Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Foundations of Blockchain
  • Toc
  • feedback
Foundations of Blockchain

Foundations of Blockchain

By : Koshik Raj
close
Foundations of Blockchain

Foundations of Blockchain

By: Koshik Raj

Overview of this book

Blockchain technology is a combination of three popular concepts: cryptography, peer-to-peer networking, and game theory. This book is for anyone who wants to dive into blockchain from first principles and learn how decentralized applications and cryptocurrencies really work. This book begins with an overview of blockchain technology, including key definitions, its purposes and characteristics, so you can assess the full potential of blockchain. All essential aspects of cryptography are then presented, as the backbone of blockchain. For readers who want to study the underlying algorithms of blockchain, you’ll see Python implementations throughout. You’ll then learn how blockchain architecture can create decentralized applications. You’ll see how blockchain achieves decentralization through peer-to-peer networking, and how a simple blockchain can be built in a P2P network. You’ll learn how these elements can implement a cryptocurrency such as Bitcoin, and the wider applications of blockchain work through smart contracts. Blockchain optimization techniques, and blockchain security strategies are then presented. To complete this foundation, we consider blockchain applications in the financial and non-financial sectors, and also analyze the future of blockchain. A study of blockchain use cases includes supply chains, payment systems, crowdfunding, and DAOs, which rounds out your foundation in blockchain technology.
Table of Contents (14 chapters)
close

Digital signatures in blockchain

Digital signatures are a product of asymmetric key cryptography, and they are a great way of establishing trust between parties in a trustless environment. As mentioned at the beginning of this chapter, digital signatures are used in the application layer of the blockchain. They are mostly used to validate the events in transactions that are inserted in the blocks. They are used to validate the transactions, since verification can be performed by anyone who possesses the public key of the generated public-private key pair.

The asymmetric key cryptography provides a way to identify an entity. Anyone can prove the identity by owning the private key. Creating an identity for the participants allows them to perform operations such as asset management. We will explore digital identity and asset management in depth in this section in order to understand...

bookmark search playlist download font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete