the blockchain identity january 15 2018 abridged printcharvey/teaching/... · • provide proof of...

53
The Blockchain Identity Campbell R. Harvey Duke University and NBER Revised January 19, 2018 Innovation and Cryptoventures

Upload: others

Post on 24-May-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

The Blockchain Identity Campbell R. Harvey

Duke University and NBER

Revised January 19, 2018

Innovation and Cryptoventures

Page 2: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

3Campbell R. Harvey 2018

Page 3: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

Blockchain is a technology

There is no “the” blockchain… blockchain is a technology. • Concept invented by Haber and Stornetta (1991) in the context of time‐stamping digital documents.

• Also, blockchain is not bitcoin. Bitcoin uses a blockchain technology.

4Campbell R. Harvey 2018

Page 4: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

Blockchain is a ledger

A very special ledger…• Quickly and easily accessed and shared by many  ‐‐ distributed

• Various levels of transparency depending on application

• Immutable (you can only add to it – you cannot alter history)

• Cryptographically secured

5Campbell R. Harvey 2018

Page 5: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

What can blockchain technology do?

Solves many problems• Verification of ownership (quickly check the immutable history recorded on a blockchain to see if someone owns something)

• Efficient exchange of ownership (direct transactions without middle person, everybody treated the same whether customer, retailer or banker).

6Campbell R. Harvey 2018

Page 6: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

Imagine …

Buying and selling stock with t0 settlement• Today is t+3 not much different than the 1920s

• All stock transactions would reside in a secure ledger devoted to a company’s equity

7Campbell R. Harvey 2018

Page 7: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

Imagine …

Closing on a property with• No title insurance• Minimal legal• No title search• Simply consult a secure ledger that establishes the person you are buying the house from actually owns it

8Campbell R. Harvey 2018

Page 8: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

Imagine …

Instantly transferring funds between accounts• Transfers are not immediate today – even within your own bank!

• Transfers are secure and inexpensive

9Campbell R. Harvey 2018

Page 9: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

Imagine …

The end of counterfeiting• Massive number of counterfeit bills in circulation

10Campbell R. Harvey 2018

Page 10: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

Imagine …

Starting your car with your thumb print or your face• A secure ledger is checked to verify that you own the car

11Campbell R. Harvey 2018

Page 11: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

Prime targets of disruption

Any situation with a thick layer of middle people• Blockchain is fundamentally a P2P technology. 

12Campbell R. Harvey 2018

Page 12: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

Types of blockchains

Public blockchains• Trustless. Original example bitcoin blockchain. Open source code.• Ethereum blockchain allows for contracting and is the main choice for most corporate applications. Contracts can be conditional, if then statements. Bitcoin blockchain cannot do this.

• Variety of mechanisms to ensure security (Proof of Work, Proof of Stake, Proof of Authority, Zero Knowledge Proof, etc.)

13Campbell R. Harvey 2018

Page 13: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

Types of blockchains

Private blockchains• Trust required. • Need to determine if the cost of trustlessness is worth it. Most applications today involve trust. Combining blockchain technology with trust allows for much more efficient transactions (think of payments)

14Campbell R. Harvey 2018

Page 14: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

Original blockchain

Let’s start with the bitcoin blockchain:• A distributed, secure, transparent, public ledger that establishes ownership and allows for the efficient exchange of ownership

• Available to anyone for download on the Internet (decentralized)• Does not depend on trust (controlled by no one – monitored by everyone)

• Backed by strong cryptography secured by the world’s most powerful network of computers

• Miners provide security and are rewarded with new cryptocurrency

15Campbell R. Harvey 2018

Page 15: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

Original blockchain

How powerful?• Currently 80,704,290 petaFLOPS• #1 supercomputer is Sunway TaihuLight at           93 PetaFLOPS

• Sum of top 500 is only 593 petaFLOPS• Blockchain uses specialized hardware and floating point operations are not needed. Cost of 50% of  the network power is about $1 billion

http://bitcoincharts.com/bitcoin/ http://www.top500.org/ https://www.top500.org/statistics/perfdevel/mFLOP=1 million operations  per second16Campbell R. Harvey 2018

Page 16: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

Hashing 101

A simple hashSuppose I send an email to Danielle. However, she needs to verify that what I sent her is exactly what he received. • Email contains a single word “hello”.• Encode the word (a=1, b=2, …, z=26), so 8 5 12 12 15.• Multiply the numbers to get 86,400.• I post the hash on my website. After Danielle gets my email, she does the same hash and checks my website. 

• If the message was corrupted the hash will not match, for example,  “hallo”= 8x1x12x12x15=17,280 which does not match the original.

• This hash is too simple (e.g. hello=ohell) and causes a “collision”17Campbell R. Harvey 2018

Page 17: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

Hashing 101

SHA‐256 (Secure Hashing Algorithm)http://www.xorbin.com/tools/sha256‐hash‐calculator

Hashing is a one‐way function. Hashing is not “encryption” because you can’t decrypt.For example, passwords are routinely stored on websites in hashed form.The output of a SHA‐256 is 256 bits no matter how big the inputLet’s do some examples:

18Campbell R. Harvey 2018

Page 18: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

Hashing 101

SHA‐256 (Secure Hashing Algorithm)http://www.xorbin.com/tools/sha256‐hash‐calculator

Let’s hash the phrase: “Hello, world!” with a special number appended. No spaces. Do it three times for three different strings.Hello, world!0   Hello, world!1   Hello, world!4250

19Campbell R. Harvey 2018

Page 19: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

Hashing 101

How many combinations in a SHA‐256 hash?• Need 2255 = 1.15*1077 guesses• Which is roughly the number of atoms* in the known universe!

*Number of atoms between 1078 to 1082 http://www.universetoday.com/36302/atoms‐in‐the‐universe/20Campbell R. Harvey 2018

Page 20: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

Hashing 101

SHA‐256 hashes widely used for email and file transfer• Returning to the email example, I want to send a file to Danielle• I SHA‐256 the file• I send Danielle the original file• Danielle does her own SHA‐256 hash of the file• Danielle checks to see if her hash of the file matches the hash that I have on my website

• If there is any difference, the file has been corrupted• This all happens automatically and is called “checksum”

21Campbell R. Harvey 2018

Page 21: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

Hashing 101SHA‐256 appears in Wall Street Journal

22Campbell R. Harvey 2018

Page 22: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

How does the bitcoin blockchain work?

Every transaction ever made on this blockchain is public• Ledger is append‐only and immutable• Serves as a basis of trust• Can store (limited) metadata as well as transactions

23Campbell R. Harvey 2018

Page 23: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

How does the bitcoin blockchain work?

Ledger broken up into 10 minute “blocks”● Every block contains a hashed reference to the block before it so you can 

trace every transaction all the way back to 2009

24Campbell R. Harvey 2018

Page 24: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

How does the bitcoin blockchain work?

Example. In block 1000, I buy a car (for 17 BTC) from John

25Campbell R. Harvey 2018

Page 25: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

How does the bitcoin blockchain work?

Suppose I edit the block on my computer – to give me 17 BTC!I then broadcast to the network

Nefarious action 26Campbell R. Harvey 2018

Page 26: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

How does the bitcoin blockchain work?

Even making that small change results in a very different block hash. It no longer matches what is stored in block 1001.

27Campbell R. Harvey 2018

Page 27: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

How does the bitcoin blockchain work?

Blockchain clients automatically compute the hash themselves ‐ if no match, they reject the block ‐ Check other peers in the network for correct block 

28Campbell R. Harvey 2018

Page 28: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

How does the bitcoin blockchain work?

But there is more to it! Here is where the miners come in.• Miners group the current transactions together and take a hash of the 

transactions plus a “magic number” – called a “nonce”.

29Campbell R. Harvey 2018

Page 29: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

How does the bitcoin blockchain work?

But there is more to it! Here is where the miners come in.• Miners try different nonces to get a special hash that has a certain number 

of leading zeros• More leading zeroes means fewer solutions – and more time to solve the 

problem• Think of shuffling 5 decks of cards. You goal is to turn over 5 aces of spades 

in the first five cards! That will be a lot of shuffling.

30Campbell R. Harvey 2018

Page 30: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

How does the bitcoin blockchain work?

But there is more to it! Here is where the miners come in.• Current difficulty is 18 leading zeros! Probability = (1/16)18• Odds of winning two Powerball jackpots* in a row approx (1/16)15• Someone finds the winning hash approximately every 10 minutes• This means 3.4 billion gigahashs calculated every second**• System is immune to increases in computing speed – the difficulty 

automatically adjusts if the hash is found in less than 10 minutes

*Probability of one Powerball win = 3.4223E‐09; two Powerball wins in a row = 1.17122E‐17; 18 zeroes in winning hash 2.117E‐22

** https://blockchain.info/charts/hash‐rate Note 1 gigahash=1 billion hashes  31Campbell R. Harvey 2018

Page 31: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

How does the bitcoin blockchain work?

But there is more to it! Here is where the miners come in.• It is easy to verify the hash is correct• Anyone can take the hash of the transactions + nonce and get the hash with 

the 18 leading zeros• However, any change in any transaction – no matter how trivial – will lead to 

a completely different hash (and unlikely to have any leading zeros)• Miners are rewarded with cryptocurrency for finding the winning hash and 

verifying transactions. There are also small transaction fees.

32Campbell R. Harvey 2018

Page 32: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

Distributed public ledger

Bitcoin blockchain:• Anyone can write to ledger and anyone can mine, i.e., no “censorship”• Network determines “settlement”• Having extreme “difficulty” is expensive (power consumption) but reduces 

or eliminates the possibility of any single person (or miners) from doing anything nefarious. 

33Campbell R. Harvey 2018

Page 33: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

Private blockchains

Example: 3 banks, 2 customers

http://gendal.me/2015/04/27/how‐to‐explain‐the‐value‐of‐replicated‐shared‐ledgers‐from‐first‐principles/34Campbell R. Harvey 2018

Page 34: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

Private blockchains

Example: 3 banks, 2 customers + 1 blockchain

http://gendal.me/2015/04/27/how‐to‐explain‐the‐value‐of‐replicated‐shared‐ledgers‐from‐first‐principles/35Campbell R. Harvey 2018

Page 35: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

Private blockchains: Example

JP Morgan’s Quorum• Ethereum based private chain• Blockchain includes encrypted versions of all contracts• For a specific contract, only the parties to the contract have the ability to 

decrypt the contract• So their blockchain includes all history, is immutable, but you can only see 

the transactions you are a party to• Disrupts back office functions – large cost savings

36Campbell R. Harvey 2018

Page 36: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

Blockchain applications

Voting• Each citizen registered to vote is issued a voting token • The token cannot be sold and it can be used only once• It expires after the election• Voter needs to provide proof of identity (thumb print) 

to vote• Blockchain is checked to see if that voter has the 

token to “spend” • Your vote can be anonymous even though you provide 

proof of identity with “zero knowledge proof” 

https://crypto.stanford.edu/pbc/notes/crypto/voting.html37Campbell R. Harvey 2018

Page 37: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

Blockchain applications

Internet of Things• Only you can control your thermostat• Provide proof of identity (blockchain 

is checked) and IoT device works for you

• Strong protection against hacking because the hacker would have to rewrite the entire blockchain and take over the majority of computing

38Campbell R. Harvey 2018

Page 38: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

Blockchain applications

Internet of Things• Only you can control your car• Provide proof of identity (blockchain 

is checked) and IoT device works for you

• Driverless cars are a “no go” unless they are hack proof. 

39Campbell R. Harvey 2018

Page 39: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

Blockchain applications

Prescriptions• Widespread fraud• Blank scripts are stolen from doctors’ offices 

or forged• Some doctors abuse the system• Token issued to patient: it cannot be resold 

and has an expiration• Patient presents token to pharamacist and 

blockchain is checked to make sure patient owns the token (and has not already spent it)

40Campbell R. Harvey 2018

Page 40: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

Blockchain applications

Medical records• You enter a health facility (not your home facility)• You provide proof of identity verified with a blockchain• Your “private key” unlocks encrypted data related only your health records• Also provides a much stronger privacy protection

• Instead of a medical database being encrypted with one key (which might be lost or discovered), each patient’s record has its own key. Hence, to compromise the database you would need to guess potentially millions of keys

41Campbell R. Harvey 2018

Page 41: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

Blockchain applications

Real time financial statements• New role for Deloitte, E&Y, PwC, etc. in validating                                   

company ledger transactions in real time• API would allow selected transparency (same categories as in the usual 

financial statements) in real time• The end of quarterly reporting – and potentially some of the incentives that 

are created to engage in short‐termism

42Campbell R. Harvey 2018

Page 42: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

Blockchain applications

Fedcoin• 78% of the value of US currency is in 

$100 bills• Large denomination bills method of 

choice for criminal activity

43Campbell R. Harvey 2018

Page 43: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

Blockchain applications

Fedcoin• 78% of the value of US currency is in $100 bills• Large denomination bills method of choice for 

criminal activity• Fedcoin is a digital USD currency where the 

complete history of all transactions is visible to the Fed via a Fed blockchain

• Instant monetary policy, see Rogoff (2016)El Chapo’s cash stash

https://www.federalreserve.gov/paymentsystems/coin_currcircvalue.htm 44Campbell R. Harvey 2018

Page 44: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

Blockchain applications

Central banks

45Campbell R. Harvey 2018

Page 45: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

46Campbell R. Harvey 2018

Page 46: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

Blockchain business categories*

Transactions & Payment Services:• Startups whose primary use cases involve buying, selling, or storing 

cryptocurrencies without a financial intermediary. The term cryptocurrency refers to a digital asset which functions as a medium of exchange on a distributed ledger. Smart contracts are programmable, transparent transaction contracts which self‐execute upon the fulfillment of its terms of agreement. Wallets are software programs which interact with various blockchains to let users store, send, and receive crypto‐assets and monitor their holdings. Some wallets extend services internationally and specialize in low‐fee cross‐border remittances. Merchant services enable vendors or organizations to participate in crypto‐transactions. Finally, micropayment startups offer payments for metered content in small denominations. 

*Source: PitchBook47Campbell R. Harvey 2018

Page 47: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

Blockchain business categories*

Cryptocurrency Exchanges & Trading:• Crypto‐exchanges are platforms for exchanging cryptocurrencies into other 

cryptocurrencies, fiat currencies, or vice versa. Peer‐to‐peer marketplaces enable two parties to directly exchange goods and services without an intermediary, while peer‐to‐peer lending platforms enable peers to extend and receive credit/loans through a blockchain. This segment includes crypto‐investment companies who invest in cryptocurrencies with the intent to generate a return via value appreciation, as well as tools used to manage crypto‐investments. Accordingly, startups providing clearing and settlement blockchain platforms for crypto‐trading, forex and crypto‐derivative markets are also included.  Prediction markets involve speculation trading based on forecasts of economic and political events. Finally, fundraising platforms allow startups to complete blockchain‐based fundraising and help prospective investors find such startups.

*Source: PitchBook48Campbell R. Harvey 2018

Page 48: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

Blockchain business categories*

Identity, Authentication, & Security:• An inherent characteristic of a blockchain is the immutability of transaction 

records. Startups here use digital ledger software to verify the authenticity of data, as well as assets or documents, using blockchain identifiers to represent and/or authenticate tangible assets. Additionally, these startups leverage identity verification methods to track the cryptographic identity of an individual, entity, device, item, etc. Although blockchains themselves are secure by nature, blockchain‐based applications are still vulnerable to cyber‐attack. Startups in the security category create secure foundations for transactions, data storage, and network communication. 

*Source: PitchBook49Campbell R. Harvey 2018

Page 49: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

Blockchain business categories*

Enterprise Blockchain Solutions:• Startups in this category provide enterprise‐level blockchain

solutions to entities operating in sectors such as financial services, healthcare, insurance, and supply chain. This includes the development of industry‐specific software as well as subscription leasing of proprietary blockchain platforms. 

*Source: PitchBook50Campbell R. Harvey 2018

Page 50: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

Blockchain business categories*

Social, Games, & Gambling:• In this category, startups leverage decentralized networks to enable 

social and networking platforms used for recruiting, classifieds, dating, and loyalty programs, among other use cases. One of the primary benefits such companies provide is the ability to share data and content without allowing a centralized third‐party to assume any level of ownership of such content. Blockchain games include applications and tournament gaming platforms where users can compete for prize pools. Gambling startups allow users to place bets from anywhere around the world via blockchain peer‐to‐peer networks. 

*Source: PitchBook51Campbell R. Harvey 2018

Page 51: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

Blockchain business categories*

Ecosystem:• This category includes startups furthering blockchain technology via 

underlying infrastructure improvements and software development tools. The issues such companies address include those related to scalability, interoperability and governance, among others. While some of these companies could also be listed under “Enterprise Blockchain Solutions,” they are included here for the contribution of their open‐source technology to the ecosystem. Mining companies provide products and services which assist in the computational process of solving cryptographic problems to earn cryptocurrency units. Data storage and hardware companies cater to the operational necessities of blockchain services. 

*Source: PitchBook52Campbell R. Harvey 2018

Page 52: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

Blockchain applications

2017 Duke’s Innovation and Cryptoventures course:• Entertainment and sports ticketing• Government benefit programs• Humanitarian aid• Identity• Single password for all accounts• Educational and test score records• Agricultural supply chain in India• Aircraft leasing• Digital twins for large medical devices like CT and MRI• Smart guns

53Campbell R. Harvey 2018

Page 53: The Blockchain Identity January 15 2018 Abridged Printcharvey/Teaching/... · • Provide proof of identity (blockchain is checked) and IoT device works for you • Strong protection

ConclusionsBlockchain will first disrupt financial services• Still early going but change will happen quickly• Low hanging fruit in financial applications• Next applications based on other types of property like real estate, digital media,…• Blockchain may be crucial to IoT applications that are at risk from hacking In the 

short‐term, I see the growth of a diverse set of blockchain types• Bitcoin blockchain is the strongest – but many applications do not require 

censorship resistance; sidechains offer interesting opportunities• Alternative blockchains such as the one proposed by Ethereum allow for simple 

contracts to be embedded in the blockchain and offer great promise• Blockchain not going away

54Campbell R. Harvey 2018