scispace - formally typeset
Journal ArticleDOI

Formalizing and Securing Relationships on Public Networks

Nick Szabo
- 01 Sep 1997 - 
- Vol. 2, Iss: 9
Reads0
Chats0
TLDR
Protocols with application in important contracting areas, including credit, content rights management, payment systems, and contracts with bearer are discussed.
Abstract
Smart contracts combine protocols with user interfaces to formalize and secure relationships over computer networks. Objectives and principles for the design of these systems are derived from legal principles, economic theory, and theories of reliable and secure protocols. Similarities and differences between smart contracts and traditional business procedures based on written contracts, controls, and static forms are discussed. By using cryptographic and other security mechanisms, we can secure many algorithmically specifiable relationships from breach by principals, and from eavesdropping or malicious interference by third parties, up to considerations of time, user interface, and completeness of the algorithmic specification. This article discusses protocols with application in important contracting areas, including credit, content rights management, payment systems, and contracts with bearer.

read more

Citations
More filters

Ethereum: A Secure Decentralised Generalised Transaction Ledger

Gavin Wood
TL;DR: Ethereum as mentioned in this paper is a transactional singleton machine with shared state, which can be seen as a simple application on a decentralised, but singleton, compute resource, and it provides a plurality of resources, each with a distinct state and operating code but able to interact through a message-passing framework with others.
Journal ArticleDOI

Personal Knowledge: Towards a Post-Critical Philosophy

TL;DR: Polanyi is at pains to expunge what he believes to be the false notion contained in the contemporary view of science which treats it as an object and basically impersonal discipline.

[서평]「Applied Cryptography」

염흥렬
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Proceedings ArticleDOI

Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts

TL;DR: In this article, the authors present Hawk, a decentralized smart contract system that does not store financial transactions in the clear on the blockchain, thus retaining transactional privacy from the public's view.
Proceedings ArticleDOI

Algorand: Scaling Byzantine Agreements for Cryptocurrencies

TL;DR: Algorand as discussed by the authors is a new cryptocurrency that confirms transactions with latency on the order of a minute while scaling to many users, using a novel mechanism based on Verifiable Random Functions that allows users to privately check whether they are selected to participate in the BA to agree on the next set of transactions, and to include a proof of their selection in their network messages.
References
More filters
Book ChapterDOI

The use of knowledge in society

TL;DR: In this paper, it was pointed out that many of the current disputes with regard to both economic theory and economic policy have their common origin, it seems to me, in a misconception about the nature of the economic problem of society.
Journal ArticleDOI

Personal Knowledge: Towards a Post-Critical Philosophy

TL;DR: Polanyi is at pains to expunge what he believes to be the false notion contained in the contemporary view of science which treats it as an object and basically impersonal discipline.

[서평]「Applied Cryptography」

염흥렬
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Book

From Edi to Electronic Commerce: A Business Initiative

TL;DR: The Electronic Data Interchange (EDI) as the first step of the internal re-engineering of business processes to electronic commerce is discussed in this article, where a cost-justification model and an extensive list of business documents that are today's biggest EDI hitters are presented.
Related Papers (5)