Abstract
This chapter introduces distributed ledger technology (DLT), its main features, functions, and how different types of platforms are used to solve different challenges. The chapter includes two global supply chain use cases to highlight how different DLT platforms are being commercially used to build trust, data consistency and persistence through the chain of custody for materials as they transform along the supply chain from source to end-use end (and beyond to recycling in one case). Although these use cases are not specific to international security, they are used to manage risks that are similar to those related to treaties governing the non-proliferation of chemical, biological, and nuclear materials such as provenance of trade and movement of materials, and creating greater efficiencies and security in records management and data sharing.
Access provided by Autonomous University of Puebla. Download chapter PDF
Similar content being viewed by others
1 Introduction
There has been no shortage of hype around “the blockchain.” Its publicity has been tied to the rise of cryptocurrencies, from humble beginnings in 2008 in the cryptography community when the idea for Bitcoin was launched to its association a few years later with the illicit trade of drugs on the dark web [1]. The hype reached a frenzy in 2017 as cryptocurrencies rallied, culminating in the absurd as small public companies raced to capitalize by adding blockchain to their name. One, now infamous case, is that of Long Island Iced Tea Corp which announced in December 2017 it was leaving its ready-to-drink tea business to invest in blockchain technology, changed its name to Long Blockchain, and its stock soared by 500% in a day [2]. By January 2018, the U.S. Securities and Exchange Commission was warning public companies against abrupt shifts in names or business strategies to take advantage of crypto and blockchain hype [3]. Even though there are many today who still conflate Bitcoin with blockchain, there is a wider understanding that blockchain is the digital ledger platform underpinning cryptocurrencies which has wider applications than digital currencies. As noted by one FT reporter, “Blockchain is to Bitcoin, what the internet is to email. A big electronic system, on top of which you can build applications. Currency is just one” [4].
Blockchain is a type of distributed ledger technology (DLT). The blockchain is a block series where transactions are grouped and linked together in “blocks,” but not all DLT platforms use blocks. The appeal of DLT is rooted in its ability to establish an immutable system of records management with consensus, and without reliance on a centralized system. DLT creates a shared reality among parties in a way that lowers uncertainty and builds confidence by: (1) providing participants access to the same copy of records in a specific instant; (2) transaction history cannot be changed (immutability) and (3) records are permanently persisted in a way that allows provenance and auditing (auditability) [5]. Major players in the finance, health, and logistics sectors have been testing the technology to understand its potential and many are employing DLT in their global operations.
This chapter will introduce concepts and characteristics of DLT platforms and how its development has propelled use cases for permissioned platforms across enterprises globally. It then describes how DLT works, its main features, and benefits and concludes by providing examples of how the technology is used at the government and industry level.
2 What is Distributed Ledger Technology?
DLT is a set of technologies that enable a consistent representation of data across multiple nodes without a central authority. DLT enables a distributed record or “ledger” in which transactions are stored in a permanent, immutable way with cryptographic techniques, ensuring consistency, provenance, and auditability across the entire ecosystem. Transactions can be easily audited as they are time-stamped and “hashed,” essentially a digital fingerprint that interlinks transactions as they are appended to the ledger.
Essentially, DLT is a database that:
(i) enables a network of independent participants to establish a consensus around (ii) the authoritative ordering of cryptographically validated (“signed”) transactions. These records are made (iii) persistent by replicating the data across multiple nodes, and (iv) tamper evident by linking them by cryptographic hashes. (v) The shared result of the reconciliation/consensus process—the “ledger”—serves as the authoritative version for these records [6].
A distributed ledger is decentralized, removing the need for a central authority to process, verify or authenticate transactions. Centralized ledgers on the other hand have one central authority. The difference between the two types of ledgers is described in Fig. 1.
3 Features of Distributed Leger Technology
The main features of DLT include hashing, immutability, peer to peer protocols, and consensus.
Hashing
The hashing algorithm was invented in the 1940s by Hans Peter Luhn, who created a machine and schemes for parsing information that were designed to work for words and sentences [8]. Today, hashing forms the basis of data authentication and security [9]. Hashing is a one-way function that can be applied to any string of input characters to generate a specific fixed-length output—whether numbers, text, whole documents, large files like videos, or even an entire operating system [10]. Its security value is its unidirectional process whereby anyone can confirm content hashes to a certain value, but it is impossible to derive the original content from the hash. Figure 2 outlines the hashing function.
Immutability
Each block stores the hash of its predecessor, serving as a type of DNA strand that connects each transaction and block on the blockchain. Hashing, coupled with the append only structure of DLT, provides for immutability in which a transaction cannot be changed after it is recorded on the ledger as depicted in Fig. 3. If Transaction A was modified to Transaction A’, then Block 2 would be stored as #A’BCD which would no longer correspond to the previous hash in Block 3.
Peer-to-Peer (P2P)
In its simplest form, a peer-to-peer network is created when two or more devices are connected and share resources without going through a separate server. The concept of peer-to-peer networking has been around since 1969, but the first dial-up P2P network, Usenet, was created in 1980 as a worldwide internet discussion system [10]. DLT uses P2P to avoid the prevalent server—client structure by allowing network participants to exchange data that is verified and stored by the network. DLT’s P2P architecture allows all transactions to be transferred to all network participant nodes, where each keeps a complete copy of the ledger and compares it to the other nodes to ensure that the transaction is accurate [11]. P2P networking is a distributed architecture as opposed to the traditional server-based architecture as depicted in Fig. 4.
Consensus
Consensus protocols are the rules and methods by which transaction validation is settled on by nodes in a distributed ledger. Consensus is the trust mechanism for authentication and access controls. Early protocols developed in the 1980s and 1990s relied heavily on a cryptographic primitive known as ‘Chaumian Blinding’ which is the method of performing a transaction without having to know who is present from both sides of the transaction, including the time and content. Chaumian Blinding was invented by David Lee Chaum and published in the paper “Blind Signatures for Untraceable Payments” in 1982 [12].
Early attempts at developing digital currencies led to advances in consensus where algorithms developed to limit denial of service attacks (such as that used by Hashcash in 1987) [13] or to use computing power to solve cryptographic puzzles which were time stamped and added to the next puzzle to form a chain of records as with Bit gold which was launched in 1998 [14]. Its founder Nick Szabo also proposed “a solution to secure namespaces and similar problems as well as the problem of securely recording agreements on traditional property rights” and “how new developments in replicated database technology allows for the secure management and transfer of ownership for a wide range of property” [15]. Wei Dai also published a paper titled “b-money, an anonymous distributed electronic cash system” in 1998, which identified the core concepts later adopted by Bitcoin and other cryptocurrencies, such as solving computational puzzles and decentralized consensus [16], but it was limited in explaining how decentralized consensus could be implemented [17]. With Bitcoin, financial incentives were added for maintaining the connected copies of the ledger which became the foundation for the proof of work consensus [18].
These advances in turn helped to evolve DLT platforms into three different categories based on how consensus is organized: open/permissionless, permissioned, and hybrid.
Open DLT platforms are open to the public, allowing anyone to participate. Many public cryptocurrency platforms including Bitcoin use a “Proof of Work (PoW)” consensus as noted above in which a node validates the next block by being the first to solve a computer-intensive puzzle. The likelihood of a new block being validated depends on the computing power assigned to the task. The node (miner) will get a certain amount of crypto assets or transaction fees as a reward for validating a block. Because the miners get incentives, they support and secure the network, allowing it to become profitable rather than attacking it and making it unprofitable. Another consensus mechanism, “Proof of Stake (PoS)” is a method where, instead of PoW’s energy intensive computations, an established stake in a specific distributed ledger system is used to achieve consensus. Nodes involved in the consensus method are compensated by collecting transaction fees included in each block that they are the first to successfully validate.
Permissioned DLT platforms restrict access to a specific set of participants. Permissioned, enterprise platforms are rapidly advancing as more enterprises/consortiums are developing them to meet specific scalability and governance requirements within different business models and their global operations [24]. For example, Hyperledger Fabric uses “endorsement policies” in which a set of policy requirements guide the acceptance of such transactions by network users. Indeed, Hyperledger Fabric [19] is one of the most well-known and widely used system for deploying and operating permissioned platforms. Launched in 2015, Hyperledger was put under the Linux Foundation when many organizations wanted to achieve more by working together to create open-source frameworks, tools, and libraries for enterprise blockchain solutions [20]. It provides an option for allowing only approved parties to replicate data on the platform, providing the benefits of DLT for decentralized consensus, immutability, data integrity and authentication [21]. Circulor, one of the use cases discussed in the case study section below, uses Hyperledger Fabric.
Consensus mechanisms in permissioned platforms are faster and more energy efficient than for open platforms. Since security is managed by access control, permissioned ledgers need less processing resources to maintain consistency, and the benefits of speed and reliability are likely to be maintained. For example, Bitcoin can process a transaction at a rate of 5 to a maximum of seven tps (transactions per second). If the transaction is complex, with five inputs, the rate is two tps, but theoretically ten tps, and the transaction must wait for a new block to be processed, which could take up to ten minutes. A permissioned DLT framework. such as the Hyperledger Fabric can process 20,000 transactions per second [22] while Guardtime’s KSI can process billions per second [23]. However, new permissionless blockchain platforms such as Avalanche and Algorand, both for decentralized finance, are on the rise, with tps exceeding 1000. Avalanche is a new blockchain network developed by Ava labs that employs a proof of stake consensus mechanism to achieve high throughput, which is expected to exceed 4500 tps [24]. On the other hand, according to company website, Algorand is “the world’s first pure proof-of-stake foundational blockchain designed for the future of finance,” [25] and it aims to increase throughput to 46,000 tps from 10,000 tps [26].
Guardtime’s KSI is the platform underlying Estonia’s e-government system. Guardtime was founded in 2007, the same year that cyber-attacks on Estonia took down government communications, banking services and media outlets. In 2008, Guardtime was contracted for certifying the integrity of the digital registries and repositories and [27] by 2012, Estonia became the first nation to adopt DLT as a layer within its government structures.
Open DLT platforms and permissioned platforms both use distributed data structures and consensus to validate transactions but with different assumptions to solve different sets of problems. The Bitcoin blockchain for example solves the issue of double spending while Guardtime focuses on governance, applying DLT at an operational level beyond cryptocurrency.
Hybrid distributed ledger platforms combine the privacy advantages of a permissioned distributed ledger system with the protection and accountability advantages of permissionless distributed ledger systems. This gives organizations flexibility in deciding what information they want to make public and what information they want to keep private [28]. Governments, for example, can use hybrid DLT in a voting system [29] where they can verify a voter or auditor prior to participation while also making the voting system transparent and publicly auditable. For example, Voatz was used in West Virginia during the 2018 U.S. midterm elections, [30] by Denver County during the 2019 US Municipal Election, and by Utah County during the 2020 US Presidential Election [31].
Figure 5 outlines the main differences between open and permissioned DLT platforms.
4 What is in a Block?
A block is composed of a block header and records of transactions. The block header contains block number, current timestamp that captures the date and time to ensure a record of a chronological sequence, the hash of a previous block to link the blocks together and the hash of what is called the “Merkel Root” which allows easy composition and verification of larger data sets of transactions.
In public DLT platforms, a block header includes the “nonce,” a random sequence of numbers that the miners must find to validate the blocks. It refers to the first number a blockchain miner needs to discover and include in a block [32]. Miners stop calculating the nonce once they find one that works, allowing them to submit their block for approval by the rest of the nodes. It is important to note that a nonce is difficult to calculate which in turn makes it difficult to work out a block with different data and ruin consensus. It is also considered a way to cut out the less talented miners from the system [33]. To provide an additional level of security, permissioned DLT platform nodes include an access-control layer. In addition to the other components of a block, digital signatures are an important component used to prove transaction ownership.
The first block in any blockchain-based protocol is called the genesis block. Every block stores a reference to the previous block other than the genesis block; the technology uses cryptographic signatures (hashes) to facilitate this. Figure 6 outlines the contents of a block.
5 How DLT Records Transactions
The steps involved in transactions in a permissioned DLT are depicted in Fig. 7 [34].
Step 1:
A DLT transaction requires a digital asset, or a document. The transaction is requested by a participant to upload a document to the platform.
When a transaction is submitted, a key pair is generated by the requester, including a public key that is made available to other network participants. A key-pair is generated only once, not every time a transaction is submitted. The requester then hashes the data to be sent, converts it into a new digital string of predefined and fixed hash length. The hash is signed with the private key using public–private key cryptography. The requester then transmits the digital signature to participants in the peer-to-peer network with the plaintext data.
Step 2:
Transaction is broadcasted to peer-to-peer network participants—the receivers, often called nodes—and added to an unvalidated transaction pool.
Step 3:
Receivers—in the case of permissioned blockchains, authorized nodes—validate the transaction using the requester’s public key to decrypt the transaction. A successful decryption confirms that the transaction originates from the claimed sender. The network participants can then verify the integrity of data by comparing the decrypted hash value sent by the sender with the hash value that was computed when applying the same hash algorithm on the plain data transmitted by the sender.
Validated transactions are combined with other transactions to create a block that is then validated based on the consensus protocol of the platform. If validated, the new block is linked to the chain as the “true state of the ledger.”
Step 4:
Once the transaction has been validated, it is time-stamped and linked to the preceding blocks/transactions with a “hash pointer”—a hash of the previous block/transaction—thereby forming a linear chronological chain of blocks/transactions.
The transaction is then confirmed, and the block/transaction cannot be altered or removed—thus, the block/transaction is immutable. Each time a block/transaction is added to the chain, the digital ledger is updated on all the participating nodes.
6 Operationalizing DLT
The following case studies provide examples of various DLT platforms currently being used. The first is the case of Circulor, a software company that has developed a solution for tracking raw materials and proving their provenance [35]. Second, the AURA platform, the world's first global blockchain designed to assist consumers in tracing the provenance and authenticity of luxury goods [36]. The two use cases are from vastly different fields. They do, however, share one feature: they both involve multiple stakeholders dealing with confidential or proprietary information on a global scale. They also address questions regarding various types of platforms: how to connect specific physical objects or analog resources to specific digital content or digital twins in a tamper-proof manner; how to create clarity to opaque areas of activity; and how counterfeiting can be mitigated.
6.1 Circulor and Volvo—Tracking Cobalt from the Congolese Mines to Car Batteries
The Cobalt Supply Chain involves a complex web of highly diverse actors upstream, which is further complicated by difficult political conditions, corruption, and other general conditions, especially for foreign companies. The lack of transparency begins in the mines, where child labor and exploitation are common issues. One third of the cobalt mined in the Democratic Republic of Congo (DRC) is extracted by hand by independent miners, which represents around 20% of the global supply [37]. Cobalt is then sold to traders and large mining companies, making it difficult to know whether it comes from sustainable and ethical sources. Once cobalt leaves the mines, it passes through a number of actors and intermediaries that often cover all five continents [38]. These actors include miners, smelters, refiners, precursor and cathode producers, and battery manufacturers. As is often the case with traditional supply chains, intermediaries usually know only the immediate supplier or customer in the chain. Mistrust and competition define the relationship between the parties concerned.
Circulor pioneered its technology platform for tracking the cobalt supply chain in 2017 by combining DLT and other technologies to create an immutable chain of custody record for materials as they transform during their journey from source to end-use in a car. DLT was chosen in addition to database technology for three main reasons. Firstly (and primarily) for its immutability, given that it involves multiple parties creating a digital chain of custody. Secondly, because the chain of custody must persist through the entire circular economy of the battery (the battery passport): through in-life uses and then on to recycling. Thirdly, because the solution needs to be able to interoperate and connect with other systems and networks.
At each point of the supply chain, a different data handling system, sometimes even manual paperwork, is in place, making collaboration difficult and transparency almost impossible. Moreover, the raw materials, by their nature, are difficult to reliably tag—the material transforms on its journey from source to end-use; thus, after each transformation, a new identity must be added which inherits the origin of the material and destroys the old identity. Cobalt ore, for example, is transformed into cobalt hydroxide and is further combined with nickel and manganese at different ratios depending on the chemistry to form the precursor. The precursor is then processed into cathode and produced into cells that are then inserted into batteries or electric vehicles. The end product bears no resemblance to the original mined material.
Circulor pioneered its technology platform for tracking the cobalt supply chain in 2017 by combining DLT and other technologies to create an immutable chain of custody record for materials as they transform during their journey from source to end-use in a car. The system provides materials with a unique identity and then tracks their flow as it changes through processing and manufacturing. The system uses IoT and tags to generate digital twins, as well as machine learning to detect anomalies and combat fraud, as well as identify supply chain weaknesses to target due diligence and compliance activities. Circulor currently uses AI for image analysis to ensure security by detecting and recognizing objects. In mid-February 2020, the Swedish car manufacturer Volvo Cars released its first fully electric vehicle, the XC40 Recharge, whose cobalt supply chain is fully traceable on the Circulor platform [39].
Given that some of the data can be sensitive, Circulor uses a private permissioned blockchain—Hyperledger Fabric—to preserve the privacy of participants as well as their data. Furthermore, Oracle Cloud Services provides enterprise-level security and in-depth authentication capabilities and is used to manage access rights and ensure security, reliability, and availability of data. Circulor’s customers and participating organizations determine the access rights of users within their organization and private channels on the blockchain ensure that sensitive data can be shared within an organization, without providing visibility to the broader supply chain network [40].
There are several options to upload data to the blockchain [40]:
-
1.
The data can be provided to the blockchain via system integration using RESTful Web Service Application Programming Interface (API) with security and authentication protocols. RESTful APIs are available as integration points from any existing IT system to the Circulor system to securely provide digital chain of custody information that is updated on the blockchain—serving as an immutable record of traceability and provenance. Data transmission using RESTful APIs is secured via state-of-the-art privacy protocols including the use of Secure Sockets Layer (SSL) encryption providing an end-to-end encrypted link to the customer and the Circulor system, in addition to OAuth 2.0 authentication. These measures ensure that data is protected and only visible to authorised users.
-
2.
Via the desktop application, data can be manually entered or uploaded.
-
3.
The mobile application can be used to upload data via scans and manual entry to ensure an inclusive low barrier to entry for all participants.
Circulor uses other technology to prove that the data entered into the system is correct, such as AI, GPS fencing, and facial recognition, because validation has to happen before the data enters the system. Material verification begins at source throughout the supply chain. Circulor uses DLT in conjunction with mine site inspections, GPS tracking, entry and exit scanning, verified logistics providers, facial recognition, Id checks and time tracking, which contribute to the traceability of materials from the mine to the car factory [40]. Registered users in the field are checked using facial recognition via an app. The material is registered in the system with checks on the location of origin and checks to counter the risk that the material is imported from other locations. Each material badge is tagged with a tamper-proof QR-code generated by the Circulor system. The QR code specifies the time, location, weight, person delivering the badge and the person receiving the badge. The number of QR codes issued on that day is registered. In addition, the app that scans the QR code can only be used in a predefined radius. Each anomaly is automatically flagged in the system.
The material will be transported through purchase or sorting centers to raw refining smelters, where the material (cobalt hydroxide) is processed. This product is then shipped, usually to China, for the next steps in refining. The refined material is used to make the cathode for the cells of the battery. In the mid-stream of this supply chain, data is collected directly from the production control and management systems used at each stage via the API.
In addition, Circulor uses a number of verification tests, such as elapsed time or mass balance, to check that there are no anomalies and that the chain of retention of the material is maintained to ensure that the input components of each process can be reliably linked to the output. This process takes place at every step of the battery that is eventually installed in a car. The solution needed to extend Volvo Cars entire battery supply chain for electric vehicles (EV) to ensure full traceability of cobalt from source to the EV itself.
The aim was to manage the risk and demonstrate with as much certainty as possible that material that was produced responsibly throughout the supply chain at every stage. Following the success of this work, Volvo Cars is now extending the use of the platform to other mining materials.
6.2 AURA—A Consortium Model Powered by Ethereum Quorum
According to official figures, counterfeit products cost the European Union's apparel, footwear, and accessories industry approximately €26.3 billion (approximately US$27.7 billion) each year [41]. According to the OECD and the EU's Intellectual Property Office, global imports of counterfeit and pirated goods are worth nearly half a trillion dollars per year, or about 2.5% of global imports [42]. In the United States and Europe, counterfeiting/intellectual property (IP) theft are federal and state crimes “that involve the production and distribution of goods in the name of another person without their permission” [43]. Counterfeit goods are typically made from lower-quality components sold at a low-cost to imitate well-known and trusted brands [43].
DLT is a better solution than traditional databases in this case because a traditional database is centrally managed by a trusted administrator, whereas blockchain is jointly owned by a consortium. Furthermore, the luxury goods industry requires a data store that can be written to and accessed by multiple parties such as luxury brand designers, manufactures and distributers, and DLT is a more cost-effective and trustworthy solution than a traditional database. DLT also outperforms traditional databases in terms of historical tracking for auditability and transparency.
Many specialized actors are involved in the luxury goods industry, including designers, producers of raw materials, manufacturers, and distributors. LVMH Moët Hennessy Louis Vuitton commonly known as LVMH, is a French multinational corporation and conglomerate specializing in luxury goods, headquartered in Paris, France [44]. LVMH collaborated with Microsoft and blockchain software company ConsenSys to develop the AURA platform, a hybrid DLT system aimed at serving the entire luxury industry with product tracking and tracing services based on Ethereum and utilizing Microsoft Azure [45]. With AURA, consumers can track the lifecycle of their products, from design and raw materials to manufacturing, and distribution. The platform is built on Traceability Smart Contracts (ERC 721 non-fungible token standards [46]) and the AURA blockchain infrastructure, a permissioned consortium network based on Quorum to ensure no information in leaked between brands or their customers [47].
The platform is hybrid, meaning some procedures and information are kept private while others are made public. The most significant advantage of using a hybrid platform is having more control over the network. AURA runs behind the brands using it. During production, each product is irreproducible and contains unique information, which is recorded on the shared ledger. At the time of purchase, a consumer can use the brand's application to receive the AURA certificate containing all product information. It could, for example, identify an individual handbag and trace its entire lifecycle from an alligator farm to the store where it was first sold, and then multiple chains of owners who have owned and sold it [48].
The AURA platform is an example of how DLT provides transparency and a single source of truth for the consumer: it ensures the authenticity of the product, provides details on product origin and components (including ethical and environmental information), instructions for product care, and the after-sales and warranty services that are available.
7 Conclusion
Advances in distributed ledger technology over the past ten years have propelled the technology forward both in public and permissioned applications. Permissioned systems have allowed DLT to be adopted in global operations, streamlining, and securing records management across consortiums while tracking supply chains and their materials. These enterprise solutions have moved DLT beyond the hype, demonstrating its ability to provide wide ranging benefits which in turn may benefit applications for international security.
Although the use cases in this chapter are not specific to international security, they are used to manage risks to commercial supply chains that are similar to challenges faced in the implementation of non-proliferation treaties governing nuclear, chemical, and biological materials and technology where immutability, trust, and a single source of truth would benefit industry and regulators.
References
Silk Road (2011–2013) was a digital marketplace mostly for trading illegal drugs on the dark web which used payments in bitcoin. For a good read on Silk Road’s rise and fall see: Bearman J (2015) Silk road: the untold story, Wired. https://www.wired.com/2015/05/silk-road-untold-story/. Accessed 8 Feb 2021
Kosoff M (2017) Iced tea company changes name to long blockchain, stock immediately skyrockets. https://www.vanityfair.com/news/2017/12/iced-tea-company-changes-name-to-long-blockchain-stock-immediately-skyrockets. Accessed 8 Feb 2021
Tepper F (2018) SEC warns against public companies adding blockchain to their name. https://techcrunch.com/2018/01/25/sec-warns-against-public-companies-adding-blockchain-to-their-name/. Accessed 8 Feb 2021
Marr B (2018) A very brief history of blockchain technology everyone should read. https://www.forbes.com/sites/bernardmarr/2018/02/16/a-very-brief-history-of-blockchain-technology-everyone-should-read/?sh=1cb5419d7bc4. Accessed 10 Feb 2021
Warburg B (2016), How the blockchain will radically transform the economy, TED Talk. https://www.ted.com/talks/bettina_warburg_how_the_blockchain_will_radically_transform_the_economy. Accessed 10 Feb 2021
Rauchs M et al (2018) Distributed ledger technology systems. Cambridge Center for Alternative Finance. https://www.jbs.cam.ac.uk/wp-content/uploads/2020/08/2018-10-26-conceptualising-dlt-systems.pdf. Accessed 27 Apr 2021
Persi Paoli G, Vestergaard C (2021) Exploring distributed ledger technology for arms control and non-proliferation: a primer. UNIDIR. https://www.unidir.org/publication/exploring-distributed-ledger-technology-arms-control-and-non-proliferation-primer. Accessed 10 Sept 2021
Stevens H (2018) Hans Peter Luhn and the birth of the hashing algorithm. https://spectrum.ieee.org/tech-history/silicon-revolution/hans-peter-luhn-and-the-birth-of-the-hashing-algorithm. Accessed 28 Apr 2021
Vestergaard C et al (2020) SLAFKA—demonstrating the potential for distributed ledger technology for nuclear safeguards information management. https://www.stimson.org/2020/slafka/. Accessed 20 Feb 2021
Touron M (2019) What you should know about the history of P2P https://manfred.life/history-p2p. Accessed 28 Apr 2021
Sharma T.K (2020) Blockchain & role of P2P Network. https://www.blockchain-council.org/blockchain/blockchain-role-of-p2p-network/. Accessed 20 Apr 2021
Chaum D (1982) Blind signature for untraceable payments. http://www.hit.bme.hu/~buttyan/courses/BMEVIHIM219/2009/Chaum.BlindSigForPayment.1982.PDF. Accessed 20 Apr 2021
Back A (2002) Hashcash—a denial of service counter-measure. http://www.hashcash.org/papers/hashcash.pdf. Accessed 20 Apr 2021
Szabo N (2008), Unenumerated—an unending variety of topics, bit gold. https://unenumerated.blogspot.com/2005/12/bit-gold.html. Accessed½ 25 Apr 2021
Szabo Nick (1998) Secure property titles with owner authority. https://nakamotoinstitute.org/secure-property-titles/. Accessed 25 Apr 2021
Dai W (1998) B-money. http://www.weidai.com/bmoney.txt. Accessed 25 Apr 2021
Buterin V (2013) Ethereum whitepaper: a next generation smart contract and decentralized application platform. https://ethereum.org/en/whitepaper/. Accessed 30 Apr 2021
Narayanan, A et al (2016) Bitcoin and cryptocurrency technologies. https://www.lopp.net/pdf/princeton_bitcoin_book.pdf. Accessed 30 Apr 2021
Hyperledger (2021) Advancing business blockchain adoption through global open-source collaboration. https://www.hyperledger.org. Accessed 25 Apr 2021
Hyperledger (2018) An introduction to Hyperledger, V1.1. https://www.hyperledger.org/wp-content/uploads/2018/08/HL_Whitepaper_IntroductiontoHyperledger.pdf. Accessed 26 Apr 2021
Androulaki E et al (2018) Hyperledger fabric: a distributed operating system for permissioned blockchains. https://arxiv.org/pdf/1801.10228.pdf. Accessed 8 Feb 2021
Gorenflo C et al (2019) FastFabric: scaling Hyperledger Fabric to 20,000 transactions per second. https://arxiv.org/pdf/1901.00910.pdf. Accessed 8 Feb 2021
Guardtime (2017) Federal keyless signature Infrastructure (KSI) technology: an introduction to KSI Blockchain technology and its benefits, http://blockchain.machetemag.com/wp-content/uploads/2017/11/Guardtime_WhitePaper_KSI.pdf. Accessed 7 Feb 2021, p 8
Avalanche (2021) Why Avalanche? https://www.avalabs.org/why-avalanche. Accessed 11 May 2021
Algorand. https://www.algorand.com/. Accessed 20 Apr 2021
Algorand (2021) What to expect in 2021. https://community.algorand.org/blog/algorand-what-to-expect-in-2021/. Accessed 20 May 2021
Guardtime (2016) Lifetrack medical systems upgrades its digital radiology platform with Guardtime’s KSI blockchain technology. https://guardtime.com/blog/lifetrack-medical-systems-upgrades-its-digital-radiology-platform-with-guardtime-s-ksi-blockchain-te. Accessed 25 Apr 2021
International Telecommunications Unit (2019) ITU-T focus group on application of distributed ledger technology (FG DLT): technical report FG DLT D1.2, p 2. https://www.itu.int/en/ITU-T/focusgroups/dlt/Documents/d12.pdf. Accessed 21 May 2021
Geronion D (2021) Hybrid blockchain: the best of both worlds https://101blockchains.com/hybrid-blockchain/. Accessed 21 May 2021
Voatz (2021) Secure, Accessible voting at your fingertips. https://voatz.com/. Accessed 21 Mar 2021
Specter A et al (2020) The ballot is busted before the blockchain: a security analysis of Voatz, the first internet voting application used in U.S. federal elections. https://internetpolicy.mit.edu/wp-content/uploads/2020/02/SecurityAnalysisOfVoatz_Public.pdf. Accessed 21 May 2021
Antonopolous A (2014) Mastering bitcoin. O’Reilly, Sebastol. https://www.oreilly.com/library/view/mastering-bitcoin/9781491902639/ch08.html. Accessed 15 Feb 2021
Frankenfield J (2021) Nonce. https://www.investopedia.com/terms/n/nonce.asp. Accessed 15 Feb 2021
101 Blockchains (2020) How blockchain records all the transactions? Fundamentals explained. https://101blockchains.com/blockchain-records-transactions/. Accessed 10 June 2021
Circulor (2021) About. https://www.circulor.com/about. Accessed 10 June 2021
The AURA blockchain consortium. https://auraluxuryblockchain.com/. Accessed 15 June 2021
Walt V (2018) Blood, sweat and batteries. https://fortune.com/longform/blood-sweat-and-batteries/. Accessed 20 Mar 2021Volvo (2019)
Mancini L et al (2020) JRC technical report: responsible and sustainable sourcing of battery raw materials. https://publications.jrc.ec.europa.eu/repository/bitstream/JRC120422/surebatt_report_final_26_06_2020_%281%29.pdf. Accessed 20 Mar 2021
Available at Volvo cars to implement blockchain traceability of cobalt used in electric car batteries. https://www.media.volvocars.com/global/en-gb/media/pressreleases/260242/volvo-cars-to-implement-blockchain-traceability-of-cobalt-used-in-electric-car-batteries. Accessed 15 Feb 2021
Written communication with Circulor. 10 May 2021
EUIPO (2021) The economic cost of IPR infringement in the clothing, footwear and accessories sector. https://euipo.europa.eu/ohimportal/en/web/observatory/ip-infringements_clothing-accessories-footwear. Accessed 17 Apr 2021
OECD (2016) Global trade in fake goods worth nearly half a trillion dollars a year—OECD & EUIPO. https://www.oecd.org/industry/global-trade-in-fake-goods-worth-nearly-half-a-trillion-dollars-a-year.htm. Accessed 17 Apr 2021
IACC (2021) What is counterfeiting? https://www.iacc.org/resources/about/what-is-counterfeiting. Accessed 26 Mar 2021
LVMH (2021). https://www.lvmh.com/. Accessed 26 Mar 2021
ConsenSys (2019) LVMH, consensys, and microsoft announce consortium for luxury industry. https://consensys.net/blog/press-release/lvmh-microsoft-consensys-announce-aura-to-power-luxury-industry/. Accessed 27 Mar 2021
Ethereum (2021) ERC 721 non-fungible token standard. https://ethereum.org/en/developers/docs/standards/tokens/erc-721/. Accessed 27 May 2021
Quorum (2021). https://consensys.net/quorum/. Accessed 27 Mar 2021
Allison I (2019) Louis Vuitton owner LVMH is launching a blockchain to track luxury goods. https://tokenlandia.com/news/louis-vuitton-owner-lvmh-is-launching-a-blockchain-to-track-luxury-goods/. Accessed 24 Mar 2021
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Vestergaard, C., Bobosha, H.A., Langfeldt, K. (2021). Distributed Ledger Technology: Beyond the Hype. In: Vestergaard, C. (eds) Blockchain for International Security. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-86240-4_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-86240-4_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-86239-8
Online ISBN: 978-3-030-86240-4
eBook Packages: Computer ScienceComputer Science (R0)