Financial institutions own balanced portfolios with many assets and hence a small risk. But they are not able to split them into smaller parts with comparable risk for resale due to regulators' restrictions caused by a lack of auditability. Blockchain and smart contracts allow overcoming this problem via tokenizing assets into a commodity. The paper seeks to answer the question: how to assemble as many as possible standardized packages from a given portfolio. The optimal algorithms for two special cases-discrete and continuous homogeneous-are provided.
{"title":"Optimal Portfolio Sold-Out via Blockchain Tokenization","authors":"V. Davydov, Y. Yanovich","doi":"10.1145/3409934.3409950","DOIUrl":"https://doi.org/10.1145/3409934.3409950","url":null,"abstract":"Financial institutions own balanced portfolios with many assets and hence a small risk. But they are not able to split them into smaller parts with comparable risk for resale due to regulators' restrictions caused by a lack of auditability. Blockchain and smart contracts allow overcoming this problem via tokenizing assets into a commodity. The paper seeks to answer the question: how to assemble as many as possible standardized packages from a given portfolio. The optimal algorithms for two special cases-discrete and continuous homogeneous-are provided.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123806667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We consider a scenario in which two parties prove to a third party that communication between them occurred. This can be seen in advertisement in which the data are distributed to the user by a distributor on behalf of owner. Specifically, we propose a protocol and a modification of it to address the possibility of collusion between the distributor and user in which the owner is deceived to pay for false claim of distribution, and the possibility of the user not providing any data transfer confirmation as an acknowledgement after receiving data. In the original protocol, the distributor and user are both equipped with trusted hardware. The data are encrypted and decrypted by this trusted hardware, with a shared secret key. When decrypting the data, the user's hardware generates a proof and sends it to the distributor. This proof is used as the proof of distribution to show to the owner for payment. This prevents the collusion with the help of the trusted hardware. This protocol assumes that the user will not misbehave and always send the proof back to the distributor. To address this issue, the modified protocol uses blockchain as a public ledger for the user to publish acknowledgement of receiving encrypted data chunk, and for the distributor to publish the corresponding secret for decryption. In both the protocols, we use the blockchain technology as a method for the ID management and payment.
{"title":"Proof of Data Distribution Based on Trusted Hardware","authors":"Batnyam Enkhtaivan, Pooja Dhomse","doi":"10.1145/3409934.3409943","DOIUrl":"https://doi.org/10.1145/3409934.3409943","url":null,"abstract":"We consider a scenario in which two parties prove to a third party that communication between them occurred. This can be seen in advertisement in which the data are distributed to the user by a distributor on behalf of owner. Specifically, we propose a protocol and a modification of it to address the possibility of collusion between the distributor and user in which the owner is deceived to pay for false claim of distribution, and the possibility of the user not providing any data transfer confirmation as an acknowledgement after receiving data. In the original protocol, the distributor and user are both equipped with trusted hardware. The data are encrypted and decrypted by this trusted hardware, with a shared secret key. When decrypting the data, the user's hardware generates a proof and sends it to the distributor. This proof is used as the proof of distribution to show to the owner for payment. This prevents the collusion with the help of the trusted hardware. This protocol assumes that the user will not misbehave and always send the proof back to the distributor. To address this issue, the modified protocol uses blockchain as a public ledger for the user to publish acknowledgement of receiving encrypted data chunk, and for the distributor to publish the corresponding secret for decryption. In both the protocols, we use the blockchain technology as a method for the ID management and payment.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127703993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Blockchains are distributed replicated state machines with a continuously increasing data storage underneath. The size of the storage can cause problems especially in limited IoT devices. In order to address that, this paper is based on the following ideas: While two state transitions could be replaced by a single one to represent the same state, this is not commonly done to reduce the blockchains storage size. To facilitate squashing of transactions independent of the application semantics a blockchain frameworks needs to know the interdependencies of transactions. In this paper we propose an explicit dependency model for any transaction in a blockchain. In this way a blockchain-framework can preselect connected transactions without business process semantics for a squash operation. These connected transactions are passed to the application for the squash to be performed. This ideally produces less transactions while achieving the same application state to be used for a reintroduction as new blocks within a fork for a smaller overall storage footprint.
{"title":"Transaction Dependency Model for Block Minimization in Arbitrary Blockchains","authors":"Wolf Posdorfer, Heiko Bornholdt, W. Lamersdorf","doi":"10.1145/3409934.3409935","DOIUrl":"https://doi.org/10.1145/3409934.3409935","url":null,"abstract":"Blockchains are distributed replicated state machines with a continuously increasing data storage underneath. The size of the storage can cause problems especially in limited IoT devices. In order to address that, this paper is based on the following ideas: While two state transitions could be replaced by a single one to represent the same state, this is not commonly done to reduce the blockchains storage size. To facilitate squashing of transactions independent of the application semantics a blockchain frameworks needs to know the interdependencies of transactions. In this paper we propose an explicit dependency model for any transaction in a blockchain. In this way a blockchain-framework can preselect connected transactions without business process semantics for a squash operation. These connected transactions are passed to the application for the squash to be performed. This ideally produces less transactions while achieving the same application state to be used for a reintroduction as new blocks within a fork for a smaller overall storage footprint.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129392476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}