This construction is achieved by composing smart contracts on the main blockchain using fraud proofs whereby state transitions can be enforced on a parent blockchain. We compose blockchains into a tree hierarchy, and treat each as an individual branch blockchain with enforced blockchain history and MapReducable computation committed into merkle proofs. By framing one’s ledger entry into a child blockchain which is enforced by the parent chain, one can enable incredible scale with minimized trust (presuming root blockchain availability and correctness).
Things get a bit more interesting when you replace the single custodian with a federation of notaries by way of a multisignature address. In this model, a federation of entities must sign-off on movements to and from the sidechain, so more parties must be compromised for a failure situation to unfold where the bitcoins frozen on the main chain are stolen.
Thus Tradle set out to build a meta-protocol that saves the data in the overlay network, and only puts minimal referencing data on the blockchain. There is a general grumpy consensus among bitcoin core devs and mining pool operators on allowing one small data chunk, a hash, per transaction. Many devs say it is not possible to secure this second overlay network. I agree, unless we use the blockchain to help with the task. We have a partial solution working, and are preparing a new design to improve it (partial, as it can not yet handle all known attacks). We are actively sharing the designs at various meetups (and on the github) and are inviting devs to find attack vectors and propose solutions. Tradle’s protocol not only relieves the pressure on bitcoin’s blockchain but is also able to handle larger transaction sizes than Counterparty and Mastercoin, so it can be used for complex identity, supply chain management and many other applications. It is also capable of handling attachment files, needed in the healthcare and financial industries.
Public blockchains provide a way to protect the users of an application from the developers, establishing that there are certain things that even the developers of an application have no authority to do. From a naive standpoint, it may be hard to understand why an application developer would want to voluntarily give up power and hamstring themselves. However, more advanced economic analysis provides two reasons why, in Thomas Schelling's words, weakness can be a strength. First, if you explicitly make it harder or impossible for yourself to do certain things, then others will be more likely to trust you and engage in interactions with you, as they are confident that those things are less likely to happen to them. Second, if you personally are being coerced or pressured by another entity, then saying "I have no power to do this even if I wanted to" is an important bargaining chip, as it discourages that entity from trying to compel you to do it. A major category of pressure or coercion that application developers are at risk of is that by governments, so "censorship resistance" ties strongly into this kind of argument.
Another technology that could see more widespread use in the coming years is side chains. A side chain is defined for one specific use case. There can be multiple side chains where different tasks are distributed accordingly for improving the efficiency of processing. Maybe one application needs to optimize for high speeds and another needs to optimize for large computations. In any case, side chains can be used to handle commercial blockchain usage. CryptoKitties would have greatly benefitted from an optimized high-speed side chain. At one point, they jammed up the Ethereum blockchain with 25% of all transactions coming from their application.
Ethereum, a provider of decentralized platform and programming language that helps running smart contracts and allows developers to publish distributed applications. Factom, a provider of records management, record business process for business and governments. Blockstream, a provider of sidechain technology, focused on extending capabilities of Bitcoin. The company has started experimenting on providing accounting (considered a function to be done on private blockchain) with the use of public blockchain technology.
“Further, contribution is weighted by computational power rather than one threshold signature contribution per party, which allows anonymous membership without risk of a Sybil attack (when one party joins many times and has disproportionate input into the signature). For this reason, the DMMS has also been described as a solution to the Byzantine Generals Problem[AJK05].”
Start preparing for STO in a week with a professional blockchain development team. We have real experience in the following platforms: Ethereum, Stellar, Hyperledger, EOS We developed the world’s first platform for real business assets tokenization on Stellar that raised 1,700,000$ ! SheerChain is a custom software development company and a trusted IT outsourcing provider for our clients worldwide. Combinin ... Read more
“The only reason the banks have gotten to the point of thinking about permissioned ledger is because they finally reached the stage of bargaining, third stage in five stages of grief, for industry they’re about to lose. They start with denial, and the basis of denial is, well, this thing isn’t gonna work, it’s gonna die any day soon, and it doesn’t. And then they say, it’s just silly money and it doesn’t have any value, until it does; and no one else is gonna play with it, except they are; serious investors won’t put money into this, except they did; and it still refuses to die. We go from denial to bargaining. Somewhere in between might be anger, some depression, and eventually they’re going to reach acceptance, but it’s gonna take a long time.
Forbes reports that blockchain and biometric eyeball scanning technologies underpin the systems that support food distribution in the Syrian refugee crisis. While there are many further uses of blockchain, at the core of its business functionality is the creation of transparent, stacking “ledgers” of information. This is where private blockchain can prove extremely useful.