 Privacy Coins -- 5.8.1 Introduction -- 5.8.2 The Zero Currencies -- 5.8.3 Zerocoin -- 5.8.4 Zerocash -- 5.9 Exercise -- 5.9.1 Introduction -- References -- Cryptography Foundations -- 6 Blockchain Cryptography: Part 1 -- 6.1 Introduction -- 6.1.1 Cryptography Fundamentals -- 6.1.2 Secrecy Prerequisites -- 6.1.3 Blockchain and Cryptography -- 6.2 Classic Ciphers -- 6.2.1 Substitution -- 6.2.2 Transposition -- 6.3 Modern Cryptographic Algorithms -- 6.3.1 Introduction -- 6.3.2 Vulnerabilities -- 6.4 Hashing -- 6.4.1 Introduction -- 6.4.2 Hash Collisions -- 6.4.3 Merkle-Damgård Construction -- 6.4.4 Length Extension Attack -- 6.5 Secure Hash Algorithm (SHA) -- 6.5.1 Introduction -- 6.5.2 Hash Example -- 6.6 Symmetric Encryption -- 6.6.1 Single Encryption Keys -- 6.6.2 The Hill Cipher -- 6.6.3 The Pohlig-Hellman Cipher -- 6.7 Exercise -- 6.7.1 Introduction -- 6.7.2 Message Prep -- 6.7.3 OpenSSL Setup -- 6.7.4 Message Encryption -- 6.7.5 Message Decryption -- References -- 7 Blockchain Cryptography: Part 2 -- 7.1 Asymmetric Key Schemes -- 7.1.1 Introduction -- 7.1.2 Illustrative Example -- 7.2 Diffie-Hellman-Merkle Key Agreement -- 7.2.1 Introduction -- 7.2.2 An Example -- 7.2.3 Limitations -- 7.3 Rivest, Shamir, and Adelman (RSA) -- 7.3.1 Introduction -- 7.3.2 Key Pairs -- 7.3.3 Intuition -- 7.3.4 An Example -- 7.4 Digital Signatures -- 7.4.1 Introduction -- 7.4.2 Motivation -- 7.4.3 Usage -- 7.4.4 Signatures -- 7.4.5 An Example -- 7.5 Quantum Resistance -- 7.5.1 Introduction -- 7.5.2 Mechanism -- 7.5.3 Shor's Algorithm -- 7.5.4 Grover's Algorithm -- 7.5.5 Imminence -- 7.5.6 Security Considerations</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">7.5.7 Quantum Resistance -- 7.6 Exercise -- 7.6.1 Introduction -- 7.6.2 Message Prep -- 7.6.3 Key Generation (RSA) -- 7.6.4 Digital Signatures (RSA) -- 7.6.5 Key Generation (Elliptic Curves) -- 7.6.6 Digital Signatures (Elliptic Curves) -- References -- Real-World Applications -- 8 Blockchain in Action: Real-World Applications -- 8.1 Introduction -- 8.2 Currencies -- 8.3 Cross-Border Transfers -- 8.4 Tokenization -- 8.5 Asset Tracking -- 8.6 Commodity Trading -- 8.7 Looking Ahead -- 8.7.1 Humble Beginnings -- 8.7.2 A Word of Caution -- 8.7.3 The Jury Is Still Out -- References -- Index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Blockchains (Databases)</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Karlic, Goran</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Huchzermeier, Arnd</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Hellwig, Daniel</subfield><subfield code="t">Build Your Own Blockchain</subfield><subfield code="d">Cham : Springer International Publishing AG,c2020</subfield><subfield code="z">9783030401412</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033603430</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/hwr/detail.action?docID=6191384</subfield><subfield code="l">HWR01</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">HWR_PDA_PQE</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV048222697 |
illustrated | Not Illustrated |
index_date | 2024-07-03T19:50:37Z |
indexdate | 2024-07-10T09:32:26Z |
institution | BVB |
isbn | 9783030401429 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033603430 |
oclc_num | 1153846372 |
open_access_boolean | |
owner | DE-2070s |
owner_facet | DE-2070s |
physical | 1 Online-Ressource (194 pages) |
psigel | ZDB-30-PQE ZDB-30-PQE HWR_PDA_PQE |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Springer International Publishing AG |
record_format | marc |
series2 | Management for Professionals Ser |
spelling | Hellwig, Daniel Verfasser aut Build Your Own Blockchain A Practical Guide to Distributed Ledger Technology Cham Springer International Publishing AG 2020 ©2020 1 Online-Ressource (194 pages) txt rdacontent c rdamedia cr rdacarrier Management for Professionals Ser Description based on publisher supplied metadata and other sources Intro -- Preface -- Introduction to DLT: Build Your Own Blockchain -- Acknowledgements -- Contents -- Blockchain Fundamentals -- 1 Blockchain Foundations -- 1.1 Introduction -- 1.1.1 Terminology -- 1.1.2 The First Use Case -- 1.1.3 Currencies: Traditional and Crypto -- 1.1.4 Ownership -- 1.2 Cryptocurrencies -- 1.2.1 Control Mechanisms -- 1.2.2 Cryptography -- 1.2.3 Cryptographic Hashing -- 1.2.4 Asymmetric Cryptography -- 1.2.5 Digital Signatures -- 1.3 Network Architecture Basics -- 1.4 The Blockchain -- 1.4.1 Operations -- 1.4.2 Blocks -- 1.5 Data Integrity -- 1.5.1 Ledger Propagation -- 1.5.2 Transaction Validation -- 1.5.3 Merkle Trees -- 1.6 Types of Blockchains -- 1.6.1 Public Blockchains -- 1.6.2 Private Blockchains -- 1.6.3 Consortium-Controlled Blockchains -- 1.6.4 Selection Framework -- 1.7 Exercise -- 1.7.1 Introduction -- 1.7.2 Environment Setup -- 1.7.3 Build Your Own Blockchain -- References -- 2 Cryptocurrencies -- 2.1 Introduction -- 2.1.1 Overview -- 2.1.2 Crypto Properties -- 2.1.3 Transactions -- 2.1.4 Double Spending -- 2.2 Miners -- 2.2.1 Process Overview -- 2.2.2 Transaction Confirmation -- 2.2.3 Mining Process -- 2.2.4 The Nonce -- 2.3 Coins and Tokens -- 2.3.1 Introduction -- 2.3.2 Altcoins -- 2.3.3 Tokens -- 2.3.4 ERC-20 Standard -- 2.4 Market Makers/Exchanges -- 2.4.1 Introduction -- 2.4.2 Brokers -- 2.4.3 Traditional Exchanges -- 2.4.4 Decentralized Exchanges -- 2.4.5 Trading Platforms -- 2.4.6 Offline Exchanges -- 2.5 Wallets -- 2.5.1 Introduction -- 2.5.2 Hardware Wallets -- 2.5.3 Software Wallets -- 2.5.4 Exchange Wallets -- 2.6 Exercise -- 2.6.1 Introduction -- 2.6.2 Standard Transfer -- References -- 3 Consensus Mechanisms -- 3.1 Introduction -- 3.1.1 Definition -- 3.1.2 Objectives -- 3.1.3 Variations -- 3.2 The CAP Theorem -- 3.2.1 The Trilemma -- 3.2.2 CAP Theorem and Blockchains -- 3.2.3 CAP Theorem in Practice 3.3 Byzantine Fault -- 3.3.1 Background -- 3.3.2 Byzantine Generals' Problem -- 3.3.3 An Example -- 3.4 Common Consensus Protocols -- 3.4.1 Proof of Work (PoW) -- 3.4.2 Proof of Stake (PoS) -- 3.4.3 Proof of Capacity/Proof of Space -- 3.4.4 Delegated Proof of Stake (DPoS) -- 3.4.5 Proof of Authority (PoA) -- 3.4.6 Practical Byzantine Fault Tolerance (PBFT) -- 3.4.7 Proof of Elapsed Time (PoET) -- 3.4.8 Other Mechanisms -- 3.5 Exercise -- 3.5.1 Introduction -- 3.5.2 Set up PoA Genesis Block -- 3.5.3 Create a PoA Network -- References -- 4 Smart Contracts -- 4.1 Introduction -- 4.2 Ethereum-An Alternative to Bitcoin -- 4.2.1 Introduction -- 4.2.2 Ethereum Versus Bitcoin Applications -- 4.2.3 Ethereum Approach -- 4.2.4 Gas -- 4.2.5 The Price of Gas -- 4.3 Solidity Programming Language -- 4.3.1 Syntax -- 4.3.2 Coin Toss Example -- 4.4 Oracles -- 4.4.1 Introduction -- 4.4.2 Smart Contract Integration -- 4.4.3 Oracles and Security -- 4.4.4 Types of Oracles -- 4.4.5 Oracle Contract Example -- 4.5 Decentralized Applications (dApps) -- 4.5.1 Introduction -- 4.5.2 dApp Example: The Decentralized Autonomous Organization (DAO) -- 4.6 Turing Completeness -- 4.6.1 Background -- 4.6.2 Turing Completeness and Ethereum -- 4.7 Legal Perspective -- 4.7.1 Smart Contract Interpretation -- 4.7.2 Open Questions -- 4.7.3 Conclusion -- 4.8 Exercise ("Piggy Bank") -- 4.8.1 Introduction -- 4.8.2 Opcode -- 4.8.3 Bytecode -- 4.8.4 Application Binary Interface (ABI) -- 4.8.5 Piggy Bank Deployment -- References -- 5 Privacy and Anonymity -- 5.1 Introduction -- 5.1.1 Anonymity -- 5.1.2 Unlinkability -- 5.1.3 Anonymity Versus Pseudonymity -- 5.1.4 Taint Analysis -- 5.2 De-anonymization -- 5.2.1 Introduction -- 5.2.2 Transaction Graph Analysis -- 5.2.3 Network-Layer De-anonymization -- 5.3 The Onion Router (TOR) Network -- 5.3.1 Background -- 5.3.2 TOR Approach -- 5.3.3 TOR Usage 5.3.4 Limitations -- 5.4 Mixing Models -- 5.5 Decentralized Mixing -- 5.5.1 Motivation -- 5.5.2 Coinjoin Model -- 5.5.3 Coinjoin Anonymity -- 5.6 Zero-Knowledge Proofs -- 5.6.1 Introduction -- 5.7 Privacy and Security Protocols -- 5.7.1 Introduction -- 5.8 Privacy Coins -- 5.8.1 Introduction -- 5.8.2 The Zero Currencies -- 5.8.3 Zerocoin -- 5.8.4 Zerocash -- 5.9 Exercise -- 5.9.1 Introduction -- References -- Cryptography Foundations -- 6 Blockchain Cryptography: Part 1 -- 6.1 Introduction -- 6.1.1 Cryptography Fundamentals -- 6.1.2 Secrecy Prerequisites -- 6.1.3 Blockchain and Cryptography -- 6.2 Classic Ciphers -- 6.2.1 Substitution -- 6.2.2 Transposition -- 6.3 Modern Cryptographic Algorithms -- 6.3.1 Introduction -- 6.3.2 Vulnerabilities -- 6.4 Hashing -- 6.4.1 Introduction -- 6.4.2 Hash Collisions -- 6.4.3 Merkle-Damgård Construction -- 6.4.4 Length Extension Attack -- 6.5 Secure Hash Algorithm (SHA) -- 6.5.1 Introduction -- 6.5.2 Hash Example -- 6.6 Symmetric Encryption -- 6.6.1 Single Encryption Keys -- 6.6.2 The Hill Cipher -- 6.6.3 The Pohlig-Hellman Cipher -- 6.7 Exercise -- 6.7.1 Introduction -- 6.7.2 Message Prep -- 6.7.3 OpenSSL Setup -- 6.7.4 Message Encryption -- 6.7.5 Message Decryption -- References -- 7 Blockchain Cryptography: Part 2 -- 7.1 Asymmetric Key Schemes -- 7.1.1 Introduction -- 7.1.2 Illustrative Example -- 7.2 Diffie-Hellman-Merkle Key Agreement -- 7.2.1 Introduction -- 7.2.2 An Example -- 7.2.3 Limitations -- 7.3 Rivest, Shamir, and Adelman (RSA) -- 7.3.1 Introduction -- 7.3.2 Key Pairs -- 7.3.3 Intuition -- 7.3.4 An Example -- 7.4 Digital Signatures -- 7.4.1 Introduction -- 7.4.2 Motivation -- 7.4.3 Usage -- 7.4.4 Signatures -- 7.4.5 An Example -- 7.5 Quantum Resistance -- 7.5.1 Introduction -- 7.5.2 Mechanism -- 7.5.3 Shor's Algorithm -- 7.5.4 Grover's Algorithm -- 7.5.5 Imminence -- 7.5.6 Security Considerations 7.5.7 Quantum Resistance -- 7.6 Exercise -- 7.6.1 Introduction -- 7.6.2 Message Prep -- 7.6.3 Key Generation (RSA) -- 7.6.4 Digital Signatures (RSA) -- 7.6.5 Key Generation (Elliptic Curves) -- 7.6.6 Digital Signatures (Elliptic Curves) -- References -- Real-World Applications -- 8 Blockchain in Action: Real-World Applications -- 8.1 Introduction -- 8.2 Currencies -- 8.3 Cross-Border Transfers -- 8.4 Tokenization -- 8.5 Asset Tracking -- 8.6 Commodity Trading -- 8.7 Looking Ahead -- 8.7.1 Humble Beginnings -- 8.7.2 A Word of Caution -- 8.7.3 The Jury Is Still Out -- References -- Index Blockchains (Databases) Karlic, Goran Sonstige oth Huchzermeier, Arnd Sonstige oth Erscheint auch als Druck-Ausgabe Hellwig, Daniel Build Your Own Blockchain Cham : Springer International Publishing AG,c2020 9783030401412 |
spellingShingle | Hellwig, Daniel Build Your Own Blockchain A Practical Guide to Distributed Ledger Technology Intro -- Preface -- Introduction to DLT: Build Your Own Blockchain -- Acknowledgements -- Contents -- Blockchain Fundamentals -- 1 Blockchain Foundations -- 1.1 Introduction -- 1.1.1 Terminology -- 1.1.2 The First Use Case -- 1.1.3 Currencies: Traditional and Crypto -- 1.1.4 Ownership -- 1.2 Cryptocurrencies -- 1.2.1 Control Mechanisms -- 1.2.2 Cryptography -- 1.2.3 Cryptographic Hashing -- 1.2.4 Asymmetric Cryptography -- 1.2.5 Digital Signatures -- 1.3 Network Architecture Basics -- 1.4 The Blockchain -- 1.4.1 Operations -- 1.4.2 Blocks -- 1.5 Data Integrity -- 1.5.1 Ledger Propagation -- 1.5.2 Transaction Validation -- 1.5.3 Merkle Trees -- 1.6 Types of Blockchains -- 1.6.1 Public Blockchains -- 1.6.2 Private Blockchains -- 1.6.3 Consortium-Controlled Blockchains -- 1.6.4 Selection Framework -- 1.7 Exercise -- 1.7.1 Introduction -- 1.7.2 Environment Setup -- 1.7.3 Build Your Own Blockchain -- References -- 2 Cryptocurrencies -- 2.1 Introduction -- 2.1.1 Overview -- 2.1.2 Crypto Properties -- 2.1.3 Transactions -- 2.1.4 Double Spending -- 2.2 Miners -- 2.2.1 Process Overview -- 2.2.2 Transaction Confirmation -- 2.2.3 Mining Process -- 2.2.4 The Nonce -- 2.3 Coins and Tokens -- 2.3.1 Introduction -- 2.3.2 Altcoins -- 2.3.3 Tokens -- 2.3.4 ERC-20 Standard -- 2.4 Market Makers/Exchanges -- 2.4.1 Introduction -- 2.4.2 Brokers -- 2.4.3 Traditional Exchanges -- 2.4.4 Decentralized Exchanges -- 2.4.5 Trading Platforms -- 2.4.6 Offline Exchanges -- 2.5 Wallets -- 2.5.1 Introduction -- 2.5.2 Hardware Wallets -- 2.5.3 Software Wallets -- 2.5.4 Exchange Wallets -- 2.6 Exercise -- 2.6.1 Introduction -- 2.6.2 Standard Transfer -- References -- 3 Consensus Mechanisms -- 3.1 Introduction -- 3.1.1 Definition -- 3.1.2 Objectives -- 3.1.3 Variations -- 3.2 The CAP Theorem -- 3.2.1 The Trilemma -- 3.2.2 CAP Theorem and Blockchains -- 3.2.3 CAP Theorem in Practice 3.3 Byzantine Fault -- 3.3.1 Background -- 3.3.2 Byzantine Generals' Problem -- 3.3.3 An Example -- 3.4 Common Consensus Protocols -- 3.4.1 Proof of Work (PoW) -- 3.4.2 Proof of Stake (PoS) -- 3.4.3 Proof of Capacity/Proof of Space -- 3.4.4 Delegated Proof of Stake (DPoS) -- 3.4.5 Proof of Authority (PoA) -- 3.4.6 Practical Byzantine Fault Tolerance (PBFT) -- 3.4.7 Proof of Elapsed Time (PoET) -- 3.4.8 Other Mechanisms -- 3.5 Exercise -- 3.5.1 Introduction -- 3.5.2 Set up PoA Genesis Block -- 3.5.3 Create a PoA Network -- References -- 4 Smart Contracts -- 4.1 Introduction -- 4.2 Ethereum-An Alternative to Bitcoin -- 4.2.1 Introduction -- 4.2.2 Ethereum Versus Bitcoin Applications -- 4.2.3 Ethereum Approach -- 4.2.4 Gas -- 4.2.5 The Price of Gas -- 4.3 Solidity Programming Language -- 4.3.1 Syntax -- 4.3.2 Coin Toss Example -- 4.4 Oracles -- 4.4.1 Introduction -- 4.4.2 Smart Contract Integration -- 4.4.3 Oracles and Security -- 4.4.4 Types of Oracles -- 4.4.5 Oracle Contract Example -- 4.5 Decentralized Applications (dApps) -- 4.5.1 Introduction -- 4.5.2 dApp Example: The Decentralized Autonomous Organization (DAO) -- 4.6 Turing Completeness -- 4.6.1 Background -- 4.6.2 Turing Completeness and Ethereum -- 4.7 Legal Perspective -- 4.7.1 Smart Contract Interpretation -- 4.7.2 Open Questions -- 4.7.3 Conclusion -- 4.8 Exercise ("Piggy Bank") -- 4.8.1 Introduction -- 4.8.2 Opcode -- 4.8.3 Bytecode -- 4.8.4 Application Binary Interface (ABI) -- 4.8.5 Piggy Bank Deployment -- References -- 5 Privacy and Anonymity -- 5.1 Introduction -- 5.1.1 Anonymity -- 5.1.2 Unlinkability -- 5.1.3 Anonymity Versus Pseudonymity -- 5.1.4 Taint Analysis -- 5.2 De-anonymization -- 5.2.1 Introduction -- 5.2.2 Transaction Graph Analysis -- 5.2.3 Network-Layer De-anonymization -- 5.3 The Onion Router (TOR) Network -- 5.3.1 Background -- 5.3.2 TOR Approach -- 5.3.3 TOR Usage 5.3.4 Limitations -- 5.4 Mixing Models -- 5.5 Decentralized Mixing -- 5.5.1 Motivation -- 5.5.2 Coinjoin Model -- 5.5.3 Coinjoin Anonymity -- 5.6 Zero-Knowledge Proofs -- 5.6.1 Introduction -- 5.7 Privacy and Security Protocols -- 5.7.1 Introduction -- 5.8 Privacy Coins -- 5.8.1 Introduction -- 5.8.2 The Zero Currencies -- 5.8.3 Zerocoin -- 5.8.4 Zerocash -- 5.9 Exercise -- 5.9.1 Introduction -- References -- Cryptography Foundations -- 6 Blockchain Cryptography: Part 1 -- 6.1 Introduction -- 6.1.1 Cryptography Fundamentals -- 6.1.2 Secrecy Prerequisites -- 6.1.3 Blockchain and Cryptography -- 6.2 Classic Ciphers -- 6.2.1 Substitution -- 6.2.2 Transposition -- 6.3 Modern Cryptographic Algorithms -- 6.3.1 Introduction -- 6.3.2 Vulnerabilities -- 6.4 Hashing -- 6.4.1 Introduction -- 6.4.2 Hash Collisions -- 6.4.3 Merkle-Damgård Construction -- 6.4.4 Length Extension Attack -- 6.5 Secure Hash Algorithm (SHA) -- 6.5.1 Introduction -- 6.5.2 Hash Example -- 6.6 Symmetric Encryption -- 6.6.1 Single Encryption Keys -- 6.6.2 The Hill Cipher -- 6.6.3 The Pohlig-Hellman Cipher -- 6.7 Exercise -- 6.7.1 Introduction -- 6.7.2 Message Prep -- 6.7.3 OpenSSL Setup -- 6.7.4 Message Encryption -- 6.7.5 Message Decryption -- References -- 7 Blockchain Cryptography: Part 2 -- 7.1 Asymmetric Key Schemes -- 7.1.1 Introduction -- 7.1.2 Illustrative Example -- 7.2 Diffie-Hellman-Merkle Key Agreement -- 7.2.1 Introduction -- 7.2.2 An Example -- 7.2.3 Limitations -- 7.3 Rivest, Shamir, and Adelman (RSA) -- 7.3.1 Introduction -- 7.3.2 Key Pairs -- 7.3.3 Intuition -- 7.3.4 An Example -- 7.4 Digital Signatures -- 7.4.1 Introduction -- 7.4.2 Motivation -- 7.4.3 Usage -- 7.4.4 Signatures -- 7.4.5 An Example -- 7.5 Quantum Resistance -- 7.5.1 Introduction -- 7.5.2 Mechanism -- 7.5.3 Shor's Algorithm -- 7.5.4 Grover's Algorithm -- 7.5.5 Imminence -- 7.5.6 Security Considerations 7.5.7 Quantum Resistance -- 7.6 Exercise -- 7.6.1 Introduction -- 7.6.2 Message Prep -- 7.6.3 Key Generation (RSA) -- 7.6.4 Digital Signatures (RSA) -- 7.6.5 Key Generation (Elliptic Curves) -- 7.6.6 Digital Signatures (Elliptic Curves) -- References -- Real-World Applications -- 8 Blockchain in Action: Real-World Applications -- 8.1 Introduction -- 8.2 Currencies -- 8.3 Cross-Border Transfers -- 8.4 Tokenization -- 8.5 Asset Tracking -- 8.6 Commodity Trading -- 8.7 Looking Ahead -- 8.7.1 Humble Beginnings -- 8.7.2 A Word of Caution -- 8.7.3 The Jury Is Still Out -- References -- Index Blockchains (Databases) |
title | Build Your Own Blockchain A Practical Guide to Distributed Ledger Technology |
title_auth | Build Your Own Blockchain A Practical Guide to Distributed Ledger Technology |
title_exact_search | Build Your Own Blockchain A Practical Guide to Distributed Ledger Technology |
title_exact_search_txtP | Build Your Own Blockchain A Practical Guide to Distributed Ledger Technology |
title_full | Build Your Own Blockchain A Practical Guide to Distributed Ledger Technology |
title_fullStr | Build Your Own Blockchain A Practical Guide to Distributed Ledger Technology |
title_full_unstemmed | Build Your Own Blockchain A Practical Guide to Distributed Ledger Technology |
title_short | Build Your Own Blockchain |
title_sort | build your own blockchain a practical guide to distributed ledger technology |
title_sub | A Practical Guide to Distributed Ledger Technology |
topic | Blockchains (Databases) |
topic_facet | Blockchains (Databases) |
work_keys_str_mv | AT hellwigdaniel buildyourownblockchainapracticalguidetodistributedledgertechnology AT karlicgoran buildyourownblockchainapracticalguidetodistributedledgertechnology AT huchzermeierarnd buildyourownblockchainapracticalguidetodistributedledgertechnology |