jbba
the
table of contents
Editorial
7
Editorial Board
9
Testimonials from Authors & Readers
12
Peer-Reviewed Research
Transitioning to a Hyperledger Fabric Hybrid Quantum Resistant-Classical
Public Key Infrastr ucture
15
The Contractual Cr yptoeconomy:
An Ar row of Time for Economics
27
Singapore’s Open Digital Token Offering Embrace:
Context & Consequences
39
Cr yptocur rency Investing Examined
51
Blockchain Investigations: Beyond the ‘Money’
65
A Blockchain Infrastr ucture for Transpor tation in
Low Income Countr y Cities, and Beyond
75
analytical essay
A Review of fast-g rowing Blockchain Hubs in Asia
83
commentary
Decentralisation is Coming: The Future of Blockchain
101
perspective
Is Blockchain Par t of the Future of Ar t?
109
for authors
113
The JBBA | Volume 2 | Issue 2 | October 2019
3
jbba
the
editorial board
Editor-In-Chief:
Dr. Naseem Naqvi
FBBA FRCP FHEA MAcadMEd MSc
(Blockchain & Cryptocurrency)
Centre for Evidence Based Blockchain, UK
Professor Dr. Shada Alsalamah PhD
(Healthcare Informatics & Blockchain)
Massachusetts Institute of Technology, USA
Professor Dr. Sushmita Ruj PhD
(Applied Cryptography, Security)
Indian Statistical Institute, India
Associate Editor-In-Chief:
Professor Dr. Kevin Curran PhD FBBA
(Cybersecurity)
Ulster University, UK
Professor Dr. Marc Pilkington PhD FBBA
(Cryptocurrencies/ Digital Tech)
University of Burgundy, France
Professor Dr. John Domingue PhD FBBA
(Artificial Intelligence/ Education)
The Open University, UK
Professor Dr. David Lee K Chuen PhD FBBA
(Applied Blockchain)
Singapore University of Social Sciences, Singapore
Professor Dr. Bill Buchanan PhD FBBA
(Cryptography/ Cybersecurity)
Edinburgh Napier University, UK
Contributing Editors & Reviewers:
Professor Dr. Mary Lacity PhD
(Blockchain/ Information Systems)
University of Arkansas, USA
Professor Dr Sandeep Shukla PhD
(Blockchain & Cybersecurity)
Indian institute of Technology, India
Professor Dr. Wulf Kaal PhD
(Blockchain & Law)
University of St. Thomas, USA
Professor Dr. Jason Potts PhD FBBA
(Applied Blockchain)
RMIT University, Australia
Professor Dr. Chris Sier PhD
(DLT in Finance / Capital Markets)
University of Newcastle, UK
Professor Dr. Anne Mention PhD
(Blockchain & Economics)
RMIT University, USA
The JBBA | Volume 2 | Issue 2 | October 2019
Professor Dr. Jim KS Liew PhD FBBA
(Blockchain, Finance, AI)
Johns Hopkins University, USA
Professor Dr. Eric Vermeulen PhD FBBA
(Financial Law, Business, Economics)
Tilburg University, The Netherlands
Professor Dr. Jeff Daniels PhD
(Cybersecurity, Cloud Computing)
University of Maryland, USA
Professor Dr. Mark Lennon PhD
(Cryptocurrencies, Finance, Business)
California University of Pennsylvania, USA
Professor Dr. Walter Blocher PhD
(Blockchain, Law, Smart Contracts)
University of Kassel, Germany
Professor Dr. Clare Sullivan PhD
(Cybersecurity / Digital Identity)
Georgetown University, USA
Professor Dr. Andrew Mangle PhD
(Cryptocurrency, Smart contracts)
Bowie State University, USA
Professor Dr. Isabelle C Wattiau PhD
(Information Systems, Smart Data)
ESSEC Business School, France
Professor Dr. Lee McKnight PhD
(IoT & Blockchain)
Syracuse University, USA
Professor Dr. Chen Liu PhD
(Fintech, Tokenomics)
Trinity Western University, Canada
Professor Dr. Markus Bick PhD
(Business Information Systems)
ESCP Business School, Germany
Professor Dr. Sandip Chakraborty PhD
(Blockchain, Distributed Networks)
Indian Institute of Technology, India
9
jbba
the
Dr. Stefan Meyer PhD
(Blockchain in Food Supply Chain)
University of Leeds, UK
Dr. Anish Mohammed MSc
(Crypto-economics, Security)
Institute of Information Systems, Germany
Dr. Marcella Atzori PhD FBBA
(GovTech/ Smart Cities)
University College London, UK
Demelza Hays MSc
(Cryptocurrencies)
University of Liechtenstein, Liechtenstein
Dr. Mureed Hussain FBBA MD MSc
(Blockchain Governance)
The British Blockchain Association, UK
Alastair Marke FRSA MSc
(Blockchain & Climate Finance)
Blockchain Climate Institute, UK
Dr. Maria Letizia Perugini PhD
(Digital Forensics & Smart Contracts)
University of Bologna, Italy
Adam Hayes MA BS CFA
(Blockchain & Political Sociology)
University of Wisconsin-Madison, USA
Dr. Stylianos Kampakis PhD
(ICOs, Big Data, Token Economics)
University College London, UK
Jared Franka BSc
(Cryptocurrency / Network Security)
Dakota State University, USA
Dr. Phil Godsiff PhD
(Cryptocurrencies)
University of Surrey, UK
Navroop K Sahdev MSc
(Innovation / Applied Blockchain)
Massachusetts Institute of Technology, USA
Dr. Sean Manion PhD FBBA
(Blockchain in Health Sciences)
Uniformed Services University, USA
Raf Ganseman
(DLT in Trade & Music Industry)
KU Leuven University, Belgium
Dr. Duane Wilson PhD
(Cybersecurity/ Computer Science)
The Johns Hopkins University, USA
Sebastian Cochinescu MSc
(Blockchain in Culture Industry)
University of Bucharest, Romania
Dr. Darcy Allen PhD
(Economics/Innovation)
RMIT University, Australia
Jared Polites MSc
(ICOs & Cryptocurrencies)
Blockteam Ventures, USA
Dr. Christian Jaag PhD
(Crypto-economics, Law)
University of Zurich, Switzerland
Managing Editor:
Dr. Larissa Lee JD
(Blockchain & Law)
University of Utah, USA
Dr. Jeremy Kronick PhD
(Blockchain & Finance/ Economics)
C.D Howe Institute, Canada
Saba Arshad MSc
(Machine Learning)
Chungbuk National University, South Korea
Publishing Consultant:
John Bond
(Riverwinds Consulting, USA)
Marketing & Public Relations Assistant:
Dr. Hossein Sharif PhD
(Blockchain, AI, Cryptocurrencies)
University of Newcastle, UK
Dr. Wajid Khan PhD
(Big Data, E-Commerce)
University of Hertfordshire, UK
Tracy Smith
Type-setting, Design & Publishing:
Zeshan Mahmood
Institute Pavoniano Artigianelli, Italy
Dr. Ifigenia Georgiou PhD
(Crypto-economics)
University of Nicosia, Cyprus
The JBBA | Volume 2 | Issue 2 | October 2019
10
jbba
the
The JBBA | Volume 2 | Issue 2 | October 2019
11
jbba
the
Testimonials from Authors and Readers
The JBBA has an outstandingly streamlined submissions process, the reviewers
comments have been constructive and valuable, and it is outstandingly well produced,
presented and promulgated. It is in my opinion the leading journal for blockchain
research and I expect it to maintain that distinction under the direction of its forwardlooking leadership team.
Dr Brendan Markey-Towler PhD, University of Queensland, Australia
It is really important for a future world to be built around peer-review and publishing
in the JBBA is one good way of getting your view-points out there and to be shared
by experts.
Professor Dr. Bill Buchanan OBE PhD, Edinburgh Napier University, Scotland
The JBBA has my appreciation and respect for having a technical understanding
and the fortitude for publishing an article addressing a controversial and poorly
understood topic. I say without hesitation that JBBA has no equal in the world of
scientific Peer-Review Blockchain Research.
Professor Rob Campbell, Capitol Technology University, USA
Within an impressively short time since its launch, the JBBA has developed a strong
reputation for publishing interesting research and commentary on blockchain
technology. As a reader, I find the articles uniformly engaging and the presentation
of the journal impeccable. As an author, I have found the review process to be
consistently constructive.
Dr. Prateek Goorha PhD, Blockchain Researcher and Economist
We live in times where the pace of change is accelerating. Blockchain is an emerging
technology. The JBBA’s swift review process is key for publishing peer-reviewed
academic papers, that are relevant at the point they appear in the journal and beyond.
Professor Daniel Liebau, Visiting Professor, IE Business School, Spain
The JBBA submission process was efficient and trouble free. It was a pleasure to
participate in the first edition of the journal.
Dr. Delton B. Chen PhD, Global4C, USA
The JBBA | Volume 2 | Issue 2 | October 2019
“
“
“
“
“
“
“
“
“
“
“
“
12
jbba
the
This is a very professionally presented journal.
Peter Robinson, Blockchain Researcher & Applied Cryptographer, PegaSys, ConsenSys
“
“
“
Very professional and efficient handling of the process, including a well-designed
hard copy of the journal. Highly recommend its content to the new scientific field
blockchain is creating as a combination of CS, Math and Law. Great work!
“
“
Simon Schwerin MSc, BigChain DB and Xain Foundation, Germany
JBBA has quickly become the leading peer-reviewed journal about the fastest growing
area of research today. The journal will continue to play a central role in advancing
blockchain and distributed ledger technologies.
I had the honour of being an author in the JBBA. It is one of the best efforts
promoting serious blockchain research, worldwide. If you are a researcher, you
should definitely consider submitting your blockchain research to the JBBA.
Dr. Stylianos Kampakis PhD, UCL Centre for Blockchain Technologies, UK
I would like to think of the JBBA as an engine of knowledge and innovation,
supporting blockchain industry, innovation and stimulate debate.
Dr. Marcella Atzori PhD, EU Parliament & EU Commission Blockchain Expert, Italy
“
“
“
“
“
“
John Bond, Senior Publishing Consultant, Riverwinds Consulting, USA
The overarching mission of the JBBA is to advance the common monologue within
the Blockchain technology community. JBBA is a leading practitioners journal for
blockchain technology experts.
“
“
Professor Dr. Kevin Curran PhD, Ulster University, Northern Ireland
The articles in the JBBA explain how blockchain has the potential to help solve
economic, social, cultural and humanitarian issues. If you want to be prepared for the
digital age, you need to read the JBBA. Its articles allowed me to identify problems,
find solutions and come up with opportunities regarding blockchain and smart
contracts.
The JBBA | Volume 2 | Issue 2 | October 2019
“
Professor Dr. Eric Vermeulen, Tilburg University, The Netherlands
13
jbba
the
Peer-reviewed Research
OPEN ACCESS
ISSN Print: 2516-3949
https://doi.org/10.31585/jbba-2-2-(4)2019
Transitioning to a Hyperledger Fabric
Hybrid Quantum Resistant-Classical
Public Key Infrastructure
Robert E. Campbell Sr.
Capitol Technology University, Laurel, USA
Correspondence: rc@medcybersecurity.com
Received: 13 June 2019 Accepted: 26 July 2019 Published: 31 July 2019
Abstract
Hyperledger Fabric (HLF) is a permissioned, blockchain designed by IBM and uses Public Key Infrastructure
(PKI), for digital signatures, and digital identities (X.509 certificates), which are critical to the operational
security of its network. On 24 January 2019, Aetna, Anthem, Health Care Service Corporation, PNC Bank,
and IBM announced a collaboration to establish a blockchain-based ecosystem for the healthcare industry
[1]. Quantum computing poses a devastating impact on PKI and estimates of its large-scale commercial
arrival should not be underestimated and cannot be predicted. The HIPAA (Health Insurance Portability and
Accountability Act) and General Data Protection Regulation (GDPR), requires “reasonable” measures to be
taken to protect Protected Health Information (PHI), and Personally Identifiable Information (PII). However,
HLF’s ecosystem is not post-quantum resistant, and all data that is transmitted over its network is vulnerable
to immediate or later decryption by large scale quantum computers. This research presents independent
evaluation and testing of the National Institute of Standards and Technology (NIST), based Second Round
Candidate Post-Quantum Cryptography (PQC), lattice-based digital signature scheme qTESLA. The secondround submission is much improved, however; its algorithm characteristics and parameters are such that it
is unlikely to be a quantum-resistant “as is,” pure “plug-and-play” function and replacement for HLF’s PKI.
This work also proposes that qTESLA’s public keys be used to create a quantum-resistant-classical hybrid
PKI near-term replacement.
Keywords: Hyperledger Fabric, PKI, HIPAA, GDPR, distributed ledger, post-quantum cryptography, qTESLA, Ring
Learning with Errors, cybersecurity, enterprise blockchains
JEL Classifications: D02, D71, H11, P16, P48, P50
1. Introduction
An X.509 PKI is a security architecture that uses
cryptographic mechanisms to support functions
such as email protection, web server authentication,
signature generation, and validation. It is a specification
upon which applications like Secure Multipurpose
Internet Mail Extensions (S/MIME) and Transport
Layer Security (TLS) are based. It also can be defined
as a collection of methods, rules, policies, and roles
that are required to generate, manage, provide, employ,
and revoke digital certificates; it is also responsible
for the management of public-key encryption.
A PKI ensures the secure transfer of data over
various network infrastructures, such as Intranet and
Internet architectures. HLF’s Enterprise Blockchain,
and in general the secure communications, critical
infrastructure, banking, and Internet commerce
The JBBA | Volume 2 | Issue 2 | October 2019
depends upon the security and reliability of PKI
cryptography. Cryptographic encryption and signature
algorithms are used to ensure confidentially, integrity,
and authenticity of messages, data, and information.
PKI is used to bind identities, and public-keys and
Fabric uses Certificate Authorities (CA), as the primary
trusted party that uses digital signature algorithms to
sign certificates of trust. The architecture, deployment,
and operation of HLF impact the blockchain network’s
cybersecurity risks and determine the controls best
able to mitigate those risks. Key considerations
include the ability of untrusted or unauthorized
persons to participate in the network; and the strength
of the encryption protocols. Advances in quantum
computing are threatening today’s global encryption
standards, including PKI [2]. There is an immediate
need to develop, deploy, and migrate the consortium’s
blockchain ecosystem to a hybrid safe PQC. PQC is
15
jbba
the
cryptosystems which run on classical computers and
are considered to resistant to quantum computing
attacks. There are significant uncertainties associated
with PQC, such as, the possibility of new quantum
algorithms being developed which would cause new
attacks. Also, new PQC algorithms are not thoroughly
tested and analyzed. It takes years to understand
their security in a classical computing environment.
This work evaluates HLF’s blockchain post-quantum
computing vulnerabilities and threats given global
regulatory requirements and provides valuable secondround qTESLA independent testing and evaluation
data and aids in the NIST Post-Quantum Cryptography
Standardization Process [3]. Further, the author
encourages additional independent testing, verification,
and validation of qTESLA as one of the most practical
hybrid quantum-resistant PKI systems.
2. Implications in this Work
Without plans for quantum-resistant cryptography and
security, all data and information, including encrypted,
that is transmitted today, and tomorrow is vulnerable.
This would violate all known regulatory requirements
for data privacy and security. HIPAA enacted in 1996
and is United States legislation that provides security
and data protection for medical information [4].
GDPR requires in the case of a personal data breach
notification not later than 72 hours after having become
aware of it [5]. Both GDPR and HIPAA levies hefty
fines and penalties due to non-compliance. GDPR noncompliance with various provisions of the GDPR shall
be fined according to the gravest infringement, which
can be Up to €20 million, or 4% of the worldwide
annual revenue of the prior financial year, whichever is
higher [6]. HIPAA violations of penalties and fines for
noncompliance are also based on the level of perceived
negligence. These fines can range from $100 to
$50,000 per violation (or per record), with a maximum
penalty of $1.5 million per year for each violation
[7]. It takes years of study and analysis of quantumresistant cryptography algorithms before governments
and industry can trust their security. Given the nature
and the far-reaching implications of the legal and
financial obligations of both these laws, it is essential
to have plans and strategies to address and mitigate
vulnerabilities and threats that may lead to data breaches
and non-compliance. Permissioned blockchains are not
immune to cyber-attacks, and further exploration of
the quantum-resistant cryptography is a necessity, and,
a consensus between industry and regulators regarding
the appropriate cybersecurity standards to apply to
blockchain solutions in the healthcare, financial and
GDPR covered services industry. An honest discussion
and principles approach to cybersecurity regulation
all in mitigating cybersecurity risk in permissioned
blockchains while allowing the technology to continue
to evolve through innovation.
The JBBA | Volume 2 | Issue 2 | October 2019
Failure to comply with HIPAA, GDRP, and other
regulating authorities can result in stiff penalties. Fines
will increase with the volume of data or the number
of records exposed or breached, and the amount of
neglect. The lowest fines begin with a breach when
the rules are not known, and by exercising reasonable
diligence, would not have known the provisions were
violated. At the other end of the spectrum are fines
levied where a breach is due to negligence and not
corrected appropriately.
We need a coordinated strategy and approach with
specific recommendations and policies for academia,
policymakers, and industry participants regarding and
promoting the development of secure blockchain
technologies and applications through viable
cybersecurity standards. The enterprise blockchain
cybersecurity risks must be understood, and risk
management plans along with policies for HLF and
enterprise blockchain, in general, must have policies
that are by regulating authorities.
3. Significance of the Findings
IBM simultaneously is a leading developer of
enterprise-grade blockchains and quantum computers.
In 2018, Harriet Green, chairman, and CEO of IBM
Asia Pacific, stated: “IBM sees quantum computing
going mainstream within five years” [8]. Currently,
there is not a specific strategy to mitigate the threat
of quantum computers, and as such, all known data
security and privacy laws will be violated. There
are significant regulatory responsibilities of its
participants that own, create, modify, store, or
transmit regulated data and information. Enterprisegrade blockchains must enact holistic approaches to
cybersecurity across applications, infrastructure, and
processes. Cybersecurity must defend against attacks,
but also maintain control of data content. This
research illuminates the need for new policies to be
developed for those entities whose data is regulated.
To the author’s knowledge, no cybersecurity policy
addresses regulated data on enterprise blockchains.
A cybersecurity policy outlines the assets that need
protection and the threats to those assets and the rules
and controls for protecting them. The policy should
inform all approved users of their responsibilities
to protect information about those assets. Policy
management, reporting, and administration will be
essential for organisations inputting their data on
blockchains. Participants will need to be able to report
enterprise-wide on everything users have done with
regulated content to satisfy compliance requirements.
HLF’s PKI system of trust is broken with the arrival
of large-scale quantum computing, and all PII and PHI
are at risk with no known plans to mitigate. HIPAA,
GDPR, FINRA, and all known data and privacy laws
that will be violated. The author has independently
16
jbba
the
tested, verified, and validated qTESLA’s much improved
Second Round Submission to NIST Post-Quantum
Cryptography Standardization Process and has
proposed a hybrid quantum-resistant PKI system for
replacement in HLF. The test result yields smaller key
sizes; however; given today’s standards and applications
in use only qTESLA’s public key is recommended for
use in a hybrid PKI solution. qTESLA’s public-key is an
adequate replacement for the current ECDSA publickey. In HLF’s PKI, it is the public key that is used
most often and qTESLA’s second submission offers an
acceptable size that could reinforce a mix of the most
practical quantum-resistant digital signature scheme
with current ECDSA algorithms.
Given what is at risk for the blockchain implementors
and its users, reasonable measures must be taken
to mitigate the threat of data privacy and security.
To safeguard data on a blockchain platform, the
participants must be able to control who has access to
their data and under what circumstances. Blockchain
networks must be able to provide reasonable measures
and safeguards that adhere to privacy regulations such
as HIPAA, FINRA, and GDPR.
4. HLF and PKI and Membership Services
Technology
IBM offers Cryptographic PKI Services that allow
users to establish a PKI infrastructure and serve
as a certificate authority for internal and external
users, issuing and administering digital certificates.
It supports the delivery of certificates through the
Secure Sockets Layer (SSL) for use with applications
that are accessed from a web browser or web server.
It includes delivery of certificates that support the
Internet Protocol Security standard (IPSEC) for use
with VPN applications and delivery of certificates that
support Secure Multipurpose Internet Mail Extensions
(S/MIME), for use with email applications. All these
functions are essential but critically vulnerable.
Fabric is a private, blockchain technology that uses
smart contracts, and participants or members manage
its transactions. The members of the network enroll
through a “trusted” Membership Service Provider
(MSP) [9]. The blockchain is advertised as an
implementation of distributed ledger technology
(DLT) that delivers enterprise-ready network security,
scalability, confidentiality, and performance, in modular
blockchain architecture.
The MSP issues, cryptography, protocols, encryption,
signature keys and issues and validates certificates and
user authentication to clients and peers. HLF’s PKI
consists of Digital Certificates, Public and Private
Keys, and Certificate Authorities (CA) which issues
digital certificates to parties, who then use them to
authenticate messages. A CA’s Certificate Revocation
The JBBA | Volume 2 | Issue 2 | October 2019
List (CRL) is a reference for the certificates that are no
longer valid. PKI is used to generate certificates which
are tied to organizations, network components, and endusers or client applications. The MSP dispenses X.509
certificates that can be used to identify components
as belonging to an organization. Certificates issued by
CAs can also be used to sign transactions to indicate
that an organization endorses the transaction result and
is a necessary precondition of it being accepted onto
the ledger. These X.509 certificates are used in client
application transaction proposals and smart contract
transaction responses to digitally sign transactions. Its
digital certificate is compliant with the X.509 standard
and holds the attributes relating to the holder of the
certificate. The holder’s public key is distributed within
the certificate, and the private signing key is not.
The public-keys and private-keys are made available and
act as an authentication “anchor,” and the private keys
are used to produce digital signatures. Recipients of
digitally signed messages can validate and authenticate
the received message by checking that the attached
signature is valid with the use of the public key.
Digital identities are cryptographically validated digital
certificates that comply with X.509 standard and are
issued by a Certificate Authority (CA). HLF uses a list
of self-signed (X.509) certificates to constitute the root
of trust and a list of self-signed (X.509) certificates to
form the root of trust. A CA dispenses certificates that
are digitally signed by the CA and bind together the
actor with the actor’s public key. The above services
are critical to the operation of a secure enterprise
blockchain, and there must be plans and strategies in
place that provide reasonable measures to adhere to
regulatory policies.
5. Post-Quantum Computing Impact on HLF PKI
PQC algorithms must provide security against both
classical and quantum computing attacks. Their
performance is measured on classical computers and
considerations are made for the potential of “dropin replacements,” which infers compatibility and
interoperability with existing systems. Also, essential
requirements must include resistance to side-channel
attacks and misuse.
Cryptography in HLF is used in many applications
where secure communication is needed. The primary
use and role are signature generation, verification, and
authentication where algorithms are used to establish
confidentiality, integrity, and authenticity of messages
sent during communication. Public-key cryptography
is used where each participant has a private key and a
public key. In a public-key signature cryptosystem, the
signer has a private signing key that can be used to sign
messages and must keep this key secure. The public
key, which is visible to anyone, can be used to verify
that the signature is authentic and, if the signature
17
jbba
the
scheme is secure, then repudiation is achieved and only
the signer could have generated the signature. PKIs
are used to bind identities to the public keys, where
Certificate Authorities (CAs) play an essential role.
A CA is a commonly trusted party that uses digital
signature algorithms to author certificates consist of a
public key and information of its owner. The security
of public-key cryptography and ultimately, the private
key is based on cryptography that can no longer be
considered safe because of the emerging quantum
computing threat. HLF relies on a PKI, which is
based upon Elliptic Curve Cryptography (ECC),
and it is critically vulnerable to quantum computing
[10]. Specifically, the cryptography that secures web
browsers (TLS), certificates, software updates, virtual
private networks (IPsec), secure email (S/MIME)
and many other applications are no longer safe in
the PQC era [11]. Reasonable blockchain enterprise
cybersecurity measures require extensive planning and
testing for transition and migration to post-quantum
resistant cryptography.
It is unlikely that the current PQC algorithms under
review will function “as is” and will require modifications
such as hybrid quantum resistant-classical PKI systems.
Hybrid systems will likely be the way forward in the
near term, given the uncertainties and complexities
of the current crop of PQC algorithms. Current
cryptographic libraries will provide support for postquantum digital signature algorithms in PKI but will
require some modifications and testing in large-scale
scenarios.
In this paper, the author investigates the use of hybrid
digital signature schemes, specifically qTESLA. Much
testing needs to be done in real-world scenarios
involving digital signatures and PKI. Protecting
against quantum attacks will require changes that
designers and implementers will have to accommodate.
Cryptographic primitives may need to be a replaced,
and protocol-level modifications may be necessary to
provide new primitives. It is a complex and lengthy
undertaking to migrate to a new quantum-resistant PKI.
Other issues such as constrained devices, compatibility,
performance characteristics, and Internet of Things
(IoT) must also be considered. Currently, HLF uses
the Elliptic Curve Digital Signature Algorithm, which
is used for many functions such as digital signatures
and TLS protocol handshakes.
6. Elliptic Curve Cryptography in HLF
Elliptic curve cryptography is a class of publickey cryptosystem which assumes that finding the
elliptic curve discrete algorithm is not possible in a
“reasonable” amount of time. Public key cryptography
does not require any shared secret between the
communicating parties. The security of elliptic curve
or asymmetric cryptographic schemes relies on the
believed hardness of solving “hard problems,” such
as integer factorization and the computation of
discrete logarithms in finite fields or groups of points
on an elliptic curve. The ECDSA algorithm relies
critically on generating a random private key used
for signing messages and a corresponding public key
used for checking the signature. The bit security of
this algorithm depends on the ability to compute a
point multiplication and the inability to calculate the
multiplicand given the original and product points.
Decades ago, these were “hard problems,” due to
several factors such as the current state of computing
power, and the time it would take for a classical
computer to solve these problems. Other factors come
into play, such as the length of cryptanalysis and the
lack of known techniques that ensured the problems
remained hard. However, the technology of computing
power, cryptanalysis, and side-channel analysis always
threaten the existing cryptographic standards given
enough time. It can be noted that many real-world
cryptographic vulnerabilities do not stem from solely a
weakness in the underlying algorithms, but often from
implementation flaws such as side-channel attacks,
errors in software or code design flaws. An example is
the vulnerabilities ECDSA signature implementation,
is the property of weak randomness used during
signature generation, which can compromise the longterm signing key.
The HLF CA provides features such as, registration
of identities, or connects to Lightweight Directory
Access Protocol (LDAP) as the user registry, issuance
of Enrollment Certificates (ECerts), certificate renewal
and revocation. HLF’s ECDSA offers the following
key size options:
Table 1. Algorithms used to generate X.509 certificates
and keys are not secure [12]
are not secure [12]
Size
256
384
521
ASN1 OID
prime256v1
secp384r1
secp521r1
Signature Algorithm
ecdsa-with-SHA256
ecdsa-with-SHA384
ecdsa-with-SHA512
The approved security strengths for U.S. federal
applications are 128, 192, and 256 bits. Note that a
security strength of fewer than 128 bits is no longer
approved because quantum algorithms reduce the bit
security to 64 bits (see table 2). NIST Special Publication
800-57 Part 1 Revision 4: Recommended for Key
Management, as shown in Table 2 [13]. Table 2 shows
that Rivest, Shamir, and Adleman (RSA) and ECC
based PKI have zero bits of security and AES requires
larger keys. This table illustrates the vulnerability and
single point failure, of the fully trusted CA and X509
standard based on ECC. The quantum computing
threat collapses the RSA, ECC, and HLF’s PKI.
The JBBA | Volume 2 | Issue 2 | October 2019
18
Qua
jbba
the
Table 2. Comparison of conventional and quantum security levels
of typical ciphers [14]
of typical ciphers [14]
Effective Key Strength / Security Level
Algorithm Key Length
RSA-1024
1024 bits
Conventional
Computing
80 bits
Quantum
Computing
0 bits
RSA-2048
2048 bits
112 bits
0 bits
ECC-256
256 bits
128 bits
0 bits
ECC-384
384 bits
256 bits
0 bits
AES-128
128 bits
128 bits
64 bits
AES-256
256 bits
256 bits
128 bits
7. Evaluation of qTESLA’s Second Round
Submission to NIST
The National Institute of Standards and Technology
(NIST) is in the process of selecting one or more
public-key cryptographic algorithms through a
public competition-like process. The new publickey cryptography standards will specify one or more
additional digital signature, public-key encryption
algorithms. It is intended that these algorithms will
be capable of protecting sensitive information well
into the foreseeable future, including after the advent
of quantum computers. The author tracked with
NIST in identifying three broad aspects of evaluation
criteria that would be used to compare candidate
algorithms throughout the NIST PQC Standardization
Process. The three elements are 1) security, 2) cost and
performance, and 3) algorithm and implementation
characteristics. Security is the most crucial factor when
evaluating candidate post-quantum algorithms. Cost as
the second-most important criterion when assessing
candidate algorithms. In this case, cost includes
computational efficiency and memory requirements.
After security, the performance was the next most
important criterion in selecting the second-round
candidates [3].
qTESLA is a lattice-based signature scheme which
uses the assumption that RLWE distributions are
indistinguishable from random. The public key in
qTESLA is, roughly speaking, a sample of an RLWE
distribution. The signer keeps secret information
about this sample and uses that information along
with a hash function to produce signatures. Signature
verification involves some simple arithmetic within the
chosen ring, and then the recomputation of a hash
function. qTESLA has reasonably good performance
parameters that are comparable to the other latticebased signature schemes. The submitters of qTESLA
have claimed a tight security proof for the schemes in
the quantum random oracle model. It was noticed that
a bug in the security proof requires an adjustment of
the parameters (which reduces the efficiency of the
The JBBA | Volume 2 | Issue 2 | October 2019
scheme). Furthermore, the security argument assumes
(among other things) conjecture about the distribution
of random elements in the ring. Considering that the
conjecture does do not seem to fit the form of a typical
security assumption, and more analysis will need to be
conducted in the second round.
This section, tests, evaluates and analyzes qTESLA’s
second-round submission modifications in the latticebased digital signature scheme category to NIST’s postquantum standardization project. This second-round
submission is based on the hardness of the decisional
Ring Learning With Errors (R- LWE) problem.
qTESLA utilizes two approaches for parameter
generation that includes heuristic and provably- secure.
The heuristic approach is optimized for efficiency and
key size, and the provably- secure is targeted to highly
sensitive or classified transactions. A new feature added
in the second-round submission is a key compression
technique that produces a noticeable reduction in the
public key size. The vendor refers to this technique
as “public key splitting,” and is significant because
it is the public key that is used most often in typical
transactions. qTESLA has submitted twelve parameter
sets targeting various security levels. However, this
work focuses on submissions that include public-key
reduction and the most efficient submissions as the
most practical hybrid (classical and quantum-resistant)
PKI near-term algorithm solution [14].
8. Basic signature scheme
Informal descriptions of the algorithms that give
rise to the signature scheme qTESLA are shown in
Algorithms 1, 2, and 3. These algorithms require two
basic terms, namely, B-short and well-rounded, which
are defined below.
Let q, LE , LS , E, S, B, and d be system parameters
that denote the modulus, the bound constant for
error polynomials, the bound constant for the secret
polynomial, two rejection bounds used during signing
and verification that are related to LE and LS , the
bound for the random polynomial at signing, and the
rounding value, respectively. An integer polynomial y
is B-short if each coefficient is at most B in absolute
value. An integer polynomial w well-rounded if w is
(lq/2J − E)-short and [w]L is (2 d−1 − E)-short.
In Algorithms 1-3, the hash oracle H(•) maps to H,
where H denotes the set of polynomials c ∈ R with
coefficients in {−1, 0, 1} with exactly h nonzero entries.
Algorithm 2 is described as a non-deterministic
algorithm. This property implies that different
randomness is required for each signature. This
design feature is proposed as added to prevent some
implementation attacks and protect against some fault
attacks [13].
19
jbba
the
Algorithm 1 Informal description of the key generation
Require: Ensure: Secret key sk = (s, e1, ..., ek, a1, ..., ak), and public
key pk = (a1, ..., ak, t1, ..., tk)
•
•
•
•
•
a1, ..., ak ← Rq ring elements.
Choose s ∈ R with entries from Dσ. Repeat
step if the h largest entries of s sum to at
least LS .
For i = 1, ..., k: Choose ei ∈ R with entries
from Dσ. Repeat step at iteration i if the h
largest entries of ei sum to at least LE.
For i = 1, ..., k: Compute ti ← ai s + ei ∈ Rq.
Return sk = (s, e1, ..., ek, a1, ..., ak) and pk =
(a1, ..., ak, t1, ..., tk)
Algorithm 2 Informal description of the signature
generation
Require: Message m, secret key sk = (s, e1, ..., ek, a1, ...,
a k)
Ensure: Signature (z, c)
•
•
•
•
•
•
Choose y uniformly at random among
B-short polynomials in Rq.
c ← H([a1y]M , ..., [aky]M , m).
Compute z ← y + sc.
If z is not (B − S)-short then retry at step 1.
For i = 1, ..., k: If ai y − ei c is not wellrounded then retry at step 1.
Return (z, c).
Algorithm 3 Informal description of the signature
verification
Require: Message m, public key pk = (a1, ..., ak, t1, ...,
tk), and signature (z, c)
Ensure: “accept” or “reject” signature
•
•
•
•
If z is not (B − S)-short then return reject.
For i = 1, ..., k: Compute wi ← aiz − tic ∈
Rq.
If c /= H([w1]M , ..., [wk]M , m) then return
reject.
Return accept.
the implementation attacks as research shows the
vulnerabilities of lattice-based signature schemes such
as qTESLA [16]. The second and third new feature is the
AVX2-optimized implementations for the parameter
sets qTESLA-I, qTESLA-III, and qTESLA-V, and
their variants with smaller public keys, called “public
key splitting,” for qTESLA-I-s, qTESLA-III-s, and
qTESLA-V-s respectively. qTESLA’s AVX2-optimized
implementations submission included an Intel
Advanced Vector Extensions 2 (AVX2) submission
which significantly improved performance. The
author performed experiments with qTESLA’s AVX2
optimized implementation, and the results are included
in this paper. The public key splitting submission
is a variant that addresses public key size, which is
significant because the public key size is regarded as
more important than the secret key size because the
former needs to be transmitted more frequently [14].
10. Mitigation of implementation attacks
Side-channel cryptanalysis considers attackers trying
to take advantage of the physical interactions of
cryptographic devices to achieve recovery of the
secret key. In some cases, computational faults are
intentionally inserted to obtain faulty values for
the key recovery. Fault injections or attacks are also
used to obtain information leakage under the faulty
environment. These implementations-specific attacks
are more efficient than the best-known cryptanalytic
attacks. They are therefore generally more powerful than
classical cryptanalysis and are a serious class of attacks
that must be addressed. These attacks exploit timing or
power consumption, electromagnetic emanation, that
is correlated to some secret information during the
execution of a cryptographic scheme and protection
against this attack is a minimum-security requirement
for standardized cryptographic implementation.
qTESLA attempts to address the exploit timing
leakage, power consumption, electromagnetic
emanation, and cache attacks by adding constanttime execution to secure against side-channel analysis.
qTESLA ‘s approach indicates that it is in every signing
operation, it injects “fresh randomness,” that will make
it resilient to a catastrophic failure of the Random
Number Generator (RNG) protecting against fault
analysis attacks [14]. The verification and validity of
the previous statements are not in the scope of this
paper and will most likely require more independent
tests and analysis.
9. New features
qTESLA utilizes two approaches for parameter
generation, the first approach, referred to as “heuristic
qTESLA,” follows a heuristic parameter generation
and the second approach, referred to as “provably
secure qTESLA,” follows a provably secure parameter
generation according to existing security reductions.
New in this submission is mitigation steps to address
The JBBA | Volume 2 | Issue 2 | October 2019
11. Performance of
algorithms analysis
second-round
qTESLA
To evaluate the performance of the provided
implementations written in portable C, the author ran
benchmarking suite on one machine powered by an
Intel® Core™ i7-6500 CPU @ 2.50 GHz x 4 (Skylake)
processor, 16 GB of RAM, 500 GB hard drive,
20
jbba
the
GNOME:3.28.2, running Ubuntu 18.04.2 LTS. For
compilation, GCC version 7.3.0 was used in all tests.
The vendor proposed twelve parameter sets which
were derived according to two approaches (i) following
a “heuristic” parameter generation, and (ii) following
a “provably-secure” parameter generation according
to a security reduction. The proposed parameter sets
are displayed in Table 3, together with their targeted
security category.
The results for the optimized implementations are
summarized in Tables 4, and 5, respectively. The
results for AVX2 implementations are given in Tables
6, and 7, respectively. Additionally, the reference
implementations are summarized in Tables 8, and 9,
respectively. Results for the median and average (in
sign
verify
qTESLA-I
903.2
(940.9)
206.4
(268.2)
55.1
(55.8)
total
(sign +
verify)
261.5
(324)
qTesla-I-s
928.5
(952.4)
214.9
(276.6)
54.8
(55.9)
269.7
(332.2)
qTESLA-III
2373.5
(2677.0)
273.5
(343.5)
110.4
(111.3)
383.9
(454.8)
qTESLA-IIIs
2366.8
(2713.6)
291.4
(374.2)
110.0
(112.4)
401.4
(486.6)
qTESLA-V
12577.2
(14472.8)
734.1
(951.3)
254.9
(256.0)
989.0
(1207.3)
qTESLA-V-s
12593.2
815.3
256.1
1071.4
Table 7. Second Round AVX2 Implementation Key Sizes in7
Bytes
Secret Key
Signature
Security category
qTESLA-I
1504
1216
1376
NIST’s category 1
qTesla-I-s
480
2240
1568
-
NIST’s category 2
qTESLA-III
qTESLA-III-s
3104
1056
2368
4416
2848
3232
qTESLA-p-III
NIST’s category 3
qTESLA-V
qTesla-V-s
6432
1952
4672
6592
5920
5216
-
NIST’s category 5
-
NIST’s category 5
qTESLA-p-I
Table 4. Second Round Optimized Implementation tests
for 5000 iterations.
iterations.
Scheme
keygen
Public Key
Provably secure
qTESLA-I,
qTESLA-I-s
qTESLA-II,
qTESLA-II-s
qTESLA-III,
qTESLA-III-s
qTESLA-V,
qTESLA-V-s
qTESLA-V-size,
qTESLA-V-size-s
Scheme
Scheme
Table 3. Parameter sets and their targeted security [14]
Heuristic
Table 6. Second Round AVX2 Implementation
keygen
sign
verify
total
(sign +
verify)
qTESLAII
4410.7
(4963.6)
931.7
(1226.1)
232.8
(236.5)
1164.5
(1462.6)
qTESLAII-s
4004.0
(4818.7)
981.5
(1281.4)
232.7
(235.1)
1214.2
(1516.5)
qTESLAV-size
17177.0
(20416.5)
2161.4
(2812.1)
511.6
(514.2)
2673.0
(3326.3)
qTesla-Vsize-s
17201.1
(20340.2)
2341.4
(2972.4)
516.8
(523.1)
2858.2
(3495.5)
Table 5. Second Round Optimized Implementation Key Sizes in
Bytes
ey
ey
e
Table 8. Second Round Reference Implementation
Scheme
keygen
sign
verify
total
(sign + verify)
qTESLA-I
920.3
(971.5)
314.4
(425.6)
71.5
(72.6)
385.9
(498.2)
qTESLA-Is
926.4
(968.5)
334.2
(438.1)
73.3
(74.2)
481.7
(512.3)
qTESLA-pI
4130.2
(4316.4)
1990.4
(2605.6)
561.2
(567.9)
2551.6
(3173.5)
qTESLA-II
4466.0
(5047.9)
1536.6
(2027.2)
372.3
(375.7)
1908.9
(2402.9)
qTESLAII-s
4452.1
(5047.0)
1647.3
(2213.9)
385.5
(386.5)
2032.8
(2600.4)
qTESLAIII
2395.5
(2669.8)
433.9
(580.0)
143.0
(145.2)
576.9
(725.2)
qTESLAIII-s
2410.5
(2735.2)
471.9
(610.8)
150.9
(153.6)
622.8
(764.4)
6932.0
(8776.4)
Scheme
ey
Public Key
ey
Secret Key
Signaturee
qTESLA-pIII
21043.7
(21569.7)
5414.6
(7247.6)
qTESLA-II
qTESLA-II-s
2336
800
931.7
3136
232.8
2432
qTESLA-V
qTESLA-V-size
5024
3520
4640
12224.6
(14221.3)
1349.6
(1775.1)
1517.4
(1529.
4)
325.9
(329.1)
qTesla-V-size-s
1952
6592
5216
qTESLAV-s
12644.5
(14433.8)
1439.4
(1856.3)
335.4
(336.8)
1774.8
(2193.1)
parenthesis) are rounded to the nearest 102 cycles.
Signing is performed on a message of 59 bytes.
qTESLAV-size
17357.1
(20838.9)
3653.8
(4769.2)
825.2
(830.5)
4479.0
5599.7
This work is a follow-on to qTESLA’s NIST first-round
submission, and the evaluation focuses on the “new”
and improved features submitted in its second-round
NIST submission. This second-round submission
includes an expanded category of parameters in which
the author examined the most practical based on
qTESLAV-size-s
17859.4
(21204.1)
3824.2
(5044.1)
851.3
(847.3)
4675.5
(5891.4)
1675.5
(2104.2)
performance
significant
(in parenthesis) improvements.
are rounded to the The
nearestmost
102 cycles.
Signing
enhancements noted, is in the speed of key generation
and the size of the public keys. Techniques, such as
the AVX2 and Public key splitting, yields a dramatic
--
The JBBA | Volume 2 | Issue 2 | October 2019
s
21
jbba
the
improvement over the previous submissions. The public
key splitting offers acceptable sizes for various NIST
security category levels, While, these implementations
are not provably secure as defined by NIST, meaning
the algorithms may not be approved for top secret
information and operations, however; they may prove
useful for less critical data and processes.
Table 9: Second Round Reference Implementation Key
Sizes in Bytes.
Scheme
Public Key
Secret Key
Signature
qTESLA-I
1504
1216
1376
qTESLA-I-s
480
2240
1568
qTESLA-p-I
14880
5184
2592
qTESLA-II
2336
1600
2144
qTESLA-II-s
800
3136
2432
qTESLA-III
3104
2368
2848
qTESLA-III-s
1056
4416
3232
qTESLA-V
6432
4672
5920
qTESLA-V-s
2336
8768
6688
qTESLA-V-size
5024
3520
4640
qTesla-V-size-s
1952
6592
5216
12. Optimized implementations
All comparisons are made about qTESLA’s first-round
NIST submission where possible, due to the fact there
are new submissions and comparisons cannot be made.
The optimized implementation for key sizes shows
qTESLA-II vs. qTESLA-II-s shows 78.5% public-key
reduction; however; there is an increase in the secret key
and signature size of 236.5 % and 944.6 % respectively.
Submissions for qTESLA-V-size vs. qTESLA-V-size-s
shows 61.1 % public-key reduction, while there is an
increase in the secret key and signature size of 87.2 %
and 12.4 % respectively. (See Table 5).
there is an increase in the secret key and signature size
of 86.5 % and 41.0 % respectively, See Table 7.
12.2. Reference implementation
The last category examined is Reference
implementation, which has 12 parameters. Since many
of these parameters are new, direct comparison to the
previous submission cannot be made. However; the
author notes overall, there is a significant reduction
in key generation, signing, and verification times
compared to the first-round submission. The following
is a comparison of the first-round submission to the
second-round submission. For example, for key
generation, signing, and verification CPU cycles
qTESLA-I reduced key generation cycle time by
26.4 % but increased 5.7 % signing, decreased 12.1
% verification respectively. qTESLA-p-I showed key
generation cycle reduction of 23.0 %, but the 152 %
increase in signing, an increase of 34.1 % verification.
qTESLA-p-III showed a decrease of 16.3 % key
generation, but increase signing 71.6 %, and a reduction
of 28.3 % verification time (See Table 8 and [2]). The
test results of the Reference implementation key sizes
in bytes are in Table 9. The following observations
can be made from a comparison of the first-round
submission with the second-round submission; The
most dramatic improvement comes with the public
key splitting function, while test results show there is a
corresponding increase in secret key size and signature.
For example, for the public key of qTESLA-I-s vs.
qTESLA-I decreased by 68.0%, but the secret key
increased by 84.2 %, and the signature increased by 13.9
%. qTESLA-III-s vs. qTESLA-III show a reduction of
65.9 %, but an increase in the secret key size of 86.4 %,
and an increase in the signature size by 13.4 %. Please
see Table 9 for further comparisons.
13. Recommendations for Blockchain Implementors
12.1. AVX2 implementation
The AVX2 implementation for key generation, signing,
and verification is shown in Table 6 and is compared
to the new AVX2 and public-key reduction. The tests
show that there is a slight increase in key generation
time, signature and verification time for all categories
of submission when using the public-key reduction
techniques, however; these improvements are dramatic
compared to the respective timing in all categories in
qTESLA’s first submission [2]. (See Table 6). The
AVX2 implementation for key sizes shows qTESLA-I
vs. qTESLA-I-s shows 68.1 % public-key reduction;
however; there is an increase in the secret key and
signature size of 84.2 % and 13.9 % respectively.
Submissions for qTESLA-III vs. qTESLA-III-s shows
65.9 % public-key reduction, while there is an increase
in the secret key and signature size of 86.5 % and 13.4
% respectively. Finally, in this category, qTESLA-V vs.
qTESLA-V-s shows 69.6 % public-key reduction, while
The JBBA | Volume 2 | Issue 2 | October 2019
HLF implementors should develop and provide a
strategy or roadmap for maintaining the confidentiality,
integrity, and availability of private keys and stringent
cybersecurity controls to combat the quantum
computing threat. Also, implementers should review
their current cryptographic standards to make sure
they are up to date, and that infrastructure and
support exist to update when new NIST standards
become available rapidly. Immediate work should
begin to test and benchmark the most promising PQC
candidates that could be integrated into its blockchain
with interoperability and compatibility in mind. The
X.509v3 standard allows for algorithm flexibility in
that the Object Identifier (OID) defines the formats
of public keys. Adding a new cipher OID is needed to
extend X.509, but what is also required is for software
will be able to comprehend and process the new OID.
Currently, there are no known CAs issuing certificates
for quantum-safe public keys exist, and no CAs is
22
jbba
the
signing their certificates with a quantum-safe signature
algorithm.
for an ecosystem-level solution to protect
organizations and maintain contractual
obligations.
Determine how to implement best the
GDPR principle of “the right to be
forgotten.”
What is the ability to detect, correct
fraudulent, malicious, or erroneous records?
It is unclear which organization will be
considered as the data controller and
processor within the Fabric and enterprise
blockchains, especially when they cross
international borders.
Create new quantum-proof policies,
methods, and procedures aligned to use
cases/requirements. Update asset inventory
with newly implemented cryptographic
details.
Strong blockchain network security requires the roles
and responsibilities of each type of participant to
be clearly defined and enforced following regulatory
guidelines. It is essential to qualify, quantify, and
document cybersecurity risks posed by each type
of participant. It is also essential to anticipate and
understand the security consequences of participants
leaving and entering the network over time. Blockchain
developers should anticipate and understand these
threats resulting before committing regulated data to
the blockchain. There should be plans for penetration
testing that are similar to traditional networks using
various attack scenarios and vectors, document the
development process and obtain independent audits of
the design and development process.
•
Therefore, there is an urgent requirement to develop
and deploy plans to accommodate the most practical
hybrid PQC algorithms that are working towards
global standardization. The successful transition and
migration to PQC will require significant time and effort
given the complexities involved. Further, researchers
should examine hybrid solutions where both classical
cryptography algorithms and PQC algorithms working
together to mitigate the uncertainties in the pace
and development of quantum computers and the
reliability of candidate PQC under the global standards
community.
Healthcare, GDPR, and financial entities must not
think that there are no risks associated with blockchain
enterprise blockchain networks and must ask for
documented risk management strategies to protect
regulated data. As the HLF blockchain ecosystem
becomes more diverse and grows in popularity, vendors,
users, and implementors must be aware of possible
cyber-attack. While blockchains offer unique structures
and provide cybersecurity capabilities that are not
present in today’s networks, reasonable measures must
be taken. The cybersecurity risk must be evaluated,
documented, and its implications considered when
regulated, businesses policymakers, and institutions
commit protected data to any enterprise blockchain.
13.1. Recommendations for Healthcare and GDPR
Covered Entities
•
•
•
14. Conclusions and Future Work
HLF and other permissioned blockchains present
unique opportunities and vulnerabilities in managing
cybersecurity risks. As the healthcare industry, financial
services, and GDPR covered industry begin to
experiment with and commit to pilots, these entities
need to understand that the risks are appropriately
identified, and this is a risk management plan. This
risk management plan is required for regulated data,
and there must be one for enterprise blockchains.
Therefore, beyond the hype of any new technology,
a thorough cybersecurity program remains vital, and
all parties need to conduct due diligence to protecting
the network and participating organizations from cyber
threats. Also, the participation of multiple entities, each
with their on-ramps into the enterprise blockchain, is a
potential source of vulnerability.
Ask blockchain vendors about their quantum-safe
features to protect data that is under regulatory
guidance
•
Query software-as-a-service or thirdparty platform providers about their
embedded cryptographic methods and plans
The JBBA | Volume 2 | Issue 2 | October 2019
This work has shown that HLF, enterprise blockchains,
and current global PKI that relies on the PKI X.509
standard to ensure secure communication between
various network participants are utterly vulnerable to
the quantum computing threat. Falsified certificates
destroy the trust, integrity, confidentiality, and nonrepudiation in the entire blockchain and can have
enormous consequences if measurements are not
taken. It has been shown that quantum computers
break ECC on which PKI depends and therefore
exposes its implementers and users to potentially
massive fines for non-compliance and security
incidents with GDPR, FINRA and HIPAA laws.
Enterprise Blockchains such as HLF are being adopted
in many industries that have regulatory controls over
the data. For example; GDPR regulates European
Union citizens’ data with the potential of massive
fines irrespective of the location or headquarters of
the blockchain implementation location. Financial and
PII data privacy and information is becoming more
heavily regulated, especially on Wall Street and in the
state of New York and California. In the United States,
healthcare data privacy is a significant issue with the
23
jbba
the
increase in cyber-attacks, and the resulting lawsuits,
fines, and penalties levied on violators.
The author argues that blockchain technology has the
potential to address the documented issues of legacy
health and financial information technology systems,
such as interoperability, data access, speed, and privacy
and the ability to adapt to changing programs. However;
out-of-date cryptographic standards will be broken
and will not forestall any adversaries from breaking
their encryption and gaining access to highly regulated
data and information. Development and deployment
plans need to be developed to accommodate the most
practical hybrid PQC algorithms that are working
towards global standardization. Also, blockchain
cybersecurity policy is required to govern acceptable
use and should include standards, procedures, and
guidelines.
Cybersecurity should begin with an assessment that
includes current security policies, identification of
objectives, review of requirements, and determination
of existing vulnerabilities. It is imperative to begin
the development of “Policy Recommendations for
Enterprise Blockchains” because covered entities
must know that placing their data on permissioned
blockchains does not and cannot negate risks and
obligations. All must understand the risks before
committing regulated data, because it is required, and
it is also prudent in protecting PHI, PII, GDPR, and
FINRA regulated data and information. An evidencebased approach is needed to mitigate and adhere to
cybersecurity regulation. All aspects must be considered
such as geographic boundaries, jurisdictions and a
thorough understanding of the impact of widespread
governance of global regulators
As cyber threats to the HIPAA and GDPR and covered
financial entities continue to grow in dedication and
sophistication permissioned blockchains can contribute
to add “new and advanced cybersecurity techniques”
and can be a valuable tool in mitigating those threats if
the risks are understood and mitigated. Permissioned
blockchains offer significant cybersecurity capabilities,
share some of the same cyber risks that affect other IT
systems, and have unique characteristics, all of which
merit further evaluation by regulators and industry.
The author encourages new conversations about the
cybersecurity benefits of blockchain systems and ways
to promote appropriate government policies.
Finally, this research does not indicate any of NIST
Second Round candidate algorithms will be a simple
“drop-in replacement,” and it may require additional
NIST rounds and years of follow-on research, analysis
and testing for a suitable “drop-in replacement,” can
be identified or developed. Therefore, the author
believes that qTESLA offers a possible near-term
“Hybrid Quantum Resistant-Classical Public Key
Infrastructure,” a solution with a significant reduction
The JBBA | Volume 2 | Issue 2 | October 2019
in its public key size. As discussed, it is the public
key that is exposed and used the most in today’s
PKI systems, and it is possible to modify the X.509
certificate standard to accommodate this new PQC
algorithm that would only provide the public key that
would be much more resistant to implementation
and quantum computing attacks. Additional work
and testing are needed in large scale real-world
scenarios to ensure there are no significant issues
with incorporating PQC PKI X.509 certificates on
an industrial scale. Potential problems that need to
be examined are latency, overhead, and the ability for
software, hardware, and other constrained devices to
interoperate such as, smartphones, smart cards, and
IoT. Regardless of the estimated time of arrival of
large-scale quantum computers, cybersecurity should
be a primary concern to enterprises and healthcare
organizations because they cannot afford to have their
private communications and data decrypted even if it
is ten years away.
References:
[1] J. Emond, "IBM Newsroom," 24 January 2019. [Online].
Available: https://newsroom.ibm.com/2019-01-24-AetnaAnthem-Health-Care-Service-Corporation-PNC-Bank-andIBM-announce-collaboration-to-establish-blockchain-basedecosystem-for-the-healthcare-industry. [Accessed 16 May 2019].
[2] R. Campbell, "Evaluation of Post-Quantum Distributed
Ledger Cryptography," The Journal of the British Blockchain
Association, vol. 2, no. 1, pp. 17-24, 2019.
[3] NIST, "Second PQC Standardization Conference," 22
August 2019. [Online]. Available: https://www.nist.gov/
news-events/events/2019/08/second-pqc-standardizationconference. [Accessed 16 May 2019].
[4] NIST, "Second PQC Standardization Conference," 22
August 2019. [Online]. Available: https://www.nist.gov/
news-events/events/2019/08/second-pqc-standardizationconference. [Accessed 16 May 2019].
[5] E. Commission, "2018 reform of EU data protection
rules,"
[Online].
Available:
https://ec.europa.eu/
commission/priorities/justice-and-fundamental-rights/dataprotection/2018-reform-eu-data-protection-rules_en. [Accessed
16 May 2019].
[6] G. EU.org, "Fines and Penalties," [Online]. Available:
https://www.gdpreu.org/compliance/fines-and-penalties/.
[Accessed 16 May 2019]
[7] D. o. H. a. H. S. Office for Civil Rights, "Federal
Registry," [Online]. Available: https://www.federalregister.
gov/documents/2013/01/25/2013-01073/modifications-tothe-hipaa-privacy-security-enforcement-and-breach-notificationrules-under-the#h-95. [Accessed 16 May 2019].
[8] "CNBC interview: Harriet Green, Chairman and CEO
24
jbba
the
of IBM Asia Pacific," , . [Online]. Available: https://www.
cnbc.com/2018/03/30/ibm-sees-quantum-computing-goingmainstream-within-five-years.html. [Accessed 11 7 2019].
[9] A. M. V. V. K., Z. M. Jøsang, "The Impact of Quantum
Computing on Present Cryptography," Arxiv, 31 March 2018.
[Online]. Available: https://arxiv.org/pdf/1804.00200.
[Accessed 16 May 2019].
[10] H. U. M. M. S. D. Bindel Nina, "Transitioning to a
Quantum-Resistant Public Key Infrastructure," PQCryptoBHMS17, 2017. [Online]. Available: https://s3.amazonaws.
com/files.douglas.stebila.ca/files/research/papers/PQCryptoBHMS17.pdf. [Accessed 16 May 2019].
[11] Hyperledger, "Fabric CA User’s Guide," [Online].
Available:
https://hyperledger-fabric-ca.readthedocs.io/en/
latest/users-guide.html#table-of-contents. [Accessed 11 6
2019].
[12] "NIST Special Publications - NIST Computer Security
..., ”,. [Online]. Available: http://csrc.nist.gov/publications/
PubsSPs.html. [Accessed 7 1 2019].
[13] L.. Chen, S. P. Jordan, Y.-K.. Liu, D.. Moody, R. C.
Peralta, R. A. Perlner and D. C. Smith-Tone, "Report on
Post-Quantum Cryptography | NIST," , 2016. [Online].
Available: https://nist.gov/publications/report-post-quantumcryptography. [Accessed 30 12 2018].
[14] N. Bindel, "Submission to NIST's post-quantum project
(2nd round)," 2019. [Online]. Available: https://csrc.nist.gov/
Projects/Post-Quantum-Cryptography/Round-2-Submissions.
[Accessed 11 6 2019].
Competing Interests:
None declared.
Ethical approval:
Not applicable.
Author’s contribution:
RC designed and coordinated this research and prepared the manuscript
in entirety.
Funding:
None declared.
Acknowledgements:
RC wants to thank his PhD supervisor Dr. Ian McAndrew, Dean of
doctoral programs, Capitol Technology University, for his dedication,
encouragement and expert guidenace in this research.
The JBBA | Volume 2 | Issue 2 | October 2019
25
jbba
the
Peer-reviewed Research
The Contractual Cryptoeconomy:
An Arrow of Time for Economics
OPEN ACCESS
ISSN Print: 2516-3949
https://doi.org/10.31585/jbba-2-2-(1)2019
Prateek Goorha
Independent Scholar, Greater Boston, USA
Correspondence: goorha@sent.com
Received: 11 March 2019 Accepted: 18 April 2019 Published: 2 May 2019
Abstract
We consider the potential blockchains have for building a framework for all manner of contracts that
can characterize an economy using the unifying idea of control over their duration. Such a contractual
cryptoeconomy (CCE) would accommodate a broader variety of contracts than smart contracts, which are
suitable for a relatively small portion of the set of all feasible contracts. We proceed by examining the
idea of a contract’s natural life as a common feature shared across all contracts, be they incomplete or
complete. This simplifying idea suggests why providing flexibility over a contract’s duration on a blockchain
– through innovations such as HTLCs — is necessary to increasing the variety of contracts that can be
feasibly represented. We also assess participation in a CCE that features blockchains with differing degrees of
security. We do so by focusing on how the value of a contract is related directly to its natural life for both its
immediate participants and, through externalities across the CCE, to a wider set of users. A key idea provides
the overall impetus: When contracts rely on third-party intermediation, at least some contractual surplus is
dissipated in arbiter rent, making the quality of third-party arbitration as important as its scale. By contrast,
blockchains create contractual mechanisms that act as Coasian exchanges that can internalize this arbiter rent.
However, crucially, the degree to which their use requires forgoing contractual complexity and absorbing the
cost of externalities can determine the relative benefits provided by a CCE.
Keywords: Arbiter Rent; Contracts; Duration; HTLCs; Blockchains; Thomas Jefferson; Economic Arrow of Time;
Coasian exchange; Contractual Cryptoeconomy
1. Introduction
‘The Earth belongs, in usufruct, to the living.’ - Thomas
Jefferson [1].
While its specific focus is blockchains, the impetus for
this article came from Thomas Jefferson’s observation
cited above. It is extracted from a letter he wrote to
James Madison in 1789, impelled by his belief that a
contract’s length should be set at a fixed period.
Jefferson’s actuarial skills had enabled him to calculate
that – owing to the average life span of individuals
then – by the end of that period one of the parties
would likely have died. Contracts, he proposed, should
be rescinded every 19 years. The clock should, in
other words, be reset so that the usufruct of contracts
can more correctly reflect their true creators and
beneficiaries.
It is on the nature of this link
between the usufruct of a contract on the one hand
and its duration on the other that we shall focus our
attention on in this paper; it is, we shall see, key to the
The JBBA | Volume 2 | Issue 2 | October 2019
class of contracts that can be feasibly represented on a
blockchain.
Yet there is also a second aspect of Jefferson’s thought
process that is worth appreciating: The idea that this
usufruct is at risk of being delimited and squandered,
and that a mandated reset of some kind is the only
tool at hand to prevent this undesirable eventuality. Is
a resetting of the clock necessary to realign usufruct
across blockchains too, and can such a tool feasibly
even exist for blockchains without necessarily violating
its immutability characteristics? In relation to this idea
we shall also consider a particular source of risk to
a contractual cryptoeconomy (CCE) that emanates
from the externalities between its different blockchain
instantiations, and even between the CCE and the
traditional economy based on legacy contractual
mechanisms.
It is clear that Jefferson believed that successors to a
contract should not be forcibly shackled to the actions
of its predecessors, and that events from a time in
the past should not take hostage those who create
27
jbba
the
events at a time in the future. Given the linear and
immutable nature of blockchains, does a CCE not
meet this standard? We shall see how an appreciation
of contractual variety, and developing mechanisms
for a CCE to accommodate them, suggests quite the
opposite.
Jefferson understood moral hazard all too well. On
placing a hard duration on contracts, he wrote in his
letter:
contracting – and actualize a CCE – would seem then
to depend not merely on their ability to serve as the
proverbially dispassionate ‘arrow of time’, but also to
enable guiding such an arrow’s direction tractably when
a contractual application requires it. This is to say that
a CCE needs an ‘economic arrow of time’ that appeals
to time as the arbiter, but in a manner better suited to
maximizing contractual usufruct.
2. The Contractual Cryptoeconomy
‘This would put lenders, and the borrowers also, on
their guard. By reducing too, the faculty of borrowing
within its natural limits, it would bridle the spirit of
war, to which too free a course has been procured by
the inattention of money lenders to this law of nature,
that succeeding generations are not responsible for the
preceding.’ [1]
His thinking inspires considering the following
broader question: Do all contracts have some notion
of a natural life in common? Perhaps more generally:
What is the foundational role of time in transactions
and contracts? Is it to provide an absolute and final
verdict, like some digital super-precise photo-finish
line in a race? Or is to serve as the permissive referee
who taps an unseen wristwatch significantly, merely to
encourage a dawdling participant to adopt a somewhat
swifter pace of progress?
These are sweeping questions, but here we shall
examine these issues more narrowly in the context of
blockchains, for which a key characteristic is precisely
that of the inherent immutability of transactions they
enable alongside an impartial adherence to a linear
process that features time-stamping as a tool to appeal
to time as the ultimate impartial arbiter.
When time is connected with a sequence of
transactions – say as with an uncomplicated supply
chain or assembly line – the linearity of a secure
blockchain can trivially be used to reliably and usefully
bolster the operations with verifiability. However, a
large swath of research in economics examines the
myriad of situations where such linearity isn’t quite
so obvious. Often sequential investments are not
fully specifiable ex ante, which is to say that there is
no obvious chain to follow for contracting parties. In
several cases such incompleteness is actually desirable
to both parties in a contract, for example when the
nature of incompleteness is itself a basis for setting
expectations yet leaving room for creativity around
a shared goal. And, frequently, the sequence should
become terminable ex post to protect the value of an
investment, as in cases where recontracting becomes
necessary; in such cases, the prospect of recontracting
limits the ability of the inefficient ex post allocation to
endure.i
For blockchains to be a genuinely useful tool for
The JBBA | Volume 2 | Issue 2 | October 2019
While constitutions, transnational pacts, purchase
agreements and employment contracts can all be seen
as forms of ‘contracts’, they have several obvious and
several subtle differences that justify their examination
within the purlieus of separate fields of study.
Indeed, whether a constitution can be considered a
(social) contract in any real and useful sense is hardly
an uncontentious idea. [2] provides several useful
references and a general discussion, and, interestingly,
also considers their applicability within the context of
piratical constitutional contracts. See, also, [3].
Economists, for example, have long studied the
difference between a complete contract and an
incomplete contract. The incompleteness stems from
the fact that a vast majority of contracts in the real
world cannot be made fully contingent on a specifiable
state of the world. Smart contracts, by contrast, are
premised on fully specifiable states of the world and
are, in this respect, an interesting example of complete
contracts. For incomplete contracts, moral hazard is a
prime motivator. In other words, incomplete contracts
focus on ownership of productive assets because their
use can often not be fully specified ex ante, nor can
it frequently be monitored. It has been argued that
such incomplete contracts could, in theory, be made
equivalent to complete contracts provided only that
the parties are averse to risk and we assume that they
can at least provide a probability distribution for future
outcomes, even if they cannot predict exact features
of the possible future states of the world. This works,
provided we have access to an incentive compatible
mechanism that motivates the parties to declare the
state that does eventuate truthfully. [4]
It is not, therefore, hard to understand why incomplete
contracts are ubiquitous in the real world. For a
discussion of the difference between complete and
incomplete contracts in the context of blockchains, see
[5], [6] and [7].
Abstracting from differences between the variety of
applications of contracts and their broad types, here
we wish to focus thought on an essential similarity
observed by the third president: the idea of a natural
life. Time – its duration; its ability to be reset; its
impending horizon – is central to all contracts, and
it is this shared basis of a ‘progression across a series
28
jbba
the
of transactions’, each linked in some direct or indirect
manner to time, that makes their association with
blockchains an interesting subject to consider.
2.1 Internalizing Arbiter Rent
Blockchains operate on the essential principle of
time-stamping a batch of transactions and permit
the possibility of doing so immutably, verifiably and
in a decentralized manner; crucially, depending on
features of their particular instantiation, the degree to
which these features are secured from sabotage varies.
This lends them to be particularly useful for at least
two functions: providing a reliable infrastructure for
broadly accessible capital markets and serving as a basis
for reifying and securing property rights.
It has long been recognized in the development
literature that a government’s ability has to credibly
secure property rights and encourage well-functioning
financial markets are key to its capacity to signal its
commitment to private-sector investment, especially of
the variety that is accretive to longer-term growth. (See,
as examples, [8] and [9].)
Between these two functions, there is little doubt that
weak property rights do more insidious damage to
growth prospects than weak financial markets. [10]
However, it has been shown time and again that the
temptation for governments to spurn this advice and
turn to rapacious rent-seeking activities remains a real
threat to stunting economic growth and development
prospects. On this point, [11] is particularly convincing.
This broader observation is important for the context
of contracts, since third-party arbitration is key not
just to a contract’s enforceability but to the overall set
of contracts that can eventuate in an economy. This
function of arbitration, enforcement and verification
that governments provide – primarily through their
legal code and system of courts – yields them valuable
economic rent, which we can see as ‘arbiter rent’.
For a contractual space based on blockchains, however,
the economic value that is represented by the arbiter
rent is internalized within the same system that employs
actors on the decentralized network to function as
independent and neutral verifiers. Traditional arbiter
rent, in this broad sense at least, is reimagined by
blockchains. It is retained within the transactional
parameters defined by the contractual space a
blockchain’s design implements. It is not, however,
retained entirely within a given contract directly.
To see this point, contrast the contracts that rely on
third-party verification provided by institutions with
those contracts that entirely dispose of them, operating
purely on the basis of trust between parties.
When third-party arbitration is essential, the general
The JBBA | Volume 2 | Issue 2 | October 2019
institutional quality (see, for example, [12]) and the
reliability and efficiency of courts (as argued in [13])
becomes paramount to the extent that a contract
can generate surplus. The potential for regulatory
distortions resulting in higher arbiter rent and lower
contractual surplus for the participants looms large
over the market.
Since institutions also provide the broader context to
societal trust, or ‘social capital’ between contracting
agents, it is hard to separate the effects of each.
However, it has been shown that, even controlling for
such endogeneity, social capital still plays a very strong
role in enabling beneficial contracts; [14] provides a
discussion on the relative role that social capital plays
in financial contracts in the context of southern versus
northern Italy. Frequently such trust-based contracts
are used by those who would otherwise be priced out
of any feasible arbiter-enforced contract for a service
that entails some form of direct or indirect arbiter
rent. As such, ‘trust’ provides a useful social benefit
for contracting.
More generally, the ability to remove the extractive
influence of arbiter rent reduces the inframarginal cost
and enables greater contractual surplus.
The trouble, of course, is that contracts that are strongly
reliant on trust can only operate within the narrow
swath of applications where prosocial behaviours and
norms among the participants are socially embedded,
which is to say, ordinarily only within extended families
and smaller communities. [15] proposes a modelling
framework to see the role of social capital for informal
contractual enforcement in a network. The network
connections themselves serve as a collateral that can
be used for borrowing between participants in the
network.
Contracts that are enabled by blockchains derive their
basis from a third source. Neither do they directly rely
on social capital – derived from interpersonal trust –
nor do they need institutions that provide third-party
verification and arbitration – premised upon state
sanction. Instead, they replace both with a system based
on a consensus protocol for their users that requires no
intrinsic trust among its participants, but that creates
a reliable contractual space where transactions can be
made strongly verifiable.
Contracts operating on a blockchain are designed to
internalize the arbiter rent, thereby creating a dedicated
economic space – the ‘contractual cryptoeconomy’ –
which is more broadly accessible than those contracts
that rely entirely on social capital and less costly than
those that rely on third-party arbitration.
Naturally, this is the macro-view for a theoretical
motivation for the CCE. In practice, there are
significant problems that make it unclear whether a
29
jbba
the
CCE can indeed satisfactorily accommodate all other
forms of contracts.
Consider, for example, that competing blockchain
applications can be built ad nauseam without any
costless manner to distinguish between their relative
quality of implementation ex ante. Centralized thirdparty arbitration mechanisms, on the other hand,
are usually maintained under a system that grants
monopoly power over the arbiter’s function to
the state that defines the contract’s jurisdiction. In
theory, such proliferation can curtail the extent of the
internalization of arbiter rent. Contractual surplus
faces the risk of being dissipated when contracts are
allocated inefficiently between the legacy contractual
environment based on courts as the ultimate third-party
arbiter and the contractual blockchain economy. On the
other hand, proliferation might also generate positive
externalities for the CCE. Much depends on whether
we can make variegated blockchain implementations
compatible and convergent to theoretical ideals of
a contracting platform: interoperability between
blockchains certainly permits such compatibility in a
technical sense, though it only characterizes a fraction
of all feasible implementations of blockchains. We
shall develop these points further with the help of a
simple model later on.
2.2 Flexibility in Contractual Time
Since the prior description of all relevant states that
may affect a contract is either infeasible or impractically
expensive, contracts are routinely left incomplete,
without fully state-contingent clauses. Incompleteness
in contracts may exist for other reasons as well, some
of which are unavoidable and some deliberate.
Consider the case of a bilateral externality, for example,
where the parties engage in a contract without prior
information on the size of the externality that might be
generated by the scale of the primary activity that one
of the relevant parties engages in, and can therefore
not effectively set appropriate terms. [16] Conversely,
consider the case of crafting a contract to optimize on
the choice of providing contractual flexibility in the
terms of the contract ex ante as opposed to making
them more rigid. With flexible terms established ex
ante, the parties have more freedom to adjust their
behavior ex post, once they have better information on
how to make the division of surplus more agreeable
to both parties. At the cost of some loss of control,
flexibility in contractual terms can incentivize creativity,
make individual initiative more likely to affect surplus,
motivate the selection of more suitable projects, and
so forth. This suggests that there may be a strong role
for deliberate incompleteness in contracts as a tool
to set the expectations for the parties involved. [17]
Smart contracts, in such cases, would obviously be
suboptimal.
The JBBA | Volume 2 | Issue 2 | October 2019
Given the large variety of contracts in the real world
that are best described as incomplete, it is worth
considering the Jeffersonian idea of deliberate
recontracting (in other words, the proviso of a horizon
for contracts) for the particular context of contractual
implementations on a blockchain.
Blockchains have potential as a theoretical construct for
recreating consensual outcomes across a decentralized
market structure to leverage the value that is inherent
in aggregating distributed information efficiently. For
economics this is nothing short of revolutionary, for
the very obvious reason that we can now imagine a
third alternative to the dichotomy that underpins the
‘market versus organization’ dilemma (or firms versus
institutions) that [18] outlined. Blockchains permit
market orderings for value-generation that suspend
both the invisible hand of the price mechanism of
markets and the direct guiding hand of hierarchies
in organizations; [19] terms this third mechanism a
‘cryptographic stigmergy’.
The fact that they are immutable, time-dependent
databases that can be made exceedingly censorship
resistant makes the market and social orderings that
public blockchains enable especially durable. However,
blockchains are not amenable to providing nuanced
consideration of incentives and are, as a consequence,
less suitable for tackling contractual complexity that
such orderings must routinely grapple with. In this
respect, scaling solutions for blockchains that introduce
layers upon a foundational blockchain consensus
protocol, and then erect a network upon it that can
flexibly represent nuance that contractual incentives
contain are noteworthy.
Consider the idea of a hashed time-locked contract
(HTLC), which illustrates the connection between
providing some degree of control over time and the
types of contracts that it makes possible. An HTLC
is a particular kind of smart contract that has been
developed for the scalable transactional layer – the
Lightning Network – built on top of the underlying
Bitcoin blockchainii. [20] The Lightning Network
enables the creation of task-specific payment
channels off-chain that permit the aggregation of
several transactions that can be mapped onto fewer
transactions on the base layer, thereby lowering the
average transactional cost. In the limit, only two
transactions on the more expensive and slower base
layer suffice for a multitude of transactions on any
given payment channel: the initial transaction that funds
the payment channel shared by two or more agents in a
‘multisig’ account, and a final transaction that updates
the status of accounts after the payment channel is
closed off. This effectively loosens the dependency of
a multi-transactional contractual relationship on the
immutable time-stamping feature of the underlying
Bitcoin blockchain. Transactions proceed by a process
30
jbba
the
of sequential consensus over mutually preferred states
that, once agreed to, simultaneously also invalidate
deprecated states by instituting a penalty comprising
the loss of all staked funds should the previous state be
surreptitiously used to close off the payment channel
and published to the blockchain.
to the time it is completed. Therefore, HTLCs can be
seen as an organic and dynamic method to define a
nexus of contracts that determines the boundary of
a traditional firm, and it uses the underlying Bitcoin
blockchain as the third-party arbiter for a wider set of
contracts that inhere to traditional firms.
The network aspect of the Lightning Network permits
several ‘hops’ across any of its nodes with open
payment channels. This allows any participant to effect
payments to anyone else on the network much more
swiftly and cost-effectively than is possible with the
base Bitcoin layer. Moreover, the open nature of the
network creates a contestable market for transactions.
This is important since it ensures that competitive
market pressures influence the terms of all new
contracts, and the terms that pertain to the division of
the surplus that the contract can entail.
While this setup seems to have effectively created the
precursors to decentralizing a firm on a scaling solution
for blockchains, it remains far from certain that it rings
in the demise of traditional firms. Issues pertaining to
residual control over productive and complementary
assets, management of teams, the assumption of risks,
the delegation of authority across agents, and so forth
are complex contractual issues that will require further
developments, very likely relying on a suite of suitable
technologies working seamlessly to integrate not just
blockchains, but other types of ledger technologies as
well.
For our context, these developments are significant for
two compelling reasons.
First, more specifically, HTLCs make the significance
of a natural expiry for a contract in eliciting efficient
contractual investments clearer to apprehend. An
HTLC operates by first creating the hash of a secret.
The secret must be revealed by the recipient in order to
access some funds at stake. If the hash is kept private,
we have a more constrained and state-contingent
contract between a buyer and a seller. If the hash
is made public, we can then imagine a tournament
between a buyer and a pool of sellers who competitively
exert efforts to discover the secret. An HTLC also
involves an interplay between a definite time at which
the contract expires and the ability to adjust the terms
of the contract to the demands of a specific context
by decrementing this duration sequentially. An HTLC,
therefore, places emphasis on publicly specifying a
‘fixed duration’ before the contract’s outcome becomes
inviolably published to the Bitcoin blockchain, thereby
ending the contract and forcing a reset.
While this reset afforded by the base layer is
Jeffersonian in spirit, the HTLC permits context to
provide variability in the duration itself. This is because
an HTLC also features a method to introduce a
‘flexible horizon’ as a method to motivate and negotiate
efforts that help generate contractual usufruct in the
shadow of the Bitcoin blockchain. As such, HTLCs
are designed and can be developed further to capture a
broader swath of contracts in practice.
Second, and more broadly, note that the Lightning
Network could, in theory, permit defining any arbitrary
architecture for some given contractual mechanism as a
subgraph of its overall network structure. In particular,
it becomes feasible to specify not just any set of nodes
that are involved within a transaction, but also the order
in which they are involved from the time it is initiated
The JBBA | Volume 2 | Issue 2 | October 2019
3. The Economic Arrow of Time
The prospective role of time-stamping processes
that can then be marched immutably through time
looms large over applications that are considered
for blockchains. There is something attractive about
relying on time as an arbiter.
Of course, this view is rather limiting in its capacity for
the nuanced insight needed for dealing with contractual
variety in the real world. It is indeed true that some
physical processes feature an ‘arrow of time’: closed
systems with increasing entropy concretely indicate an
irreversible and directional arrow through time. Most
famous among these is the thermodynamic arrow of
time implied by the Second Law of Thermodynamics.
Other processes, however, are characterized by a ‘timereversal invariance’, in that they do permit possibilities
for a reversal of the process. [21] It is, therefore,
even at a rather general level, infeasible to rely on the
inviolability of some implied arrow of time as the
essential shared foundation for real world applications.
In the context of blockchains, while the law is
routinely taken to unleash the value of transactional
immutability, it can very well also be taken to suggest
the level of difficulty required to successfully sabotage
precisely that feature.
For instance, a supply chain, from initial input to
final output, may appear to represent a process very
conducive to the arrow of time analogy. Yet, the value
of any such arrow shrinks markedly when we are
interested in more than merely describing the process of
sequentially linking units into a chain. By concentrating
emphasis on the curation of information, a supply
chain on a blockchain sets aside several interesting and
important contractual issues, implicitly assuming that
they can all be considered complete.iii This delimits
the usefulness of blockchains by relegating a host of
31
jbba
the
incomplete contractual transformations that affect the
potential usufruct of the supply chain. By contrast,
when we begin to consider aspects of the various
contracts that exist between entities on a supply chain,
the emphasis shifts from one of an inexorable and rigid
arrow of time, to one that can be guided – perhaps
better seen to be a distinct ‘economic arrow of time’.
In a standard contract in economics (where the
principal is risk neutral and the agent is risk averse) the
prospect of renegotiating a contract serves to give the
contract precisely this characteristic of time-reversal
invariance. When an agent must select costly effort
that is unobservable by the principal over the course
of a contract and, simultaneously, must also commit
to not renegotiating, she exposes herself to a degree
of risk. To elicit the optimal level of effort through
any form of assurance of a payoff that corresponds
with the higher-level of effort, the principal would
need to distinguish between agents who would select
suboptimal levels of effort from those who select
the optimal level; instantly, we shift the focus of the
problem to one of resolving adverse selection rather
than a strict sequential progression through the
contractual parameters.
3.2 Aspects of time
Contracts that feature degrees of state dependency
and propensities for renegotiation underscore the
relevance of two aspects of time that are related but
subtly different in their effects: ‘timing’ and ‘duration’.
It is broadly understood that timing is integral to the
very rationale for a range of contracts. The sequence
and ordering of investment decisions that are stipulated
by a contract can determine the amount of contractual
surplus generated. One of the key messages of
transaction cost economics is that timing is key to
ameliorating a variety of opportunistic behaviors
that are inspired by appropriable quasi-rents; timing
is, indeed, central to motivating efficient investments,
reducing a range of social externalities and, of course,
in setting the overall boundaries of a firm with respect
to the market. A key difference between a simple statedependent smart contract and an HTLC is that the
latter permits a method to algorithmically delimit the
appropriable quasi-rents involved in a contract.
Contracts can also vary widely in their duration.
Constitutions usually have far more enduring lives
while several securities contracts can have extremely
short lives. Thus, a provision for flexibility over both
aspects of time that affect the contractual horizon
is both necessary and appropriate for any generic
contractual template.
The idea of a contractual duration has been examined
at some length in the literature. [22] and [23], for
example, suggest that, broadly, contract length depends
The JBBA | Volume 2 | Issue 2 | October 2019
on the level of uncertainty the investment represents
and the cost of renegotiation. Short-term contracts
with the option of renegotiation have been contrasted
with longer-term contracts. For example, [24] suggests
that, in the absence of a commitment to refrain from
renegotiation, a buyer and seller will prefer engaging
in a sequence of short-term contracts. (See also [25],
which contains useful references.) [26] demonstrates
the efficiency of short-term contracts over the long
run and [27] suggests that even spot contracts can be
efficient when inter-temporal smoothing concerns are
not a consideration.
Concerns with sequential short-term contracts arise
when pertinent information over incentives and
behaviour is revealed asymmetrically and in a manner
that is correlated over time so that bargaining power
shifts squarely towards one party to the detriment
of the other. Here, smart contracts that also strongly
guarantee anonymity of the participants ex ante would
incentivize undertaking a sequence of shorter-horizon
contracts, thereby avoiding introducing undesirable
divisions of surplus owing to the asymmetric
revelation of private knowledge. [28] develops a class
of contracts for the Lightning Network, called ‘discreet
log contracts’, that provide anonymity as a feature
while also reducing the scope of malfeasance by the
third-party nodes that act as intermediaries.
3.2 Phases in a contract’s natural life
Regardless of the nuance over aspects of time within
a contract’s natural life, most contracts are usually seen
dichotomously – a contract either exists or it does not,
whether in prospect or in fact, and whether it is tacit
or explicit. However, consider that most contracts exist
within contextual environments that impinge upon
them and lead them through ‘states’ of validities over
the duration of their existence. Generally, we can call
these states of a contract over its natural life its ‘phases’
and enumerate at least three: acceptability, vulnerability
and termination.
Quite simply, when an extant contract accords with
the intention of its participants it can be said to have
acceptable validity; when, over its life, it is susceptible
to being either terminated or unacceptable (at risk of
renegotiation) then it can be said to have a vulnerable
validity. The contract’s natural life can thus be parsed
into phases that describe stages of its existence, and
we can subsequently consider the transitions of the
contract through these phases over its duration.
While fluid transitions between phases that might exist
within a contract are not explicitly considered in the
literature, the general issue is recognized as one that
is significant in its social welfare implications. For
instance, [29], which focuses on contrasting ex ante
dispute resolution arrangements with ex post dispute
32
jbba
the
resolution; while ex ante arrangements enhance joint
surplus, they tend not to be legally enforced.
Our consideration of a contract’s natural life here
is not meant as a sensationalist departure from the
literature on contracts, but to draw attention to the
fact that several aspects of a contract, such as its
prospect for renegotiation, uncertainty, moral hazard,
and adverse selection, can usefully be seen as being
internal to the contract and manifested as transitions
across its phases. HTLCs provide a very promising
first step towards resolving such issues for contracts
on the blockchain, but they are hardly flexible enough
to accommodate complex transactions, multi-layered
contracts, complicated property rights, and a host of
other issues.
Contracts are often generic templates. They might
be drawn up to be applicable across a multitude
of transactions, with only limited consideration for
specific circumstances, or they might be drawn up and
made inviolable through the passage of time or across
its applications in a given period. Several examples
can be offered in support of this observation of a
social, political and economic nature: primogeniture,
constitutions and union-negotiated employment
contracts, for instance, are contracts that, perforce,
do not specify all feasible states explicitly, but their
incompleteness for a particular context or contingency
(intentionally or not) completely defines their phases.
This restates the result in [25], but for a different
reason: there the observation is that incompleteness
on account of transaction costs need not be relevant
so long as payoffs are known. Here, incompleteness
can never be entirely eradicated even if payoffs are
known so long as parties to a contract ‘care’ about
the transitions of the contract over its phases in its
duration, and that the phases are finite and foreseen. It
is, of course, feasible that the phases in the duration are
a mechanism relevant to the contracting parties since it
retrieves information relevant for payoffs.
4. Externalities in a CCE
Recall that [18] argued that there is an inherent ‘cost to
discover market prices,’ and that firms are motivated
by the ability to suspend using the price mechanism
of the market to coordinate production, permitting
the firm’s manager instead to direct the coordination
of resources. Similarly, a blockchain can be seen as a
‘Coasian exchange’: Participants are brought together
through an ecosystem that acts as a mechanism for
the coordination of activities organically, and which
is motivated by the ‘cost of discovery for the market
value of consensus’.
Arguably, the Lightning Network, as a second-layer
scaling solution for Bitcoin, can be seen as an effort
to encourage the Coasian exchange dynamics of the
The JBBA | Volume 2 | Issue 2 | October 2019
underlying layer by undertaking an ‘intervention’ to
ameliorate the negative externalities from congestion
on the base layer.
Intrinsic to these relative costs of discovery (those
for the market prices versus those for the market
value of consensus) are several externalities, positive
and negative, that a contractual blockchain economy
represents relative to the traditional economy.iv These
externalities may inhere in the social resource costs
for securing a blockchain implementation’s consensus
protocol. They may arise from the information costs
imposed by implementations of blockchains with less
desirable characteristics or the lack of interoperability
between the more desirable ones.v They may even
pertain to the developments upon it that alter its value
proposition.
There is a broad source of externalities that the
regulation of cryptocurrencies imposes upon this
relative cost consideration. Broadly, this source inheres
to the difference between the market for ideas as
opposed to the market for goods. Externalities are a
common basis for excessive regulatory intervention in
the market for goods, especially when contrasted with
a reluctance to apply similar regulatory predispositions
in the market of ideas. It was Coase again ([30] and
[31]) who articulated why a definitive treatment of
this issue was essential to any real consideration of
externalities affecting production in markets. The
notion, frequently heard, that software ought to be
treated by the government as speech makes this point
quite clear.
4.1 A traditional modeling framework on realigning
externalities
Let us briefly consider this issue of externalities as they
pertain to participation in the CCE. We use a simple
framework that should be instantly familiar to students
of public economics.
We might imagine that the economy comprises some
secure blockchain υ with a market price of pν, and
other blockchain instantiations conducive to hosting
contracts. We can think of this ecosystem collectively
as our contractual blockchain economy, Υ.
The point is to imagine a scenario where participation
in υ provides a net external value to other participants
across Υ, and that it is only partially accounted for
by the participants within the secure blockchain.
To capture the idea that other participants in the
blockchain economy experience varying degrees of
externality effects from υ, the nature of which can also
be multidimensional, we only need assume that the
joint probability distribution P(V,E) is known to all who
participate in Υ, where participation in Υ yields a private
benefit of V to the individual and, simultaneously, it
33
e of
νν
jbba
the
̌ν
̌ν ̌ν
Υ a net positive externality
Υ of value, E. In terms ̌νcomprises
the group of participants in υ who create
inspires
̌ν
ΥΥΥ
ΥΥΥ
υ
and the latter
of our Jeffersonian premise,
E can be seen to represent feweřνnet positive Υ-wide externalities
υ
Υ
υ who would be
that part of the contractual usufructs in υ that are not group Υwould have been participants
Υ to generate such positive externalities to Υ.
more likely
directly internalized by its participants.
Υ
υ
Υ
υ υυ
Υ
It is useful to see why this joint probability distribution It is quite obvious that any ability to price discriminate
would make sense for Υ. Information is inherently between these groups would be an immediate source
distributed, andΥso the secured and decentralized for an increase in the net social externality gain from
ΥΥ
the secured
by υoutcomes.
Υand decentralized
economic
orderings
enabledΥbyeconomic
υ entailsorderings
more of enabled
a Υ market
the
secured
and
decentralized
economic
orderings
enabled
υ υυ
the
economic
orderings
thesecured
secured
anddecentralized
decentralized
economic
orderings
enabled
by
gain toand
those
who are more
marginalized
by anyenabled
of
thebyby
Υ
Υ
υ toweconcern
themselves
withonincreasing
In our context
can imagine
higher layers
the securethe
distributively inefficient economic orderings that are blockchain
blockchain υ to concern themselves
with increasing
the
υ’s
base
settlement
layer. This
vi
blockchain
υ
to
concern
themselves
with
increasing
more centralized and less secure than υ.υ
blockchain υ to concern themselves
with increasing
the
υ’s base settlement
layer. This
υ υ υυ
the transaction throughput
base settlement
υ’s of
baseυ’ssettlement
layer. This
To fix ideas further, let us capture the social marginal layer.value
Thisofnaturally
as a screening
the dataserves
on υ through
time andmechanism
those who are
υ
cost that the security
of
υ
entails
on
the
Υ
ecosystem
between
those
participants
who
are
interested
theare
value
of
the
data
on
υ
through
time
and thoseinwho
υ
Υ
value
of immutability
the data on υ of
through
time of
andthe
those
who
υ υυpermits us toΥdefine
with s. This
and
the value
data
onare
ΥΥ a net socialΥ gain in the security
the secured
and
by υare interested, more
blockchain-enabled economic
system; for
individual ς economic
υυ through orderings
time and enabled
those who
Υ andecentralized
ς proximately, with securing frequent transactions at low
ΥΥ−
υ
in Υ,Υ participation inκυ yields a net
social
gain
of
υ
Υ
υ
the secured and
decentralized
enabled by υ ς cost, which we can capture with the variable ς.
−−orderings
κ=(V
+E-s). κ κκ economic
−
Υν
ς
υ
ς
ς
υ
This̃latter group
would then have a joint probability
ς
̃ς
υ
ς
(V,E),
whereas
and
the
former
group
distribution
of
P
ς
̃
υ
ν
All new entrants
to Υ face
νν p
ΥΥΥ
ν for access to the most
υ if pν exceeds the entrant’s
νν
secure blockchain. Naturally,
ν
reservation price she does
not υ
participate
υ in υ. As
υ υυ
such, a recognition of the presence of the net positive
makes itΥ advantageous for Υ to institute a
υΥ
ΥΥΥexternality
υ a social subsidy for all entrants to υ.
method
to
provide
κ
υ υυ
In the case
of the secure blockchain,
the magnitude
of
Υ
υ
υ
this ‘subsidy’
can
be
seen
as
the
social
resource
cost,
R,
κ
υ υυ −
Υ
of securing υ, and
it can be written as
ν
ν
would have (Pς ) ̃(V,E). The social resource cost, R, of
Υ
securing υ, now becomes
∫κ ς
∫ Υ∫ κ̃ς
υ ∫
ς
̃
∫
κ ς
∫
∫
κ
ν ∫
0 κP
0 κ(P ς (V, E))dV dE
̃ς (V, E). dV dE + p∫
∫
R=
− p∫νν ∫
ν
ν
ν
∫pν ∫0 κ
Υ
R = ∫νp∫ν∫∫
κ(P(V, E))dV dE ,
ν0∫∫ κκ
ppν 00
Υ
υ
Υ receives begins at pν
where the value that a participant
νν
ν
υ
without an upper bound whereas the externality
from
a given participant ranges from zero without an upper
υ
υ
bound.
p 0
pν 0
With the cost of access to the higher transactional
l
layer as l, the efficient price for participants solely in
υ
the settlement layer abides the same condition:
̌ν −
̌ν
α
̌ν ) − s
̌ν = α(E/p
p
̌ν −
̌ν
α
whereas, for the groups on the transactional layer, the
price abides:
̌ν + α ( E/p
̌ν ) .
s + l = p
layer is lower than that for the group on the base layer
and the net positive externalities are higher through
ν
discrimination. Specifically, the ability to sort the
00
0
participants in this manner permits participation in
ν
υ
the base layer to exclude those for whom E was lower
υ υ
This suggests that the efficient price υ
for υ is
but V was higher, and include them in the transactional
Υ
were
to
efficiently
select
a
priceinstead.
for υ we would have:
layer
̌ν
∂ κ∂ υ
−∫ κ
∫pν ∫
∂ ∂∂R/
∂ ∂∂pυ
υ0 υ −
0
=−∫
−∫∫κ κκ(P(V,
E))dE = 0.
α ( ⁄̌ν ) −
̌νp
ν ν=α α
(α(⁄(Ě
) )−)−−s,
̌
̌
ν̌
⁄
νwe
υ the number of transactional
ν would have:
p
Υ were to efficiently select a price for ⁄
υ̌
There is a technical limit for
υ
∂
∂
υ
−
∫
κ
layers
that
are
likely
to
be
υbuilt on υ as well as a practical
re α (E⁄̌ν ) rrepresents the average externalities 0 limit on the need for such layers. At a general level, this
where
α α(α(⁄(̌
) )) p
ν
ν νat the
⁄̌
∂e⁄efficient
υ̌
−∫
κ price; thus, the social marginal causes a degree of pooling of the participants across
efficient
pri
υ ∂applicable
ς
0 social marginal gain.
υ
υ υΥυ
cost is equal to the
the two groups
and creates limits to the ratcheting
ς
ΥΥΥ
ain υ with a market price of
cour
cour
cour
ς
Υ were to efficiently select a price for υ we would have:
̌νςς
̌ν
ας
ν
ν
υ
ΥΥwere
to
efficiently
select
a
price
for
υ
we
would
have:
̌
̌the
select
aaprice
have:
α
If
Υ to
were
to efficiently
a for
price
for
υwould
we ∫would
The
price
for
the
group
participating
in
transactional
ς
ς
Υwere
were
toefficiently
efficiently
selectselect
price
forυυwe
wewould
have:
∫ κ
pν 0
have:
ν
ν
p 0
pν 0
With
With
With
effect that curators of such layers might developςmerely
In words, even an efficient υprice consideration
discriminate on the basis of ς more and more
̌ν forυα (to⁄price
̌ν ) −See [32], who initially developed this idea in
υ υυ in perfectly.
υ can do no better than lump in relevant nuances
average externalities.
in Υ for whom the private the context of a two-period incentive contract with
̌
m υ, the nature of which can
α ( ⁄Those
Υν
̌ν ) −
ethe
nature
of
which
can
𝛶𝛶𝛶𝛶
benefit
and
net
externality
is
below the
social marginal asymmetric information on observed performance.
Υ
the
nature
of
which
can
ΥΥ
nature of which can
α (E ̌ν ) υ
cost participate in υ (V is higher than⁄p
υ υυ); those for
whom it is higher doυnot participateicient
(V is lower
5. Concluding Remarks
pri than
α (E⁄̌ν )
of
course,
because
the
former
p . This is undesirable,
Υ
icient pri
υ
Υ JBBA | Volume 2 | Issue 2 | October 2019
υ
The
34
ν
of externality effects from υ, the nature of which can
Υ υ
[2] P.T
[2] P.T
M
[2] P.T
M
M
[3] D.
[3] D.
C
[3] D.
C
C
jbba
the
With Jefferson’s observation as the overarching
impetus, we have examined the issue of a natural life for
contracts as a feature they all share. Contracts do not,
however, last forever, and the notion of their stability is
only relevant when seen from the perspective of their
vulnerability to partial failure; in other words, how
contracts behave over the course of their entire life
deserves attention. Blockchains draw attention to this
overarching fact. They hold the potential to develop
a platform, with features of a Coasian exchange, that
permits the use of an economic arrow of time that
can accommodate a genuine contractual blockchain
economy.
The Jeffersonian standpoint of favouring the living
is an acknowledgmentvii that the contractual enabling
of the usufruct is premised upon a period that comes
to a close. Logically, this period can be examined as a
duration with a definite commencement and expiration,
but with varying states of validity as economic rent
from a relationship varies over the course of the
duration of the contract; the contract then can be seen
to have conditional probabilities for these validities
over its duration. When contractual usufruct is lost
through the course of a contract’s natural life, the
Jeffersonian solution of recontracting makes patent
sense. However, when an economic arrow of time
can be appealed to that can service complete as well
as incomplete contracts, recontracting does not have
to be the default solution. The linear transformations
that blockchains accommodate so well provide a
strong basis for contractual mechanism design; the
organic networks that fluidly emerge from the evolving
patterns of contractual usufructs that higher-layer
scaling solutions provide suggest that a much wider
variety of incomplete contracts can be accommodated
as well. Together this gives us a strong basis for a
contractual blockchain economy.
Constitutional Contracts”, American Journal of Political
Science, vol. 31, no. 1, pp. 142-168, 1987.
[4] E. Maskin and J. Tirole, “Unforeseen Contingencies and
Incomplete Contracts”, Review of Economic Studies, vol. 66, no.
1 (special issue on contracts), pp. 83-114, 1999.
[5] P. Goorha, “Blockchains as Implementable Mechanisms:
Crypto-Ricardian Rent and a Crypto-Coase Theorem”, Journal
of the British Blockchain Association, Volume 1, Issue 2,
Available: 10.31585/jbba-1-2-(4)2018., 2018a.
[6] P. Goorha, “A Comprehensive Contracting Solution Using
Blockchains,” SSRN Working Paper, Available: http://
dx.doi.org/10.2139/ssrn.3237076 , 2018b.
[7] J.S. Gans (2019) ‘The Fine Print in Smart Contracts,’
SSRN Working Paper, Available: http://dx.doi.
org/10.2139/ssrn.3309709, 2019.
[8] D. North, Institutions, Institutional Change and Economic
Performance, Cambridge University Press, 1990.
[9] D. Rodrik, “Promises, Promises: Credible Policy Reform
via Signalling”, The Economic Journal, vol. 99, no. 397, pp.
756–772, 1989.
[10] S. Johnson, J. McMillan and C. Woodruff, “Property
Rights and Finance”, American Economic Review, vol. 92, no.
5, pp. 1335–1356, 2002.
[11] A. Shleifer and R. Vishny, The Grabbing Hand:
Government Pathologies and Their Cures, Harvard University
Press, 2002.
[12] D. Acemoglu, D. and S. Johnson “Unbundling
Institutions”, The Journal of Political Economy, vol., no. 5, pp.
949-995, 2005.
Admittedly there is a long way to go before the
contractual blockchain economy can be seen as a real
alternative – indeed, one that is to be preferred in an
era of technologies that favor distributed information
– to the traditional economy. However, the fact that
several of the necessary components exist in theory
and practice even today is a real source for optimism.
[13] A. Shleifer, “Efficient Regulation”, Regulation vs.
Litigation, ed. Daniel Kessler, NBER and University of
Chicago Press, pp. 27-43, 2010.
References:
[15] D. Karlan, M. Mobius, T. Rosenblat and A. Szeidl,
“Trust and Social Collateral”, Quarterly Journal of Economics,
vol. 124, no. 3, pp. 1307-361, 2009.
[1] T. Jefferson “Letter to James Madison”, The Founders’
Constitution, vol. 1, chapter 2, document 23, University of
Chicago Press. http://press-pubs.uchicago.edu/founders/
documents/v1ch2s23. Html, 1789.
[2] P.T. Leeson, “The Calculus of Piratical Consent: The Myth
of the Myth of Social Contract”, Public Choice, vol. 139, no.
3/4, pp. 443-459, 2009.
[14] L. Guiso, P. Sapienza and L. Zingales, “The Role of
Social Capital in Financial Development”, The American
Economic Review, vol. 94, no. 3, pp. 526-556, 2004.
[16] R. Pitchford and C.M. Snyder, “Coming to the Nuisance:
An Economic Analysis from an Incomplete Contracts
Perspective”, Journal of Law, Economics and Organization,
vol. 19, pp. 491-516, 2003.
[17] O. Hart and J. Moore, “Contracts as Reference Points”,
Quarterly Journal of Economics, vol. 123, pp. 1-48, 2008.
[3] D.D. Heckathorn and S.M. Maser “Bargaining and
The JBBA | Volume 2 | Issue 2 | October 2019
35
jbba
the
[18] R.H. Coase, “The Nature of the Firm”, Economica, vol.
4, pp. 386-405, 1937.
[19] P. Goorha, “The Return of ‘The Nature of the Firm’:
The Role of the Blockchain”, Journal of the British Blockchain
Association, volume 1, no. 1, Available: 10.31585/jbba-1-1(2)2018, 2018c.
[20] J. Poon and T. Dryja “The Bitcoin Lightning Network:
Scalable Off-Chain Instant Payments”, Available: https://
lightning.network/lightning-network-paper.pdf, 2016.
[21] B. Roberts, “When We Do (and Do Not) Have a
Classical Arrow of Time”, Philosophy of Science, vol. 80, no.
5, pp. 1112-1124, 2013.
[22] J. Gray, “On Indexation and Contract Length”, Journal of
Political Economy, vol. 86, no. 1, pp. 1-18, 1978.
[23] S. B. Vroman, “Inflation Uncertainty and Contract
Duration”, Review of Economics and Statistics, vol. 71, no. 4,
pp. 677-681, 1989.
[24] O. Hart and J. Tirole “Contract Renegotiation and
Coasian Dynamics”, Review of Economic Studies, vol. 55, no.
4, pp. 509-540, 1988.
[25] M. Dewatripont, “Renegotiation and Information
Revelation over Time: The Case of Optimal Labor Contracts”,
Quarterly Journal of Economics, vol. 104, no. 3, pp. 589–619,
1989.
[26] P. Rey and B. Salanie, “Long-Term, Short-Term and
Renegotiation: On the Value of Commitment in Contracting”,
Econometrica, vol. 58, pp. 597-619, 1990.
[27] D. Fudenberg, B. Holmstrom, and P. Milgrom “Shortterm Contracts and Long-Term Agency Relationships”, Journal
of Economic Theory, vol. 51, pp. 1-31, 1990.
Note that, when such inefficiencies are the source of
rent for one of the parties in a contract, recontracting
is undesirable to her, even if recontracting may lead to
a Pareto improvement for the contract.
i
Recall that the base layer of Bitcoin was the first
blockchain application and was created with the
intention to serve as a digital payment system for
networks that obviated the need for third-party
intermediation. Bitcoin secures its transactions through
the use of a consensus algorithm based on the idea of
incontestable proof of work done; it is operationalized
by nodes on the network called miners who must invest
in costly dedicated computer hardware and energy to
competitively solve cryptographic puzzles in order
to earn the right to batch transactions into a block
that then gets appended to the Bitcoin blockchain.
This provides the miner a payoff comprising a fixed
number of bitcoins and a smaller variable transaction
fee, while enabling all participants on the network to
verify the accuracy of the overall ledger of transactions
independently.
ii
iii
For instance, along each stage of a supply chain that
features a typical two-sided market, incentives provided
by the reference platform linking both sides of the
market may well change.
iv
Naturally, there are several externalities that pertain to
the mechanisms of a given blockchain implementation
as well. These may include externalities imposed by
the activities of a single node that affects the entire
network, such as when it engages in transactions that
increase the latency across the entire network and ties
up a disproportionate share of resources. However, we
are more interested here in considering externalities
directly relevant to the broader contractual blockchain
economy.
A key benefit of contracts on interoperable blockchains
is in reducing the costs of complexity in describing
outcomes that pertain to a contract. For example, the
nature of investments that parties make at time 2, once
the contract has been put into operation at time 1, is
often seen as being sufficiently complex to make them
effectively beyond being independently verified by any
third-party, such as a court. Blockchain interoperability
can assuage this concern by folding in more and more
aspects of an incomplete contract within the ambit
of what can be feasibly verified publicly by a ‘trusted
third-party’. Such aspects can pertain to the nature of
the investments, but also to the realized state of the
world ex post.
v
[28] T. Dryja, “Discreet Log Contracts”, undated working
paper, MIT Digital Currency Initiative, last accessed: February,
2019.
[29] S. Shavell, “Alternative Dispute Resolution: An Economic
Analysis”, Journal of Legal Studies, vol. 24, no. 1, pp. 1–28,
1995.
[30] R.H. Coase, “The Market for Goods and the Market for
Ideas”, American Economic Review, vol.64, no. 2, pp. 384–
391, 1974.
[31] R.H. Coase, “Advertising and Free Speech”, The Journal
of Legal Studies, vol. 6, no. 1, pp. 1-34, 1977.
vi
[32] J. Laffont and J. Tirole “The Dynamics of Incentive
Contracts”, Econometrica, vol. 56, no. 5, pp. 1153–1175,
1988.
Mutatis mutandis, this can be seen to extend beyond
the contractual blockchain economy to the traditional
economy as well.
vii
The JBBA | Volume 2 | Issue 2 | October 2019
The author readily admits that Jefferson’s observation
36
jbba
the
was more profound than what is made of it for the
purpose of this paper!
Competing Interests:
None declared.
Ethical approval:
Not applicable.
Author’s contribution:
PG designed and coordinated this research and prepared the manuscript
in entirety.
Funding:
None declared.
Acknowledgements:
None declared.
The JBBA | Volume 2 | Issue 2 | October 2019
37
jbba
the
Peer-reviewed Research
OPEN ACCESS
ISSN Print: 2516-3949
https://doi.org/10.31585/jbba-2-2-(3)2019
Singapore’s Open Digital Token Offering Embrace:
Context & Consequences
Robert W. Greene1, David Lee Kuo Chuen1,2
1
Singapore University of Social Sciences, Singapore
2
Stanford University Distributed Trust Initiative, USA
Correspondence: rwg1819@gmail.com
Received: 17 May 2019 Accepted: 4 June 2019 Published: 28 June 2019
Abstract
The overall global public’s ability to purchase some portion of a digital token project’s initial batch of
tokens is the defining feature of an open digital token offering. Using a dataset that differentiates this token
distribution model from other varieties – a distinction often underemphasised in regional analyses of digital
token sale trends – this research estimates 2017-18 open digital token offering activity by jurisdiction, finding
that Singapore-registered projects accounted for 21 percent of Q3/Q4 2018 dollar-volume, more than
any other country. Conversely, by late 2018, previous hubs of this distribution model represented a much
smaller share. Reasons for Singapore’s rise as a global hub of the open digital token offering are explored,
with a particular focus on examining contrasting regulatory approaches to distinguishing between this token
distribution model and traditional securities offerings. Notably, 11 percent of Singapore-registered Q3/Q4
2018 token offering dollar-volume was purely-private, versus 94 percent in the U.S. Policy considerations
related to this distribution method and the open digital token offering are presented, as are contrasting
outcomes: this research estimates that over 70 percent of Singapore’s one-to-two-year-old open token
offerings resulted in operational networks or minimum-viable-products, versus fewer than 40 percent of U.S.
private sales. Also, about 40 percent of smart contract platform projects that conducted 2017-18 token sales
were Singapore-registered – many more than in any other country. For reasons explored in this research,
these findings support the view that open digital token offerings benefit projects aiming to concurrently raise
funds, build up a user-base, and incentivise technologists to contribute to project development. Moreover,
risks to retail participants posed by this distribution method are manageable. Singapore’s policy approach
towards open digital token offerings has benefited the Lion City, which was likely home to more digital token
projects that conducted 2018 token sales than any other city in the world.
Keywords: Arbiter Rent; Contracts; Duration; HTLCs; Blockchains; Thomas Jefferson; Economic Arrow of Time;
Coasian exchange; Contractual Cryptoeconomy
JEL Classifications: G18, G28, F39, K20, K22, K23, O16, O38
1. Introduction
Last year, the dollar-volume of digital token
distributions eclipsed the value of initial public
offerings within a developed economy with robust
capital markets infrastructure. In Singapore, the value
of 2018 initial public offerings was $730 million [1], yet
as this research finds, Singapore-registered 2018 digital
token sales raised over $1.6 billion [2].i Understanding
Singapore’s important role within the digital token
economy first necessitates understanding digital
tokens. For purposes of this research, “digital tokens”
The JBBA | Volume 2 | Issue 2 | October 2019
are defined as “transferable units generated within a
distributed network that tracks ownership of the units
through the application of blockchain technology” [3].
Unlike traditional financial assets, a digital token serves
as “a cryptographically-secured representation of a
token-holder's rights” to perform certain functions
within or receive benefits from a token network [4] [5].
In the case of virtual currencies, a type of digital token,
these rights include the ability to store and exchange
value within a distributed peer-to-peer payments
network [4].
39
jbba
the
The initial batch of a project’s digital tokens can be
distributed through various approaches.ii For the last
two years, the most popular approach, by far, has been
the open digital token offering. This article defines
an “open digital token offering” as occurring when
a software project or business provides purchasing
access to some portion of the initial supply of digital
tokens associated with a project to most of the global
public (some barriers to access may existiii). Conversely,
“private initial token sales” – an alternative form of
initial token distribution –restrict outside purchases of
any share of a project’s first batch of tokens to only
a relatively small number of participants, generally
high-net-worth or institutional buyers. Funds raised via
these two distribution approaches are commonly used
to finance the development of a digital token project’s
network, platform, or services.
Section 2 presents estimates of 2017-18 regional open
digital token offering trends, finding that the Cayman
Islands, Singapore, Switzerland, and the U.S. were the
four major hubs of “successful” 2017 open digital
token offerings,iv but by Q3/Q4 2018, only Singapore
remained a leading home to this distribution model.
During the second half of 2018, purely-private digital
token sales accounted for nearly all digital token
offering dollar-volume in the U.S., but just 11 percent
in Singapore. This contrast stems from differing
regulatory approaches examined in Section 2, which
help explain Singapore’s role as a dominant hub of the
open digital token offering.
Section 3 assesses the outcomes of Singapore’s
open digital token offering embrace, finding that a
significantly greater share of one-to-two-year-old
Singapore-registered open token offerings relative to
U.S. private initial token sales resulted in operational
associated networks or services. Singapore-registered
token offerings also accounted for a disproportionately
large share of 2018 “smart contract platform”
projects (defined below). For reasons explored in
Section 3, these outcomes provide support to the
view that open digital token offerings are well-suited
for projects aiming to use a token distribution event
to concurrently fundraise, build up a project’s userbase, and incentivise contributions by developer
communities. Of course, operational projects are not
inherently successful projects, and many may fail, so
the scope and management of risks facing open digital
token offering retail participants is examined with a
focus on Singapore. The extent to which token projects
registered in Singapore are primarily physically-based
in the country is also estimated.
Section 4 concludes that the consequences of
Singapore’s open digital token offering embrace
highlight beneficial features of this distribution model,
which is well-suited for the swift development and
deployment of new distributed services and networks.
Photo
by Andrew
Kow on Unsplash
The JBBA
| Volume
2 | Issue
2 | October 2019
Singapore, likely home to more digital token projects
that conducted successful 2018 token sales than any
other city, stands to benefit in the years to come from
its open digital token offering embrace.
2. How Policy Influenced Regional Trends in
2017-18 Open Digital Token Offerings
While the first open digital token offering took place in
2013 [5], overall token sale volume did not dramatically
accelerate until 2016 and 2017 [3], after Ethereum’s
2015 release. Ethereum is an open-source, decentralised
platform for executing and recording “smart contracts”
(“set[s] of promises, specified in digital form, including
protocols within which the parties perform on these
promises” [6]) [7], and as a “smart contract platform,”
it allows programs to be transparently appended to and
run on its blockchain [8]. The late 2015 development
of an open-source standard for Ethereum smart
contracts [9], the “ERC-20 standard,” provided best
practices for coding applications that generate new
types of tokens recorded on the Ethereum blockchain
(tokens “run on top of Ethereum”) [8]. This drove a
huge increase in token offering volume [10] – roughly
$12 million was raised via 2015 digital token sales; in
2016 and 2017, that figure grew to over $100 million
and over $7.5 billion, respectively [3]. While a token
project may eventually swap tokens running on top of
Ethereum for tokens recorded and transmitted within
a new network it launches [5], at least 60 percent of
digital tokens with active secondary markets run on
top of Ethereum [11], and many of these may be used
within applications designed to permanently run on
the Ethereum blockchain.
By 2017, hundreds of token projects were utilising
smart contract platforms so that project supporters
across the world could receive some of a project’s
initial batch of tokens in exchange for providing funds
to the project to support its team’s efforts to either
build out an application or launch a new network – a
process that some policymakers consider to be, under
certain circumstances, an unregistered public securities
offering. The disclosure, reporting, and structural
requirements of a registered public securities offering,
however, are quite costly [12]. Moreover, while
regulators may exempt small-sized securities offerings
or sales exclusively available to wealthy persons from
certain public offering requirements, exemptions can
lead to regulatory complications for digital token
projects, as explained later. Indeed, widely-distributed
digital tokens are often quite different than the equity
securities historically issued via these public and
private channels, which generally entitle holders to a
share of distributed profits and the value of a firm,
and can provide ownership rights [13].v One analysis of
253 digital tokens distributed from 2014 through late
2017 finds that three dominant uses are: 1) access to
platform services (68 percent); 2) project governance
40
jbba
the
decisions (25 percent); and 3) payments (21 percent)
[14]. Other research finds that over 75 percent of
tokens distributed by projects from 2013 through early
2017 provide access to platform services and about
half enable payments [5]. Given the stark differences
between traditional securities and most digital tokens,
applying traditional securities regulations to small
projects focused on developing digital token networks
can make those projects unworkable [15].
The analysis below estimates 2017-18 successful
open digital token offering trends by jurisdiction
using data primarily obtained through collaboration
with Smith+Crown, a research and advisory
consultancy. Policy factors that influenced 2017-18
trends, particularly those related to securities law, are
concurrently examined, revealing external and internal
forces behind Singapore’s role as a hub of the open
digital token offering. The Appendix sets forth the
methodology used to construct this study’s dataset –
unlike other datasets used to analyse regional token
offering trends, it distinguishes between private initial
token sales and open digital token offerings as well as a
token project’s physical location versus the jurisdiction
of legal registration for its token sale.
2.1. Switzerland, the Cayman Islands, Singapore,
and the U.S.: 2017 Open Token Offering Hubs
As Figure 1vi shows, in 2017, Switzerland was the
jurisdictional home to a larger dollar-volume share of
successful open digital token offerings (24 percent)
existing definition of a security [16] (which in the
digital token context, largely hinges on a determination
of whether ownership or a security interest over the
token issuer’s assets exists [4] [17]) enabled many open
digital token offerings to not be classified as securities
offerings throughout 2017. Singapore’s emergence as
a hub of this distribution model was further enabled
by its technologist and legal communities’ proactive
engagement with the Monetary Authority of Singapore
(“MAS”) [18] – the country’s chief financial markets
regulator. By August 2017, the MAS clarified that
many open digital token offerings are not securities
distributions [4]. In November 2017, it released
guidelines providing clear examples of what token sale
activities do and do not constitute a securities offering,
as well as regulatory responsibilities of a digital token
project [19].vii
In 2017, the regulatory posture towards open token
offerings in the U.S., Switzerland, and the Cayman
Islands was relatively less proactive. U.S. Securities and
Exchange Commission (“SEC”) 2017 enforcement
actions provided some insights into circumstances
under which the agency will, by applying an ambiguous
multi-pronged legal test,viii view open digital token
offerings to constitute securities distributions, but
activity to clarify the regulatory status of particular
offering approaches was minimal [3]. Switzerland’s
top securities market regulator announced in late 2017
that it was investigating some previous open digital
token offerings for regulatory breaches [20], but that
depending on the circumstances, open digital token
offerings may not be considered securities distributions
[21]. In the Cayman Islands, regulators made no
statements regarding the applicability of securities
law to open digital token offerings, although its legal
definition of a security is quite narrow [22].
2.2. Singapore Remained an Open Token Offering
Hub as Policies Elsewhere and Market Trends
Shifted
Figure 1. Unlike other jurisdictions, Singapore was a leading
home of open digital token offerings during both 2017 and
2018
than any other jurisdiction in the world, followed by the
Cayman Islands (19 percent, of which over 75 percent
was U.S.-located EOS’s token sale) [2]. Singapore and
the U.S. accounted for 14 and 11 percent of total 2017
dollar-volume, respectively, and no other jurisdiction
made up more than five percent [2].
In Singapore, the Securities and Futures Act’s preThe JBBA | Volume 2 | Issue 2 | October 2019
Figure 1 illustrates how by the second-half of 2018,
negative digital token market conditions contributed
to a sharp dollar-volume decline in open token
offerings relative to early 2018. Yet these conditions
were global, and do not explain the disparate shifts in
jurisdictional shares of dollar-volume illustrated above.
By the second-half of 2018, Cayman, Swiss, and U.S.
open digital token offerings accounted for just seven,
seven, and two percent of total global dollar-volume,
respectively [2]. Alternatively, 21 percent occurred in
Singapore, 42 percent took place in smaller jurisdictions
(each accounting for less than five percent of total
2018 volume), and 20 percent was in the U.K. [2].ix
Several factors help explain these outcomes. For
starters, some Asian jurisdictions banned forms
of open digital token offerings in Q3 2017 [23].
41
jbba
the
Singapore’s location, regulatory approach towards open
digital token offerings, and rules on foreign investment
and visitors – some of the most open in the world,
and less-restrictive than those in Switzerland, the
U.K., and the U.S. [24] – drew Asia-based projects to
Singapore the following year amidst these unfavourable
regulatory shifts. Indeed, data indicate that half of
non-Singapore-based digital token project teams that
conducted successful 2018 Singapore-registered token
offerings were primarily physically-located elsewhere
in Asia (excluding Russia) [2]. Also in 2018, policy
changes drove Swiss banks to close accounts for
digital token projects in large volumes and reportedly
dramatically increased the relative cost of certain
compliance processes [25] [26]. As some countries’
regulatory approaches towards open token offerings
became stricter, relatively more accommodative policy
frameworks in the U.K. and smaller countries [27]
attracted a few sizable open digital token offerings [2],x
helping explain the larger role of these jurisdictions
in 2018 as compared to 2017. Conversely, after the
enormous EOS sale ended, Cayman-registered projects
accounted for a much smaller share of global open
token offering dollar-volume. Perhaps most notably,
2018 U.S. securities regulation trends drove an embrace
of the private initial token sale over the open digital
token offering for digital token projects seeking sale
participants from the U.S.
$1,000,000 [33]. Many Regulation D safe-harbour sales
used the U.S. accredited investor threshold as a sole
determinant for sale participation regardless of the
country where those seeking to purchase tokens were
legally-domiciled.xiii Several U.S. token projects utilised
the Regulation Crowdfunding (“CF”) exemption to
conduct open digital token offerings exempted from
public securities offering requirements, but these
capped sales likely accounted for just 1 percent of
overall 2018 token sale dollar-volume [2] [34].xiv
As Figure 2xv shows, by Q3/Q4 2018, purely-private
sales accounted for 94 percent of the dollar-volume of
successful U.S. token offerings, versus just 11 percent
in Singapore – which continued to embrace the open
digital token offering [2]. Indeed, in October 2018, the
MAS’s Managing Director Ravi Menon stated that the
MAS had “seen quite a lot of [digital token offering]
activity that is not security related” [35]. In only one
instance in 2018 did the MAS announce that it directed
2.3. Singapore Continued Embracing Open Token
Offerings as Private Initial Token Sales Dominated
in the U.S.
In February 2018, U.S. SEC Chairman Jay Clayton
notoriously remarked: “every [initial coin offering] I’ve
seen is a security” [28]. If a token project markets to
the general public securities not registered with the
SEC or issued under certain SEC exemptions, then
the issuer can be subject to serious penalties, as well
as costly class-action lawsuits [29]. Moreover, non-U.S.
persons can be subject to enforcement actions for
offering unregistered securities to U.S. persons [30] [31].
Chairman Clayton’s sweeping remarks were followed
by about twenty enforcement actions related to digital
tokens [32], and perhaps as many as 100 subpoenas
of token projects.xi By year-end, no open digital token
offering was affirmatively classified by name by the
SEC as not being a securities distribution.xii
Accordingly, throughout 2018, token projects
increasingly banned U.S. persons from participating
in open token offerings and relied upon private
initial token sales involving a “Regulation D”
securities offering to access U.S. buyers. Regulation
D allows fundraising events to avoid expensive public
securities offerings requirements if sales are generally
restricted only to “accredited investors” – primarily
defined as individuals/households making over
$200,000/$300,000 annually or with a net worth over
The JBBA | Volume 2 | Issue 2 | October 2019
Figure 2. Purely-private token sales accounted for almost all
Q3/Q4 2018 U.S. token sale volume, but were relatively
minimal in Singapore
a project to cease offering tokens to Singapore-based
persons because it considered the project’s sale of
tokens to be an unregistered public securities offering
[36] – evidence of a clearly-understood regulatory
distinction between open digital token offerings and
traditional securities distributions.
Surely, some 2018 private initial token sales took place
without involving Regulation D. The vast majority of
private initial token sale events, however, involved a
Regulation D offering [2]. Overall, approximately 75
percent of 2018 digital token offering dollar-volume
was open, rather than purely-private [2].
3. Exploring the Implications of Singapore’s Open
Digital Token Offering Embrace
Clearly, a number of external and internal policy factors
contributed to Singapore’s emergence as a global
open digital token offering hub. This section explores
outcomes of Singapore’s embrace of this token
distribution model related to: 1) the operational status
42
jbba
the
and focus of Singapore-registered token projects; 2)
open token offering retail participant risks; and 3)
the extent to which Singapore-registered projects are
physically-based in the country.
3.1. Open Digital Token Offerings Offer Unique
Benefits Related to Widespread Token Distribution
As a recent study helps illustrate, open digital
token offerings can enable digital token networks
to concurrently raise funds and build up an active
community of users and project contributors [37].
Indeed, research finds that higher community
engagement is associated with a token project’s success
[38]. As one analysis explains, despite the growing
relevance of institutional investors in open digital token
offerings (about 37 percent of 2018 token offerings
through mid-Q3 reportedly conducted private sale
stages [39]), “putting a token into the hands of 50,000
people who actually went through the process of
research and purchase is the best form of mass-market
engagement available that will increase the likelihood
of project success” [40].
Figure 3xvi suggests that an open token offering
model may indeed accelerate the pace at which token
networks and applications become operational relative
to purely-private sales. It shows that by mid-June 2019,
over 70 percent of Singapore-registered projects that
conducted successful open digital token offerings from
Q3 2017 through Q2 2018 launched “operational”
investors of digital tokens distributed via a Regulation
D safe-harbour offering [41] [42]. This impedes the
ability of projects that conduct token offerings using
the Regulation D safe-harbour to leverage primary or
secondary digital token markets to facilitate widespread
token ownership by a globally-dispersed community of
developers. As the founder of a project that conducted
one of the largest private initial token sales to date
remarked after apologising that his project’s token
offering would be purely-private: “[the accredited
investor threshold] excludes some of the groups
most capable of investing in these kinds of projects,
for example, cryptography and game theory PhD
students” [43].
Indeed, Ethereum sale data and subsequent survey
data suggests 50 to 75 percent of Ethereum’s open
digital token offering participants contributed less
than $1,000 [44] [10], and the network’s early attraction
of a large community of well-informed retail tokenholders played a critical role in its success [10]. Open
digital token offerings facilitate participation in opensource software development and create a sense
of empowerment and ownership, thus mobilising
programmers to test and improve underlying software
[14]. This open-source ethos is particularly important
for the development of smart contract platforms such
Figure 4. Nearly 40 percent of smart contract platform
projects that conducted successful 2017-18 token sales are
registered in Singapore
Figure 3. A greater share of one-to-two-year-old Singapore
open digital token offerings resulted in operational networks
and products relative to Q3 2017 - Q2 2018 U.S. private
initial token sales
products or networks related to the token sale, versus
37 percent of U.S.-registered projects that successfully
conducted a Regulation D safe-harbour private initial
token sale during that time. “Operational” is defined
as the publicly-available release of: 1) a token network’s
open-source and live testnet or mainnet; and/or 2)
a minimum-viable-product usable by the project’s
targeted customer base.
One driver of the discrepancy in Figure 3 is that
regulations restrict the re-sale to non-accredited
The JBBA | Volume 2 | Issue 2 | October 2019
as Ethereum – it is difficult to imagine developers
building applications or engaging with strangers on
a platform that they do not understand and cannot
test [45]. Accordingly, as Figure 4xvii illustrates, a
disproportionate share of smart contract platform
projects that conducted 2017-18 token offerings were
Singapore-registered, likely due in part to Singapore’s
embrace of the open digital token offering. These
projects largely aim to increase the range of economic
and social contexts in which open blockchain solutions
can be applied by building platforms that overcome
some of Ethereum’s scalability challenges.
43
jbba
the
3.2. Risks to Open Digital Token Offering Retail
Participants are Manageable
Open digital token offerings can result in inexperienced
persons purchasing tokens from digital token projects
that are not long-term viable – many projects have
failed or probably will fail [46] [47]. Yet inexperienced
retail exposure to these tokens is much more likely to
be facilitated by online accounts easily-opened with
secondary market trading venues rather than directly via
open digital token offerings. Moreover, few Singaporeregistered digital token offerings involve substantial
direct Singapore-based retail purchases, although this
is reportedly in part because some projects restrict
Singapore persons’ participation in token offerings
[48]. Research also suggests, however, that most digital
token offering participants contribute modest-size
dollar-amounts, and that these contributors largely have
a technology background or meaningful investment
experience [10]. Indeed, participation in open digital
token offerings usually necessitates a moderate level
of technological acumen and market awareness – a
purchaser often must understand how to operate an
ERC-20 “wallet,” and sale participation may require
first signing up via a whitelist.
Surely, despite these barriers, the low cost of structuring
an open digital token offering can allow fraudsters to
solicit funds with relative ease. As much as ten percent
of pre-mid-2018 digital token sale dollar-volume were
scams [49], although some research suggests that the
degree of fraud is much lower [50] and that “investors
are shrewd enough to spot [scams]” [46]. Moreover, in
Singapore, fraud can result in lengthy jail sentences [51],
and while some uncertainty surrounds the applicability
of criminal law to matters involving digital tokens
[17], two foreigners recently charged for promoting
a fraudulent digital token project may face up to five
years in jail [52]. Furthermore, the Singapore-registered
entity responsible for a token sale must have at least one
Singapore citizen or permanent resident on the board,
as well as a local secretary [53]. These gatekeepers,
as well as Singapore’s legal community (which drafts
token offering documents) and the Accounting and
Corporate Regulatory Authority, further minimise the
likelihood of fraudulent open digital token offerings.
While Singapore’s open token offering embrace has
not made it a safe-haven for fraudulent projects,
markets for some tokens generated via Singaporeregistered offerings have been nefariously manipulated.
Bad actors can create false optimism and spikes in a
token’s value, and then sell the token at a market high,
driving a large price decline that harms retail tokenholders [54]. In fact, Singapore’s first open digital token
offering resulted in a token later manipulated by such a
pump-and-dump scheme [55]. Singapore’s government
has warned of this predatory market behaviour [56],
but retail investors can still fall victim. Yet market
The JBBA | Volume 2 | Issue 2 | October 2019
manipulation is a serious issue for many digital tokens
– not a problem exclusive to those generated via open
token offerings.
3.3. Nearly Half of Singapore-registered Token
Projects are Primarily Physically-based in the
Country
Despite the large number of Singapore-registered
projects primarily physically-based outside the city,
Figure 5xviii shows that a greater share of Singaporeregistered projects that successfully conducted
token sales in 2018 are domestically-based relative
to the respective share of Switzerland- and Caymanregistered projects primarily physically-based in those
jurisdictions [2]. Surely, at 46 percent, the share of
projects physically-based in Singapore has room
to grow. Yet a recent industry survey finding that
Singapore is the world’s leading “crypto hub” city
Figure 5: Almost half of projects that conducted successful
2018 Singapore-registered token offerings were primarily
physically-located in the city
notes that its strengths relative to other cities include
not only the robust “activity” of its digital token
project community, but also Singapore’s “international
ecosystem” [57]. Indeed, Singapore’s relative openness
to foreign visitors [24] enables internationally-diverse
project teams not primarily physically-located in the
country – many of which are based elsewhere in Asia,
as mentioned in Section 2 – to regularly visit and
maintain a secondary presence there.
Moving forward, Singapore will benefit from its
physical concentration of token projects, as research
indicates that geographically-concentrated innovation
within a particular field begets relatively deeper and
swifter innovative activities [58]. Data indicate that
Singapore was likely home to more projects that
successfully conducted digital token sales in 2018 than
any other city, with the second- and third-highest being
San Francisco (including Palo Alto) and London [2].
4. Conclusion
44
jbba
the
The open digital token offering can enable projects
to simultaneously: 1) raise funds for the development
of a project’s network, platform, or service; 2) build
up a user-base; and 3) incentivise globally-dispersed
communities of developers to contribute to a project.
While in certain jurisdictions, this token distribution
model may be deemed to be a securities offering, in
practice, the open digital token offering and digital
tokens it produces are often fundamentally different
than traditional securities distributions and securities,
respectively. Singapore’s emergence as a global hub of
the open digital token offering was enabled not only
through existing legal frameworks and constructive
steps to produce regulatory clarity regarding securities
law, but also by its geographic location and openness to
foreign visitors and capital.
The inclusiveness of open digital token offerings, as
well as Singapore’s regulatory clarity regarding this
distribution model, help explain why a greater share of
one-to-two-year-old Singapore-registered open digital
token offerings, relative to U.S. private initial token sales,
have resulted in operational networks or minimumviable-products, and why so many token offerings for
2018 smart contract platform projects were Singaporeregistered. Indeed, open digital token offerings are
well-suited for incentivising the development of opensource projects. While this distribution model can ease
the ability of bad actors to conduct fraud, fraudulent
projects are likely not a major concern in Singapore,
in part due to local gatekeepers and strict laws. There
are also practical barriers-to-entry associated with open
token offerings that preclude large-scale participation
of an uninformed public.
While open digital token offerings have flaws and can
support likely-to-fail projects, trends highlighted in this
research support claims that this distribution model
is advantageous relative to securities offerings and
private initial token sales for certain types of projects,
particularly those focused on launching distributed
open-source networks and services. Because of its
embrace of the open digital token offering, as well as
other policy factors, Singapore is well-positioned to
remain a hub of open blockchain innovations.
5. Appendix
Token projects included in the dataset used in this
research’s estimates of token sale activity (the “Primary
Dataset” [2]) were initially sourced by Smith+Crown
through: 1) a detailed Smith+Crown intake survey
submitted by token projects; 2) Smith+Crown’s bimonthly reviews of online data aggregators and
the SEC EDGAR database; and 3) Smith+Crown’s
reviews of ongoing industry events. Before including
projects identified through these channels in the
Primary Dataset, Smith+Crown confirmed that project
team member identities were transparent, there was
The JBBA | Volume 2 | Issue 2 | October 2019
a reasonable amount of public documentation and
information available on the project, the project raised
over $25,000, and funds raised were not returned to
initial backers – for purposes of this article, these
criteria are used to classify a “successful” digital
token offering. This sourcing methodology makes
the scope of Smith+Crown’s data smaller relative to
those of some popular online aggregators, which may
exclusively rely on information sourced through token
project self-reporting.
To obtain dollar-raised figures, Smith+Crown sourced
token projects’ self-reported dollar-raised amounts
from data aggregators, and then verified those amounts
using on-chain analysis,xix SEC EDGAR, other
government filings, reports from reliable news sources,
or official project statements. If a raise amount was
unverifiable, then Smith+Crown entered the amount
raised by the project as zero. Generally, token sale
dates were determined using the reported date of a
sale period ending, and multiple sale stages of a single
token offering were treated as a single offering event as
long as: 1) sale terms were largely similar; and 2) sale
periods were not separated by more than thirty days
(otherwise, sales were treated separately).xx
Unlike datasets used in other analyses of global
token sale trends (for example, [27] [59]), the Primary
Dataset clearly distinguishes between a project’s legal
jurisdiction and physical location. The legal jurisdiction
of the entity responsible for a token offering was
determined for almost all 2017-18 token sale dollarvolume, and was identified using information provided
on the sourcing survey, which Smith+Crown verified
and, as necessary, corrected through a review of a
project’s website and sale terms in collaboration with
the authors.xxi To determine the primary physical
location of digital token projects, publicly-available
information on the project’s website was used. When
data was not available, LinkedIn.com information was
reviewed, and the reported city of the project’s or
CEO’s LinkedIn page was treated as the project team’s
location. If that data was not available, then the selfreported location of the CTO or the predominant
location of other project team members was used.
For six percent of the projects reviewed to produce
Figure 5, the primary location of the project team was
listed as unknown, and overall, for approximately 25
percent of 2018 token sale events contained in the
Primary Dataset, project team location information
was unknown or not recorded.
To determine whether a token offering was an open
digital token offering or a private initial token sale,
Smith+Crown and the authors reviewed government
filings, project announcements, reputable news sources,
and token sale terms.xxii Multi-tiered sales consisting
of both public and private sale stages (including
Regulation D offerings followed by public sales) were
45
jbba
the
generally treated as one open digital token offering, in
line with this article’s definition of that distribution
method; conversely, private sales conducted in advance
of cancelled or planned (but yet to occur) open sale
rounds were treated as private initial token sales (for
example, Telegram’s token sale). Digital token projects
that conducted Regulation D offerings concurrently
or shortly before an open digital token offering
that restricted U.S. non-accredited-investors from
participating were treated as part of a single open
digital token offering. Security token offerings and
token sales by projects structured as investment funds
were not treated as open digital token offerings, but
were included in this article’s holistic analyses of digital
token offerings (including Figures 2 and 5).xxiii
[6] N. Szabo, “Smart contracts: building blocks for digital
markets,” 1996. [Online]. Available: http://www.fon.hum.
uva.nl/rob/Courses/InformationInSpeech/CDROM/
Literature/LOTwinterschool2006/szabo.best.vwh.net/smart_
contracts_2.html. [Accessed 15 Jun 2019].
Figure 3 was produced using a definition of
“operational” set forth in Section 3 and developed
in collaboration with Smith+Crown, LongHash, and
other industry participants. Q3 2017 to Q2 2018
Singapore open digital token offerings and U.S. private
initial token sales were classified as “operational” or
not as of mid-June 2019 based on a review of publiclyavailable information. Proof-of-works and proof-ofconcepts were not treated as “operational” projects.
Project classifications used to produce Figure 4 were
developed from Smith+Crown’s review of project
white papers and public information. Based on that
review, Smith+Crown tagged certain projects as “smart
contract platform” projects, meaning that the project’s
primary focus is developing a smart contract platform.
[9] F. Vogelsteller, “ERC: token standard,” GitHub, Nov
2015. [Online]. Available: https://github.com/ethereum/
EIPs/issues/20. [Accessed 15 Jun 2019].
References:
[1] “Singapore IPO proceeds plunge to $730m in 2018,”
Singapore Business Review, 2018 Dec 21. [Online]. Available:
https://sbr.com.sg/markets-investing/in-focus/singapore-ipoproceeds-plunge-730m-in-2018. [Accessed 15 Jun 2019].
[2] Smith+Crown, Dataset on file with authors [see Appendix
for methodology used by Smith+Crown and the authors to
construct dataset], 2019.
[3] Token Alliance, “Understanding digital tokens: market
overviews and proposed guidelines for policymakers and
practitioners,” Chamber of Digital Commerce, 2018.
[4] MAS, “MAS clarifies regulatory position on the offer of
digital tokens in Singapore,” 1 Aug 2017. [Online]. Available:
http://www.mas.gov.sg/News-and-Publications/MediaReleases/2017/MAS-clarifies-regulatory-position-on-the-offerof-digital-tokens-in-Singapore.aspx. [Accessed 15 Jun 2019].
[5] D. Chuen, L. Low and Y. Wang, “Introduction to initial
crypto-token offering,” in Inclusive FinTech: Blockchain,
Cryptocurrency and ICO, Singapore, World Scientific Publishing
Company, 2018, pp. 83-114.
The JBBA | Volume 2 | Issue 2 | October 2019
[7] Ethereum Foundation, “Developer resources: guides,
resources, and tools for developers building on Ethereum,”
[Online]. Available: https://www.ethereum.org/developers/.
[Accessed 15 Jun 2019].
[8] P. V. Valkenburgh, “What does it mean to issue a token
‘on top of ’ Ethereum?,” Coin Center, 10 May 2017. [Online].
Available: https://coincenter.org/entry/what-does-it-mean-toissue-a-token-on-top-of-ethereum. [Accessed 15 Jun 2019].
[10] D. Chuen, L. Low, M. Chwierut, W. Anderson, B.
Lio and B. Downes, “The characteristics of token investors,”
in Inclusive FinTech: Blockchain, Cryptocurrency and ICO,
Singapore, World Scientific Publishing Company, 2018, pp.
125-171.
[11] CoinMarketCap, Dataset on file with authors, 2019.
[12] PricewaterhouseCoopers, “Considering an IPO to fuel
your company’s future? Insight into the costs of going public and
being public,” Nov 2017. [Online]. Available: https://www.
pwc.com/us/en/deals/publications/assets/cost-of-an-ipo.pdf.
[Accessed 15 Jun 2019].
[13] International Monetary Fund, “Handbook on securities
statistics,” 2015. [Online]. Available: https://www.imf.org/
external/np/sta/wgsd/pdf/hss.pdf.. [Accessed 15 Jun 2019].
[14] S. Adhami, G. Giudici and M. Stefano, “Why do
businesses go crypto? An empirical analysis of initial coin
offerings,” Journal of Economics and Business, vol. 100, pp.
64-75, May 2018.
[15] H. Peirce, “Regulation: a view from inside the machine,”
8 Feb 2019. [Online]. Available: https://www.sec.gov/news/
speech/peirce-regulation-view-inside-machine. [Accessed 15 Jun
2019].
[16] Securities and Futures Act (Cap. 289), Section 2(1).
[17] J. W. Lim, “A facilitative model for cryptocurrency
regulation in Singapore,” in Handbook of Digital Currency:
Bitcoin, Innovation, Financial Instruments, and Big Data,
London, U.K., Elsevier Inc., 2015, pp. 361-380.
[18] S. Yep, “How Singapore became Asia's ICO hub,”
LongHash, 30 Apr 2018. [Online]. Available: https://www.
longhash.com/news/14. [Accessed 15 Jun 2019].
46
jbba
the
[19] MAS, “A guide to digital token offerings,” 14 Nov 2017.
[Online]. Available: http://www.mas.gov.sg/News-andPublications/Monographs-and-Information-Papers/2017/
Guidance-on-Digital-Token-Offerings.aspx. [Accessed 15 Jun
2019].
Kistner, “ICO participant liability — could you be liable for assisting
in the sale of unregistered securities?,” Bloomberg Law, 15 Dec 2017.
[Online]. Available: https://news.bloomberglaw.com/securities-law/
ico-participant-liability-could-you-be-liable-for-assisting-in-the-sale-ofunregistered-securities. [Accessed 15 Jun 2019].
[20] FINMA, “FINMA is investigating ICO procedures,”
FINMA, 29 Sep 2017. [Online]. Available: https://www.
finma.ch/en/news/2017/09/20170929-mm-ico/. [Accessed
15 Jun 2019].
[30] T. Hanusik and T. Rodriguez, “I don’t live in the United
States, so how can the SEC sue me? SEC actions against a
foreign national living outside the United States,” Bloomberg
Finance L.P., 2008. [Online]. Available: https://www.crowell.
com/documents/SEC-Actions-against-a-Foreign-NationalLiving-Outside-the-United-States.pdf. [Accessed 15 Jun 2019].
[21] FINMA, “FINMA guidance 04/2017,”
29 Sep 2017. [Online]. Available: https://
w w w. fi n m a . c h / e n / ~ / m e d i a / fi n m a / d o k u m e n t e /
d o k u m e n t e n c e n t e r / m y fi n m a / 4 d o k u m e n t a t i o n /
fi n m a - a u f s i c h t s m i t t e i l u n g e n / 2 0 1 7 0 9 2 9 - fi n m a aufsichtsmitteilung-04-2017.pdf. [Accessed 15 Jun 2019].
[22] N. Rogers and C. Macculloch, “Building blocks for ICOs in
the Cayman Islands,” Cayman Financial Review, 22 Jan 2018.
[Online]. Available: https://www.caymanfinancialreview.
com/2018/01/22/building-blocks-for-icos-in-the-caymanislands/. [Accessed 15 Jun 2019].
[23] J. Russell, “First China, now South Korea has banned
ICOs,” TechCrunch, 29 Sep 2017. [Online]. Available:
https://techcrunch.com/2017/09/28/south-korea-hasbanned-icos/. [Accessed 15 Jun 2019].
[24] I. Vásquez and T. Porcnik, “The human freedom index,
XLSX (2016 “foreign ownership/investment restrictions,”
"capital controls," and “freedom of foreigners to visit”
variables),” Cato Institute, 2018. [Online]. Available: https://
object.cato.org/sites/cato.org/files/human-freedom-index-files/
hfi2018web-revised3.xlsx. [Accessed 15 Jun 2019].
[25] A. Irrera and B. H. Neghaiwi, “Switzerland seeks
to regain cryptocurrency crown,” Reuters, 19 Jul 2018.
[Online]. Available: https://www.reuters.com/article/uscryptocurrencies-banking-switzerland/switzerland-seeks-toregain-cryptocurrency-crown-idUSKBN1K91AY. [Accessed
15 Jun 2019].
[26] K. Sedgwick, “Swiss regulations are driving ICOs away,”
Bitcoin.com, 9 Apr 2018. [Online]. Available: https://news.
bitcoin.com/swiss-regulations-are-driving-icos-away/. [Accessed
Jun 15 2019].
[27] W. Kaal, “Initial coin offerings: the top 25 jurisdictions
and their comparative regulatory responses (as of May 2018),”
Stanford Journal of Blockchain Law & Policy, vol. 2, 2019.
[28] M. Orcutt, “Cryptocurrencies crashed in 2018. Now
they’re right where they should be,” MIT Technology Review, 26
Dec 2018. [Online]. Available: https://www.technologyreview.
com/s/612659/cryptocurrencies-crashed-in-2018-now-theyreright-where-they-should-be/. [Accessed 15 Jun 2019].
[29] G. P. Fondo, M. Chang, M. Spillane, S. Fox and T.
The JBBA | Volume 2 | Issue 2 | October 2019
[31] J. Debler, “Foreign initial coin offering issuers beware: the
Securities and Exchange Commission is watching,” Cornell
International Law Journal, vol. 51, pp. 245-272, 2018.
[32] SEC, “Cyber enforcement actions,” [Online]. Available:
https://www.sec.gov/spotlight/cybersecurity-enforcementactions. [Accessed Jun 15 2019].
[33] U.S. Code of Federal Regulations Title 17 Parts 230.501230.508.
[34] P. H. Lee, “Crowdfunding capital in the age of blockchainbased tokens,” St. John's Law Review, vol. 92, pp. 833-913, 2018.
[35] C. Chanjaroen and H. Amin , “Singapore will help crypto
firms set up local bank accounts,” Bloomberg, 10 Oct 2018.
[Online]. Available: https://www.bloomberg.com/news/
articles/2018-10-10/singapore-aids-crypto-firms-seekingbanks-while-staying-vigilant. [Accessed Jun 15 2019].
[36] MAS, “MAS warns digital token exchanges and ICO
issuer,” 24 May 2018. [Online]. Available: http://www.
mas.gov.sg/News-and-Publications/Media-Releases/2018/
MAS-warns-Digital-Token-Exchanges-and-ICO-Issuer.aspx.
[Accessed 15 Jun 2019].
[37] J. Li and W. Mann, “Initial coin offering and platform
building,” Working paper, Jun 17 2018. [Online]. Available:
https://www.jbs.cam.ac.uk/fileadmin/user_upload/research/
centres/alternative-finance/downloads/2018-af-conference/
paper-li.pdf. [Accessed 15 Jun 2019].
[38] H. T. Sabrina, M. Niessner and D. Yermack, “Initial
coin offerings: financing growth with cryptocurrency token
sales,” ECGI working paper series in finance, working paper
no. 564/2018, Jul 2018. [Online]. Available: https://
ecgi.global/sites/default/files/working_papers/documents/
finalhowellniessneryermack.pdf. [Accessed 15 Jun 2019].
[39] J. Lee, “ICOs are turning exclusive as wealthy investors
snatch up deals,” Bloomberg, 8 Aug 2018. [Online]. Available:
https://www.bloomberg.com/news/articles/2018-08-08/
token-sales-turn-exclusive-as-private-investors-snatch-up-deals.
[Accessed 15 Jun 2019].
[40] M. Dibb, “Are public token sales a thing of the past?,”
Medium: Astronaut Capital, 29 May 2018. [Online].
47
jbba
the
Available: https://medium.com/astronaut-capital/are-publictoken-sales-a-thing-of-the-past-15c89efefa1a. [Accessed 15 Jun
2019].
[41] U.S. Code of Federal Regulations Title 17 Part 230.144.
[42] U.S. Code of Federal Regulations Title 17 Part
230.144A.
[43] I. Allison, “Filecoin laments shutting out crypto supporters
to meet SEC regulations,” International Business Times,
8 Aug 2017. [Online]. Available: https://www.ibtimes.
co.uk/filecoin-laments-shutting-out-crypto-supporters-meet-secregulations-1633620. [Accessed 15 Jun 2019].
[44] V. Buterin, “Ether sale: a statistical overview,” Ethereum
Foundation, 8 Aug 2014. [Online]. Available: https://blog.
ethereum.org/2014/08/08/ether-sale-a-statistical-overview/.
[Accessed 15 Jun 2019].
[45] P. V. Valkenburgh, “What is “open source” and
why is it important for cryptocurrency and open blockchain
projects?,” Coin Center, 17 Oct 2017. [Online]. Available:
https://coincenter.org/entry/what-is-open-source-and-why-isit-important-for-cryptocurrency-and-open-blockchain-projects.
[Accessed 15 Jun 2019].
[46] H. Benedetti and L. Kostovetsky, “Digital tulips? returns
to investors in initial coin offerings,” Working paper, May 20
2018. [Online]. Available: https://papers.ssrn.com/sol3/
papers.cfm?abstract_id=3182169. [Accessed 15 Jun 2019].
[47] J. Daniell, “Ethereum's Vitalik Buterin on ‘tokens 1.0’,”
ETHNews, 24 Oct 2017. [Online]. Available: https://www.
ethnews.com/ethereums-vitalik-buterin-on-tokens-10. [Accessed
15 Jun 2019].
[48] R. Jayaseelan, “Singapore’s ICO gamble,” The Star
Online, 24 Dec 2018. [Online]. Available: https://www.
thestar.com.my/business/business-news/2018/12/24/
singapores-ico-gamble/. [Accessed 15 Jun 2019].
[49] Statis Group, “Cryptoasset market coverage initiation:
network creation,” Bloomberg, Jul 2018. [Online]. Available:
https://research.bloomberg.com/pub/res/d28giW28tf6G7T_
Wr77aU0gDgFQ. [Accessed 15 Jun 2019].
[50] D. Liebau and P. Schueffel, “Cryptocurrencies and initial
coin offerings: are they scams? - an empirical study,” The Journal
of The British Blockchain Association, vol. 2, no. 1, pp. 4755, 2019.
[51] S. Sharpe, “Financial crime in Singapore: overview,”
Thomson Reuters Practical Law, 2017. [Online]. Available:
https://uk.practicallaw.thomsonreuters.com/3-618-7957?__
lrTS=20190325161937875&transitionType=Default&c
ontextData=(sc.Default)&firstPage=true&comp=pluk&bh
cp=1#co_anchor_Ib17914890ef411e798dc8b09b4f043e0.
[Accessed 15 Jun 2019].
The JBBA | Volume 2 | Issue 2 | October 2019
[52] R. Mui, “Two men charged in Singapore with promoting
'fraudulent cryptocurrency' OneCoin,” The Business Times, 10
Apr 2019. [Online]. Available: https://www.businesstimes.
com.sg/government-economy/two-men-charged-in-singaporewith-promoting-fraudulent-cryptocurrency-onecoin. [Accessed 15
Jun 2019].
[53] Flag Theory, “Where to set up a foundation for an ICO
(a comparative analysis),” 6 Oct 2017. [Online]. Available:
https://flagtheory.com/foundation-initial-coin-offering-ico/.
[Accessed 15 Jun 2019].
[54] J. Xu and B. Livshits, “The anatomy of a cryptocurrency
pump-and-dump scheme,” in 28th Usenix Security Symposium,
Santa Clara, CA, USA, 2019.
[55] S. Shifflett and P. Vigna, “Traders are talking up
cryptocurrencies, then dumping them, costing others millions,”
5 Aug 2018. [Online]. Available: https://www.wsj.com/
graphics/cryptocurrency-schemes-generate-big-coin/. [Accessed
15 Jun 2019].
[56] Singapore Government, “Are digital tokens such as
cryptocurrencies a simple, safe, and sure-fire way of making
money?,” Factually, 25 May 2018. [Online]. Available:
https://www.gov.sg/factually/content/digital-tokens. [Accessed
Jun 15 2019].
[57] R. Kurani, “Which are the best locations for blockchain
companies? — we asked our well-travelled crypto friends,”
Medium, 22 Feb 2019. [Online]. Available: https://medium.
com/birds-view/which-are-the-best-locations-for-blockchaincompanies-bd816c940456. [Accessed 15 Jun 2019].
[58] M. Muro and B. Katz, “The new 'cluster moment':
how regional innovation clusters can foster the next economy,”
Metropolitan Policy Program, Brookings Institution, Sep 2010.
[Online]. Available: https://www.brookings.edu/wp-content/
uploads/2016/06/0921_clusters_muro_katz.pdf. [Accessed
15 Jun 2019].
[59] Ernst and Young, “EY research: initial coin offerings
(ICOs),” EY, Dec 2017. [Online]. Available: https://www.
ey.com/Publication/vwLUAssets/ey-research-initial-coinofferings-icos/$File/ey-research-initial-coin-offerings-icos.pdf.
[Accessed 15 Jun 2019].
Dollar-volume figures throughout this article are in
U.S. dollars. This figure includes open digital token
offerings, security token offerings, and private initial
token sales. See the Appendix for methodology used to
calculate dollar-volume figures of 2017-18 digital token
sales presented throughout this research.
ii
Trends related to initial mining events and airdrops
are not analysed in this research.
iii
Obstacles related to retail investor technological
acumen are discussed in Section 3. Additionally,
compliance with anti-money laundering laws,
sanctions. and/or securities law interpretations may
i
48
jbba
the
cause projects to decide to prohibit certain nationalities
from participating in open digital token offerings.
iv
For an explanation of how this research defines a
“successful” digital token sale, see the Appendix.
v
The U.S. legal definition of a security extends beyond
equity and debt securities and includes “investment
contracts,” defined according to a multi-prong common
law test [3] (see footnote viii and accompanying text).
vi
Figure 1 was produced by the authors using a
Smith+Crown dataset of 2017-18 digital token
offerings [2]. Sale-level data related to country of
registration and distribution type were independently
reviewed by the authors for approximately 90 percent
of the dollar-volume of token sale events included in
the dataset (see Appendix for more on methodology).
vii
These guidelines also clarified that open digital token
offerings not subject to direct MAS regulation are
nonetheless likely subject to certain Singapore laws
aimed at combatting money laundering and terrorism
financing [19].
viii
According to the Supreme Court’s 1946 “Howey
Test,” an “investment contract” – a type of security
– exists if 1) an investment is made in 2) a common
enterprise by 3) investors reasonably expecting to
earn profits 4) as a result of others’ managerial or
entrepreneurial efforts (see [3] [15]).
ix
Small jurisdictions with a sizable share of 2018 open
digital token offering dollar-volume include Gibraltar
(4 percent) and Estonia (4 percent) [2]. Singapore
and the U.K. accounted for 14 and 7 percent of 2018
dollar-volume, respectively [2].
x
For example, approximately half of the dollar-volume
of the U.K.’s nine successful Q3/Q4 2018 open digital
token offerings is attributable to two projects [2]. In
Singapore, on the other hand, there were over 20
successful open digital token offerings during this time,
the largest of which accounted for just 11 percent of
total offering dollar-volume [2].
xi
Figure estimated through conversations with U.S.based legal and regulatory experts.
xii
Bitcoin’s initial distribution was not an open digital
token offering (as defined in this research), but rather,
was an initial mining event.
xiii
For example, Filecoin’s private initial token sale.
xiv
Regulation CF offerings are each capped at $1.07
million and represented approximately $22 million of
token sale dollar-volume in 2017 through mid-2018
[34]. While in 2018 some projects reportedly applied to
sell tokens to the public using the SEC’s Regulation A+
exemption, the SEC did not approve any Regulation
A+ token sales.
xv
Figure 2 was produced by the authors using a
Smith+Crown dataset of 2017-18 digital token
offerings and through the authors’ classification of
token sale type as determined by a review of publiclyavailable information related to 46 Q3/Q4 2018
U.S.- and Singapore-registered digital token sales (see
Appendix for more on methodology) [2].
xvi
Figure 3 was produced by the authors using a
The JBBA | Volume 2 | Issue 2 | October 2019
Smith+Crown dataset of 2017-18 digital token
offerings and through the authors’ classification of
token sale type and the operational status of networks
or products associated with a token sale as determined
by a review of publicly-available information related
to 128 U.S.- and Singapore-registered digital token
projects that conducted open digital token offerings or
private initial token sales from Q3 2017 through Q2
2018 (see Appendix for more on methodology) [2].
xvii
Figure 4 was produced by the authors using a
Smith+Crown dataset of 2017-18 digital token
offerings (see Appendix for more on methodology) [2].
xviii
Figure 5 was produced by the authors using a
Smith+Crown dataset of 2017-18 digital token
offerings (see Appendix for more on methodology) [2].
xix
When possible, Smith+Crown used Etherscan to
examine the actual amounts raised by a token project.
As off-chain sales of digital tokens proliferated, this
method became less workable.
xx
One exception to this general rule was EOS’s large,
prolonged fundraising event, which was “grouped into
monthly amounts, with each month being treated as
a separate [sale event]” [3]. In a few instances, data
constraints forced the estimation of sale dates and/or
the consolidation of sale periods with unclear start or
end dates.
xxi
For approximately two percent of 2017-18 open
digital token offering dollar-volume, legal jurisdiction
was classified as unknown [2].
xxii
The authors independently reviewed publiclyavailable information on distribution type and country
of legal jurisdiction for approximately 90 percent of
2017-18 token sales by dollar-volume.
xxiii
These types of projects accounted for approximately
two percent of successful 2017-18 digital token
distribution dollar-volume [2].
Competing Interests:
None declared.
Ethical approval:
Not applicable.
Author’s contribution:
RWG1 and DLKC1,2 designed and coordinated this research and
prepared the manuscript in entirety.
Funding:
RWG1 wants to thank the Foundation of the Chamber of Digital
Commerce for a modest travel and conference expenditures grant that
funded research-related visits to Hong Kong, Singapore, and Tokyo.
Acknowledgements:
RWG and DLKC deeply thank Smith+Crown (Matt Chwierut,
Brian Lio, Alistair Simmonds, and Stuart Young) for providing data
that made this research possible. The authors are also appreciative of
helpful insights shared by LongHash (Emma Cui and Shi Khai Wei)
and CoinMarketCap (Carylyne Chan and Aaron Khoo), as well as
by Paul S. Atkins, Perianne Boring, Jehan Chu, Matthew Comstock,
Nizam Ismail, Amy Davine Kim, TM Lee, Daniel Liebau, Bobby
Ong, Remington Ong, Teong Jing Sim and Diego Zuluaga.
49
jbba
the
Peer-reviewed Research
OPEN ACCESS
ISSN Print: 2516-3949
https://doi.org/10.31585/jbba-2-2-(2)2019
Cryptocurrency Investing Examined
Jim Kyung-Soo Liew1, Richard Ziyuan Li2 , Tamás Budavári2, Avinash Sharma3
Johns Hopkins University, USA
1
Carey Business School
2
Department of Applied Mathematics and Statistics
3
Bioengineering and Biomedical Engineering
Correspondence: kliew1@jhu.edu
Received: 17 January 2019 Accepted: 28 March 2019 Published: 28 May 2019
Abstract
In this work we examine the largest 100 cryptocurrency returns ranging from 2015 to early 2018. We
concentrate our analysis on daily returns and find several interesting stylized facts. First, principal components
analysis reveals a complex daily return generating process. As we examine data in the most recent year, we
find that surprisingly more than one principal component appears to explain the cross-sectional variation.
Second, similar to hedge fund returns, cryptocurrency returns suffer from the “beta-in-the-tails” hidden risk.
Third, we find that predicting cryptocurrency movements with machine learning and artificial intelligence
algorithms is marginally attractive with variation in predictability power per crypto-currency. Fourth, lower
volatile cryptocurrencies are slightly more predictable than more volatile ones. Fifth, evidence exists that
efficacy of distinct information sets varies across machine learning algorithms, showing that predictability
may be much more complex given a set of machine learning algorithms. Finally, short-term predictability
is very tenuous, which suggests that near-term cryptocurrency markets are semi-strong form efficient and
therefore, day trading cryptocurrencies may be very challenging.
Keywords: AI, Bitcoin, Cryptocurrencies, Machine Learning, PCA, Beta-in-the-Tails
JEL Classifications: G12, G14, G17, G40, G
1. Introduction
Cryptocurrency is a digital asset designed to work as
a store of value and a medium of exchange1. As of
February 28th, 2018, the total market capitalization of
the cryptocurrency market stood at $448 billion and
consists of 1,524 types of currencies. Amongst the many
controversies surrounding cryptocurrencies, a popular
topic of debate is whether it should be classified as
a commodity, investment, property, currency or digital
currency. Bitcoin puts cryptocurrencies center stage
in the popular press and with the recent painful pull
back in early 2018, the interest in Bitcoins in particular
continues to hold. Bitcoins started 2017 at $998.33 and
grew 14x to finish the year at $14,156.40, as is shown in
Fig. 1. As of February 28th, the price was $10,559.20.
Bitcoin, the first successful cryptocurrency, was created
in January 2009, in the aftermath of the financial
crisis of 2008, by an unknown person or a group of
people under the Japanese name of Satoshi Nakamoto.
Bitcoin utilizes a technology called blockchain, which is
a combination of cryptography, consensus algorithms,
The JBBA | Volume 2 | Issue 2 | October 2019
Figure 1: Bitcoin price from Jan 1, 2017 to Feb 18, 2018
economic incentives and distributed ledger to secure
its transactions. While the technical discussion of
blockchain is beyond the scope of this work, this
technology has endowed Bitcoin with many important
characteristics, such as;
•
•
•
•
Decentralization,
Trusted network built upon potentially
untrustworthy nodes,
Transparency, and
Immutability history, etc.
Many cryptocurrencies were invented after Bitcoin, but
51
jbba
the
Bitcoin continues to be the most popular, as evidenced
by it having the largest market capitalization and
trading volume, shown in Table 1 below. Subsequently,
our investigation primarily focuses on Bitcoin prices in
this research.
of time before practitioners and academic researchers
begin using AI techniques to analyze cryptocurrency
markets. We hope our findings herein will serve as an
important contribution to this growing field.
1.3 Our Research Results
Market
Cap
($Billion)
Volume
(24 hrs $Billion)
Index
Name
Price
1
Bitcoin
$10,559.20
$178.4
$6.9
2
Ethereum
$869.63
$85.1
$2.0
3
Ripple
$0.921
$36.0
$0.33
4
Bitcoin
Cash
$1,223.85
$20.8
$0.38
5
Litecoin
$208.43
$11.6
$0.78
6
NEO
$135.27
$8.8
$0.33
7
Cardanol
$0.317
$8.7
$0.12
8
Stellar
$0.346
$8.2
$0.037
9
EOS
$8.64
$6.0
$0.38
10
IOTA
$1.89
$5.3
$0.044
Table 1: Top Ten Cryptocurrencies
(Source: CoinMarketCap.com, data as of February 28th, 2018.)
While participants of the Bitcoin blockchain can
transfer Bitcoins with each other directly, most
investors have to go to cryptocurrency exchanges if
they want to purchase Bitcoins with U.S. dollars or
other traditional currencies. While the quoted prices
from different exchanges can vary largely, arbitrage was
very difficult due to the lack of easy access to short
Bitcoins, until CBOE and CME introduced Bitcoin
futures in December 2017.
1.2 Artificial Intelligence (AI)
Similar to cryptocurrency, AI is another increasingly
intriguing technological development. AI represents
a broad range of techniques including machine
learning, deep learning, natural language processing,
etc. Its application is rapidly penetrating every aspect
of human society - e-commerce, autonomous vehicles,
image recognition, to name a few. A detailed discussion
of AI techniques and their application, unfortunately,
is beyond the scope of this paper.
Financial institutions are increasingly testing and
deploying AI techniques to obtain an edge in their
business, such as in trading. Money managers have
been employing thousands of quantitative experts to
develop sophisticated AI models for predicting prices,
identifying signals, monitoring sentiment, etc. While
the efficacy of these efforts is still debatable, AI models
and strategies are prevailing in every market (equity,
commodity, FX, etc.). It is, therefore, only a matter
The JBBA | Volume 2 | Issue 2 | October 2019
In this paper, we first analyze the top 100
cryptocurrencies using correlation analysis and
principal component analysis (PCA). Daily returns
reveal that in some period there exists a single dominant
component however, in the most recent prior year
there appears to be two components that help explain
the variation of the cryptocurrency returns. Next, we
compare cryptocurrencies with traditional assets. We
also perform Liew [2013]’s beta-in-the tail analysis to
examine potential hidden risks. We find some evidence
that similar to hedge funds, cryptocurrencies may
suffer from this hidden risk.
Finally, we conduct rolling prediction analysis on 57
cryptocurrencies with 11 AI algorithms. Our results
show that predictability may be difficult and there are
many heterogeneous effects here. Some information
sets perform better with some family of algorithms,
and larger cryptocurrencies with lower volatility maybe
more predictable than smaller cryptocurrency with
higher volatility.
The remainder of this paper is organized as follows:
Section 2 reviews prior literature, Section 3 presents
our data and preliminary analysis, Section 4 describes
the methodology, Section 5 provides the results and
Section 6 summarizes and concludes.
2. Literature Review
While there are many cases and projects about Bitcoin
price predictions online, scarce academic research
presently exists regarding Bitcoin price predictability.
We review the most important prior research in this
subject by aggregating them into three different groups.
The first group attempts to predict Bitcoin prices with
information about the Bitcoin blockchain network.
For example, Madan et al. [1] from Stanford use three
machine learning algorithms to predict the sign of daily
price change of Bitcoin based on data about the Bitcoin
blockchain network, including average confirmation
time, block size, hash rate, etc. They report a highest
accuracy of 98.7%. Another group of Stanford
researcher, Greaves et al. [2] perform similar analysis,
getting a classification (sign of hourly price change)
accuracy of 55%. In addition to information about the
blockchain network, McNally [3] adds daily open, high,
low, and close prices as explanatory variables, reporting
a classification (signs of daily price changes) accuracy
of 52%. El-Abdelouarti Alouaret [4] moves further
by including the S&P 500 index and EUR/USD rate,
52
jbba
the
as well as a variable named bitcoins days destroyed.
Similar to sentiment analysis, it also includes a variable
representing daily page view on the Wikipedia item
“Bitcoin”. It also uses vector autoregression and
recurrent neural network to conduct price prediction
instead of classification.
The second group of studies focus on the relationship
between social media data and Bitcoin performance.
For instance, Mai et al. [5] analyze Bitcoin-related user
posts from a forum and Twitter and demonstrate that
more bullish posts are associated with higher future
Bitcoin returns. They also conclude that the social media
effects on Bitcoin performance are driven by the “silent
majority”, and the impact of forum posts is larger than
that of tweets. Stenqvist et al. [6] try to predict Bitcoin
price (up/down) using sentiment analysis on Twitter,
and report that the sentiment change over a 30-minute
period is useful for predicting price movement of 2
hours later, resulting in an accuracy of 79%. Instead
of performing sentiment analysis on all social media
content posted, Kim et al. [7] extract the hottest topics
on a Bitcoin-related forum and define a time series
score to represent the “strength” of each topic. While
these scores are not significant in Granger causality
tests, a deep learning model with these scores as inputs
leads to prediction (for price and transaction volume)
accuracies ranging from 50%+ to 80%+. Interestingly,
Kaminskt [8], by analyzing Twitter posts, claims that
social media sentiments mirror the Bitcoin market
activity, rather than being predictive.
Instead of Bitcoin blockchain network data and social
media data, some papers examine the performance of
Bitcoin in other ways. Chu et al. [9] fits log returns in
fifteen popular parametric distributions in finance and
find that the generalized hyperbolic distribution is the
most appropriate. Balcilar et al. [10] perform causalityin-quantiles tests and point out that Bitcoin trading
volume can predict price returns but fail to predict
volatility. Indera et al. [11] use Multi-layer Perceptron
(MLP) to predict Bitcoin price based on historical
open, high, low, and close, as well as the moving average
technical indicators, reporting significant results (in
mean mean-squared error ).
The third group of research comprises of researchers
attempting to use every factor to predict Bitcoin
price. Georgoula et al. [12] and Garcia et al. [13]
contribute their work in this way. As they provide many
conclusions, we are not summarizing here.
3. Data and Preliminary Analysis
3.1 Cryptocurrency
As we mentioned above, there are 1,524 different
cryptocurrencies as of February 28, 2018, and they
are traded at many different exchanges (markets).
Fortunately, CoinMarketCap.com collects transaction
data of these cryptocurrencies from various exchanges
and publishes both up-to-date and historical data for
free, which can be obtained through their API. Taking
advantage of this resource, we scrap the historical
data of the top 100 cryptocurrencies, in terms of
market capitalizations as of February 18, 2018. Before
selecting the top 100, we remove those with relatively
short history1. Therefore, all selected cryptocurrencies
date back to at least January 1, 2017, and Fig. 2 shows
the number of cryptocurrencies under analysis over
time. The data includes close price, trading volume, and
market capitalization during the period of January 1,
2015 to December 31, 2017.
Figure 2: Number of cryptocurrencies under analysis (Jan 2015 - Feb 2018)
3.1.1 Price returns
We calculate daily, weekly, and monthly returns for
each cryptocurrency as (holding period returns):
𝑃𝑃𝑃𝑃
𝑃𝑃𝑃𝑃𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡 −
𝑅𝑅𝑅𝑅𝑡𝑡𝑡𝑡
𝑅𝑅𝑅𝑅𝑡𝑡𝑡𝑡 = 𝑃𝑃𝑃𝑃𝑡𝑡𝑡𝑡−1 − 1
𝑃𝑃𝑃𝑃𝑡𝑡𝑡𝑡−1
We conduct normality tests on all returns series and
find that during Jan 1, 2015 to Feb 18, 2018, none of
𝑃𝑃𝑃𝑃𝑡𝑡𝑡𝑡 cryptocurrency is normal
the daily price returns𝑅𝑅𝑅𝑅of any
−
𝑡𝑡𝑡𝑡
𝑃𝑃𝑃𝑃𝑡𝑡𝑡𝑡−1
at the significance level of
95%. For weekly returns,
two cryptocurrencies yield normal returns. And ten
of them have normal monthly returns. Therefore,
we think it is more appropriate to use holding period
returns rather than log returns.
Table 2, Table 3, and Table 4 provide statistical summary
of price returns of Bitcoin (BTC), Ethereum (ETH),
and Ripple (XRP), respectively, which are the top 3
cryptocurrencies in terms of market capitalization, as
of February 18, 2018. All the three have an average
d as well
um
daily return of less than 1%
as nnsingle-digit
d
um
weekly returns.
Table 2: Statistics summary for price returns of Bitcoin
(Jan 2015 - Feb 2018)
Daily
Count
Mean
Standard Minimum Median
deviation
Maximum
1144
0.0039
0.0403
0.2525
-0.2115
0.0026
Weekly
163
0.0268 0.1053
-0.2834
0.0187 0.5097
ount
d
um
ountmeans the number ofd daily returns
um and etc. This note applies
Notes: the “Count”
to the next three tables.
ount
d
um
3
3
The JBBA | Volume 2 | Issue 2 | October 2019
53
jbba
the
overall cryptocurrency market during the past 60 (180)
days. Obviously, an interesting finding is the spike of
market correlation in the second half of 2017, which
was exactly accompanied with the rising hotness of
cryptocurrencies.
Table 3: Statistics summary for price returns of Ether
(Aug 2015 - Feb 2018)i
Count Mean
Standard Minimum Median
deviation
Maximum
Daily
926
0.0097
0.0798
-0.7280
-0.0002
0.5103
Weekly
132
0.0682
0.2514
-0.3394
0.0098
1.4227
Table 4: Statistics summary for price returns of Ripple
ount
(Jan 2015 - dFeb 2018)um
Count Mean
Standard Minimum Median
deviation
Maximum
Daily
1144
0.0065
0.0914
-0.4600
-0.0035
1.7937
Weekly
163
0.0494
0.2808
-0.3311
-0.0169
1.9992
3
Table 5 presents the average statistics summary for
the top 100 cryptocurrencies. On average, these
cryptocurrencies have an average history of 30
monthsii. Due to some volatile cryptocurrencies, the
average returns and average standard deviations are
larger than those for the top 3 shown above.
ount
d
um
d
um
Table 5: Average statistics summary for price returns of the Top 100
cryptocurrencies (Jan 2015 - Feb 2018)
ount
Count Mean
Standard Minimum Median
deviation
Maximum
Daily
962
0.0452
0.4701
-0.5580
-0.0009
9.0874
Weekly
137
0.1636
0.9940
-0.5356
0.0064
9.2084
Notes:
1.
2.
First, we calculate the statistics summary for each
cryptocurrency, including count, mean, standard deviation,
minimum, median, and maximum. Then, we calculate the
averages of these statistics of all cryptocurrencies.
Not all cryptocurrencies have history back to January 2015. Th
missing values are dropped before calculating the statistics.
Figure 3: Correlations of daily price returns between top 100
cryptocurrencies (Jan 2015 - Feb 2018)
Table 6: Statistical summary for correlations of returns between top 100
cryptocurrencies (Jan 2015 - Feb 2018)
Mean
Standard Minimum Median
deviation
Maximum
Daily
0.1210
0.0522
0.0052
0.1290
0.2289
Weekly
0.1569
0.0659
0.0036
0.1729
0.2855
Notes:
First, for each cryptocurrency, we calculate the mean of its correlations
with other cryptocurrencies. Then, we calculate these statistics of the
means of correlations.
3.1.2 Correlations
To reveal the relationship between various
cryptocurrencies, we calculate the correlations of
price returns between the top 100 of them. Fig. 3
present the heatmaps of the correlations of daily
returns. And Table 6 provides statistics summary for
the correlations across all top 100. Obviously, most
of the cryptocurrencies are positively correlated
and correlations are getting higher when the time
frame becomes larger. Another interesting finding
is that correlations between large market-cap
cryptocurrencies are higher than correlations between
smaller market-caps.iii Therefore, we can conclude that
most cryptocurrencies are moving in herds with lower
double-digit correlations, and this phenomenon is
stronger between large market-caps.
Finally, to find out how correlations among
cryptocurrencies develop over time, we perform a
rolling analysis as is shown in Fig. 4. On each day, we
calculate the correlations based on daily returns of the
preceding 60 (180) days, and then we use the arithmetic
mean as the average correlation for that day. That said,
the statistic represents the level of correlation of the
The JBBA | Volume 2 | Issue 2 | October 2019
Figure 4: Rolling average correlation (60-days and 180-days, Jan 2015 Feb 2018)
To have a closer look at Bitcoin, we summarize the
statistics of its correlations of price returns with other
cryptocurrencies in Table 7. On average, Bitcoin has
a correlation of price returns (daily, weekly) of about
0.20 with other cryptocurrencies. In addition, Table
8 lists the most and least correlated cryptocurrencies
with Bitcoins. One interesting cryptocurrency stood
out upon a quick inspection - Litecoin (LTC) is highly
positively correlated with Bitcoin in both time frames.
We also examine the autocorrelation of Bitcoin,
as is shown in Fig. 5. The autocorrelations for daily
returns fall between -0.05 and 0.05, implying a low
4
autocorrelation nature.
54
jbba
the
Table 7: Statistics summary for correlations of between Bitcoins and
other cryptocurrencies (Jan 2015 - Feb 2018)
Mean
Standard Minimum Median
deviation
Maximum
Daily
0.2211
0.1158
-0.0140
0.2225
0.5035
Weekly
0.1897
0.1382
-0.1135
0.1962
0.4976
Notes: These statistics are calculated based on the correlations of price
returns between Bitcoins and the other 99 cryptocurrencies.
Table 8: Most and least correlated cryptocurrencies with Bitcoins
(Jan 2015 - Feb 2018)
Daily returns
Most correlated
Least correlated
Weekly returns
Symbol
Correlation
Symbol
Correlation
PPC
0.5035
SBD
0.4976
LTC
0.5006
LTC
0.4706
DOGE
0.4740
GOLOS
0.4463
NMC
0.4678
EMC2
0.4315
WAVES
0.4401
NMC
0.4281
PASC
-0.0140
ZOI
-0.1135
PURA
0.0029
GAME
-0.0991
NYC
0.0244
PIVX
-0.0915
MOON
0.0248
EMC
-0.0829
EXP
0.0306
CRW
-0.0681
from 2017 to February 2018 the daily returns appear
to differ in their structure. Figure 8 displays that the
variation explained by the second principal component
gains significantly as the first principal component fall
to less than 60%.
Clearly, 2017 was a banner year for cryptocurrency
and the addition of more retail investors could be one
of the explanations of why this period may have a
different underlying structure in the return generating
process compared to the two other periods. Retail
investors became more heavily involved purchasing
cryptocurrencies as evidenced by CoinBase having
more accounts than Charles Schwab in November
27, 2017iv. This changing investor base could possibly
bring in more of a herding and momentum behavior
if these retail investors are susceptible to known biases
similar to those affecting stock retail investors.
Figure 6: Explained variance ratios for PCA components
(58 cryptocurrencies, Jan 2015 - Feb 2018)
Notes: the ranks are based on magnitudes of correlations.
Figure 7: Explained variance ratios for PCA components
(73 cryptocurrencies, Jan 2016 - Feb 2018)
Figure 5: Autocorrelation function of Bitcoin daily price returns (Jan
2015 - Feb 2018)
Notes: the lags range from 1 to 40.
3.1.3 Principal Component Analysis (PCA)
To uncover the common drivers of price returns, we
employ a popular dimensionality reduction technique
- PCA. The starting time of each cryptocurrency
varies, thus, to avoid artificially creating biasedness
by filling backward on the missing leading values, we
select three subsets of time for our PCA analysis and
only employ overlapping series. First, we select the 59
cryptocurrencies which have full history back to January
1, 2015. Second, we select the 74 cryptocurrencies with
full history back to January 1, 2016. Finally, we select
the 100 cryptocurrencies which have returns back to
January 1, 2017. We perform PCA for our three periods
employing daily price returns.
Figure 6, Figure 7, and Figure 8 present the results
for 2015 to Jan 2018, 2016 to Jan 2018, and 2017 to
Jan 2018, respectively. In the first and second case, the
first principal component captures the majority of the
variance, with less variation explained by the other four
principal components. In the third case, the period
The JBBA | Volume 2 | Issue 2 | October 2019
Figure 8: Explained variance ratios for PCA components
(100 cryptocurrencies, Jan 2017 - Feb 2018)
3.2 Traditional assets
Recent literature [14] shows that Bitcoin provides
diversification to portfolio comprised of traditional
assets. We dig in and investigate the cross-market
relationship between the top 100 cryptocurrencies and
5
traditional assets. Daily prices of following assets are
downloaded from Bloomberg Terminal:
●
●
●
S&P 500 index (SPX Index): It is a
capitalization-weighted index of 500 stocks
trading in the U.S. stock market.
MSCI World Index (MXWO Index): It is a
free-float weighted equity index covering
stocks trading in developed markets.
MSCI Emerging Markets Index (MXEF
55
jbba
the
Index): It is a free-float weighted equity
index covering large and mid-cap stocks
trading in emerging markets.
US Dollar Index: a measure of the value
of the U.S. dollar relative to the value of a
basket of currencies of the majority of the
U.S.'s most significant trading partners.
Gold spot price (in US$)
Bloomberg Commodity Index (BCOM
Index): It is an index reflecting commodity
futures price movement.
VIX Index: The measure of volatility
implied by S&P 500 index options,
calculated and published by CBOE.
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● Table
9 presents the correlations between Bitcoin,
●
●
other cryptocurrencies, and traditional assets,
calculated in terms of daily returns. Obviously, Bitcoin
is barely correlated to any traditional assets at the
daily level (absolute correlations < 0.1). It exhibits a
slightly positive correlation to S&P 500, MSCI, USD,
Gold, and Commo, while demonstrating a negative
correlation to Emg and VIX. Not surprisingly Bitcoin
is positively associated with the first PCA component
and very highly correlated to the market capitalization
weighted cryptocurrency returns.
Table 9: Correlations between daily returns of cryptocurrencies and
traditional assets (Jan 2015 - Feb 2018)
BTC
VW
SP500
MSCI
Emg
USD
Gold
Commo
VIX
BTC
1.0000
0.9416
0.0441
0.0232
-0.0212
0.0134
0.0419
0.0351
-0.0921
VW
0.9416
1.0000
0.0538
0.0316
-0.0204
-0.0049
0.0526
0.0359
-0.0975
SP500
0.0441
0.0538
1.0000
0.9093
0.4480
0.0831
-0.1674
0.2967
-0.7880
MSCI
0.0232
0.0316
0.9093
1.0000
0.6587
-0.0413
-0.1262
0.3836
-0.7283
Emg
-0.0212 -0.0204 0.4480
0.6587
1.0000
-0.0426
-0.0053
0.3641
-0.3848
USD
0.0134
-0.0049 0.0831
-0.0413
-0.0426
1.0000
-0.4070
-0.2427
-0.0828
Gold
0.0419
0.0526
-0.1674
-0.1262
-0.0053
-0.4070
1.0000
0.2441
0.1365
Commo
0.0351
0.0359
0.2967
0.3836
0.3641
-0.2427
0.2441
1.0000
-0.2224
-0.7283
-0.3848
-0.0828
0.1365
-0.2224
1.0000
VIX
-0.0921 -0.0975 -0.7880
beta-in-the-tail risk.
Upon visual inspection we document the increasing
betas in down S&P 500 daily return periods. We argue
that beta-in-the-tail is a significant hidden risk for
cryptocurrency investors when employing daily returns.
The methodology for daily beta-in-the-tail analysis
follows: First, order all the daily returns on the S&P
500 from least to greatest. Associated to each S&P
500-day period we link both the Bitcoin return and
MarketCap Weighted Index return for that day. Next,
we anchor the worst daily returns for the S&P 500 and
use thirty days of returns to run our regressions. That
is, we estimate the beta associated with the worst thirty
days in our sample period. At this point, it is important
to note that the time dimension has been compromised
with this sorting of the daily returns.
The regression is the crypto-returns regressed on the
S&P 500 returns. Assuming that the risk-free daily
returns are zero yields the CAPM’s beta of Sharpe
[17] and Litner [18] for the given cryptocurrency
index. By anchoring the worst return day for the S&P
500 and expanding the window of daily returns we
plot the slope coefficients with inclusion of another
daily return. When the window has been expanded to
include all the daily returns then the final regression
corresponds to the beta for the whole period.
The Betas are reported in the left y-axis and the average
daily returns for the window period is reported in the
right y-axis on the black dashed line. Standard deviation
bands surround the beta estimates. Notice that as more
observations are included the standard deviation of
the beta estimates reduces. The beta-in-the-tails based
on daily returns reach above 1.0 compared this to the
whole period beta of close to zero for Bitcoin and VW
Index, respectively, as seen on the furthest left bottom
corner of Fig. 9.
Notes: “VW” is the market cap weighted price returns. “MSCI” is the MSCI
o
51
59
developed
market
index. “Emg” is the MSCI emerging market index. “Commo” is
the Bloomberg Commodity Index.
921
975
3.3 Beta-in-the-Tails Analysis (BTA)
In this section we estimate the potential hidden risks in
the cryptocurrency markets. In particular, we examine
the stability of their betas for Bitcoin and the VW
index with respect to the market, which we employ
the S&P 500 as a proxy. Edwards and Caglayan [15]
document changes in hedge fund correlation in bull
and bear markets. Liew [16] introduces the beta-inthe-tail analysis for hedge funds and documents the
vanishing diversification benefits as a hidden risk
for hedge fund investors. In down periods the beta
associated to hedge fund increases and thus decreasing
the perceived diversification benefits. Similarly, we find
such an occurrence for cryptocurrencies and warn
potential investors to be vigilant with regards to the
The JBBA | Volume 2 | Issue 2 | October 2019
Figure 9: Beta in the Tails (daily)
Notes: Calculated based on daily returns from April 2013 to Feb 2018.
Given that cryptocurrencies trade seven days a week
and twenty-four hours a day in contrast to stocks 6
which typically trade only five days a week and six and
a half hours a day, we repeat the analysis excluding
the weekend in Fig. 10, Beta in the Tail Excluding
the Weekends. We arrive at a similar pattern with an
increase in the beta in down S&P 500 days. Beta-in-the56
jbba
the
regularization
with
α =α 1.0.
regularization
with
= 1.0.
regularization
regularization with
with αα =
= 1.0.
1.0.
2 2
‖𝑋𝑋𝑋𝑋‖𝑋𝑋𝑋𝑋
− 𝑦𝑦𝑦𝑦‖
∗ ‖𝜔𝜔𝜔𝜔‖
𝜔𝜔𝜔𝜔 −
1 1
2 2 𝛼𝛼𝛼𝛼 ∗𝛼𝛼𝛼𝛼‖𝜔𝜔𝜔𝜔‖
𝜔𝜔𝜔𝜔 𝑦𝑦𝑦𝑦‖
𝜔𝜔𝜔𝜔 with
𝜔𝜔𝜔𝜔 ∗ 𝑛𝑛𝑛𝑛
2
𝑛𝑛𝑛𝑛 1.0.−
regularization
α∗=
‖𝑋𝑋𝑋𝑋
𝑦𝑦𝑦𝑦‖
𝛼𝛼𝛼𝛼
∗∗ ‖𝜔𝜔𝜔𝜔‖
ElasticNet
(EN):
𝜔𝜔𝜔𝜔 − 𝑦𝑦𝑦𝑦‖2
1
2
‖𝑋𝑋𝑋𝑋
‖𝜔𝜔𝜔𝜔‖
𝛼𝛼𝛼𝛼
𝜔𝜔𝜔𝜔
𝜔𝜔𝜔𝜔
1
2
∗∗ 𝑛𝑛𝑛𝑛
𝜔𝜔𝜔𝜔
𝑛𝑛𝑛𝑛
tails appears robust to non-trading weekdays.
EN [19] is a linear
model
performs
regression
‖𝑋𝑋𝑋𝑋 −
𝑦𝑦𝑦𝑦‖22 that
𝛼𝛼𝛼𝛼 ∗ ‖𝜔𝜔𝜔𝜔‖
1
𝜔𝜔𝜔𝜔
𝑛𝑛𝑛𝑛 𝜔𝜔𝜔𝜔
with both L1∗ and
L2 regularization. This gives it the
property of both LASSO and ridge regression, and the
regularization
with α =
objective
function
is 1.0.
as below. We use the scikit-learn
learn
default
selection
of α =α 1.0.
learn
default
= 1.0.
default selection
of
α
= selection
1.0. of of
learn default selection
α = 1.0.
Figure 10: Beta in the Tails (daily, excluding weekends)
Notes: Calculated based on daily returns from April 2013 to Feb 2018.
4. Methodology - Rolling Prediction Analysis
learn default selection2 of α = 1.0.
‖𝑋𝑋𝑋𝑋𝜔𝜔𝜔𝜔 −2 𝑦𝑦𝑦𝑦‖2 𝛼𝛼𝛼𝛼 ∗ ‖𝜔𝜔𝜔𝜔‖1
1
2 𝛼𝛼𝛼𝛼 ∗ 𝜌𝜌𝜌𝜌 ∗ ‖𝜔𝜔𝜔𝜔‖
∗ 𝑛𝑛𝑛𝑛
min 𝜔𝜔𝜔𝜔 ‖𝑋𝑋𝑋𝑋
‖𝑋𝑋𝑋𝑋
− 𝑦𝑦𝑦𝑦‖
𝛼𝛼𝛼𝛼 ∗ 𝜌𝜌𝜌𝜌 ∗ ‖𝜔𝜔𝜔𝜔‖
𝜔𝜔𝜔𝜔 −
1 1
2+
𝜔𝜔𝜔𝜔 𝑦𝑦𝑦𝑦‖
2
𝜔𝜔𝜔𝜔 𝜔𝜔𝜔𝜔2
∗
𝑛𝑛𝑛𝑛
2
𝑛𝑛𝑛𝑛 −
learn∗default
selection
of
α∗=‖𝜔𝜔𝜔𝜔‖
1.0.1
‖𝑋𝑋𝑋𝑋
𝑦𝑦𝑦𝑦‖
𝛼𝛼𝛼𝛼
∗∗ 𝜌𝜌𝜌𝜌
2
𝜔𝜔𝜔𝜔 − 𝑦𝑦𝑦𝑦‖𝛼𝛼𝛼𝛼2 ∗𝛼𝛼𝛼𝛼(1
‖𝑋𝑋𝑋𝑋
‖𝜔𝜔𝜔𝜔‖
𝛼𝛼𝛼𝛼
𝜌𝜌𝜌𝜌
∗
−
𝜌𝜌𝜌𝜌)
∗
−
𝜌𝜌𝜌𝜌
𝜔𝜔𝜔𝜔
1
∗∗ 𝑛𝑛𝑛𝑛
𝜔𝜔𝜔𝜔
𝑛𝑛𝑛𝑛 𝜔𝜔𝜔𝜔 + 𝛼𝛼𝛼𝛼2 ∗ − 𝜌𝜌𝜌𝜌 ‖𝜔𝜔𝜔𝜔‖
‖𝜔𝜔𝜔𝜔‖
2
𝛼𝛼𝛼𝛼 ∗ 2 − 𝜌𝜌𝜌𝜌 ‖𝜔𝜔𝜔𝜔‖ 2
‖𝑋𝑋𝑋𝑋 − 𝑦𝑦𝑦𝑦‖22 𝛼𝛼𝛼𝛼 ∗ 𝜌𝜌𝜌𝜌 ∗ ‖𝜔𝜔𝜔𝜔‖
‖𝜔𝜔𝜔𝜔‖221
𝜔𝜔𝜔𝜔
∗ 𝑛𝑛𝑛𝑛 𝜔𝜔𝜔𝜔
𝛼𝛼𝛼𝛼 ∗ − (SGD):
𝜌𝜌𝜌𝜌
Stochastic Gradient Descent
‖𝜔𝜔𝜔𝜔‖2
(3)
default selection
of αto=fit
1.0.linear models.
SGD [19] is learn
an efficiency
method
In this section, we firstly give a brief introduction to It searches for minima or maxima through iterations.
with
α =α‖𝑋𝑋𝑋𝑋
0.0001.
−default
𝑦𝑦𝑦𝑦‖22 𝛼𝛼𝛼𝛼
∗ 𝜌𝜌𝜌𝜌 ∗ ‖𝜔𝜔𝜔𝜔‖1 squared loss
regularization
with
=𝜔𝜔𝜔𝜔0.0001.
the 11 machine learning algorithms we tested. Next, we regularization
We
use the
scikit-learn
parameters:
𝜔𝜔𝜔𝜔
∗α𝑛𝑛𝑛𝑛= 0.0001.
regularization
with
withL2
α=
0.0001. 𝛼𝛼𝛼𝛼 ∗ with
describe the way we roll the prediction analysis. Finally, regularization
function and
regularization
− 𝜌𝜌𝜌𝜌 α = 0.0001.
‖𝜔𝜔𝜔𝜔‖2
4)
2 2
we present our data.
‖𝑋𝑋𝑋𝑋‖𝑋𝑋𝑋𝑋
𝛼𝛼𝛼𝛼 ∗𝛼𝛼𝛼𝛼‖𝜔𝜔𝜔𝜔‖
− 𝑦𝑦𝑦𝑦‖
∗ ‖𝜔𝜔𝜔𝜔‖
𝜔𝜔𝜔𝜔 − 𝑦𝑦𝑦𝑦‖
2
2
4.1 Algorithms
In this subsection, we introduced the 11 machine
learning algorithms. Our problem can be easily
described with linear models – we have a set of
variables (x, a matrix with each column being a variable
and each row being value for the corresponding day)
such as historical returns, volatility and etc., and a target
variable (y, a column vector); and we want to train a
model that predicts y with out of sample input x.
There are three strands of algorithms in our analysis:
1) linear models, including LASSO, ElasticNet,
Stochastic Gradient Descent, and Bayesian Regression;
2) tree-based
models, including Decision Tree, Extra
𝑛𝑛𝑛𝑛 𝑛𝑛𝑛𝑛
Tree Random
Forest, AdaBoost, and Gradient Tree
𝑛𝑛𝑛𝑛
∑
𝐿𝐿𝐿𝐿(𝑦𝑦𝑦𝑦
𝜔𝜔𝜔𝜔 𝜔𝜔𝜔𝜔
𝑛𝑛𝑛𝑛 ∑
𝐿𝐿𝐿𝐿(𝑦𝑦𝑦𝑦
− 𝑥𝑥𝑥𝑥
𝑓𝑓𝑓𝑓𝑖𝑖𝑖𝑖 𝑥𝑥𝑥𝑥)𝑖𝑖𝑖𝑖 ) 𝛼𝛼𝛼𝛼 ∗𝛼𝛼𝛼𝛼𝑅𝑅𝑅𝑅∗ 𝑅𝑅𝑅𝑅
𝑖𝑖𝑖𝑖 −𝑖𝑖𝑖𝑖 𝑓𝑓𝑓𝑓
𝜔𝜔𝜔𝜔 𝜔𝜔𝜔𝜔𝑛𝑛𝑛𝑛 3)
Boosting;
other
models,
including
KNN, Support
𝑛𝑛𝑛𝑛
∑
𝑖𝑖𝑖𝑖=1 𝐿𝐿𝐿𝐿(𝑦𝑦𝑦𝑦
𝐿𝐿𝐿𝐿(𝑦𝑦𝑦𝑦𝑖𝑖𝑖𝑖𝑖𝑖𝑖𝑖 −
− 𝑓𝑓𝑓𝑓
𝑓𝑓𝑓𝑓 𝑥𝑥𝑥𝑥
𝑥𝑥𝑥𝑥𝑖𝑖𝑖𝑖𝑖𝑖𝑖𝑖 )) 𝛼𝛼𝛼𝛼
𝛼𝛼𝛼𝛼 ∗∗ 𝑅𝑅𝑅𝑅
𝑅𝑅𝑅𝑅 𝜔𝜔𝜔𝜔
𝜔𝜔𝜔𝜔
𝜔𝜔𝜔𝜔 𝑛𝑛𝑛𝑛 ∑𝑖𝑖𝑖𝑖=1
Vector𝜔𝜔𝜔𝜔Machine,
and
Multi-layer
perceptron.
We briefly
𝑛𝑛𝑛𝑛 𝑖𝑖𝑖𝑖=1
𝑛𝑛𝑛𝑛
𝑖𝑖𝑖𝑖=1
introduced∑
each
of
the
algorithms
as
below.
𝐿𝐿𝐿𝐿(𝑦𝑦𝑦𝑦 − 𝑓𝑓𝑓𝑓 𝑥𝑥𝑥𝑥 ) 𝛼𝛼𝛼𝛼 ∗ 𝑅𝑅𝑅𝑅 𝜔𝜔𝜔𝜔
𝜔𝜔𝜔𝜔
𝑛𝑛𝑛𝑛
𝑖𝑖𝑖𝑖
𝑖𝑖𝑖𝑖=1
𝑖𝑖𝑖𝑖
A typical objective function of linear models is as
below:
𝑛𝑛𝑛𝑛
1
min ∑ 𝐿𝐿𝐿𝐿(𝑦𝑦𝑦𝑦𝑖𝑖𝑖𝑖 − 𝑓𝑓𝑓𝑓(𝑥𝑥𝑥𝑥𝑖𝑖𝑖𝑖 )) + 𝛼𝛼𝛼𝛼 ∗ 𝑅𝑅𝑅𝑅(𝜔𝜔𝜔𝜔)
𝜔𝜔𝜔𝜔 𝑛𝑛𝑛𝑛
(1)
𝑖𝑖𝑖𝑖=1
where L is loss function, R is regularization term, f is
the fitted function.
Least Absolute Shrinkage and Selection Operator
(LASSO):
LASSO [19] is a linear model that performs both
variable selection and regularization. In contrast to
simple linear regression, its objective function is as
below. We use the scikit-learn default parameters:
squared loss
regularization
withfunction
α = 1.0. and L2 regularization with α =
1.0.
min
𝜔𝜔𝜔𝜔
1
‖𝑋𝑋𝑋𝑋 − 𝑦𝑦𝑦𝑦‖22 + 𝛼𝛼𝛼𝛼 ∗ ‖𝜔𝜔𝜔𝜔‖1
2 ∗ 𝑛𝑛𝑛𝑛 𝜔𝜔𝜔𝜔
The JBBA | Volume 2 | Issue 2 | October 2019
(2)
1 𝑛𝑛𝑛𝑛 𝜔𝜔𝜔𝜔 2 2
𝜔𝜔𝜔𝜔
𝜔𝜔𝜔𝜔𝑛𝑛𝑛𝑛 ‖𝑋𝑋𝑋𝑋
regularizationmin
with
α =𝜔𝜔𝜔𝜔0.0001.
‖𝜔𝜔𝜔𝜔‖2
− 𝑦𝑦𝑦𝑦‖22 + 𝛼𝛼𝛼𝛼
𝛼𝛼𝛼𝛼 ∗∗ ‖𝜔𝜔𝜔𝜔‖
𝜔𝜔𝜔𝜔 𝑛𝑛𝑛𝑛 ‖𝑋𝑋𝑋𝑋𝜔𝜔𝜔𝜔 − 𝑦𝑦𝑦𝑦‖2
2
𝜔𝜔𝜔𝜔 𝑛𝑛𝑛𝑛
2
(4)
2
Bayesian Regression
‖𝑋𝑋𝑋𝑋𝜔𝜔𝜔𝜔 − 𝑦𝑦𝑦𝑦‖(BR):
𝛼𝛼𝛼𝛼 ∗ ‖𝜔𝜔𝜔𝜔‖2
2
𝜔𝜔𝜔𝜔
𝑛𝑛𝑛𝑛
BR [19] provides another way of performing linear
regularizationwhere
with αlinear
= 0.0001.
regression,
model can be written as below:
5)
𝑦𝑦𝑦𝑦𝑖𝑖𝑖𝑖 𝑦𝑦𝑦𝑦𝑖𝑖𝑖𝑖 𝛼𝛼𝛼𝛼 𝛼𝛼𝛼𝛼 𝛽𝛽𝛽𝛽 ∗𝛽𝛽𝛽𝛽𝑥𝑥𝑥𝑥∗𝑖𝑖𝑖𝑖 𝑥𝑥𝑥𝑥
𝑤𝑤𝑤𝑤𝑖𝑖𝑖𝑖
𝑡𝑡𝑡𝑡ℎ 𝑡𝑡𝑡𝑡𝑦𝑦𝑦𝑦ℎ𝑖𝑖𝑖𝑖 𝑦𝑦𝑦𝑦𝑖𝑖𝑖𝑖𝑁𝑁𝑁𝑁 𝑁𝑁𝑁𝑁
𝜇𝜇𝜇𝜇𝑖𝑖𝑖𝑖 𝜇𝜇𝜇𝜇𝜎𝜎𝜎𝜎𝑖𝑖𝑖𝑖 𝜎𝜎𝜎𝜎
𝑖𝑖𝑖𝑖 𝑤𝑤𝑤𝑤𝑖𝑖𝑖𝑖
5)
𝑦𝑦𝑦𝑦
𝛼𝛼𝛼𝛼
𝛽𝛽𝛽𝛽
∗
𝑥𝑥𝑥𝑥
𝑤𝑤𝑤𝑤𝑖𝑖𝑖𝑖
𝑡𝑡𝑡𝑡
ℎ
𝑦𝑦𝑦𝑦
𝑁𝑁𝑁𝑁
𝜇𝜇𝜇𝜇
𝜎𝜎𝜎𝜎
𝑖𝑖𝑖𝑖
𝑖𝑖𝑖𝑖
𝑖𝑖𝑖𝑖
𝑖𝑖𝑖𝑖
(5)
𝑦𝑦𝑦𝑦𝑖𝑖𝑖𝑖 = 𝛼𝛼𝛼𝛼 + 𝛽𝛽𝛽𝛽 ∗ 𝑥𝑥𝑥𝑥𝑖𝑖𝑖𝑖 𝑤𝑤𝑤𝑤𝑖𝑖𝑖𝑖𝑡𝑡𝑡𝑡ℎ2𝑦𝑦𝑦𝑦𝑖𝑖𝑖𝑖 ~𝑁𝑁𝑁𝑁(𝜇𝜇𝜇𝜇𝑖𝑖𝑖𝑖 , 𝜎𝜎𝜎𝜎)
‖𝑋𝑋𝑋𝑋𝜔𝜔𝜔𝜔distribution
−distribution
𝑦𝑦𝑦𝑦‖2 𝛼𝛼𝛼𝛼 with
∗ ‖𝜔𝜔𝜔𝜔‖
2mean
That
is, yis,follows
mean
μ and
σ, σ,
That
y follows
a𝑛𝑛𝑛𝑛normal
with
μ and
𝜔𝜔𝜔𝜔a normal
That
follows
a normal
distribution
with
mean
and
σ,
μ
isμ aisis,
linear
parameters
α 𝜇𝜇𝜇𝜇and
this
way,
thethe
ayylinear
function
α and
β.μ
In
this
way,
That
is,
follows
μwith
and
σ,
𝑦𝑦𝑦𝑦𝑖𝑖𝑖𝑖yfunction
𝛼𝛼𝛼𝛼a normal
𝛽𝛽𝛽𝛽with
∗awith
𝑥𝑥𝑥𝑥normal
𝑤𝑤𝑤𝑤𝑖𝑖𝑖𝑖parameters
𝑡𝑡𝑡𝑡ℎ 𝑦𝑦𝑦𝑦𝑖𝑖𝑖𝑖distribution
𝑁𝑁𝑁𝑁with
𝜎𝜎𝜎𝜎β. In
𝑖𝑖𝑖𝑖distribution
𝑖𝑖𝑖𝑖 mean
That
is,
follows
mean
μ
μ
is
a
linear
function
with
parameters
α
and
β.
In
this
way,
μ is a linear function with parameters α and β. In this way, the
the
and σ, while μ is a linear function with parameters α
That is, y follows a normal distribution with mean μ and σ,
and
β. Infunction
this way,
the
model can
beβ.estimated
μ is
a linear
parameters
α and
In this way,using
the
𝑛𝑛𝑛𝑛with
𝑛𝑛𝑛𝑛
6)
maximum likelihood
function
instead
of minimizing
∏∏
𝑦𝑦𝑦𝑦
𝛼𝛼𝛼𝛼
𝛽𝛽𝛽𝛽
∗
𝑥𝑥𝑥𝑥
𝜎𝜎𝜎𝜎
𝑛𝑛𝑛𝑛 𝑁𝑁𝑁𝑁 𝑁𝑁𝑁𝑁
𝑦𝑦𝑦𝑦
𝛼𝛼𝛼𝛼
𝛽𝛽𝛽𝛽
∗
𝑥𝑥𝑥𝑥
𝜎𝜎𝜎𝜎
𝑖𝑖𝑖𝑖
𝑖𝑖𝑖𝑖
𝑖𝑖𝑖𝑖
𝑖𝑖𝑖𝑖
6)
𝛽𝛽𝛽𝛽𝛼𝛼𝛼𝛼𝜎𝜎𝜎𝜎𝛽𝛽𝛽𝛽 𝜎𝜎𝜎𝜎 𝑛𝑛𝑛𝑛
6)
squared 𝛼𝛼𝛼𝛼errors:
∏𝑖𝑖𝑖𝑖=1𝑖𝑖𝑖𝑖=1
𝑁𝑁𝑁𝑁 𝑦𝑦𝑦𝑦𝑖𝑖𝑖𝑖 𝛼𝛼𝛼𝛼 𝛽𝛽𝛽𝛽
𝛽𝛽𝛽𝛽 ∗∗ 𝑥𝑥𝑥𝑥
𝑥𝑥𝑥𝑥𝑖𝑖𝑖𝑖𝑖𝑖𝑖𝑖 𝜎𝜎𝜎𝜎
𝜎𝜎𝜎𝜎
𝛼𝛼𝛼𝛼 𝛽𝛽𝛽𝛽 𝜎𝜎𝜎𝜎 ∏𝑖𝑖𝑖𝑖=1𝑁𝑁𝑁𝑁 𝑦𝑦𝑦𝑦𝑖𝑖𝑖𝑖 𝛼𝛼𝛼𝛼
𝛼𝛼𝛼𝛼 𝑦𝑦𝑦𝑦
𝛽𝛽𝛽𝛽𝑖𝑖𝑖𝑖𝜎𝜎𝜎𝜎 𝛼𝛼𝛼𝛼 𝑖𝑖𝑖𝑖=1𝛽𝛽𝛽𝛽 ∗ 𝑥𝑥𝑥𝑥𝑖𝑖𝑖𝑖 𝑤𝑤𝑤𝑤𝑖𝑖𝑖𝑖𝑡𝑡𝑡𝑡ℎ 𝑦𝑦𝑦𝑦𝑖𝑖𝑖𝑖 𝑁𝑁𝑁𝑁 𝜇𝜇𝜇𝜇𝑖𝑖𝑖𝑖 𝜎𝜎𝜎𝜎
𝑛𝑛𝑛𝑛
(6)
max ∏ 𝑁𝑁𝑁𝑁(𝑦𝑦𝑦𝑦𝑖𝑖𝑖𝑖 ; 𝛼𝛼𝛼𝛼 + 𝛽𝛽𝛽𝛽 ∗ 𝑥𝑥𝑥𝑥𝑖𝑖𝑖𝑖 , 𝜎𝜎𝜎𝜎 )
That is, y𝛼𝛼𝛼𝛼,𝛽𝛽𝛽𝛽,𝜎𝜎𝜎𝜎
follows a𝑖𝑖𝑖𝑖=1
normal distribution with mean μ and σ,
μ is a linear function with parameters α and β. In this way, the
Decision Tree (DT):
𝑛𝑛𝑛𝑛
DT [19] is a non-parametric
method that can be used
∏ 𝑁𝑁𝑁𝑁 𝑦𝑦𝑦𝑦𝑖𝑖𝑖𝑖 𝛼𝛼𝛼𝛼 𝛽𝛽𝛽𝛽 ∗ 𝑥𝑥𝑥𝑥𝑖𝑖𝑖𝑖 𝜎𝜎𝜎𝜎
𝛽𝛽𝛽𝛽 𝜎𝜎𝜎𝜎
𝑖𝑖𝑖𝑖=1
for both 𝛼𝛼𝛼𝛼classification
and regression. The tree is
built for classifying or predicting test points based on
several rules. For classification problems, the leafs of
the tree are the classification labels, and for regression
problems, the leafs are continuous values. We use the
default parameters provided by scikit-learn: using mean
square error as splitting criterion, and without max
depth of trees.
Extra Tree Random Forest (ETRF):
Random forest [19] is an ensemble method built on
many trees, and each tree is built through training on
a sample of the entire train set with replacement. In
addition, when splitting a node during the construction
of trees, the best split is measured among a random
subset of features rather than all features. This
randomness leads to lower variance and larger bias. On
the other hand, ETRF moves even further regarding
57
jbba
the
randomness in splitting the nodes – splitting thresholds
are randomly assigned instead of searching for the
most discriminative thresholds. We use the default
parameters provided by scikit-learn: 10 trees without
max depth of trees and using mean square error as
splitting criterion.
Adaptive Boosting (AdaBoost):
AdaBoost [19] is an ensemble algorithm that fits a
sequence of relatively weak models with repeatedly
modified data. More specifically, it firstly trains on
the original train set and assesses the errors. Then it
modifies the train set by assigning more weights to
poorly modeled points. The processes are repeated for
multiple times. Decision Tree is usually used as the base
model in AdaBoost. We use the default parameters
provided by scikit-learn: 50 Decision Tree models as
base estimators.
Gradient Tree Boosting (GTB):
Gradient Boosting [19] is another ensemble algorithm
that also fits a sequence of relatively weak models with
repeatedly modified data. More specifically, it firstly
trains on the train set and the original predicted targets.
Then it modifies the predicted targets to be certain type
of residuals between the true values and the predicted
(trained) values. The processes are repeated for multiple
times. GTB is the combination of Decision Tree and
Gradient Boosting. We use the default parameters
provided by scikit-learn: 100 Decision Tree models as
base estimators and without max depth.
K-nearest Neighbor (KNN):
b, which can be found by solving a constrained
optimization problem:
min‖𝜔𝜔𝜔𝜔‖ 𝐴𝐴𝐴𝐴 = 𝜋𝜋𝜋𝜋𝑟𝑟𝑟𝑟 2
(7)
𝜔𝜔𝜔𝜔
𝑠𝑠𝑠𝑠. 𝑡𝑡𝑡𝑡. 𝑦𝑦𝑦𝑦𝑖𝑖𝑖𝑖 ∗ (𝜔𝜔𝜔𝜔′ 𝑋𝑋𝑋𝑋𝑖𝑖𝑖𝑖 − 𝛽𝛽𝛽𝛽) ≥ 1, 𝑖𝑖𝑖𝑖 = 1, … , 𝑛𝑛𝑛𝑛
SVM can also be used for regression, where similar
kernel method is applied.
‖𝜔𝜔𝜔𝜔‖ 𝐴𝐴𝐴𝐴 𝜋𝜋𝜋𝜋𝑟𝑟𝑟𝑟 2
𝜔𝜔𝜔𝜔
Multi-layer Perceptron
(MLP):
′
𝑠𝑠𝑠𝑠 𝑡𝑡𝑡𝑡 𝑦𝑦𝑦𝑦𝑖𝑖𝑖𝑖 ∗ 𝜔𝜔𝜔𝜔 𝑋𝑋𝑋𝑋𝑖𝑖𝑖𝑖 − 𝛽𝛽𝛽𝛽 ≥
𝑖𝑖𝑖𝑖
𝑛𝑛𝑛𝑛
𝜔𝜔𝜔𝜔
‖𝜔𝜔𝜔𝜔‖ 𝐴𝐴𝐴𝐴
′
‖𝜔𝜔𝜔𝜔‖ 𝐴𝐴𝐴𝐴 𝑠𝑠𝑠𝑠 𝑡𝑡𝑡𝑡𝜋𝜋𝜋𝜋𝑟𝑟𝑟𝑟𝑦𝑦𝑦𝑦2𝑖𝑖𝑖𝑖 ∗ 𝜔𝜔𝜔𝜔 𝑋𝑋𝑋𝑋𝑖𝑖𝑖𝑖 − 𝛽𝛽𝛽𝛽 ≥
𝜋𝜋𝜋𝜋𝑟𝑟𝑟𝑟 2
Given a set of features and
𝜔𝜔𝜔𝜔 a target y, MLP [19] can learn
a non-linear function estimator
for either classification
′
≥ 𝑖𝑖𝑖𝑖
𝑛𝑛𝑛𝑛
𝑖𝑖𝑖𝑖 ∗ 𝜔𝜔𝜔𝜔 𝑋𝑋𝑋𝑋
𝑖𝑖𝑖𝑖 − 𝛽𝛽𝛽𝛽 backpropagation
or regression.𝑠𝑠𝑠𝑠 It𝑡𝑡𝑡𝑡 𝑦𝑦𝑦𝑦trains
using
with
no activation function in the output layer, which can
also be seen as using the identity function as activation
function. Therefore, it uses the square error as the
loss function, and the output is a set of continuous
values. We use the default parameters of scikit-learn:
one hidden layer with 100 hidden units and “relu” as
activation function.
𝑖𝑖𝑖𝑖
4.2 Rolling Methodology
We perform rolling prediction analysis. That is, we train
our models based on prior historical data and predict
future returns. The procedure then rolls forward by
expanding the train set by one day and then repeating
the training and prediction procedure. A detailed
description is as below.
Suppose we stand on day Dt, and we want to predict
the n-day (n>=1) price returns ahead. To allow the
𝑡𝑡𝑡𝑡
prediction to take place at any time 𝑅𝑅𝑅𝑅of𝑡𝑡𝑡𝑡 day 𝑃𝑃𝑃𝑃Dt,
−we only
𝑃𝑃𝑃𝑃𝑡𝑡𝑡𝑡−1
refer to information up to the previous day
Dt-1. There
are two important considerations:
Typically, KNN [19] method is designed for
classification, where discrete labels are determined by
𝑃𝑃𝑃𝑃𝑡𝑡𝑡𝑡
the majority of certain amount of nearest data points.
𝑅𝑅𝑅𝑅𝑡𝑡𝑡𝑡
−
𝑃𝑃𝑃𝑃𝑡𝑡𝑡𝑡−1 𝑃𝑃𝑃𝑃𝑡𝑡𝑡𝑡
𝐷𝐷𝐷𝐷𝑡𝑡𝑡𝑡
𝐷𝐷𝐷𝐷
𝑡𝑡𝑡𝑡−1 predicted variable (y) is calculated as:
s: 𝑅𝑅𝑅𝑅𝑡𝑡𝑡𝑡 =
−1
However, KNN can also be used for regression where Our
𝑃𝑃𝑃𝑃𝑡𝑡𝑡𝑡−1
𝑃𝑃𝑃𝑃𝑡𝑡𝑡𝑡−1
𝑅𝑅𝑅𝑅𝑡𝑡𝑡𝑡−𝑚𝑚𝑚𝑚 𝑡𝑡𝑡𝑡−1
−
the labels are continuous. The label assigned to a test
𝑃𝑃𝑃𝑃𝑡𝑡𝑡𝑡−𝑚𝑚𝑚𝑚
our explanatory variables (X), we can only use𝐷𝐷𝐷𝐷
point is determined based on the mean of the labels and 𝐷𝐷𝐷𝐷
𝑡𝑡𝑡𝑡−1
𝑡𝑡𝑡𝑡
𝑡𝑡𝑡𝑡−1
For𝐷𝐷𝐷𝐷𝑡𝑡𝑡𝑡−1
example,
the m-day 𝐷𝐷𝐷𝐷𝑡𝑡𝑡𝑡
to day Dtot-1.day
of its nearest data points. Scikit-learn provides three variables up𝑃𝑃𝑃𝑃𝐷𝐷𝐷𝐷
𝑡𝑡𝑡𝑡−1
.For example
𝑃𝑃𝑃𝑃𝑡𝑡𝑡𝑡−1
𝑅𝑅𝑅𝑅𝑡𝑡𝑡𝑡−𝑚𝑚𝑚𝑚 𝑡𝑡𝑡𝑡−1
−
𝑃𝑃𝑃𝑃𝑡𝑡𝑡𝑡−1
𝑃𝑃𝑃𝑃𝑡𝑡𝑡𝑡−𝑚𝑚𝑚𝑚
return
methods of searching for nearest neighbors: 1) brute historical𝑅𝑅𝑅𝑅𝑡𝑡𝑡𝑡−𝑚𝑚𝑚𝑚
𝑡𝑡𝑡𝑡−1 on𝑃𝑃𝑃𝑃D : −
t H𝑅𝑅𝑅𝑅𝑡𝑡𝑡𝑡−𝑚𝑚𝑚𝑚,𝑡𝑡𝑡𝑡−1 =
− 1.
𝑡𝑡𝑡𝑡−𝑚𝑚𝑚𝑚
𝑃𝑃𝑃𝑃𝑡𝑡𝑡𝑡−𝑚𝑚𝑚𝑚
force – compare distances of all pairs of data points;
2) K-D tree – use tree-based structures to reduce the Table 10 provides an example of our data structure.
calculations of distances; and 3) ball tree – partition data
Table 10: An example of data structure of rolling prediction
in a series of nesting hyper-spheres when constructing
trees. As scikit-learn supports auto method selection
Predicted
Date
Explanatory variables (X)
based on input data, we use this option. Also, we use
variable (y)
the default parameters provided by scikit-learn: 5
ay
n-day
Historical m-day
Historical k-day
nearest neighbors and uniform weights.
Support Vector Machine (SVM):
For regression, SVM [19] finds the classifiers
represented by hyperplanes that separate the different
groups as wide a margin as possible. The hyperplanes
are represented by the normal vector v and the bias
The JBBA | Volume 2 | Issue 2 | October 2019
returns
returns
moving averages
ist
Dt
Pt+n / Pt -1
Pt-1 / Pt-1-m -1
SUM(Pt-k, …, Pt-1)/k
P
Dt+1
Pt+1+n /
P+1t+1 -1
Pt / Pt-m -1
SUM(Pt-k+1, …, Pt)/k
)/
Another problem concerning time series rolling analysis
is time series leakage. More specifically, standing on day
58
𝑅𝑅𝑅𝑅𝑡𝑡𝑡𝑡
jbba
the
𝐷𝐷𝐷𝐷𝑡𝑡𝑡𝑡−1
𝑡𝑡𝑡𝑡−𝑛𝑛𝑛𝑛
0
𝐷𝐷𝐷𝐷𝑡𝑡𝑡𝑡
𝑃𝑃𝑃𝑃𝑡𝑡𝑡𝑡−1
𝑃𝑃𝑃𝑃𝑡𝑡𝑡𝑡−1−𝑛𝑛𝑛𝑛
−
𝐷𝐷𝐷𝐷0
to 65 percent.
4.3 Explanatory variables
5.2 Important information sets for Bitcoin
Table 11 shows the explanatory variables in our
rolling prediction analysis (predicting 30-day returns
for Bitcoin). Based on the preliminary analysis above,
we decide to exclude USD index, gold, and VIX,
due to their relatively low correlations with Bitcoin.
The variables are constructed in the abovementioned
rolling way and standardized using StandardScaler in
scikit-learn, which centers the data with sample mean
and the scales them into unit variance.
In addition, we categorize these variables into eleven
“information sets”. In the later sections, we will
examine the relative importance of each information
set for Bitcoin, in terms of their contribution to the
performance of our machine learning algorithms.
As stated above, to reveal the potentially useful
information sources in predicting Bitcoin prices, we
categorize all variables into 10 information sets: 1)
price returns, 2) price momentum, 3) rolling volatility,
4) volume, 5) S&P 500, 6) Developed equity market,
7) Emerging equity market, 8) commodity, 9) market
capitalization weighted returns of cryptocurrencies
(crypto VW), and 10) the 30-day rolling correlation of
the overall cryptocurrency market (rolling volatility).
𝑡𝑡𝑡𝑡−𝑛𝑛𝑛𝑛
𝐷𝐷𝐷𝐷𝑡𝑡𝑡𝑡−𝑛𝑛𝑛𝑛
𝐷𝐷𝐷𝐷99
𝑋𝑋𝑋𝑋130
𝐷𝐷𝐷𝐷129
𝐷𝐷𝐷𝐷100
0
Dt, though we have access to historical information
(X)
𝐷𝐷𝐷𝐷𝑡𝑡𝑡𝑡−1up to the previous day ( Dt-1 ), but we do not have
𝐷𝐷𝐷𝐷𝑡𝑡𝑡𝑡−1 (y), whose calculation involves
the predicted variable
the close price 𝐷𝐷𝐷𝐷on
𝑡𝑡𝑡𝑡 day (t+n). That said, standing on day
Dt , if we want to train a model𝐷𝐷𝐷𝐷and
𝑡𝑡𝑡𝑡 predict the n-day
𝐷𝐷𝐷𝐷𝑡𝑡𝑡𝑡−𝑛𝑛𝑛𝑛 set can only be constructed
𝐷𝐷𝐷𝐷𝑡𝑡𝑡𝑡−𝑛𝑛𝑛𝑛
𝐷𝐷𝐷𝐷the
0
returns ahead,
train
𝑃𝑃𝑃𝑃𝑡𝑡𝑡𝑡−1
−
𝑅𝑅𝑅𝑅
𝑡𝑡𝑡𝑡−𝑛𝑛𝑛𝑛
𝐷𝐷𝐷𝐷𝑡𝑡𝑡𝑡−1
based
on
data from day D0 to𝐷𝐷𝐷𝐷0Dt-n 𝐷𝐷𝐷𝐷(the
𝑃𝑃𝑃𝑃𝑡𝑡𝑡𝑡−1−𝑛𝑛𝑛𝑛
𝑡𝑡𝑡𝑡−𝑛𝑛𝑛𝑛 predicted
variable for Dt-n𝑅𝑅𝑅𝑅is Rt-n=
= 𝑃𝑃𝑃𝑃𝑡𝑡𝑡𝑡−1 − 1)
𝑅𝑅𝑅𝑅1000
𝐷𝐷𝐷𝐷𝑡𝑡𝑡𝑡𝑃𝑃𝑃𝑃
𝐷𝐷𝐷𝐷0
𝑡𝑡𝑡𝑡−1−𝑛𝑛𝑛𝑛
𝐷𝐷𝐷𝐷𝑡𝑡𝑡𝑡−𝑛𝑛𝑛𝑛
𝐷𝐷𝐷𝐷𝑡𝑡𝑡𝑡−𝑛𝑛𝑛𝑛
𝐷𝐷𝐷𝐷𝑡𝑡𝑡𝑡−𝑛𝑛𝑛𝑛
𝑃𝑃𝑃𝑃𝑡𝑡𝑡𝑡−1
𝐷𝐷𝐷𝐷
Finally, we
our
− rolling method with a specific
𝑅𝑅𝑅𝑅𝑡𝑡𝑡𝑡−𝑛𝑛𝑛𝑛repeat
𝑃𝑃𝑃𝑃𝑡𝑡𝑡𝑡−1−𝑛𝑛𝑛𝑛
example. Suppose we have constructed a time series Figure 11: Predicted price vs. Real BTC price (predicting 30-day returns)
data set of 1,000 days: the y is a series of 30-day returns
𝑃𝑃𝑃𝑃128
𝐷𝐷𝐷𝐷99is a matrix of size 1,000𝐷𝐷𝐷𝐷by
𝑅𝑅𝑅𝑅99(20 explanatory
−
𝐷𝐷𝐷𝐷
and
0 X
99 20
𝑃𝑃𝑃𝑃98
𝑃𝑃𝑃𝑃159prediction
variables). We want to experiment 𝑅𝑅𝑅𝑅a130
rolling
−
𝑃𝑃𝑃𝑃129
of 𝑋𝑋𝑋𝑋30-day returns. We set the minimum train
set size
𝑃𝑃𝑃𝑃
130
𝐷𝐷𝐷𝐷99 𝑅𝑅𝑅𝑅99 128 −
𝐷𝐷𝐷𝐷0train𝐷𝐷𝐷𝐷a99model based on the data𝑃𝑃𝑃𝑃 from
as 100.𝐷𝐷𝐷𝐷129
First, we
𝑃𝑃𝑃𝑃98
128
𝐷𝐷𝐷𝐷
𝐷𝐷𝐷𝐷
𝑅𝑅𝑅𝑅
=
−
1;
𝐷𝐷𝐷𝐷
predicted variable for D9999is R99
= 𝑃𝑃𝑃𝑃98
D00 𝑃𝑃𝑃𝑃to
𝑃𝑃𝑃𝑃159
𝐷𝐷𝐷𝐷D99 0(the 99
𝐷𝐷𝐷𝐷
99
128 100
𝑃𝑃𝑃𝑃159
𝑅𝑅𝑅𝑅130
−
𝐷𝐷𝐷𝐷99 𝑅𝑅𝑅𝑅99 𝑃𝑃𝑃𝑃 − 1
𝑅𝑅𝑅𝑅1000 model to predict𝑅𝑅𝑅𝑅130
−1
; then
the R𝑃𝑃𝑃𝑃130
=
𝑃𝑃𝑃𝑃129
98 we use the trained
129
𝑃𝑃𝑃𝑃159
𝑅𝑅𝑅𝑅130 =
− 1 based
𝑋𝑋𝑋𝑋130
X130 (a 1 by 20 row vector) which
𝑋𝑋𝑋𝑋130 on
𝑃𝑃𝑃𝑃129
𝐷𝐷𝐷𝐷129
ins
informatio
contains
information
up
to day D129. Next, we expand
𝐷𝐷𝐷𝐷
129
𝐷𝐷𝐷𝐷100
0 to
Figure 12: Predicted price vs. Real BTC price (predicting 30-day returns)
the train𝐷𝐷𝐷𝐷set
include
data
𝐷𝐷𝐷𝐷0 𝐷𝐷𝐷𝐷100𝑅𝑅𝑅𝑅 from D0 to D100 and repeat Notes:
This figure shows results from Jan 2017 to Feb 2018 for the top 3
the training and prediction.1000
The analysis
is
rolled
until
𝑅𝑅𝑅𝑅1000
algorithms (in terms of accuracy).
we get R1000.
5. Model Results
5.1 Rolling prediction analysis (30-days) for Bitcoin
We recalculate predicted prices based on predicted
30-day returns, as is shown in Figure 11. As the illperformance of Multi-layer perceptron during the
second half of 2017 leads to poor readability, we
present results of the top 3 algorithms (in terms of
accuracy) from Jan 2017 to Jan 2018 in Figure 12.
Obviously, none of them successfully forecasted
the big price crash in Jan 2018. On the other hand,
Figure 13 and Figure 14 show the accuracy and
RMSE, respectively, both of which are calculated in a
cumulative way (expanding the data by one prediction
for each time). As the number of predictions increases,
accuracy of all algorithms stabilizes in the range of 50
The JBBA | Volume 2 | Issue 2 | October 2019
We first run the rolling prediction analysis with all
information sets as input, and next, we repeat the
analysis for 10 times by removing one information
set each time. The “relative importance” of each
information set is measured as the difference between
the accuracies with and without the corresponding
information set as input. That is, a positive difference
indicates positive contribution of the information set
and negative difference implies the opposite.
Figure 15 shows the heatmap presenting the relative9
importance of each information set for each algorithm.
Overall speaking, none of the information sets has
significant impact on any algorithms, as the relative
importance fall in the range between -0.05 and 0.05.
However, a closer inspection would reveal that, on
average, rolling volatility (past 15 days and 30 days)
and correlation among cryptocurrency market (past 30
days) are useful information for most algorithms, while
the market capitalization weighted historical returns
(15-day and 30-day) and emerging equity market are
the least beneficial.
59
jbba
the
Table 11: Explanatory variables
Variable name
Definition
Information set
1
Price_ret10
Historical 10-day price returns
Historical price returns
2
Price_ret30
Historical 30-day price returns
3
Price_momentum_MA10
The ratio of price to 10-day moving average minus 1
4
Price_momentum_MA30
The ratio of price to 30-day moving average minus 1
5
Volume_momentum_MA10
The ratio of trade volume to 10-day moving average minus 1
6
Volume_momentum_MA30
The ratio of trade volume to 30-day moving average minus 1
7
Price_volatility15
The standard deviation of the daily price returns over the past 15
days
8
Price_volatility30
The standard deviation of the daily price returns over the past 30
days
9
SP500_ret15
S&P500 historical 15-day price returns
10
SP500_momentum_MA15
The ratio of price to 15-day moving average of S&P500 minus 1
11
Developed_ret15
MSCI developed equity market historical 15-day price returns
12
Developed_momentum_M
A15
The ratio of price to 15-day moving average of MSCI developed
equity market minus 1
13
Emerging_ret15
MSCI developing equity market historical 15-day price returns
14
Emerging_momentum_MA
15
The ratio of price to 15-day moving average of MSCI developing
equity market minus 1
15
Commodity_ret15
Bloomberg Commodity Index historical 15-day price returns
16
Commodity_momentum_M
A15
The ratio of price to 15-day moving average of Bloomberg
Commodity Index minus 1
17
VW_returns10
10-day market-cap weighted returns 57 cryptocurrencies *
18
VW_returns30
30-day market-cap weighted returns 57 cryptocurrencies *
19
PC1 **
The first principal component of PCA on x-day returns of 57
cryptocurrencies *
20
PC2 **
The second principal component of PCA on x-day returns of 57
cryptocurrencies *
21
Crypto_corr30
The average correlation between the predicted coin and other
cryptocurrencies over the past 30 days
Price momentum
Volume Momentum
Rolling volatility
S&P 500
Developed equity market
Emerging equity market
Commodity
Market capitalization weighted returns of
cryptocurrencies
Principal components of cryptocurrencies
Rolling correlation of the overall cryptocurrency
market
Notes:
1.
* All the “57 cryptocurrencies” above means the 57 cryptocurrencies which have full data back to January 1, 2015.
** The PCA is conducted in a rolling base.
5.3 Rolling prediction analysis for other
Cryptocurrencies
We also examine the analysis for the 57 cryptocurrencies
with available data back to January 1, 2015. Many
cryptocurrencies are slightly predictable if the
algorithms with the highest accuracies are chosen.
Bitcoin yields the highest best accuracy as displayed in
Fig. 14 below. Another finding is that higher prediction
accuracy is associated with larger market capitalization
and lower volatility. But we also see that higher
predictability is accompanied by larger dispersion
among different algorithms.
Figure 14: Summary of rolling prediction results (predicting 30-day
returns)
Figure 13: Relative importance of different information sets on
predicting 30-day Bitcoin returns
The JBBA | Volume 2 | Issue 2 | October 2019
60
jbba
the
Notes:
1.
2.
3.
4.
The volatility is calculated by annualizing the daily volatility over
the sample period (Jan 1, 2015 - Feb 18, 2018). We limit the
range of x-axis to be [0, 6] for the purpose of readability, and as
result 8 cryptocurrencies are removed from the figure.
The highest accuracy: we run 11 algorithms for each
cryptocurrency and pick the one with highest accuracy.
The size of dots is based on the market capitalization of each
cryptocurrency, i.e., Bitcoin is the largest.
The color of dots is based on the standard deviations of
accuracies generated by 12 algorithms (algo dispersion).
Fig. 15 presents a performance summary of the 12
algorithms. LASSO dominates in predicting the 30day returns of cryptocurrencies. And one average, all
algorithms generate accuracies in the range of 50 to 60
percent, which is above random guess but still far from
accurate prediction.
higher volatility. Some care should be taken given the
many moving parts across the cryptocurrency industry.
The complexity will lead to possible risks of overfitting
machine learning algorithms.
References:
[1] I. Madan, S. Saluja, and A. Zhao, “Automated bitcoin
trading via machine learning algorithms,” URL: http://cs229.
stanford. edu/proj2014/Isaac% 20Madan, vol. 20, 2015.
[2] A. Greaves and B. Au, “Using the bitcoin transaction
graph to predict the price of bitcoin,” No Data, 2015.
[3] S. McNally, J. Roche, and S. Caton, “Predicting the price
of Bitcoin using Machine Learning,” in 2018 26th Euromicro
International Conference on Parallel, Distributed and Networkbased Processing (PDP), 2018, pp. 339–343.
[4] Z. El-Abdelouarti Alouaret, “Comparative study of vector
autoregression and recurrent neural network applied to bitcoin
forecasting,” PhD Thesis, ETSI_Informatica, 2017.
[5] F. Mai, Q. Bai, J. Shan, X. S. Wang, and R. H. Chiang,
“The impacts of social media on Bitcoin performance,” 2015.
Figure 15: Summary of algorithm performance (predicting 30-day
returns)
Notes:
1. The frequency is the times an algorithm performs the best
among the 11 algorithms plus random guess.
2. The mean accuracy is calculated by averaging the accuracies
when the corresponding algorithm performs the best.
6. Conclusion
Cryptocurrencies have captured the attention of many
investors across the spectrum from retail to institutional
- see Liew and Hewlett [14]. In this work we extend our
understanding of the behavior of cryptocurrencies.
We document several interesting findings. First off,
we find that PCA reveals that the return generating
process is much more complex than that for stock
returns. Generally speaking, the financial community
agrees that the “market” is the first dominant PCA
in stock returns. However, for cryptocurrencies daily
returns reveals that in some period there exists a single
dominant component however, in the most recent prior
year there appears to be two components that help
explain the variation of the cryptocurrency returns.
Next, we document a strong beta-in-the-tails hidden
risk associated with Bitcoin daily returns. Similar to
hedge fund cryptocurrencies may have some unstable
tail behaviors.
Our analysis of machine learning algorithms
applied to the data from cryptocurrencies hints that
predictability may be difficult and there are many
heterogeneous effects here. Some information sets
perform better with some family of algorithms, and
larger cryptocurrencies with lower volatility maybe
more predictable than smaller cryptocurrency with
The JBBA | Volume 2 | Issue 2 | October 2019
[6] E. Stenqvist and J. Lönnö, Predicting Bitcoin price
fluctuation with Twitter sentiment analysis. 2017.
[7] Y. B. Kim, J. Lee, N. Park, J. Choo, J.-H. Kim, and C. H.
Kim, “When Bitcoin encounters information in an online forum:
Using text mining to analyse user opinions and predict value
fluctuation,” PloS one, vol. 12, no. 5, p. e0177630, 2017.
[8] J. Kaminski, “Nowcasting the bitcoin market with twitter
signals,” arXiv preprint arXiv:1406.7577, 2014.
[9] J. Chu, S. Nadarajah, and S. Chan, “Statistical analysis
of the exchange rate of bitcoin,” PloS one, vol. 10, no. 7, p.
e0133678, 2015.
[10] M. Balcilar, E. Bouri, R. Gupta, and D. Roubaud, “Can
volume predict Bitcoin returns and volatility? A quantiles-based
approach,” Economic Modelling, vol. 64, pp. 74–81, 2017.
[11] N. Indera, I. Yassin, A. Zabidi, and Z. Rizman, “Nonlinear autoregressive with exogeneous input (NARX) Bitcoin
price prediction model using PSO-optimized parameters and
moving average technical indicators,” Journal of Fundamental
and Applied Sciences, vol. 9, no. 3S, pp. 791–808, 2017.
[12] I. Georgoula, D. Pournarakis, C. Bilanakos, D.
Sotiropoulos, and G. M. Giaglis, “Using time-series and
sentiment analysis to detect the determinants of bitcoin prices,”
Available at SSRN 2607167, 2015.
[13] D. Garcia and F. Schweitzer, “Social signals and
algorithmic trading of Bitcoin,” Royal Society open science, vol.
2, no. 9, p. 150288, 2015.
61
jbba
the
[14] J. K.-S. Liew and L. Hewlett, “The case for Bitcoin
for institutional investors: Bubble investing or fundamentally
sound?,” Available at SSRN 3082808, 2017.
[15] F. R. Edwards and M. O. Caglayan, “Hedge fund
performance and manager skill,” Journal of Futures Markets:
Futures, Options, and Other Derivative Products, vol. 21, no.
11, pp. 1003–1028, 2001.
[16] J. Liew, “Hedge fund index investing examined,” Journal
of Portfolio Management, vol. 29, no. 2, p. 113, 2003.
[17] W. F. Sharpe, “Capital asset prices: A theory of market
equilibrium under conditions of risk,” The journal of finance,
vol. 19, no. 3, pp. 425–442, 1964.
[18] J. Lintner, “The valuation of risk assets and the selection
of risky investments in stock portfolios and capital budgets: A
reply,” The review of economics and statistics, pp. 222–224,
1969.
[19] F. Pedregosa et al., “Scikit-learn: Machine Learning in
Python,” Journal of Machine Learning Research, vol. 12, pp.
2825–2830, 2011.
i
The data of Ethereum provided by coinmarketcap.
com starts on Aug 7, 2015.
ii
The average history is calculated using the data for
only 2015 to 2017, thus it is not the exact length
of average history. But as most of the top 100
cryptocurrencies came into being after 2015, this
calculation approximates the real length of average
history.
iii
For horizontal axis, cryptocurrencies are ranked by
market capitalizations from the right (large) to the left
(small). For vertical axis, they are ranked by market
capitalizations from the top (large) to the bottom
(small).
Accessed on Mar 14, 2018: https://www.cnbc.
com/2017/11/27/bitcoin-exchange-coinbase-hasmore-users-than-stock-brokerage-schwab.html
iv
Competing Interests:
None declared.
Ethical approval:
Not applicable.
Author’s contribution:
JL1, RL2, TB2, and AS3 designed and coordinated this research and
prepared the manuscript in entirety.
Funding:
None declared.
Acknowledgements:
None declared.
The JBBA | Volume 2 | Issue 2 | October 2019
62
jbba
the
The JBBA | Volume 2 | Issue 2 | October 2019
63
jbba
the
Peer-reviewed Research
Blockchain Investigations:
Beyond the ‘Money’
OPEN ACCESS
ISSN Print: 2516-3949
https://doi.org/10.31585/jbba-2-2-(6)2019
Simon F. Dyson
NHS Digital, Leeds, U.K
Correspondence: simon.dyson@protonmail.com
Received: 18 July 2019 Accepted: 7 August 2019 Published: 13 August 2019
Abstract
Cryptocurrency investigations have centered almost entirely around the transfer of value “money” or a
cryptocurrency asset. The use of cryptocurrency for illicit purposes, especially Bitcoin, is well documented
both in academic writing, media reporting and even film documentaries. The infamous SilkRoad marketplace
in addition to the millions of dollars spent within dark markets on drugs, guns and assassinations have
grabbed the headlines. This paper looks at how blockchain is creating new areas of investigation that are yet
to be explored in detail. This scenario-based research examines the hosting of stolen data (P.I.I) personal
identifiable information on a distributed blockchain host where the data is also accessible. The platform used
is based on Ethereum infrastructure but demonstrates just one available platform that poses the paradigm.
The paper examines the considerations through the lens of an incident responder /cyber investigator,
forensics examiner and data controller. The scenario highlights distinct differences in considerations from a
traditional response compared to dealing with the immutable and unstoppable distributed technology. The
paper concludes that more is needed to be done to understand digital forensics in the blockchain era and
the need to develop beyond track and trace in the cryptocurrency investigative toolbox. The discussion also
brings forth how data retention and GDPR requires consideration when applying it blockchain systems.
Keywords: Blockchain, Distributed-hosting, Distributed-storage, Ethereum, Swarm, Forensics
1. Introduction
Research into cryptocurrency has focused generally
on the transfer of value. The use of cryptocurrency
in large scale criminal activities is well documented in
cases such as the Silk Road drugs marketplace or in large
ransomware campaigns such as Wanacry. The focus
has been on the “follow the money” aspect in order
to locate the perpetrators. The underlying technologies
have however developed since the inception of Bitcoin
in 2008. Blockchain technology is now scaling and
developing new features now able to support multiple
data and communication protocols across its stack.
Law enforcements focus has remained around the large
cryptocurrencies however the use of smart contract
technology and now distributed computing and
storage creates a new set of problems for investigators
and those responding to incidents. This paper sets out
a common leak of personally identifiable information
(P.I.I) where it is hosted on blockchain technology and
how the traditional responses are required to adapt.
The scenario uses Ethereum and its related technology
to host files. There are a number of cryptocurrency/
blockchain assets that can host the data in a similar
The JBBA | Volume 2 | Issue 2 | October 2019
nature. A distributed blockchain by its design contains
properties that are not inherent in traditional hosting
services. A blockchain is immutable in general terms
so they are unstoppable and have no central authority
or body.
2. Scenario and Roles
The scenario is to replicate the discovery of files taken
containing (P.I.I) personally identifiable information
from a server and hosted externally. The hosting,
however, will take place on a distributed blockchain
system. In order to establish if the PII information is
legitimate, a comparison will need to take place, this
will entail a visual comparison of the data. A forensic
comparison of the data will need to be conducted
using traditional methods to hash the file contents and
examine EXIF data contained within the file. Cyber
investigators searching for online hosted material will
examine records of web hosting companies to see the
I.P data for the hosting company and registrar details
such as WHOIS information. Data controllers hold the
responsibility for the holding storage and protection
of the data. The data controller will need to make
65
jbba
the
decisions about steps that are possible to minimise
the damage. Each role will respond using traditional
methods and record the findings. A discussion section
will reflect on the approaches and highlight quick wins
and areas that require further work.
2.1. Cyber Investigator / Incident Response
This role will respond to initial reports and record
and utilise OSINT Open Source Intelligence sources
to discover evidential information to assist the
investigation. The coordination of tasks to systems
administration for internal log investigation and other
closed source materials will be conducted.
2.2. Digital Forensics
Examination of digital material will be conducted by
the digital forensics team member. This will include
host forensics and also comparison of highlighted
online material where required. They will take a forensic
analytical approach in order to approach the problem.
2.3. Data Controller
As the responsible owner of the data, the controller
will be consulted on the state of the investigation.
The controller will establish additional tasks that
would assist to protect the data or prevent further
dissemination.
of automated decision making and profiling. The right
to erasure is one of the more complex and powerful
rights that is created in the new act. This right caused
many to question the ability of blockchain to function
under such a regime. The conflict of immutability as
an absolute property of blockchain in comparison to
the legal requirement to deletion of GDPR is cited as
pushing solutions to standard databases[1]. There are
other potential ways forward such as gaining consent
for perpetual processing. It is argued that address
hashing is pseudonymous and that the effort to deobfuscate a hash is disproportionate so would stand as
it would not likely identify an individual. Permissioned
blockchains are also suggested in order to control the
data but they don’t fit the public and permissionless
systems of large cryptocurrency structures. There are
also systems using new encryption methods such as
zkSNARKS and RingCT methods that could protect
data throughout the complete process [2]. Tokenised
solutions are appealing although they may require offchain processing but the use of distributed storage is
possible through Ethereum – SWARM or IPFS[3]. The
use of a smart contract with an upgradable contract
section could allow amendable content but record
the transaction metadata and deletion process[4].
Implemented correctly the ability to control and make
accountable sharing structures with blockchain could
strengthen systems to comply with GDPR.
4. Decentralised Blockchain Storage
3. (GDPR) General Data Protection Regulation
In May 2018, the General Data Protection Regulations
came into effect and incorporated existing legislation
to protect people’s data and their rights. GDPR is
covered in depth in numerous resources so in this
section a focus on some key themes that will be later
visited will be briefly documented. GDPR covers data
that belongs to people who are in the GDPR aligned
nations, Europe and some additional territories. The
rules outlined cover those entities that are considered
a data controller or processor. A controller is the entity
that holds the data for purpose, and they will process
for their agreed business requirements. A processor is
considered a third party that is doing something with
the data on behalf of the controller, an agreement
will define what that process is. GDPR defines that
personal data can generally identify somebody or be
used for that purpose and it offers protection to that
data. There are also additional protections to sensitive
personal data that protects special characteristics. The
term PII (Personal Identifiable Information) is not
defined by GDPR but is commonly used and will
be covered as personal data under GDPR and this
scenario. There are 8 individual rights that are listed
under the new act. These rights are; the right to be
informed, the right of access, the right of rectification,
the right to erasure, the right to restrict processing, the
right to data portability, the right to object and rights
The JBBA | Volume 2 | Issue 2 | October 2019
Decentralised networks have been utilised for
numerous cryptocurrency projects with the ability to
trade tokenised value they have become used for a
new wave of “Digital money”. Blockchain technology
itself has evolved behind the headlines of boom and
bust price fluctuations and Silk Road drug dealing dark
markets. The introduction of Smart Contracts utilised
by Ethereum and now other blockchain technologies
allows Turin complete languages and sections of code
to produce complex computational outputs. Using
resources on Ethereum for example is expensive if you
process through the Ethereum Virtual Machine (EVM)
the world computer, each byte and code execution has a
price to pay using “gas”. Utilising “gas” small amounts
of the currency this ensures that the “halting problem”
is addressed and a denial of service attack or forever loop
will be too expensive to conduct. There are however a
number of blockchain projects that are looking to use
an additional protocol or system to provide blockchain
storage using peer to peer nodes incentivised to
the system. The creation of a decentralised storage
system solves a number of computing problems, it
creates resilience as files are striped across multiple
nodes in a system. The ability to reside on multiple
nodes reduces single points of failure or risk from
physical events such as earthquake, tsunami or power
outages. A decentralised system uses nodes in the
control of world users who are incentivised to “mine”
66
jbba
the
or provide a service similar to miners and Bitcoin
nodes. Services such as Dropbox operate a storage
system that allows a cloud storage system however the
service is a centralised under one organisation. The
company is subject to US law, so privacy therefore
is not guaranteed as the ability to access, subpoena,
court order and secret service oversight. Nodes in a
decentralised generally hold only partial fragments of
the file so physical integrity is maintained as the file
portion is fragmented and optionally encrypted. There
are a number of decentralised file storage systems
namely, IPFS (Inter Planetary File System) developed
by Protocol labs this part of the system allows for
distributed storage, Filecoin [5] is an additional service
to incentivise storage by paying miners to store. IPFS
as a protocol is used by a number of other projects
and is cross blockchain agnostic [6]–[8]. In addition to
the above there are other distributed storage projects
in various phases of production these include Storj,
Sia and Maidsafe [9]–[11]. Ethereum has its own sub
project called “Swarm” this will be explored in the next
section.
5. Ethereum Swarm
Swarm was designed to create a system to store
dapp (Decentralised Application) code, resources
on a peer2peer system. The ability to access material
outside of the Ethereum chain reduces the cost of
storing larger files or code in a smart contract off chain
where it is cheaper to store. Dapps by their nature
are applications that are not a singular stored item,
therefore the use of larger code sets and files to produce
more complex and visually focused items require more
storage. The ability to access resource from the Swarm
protocol layer allows this exchange maintaining a fully
decentralised eco-system. The system will maintain the
properties of a truly decentralised system transaction
layer on chain and storage another chain. This makes
it non-censorable, fully redundant / resilient, DDOS
resistant, highly available and secured by encrypted
cryptographic signatures. Ethereum integration is
used with a Swarm node and a Geth node, Geth is a
“GO” programming language implementation version
of Ethereum. This scenario will utilise both Ethereum
Geth and Swarm working on the Ropsten test net,
the closest to the production service. Ropsten allows
integration with the services as if it was connected to
the Mainnet where the technology is already live, with
the advantage of not costing real Ethereum and “gas”
to test and operate. Geth version (1.8.20-stable) and
Swarm version (0.3.-stable) [12], [13].
6. Blockchain Domain Naming
The (DNS) Domain Name System is used to assist with
searching the internet, it translates a human readable
(URL) Uniform Resource Locator into the relevant
Internet Protocol Address (I.P). This directs a query
The JBBA | Volume 2 | Issue 2 | October 2019
such as www.a_web_address.com to the root servers to
the (TLD) Top Level Domain and to the domains name
server that holds the record of the I.P address example
8.8.8.8. The ability to store domain naming information
on a blockchain has existed for some time with services
such as Namecoin offering various services including
a name resolution stored on blockchain. The criminal
use of decentralised DNS services does exist but is
not extensively used [14], [15], [16]. The discovery of
a recent botnet that was discovered to be cleaning up
bad botnets was observed in the wild using Emercoin’s
distributed DNS implementation [17].
The (ENS) Ethereum Naming Service provides similar
functions to a DNS system and is held and operated
over the Ethereum blockchain [18].
7. Method
In order to replicate an intrusion event a number
of files with identifiable meta-data will be created
and hosted on a virtual machine. A base forensic
examination will be completed to display (Modified,
Access, Created) MAC date and times, Meta data that
may also include geo-data serial number or other EXIF
data. The scenario host is a machine running Windows
7, the host contains a folder on the desktop entitled
“Work_items” containing related documents. The
documents include an image of a passport that is used
for identification of the customer in this scenario and
contains PII information. In addition to the image are
further documents including an XLS and CSV files,
this contains customer details including PII data.
Scenario – a message is received by phone that a leak
of company information has occurred, and a website
URL is provided.
7.1. Investigation phase
7.1.1. Cyber investigator / Incident response
The cyber investigator is initially passed information
provided by a telephone call that states the web URL
hosting the company’s potentially stolen information.
The URL is placed into a browser on a standalone
environment to ensure the reported event is not a social
engineering ruse and to protect the main corporate
network from malicious activity. Initial activity will
ensure the link is live and that the data appears to be
present, accurate recording of event will take place
including a screen capture of the page. A capture of
the page and the source code alongside an abstraction
of pertinent files will be completed for further analysis.
Data will be needed to be compared to corporate data to
ensure the attack is a legitimate attack and is not a hoax.
OSINT Open source intelligence will reveal additional
information about the web hosted material. The source
code may reveal hosting details or frameworks used
to create the site, these may include author and other
67
jbba
the
meta data of interest to the cyber investigator. Source
code can also reveal other links hosted on other sites or
resources that may allow additional investigative leads.
As discussed in Open source intelligence techniques by
Michael Bazzell there are numerous services that assist
in the location of a website these include some of the
following important areas [19]:
•
•
•
•
•
•
•
•
•
•
•
•
•
Protocol
Website name and top-level domain
information
I.P address
Whois
Registration data
e-mail addressing
The hosting company (Server hosting)
Domain hosting (Name holder)
DNS zone tranfers
Registrar change history
Ad-sense / analytical tokens – numbers
Robots.txt
Shodan
7.1.2. Digital Forensics
Following information from the original call the
forensic response team will react to the main areas
of data storage. The firewalls and server logs will be
checked for intrusion or indicatiors of compromise.
The data storage servers will be examined, and a
RAM dump will be executed on each device. This will
capture processes, network connections and master file
table entries that will enable initial triage to identify any
breach information. Identification of the information
can take place by using methods such as hashing
values and searches for names or data from the leaked
source to discover if the information is owned by the
company.
The order of volatility is Processor, Network, Main
Memory, Semi-volatile, Resident data, Remotely logged
and any data on archival media [20]
In this scenario, live data should be considered before
a raw dump, if the memory dump crashes then the
machines critical live data could be lost. A memory
dump should be obtained and analysed the machine
can be shut down and retained for a full forensic image
if required.
The forensic response to an incident would record
the process using contemporaneous notes and
photographs.
Examine with the visual inspection of a machine and
examination of live desktop activity
•
Live data – command line – time & date,
network connections (netstat), current user,
tasklist
•
Memory RAM capture – full, Dumpit.exe
•
Any operational/incident specific
investigation tasks.
•
Power down machine when examination
The JBBA | Volume 2 | Issue 2 | October 2019
complete retain for full disk imaging.
7.2.
7.2.1.
Operational Phase
Data Controller
The General Data Protection Regulation GDPR
introduced in 2018 enforces businesses and those who
control data to protect the rights of the citizens whose
data is held. Each European country or participating
country must introduce a body to monitor and
administrate enforcement of fines and breaches of the
code. In the U.K the ICO (Information Commissioners
Office) hold this position, they provide guidance,
advice and are the primary contact if a breach occurs.
GDPR requires a company that is aware of a breach of
personal data to report to the supervisory authority in
the U.K to the I.C.O within 72 hours of been aware that
a breach has occurred. Where it is likely that a breach
will affect the rights and freedoms of the individuals on
who the data relates then they must also be informed
“without undue delay” [21]. The principles that are
to be considered around data are the security triad of
Confidentiality, Integrity and Availability. The rights of
the data subject are to be considered and notification
made if the breach is likely an adverse effect on the
data subject. An example would be where full personal
data and financial data are lost these are likely to incur
subsequent fraud offences using the identities of the
data subject [22].
GDPR therefore requires all companies that process
data in the EU or about people in the EU to have
policies and procedures to detect, investigate and
report on incidents with accuracy.
GDPR has a number of requirements in relation to
information to be provided to the supervisory body
in response to a breach. The below section details the
requirements and these points will be addressed in the
breach investigation plan for the data controller.
•
•
•
Description of the personal data (data
categories, number of individuals, number of
records)
An assessment on potential consequences
following the breach
Following the breach what measures have
been or will be taken in order to mitigate risk
and harm following the breach. (ICO GDPR
breach guidance [23]).
It is obvious from the above requirements that a
response from the cyber investigators / digital forensic
team is essential in providing timely and accurate
reporting to ensure the data controller can make
informed decisions on the subject.
68
jbba
the
8. Initial Response
The scenario starts with a report of information
reported into the Cyber security team. This was initially
reported as a URL and the action will start by the teams
who will perform incident response according to their
response plans. The URL was reported as:
https://swar m-gateways.net/
bzz:/9eaab00f3eb97cfc731ae095 8aa2c9f249a2cd0045
dae7bec659e736c920112a/
Figure 2. Shodan results from the OSINT scan
9.3. Forensic Findings
9. Findings
9.1. Cyber Findings
Initial actions resulted in the preservation of the online
material and the capture of HTML information of the
files hosted on the site. The site contained three items
of interest an image of a passport and two data files
for download. The nature of the message on the site
suggested an insider threat this requires further internal
work to attribute.
The image was reverse searched to see if the image
was hosted elsewhere on the web, this was to establish
if this was disseminated elsewhere or if it was a hoax
using another source. The EXIF data was examined
from the passport photo, this provided metadata that
included time dates, make, model, image composition
and crucially geo location, see Fig 1. This established
the passport image was taken in a popular café used
by the sales team to on-board new customers close
to company premises. This provided metadata that
allowed attribution in this circumstance in the scenario
set out.
The files recovered in the discovery phase were
provided for forensic analysis. The items were hashed,
and the metadata examined. This information enabled
identification of the company database server where
the data was likely to be stored. The forensic actions
as previously described were enacted capturing live,
ram and forensic level data. The company server was
examined, and activity was discovered around the
folder of interest using Volatility. Artefacts were found
in the MFTPARSER and SHELLBAGS modules
that allowed activity from MAC (Modified Accessed5
Created) times to create a timeline of suspect activity.
In addition, access to the registry keys through the
Volatility modules allowed the USBSTOR to show
activity in the timeframe, giving make model and
GUID for the suspect USB. Table 1 shows the hashing
data and the matches.
Table 1. Shows the hash detail and if the hashing matched from the
blockchain storage and the host system
10. Data controller – next steps
Figure 1. EXIF data from the passport image
9.2. OSINT – Findings
The domain was subject to a reverse look up,
WHOIS search, and it revealed a hosted service. The
information was shown to a Windows Azure instance
based in the Netherlands. The domain registrar shows
a named contact with addressing. The I.P address was
established with versioning and port numbers on a
Shodan scan that revealed web ports 443 and 80 were
the only active services see Fig 2.
The JBBA | Volume 2 | Issue 2 | October 2019
In this section discussed is considerations of the data
controller for the blockchain element and not the
general actions of the controller, the data is personal
and a referral to the ICO is required in the time frames
set. The current actions would now look to reduce the
spread of stolen data. Legal action against the hosting
company or a complaint procedure to the hosting
services would be sought. A powerful tool for removal
of data is the Subject Access Request procedure where
a data subject has rights under GDPR for enforcement.
Legal proceedings are complex and civil claims can
potentially disrupt or force servers to shutdown such
services as detailed between PML vs unknown [24].
This shows the complexity and interactions that a
hosting company can be pursued to reduce the impact
and required to remove content under national and
international law.
11. Initial conclusion standard response
The conclusion established from the above investigation
at this stage are mixed. The captures have been
69
jbba
the
performed to an adequate standard but there are some
items that confuse the investigation. The domain and
services discovered in the phase point to the “swarm
gateway” a service allowing a pass through of web
traffic to the Ethereum network. The Microsoft Azure
server hosted in The Netherlands and the registrar
name highlighted is a project lead on the Swarm
service. The registrar and the WHOIS information all
resolve to an unrelated subject not the true location
of the data, just the portal to find it. It is important
to relay that there is no information hosted on the
server it is a HTTP/S proxy API that allows access to
the Swarm network. There are other gateways such as
https://ensgateway.com/ and IPFS specific gateways.
What legal action can be taken against a portal that
contains no data but provides access. Similar to that of
a tor gateway or node allowing access to a darkmarket.
The forensic investigation however demonstrates
that the files and data hosted on the Swarm system
are not altered and retain important meta-data. The
comparison shows that the integrity of the file is
retained and the hashing value and EXIF data is
retained when recovering from the Swarm network this
confirms attribution for the company.
The investigation can conclude that the personal
information has been taken from the company and
this has been conducted by an individual with authority
to access the service. The attack was conducted by
exfiltrating data and removing it on a USB device
this is a classic insider attack. The file is hosted on an
unstoppable blockchain where no legal avenue exists to
remove or request a cease and desist.
human readable name, name-hash, account or content
to a resolver. There is a public resolver frequently used
however custom resolvers are possible to create and
likely to be adopted in some Dapps or other services.
A name hash is used to represent the human readable
name and is combination of cumulative hashing of
domain and naming using Keccak hashing [18]. Fig 3
shows a walkthrough of the process.
In the example of the scenario the content hash was
created by Swarm ‘9eaab00f3eb97cfc731ae0958aa2c
9f249a2cd0045dae7b ec659e736c920112a” this hash
was used to search the Swarm node to retrieve the full
content. The Swarm hash is created using a chunk hash
function with a merkle tree, this is currently formulated
Figure 3. A breakdown of the ENS and the different elements involved
in name resolution
using a 32 byte Keccak(256)SHA3. It is possible to
create a hash of just a file or similarly in this case a
folder with linked resources and files. In the meta-data
for the html file the linked images are referenced as the
hash and file Fig 4.
12. Blockchain investigations
The Swarm decentralised system operates using the
URL scheme identifier as “BZZ:” the location of the
file is designated by a Swarm hash or an ENS assigned
domain such as “photoalbum.eth”.
In the example, the ENS domain is assigned as
“Unstoppable.eth” - Ropsten testnet and this resolves
the content of the stolen items as examined previously
to the swarm hash.
There are a number of components that work to
resolve the addressing. At high-level an Ethereum
registry that tracks the domains and sub-domains
on the network. There are additional registrars that
are involved in the hosting and reselling activities of
ENS names. The Ethereum Naming Service is used
to bid and retrieve a human readable address such as
“Unstoppable.eth” and this is done using an Ethereum
account. On successful allocation of the bid the name
is under the control of the account and using Smart
contract calls can be accessed and communicated
with to set the requirements in the contract. The
ENS record requires a resolver assigned that links the
The JBBA | Volume 2 | Issue 2 | October 2019
Figure 4. Web link that shows the Swarm hash in the HTML link data
from the page
In Fig 5 displayed is a resolved address through the
ENS service linking to the swarm hash in this case
“photoalbum.eth”. To discover the hash the ENS
address is resolved to an account the contract held
on the account can be searched for the “setContent”
function as shown in Fig 6.
Figure 5. Web link that shows an ENS address in the HTML link from
the page
Figure 6. Method setContent function applying the hash to the node
address
ENS names can also be applied to accounts so
unstoppable.eth can applied to an Ethereum account /
wallet and be used instead of the long account address.
70
jbba
the
Fig 7 shows the name, resolver and account details
assigned and revealed with in an ENS search within
myetherwallet.com (Ropsten).
Figure 7. ENS reverse lookup that shows the Name and additional
bidding and resolved address
13. Discussion
Figure 7. ENS reverse lookup that shows the Name
and additional bidding and resolved address
The ability to host decentralised resources and store
material that would be traditionally held on centralised
services changes some of the traditional methods
of search. This scenario has demonstrated how
material can persist beyond the normal experience
of investigators creating an unstoppable hosting
problem. The practical element demonstrated the
use of the Ethereum network, just one of the
technologies available to perform distributed storage.
The ENS Ethereum Naming Service also provides
the ability to link to TLD domains such as .xyz and
.luxe. It is understood that the DNSSEC and the
TLD integration will not likely resolve correctly with
ENS as the DNS browser protocol may override the
resolving [25]. There were a number of limitations and
technical issues that could not be overcome to test a
.xyz domain with any objectivity or confidence. The
Ropsten testnet had some service issues during my
testing with ENS and syncing, this included using
the third-party API Infura that demonstrated the
same behaviour. Where required I have used Ropsten
and confirmed behaviour across the Mainnet with
alternatively hosted sites. There are interesting uses
of ENS and DNS hosted on Ethereum, the EthDNS
system is prototyped and documented that uses DNS
records stored on Ethereum [26]. There are potentially
interesting attack vectors if Swarm and ENS became
mainstream the use of a bad resolvers in new “Dapps”
for example. IPFS also needs to be investigated to
understand how it can be used in addition to existing
technology or integration with other blockchain
technologies. As the example shows the ability to
bring up a node write information into the distributed
storage is possible both quickly and cheaply, removal 7of
the node from the system still allows the new files to
remain. Attribution using a blockchain explorer allows
account identification additional resources, identifiable
information and linked smart contracts. The layers of
investigation cut across web technology, blockchain
account records, smart contracts, blockchain naming
service, blockchain storage and the host machine.
The JBBA | Volume 2 | Issue 2 | October 2019
These can lead directly to additional accounts that
may identify cryptocurrencies entering or leaving the
system. The ability to interact with a smart contract
using privacy focused technologies such as zkSNARKS
or private smart contracts such as Enigma allow data
or image sharing autonomously with strong encryption
[27]. The ability to create a photo-sharing application
for payment with content hosted on decentralised
storage can be achieved using privacy focused methods
in addition to blockchain technologies.
What is demonstrated is a need to understand the
sources of hosted material as distributed storage
becomes wider spread in its adoption. Hosting malware
on distributed storage or indecent images of children
will require investigators and responders to locate all
the sources of material. In the examples shown it is
possible to make attribution to file access and use
for forensic examination. File signatures, hash values,
hosted distributed domains, protocol specific URLs,
e.g. BZZ or IPFS can be extracted. In incident response
scenarios, the ability to source and collect the sample
for reverse engineering will be essential for mitigation
and research. Virus scanning and network protection
rules could be used to search detect and block hosted
material entering or leaving a network. Fig 8 shows the
host and file access to the blockchain via Blockchain
node / software or via internet gateways.
Fig 8 shows a host connecting via the blockchain protocols or via an
internet gateway
14. Conclusion
This scenario has demonstrated it is possible to store
content persistently on blockchain technology allowing
access to those on the blockchain and to the internet
through internet gateways. Decentralised storage
remains uncensorable with no technical recourse to
remove or even request for lawful motions against its
storage. There are no regulations such as GDPR, local
laws, state, or international law that have any power to
control or remove it. The hosting of resources such
as images or files on distributed file storage requires
additional investigative methods to discover the source
and linked information. The ability to attribute the
access or presence of an illegal image or document
can be reliable proven using hashing protocols used in
Ethereum Swarm, the Swarm hash and the temporal
71
jbba
the
data from the blockchain against fragments held on
the host. The requirement to recover electronic data
stored or what was accessed is needed in E-discovery
and for corporate legal compliance, so the need exits
to be able to seek and find documents hosted as
described. Malware researchers require the source file
to reverse engineer or perform static analysis so the
ability to access blockchain storage to recover such
files along with additional threat intelligence from
linked accounts and blockchain naming is essential.
In this case forensic artefacts were not interfered
with in terms of their integrity, this is good news for
forensic investigators wanting to review rich sources of
meta-data. This was only performed on the Ethereum
Swarm and other storage systems may also leave
metadata or artefacts, a potentially important forensic
research area. Research on distributed storage is still
focused on the introduction, development, scalability
and the performance of the technology. There are
clearly vast gaps in literature around the use and longterm performance behaviour as the technology is
rapidly evolving. Blockchain forensics has focused on
cryptocurrency track and trace but the evolvement of
smart contracts and now storage and computational
resource will be a future frontier. It is unclear on
the adoption of these technologies to long-term
adoption, but a new challenge and knowledge gap
could appear overnight. Blockchain will undoubtable
continue to pioneer computational breakthroughs but
new paradigms and challenges exist in its wake. The
misuse cases should be considered and researched
to compliment blockchain development as a global
revolution.
References:
[1] F. January, M. Ii, F. I. Directive, R. R. Review, E. Union,
G. Data, P. Regulation, and T. Gdpr, “The rise of the regulator
may lead to trouble for the blockchain,” pp. 1–2, 2018.
[2] C. Salmensuu, “General Data Protection Regulation and
the Blockchains,” Liikejuridiikka, no. 1, p. 92, 2018.
[3] B. Ramsundar, R. Chen, A. Vasudev, R. Robbins, and A.
Gorokh, “Tokenized Data Markets,” 2018.
[4] N. Vergauwen, “Upgradeable Smart Contracts – Hacker
Noon,” Medium - Hackernoon, 2018. [Online]. Available:
https://hackernoon.com/upgradeable-smart-contractsa7e9aef76fdd. [Accessed: 15-Jan-2019].
[5] “Filecoin - Website,” 2019. [Online]. Available: https://
filecoin.io/. [Accessed: 15-Jan-2019].
[6] “IPFS is the Distributed Web,” 2019. [Online]. Available:
https://ipfs.io/. [Accessed: 15-Jan-2019].
[7] J. Redman, “BCH-Powered Bitcoin Files Project Adds
IPFS Support - Bitcoin News,” News-Bitcoin.com, 2018.
The JBBA | Volume 2 | Issue 2 | October 2019
[Online]. Available: https://news.bitcoin.com/bch-poweredbitcoin-files-project-adds-ipfs-support/. [Accessed: 06-Jan2019].
[8] M. Zalecki, “Using IPFS with Ethereum for Data Storage
| Tooploox,” TOOPLOOX - WEB, 2018. [Online].
Available: https://www.tooploox.com/blog/using-ipfs-withethereum-for-data-storage. [Accessed: 06-Jan-2019].
[9] “MaidSafe,” 2019. [Online]. Available: https://maidsafe.
net/. [Accessed: 15-Jan-2019].
[10] “Sia,” 2019. [Online]. Available: https://sia.tech/.
[Accessed: 15-Jan-2019].
[11]
“Storj - Decentralized Cloud Storage,” Storj Decentralized Cloud Storage. 15-Nov-2017.
[12] “Go Ethereum,” Geth. [Online]. Available: https://geth.
ethereum.org/. [Accessed: 15-Jan-2019].
[13] “1. Introduction — Swarm 0.3 documentation,” Swarm
read the docs, 2019. [Online]. Available: https://swarm-guide.
readthedocs.io/en/latest/introduction.html. [Accessed: 15-Jan2019].
[14] R. Amado, “How Cybercriminals are using Blockchain
DNS | Digital Shadows,” Digital Shadows_ (Web), 2018.
[Online]. Available: https://www.digitalshadows.com/blogand-research/how-cybercriminals-are-using-blockchain-dnsfrom-the-market-to-the-bazar/. [Accessed: 14-Jan-2019].
[15] “Namecoin,” Namecoin (Web), 2019. [Online].
Available: https://namecoin.org/. [Accessed: 14-Jan-2019].
[16] M. Ali, J. Nelson, R. Shea, and M. J. Freedman,
“Blockstack : A Global Naming and Storage System Secured
by Blockchains,” USENIX Annu. Tech. Conf., pp. 181–
194, 2016.
[17] I. Ilascu, “New Botnet Hides in Blockchain DNS Mist
and Removes Cryptominer,” Bleeping Computer - Web, 2018.
[Online]. Available: https://www.bleepingcomputer.com/
news/security/new-botnet-hides-in-blockchain-dns-mist-andremoves-cryptominer/. [Accessed: 14-Jan-2019].
[18] N. Johnson, “A developer’s guide to ENS concepts – The
Ethereum Name Service – Medium,” Medium Blogpost Web,
2017. [Online]. Available: https://medium.com/the-ethereumname-service/a-developers-guide-to-ens-concepts-7004eea8a073.
[Accessed: 13-Jan-2019].
[19] M. Bazzell, Open Source Intelligence Techniques:
Resources for Searching and Analyzing Online Information, 5th
ed. USA: CreateSpace Independent Publishing Platform, 2016.
[20] D. Murdoch, Blue Team Handbook: Incident Response
Edition. 2014.
[21] “Personal data breaches,” 2019.
72
jbba
the
[22] R. Jones and P. Collinson, “Identity theft warning after
major data breach at Ticketmaster | Money | The Guardian,”
The Guardian (Online), 2018. [Online]. Available: https://
www.theguardian.com/money/2018/jun/27/identity-theftwarning-after-major-data-breach-at-ticketmaster. [Accessed: 06Jan-2019].
[23] D. P. Act, “ICO lo Guidance on data security breach
management,” pp. 1–8, 1998.
[24] The Crown, “PML v Person(s) Unknown [2018]
EWHC 838 (QB) (17 April 2018),” 2018.
[25] N. Johnson, “ethereum/go-ethereum/name-registry Gitter,” Chatboard, 2019. [Online]. Available: https://gitter.
im/ethereum/go-ethereum/name-registry. [Accessed: 15-Jan2019].
[26] J. McDonald, “EthDNS: an Ethereum backend for
the Domain Name System,” Medium Blogpost Web, 2018.
[Online]. Available: https://medium.com/@jgm.orinoco/
ethdns-an-ethereum-backend-for-the-domain-name-systemd52dabd904b3. [Accessed: 13-Jan-2019].
[27] S. Dyson, W. J. Buchanan, and L. Bell, “The Challenges
of Investigating Cryptocurrencies and Blockchain Related
Crime,” vol. 1, no. 2, pp. 1–6, 2018.
Competing Interests:
None declared.
Ethical approval:
Not applicable.
Author’s contribution:
SD has prepared the manuscript in entirety.
Funding:
None declared.
Acknowledgements:
None declared.
The JBBA | Volume 2 | Issue 2 | October 2019
73
jbba
the
Peer-reviewed Research
OPEN ACCESS
ISSN Print: 2516-3949
https://doi.org/10.31585/jbba-2-2-(7)2019
A Blockchain Infrastructure for Transportation
in Low Income Country Cities, and Beyond
Simon J Herko
TravelSpirit Foundation, UK
Correspondence: siho@travelspirit.io
Received: 26 August 2019 Accepted: 29 August 2019 Published: 5 September 2019
Abstract
For our cities of tomorrow, it is essential that transport is organised in an efficient, resilient and equitable
way; enabling economic growth, social cohesion and minimising environmental impacts, including Climate
Change. In cities across the world, new flexible, sharing economy services are blurring the lines between
private and public transportation. However, these new transport modes are creating a “digital divide”
and lack the integration and co-ordination between other services. This is needed to create seamless and
sustainable travel options for people, including those belonging to vulnerable groups. This exploratory paper
examines the potential for Blockchain to play a pivotal role in addressing increasing congestion and pollution
in growing cities of developing countries. It draws on preliminary research into the role of Automatic Fare
Collection systems and related mobility market dynamics and trends in the cities of Cape Town, South Africa
and Dehli, India. By creating viable new digital infrastructure for Low Income Country Cities (LICCs), who
have less incumbent legacy systems, there is potential to establish a decentralised blockchain network across
these territories. There would also be scope for this network to be scaled further into wealthier countries,
through a secondary wave of adoption by Mobility-as-a-Service (MaaS).
Keywords: Blockchain, Distributed-hosting, Distributed-storage, Ethereum, Swarm, Forensics
JEL Classifications: A13, B41, C60, C71, D41, D43, D63, E24, E26, F02, F60, L14, L16, L17, L91, O18,
O33
1. The challenge of integrating mobility services
The proportion of the world’s population living in
urban areas will approach 66% by 2050[1], with much
of this growth coming from Low Income Country
Cities (LICCs).
However, transport in LICCs is fragmented, with
no common standards for booking, payment and
service delivery across different modes of transport,
competing services or across regions. The majority of
data is yet to be digitised and there are no mechanisms
in place to support data-sharing of movements and
assets. This leads to inefficient transport provision,
impacting economic and social well-being and
increasing congestion and pollution levels, including
unsustainable carbon emissions that are accelerating
Climate Change.
Cape Town, South Africa and Delhi, India, as suitable
real-world case studies for examining the potential
for blockchain to provide common infrastructure for
LICCs.
Our research into the Cape Town and South African
context was undertaken in collaboration with the
Greater Tygerberg Partnership (GTP). The GTP is
a not-for-profit entity funded by the City of Cape
Town, under the Transport and Urban Development
Authority. It serves as a facilitator to economic and
social renewal and collaborative efforts between the
private sector, civil society, academic institutions and
government for the benefit of the Voortrekker Road
Corridor (VRC). The VRC is an identified integration
zone and inward investment opportunity area,
comprising a population circa 350,000. It acts as the
second largest economic hub and busiest transport hub
in the Western Cape.
2. Developing the evidence base
We identified the high growth and congested cities of
The JBBA | Volume 2 | Issue 2 | October 2019
By researching the economic and social conditions
in Cape Town and the wider South African region,
75
jbba
the
we have developed key insights into the challenge of
bringing together transportation within and across
LICCs.
In South Africa, the proportion of individuals
benefiting from social grants rose from 12.7% in 2003
to 29.9% in 2016 [2]. The unemployment rate in South
Africa is 26.7% [3]. Access to transport is a key enabler
for accessing employment and education opportunities.
In the public and charitable sectors, transport funding
subsidies are often applied to the infrastructure, not
the user, creating a lack of transparency and often
inefficient utilisation of scarce resources.
Although improving, a high proportion of the
population (23%) are unbanked [4] and 63% are without
access to smartphones [5]. Credit card penetration is
at 17% and 65% of all transactions are made by cash.
54% of the population could be persuaded to switch
from cash to digital wallets only if they provided a
significant value-add over cash [6].
The following research insights are of particular
relevance to the opportunity for a blockchain-based
infrastructure intervention:
1.
2.
Competing transport businesses,
including high levels of “informal” minibus
taxi operations, make aggregation of services
and data highly challenging and encourage
disreputable operators. A commercially
agnostic platform that is easy and compelling
to adopt would therefore be highly desirable.
i.
In South Africa, the proportion of
the population who use informal minibus
taxis rose from 17.6% in 2003 to 22.4% in
2013. The proportion of mass-transit
commutes that are carried by minibuses is
67.5% [7].
ii.
Customer dissatisfaction with
minibuses is very high – 26.5%, compared to
3.9% for trains and 4.2% for buses.
In mass transit, the gap between fare revenues
collected and passenger numbers serviced is
too high, inhibiting further investments in
infrastructure and a negative impact on the
affordability of fares. Transit providers
require higher surety of payment.
i.
Affordability of mass transit has an
impact on poverty, inclusivity and the
economy [8].
ii.
Cape Town buses have introduced a
Smart Card and are enjoying growth [9].
iii.
Western Cape rail revenues are in
decline due to unreliable services and poor
funding [10].
For comparison with the South African research, we
The JBBA | Volume 2 | Issue 2 | October 2019
reviewed the transport landscape and relevant scientific
papers for the National Capital Territory (NCT) of
Delhi, India and its wider National Capital Region,
including the significance of the Metro for rapid transit
and active travel (i.e. non-motorised transport) for first
and last mile access.
Despite rapid growth of the Metro network, the lack of
integration of different modes has hastened the shift
towards private automobiles, including two-wheelers
and increasingly four-wheelers, for commuting and
other short distance travel. Over the course of 20152016 alone, the number of private motor vehicles
registered within the NCT of Dehli rose 10 percent,
from 8.8 million to 9.7 million, and the trend is expected
to continue without dramatic shifts in planning policy
[11].
Price and first/last mile connectivity are the major
influencing factors on choice of transport mode,
demonstrated in shifts from Metro (faster with poorer
last mile access, thus supplemented by auto hire) to bus
(slower with better last mile access) amongst middle
and lower income commuters following a Metro fare
hike over the 2016-2017 fiscal year [12] [13].
The following insights should help inform the design
and rollout of blockchain-based infrastructure for
enhancing the ease of multi-modal trips, including
the need to consider how funding for infrastructure
to support active travel can be integrated into the
conceptual framework:
1.
iii.
2.
Poor first and last mile connectivity of
public transit, especially the Metro, is
hampering the effectiveness of public
transit at reducing congestion and enhancing
mobility. Furthermore, transfers between
metro and bus for first/last mile trip segments
require separate fare payment methods, given
the Metro fare payment card is not widely
accepted by bus operators, despite pledges by
operators to install card readers [14].
i.
Offering convenience expected
of private motoring, especially door-to-door
service, can help reverse the decline in modal
share of public transit [15].
ii.
Physical facilities for active travel
tend to be substandard or absent, leading to
greater reliance on private cars, reduced street
space for walkers and cyclists, and declining
ridership of bus transit [16].
Funding for completion of discontinuous
footpaths, regular maintenance, and
prevention of encroachments are expected to
boost the propensity of active travel [17].
Mobility providers including bus operators,
ride-hailing and cycle-share platforms do
not coordinate with each other, leaving
76
jbba
the
certain areas of the city grossly underserved
relative to potential trip demand and, in the
case of separate companies operating buses
and metro trains, leading to lower than
expected ridership on new metro lines. Local
authorities are evidently aware of this
shortcoming, as demonstrated by the launch
of One Delhi mobile application for real time
journey planning covering both bus and
metro lines [18].
i.
The benefits of a common mobility
account have merited endorsement by the
highest levels of the central government,
including the Vice President in a call to
combat vehicular pollution through improved
ease of using public transport [19].
ii.
There is a desire to address the
lack of coordination by bringing ideally all
mobility providers under a common
organisational umbrella [20]. This desire, in
practice may not be achievable, pointing
towards a role of a blockchain infrastructure
to support a multi-stakeholder eco-system
with no centralised control.
iii.
A study for a cycle sharing system
that is ready for fares integration with other
transport modes is ongoing in South Delhi [21].
3. Our working hypotheses on a viable blockchain
Our research is motivated by a hypothesis that, less
hampered by legacy infrastructure and with strong
economic drivers for innovation, LICCs can leapfrog
high income countries on Intelligent Transport Systems
(ITS) [22]. This would imply:
1.
2.
LICCs do not have to depend upon large
programme budgets (which aside from the
expense can be often open to corruption)
and enter complex procurements to drive
forward and realise technology-driven
benefits.
There are ways for emerging economies to
innovate faster than developed markets and
play the role of pilot/pioneers in blockchain.
More specifically, there is an opportunity for a common
blockchain network infrastructure, for transport
booking, payments and subsidies, that, starting with
Low Income Country Cities (LICCs), would enable all
cities to enjoy the benefits of an integrated transport
system that is interoperable across competing services
and inter-regional borders.
As highlighted in our South African evidence base
(while applicable across much of the African, Indian,
Asian and South American continents) the informal
minibus taxi sector is a complex environment, while a
key ingredient to the transport mix of many LICCs. It is
The JBBA | Volume 2 | Issue 2 | October 2019
ripe for change, especially with regards to new payment
models and methods to optimise and integrate systems.
Following an examination of the current Intelligent
Transport Systems (ITS) landscape in LICCs, we
identified the most compelling blockchain use-case to
be for Automatic Fare Collection (AFC). A common
global and universal “open-loop” infrastructure,
enabled by blockchain, would replace the need for
bespoke and centralised back-office systems for each
city, and provide a common payment system for the
informal minibus taxi sector.
Both the European Bank for Reconstruction and
Development (EBRD) and World Bank have identified
the key barriers to adoption of “open-loop” accountbased systems outside the largest and most affluent of
world cities, such as Washington D.C. Boston, London,
Amsterdam, Vienna, Singapore, Hong Kong and Seoul
[23] [24]. They are the cost, time and effort required
to obtain the necessary banking security permissions
and the complexities of public sector led procurement
and implementation, which can take up to 5 years to
complete.
Advanced contactless card systems in London, Hong
Kong and Singapore are made possible by an effective
monopoly over transport provision and a well-funded
co-ordinating body (e.g. TfL’s operational budget is
over £6 billion per annum). They generally do not
extend to new collective transport innovations such
as car clubs, ride-hailing and bike-sharing; especially
if operated privately. In this respect, they are less
helpful operating models to replicate in emerging
market economies, with their higher levels of market
fragmentation, and where informal private minibus
services often dominate mass transit.
Research undertaken for the World Economic Forum
[25] articulates the case for improved integration and
interoperability in city transportation and its potential
for positive impact on global prosperity, equality and
the environment. Their hypothesis is that a centralised
global platform is required, risking, in our view,
bringing transport under the control of a small set of
data monopolies.
Our working hypothesis is that a permission-based
blockchain solution could provide users equitable and
open market access to transport services, with cashless,
subscription-based and/or subsidised payment
mechanisms. The solution would supersede “closedloop” AFC technology (e.g. smartcards) on buses and
trains and provide viable infrastructure to the informal
minibus taxi market, which represents circa 70% of all
mass transit trips in LICCs.
The rationale for adoption could be as follows, in terms
of benefits for different stakeholders.
77
jbba
the
Benefits to End Users:
3.
1.
4.
2.
3.
4.
5.
Cashless and trusted solution, improving
safety & security.
Access to user-based subsidies and microcredit worthiness.
Access without smartphone or contactless
banking.
Develop personal identity and data profile.
Roaming capability.
Benefits to Transport Providers:
1.
2.
3.
Surety of payment and uplift in fare revenues
collected.
Access to customer data and new markets.
Fair and trustworthy subsidy compensation
mechanisms.
Benefits to Cities:
1.
2.
3.
4.
Shift to mass-transit and reduced congestion/
pollution.
Platform for inward investment into public
transport infrastructure.
Easier to allocate subsidies in line with policy
objectives (e.g. active travel).
Affordable, easy to adopt AFC solution.
These benefits would be delivered through
decentralised, self-sovereign and interoperable
“mobility accounts”, hosted on a permission-based
blockchain [26]. This includes smart contracts to execute
commercial agreements, a shared set of business rules
for innovation in fares policy and blended financial
subsidies, including user-based subsidy.
The primary goal of the blockchain would be to provide
all LICCs with a common global ITS (Intelligent
Transport Systems) infrastructure, whose adoption
could be achieved organically, rather than procured.
We anticipate an open, transparent and crowd-based
governance structure and token economy that will
ensure transaction costs remain affordable.
4. Technical characteristics of a suitable
blockchain
In researching the feasibility of a blockchain solution in
the South African context, we identified the following
initial functional requirements to establish a viable
blockchain solution and adopted network:
1.
2.
Users (including the unbanked) to access
multiple transport services through a global
mobility account.
Account system interoperability and roaming
capability between transport operators,
modes and across regional borders.
The JBBA | Volume 2 | Issue 2 | October 2019
5.
6.
7.
8.
Manage rights and responsibilities of portable
personal data.
Support trusted multi-lateral commercial
arrangements between transport providers.
Provide low network latency, fast verification
and compatibility with low power devices.
Resilience to fraud and denial-of-service
attacks.
Commercially agnostic solution that can be
easily adopted by competing transport
providers and multiple regions and cities.
Close integration with existing infrastructure,
and a distributed share of transaction
revenues.
The decentralised delivery model of an open-source
and permission-based blockchain network would also
seek to address the high expense and long duration of
ITS procurements for AFC implementation.
Through dialogue with Hyperledger Working
Requirements Group, we have identified the
Hyperledger Indy and Hyperledger Sawtooth
development frameworks and modular open-source
codebase as the starting point [27] [28] [29]. To meet
the above functional requirements, we anticipate the
following future research and development actions:
4.1. Proof of Location within the Trusted
Execution Environment (TEE)
Existing Sawtooth framework accesses an efficient
Proof of Elapsed Time lottery algorithm for network
consensus, via a TEE developed by Intel. There is
opportunity to explore a new TEE that is optimised
for deployment in low power devices, including a Proof
of Location to improve network security and mobility
account operation.
4.2. Sharding / partitioning of the global state
Existing Sawtooth framework requires consensus
of the entire global state of transactions, with a total
ordering of every transaction. There is an opportunity
for our blockchain network to be partitioned or
‘sharded’ by location, to improve scalability and reduce
storage requirements. A new framework could be
developed to spawn multiple permissioned overlays
of Sawtooth, enabling a segmented-state management
protocol.
4.3. On-Chain Smart Contracts with “Seth”
There is scope to research into the capabilities of
the new Seth transaction family [30] as a means
for deploying Turing complete programs for
compensation, arbitration and concessionary reimbursement processes.
78
jbba
the
4.4. Linking via “Seth”, to a token-based economic
model
Hyperledger frameworks are optimised for the
application of permissioned blockchains within
business enterprise solutions using a centralised
platform business model. A design goal of commercially
agnostic, distributed revenues requires a higher level of
decentralisation.
There is scope for using Seth to bridge between the
Sawtooth permissioned framework and Ethereumbased tokens, to enable each city and transport
provider to operate their own node and gain a share in
the transaction revenues.
5. Beyond LICCs: global Mobility as a Service
(MaaS)
identified just over half a dozen published research
papers on blockchain for MaaS, from Germany,
Sweden, UK (by the Transport Systems Catapult and
TravelSpirit Foundation), Finland and the Netherlands
[26][34][35][36][37][38][39]. This growing evidence
base corroborates with our thesis that the scope of
MaaS to scale effectively, even within the European
market, where public policy and industry interest is the
greatest, is limited without the support of a common
blockchain infrastructure.
With a focus on wealthier markets, the papers we have
reviewed on the application of blockchain for MaaS
do not make direct references to LICC contexts. We
therefore believe we have developed a novel concept
for how to scale a blockchain network for ultimate
adoption as a MaaS solution in wealthier countries.
6. Conclusion
Mobility as a Service (MaaS) is a new disruptive business
model paradigm [31]. With an expected market size of
$1 trillion by 2030, it will empower users with hasslefree payment options and an integrated approach to
accessing public transport, flights, ferries and shared
economy services.
To scale globally, MaaS requires commercial
collaboration between a diverse and large transport
ecosystem [32], and affordable solutions for Low
Income Countries. Latest public policy and industry
thinking would suggest a growing consensus that
such collaboration would require a greater level of
“openness”, both culturally and technically, within the
city transport sector, than currently exists in most city
states [33].
Furthermore, to satisfy the demands of inter-regional
and international travel, supporting MaaS platforms
need cross-border functionality, facilitating “roaming”
across cities and countries. They must also integrate
various public, charitable, private and consumer
funding sources to enable effective investment in mass
transit and active travel infrastructure.
In a small collection of cities within wealthier countries,
that also enjoy advanced Open Data programmes (e.g.
Finland, Germany and the Netherlands), some MaaS
apps are already covering a full spectrum of collective
transport services. They have, in our view, limited
scope for widespread adoption due to the centralised
platform approach - i.e. the “unwanted third-party
aggregator”. This is a problem blockchain could
solve by enabling personalised aggregation to take
place direct to consumer, via a trusted, commercially
agnostic and decentralised infrastructure.
While there are many new blockchain solutions
appearing for shipping and logistics, the application
of blockchain for MaaS is in its infancy. We have
The JBBA | Volume 2 | Issue 2 | October 2019
The potential global impact of a blockchain-based
network infrastructure on the city transportation sector
is substantial. With blockchain, we can ensure a healthier
democratisation of the transport economy, that, based
upon liberal philosophies, will provide autonomy to
local and regional economies, strengthening global
collaboration and regional governance.
A case has been made for a global and universal
blockchain infrastructure, for the sharing of data
on movement and assets, designed with low income
economies and vulnerable groups in mind. It would
enable:
1.
2.
3.
Users’ access to different modes of transport
in an equitable and hassle-free way.
Assurance to transport operators on surety of
payment.
Cities with integrated solutions for tackling
congestion and targeting subsidies.
Through the work of both the European Bank for
Reconstruction & Development and the World Bank,
the economic and social case for delivering Automated
Fare Collection (AFC) technology in transportation
systems in emerging markets is already supported by
a comprehensive evidence base. Existing research on
AFC solutions consistently focuses on centralised
platforms and bespoke back-office infrastructure
for each city. It means the opportunity for a global
infrastructure, delivered through a decentralised and
networked route to market, has not been researched
and advocated to the same extent.
In wealthier countries Mobility-as-a-Service (MaaS)
is a new business model that integrates public and
private services together. Its level of adoption could be
limited without a supporting blockchain infrastructure.
By creating viable new digital infrastructure for
79
jbba
the
Low Income Country Cities (LICCs), who have
less incumbent legacy systems, there is potential to
establish a decentralised blockchain network across
these territories. There would also be scope for this
network to be scaled further into wealthier countries,
through a secondary wave of adoption by Mobility-asa-Service (MaaS).
To advance our understanding of this alternative vision
for global AFC infrastructure (i.e. technology that is
universal and enables a decentralised approach to the
management and orchestration of transport) we’d
recommend there to be:
1.
2.
Technology-based research and development
on the Hyperledger Project open-source
codebases.
Interventional pilots in Low Income Country
Cities, and research into the institutional,
commercial and funding mechanisms that
would be required to establish and scale this
kind of universal blockchain infrastructure.
References:
[1] “World Urbanization Prospects - Population Division,”
United Nations. [Online]. Available: https://population.
un.org/wup/. [Accessed: 16-Aug-2018].
[2] “General Household Survey, 2016,” Department Statistics
South Africa. [Online]. Available: http://www.statssa.gov.
za/?p=9922.
[3] “Quarterly Labour Force Survey – QLFS Q4:2017”
Department Statistics South Africa. [Online]. Available:
http://www.statssa.gov.za/?p=10884
[4] “Credit Card vs Cash in Africa – on the verge of
convergence” Cape Business News (2019). [Online] Available:
https://www.cbn.co.za/opinion/credit-card-vs-cash-in-africaon-the-verge-of-convergence/
[5] “In South Africa, Cash Is Still Right On The Money”
PYMNTS.com (2019). [Online] Available: https://www.
pymnts.com/cash/2017/south-africa-cash-usage/
[6] “Mobile wallets 'key' to SA e-commerce,” Fin24tech, 30Mar-2016. [Online]. Available: https://www.fin24.com/
Tech/Mobile/mobile-wallets-key-to-sa-e-commerce-20160330
[7] P. Lehohla, “Transport Series Volume I: Profile of nonmotorised transport users: In-depth analysis of the National
Household Travel Survey 2013 data,” Department Statistics
South Africa, rep. Available: http://www.statssa.gov.za/
publications/Report-71-03-01/Report-71-03-012013.pdf
[8] R. Carruthers, M. Dick, and A. Saurkar,
“Affordability of Public Transport in Developing Countries,”
The World Bank Group, rep., Jan. 2005. Available:
http://siteresources.worldbank.or g/INT TRANSPO
RT/214578-1099319223335/20460038/TP-3_
affordability_final.pdf
[9] “Golden Arrow hits profit targets.” Cape Business News.
(2019). [Online] Available: https://www.cbn.co.za/news/
golden-arrow-hits-profit-targets/
[10] C. Presence, “Metrorail losing paying customers by the
The JBBA | Volume 2 | Issue 2 | October 2019
millions, MPs told,” IOL News, 17-Apr-2018. [Online].
Available: https://www.iol.co.za/news/south-africa/westerncape/metrorail-losing-paying-customers-by-the-millions-mpstold-14494831
[11] S. Pillai, “Poor public transport behind Delhi vehicle
boom, say experts,” Hindustan Times, 20 Dec. 2016.
Available:
https://www.hindustantimes.com/delhi/poorpublic-transport-behind-delhi-vehicle-boom-say-experts/story4lbiZTogbYPofE2A57zcCJ.html
[12] A. Roychowdhury, “Towards Clean and Low Carbon
Mobility: Addressing Affordability and Scaling up of
Sustainable Transport,” Centre for Science and Environment,
rep., Sep. 2018. Available: http://cdn.cseindia.org/attachme
nts/0.21487000_1536054529_Anumita-Clean-low-carbonmobility-strategy-Sept.pdf
[13] C. Kumar and A. Ganguly, “Travelling Together but
Differently: Comparing Variations in Public Transit User
Mode Choice Attributes Across New Delhi and New York,”
Theoretical and Empirical Researches in Urban Management,
vol. 13, no. 3, pp. 54-73, Aug. 2018. Available: https://www.
jstor.org/stable/pdf/26472536.pdf ?refreqid=excelsior%3Ab
a21b9e6215c4ee0989116576282054a
[14] “Use metro cards on buses for discount,” The Hindu, 20
Oct. 2018. Available: https://www.thehindu.com/news/cities/
Delhi/use-metro-card-on-buses-for-discount/article25266914.
ece
[15] O. P. Agarwal, "Compulsion to Choice: How Can Public
Transport in India Be Transformed," Economic and Political
Weekly, vol. 54, no. 4, 26 Jan. 2019. Available: https://www.
epw.in/node/153650/pdf.
[16] “U. Nasim and V. Chattopadhyay, “Indian roads belong
to motorised vehicles, not cyclists or pedestrians,” Down to
Earch, 6 Nov. 2018. Available: https://www.downtoearth.
org.in/news/air/indian-roads-belong-to-motorised-vehicles-notcyclists-or-pedestrians-62049
[17] M. A. Alam, “Sustainable and Equitable Transport
System in Delhi: Issues and Policy Direction,” Asian Institute of
Transport Development, rep., 2015, Available: https://www.
unescap.org/sites/default/files/Article%202_Sustainable%20
and%20equitable%20transport%20system%20in%20Delhi.
pdf
[18] “Delhi commuters can now locate public transport better
with ‘One Delhi’ app,” Press Trust of India, First Post, 6
Mar. 2019. Available: https://www.firstpost.com/tech/
news-analysis/delhi-commuters-can-now-locate-public-transportbetter-with-one-delhi-app-6205941.html
[19] “VP calls for a public transport-centric approach to combat
growing vehicular pollution,” Government of India Press
Information Bureau, 3 May 2019. Available: https://pib.gov.
in/newsite/PrintRelease.aspx?relid=189925
[20] “Reimagining public transport in India,” KPMG, rep.,
Oct. 2017. Available: https://assets.kpmg/content/dam/
kpmg/in/pdf/2017/10/Reimagining-public-transport.pdf
[21] “Draft Detail Project Report on Public Bicycle Sharing
System for SDMC (South Delhi Municipal Corporation),”
Centre for Green Mobility, rep., Sep. 2015. Available: https://
shaktifoundation.in/wp-content/uploads/2017/06/PublicBicycle-Sharing-DPR-South-Delhi.pdf
[22] T. Yokota, “ITS Technical Note for Developing Countries,”
80
jbba
the
World Bank Group, rep., Jul. 2004. Available: http://
siteresources.worldbank.org/EXTROADSHIGHWAYS/
Resources/ITSNote1.pdf
[23] “On the move: delivering automated fare collection,”
European Bank for Reconstruction and Development, rep., Jul.
2017. Available: https://www.ebrd.com/documents/admin/
on-the-move-delivering-automated-fare-collection.pdf
[24] C. Monsalve et al, “Public Transport Automatic Fare
Collection Interoperability: Assessing Options for Poland”
World Bank Group and Korea Green Growth Partnership,
rep., Jun. 2016. Available: http://documents.worldbank.
org/curated/en/564001469009916441/pdf/107014WP-P148489-PUBLIC-Phase-2-Public-Transport-AFCInteroperability-Final-Report-June-10-2016.pdf
[25] J. Moavenzadeh and V. Padilla-Taylor, “Designing a
Seamless Integrated Mobility System (SIMSystem),” World
Economic Forum, rep., Jan. 2018. Available: http://www3.
weforum.org/docs/Designing_SIMSystem_Manifesto_
Transforming_Passenger_Goods_Mobility.pdf
[26] S. Ho et al, “TSio Protocol: The Internet of Mobility,”
Whitepaper, TravelSpirit Foundation, UK, rep., Dec. 2017.
Available:
https://travelspirit.foundation/wp-content/
uploads/2017/12/TravelSpirit-W hitePaper-TSioProtocol-v-6-1.pdf
[27] “Hyperledger Architecture Volume 1, Design Philosophy
and Consensus” Linux Foundation, rep., Aug. 2017. Available:
https://www.hyperledger.org/wp-content/uploads/2017/08/
Hyperledger_Arch_WG_Paper_1_Consensus.pdf
[28] “Hyperledger Architecture Volume II, Smart Contracts”
Linux Foundation, rep., Apr. 2018. Available: https://www.
hyperledger.org/wp-content/uploads/2018/04/Hyperledger_
Arch_WG_Paper_2_SmartContracts.pdf
[29] K. Olson, M. Bowman, J. Mitchell, S. Amundson, D.
Middleton, and C. Montgomery, “Hyperledger Sawtooth: An
Introduction,” Linux Foundation, rep., Jan. 2018. Available:
https://www.hyperledger.org/wp-content/uploads/2018/01/
Hyperledger_Sawtooth_WhitePaper.pdf
[30] “Seth Transaction Family Specification” Hyperledger
Project [Online, accessed Jun. 2019]. Available: https://
sawtooth.hyperledger.org/docs/core/releases/0.8/transaction_
family_specifications/sawtooth_burrow_evm_family.html
[31] M. Kamargianni and M. Matyas, “A Holistic Overview
of the Mobility-as-a-Service Ecosystem” University College
London, rep. Mar. 2017, Available: https://docs.wixstatic.
com/ugd/a2135d_8ec5294674a44129b04bcc99a324d1c5.
pdf
[32] P. Karjalainen, “Guidelines & Recommendations to
create the foundations for a thriving MaaS EcoSystem”, MaaS
Alliance, rep. Sep. 2017, Available: https://maas-alliance.eu/
wp-content/uploads/sites/7/2017/09/MaaS-WhitePaper_
final_040917-2.pdf
[33] S. Herko, S. Witzel, P. Karjalainen et al, “An Open Future
for Cities: Preparing cities for the necessary transformation and
organisational changes needed for an open future.” Whitepaper,
TravelSpirit Foundation, UK, rep., Dec. 2017. Available:
https://www.researchgate.net/publication/334524614_An_
Open_Future_for_Cities_Preparing_cities_for_the_necessary_
transformation_and_organisational_changes_needed_for_an_
open_future
The JBBA | Volume 2 | Issue 2 | October 2019
[34] D. Sümmermann, C. D. Öge, M. Smolenski, G. Fridgen,
and A. Rieger, “Open Mobility System”, Concept Paper,
MotionWerk GmbH, Fraunhofer FIT, TÜV Rheinland,
Germany, rep., Sep. 2017 Available: https://www.omos.io/
wp-content/uploads/whitepaper/OMOS_concept_paper.pdf
[35] P. Andersson and J. Torstensson, “Exploring the role
of blockchain technology in Mobility as a Service,”, Master’s
Thesis, Chalmers University of Technology, Gothenberg,
Sweden, rep., Nov. 2017. http://publications.lib.chalmers.se/
records/fulltext/252507/252507.pdf
[36] “Blockchain Disruption in Transport: Are You
Decentralised Yet?” Transport Systems Catapult, UK, rep., Jun.
2018. Avaliable: https://s3-eu-west-1.amazonaws.com/media.
ts.catapult/wp-content/uploads/2018/06/06105742/
Blockchain-Disruption-in-Transport-Concept-Paper.pdf
[37] A. Karinsalo and K. Halunen, “Smart Contracts for a
Mobility-as-a-Service Ecosystem,”, Conference Paper, VTT
Technical Research Centre of Finland, rep. Jul. 2018. Available:
https://ieeexplore.ieee.org/abstract/document/8431964
[38] J. Verheul, M. Mijnheer, and J. Ferwerda, “A new
Blockchain Platform Designed for the Future of Human
Mobility,”, Whitepaper, VMC, The Netherlands, rep.,
Jan.
2019.
Available:
https://vmc.ai/wp-content/
uploads/2019/01/whitepaper.pdf
[39] T. Nguyen, J. Partula, S. Pirttikangas, “Blockchainbased Mobility-as-a-Service,”, University of
Oulu,
Finland, Conference Paper, rep., May 2019. Available:
https://www.researchgate.net/profile/Tri_Nguyen43/
publication/333343145_Blockchain-based_Mobility-as-aService/links/5ce7e298a6fdccc9ddcabb45/Blockchain-basedMobility-as-a-Service.pdf
Competing Interests:
None declared.
Ethical approval:
Not applicable.
Author’s contribution:
SJH designed and coordinated this research and prepared the manuscript
in entirety.
Funding:
None declared.
Acknowledgements:
SJH would like to thank his colleagues at the TravelSpirit Foundation
and Iconic Blockchain for their support and encouragement over the
past 2 years, in particular to David Alexander, Giles K Bailey, Justin
Coetzee, Mike Fitzgerald, Dr Pieter J Fourie, Bren Hutchinson, Dr
Maria Kamargianni, Nathan King, Rob Mann, Gary Parkinson and
Yangbo Du. Also, special thanks to Johan Muller and Warren Hewitt
at the Greater Tygerberg Partnership and Mark Rathbone at Brabners
LLP.
81
jbba
the
analytical essay
A Review of fast-growing
Blockchain Hubs in Asia
OPEN ACCESS
ISSN Print: 2516-3949
https://doi.org/10.31585/jbba-2-2-(5)2019
Yu Wang, Jing Ren, Caroline Lim, Swee-Won Lo
School of Business, Singapore University of Social Sciences, Singapore
Correspondence: carolinelimsl@suss.edu.sg
Received: 28 June 2019 Accepted: 26 July 2019 Published: 9 August 2019
Abstract
The unique combination of social and economic factors has brought about a dynamic and rapidly-evolving
blockchain ecosystem in Asia. This paper systematically reviewed the development of four fast-growing
blockchain hubs in Asia, namely China, Japan, Singapore and South Korea using secondary data sources.
These countries are fast-growing based on the development of its digital, technological and regulatory
infrastructure, patent applications, cryptocurrency trading volume and Initial Crypto-token Offerings (ICOs)
activities. The review included insights into the different regulatory approaches, the blockchain startup
scenes, selected enterprise or government-backed projects, as well as the research and educational landscape.
Our findings suggested that the regulators, industry players, and academic institutions were purposeful and
deliberate in nurturing blockchain technology innovation. Future development would be dependent on the
regulatory, technological, as well as talent capability support unique to each blockchain hub.
Keywords: : blockchain, cryptocurrency, regulation, fintech, ICO
JEL Classifications: D02, G18, H11, O20, O32, O50
1. Introduction
support, funding, and investment capital.
The blockchain technology, with its properties that
distributes, disintermediates and decentralises, enables
value to be unlocked for peer-to-peer exchange. This
distributed ledger technology (DLT) can enforce
“trust” such that a mutually distrusting community can
collaborate and consent to a single version of the truth,
which implies trade and exchange can occur between
parties not known to each other.
Literature in the inter-organisational relationship,
including innovation and knowledge hubs, can be
parsimoniously organised into two paradigms – network
versus dyadic. Organisations in a network paradigm
developed long-term and trusting relationships that
were mutually reinforcing, and behaviours followed
socially accepted norms. Organisations in a dyadic
paradigm were opportunistic and sought to “maximise
cooperation and minimise conflicts” [2].
These features of blockchain have enabled applications
across different industries. Besides applications in
trade, stocks and securities exchange, banking and
finance, insurance, telecommunications, voting, health
care, government administration, social networking
and more, the blockchain technology holds promise to
financial integration and inclusion [1]. The potential of
blockchain is immense.
This paper is a systematic review of the development
and application of blockchain in four Asian countries
- China, Japan, Singapore and South Korea. These four
countries have leveraged the entrepreneurial fervour
and intensity of activities to shape themselves into
blockchain hubs, evidenced by our analysis of their
respective technological infrastructure, regulatory
The JBBA | Volume 2 | Issue 2 | October 2019
As technology hubs serve the community in addition
to organisational interests, we adopt the network
paradigm in our definition of a hub. We define a
hub as a locus of innovation and entrepreneurial
activities that fuels the local economy as coordinating
firms collaborate & develop capabilities supported
by different enablers. The literature described a
financial technology (“FinTech” in short) hub to be
characterised by sufficiently mature and developed
technology infrastructure, availability of talented and
receptive workforce (including investors, technologists,
financiers), established regulatory support (e.g.,
favourable tax rates), involvement of the academia,
government and enterprises in applied research and
investment (e.g., accelerators, incubators, mentorship
83
jbba
the
and seed funding), and a demand for FinTech (e.g.,
large volume of daily financial transactions, the need
to enhance consumer experience and improve business
efficiency, and the need for financial inclusion)[3].
A critical difference between FinTech and blockchain
is that the latter can be applied beyond the financial
industry. Blockchain allows parties with natural mistrust
to collaborate and consent to a single version of the
truth, thereby boosting business efficiency where crosscompany and cross-industry collaborations are needed;
it also holds promise to financial and social inclusion
[1]. With these in mind, we propose the enablers of
a blockchain hub to include the innovator group,
infrastructure readiness and programme, availability of
funding and capital, and the existence of demand for
blockchain applications.
As one of the emerging new technology, blockchain
drew investments in research and development of
large technology firms and technology startups. We
termed these technological firms and technology
startups as innovator group. The innovator group
represented technical capabilities to advance the
development and application of blockchain. Funding
and capital reflected the willingness and capabilities
of individual and institutional investors to support
technological development, especially for a relatively
new and less-understood technology like blockchain.
Infrastructure readiness and programme would
facilitate the development of new and innovative
technology. Apart from network and technology
readiness, a friendly regulatory environment and
availability of skilled talent pool would encourage and
facilitate technological innovations. The economic and
socio-ecological contexts could generate demand for
blockchain applications; a politically stable economic
environment could serve as a landing for blockchain
projects addressing trust issues between and across
partners. Similarly, the socio-ecological contexts could
provide the impetus for financial and social inclusion.
This review intends to improve the understanding of
blockchain development in different jurisdictions and
contribute to current literature about blockchain in the
Asia region. In the subsequent section, we explained
the rationale of selecting the Asian countries, namely
China, Japan, Singapore, and South Korea. In the
third section, we analysed and compared the status
of blockchain development in each country and intercountry. We concluded this paper with a discussion on
the implications for future research and practice.
2. Scope of Review
In this section, we explained the selection criteria of
the four countries in Asia, beginning with a description
and analysis of four key enablers of a blockchain
hub namely innovator group, infrastructure and
The JBBA | Volume 2 | Issue 2 | October 2019
programme, funding and capital, and demand.
2.1. Innovator Group
The actors in a network were central to the activities
of a blockchain hub. These actors included large
technology firms, blockchain startups and related
technology unicorns who drew venture capital and
drove spending in research and development (R&D).
As of July 2018, China, Japan and South Korea
were three Asian countries with the most number of
Global 500 companies in the top ten of Fortune 500.
Companies in Global 500 included large technology
firms with research and investments in blockchain
projects. In China, 46 of the 120 companies were
involved in blockchain development representing
sectors like banking, energy, IT, and motor. Japan’s Sony
and Fujitsu were also actively involved in blockchain
projects. Almost all of the South Korea IT and motor
companies in the Fortune 500, like Samsung, LG,
and Hyundai, were exploring their own blockchain
platforms.
Following the statistics of total blockchain-related
patents filed globally by IPR Daily and Cintelliq, China
filed the highest number of blockchain patents (41%),
followed by the United States (32%)i. As of August
2018, Chinese companies occupied more than half of
the top 100 companies globally for patents application
on the blockchain (57 out of 100). Technology firms
among them included Alibaba of China, Sony and
Fujitsu of Japan and Coinplug of South Korea. The
European Patent Office (EPO) showed a steady
increase in patents granted normalised by population
between 2009 to 2018 from countries like China,
Japan, and South Korea. The year-on-year change of
these three Asian countries over the period exceeded
the figures reported for thirty-eight member states of
EPO (including 28 states of the European Union).
Investment in blockchain startups represented the
market expectation for blockchain development in
the long-term. As of 31 March 2019, there were 333
technology unicorns worldwide between 2010 to 2019ii.
Among them, more than one third (124) originated
from Asia, of which China accounted for 89 unicorns.
Another 15 unicorns originated from India, eight from
South Korea, five from Indonesia, two from China
SARiii Hong Kong, one each in Japan and Singapore.
Nine unicorns among them were blockchain-based in
the areas of FinTech and cryptocurrency. These nine
unicorns included six from China (e.g., Bitmain, Tiger
Brokers), two from India (One97 Communications,
PolicyBazaar), one from South Korea (Viva Republica).
In China, where the regulation prohibited fund-raising
through initial crypto-token offering (ICO), technology
firms would become one of the main funding sources
for blockchain startups.
84
jbba
the
National spending on research and development
(R&D) fueled the growth of the innovator group.
According to data from the UNESCO Institute of
Statistics published by the World Bank, high-income
countries spent on average 2.36 per cent of GDP on
R&D for science and technology between 2000 to
2016iv. Across countries in Asia, Japan’s R&D spending
had consistently exceeded the average figure of highincome countries. The same index in South Korea
rose steadily since 2000 to more than double that of
high-income countries from 2012 onwards. Singapore’s
R&D spending as per cent of GDP approximated close
to high-income economies. China, on the other hand,
did not perform close to other high-income countries
on this index, but its R&D spending rose significantly
from 0.89 per cent in 2000 to 2.11 in 2016. Other Asian
countries performed below average relative to the rest
of the world or when compared against high-income
economies.
2.2. Infrastructure and Programme
The critical determinants of a blockchain hub
included both digital and regulatory infrastructure of a
country. We reviewed the digital infrastructure in two
aspects, namely the network readiness and technology
readiness. The World Economic Forum published the
Global Information Technology Reportv to assess the
state of network readiness of 139 economies from the
annual executive opinion survey. The index evaluated
the quality of regulatory and business environment,
information and communications technology
(ICT) readiness in terms of affordability, skills and
infrastructure, the role of the government, business
sector and population as well as the environment,
readiness and usage. Countries in Asia, including
China, Malaysia, Mongolia, Sri Lanka, and Thailand,
demonstrated steady improvements from 2012 to
2016. Across the drivers of network readiness in 2016,
Singapore performed better than other advanced
economies in business and innovation environment,
skills, government usage, and social impacts. Taiwan
performed the best in mobile network coverage and
internet bandwidth infrastructure. Singapore was
ranked first in 2015 and 2016; Japan was the other Asian
country ranked in the top 10 of network readiness; the
others in top 10 were made up mostly of European
countries. Meanwhile, South Korea hovered around
10th to 13th position between 2013 to 2016 and was
ranked 13th in the most recent published ranking.
We further referenced the technological readiness
ranking of eighty-two countries published by The
Economist Intelligence Unit (EIU) as part of their
medium- and long-term forecasts of the world’s
largest economies. The EIU assessed performance
across three categoriesvi: access to the internet, digital
economy infrastructure and openness to innovation.
The index ranked each country for the historical
The JBBA | Volume 2 | Issue 2 | October 2019
period from 2013 to 2017 and forecasted change in
performance for the period 2018 to 2022. Countries
in Asia ranked in the top 10 included Singapore, Japan,
South Korea, and Taiwan. Meanwhile, EIU forecasted
improvements in technological readiness for these four
countries/region and Hong Kong. In particular, the
forecast projected Singapore to be ranked similarly to
Australia and Sweden in technological readiness by the
period 2018-2022.
Besides technological readiness, a workforce that
was ICT-enabled, trained and skilled in blockchain
development would more effectively contribute to
the completion of innovative blockchain projects.
According to the Global Startup Ecosystem Report
[12], cities such as Beijing, Shanghai, Singapore,
Bangalore, and Hong Kong possessed high-quality
technology talents (such as top developers on GitHub
and software engineers) that were relatively inexpensive
compared to the US and European countries.
Workforce policies that encouraged science, technology,
engineering and mathematics (STEM) training as well
as lifelong learning in related skills and knowledge
enhanced the adoption and development of blockchain
technology. Preliminary results by the OECD reported
that workforce capabilities and training received were
associated with higher digital adoption, such as in
cloud computing technology [4].
According to another OECD survey of adults aged
between 16 and 65 in 35 economies in 2012 and 2015
Singapore (62%) and South Korea (60%) performed
above the OECD average (55%) for adult participation
rates in structured training. In the same survey, Japan
performed below the OECD average.
Apart from workforce policies, lower regulatory costs
and simplified compliance procedures would expedite
the process of starting a business, and these would be
attractive factors for blockchain startups. As of 2018,
the shortest time needed to start a business was in
Hong Kong (1.5 days), Singapore (2.5 days), South
Korea (4 days), Thailand (4.5 days), and Sri Lanka (9
days). In contrast, Cambodia took the longest time (99
days), followed by Laos (67 days), India (29.8 days),
Philippines (28 days), China (22.9 days), and Vietnam
(22 days).
On the other hand, the cost of business startup
procedure (in per cent of gross national income per
capita) including all official fees and legal costs was the
lowest in Singapore (0.5%), followed by China (0.6%),
Brunei, Hong Kong (1.1%), and Mongolia (1.4%) [5].
2.3. Funding and Capital
Funding and capital played an essential role in fueling
the growth of blockchain startups and thus, the
85
jbba
the
development of blockchain technology. Blockchain
startups commonly raised funds through loans,
donations, traditional venture capital, and ICOs [6].
Among them, ICO represented a unique fundraising
method as it allowed blockchain startups to raise
funds from the community at a relatively early stage.
The value of ICO reflected the financial support that
blockchain startups might receive and the size of the
blockchain community within a region. In Asia, Hong
Kong and Singapore were popular destinations for
many blockchain entrepreneurs considering ICOs,
after the prohibition of ICOs in mainland China and
South Korea. As of October 2018, 8.14 per cent of
ICOs globally occurred in Singapore and 2.81 per cent
in Hong Kongvii. Vietnam and Japan led in the traffic
to ICO listing websites globally, followed by the US
and the United Kingdom. Other countries among the
top 10 were China and South Korea [7]. Search volume
from Google Trends suggested Asian countries and
regions like China, South Korea, Singapore, and Hong
Kong, to be among the top 10 worldwide for ‘ICO’ viii.
By the volume of venture capital and private equity
activities, Hong Kong, Japan, and Singapore were
among the most attractive countries/regions for
venture capital and private equity globally. They were
ranked 4th, 5th and 6th respectively, after the US, UK
and Canadaix. Other Asian countries in the top 30 list
included Malaysia, China, South Korea, Thailand, and
India.
The trading volume of Bitcoin served as another
indicator for the scale of capital in the country; an
indicator of the cryptocurrency market that drew
investors’ attention. Asia accounted for almost a third
of cryptocurrency transactions globally. According to
LocalBitcoins.com, a decentralised bitcoin exchange
website, the trading volume was US$6.3 billion in July
2018, of which Asia contributed 32.8 per cent of the
global volume of bitcoin traded [8]. Furthermore,
statistics of the most-traded national currencies for
bitcoin showed a consistent trend - Japanese Yen
accounted for around 40 per cent of the global total
bitcoinx volume, second to only US Dollar, with
national currencies of other Asian countries such as
South Korea, Indonesia, Thailand, Singapore, and
Vietnam also among the top 20.
2.4. Demand
We proposed the demand for DLT as another
enabler of a blockchain hub. Demand could stem
from an economic infrastructure where multinational
organisations converge as well as the socio-ecological
landscape. DLT solved trust in digital asset transactions
between businesses or between businesses and
consumers without a central administrator [9].
The JBBA | Volume 2 | Issue 2 | October 2019
The economic infrastructure of a country that
would stimulate demand for blockchain applications
included countries with active participation in the
global production networks. We considered the
global value chain participation since that reflected
the relative positions of different economies in the
global production networks. Forward or backward
participation ratios measured each country’s
participation in the global value chain. Forward
participation ratio measured participation through
the supply side, i.e., the extent that “an economy’s (or
economic sector’s) locally generated value-added was
embedded in the production of other economies” [5].
Backward participation ratio measured participation
through the demand side and “denotes the foreign
value-added contribution to an economy’s (or
economy-sector’s) exports” [5].
In Asia, Singapore led in the use of foreign inputs
in the production of its exports, with a backward
participation ratio of close of 60 per cent, followed by
Vietnam, Taiwan (China), South Korea, and Malaysia.
Brunei took the pole position in forward participation
ratio at slightly more than 80 per cent, followed by
Laos, Indonesia, Philippines, and Malaysia [5].
The need to resolve trust issues to boost efficiency and
save cost through dis-intermediation using blockchain
applications would emerge from countries with foreign
direct investments (FDI). In 2017, the top three
recipients of FDI in Asia was China, Hong Kong, and
Singapore, followed by India, Indonesia, Japan, South
Korea, Vietnam, and the Philippines [5].
A significant population of the working class in Asia
earned their living outside of their home countries and
remitted their earnings back to their home countriesxi.
In 2017, countries in the Asia Pacific region received
US$266 billion in remittances [5]. Globally the top
three remittance recipient economies were in Asia,
namely India, China, and the Philippines. There were
two pain points to be addressed – trusted peer-topeer funds transfer and remittance fees. Firstly, a large
population in Asia were unbanked, although a majority
of them owned mobile phones connected to a 3G or
4G network [10]. Secondly, the average cost of crossborder remittance fees for sending US$200 remained
high at seven per cent [11].
The socio-ecological context supported by a
favourable regulatory environment and well-developed
technological infrastructure laid the foundation for
blockchain projects that would boost production
efficiency or solve financial inclusion within the
economy as well as the neighbouring region.
2.5. Rationale
Using national spending and patents filed as measures
86
jbba
the
for the impact of the innovator group, countries like
China, Japan, Singapore, and South Korea, performed
better than other Asian countries. Moreover, China
had the highest number of technology firms and
technology unicorns. Technology firms provided
alternative funding sources for blockchain startups.
While China’s regulation prohibited cryptocurrency
trading and ICOs, trading volume in bitcoin and other
cryptocurrencies were high in Asian countries or
regions like Hong Kong, Indonesia, Japan, Singapore,
South Korea, Thailand, and Vietnam. Activities and
interest in ICOs were also high. Drawing parallel from
investment trends reported in Europe, investors would
likely invest more in ICOs in investment destinations
that appealed to VC and PE funds; destinations
included China, India, Japan, Malaysia, Singapore,
South Korea, and Thailand [12].
The readiness of technological infrastructure and
programmes were critical to support innovation in
blockchain technology. Singapore, Japan and South
Korea led in technological readiness evident from
our earlier analyses. Additionally, China, South Korea,
Japan and Singapore were ranked in the top 10 by the
2018 Global Digital Economy Development Index
that assessed the overall digital economy development
in more than 150 countries and regions worldwide [13].
The enabling factors of a hub namely the availability of
talent pool in the innovator group, funding and capital,
infrastructure and programme as well as demands
for business efficiencies or financial inclusion, allow
blockchain projects to flourish. From the performance
of these enablers, we identified China, Japan, Singapore
and South Korea to be fast-growing blockchain hubs in
Asia relative to other countries in the region.
3. Analysis by Country
We analysed the status of blockchain development
in these four countries from four aspects: regulations
and standards, characteristics of blockchain startups,
enterprise- and government-backed blockchain
projects, and research.
We extended our study of regulations to those for
cryptocurrencies-related activities such as ICOs
and cryptocurrency exchanges, to present a more
comprehensive view of the state of blockchain in
the country. Given alternative supporting resources
through retail and institutional investors, enterprises,
or the government, we conceded that the prohibition
or absence of regulations for ICOs or cryptocurrency
exchanges did not imply the lack of support for
blockchain projects.
3.1. China (Mainland)
3.1.1.
Regulations and standards
The JBBA | Volume 2 | Issue 2 | October 2019
With the support of the Chinese government and
available skilled workforce, the digital economy
was a primary driver of economic growth in China
contributing 30.3 per cent of China’s GDP [14]. Before
the state intervention on cryptocurrency trading,
Chinese investors invested heavily in cryptocurrencies
without knowledge of the market nor the underlying
mechanism [15].
To mitigate financial risks brought about by the
volatility of Bitcoin and cryptocurrencies, seven
authorities in China issued a joint announcement in
September 2017 to prohibit onshore and offshore
platforms related to ICOs and cryptocurrency trading
[16]. Nevertheless, the prohibition did not extend to
the development of bitcoin’s underlying technology
– blockchain. Instead, the Chinese government took
the lead in advocating the development of blockchain
technology through a series of initiatives. In December
2016, the State Council of China included for the first
time blockchain technology in the 13th Five-Year Plan
to build a national strategic technological advantage. In
June 2017, the central bank of China, People’s Bank
of China (PBoC), expressed their intent to promote
research and application of advanced technologies
such as blockchain and artificial intelligence (AI) in the
five-year development plan for the financial industry
[17]. Four months later, the Ministry of Industry
and Information Technology (MIIT) released a
white paper on China’s Blockchain Technology and
Application Development, the country’s first official
guidelines on the blockchain. Additionally, the State
Council issued a mandate to the local government to
accelerate the development of technologies, including
blockchain in May 2018 [18]. Most recently in April
2019, the regulator, Cyberspace Administration of
China, endorsed 197 blockchain service providers; the
endorsement gave confidence to the industry for the
deployment of their services.
To nurture this vibrant technology and innovation
hub, the Chinese government further introduced
regulatory guidelines for technology applications. A
FinTech committee was set up by PBoC to strengthen
the application of RegTech (regulation technology that
addresses regulatory challenges in financial services
using innovative technologies such as big data, AI, and
blockchain) [19]. FinTech startups, namely Gingkoo
and PeerSafe, have introduced regulatory frameworks
and solutions on blockchain for domestic government
and banks.
3.1.2. Blockchain startups
Despite the prohibition of ICOs, new blockchain
companies in China outnumbered that of the US in
2016; these Chinese blockchain startups accounted for
28 per cent of new startups globally [20]. Furthermore,
as at the end of 2017, China submitted the most
87
jbba
the
patent applications for blockchain with 550 patent
submissions, nearly twice that of 284 applications from
the US [21].
There were over 400 blockchain startups in China
as of March 2018, according to data from ITJuzi
and BlockData. Instead of blockchain solutions,
infrastructure and social media, the majority of
Chinese blockchain companies focused on technology
applications for the financial industry, and on traditional
economic sectors like: agriculture, manufacturing,
supply chain and logistics. Seventy-eight per cent of
these operated out of Beijing, Shanghai, Shenzhen, and
Hangzhou, which suggested an agglomeration effect.
Wanxiang Blockchain Labs, a non-profit research
institution funded by China Wanxiang Holding setup
the first blockchain research centre in Shanghai in 2015
to pioneer research, development, and application of
the technology. Projects like Bubi Chain and Juzix
worked on developing blockchain infrastructure to build
the ecosystem. In the meantime, many startups have
proposed blockchain-based commercial platforms to
solve real-life issues. For example, Qulian Technology
provided enterprise-level blockchain products and
application solutions such as supply chain finance and
traceability, digital certificate, and energy assets.
3.1.3. Enterprise- and government-backed projects
While startups experimented with new and novel
ideas associated with blockchain, existing industry
leaders explored potential solutions using blockchain
technologies. The three Internet tech giants in China,
Baidu, Alibaba and Tencent (collectively known as
BAT), have started projects related to blockchain.
Baidu became a member of an open source industry
blockchain initiative named Hyperledger in October
2017. Baidu has launched its blockchain-as-aservice (Baas) platform, and Alibaba has successfully
applied blockchain in areas such as healthcare and
e-commerce. Alibaba built a supply chain tracking
system using blockchain technology together with PwC
in March 2017. In the same year, Tencent invented the
TrustSQL platform to develop blockchain applications
and provide enterprise service solutions. Tencent
established the first digital private bank in China,
WeBank. Blockchain Open Source (BCOS) platform
was the first commercial blockchain technology
platform to be introduced in China jointly by Wanxiang
Blockchain Labs and WeBank. Ant Financial, the
financial affiliate of Alibaba, and Baidu published
a white paper to illustrate their blockchain strategic
roadmap in 2018. Besides BAT, other corporations
like Huawei, Xunlei and JD.com (logistics tech giant)
have incorporated blockchain into their firms’ strategic
plan and released white papers related to blockchain
projects.
The JBBA | Volume 2 | Issue 2 | October 2019
To support blockchain startups, the municipal
governments of Chinese cities launched blockchaindedicated funds. Example, Xiong’An Global Blockchain
Innovation Fund equivalent to US$1.6B was launched
in Hangzhou in April 2018 , and a district government
of Nanjing city launched another blockchain fund of
US$1.4B in July 2018xii.
3.1.4. Research
Research in technology has been a focal area for the
Chinese national and local government bodies. The
volume of blockchain related publications and the
number of research institutes increased rapidly in 2016.
The number of blockchain research institutes that
opened in the first four months of 2018 was equivalent
to those that opened in the whole of 2017, which
was three times the number in 2016 [22]. Apart from
the government-led independent research institutes,
corporations and universities established more than 90
per cent of the research institutes in China.
In 2017, the PBoC launched the Digital Currency
Research Institute that focused on the development
and research of digital currencies. So far, the Institute
had filed more than 63 patent applications, according
to China's State Intellectual Property Office (SIPO)
[23, 24]. Its ultimate goal is to introduce a state-backed
virtual currency that would combine blockchain-based
cryptocurrencies with the existing monetary system.
3.1.5. Hong Kong
Hong Kong has been zoned a special administrative
region compared to other cities in China mainland.
Under the “one country, two systems” constitutional
principle, Hong Kong maintained its own governmental
system, legal, economic and financial affairs, including
trade relations with foreign countries. This separate
constitution enabled Hong Kong to play a vital role in
promoting blockchain development in China and even
the rest of Asia.
The Hong Kong government defined cryptocurrencies
as “securities”, similar to that of the US Securities
and Exchange Commission (SEC). ICOs and
cryptocurrency came under the Securities and Futures
Commission (SFC). In November 2018, SFC defined
a regulatory framework for trading, managing and
distributing cryptocurrencies [25] which would
facilitate the maturity of the regulatory framework in
the long run for digital assets.
Meanwhile, the Hong Kong government supported
the development of blockchain technology and related
projects. As early as November 2016, the Hong Kong
Monetary Authority (HKMA), jointly with Hong Kong
Applied Science and Technology Research Institute
(ASTRI), released a technical white paper on DLT. In
88
jbba
the
the same month, HKMA-ASTRI FinTech Innovation
Hub was launched to provide a neutral ground for
the FinTech industry and startups in Hong Kong
[26]. Later in March 2017, HKMA and seven banks
commercialised a blockchain-based trade finance
platform which was officially launched by HKMA on
31 October 2018, named “eTradeConnect”. Developed
by a consortium of twelve major banks in Hong Kong
including HSBC and Standard Chartered Bank [27],
eTradeConnect aimed to improve trade efficiency,
improve trust among trade participants, reduce
risks and facilitate trade counterparties by leveraging
digitalisation and blockchain technology.
HKMA collaborated with other regions and countries,
including Singapore and Abu Dhabi. HKMA and
Monetary Authority of Singapore (MAS) have signed
and exchanged a Co-operation Agreement in 2017 to
strengthen co-operation on FinTech [28] such as the
Hong Kong Trade Finance Platform (HKTFP), an
HKMA-led trade finance proof-of-concept based on
DLT. In June 2018, HKMA worked with regulators
in Abu Dhabi to develop a cross-border trade finance
system using DLT [29]. These collaborative initiatives
revealed the economic, technological and geographical
advantages and capabilities of Hong Kong in the
development of blockchain.
Besides government-run FinTech and blockchain
projects, financial institutions, research centres and
various startups have landed their projects in Hong
Kong. Example, Ant Financial of Alibaba Group
joined GCash of Philippines to launch the world’s first
blockchain-based remittance service built on Alipay
blockchain technology [30]. The Bank of China Hong
Kong developed a blockchain-based system for real
estate appraisals to avoid mortgage fraud [31]. Over 20
various FinTech startups emerged from Hong Kong.
Example, startup Crypto.com released Asia’s first
cryptocurrency Visa card in Singapore in September
2018 and subsequently in the US in November.
Blockchain research centres or laboratories by Deloitte
and China Blockchain Application Research Centre
were established in Hong Kong. Hong Kong University
of Science and Technology received US$20 million
research grant for blockchain payment system. To
attract blockchain talents, the Hong Kong government
effected special immigration policy to expedite
immigration for job seekers with blockchain expertise.
It released a talent list on 28 August 2018 for eleven
professions including blockchain technology [32]. The
Hong Kong’s Quality Migrant Admission Scheme
(QMAS) that administered points-based tests for job
seekers in Hong Kong accorded lower entry barrier to
those with blockchain expertise.
3.2. Japan
3.2.1. Regulations and standards
The JBBA | Volume 2 | Issue 2 | October 2019
Japan was the first country that recognised bitcoin as a
legal payment option and has a national system to regulate
cryptocurrency exchanges. A cryptocurrency exchange
registered with the Financial Services Agency (FSA)
of Japan was considered a legitimate entity in Japan.
To-date, there were sixteen approved cryptocurrency
exchange operators in Japan and cryptocurrencies on
these exchanges could be exchanged for fiat monies or
alternative cryptocurrencies. Basic guidelines for ICOs
that focused on investor protection and anti-money
laundering were released by a research group led by
academics at Tama University [33, 34]. Still under
deliberation by the FSA, many anticipated that these
guidelines would eventually pass as a law in Japan.
The regulatory landscape in Japan for cryptocurrency
exchanges and ICOs paved a promising future for
the development of blockchain projects. In 2016, the
Ministry of Economy, Trade and Industry (METI)
engaged Nomura Research Institute to survey domestic
and international blockchain applications [35]. As
an outcome of the survey, METI published the first
version of evaluation templates to assess blockchain
applications and completed the first evaluation for
blockchain applications in healthcare, supply chain
& logistics, and smart property in 2018 [36, 37].
The process uncovered legal and technical issues of
blockchain applications for respective industries.
3.2.2. Blockchain startups
Compared to the exponential growth in bitcoin trading,
the number of blockchain ventures in Japan was small
relative to other regions in Asia. In 2016, among the
167 FinTech startups in Japan, there were only 20
blockchain-related businesses [38]. This phenomenon
in Japan could be attributed to the stronger public
sentiment on the use of bitcoin for official payment
than the application of the underlying blockchain
technology.
Nevertheless, the blockchain startup scene in Japan
was encouraging with generous support from the
Japanese government. In 2017, METI sent three
blockchain startups to the US as part of the Silicon
Valley-Japan Bridge Project [39]. In the private sector,
major industry players or financial institutions have
announced investment funds, incubators or coworking space for blockchain startups. For example,
SBI Holdings, a global rank-1 corporate blockchain
investor, invested approximately US$460 million in AI
and blockchain fund [40]. Mizuho Financial Group,
one of the three major financial institutions in Japan,
sponsored Neutrino, the first blockchain co-working
space in Japan [41]. In short, blockchain startups in
Japan received assistance and mentorship from the
government, enterprises and large financial institutions.
Foreign startups in Japan had similar access to funding,
facilities and advice on regulatory matters [42].
89
jbba
the
3.2.3. Enterprise- and government-backed projects
Enterprise-backed projects in Japan focused on
building applications in financial services and supply
chain. The Japan Exchange Group, Inc. (JPX) tested
the streamlining of processes in the securities market
and ownership registry through a proof of concept
(POC) with six other financial institutions in Japan
[43]. NTT Data, one of the largest information
technology companies, collaborated with Mitsubishi
UFJ Financial Group (MUFG) and Singapore’s
National Trade Platform to launch a blockchain POC
that would foster trade between Singapore and Japan
[44]. With Skuchain, NTT DATA developed a business
collaboration platform for Japanese manufacturers to
boost supply chain efficiency [45].
The three financial institutions in Japan have
implemented blockchain projects to streamline trading,
payment, and other financial services. Mizuho Financial
Group and Sumitomo Mitsui Financial Group (SMFG)
respectively launched blockchain to streamline trade
transactions [46,47]. On the other hand, MUFG
introduced its MUFG Coin for commercial and retail
customers, as well as to incentivise its employees to
reduce overtime hours for healthier lifestyles [48].
At the government level, Japan’s New Energy and
Industrial Technology Development Organisation
(NEDO) under the instructions of METI, worked
on several blockchain-based projects. Among them
included the use of internet-of-things (IoT) to
streamline infrastructure for trade information sharing,
where NEDO operated in partnership with NTT Data.
The Ministry of Internal Affairs and Communications
explored the application of blockchain solution to
process government tenders and introduced a roadmap
for incorporating DLT in e-government services in
2018 [49].
The Blockchain Study Group, established by Deloitte
Japan, Mizuho Financial Group, SMFG and MUFG,
promoted blockchain adoption and education. The
focus of this study group was to conduct studies
on interbank payment and a Know-Your-Customer
advanced platform. The Japan Blockchain Association
facilitated collaboration and conversations between
blockchain startups and the Japanese government.
Other associations such as the Japanese Bankers
Association whose members comprised banks, bank
holding companies and bankers’ association analysed
the implementation of blockchain for financial services
[50].
3.2.4. Research
Major financial institutions and universities led the
blockchain research and development landscape
in Japan. In April 2016, the Bank of Japan (BOJ)
The JBBA | Volume 2 | Issue 2 | October 2019
established the FinTech Centre in its Payment and
Settlement Systems Department [51]. The BOJ
conducted a joint research project entitled “Stella” with
the European Central Bank (ECB). The Stella project
evaluated the performance of using Hyperledger
Fabric to facilitate large value payments and the
“delivery versus payment” environment using single
and cross-ledger platforms, respectively [52,53]. In
academia, Japan has five university nodes in the BSafe.
network that promoted scientific and interdisciplinary
social and economic research [54]. In addition, the
more notable academic initiatives include the teaming
of University of Tokyo and University of Aizu with
two industry organisations to study smart currency
[55], the establishment of BASE Alliance between
Keio University and University of Tokyo [56], and the
establishment of Blockchain Research Lab at Kyushu
Institute of Technology [57].
3.3. Singapore
3.3.1. Regulations and standards
A confluence of factors – global financial centre, publicprivate partnerships, engagement and consultation,
public education – had shaped Singapore’s emergence
as a leading technological hub of the world.
On the regulatory front, MAS, the central bank of
Singapore, adopted a nurturing stance of regulation,
one that was conciliatory but strict. In 2016,
MAS introduced a “regulatory sandbox” to foster
experimentation of innovative business models for
financial institutions and FinTech companies [58].
The MAS did not regulate Crypto-tokens, digital tokens
or virtual currencies. Instead, the MAS regulated
activities on the use of virtual currencies that would fall
under the regulator’s ambit, such as money laundering
and terrorism financing. Digital tokens structured like
securities in ICO, also known as equity tokens, must
satisfy the requirements of the Securities and Futures
Act (SFA). Cryptocurrency exchanges were regulated
under the SFA by the MAS when such exchanges
allowed the listing and trading of digital tokens.
Although the MAS had not issued specific legislation
related to ICOs, it monitored activities and
developments in the space carefully. Example, MAS
issued a directive and warning to an ICO issuer to
terminate its digital tokens offering in May 2018 as
MAS assessed those digital tokens to represent equity
ownership and they failed to satisfy SFA requirements
[59].
To upskill the workforce in digital skills and promote
lifelong continuous learning, Singapore’s Ministry
of Education launched a nationwide SkillsFuture
Initiative. This Initiative provided subsidies on
training and courses, including courses on blockchain.
90
jbba
the
Singaporeans and permanent residents received up to
seventy per cent in fee subsidy and to a maximum of 90
per cent subsidy for those aged above 40. Institutions
of high learning and industry associations including
local autonomous universities each undertook a
digital skill including blockchain, to lead in capability
development.
3.3.2. Blockchain startups
There were 270 FinTech startups, including blockchain
startups in Singapore [60]. Blockchain startups spanned
across industries from the supply chain and logistics,
social networking, FinTech, insurtech, gaming [61].
This year-to-date, Singapore was ranked third at 8.14
per cent relative to the world’s total ICO projects after
the US and UK [62,63]. The conducive regulatory
environment, open and transparent business practices
as well as the availability of skilled workforce,
contributed to making Singapore an appealing hub for
blockchain innovators and startups.
3.3.3. Enterprise- and government-backed projects
There were multiple prototypes, and POCs announced
and implemented by consortia of conglomerates.
In 2016, Bank of America Merrill Lynch, HSBC
and the-then Infocomm Development Authority of
Singapore built a POC to streamline the paper-based
import/export documentation using the Hyperledger
blockchain. PSA International, IBM Singapore and
Pacific International Lines collaborated in August
2017 to develop a trial for blockchain-based supply
chain business network solution. Singapore Airlines
completed its POC in early 2018 for the world’s first
blockchain-based airline loyalty digital wallet that would
allow frequent flyers to instantly convert air miles into
loyalty tokens.
Besides investments by the private sector, “Project
Ubin” by MAS jointly with the network of financial
institutions, was launched to improve transparency
and efficiency of clearing and settlement of payments
and securities with DLT. To-date, “Project Ubin” had
completed software prototypes of three different
models of decentralised inter-bank payment and
settlements.
3.3.4. Research
To stimulate research and development in the use of
technology to improve quality of life and enhance
economic opportunities, the government of Singapore
set aside US$14 million under the Research, Innovation
and Enterprise 2020 plan [64].
In addition, IBM centre for blockchain innovation
(ICBI) that was opened jointly with Singapore’s
Economic Development Board (EDB), worked with
The JBBA | Volume 2 | Issue 2 | October 2019
government agencies, academia and other industry
players to advance Singapore’s contribution to FinTech
innovation and facilitate the adoption of blockchain
technology for finance, trade and commerce as well as
develop the local workforce capabilities [65].
The National University of Singapore established
an academic research laboratory and think tank for
blockchain technology, CRYSTAL (cryptocurrency
strategy, techniques and algorithms) Centre [66]. The
Singapore University of Social Sciences FinTech &
Blockchain Group bridged academia and industry to
build and develop capabilities and skills in FinTech and
blockchain through the twin engines of education and
research that would realise financial integration and
inclusion objectives.
As a blockchain hub, there were open dialogue and
exchanges between regulatory, government and
industry bodies in Singapore. Furthermore, voluntary
and self-regulatory groups like Singapore FinTech
Association, ACCESS (Association of Cryptographic
Enterprises and Startups, Singapore) and BEST
(Blockchain Enterprise and Scalable Technologies)
Association, actively promoted the exchange of
knowledge and best practices to advance the industry.
3.4. South Korea
3.4.1. Regulations and Standards
The government of South Korea supported
the development and application of blockchain
technology and have announced plans to invest over
US$900 million into blockchain initiatives by 2019.
There were six pilot projects in the initiatives, including
livestock history management, personal customs
clearance, simple real estate transactions, online voting,
international electronic document distribution, and
maritime logistics [67]. To accelerate growth through
innovation, the government announced plans to revise
the existing tax regime that would motivate companies
to focus on nascent technology development, like
blockchain [68]. The strategy of the South Korean
government was to construct an “Encrypted Valley”
for the global blockchain industry in Industry 4.0.
The Korean Financial Services Commission (FSC)
confirmed the prohibition of ICOs in January 2019.
When the Korean Financial Investment Association
established Korea's first blockchain alliance at the end
of 2016, South Korean investors participated actively in
cryptocurrency transactions and ICOs until September
2017. Subsequently, the FSC prohibited all ICOs and
enforced their governance given the financial risks of
cryptocurrency investments and transactions [69]. The
Korean FSC started to restructure the regulation on
cryptocurrency trading in 2018 as more cryptocurrency
exchanges opened in the country; only twelve
cryptocurrency exchanges have passed its security
91
jbba
the
checks, while another eleven failed [70, 71]. Following
in August, the Blockchain Law Society issued a clear
mandate to create a proper regulatory framework for
the blockchain and associated cryptocurrencies.
3.4.2. Blockchain startups
South Korean blockchain startups covered a range
of industries, such as FinTech, insurance, social
media, entertainment, real estate. Some of the most
promising blockchain startups in South Korea worked
on blockchain infrastructure & services (e.g. Icon,
Blocko, Deblock), FinTech (e.g. Proof Suite, theLoop),
cryptocurrency exchanges (e.g. Upbit, Korbit, Coinone),
and social media services (e.g. Foresting, Lucidity). The
startup Coinplug, supplied multiple blockchain related
services like digital asset exchange, an identity-based
blockchain platform and online service platform.
Coinplug held the most patents in blockchain in South
Korea and was ranked seventh globally in 2018.
The startups in South Korea sourced funding from the
local and global technology giants. For example, Blocko
that provided a platform for blockchain solutions
had secured US$8.9 million in Series B funding from
Samsung SDS early in 2016. Cultural exports were
integral to South Korean GDP. Muzika, a blockchain
startup, had attracted over ten thousand musicians and
2 million users from 150 countries globally, as well as
crypto and blockchain investment groups [72].
The South Korean internet company, Kakao launched
its blockchain subsidiary, GroundX, in March 2018.
To-date, Ground X had over 50 million monthly
developers to create blockchain services on its global
public blockchain. In May 2018, ICON and LINE cofounded Unchain to build LINE’s blockchain network.
Unchain would develop various DApp services and
expand the blockchain ecosystem.
3.4.4. Research
In December 2016, a group of twenty-one financial
investment companies and five blockchain technology
firms signed a Memorandum of Understanding to
form a distributed ledger solution as a blockchain
consortium. This consortium marked the first attempt
in South Korea where multiple financial firms leverage
blockchain technology for development.
At present, most blockchain developers worked from
universities in South Korea, including Seoul National
University, Korea University, Sogang University, Yonsei
University. These universities launched blockchain
related courses. Decipher, a think-tank in blockchain
research at the Seoul National University made up of
master- and doctoral-level researchers had engaged in
blockchain research for over three years. There had
been various collaborations between university and
industry to nurture skilled blockchain professionals,
such as the collaboration between Korea University
and Huobi.
3.4.3. Enterprise- and government-backed projects
3.5. Comparison across Countries
To develop skilled talent in blockchain, the Minister
of Science and ICT in South Korea announced new
initiatives valued at US$720,000 in addition to the
original S$900 million, to train students, construct
blockchain research centres and foster 10,000
professionals by 2022 [73]. In September 2018, the
government established an open-source blockchain
platform, dubbed Gold Ore. This platform signed an
agreement with multiple international organisations,
such as the Korean Standards Association, Japan
Blockchain Consortium and others, to conduct
blockchain-related training for the industry.
On the enterprise side, Samsung launched its blockchain
platform hosted in the cloud, named “Nexledger”, in
2017. Nexledger applications covered digital identity,
digital payment, digital stamping, supply chain finance,
global warranty and digital provenance [74]. Besides
Samsung, the LG launched its blockchain service
platform in May 2018, named “Monachain”. This
platform offered digital authentication, community
token and supply chain management for the finance,
public, telecommunications and manufacturing
industries [75]. Hyundai Group had made a substantial
investment on the internet of things (IoT) side of
blockchain.
The JBBA | Volume 2 | Issue 2 | October 2019
Table 1 summarises the status of blockchain
development in each of the four countries.
4. Conclusion and Discussion
4.1. Conclusion
From the previous and current state analysis of
infrastructure and programme, Asian countries
like Japan, Singapore, and South Korea stood out
in technological readiness, as well as digital and
regulatory infrastructure. Although China had yet
to make its way into front ranking in global surveys,
the country performed the best in terms of patents
granted normalised by population. Enterprise-backed
blockchain projects contributed to the volume of
patent applications led by Chinese technology firms
such as the BAT, Huawei, Xunlei, and JD.com. Chinese
provincial governments encouraged technology
development using blockchain-dedicated funds.
The focus areas for blockchain-based solutions
differed across countries. Solutions by enterprisebacked projects in Singapore were related to trading
and finance like those on the streamlining of import/
export documentation, supply chain solutions and
inter-bank payment and settlements. In Japan,
92
jbba
the
Table 1. Blockchain development status summary
Four
Enablers
(I)
Regulation
and
standards
(II)
Blockchain
startups
(III)
Enterpriseand
governmentbacked
projects
(IV)
Research
China
Japan
Singapore
South Korea
- ICO & cryptocurrency
trading banned except in
Hong Kong where
cryptocurrencies treated as
securities
- Blockchain advocated by the
government
- Fintech committee by the
central bank (BoC) and
blockchain included
- First batch of blockchain
service providers officially
registered
- Accounting for 28% of new
blockchain startups globally in
2017
- 78% are in 4 major cities
- Areas: technology
applications & enterprise-level
blockchain solutions (e.g.,
Bubi Chain, Juzix & Qulian)
- First country to recognise
bitcoin as a legal payment
option
- Legalised cryptocurrency
exchanges
- Working towards legalising
ICOs
- Devising evaluation
framework for blockchain
projects
- Cryptocurrency regulated if
structured like a security
- Cryptocurrency exchanges
that offered listing and
trading of digital tokens
regulated under the SFA by
the MAS
- Cryptocurrency monitored
for money laundering &
terrorism financing activities
- Fintech regulatory
sandboxes launched
- ICO banned outright
- Cryptocurrency exchanges
legalised
- Blockchain advocated as
existing tax regime being
revised to encourage
blockchain companies)
- 20 out of 167 fintech
startups are blockchainrelated in 2016
- Supported by enterprises &
governments (e.g. NTT
Data, Skuchain, METI)
- Areas: IoT, gaming &
energy industry
- Supported by big
enterprises (e.g. Samsung
sponsored Blocko early)
- Coinplug ranked in 7th in
blockchain patent filed
- Areas: fintech, insurance,
social media, entertainment
& real estate
- Big companies like BAT,
Huawei, Xunlei & JD.com
have started projects related to
the blockchain (e.g. Tencent
created the 1st digital private
bank WeBank & the
TrustSQL blockchain
platform; Alibaba built a
supply chain tracking system
using blockchain together with
PwC)
- Government-backed
blockchain funds launched in
a few cities (e.g. $1.6B
launched in Hangzhou &
$1.4B in Nanjing)
- HKMA & 12 banks released
a blockchain-based trade
finance platform
eTradeConnect
- Surge in the number of new
blockchain research institutes
observed from 2016 to 2018
- More than 90% of research
institutes were established by
corporations and universities
- PBoC launched the Digital
Currency Research Institute
that focuses on the
development & research of
digital currencies
- NEDO on IoT for trade
information sharing
- MIAC on government
tenders & e-government
services
- Deloitte Japan, Mizuho,
SMFG & MUFG on
interbank payment and KYC
platform
- JPX & 6 financial
institutions on streamlining
financial services
- NTT Data on supply chain
efficiency
- 270 FinTech start-ups
including blockchain startups
- Areas: applications in
supply chain & logistics,
social networking, fintech,
insurtech, gaming, financial
exchanges, cloud
infrastructure, payment &
remittances (e.g., Qtum,
NEO & VeChain)
- MAS Project Ubin for
settlement of payments &
securities between financial
institutions and the central
bank led the project
- A project between Bank of
America Merrill Lynch,
HSBC & IMDA on trade
documentation using
blockchain technology
- Singapore Airline’s
blockchain-based airline
loyalty digital wallet
- Singapore Smart Nation
Initiative to improve living
with new and emerging
technology
- Supporting research &
development in the national
RIE 2020 plan
- University, government &
industry collaboration (e.g.
the IBM centre for
blockchain innovation, the
Cryptocurrency Strategy,
Techniques & Algorithm
Centre at NUS, FinTech &
Blockchain Group at SUSS)
- Volunteer groups of selfregulatory organisations (e.g.
SFA, ACCESS & BEST)
- Financial and tech firms
assigned MOU for
blockchain consortium
development.
- Blockchain training
courses launched in many
universities
- Universities & industry
collaborating on blockchain
research & application (e.g.
Korea University
collaborating with Huobi
and KEB)
- Led by major financial
institutions & universities
- Bank of Japan’s FinTech
Centre for payment &
settlement
- BSafe.network led by the
University of Tokyo forming
a blockchain research
network for with over 30
member universities
worldwide
- University & industry
collaborations for applied
research on smart currency
& blockchain
enterprise-backed projects were related to information
sharing by financial institutions and government
agencies. Like China, technology firms in South Korea,
such as Samsung, LG, and Hyundai, initiated various
enterprise-backed projects on blockchain technology.
These developmental activities created a value chain of
activities and opportunities.
Blockchain startups in China and South Korea built
applications across a wide spectrum from FinTech,
insurance, social media, to real estate, and more. On
the other hand, the startups in Japan and Singapore
tended towards FinTech applications. English is the
The JBBA | Volume 2 | Issue 2 | October 2019
- Government-backed
blockchain talent project
(e.g. MOS & ICT planning
to invest US$720k to
construct blockchain
research centres and foster
10,000 professionals by 2022
- The government
established an open-source
blockchain platform named
Gold Ore
- Tech giants are investing in
blockchain development
(e.g. Samsung, LG & Kakao
launched blockchain
platform Nexledger; LG
launched blockchain service
platforms)
official business language in Singapore; this appealed
to investors and blockchain entrepreneurs globally.
Perceived as a gateway in the east to countries in the
west, startups from China, such as Qtum, NEO, and
VeChain, had registered their firms in Singapore. The 11
source of funding and capital for startups at their early
stage in China, Japan, and South Korea, were mostly
domestic.
The existing regulations in China and South Korea
prohibited the exchange and trading of cryptocurrencies
and ICO. Meanwhile, Japan and Singapore adopted a
more nuanced stance and issued clear policy statements.
93
jbba
the
The former legislation protected investors’ interest
and the latter statutory and regulatory approach could
motivate blockchain startups in fulfilling their project
objectives. All four countries nurtured investments and
developments in blockchain technology. For example,
blockchain was included in official documents released
by the Chinese national government and the first batch
of blockchain projects were endorsed with service
provider licenses. Likewise, the Japanese government
published an evaluation framework for blockchainbased projects. South Korea revised its tax regime to
encourage blockchain companies. The central bank of
Singapore launched FinTech regulatory sandboxes in
2016 to promote and nurture technology innovation.
Although there were many blockchain startups or
projects backed by large enterprises and government,
to-date no blockchain-giants had emerged. We
anticipated Japan to lead on the regulatory infrastructure
front being one of the first to accept cryptocurrencies
by legalising cryptocurrency exchanges, and the
publication of a government-led evaluation framework
for blockchain projects. The abundant technical talent
pool in China among the innovator group might
accelerate the growth of the hub. In Singapore, the
favourable environment for ICO financing could
support the funding requirements of blockchain
startups with strong offerings. Although a small citystate relative to China, Japan and South Korea, the
domestic talent gap, particularly in technical know-how
could be mediated by Singapore’s language capability
and proximity to countries in Southeast Asia.
4.2. Discussion
This essay contributed to the growing body of
literature on blockchain and informed the state of
blockchain development in Asia. We reviewed the
stage of development in four different countries in
Asia and found these countries to have possessed
similar characteristics in their blockchain ecosystem:
innovators and developers supported by regulatory
and digital infrastructure, funding and capital, as well
as programmes for workforce capability development
against ready demand for distributed ledger or
blockchain technology.
The performance of these four enablers would impact
the speed of development of each hub given the
nascent state of blockchain development.
On the regulation front of the infrastructure and
programme enabler, we projected the pace of change
to differ by countries.
The regulators of these four countries we have reviewed
shared similar approach towards the blockchain
technology – a deliberate and agile strategy to protect
the public’s interest while advocating technology
The JBBA | Volume 2 | Issue 2 | October 2019
innovation. Industry bodies could be the catalyst
to initiate self-regulating organisations to network,
exchange knowledge and best practices, promote
standards, and engage the startups and regulators
constructively.
As each of the four countries competes to attract and
develop technical expertise in blockchain technology,
they would have to harness their unique value
propositions to develop capabilities and sustain the
hub of activities.
4.3. Future Trends
Going forward, two factors shape the developments of
these blockchain hubs – one factor at the network level
facilitated by one or more catalyst firms and another
within the network.
In the network paradigm of a hub, Dhanaraj and
Parkhe identified the role of a catalyst firm in a hub
that comprised of diverse stakeholder groups [2]. We
drew parallel in forecasting the future developments
of blockchain hubs. The presence of a catalyst firm
in a blockchain hub would accelerate development to
realise both economic and social impact of the hub.
Such a catalyst firm could be the coordinator between
regulators and startups to facilitate communication
and knowledge sharing. Any organisation could step
up to be the catalyst, such as an industry association,
a research institute, a government agency or even a
technology corporation.
The second influencing factor for the future of these
blockchain hubs would be endogenous in the network.
By this, we refer to the capabilities of the workforce in a
blockchain hub. These capabilities of a blockchain hub
shape the speed of its future development. Capabilities
include technical skills and capabilities, as well as the
language communication skills of the workforce to
transcend cultural differences and collaborate with
global teams.
4.4. Limitations
4.4.1. Biases from language
The data collected for analyses of this paper were
predominantly in English. For example, a patent
application might be filed in vernacular languages
instead of English in countries like China, Japan, and
South Korea. Google Trends was the primary source
to gather search trends for ICOs. This approach
introduced biases in our study of China, Japan, and
South Korea, where official languages were nonEnglish. We attempted to minimise such biases by
collecting data from multiple sources. Future research
could introduce expert opinion surveys in respective
local languages for comparative analyses.
94
jbba
the
4.4.2. Temporal analysis and quantitative analysis
Although we had systematically investigated each of
the four hubs separately, focusing on its regulation,
standards and research development over time, this
paper had not addressed agglomeration effects within
the country. First-tier cities in China such as Beijing,
Guangzhou, and Shanghai were key contributors to
patents filed and granted. Subsequent research could
extend beyond country-level analyses to study the
agglomeration effects within the country.
This paper served as a qualitative analysis across
blockchain hubs in Asia. Subsequent research using
quantitive analysis could consider quantifying each of
the enablers as inputs into an index to monitor and
track the development of blockchain hubs through
inter-temporal analysis, regionally and globally.
References:
[1] D. K. C. Lee, and L. Low, “Inclusive Fintech: Blockchain,
Cryptocurrency And ICO”, World Scientific, Singapore, 2018.
[2] C. Dhanaraj, and A. Parkhe, “Orchestrating Innovation
Networks”, The Academy of Management Review, vol. 31, no.
3, pp. 659–669, Jul. 2006.
[3] S. Chishti, and J. Barberis, The FinTech Book. Chichester
: John Wiley & Sons, 2016.
[4] D. Andrews, G. Nicoletti and C. Timiliotis, "Digital
technology diffusion: A matter of capabilities, incentives or
both?", OECD Economics Department Working Papers,
No. 1476, OECD Publishing, Paris, Jul. 2018. [Online].
Available: doi.org/10.1787/7c542c16-en.
[5] Asian Development Bank, Key Indicators for Asia and
the Pacific 2018 (49th Edition). Manila: Asian Development
Bank, 2018.
[6] D. K. C. Lee, M. Chwierut, W. Anderson, B. Lio, and
B. Downes, “The Characteristics of Token Investors”, in book
“Inclusive Fintech: Blockchain, Cryptocurrency And ICO”,
World Scientific, Singapore, pp. 125-172, 2018.
[7] A. Kerya, “ICO Statistics: Countries, Traffic, and
Investors”, Medium.com, Jun. 2018. Accessed on: Oct. 6,
2018. [Online]. Available at URL: https://medium.com/@
incryptico.com/ico-statistics-countries-traffic-and-investors4e830e0438b0.
[8] T. Alford, “Bitcoin Adoption: Trading Volume by
Country”, TotalCrypto.io, Aug. 2018. Accessed on: Oct. 6,
2018. [Online]. Available at URL: https://totalcrypto.io/
bitcoin-adoption-trading-volume-country/.
[9] A. Wright, and P. De Filippi, “Decentralized Blockchain
Technology and the Rise of Lex Cryptographia”, 2015.
Available at SSRN 2580664.
[10] A. Demirgüç -Kunt., L. Klapper, D. Singer, S. Ansar,
and J. Hess, The Global Findex Database 2017: Measuring
financial inclusion and the fintech revolution. The World Bank,
2017.
[11] The World Bank. “Record High Remittances Sent Globally
in 2018”. Retrieved from World Bank Group - International
Development, Poverty & Sustainability. Apr. 2018. [Online].
Available at URL: https://www.worldbank.org/en/news/
press-release/2019/04/08/record-high-remittances-sentThe JBBA | Volume 2 | Issue 2 | October 2019
globally-in-2018.
[12] Startup Genome, "Global Startup Ecosystem Report
2019", San Francisco: Startup Genome LLC, 2019.
[13] Aliresearch and KPMG, “Welcoming a New Wave of
Global Economy: Digital Economy Development Global Index
2018”, Sep. 2018. Accessed on: Sep. 28, 2018. [Online].
Available at URL: http://www.199it.com/archives/774852.
html.
[14] China Academy of Information and Communications
Technology (CAICT), “White Paper on the Development of the
Digital Economy in China”, CAICT, Jul. 2017. Accessed on:
Aug. 25, 2018. [Online]. Available: http://www.cac.gov.cn/
files/pdf/baipishu/shuzijingjifazhan.pdf.
[15] L. Liu, and Q. Wang, “Analysis of Bitcoin Herd
Behavior Based on Imitation and Infection Model”, Journal
of Beijing University of Posts and Telecommunications (Social
Sciences Edition), Vol.17, No.2, pp.27-33, 2015.
[16] Ministry of Industry and Information Technology (MIIT),
“Announcement on preventing financial risks of ICOs”, 2017.
Accessed on: Sep. 26, 2018. [Online]. Available at URL:
http://www.miit.gov.cn/n1146290/n4388791/c5781140/
content.html.
[17] National Development and Reform Commission
(NDRC), “The 13th five-year plan for economic and social
development of the People’s Republic of China (2016–2020)”,
Central Compilation & Translation Press, 2017. Accessed on:
Sep. 20, 2018. [Online]. Available: http://en.ndrc.gov.cn/
newsrelease/201612/P020161207645765233498.pdf.
[18] M. Amsili, “Blockchain in China: Local is Everything”,
supchina, Aug. 2018. Accessed on: Sep. 20, 2018. [Online].
Available at URL: https://supchina.com/2018/08/28/
blockchain-in-china-local-is-everything/.
[19] G. Sun, “Expectations on the Development of Blockchain
in China”, Caixin, Jun. 2017. Accessed on: Sep. 27,
2018. [Online]. Available at URL: http://opinion.caixin.
com/2017-06-17/101102805.html.
[20] Wuzhen Think Tank, “The white paper on the development
of China’s blockchain industry”, 2017. Accessed on: Sep. 23,
2018. [Online]. Available: http://sike.news.cn/hot/pdf/12.
pdf.
[21] C. Liu, “Blockchain - A Guide for Officials,” People’s
Daily Press, pp.132-134, 2018.
[22] X. Fei, and S. W. Li, “Blockchain Courses Among Global
Universities and Blockchain Research Institutes in China”,
BlockData, 2018. Accessed on: Sep. 29, 2018. [Online].
Available at URL: https://www.8btc.com/article/195209.
[23] M. Xing, “63 patent applications filed by the PBoC digital
currency research institute”, Jun. 2018. Accessed on: Oct. 2,
2018. [Online]. Available at URL: http://finance.ce.cn/
rolling/201806/29/t20180629_29567884.shtml.
[24] W. Zhao, “South Korea Plans Tax Perks for Blockchain
Startups”, coindesk, Jul. 2018. Accessed on: Sep. 28, 2018.
[Online]. Available at URL: https://www.coindesk.com/
south-korea-plans-tax-perks-for-blockchain-startups/.
[25] Securities and Futures Commission (SFC), “SFC warns
of cryptocurrency risks”, Feb. 2018. Accessed on: Sep. 1,
2018. [Online]. Available at URL: https://www.sfc.hk/
edistributionWeb/gateway/EN/news-and-announcements/
news/doc?refNo=18PR13.
95
jbba
the
[26] Applied Science and Technology Research Institute
(ASTRI), “HKMA-ASTRI Fintech Innovation Hub”,
Nov. 2016. Accessed on: Sep. 12, 2018. [Online]. Available
at URL: https://www.astri.org/technologies/joint-researchlaboratories/rd-centres/hkma-astri-fintech-innovation-hub/.
[27] HKMA, “Fintech Co-operation between the Hong Kong
Monetary Authority and the Financial Services Regulatory
Authority of Abu Dhabi Global Market”, Jun. 2018.
Accessed on: Sep. 10, 2018. [Online]. Available at URL:
https://www.hkma.gov.hk/eng/key-information/pressreleases/2018/20180626-4.shtml.
[28] HKMA, “Fintech Collaboration between the Hong
Kong Monetary Authority and the Monetary Authority of
Singapore”, Oct. 2017. Accessed on: Sep. 10, 2018. [Online].
Available at URL: https://www.hkma.gov.hk/eng/keyinformation/press-releases/2017/20171025-4.shtml.
[29] HKMA, “The launch of eTradeConnect and the
Collaboration with we.trade”, Oct. 2018. Accessed on: Apr. 20,
2019. [Online]. Available at URL: https://www.hkma.gov.
hk/eng/key-information/press-releases/2018/20181031-4.
shtml.
[30] Business Wire, “AlipayHK and GCash Launch CrossBorder Remittance Service Powered by Alipay’s Blockchain
Technology”, Jun. 2018. Accessed on: Aug. 8, 2018. [Online].
Available at URL: https://www.businesswire.com/news/
home/20180625005561/en/.
[31] A. Antonovici, “Bank of China HK Uses Blockchain
for 85% of Real Estate Valuations”, Cryptovest, Apr.
2018. Accessed on: Sep. 10, 2018. [Online]. Available at
URL: https://cryptovest.com/news/bank-of-china-hk-usesblockchain-for-85-of-real-estate-valuations/.
[32] W. Zhao, “Hong Kong to Expedite Immigration for
Blockchain Job Seekers”, coindesk, Aug. 2018. Accessed
on: Sep. 12, 2018. [Online]. Available at URL: https://
www.coindesk.com/hong-kong-to-expedite-immigration-forblockchain-job-seekers.
[33] Y. Hagiwara, and Y. Nakamura, “Japan Unveils
Guidelines for Allowing Initial Coin Offerings”, Bloomberg,
Apr. 2018. Accessed on: Sep. 27, 2018. [Online].
Available at URL: https://www.bloomberg.com/news/
articles/2018-04-05/japan-plans-first-step-toward-legalizinginitial-coin-offerings.
[34] Tama University, (2018), “Call for Rule-Making on
ICO”, Apr. 2018. Accessed on: Sep. 7, 2018. [Online].
Available: https://www.tama.ac.jp/crs/2018_ico_en.pdf.
[35] Nomura Research Institute, “Survey on Blockchain
Technologies and Related Services FY2015 Report”, Mar.
2016. Accessed on: Aug. 28, 2018. [Online]. Available:
http://www.meti.go.jp/english/press/2016/pdf/0531_01f.
pdf.
[36] Information Economy Division, Commerce and Information
Policy Bureau, “Evaluation Forms for Blockchain-based System
ver. 1.0”, Ministry of Economy, Trade and Industry, 2017.
[37] Information Economy Division, Commerce and Information
Policy Bureau, “Survey on Technology and Institution related
to Distributed System”, Ministry of Economy, Trade and
Industry, 2018.
[38] T. Wilson, “Expert Shortage Hampers Japanese
The JBBA | Volume 2 | Issue 2 | October 2019
Financials in Blockchain Race”, Aug. 2016. Accessed on: Oct.
2, 2018. [Online]. Available at URL: https://www.reuters.
com/article/us-japan-fintech-blockchain-idUSKCN10S2GN.
[39] Ministry of Economy, Trade and Industry, “Japan
Startup Selection" - The Participants of 2016 "HIYAKU
Next Enterprise" Program”, 2017. Accessed on: Sep. 30,
2018. [Online]. Available: http://www.meti.go.jp/english/
press/2017/pdf/0105_001a.pdf.
[40] D. Cullinan, “World’s First Bank-Backed Crypto
Exchange Opens For Trading”, BitcoinNews.com, Jul. 2018.
Accessed on: Sep. 27, 2018. [Online]. Available at URL:
https://bitcoinnews.com/worlds-first-bank-backed-cryptoexchange-opens-for-trading/.
[41] Mizuho Financial Group, Inc., “Collaborating to Create
Japan's First Blockchain Coworking Space”, May 2018.
Accessed on: Sep. 30, 2018. [Online]. Available: https://
www.mizuho-fg.com/release/pdf/20180518release_eng.pdf.
[42] Finolab, “About us - FINOLAB”, 2018. Available at
URL: https://finolab.tokyo/#aboutus.
[43] A. Santo, I. Minowa, G. Hosaka, S. Hayakawa, M.
Kondo, S. Ichiki, and Y. Kaneko, “Applicability of Distributed
Ledger Technology to Capital Market Infrastructure (Vol.
15)”, Japan Exchange Group, Aug. 2016.
[44] NTT DATA Corporation, “MUFG and NTT
DATA Lay Foundation for Digital Trade Between Singapore
and Japan Using Blockchain”, Dec. 2017. Accessed on: Sep.
28, 2018. [Online]. Available at URL: https://www.nttdata.
com/global/en/media/press-release/2017/december/mufgand-ntt-data-lay-foundation-for-digital-trade-between-singaporeand-japan-using-blockchain.
[45] NTT DATA Corporation and Skuchain, Inc., “NTT
DATA will Develop a Business Collaboration Platform for
Japanese Manufacturers in Cooperation with Skuchain in
the U.S”, Jan. 2018. Accessed on: Sep. 28, 2018. [Online].
Available at URL: http://www.skuchain.com/ntt-datawill-develop-a-business-collaboration-platform-for-japanesemanufacturers-in-cooperation-with-skuchain-in-the-u-s/.
[46] Sumitomo Mitsui Financial Group, “Demonstration Test
of Blockchain Technology in Cross-Border Trade Operations”,
Dec. 2017. Accessed on: Aug. 28, 2018. [Online]. Available
at URL: http://www.smfg.co.jp/news_e/e110076_01.html.
[47] I. Ueno, “Japanese Financial Institution and FinTech”,
Mizuho Financial Group, 2017.
[48] Mitsubishi UFJ Financial Group, “Fintech, Blockchain
and Digital Currencies”, Mar. 2016. Accessed on: Sep. 30,
2018. [Online]. Available at URL: https://www.mufg.jp/
english/ourbrand/featuredarticle/2016_03.html.
[49] Nikkei, “Japan Looks to Blockchains for More Secure
E-Government Systems”, Asian Review, Jun. 2017. Accessed
on: Sep. 27, 2018. [Online]. Available at URL: https://asia.
nikkei.com/Politics-Economy/Policy-Politics/Japan-looks-toblockchains-for-more-secure-e-government-system.
[50] Japanese Bankers Association, “Report of the Review
Committee for the Possibility and the Challenges of Utilizing
Blockchain Technology”, Japanese Bankers Association, 2017.
[51] Bank of Japan, “Message from Governor Kuroda on the
Occasion of the Establishment of the FinTech Center”, Apr.
2016. Accessed on: Sep. 29, 2018. [Online]. Available at
URL: https://www.boj.or.jp/en/paym/fintech/message.htm/.
96
jbba
the
[52] European Central Bank and Bank of Japan, “Payment
Systems: Liquidity Saving Mechanisms in a Distributed
Ledger Environment”, Sep. 2017. Accessed on: Sep. 29,
2018. [Online]. Available: https://www.boj.or.jp/en/
announcements/release_2017/data/rel170906a1.pdf.
[53] European Central Bank and Bank of Japan, “Securities
Settlement Systems: Delivery-versus-Payment in a Distributed
Ledger Environment”, Mar. 2018. Accessed on: Sep. 28,
2018. [Online]. Available: https://www.boj.or.jp/en/
announcements/release_2018/data/rel180327a1.pdf.
[54] S. Matsuo, “BSafe.network: Current Member
Universities”, Bsafe.network, May 2019. Accessed on: May.
10, 2019. [Online]. Available at URL: http://bsafe.
network/member-university/.
[55] S. Takagi, H. Tanaka, M. Takemiya, and Y. Fujii,
“Blockchain-Based Digital Currencies for Community
Building”, GLOCOM, 2017.
[56] Keio Research Institute at SFC, “Announcement of
BASE Alliance Establishment”, Jul. 2017. Accessed on: Sep.
18, 2018. [Online]. Available: https://www.kri.sfc.keio.ac.jp/
ja/press_file/20170724_base_en.pdf.
[57] HAW International Inc., “Blockchain Technology
Research Lab Established Within the Institute of Information
Engineering Research at the Kyushu Institute of Technology”,
Mar. 2018. Accessed on: Oct. 1, 2018. [Online]. Available:
htt p://www.chaintope.com/en/wp-content/uploads/
sites/2/2018/03/0306_PRESS_BC_KIT_EN_2.pdf.
[58] Monetary Authority of Singapore, “Fintech Regulatory
Sandbox Guidelines”, 2016. Accessed on: Sep. 30, 2018.
[Online]. Available: https://www.mas.gov.sg/-/media/
MAS/Smart-Financial-Centr e/Sandbox/FinTechRegulatory-Sandbox-Guidelines-19Feb2018.pdf ?la=en&ha
sh=1F4AA49087F9689249FB8816A11AEAA6CB3
DE833.
[59] J. Lee, “MAS Slaps Warnings on 8 Cryptocurrency
Exchanges; Bars ICO Issuer”, Business Times, May 2018.
Accessed on: Sep. 8, 2018. [Online]. Available at URL:
https://www.businesstimes.com.sg/banking-finance/mas-slapswarnings-on-8-cryptocurrency-exchanges-bars-ico-issuer.
[60] Startup Genome, “Global Startup Ecosystem Report
2018”, San Francisco: Startup Genome LLC, 2018.
[61] Techinasia.com, “Tech in Asia - Meet the 15 top-funded
blockchain companies in Singapore”, May 2018. Accessed on:
Oct. 6, 2018. [Online]. Available at URL: https://www.
techinasia.com/.
[62] ICO Watchlist, (2018), “ICO Statistics - By Country”,
2018. Accessed on: Sep. 12, 2018. [Online]. Available at
URL: https://icowatchlist.com/statistics/geo.
[63] W. A. Kaal, “Initial Coin Offerings: the Top 25
Jurisdictions and Their Comparative Regulatory Responses”,
CodeX Stanford Journal of Blockchain Law & Policy, U of
St. Thomas (Minnesota) Legal Studies Research Paper No. 1807, 2018. Available: dx.doi.org/10.2139/ssrn.3117224.
[64] U-W. Lee, “Record S$19b Set Aside for R&D Until
2020”, Business Times, Jan. 2016. Accessed on: Sep. 1, 2018.
[Online]. Available at URL: https://www.businesstimes.com.
sg/government-economy/singapores-future-economy/records19b-set-aside-for-rd-until-2020.
[65] F. Ungku, “IBM to open first blockchain innovation center
The JBBA | Volume 2 | Issue 2 | October 2019
in Singapore”, Reuters, Apr. 2016. Accessed on: Sep. 28,
2018. [Online]. Available at URL: https://www.reuters.com/
article/us-ibm-fintech-singapore/ibm-to-open-first-blockchaininnovation-center-in-singapore-idUSKCN0ZS03Y.
[66] National University of Singapore, “NUS Computing
forms academic blockchain think tank”, Sep. 2018. Accessed
on: Sep. 25, 2018. [Online]. Available at URL: https://news.
nus.edu.sg/press-releases/CRYSTAL-centre.
[67] Y. Yoon, “Korean Gov't Unveils Blockchain Technology
Development Strategy”, Business Korea, Jun. 2018. Accessed
on: Sep 8, 2018. [Online]. Available at URL: http://www.
businesskorea.co.kr/news/articleView.html?idxno=23184.
[68] W. Zhao, “PBoC filings reveal big picture for planned
digital currency”, coindesk, Jul. 2018. Accessed on: Sep.
29, 2018. [Online]. Available at URL: https://www.
coindesk.com/pboc-filings-reveal-big-picture-for-planned-digitalcurrency/.
[69] R. R. O’Leary, “South Korean Regulator Issues ICO
Ban”, coindesk, Sep. 2017. Accessed on: Sep. 1, 2018.
[Online]. Available at URL: https://www.coindesk.com/
south-korean-regulator-issues-ico-ban/.
[70] FSC, “FSC Reshuffles Organizational Structure”,
Jul. 2018. Accessed on: Sep. 7, 2018. [Online]. Available
at URL: https://www.fsc.go.kr/eng/new_press/releases.
jsp?menu=01&bbsid=BBS0048.
[71] K. Helms, “Only 12 out of 23 Korean Crypto Exchanges
Pass Probe - Inspector Under Fire”, Bitcoin.com, Jul. 2018.
Accessed on: Sep. 12, 2018. [Online]. Available at URL:
https://news.bitcoin.com/only-12-out-of-23-korean-cryptoexchanges-pass-probe-inspector-under-fire/.
[72] Muzika, “Muzika Project Teaser”, 2018. Accessed on:
Sep. 20, 2018. [Online]. Available: https://www.muzika.
network/assets/mzk-teaser-en.pdf.
[73] J. Kim, “South Korean Gov’t to Invest $200 Mln in
Blockchain Initiatives”, Cryptoslate, Jun. 2018. Accessed
on: Sep. 6, 2018. [Online]. Available at URL: https://
cryptoslate.com/south-korean-govt-to-invest-200-mln-inblockchain-initiatives.
[74] Samsung SDS, Nexledger™ A Blockchain Platform and
Solution, White paper, 2017.
[75] M. H. Cho, “LG CNS Launches Monachain Blockchain
Platform”, ZDNet, May 2018. Accessed on: Aug. 20, 2018.
[Online]. Available at URL: https://www.zdnet.com/article/
lg-cns-launches-monachain-blockchain-platform/.
Consolidated information from World Intellectual
Property Organisation and IPR Daily statistics on
blockchain patents between 2008 to 2018.
ii
Source: CBInsights (https://www.cbinsights.com/
research/unicorn-startup-market-map/)
iii
Special Administrative Region (SAR)
iv
R&D spending as per cent of GDP of APAC
countries, World Development Indicators by the World
Bank.
v
http://www3.weforum.org/docs/GITR2016/WEF_
GITR_Full_Report.pdf
vi
http://www.eiu.com/Handlers/WhitepaperHandler.
ashx?fi=Technological_readiness_report.pdf&mode=
wp&campaignid=TechReadiness
i
97
jbba
the
Data obtained from ICOWatchList.com. https://
icowatchlist.com/statistics/geo
viii
Search volume of a 1-year period from 7 Oct, 2017
to 7 Oct, 2018. https://trends.google.com/trends/
explore?q=%2Fm%2F0138n0j1
ix
Results are based on the Venture Capital & Private
Equity Country Attractiveness Index by IESE Business
School, University of Navarra. https://blog.iese.edu/
vcpeindex/ranking/
x
A full list of national currencies exchanged for the
24 hours of total bitcoin volume can be found at the
Coinhills website: https://www.coinhills.com/market/
currency/
xi
https://news.8btc.com/1-6-billion-governmentbacked-blockchain-fund-launched-in-hangzhou
xii
https://www.coindesk.com/another-1-billionblockchain-fund-to-launch-with-government-backing
vii
Competing Interests:
None declared.
Ethical approval:
Not applicable.
Author’s contribution:
YW, JR, CL and SWL designed and coordinated this research and
prepared the manuscript in entirety.
Funding:
None declared.
Acknowledgements:
YW, JR, CL and SWL deeply thank Professor David Lee for his
guidance and Ms Sherry Li for her support.
The JBBA | Volume 2 | Issue 2 | October 2019
98
jbba
the
The JBBA | Volume 2 | Issue 2 | October 2019
99
jbba
the
commentary
Decentralisation is Coming:
The Future of Blockchain
OPEN ACCESS
ISSN Print: 2516-3949
https://doi.org/10.31585/jbba-2-2-(5)2019
Mark Fenwick1, Erik P.M. Vermeulen2
1
Kyushu University, Japan
2
Tilburg University, The Netherlands
Correspondence: E.P.M.Vermeulen@uvt.nl
Received: 31 July 2019 Accepted: 12 August 2019 Published: 16 August 2019
Abstract
Advocates of blockchain believe that distributed ledger technologies can provide us with a technological
infrastructure to challenge the concentrated power of tech giants such as Amazon, Facebook and Google,
and create a more equitable, sustainable and decentralized world. This paper considers these claims and
concludes that they are preferable to defending the status quo or arguing that a solution might be found in
more and better regulations. Nevertheless, the future remains highly uncertain and we are currently living
in a rapidly evolving “space” between two competing realities: a centralized old-world reality and a fastemerging, but, as yet, incomplete, decentralized reality. We remain optimistic that decentralization is coming
but identify powerful competing forces seeking to preserve the status quo. As such, we must encourage more
organizations – business, government, investors, charities – to experiment with distributed ledger technologies
and to participate actively in the digital transformation. We need more experimentation to address the current
shortcomings of decentralisation and to ensure the early arrival of mainstream applications of a technology
that has the potential to solve some of the most pressing global challenges of a digital age.
Keywords: Bitcoin, Blockchain, Crypto-Economy, Decentralization, Digital Transformation, Distributed Ledgers,
Disintermediation, Ethereum, Satoshi Nakamoto, Smart Contracts, Technology
JEL Classifications: K20, K22, K24, L50, M21, O30, O31, O33, O35, Q55
1. Introduction
Advocates of blockchain – let’s call them the
“Evangelists” – believe that decentralised ledger
technologies have the potential to address many
of the most pressing problems of the digital age.
We are all familiar with the problems. The massive
concentration of economic power in companies such
as Amazon, Apple, Facebook, Google, etc. The largescale abuse of privacy via the hoarding and selling of
personal information online. The systematic (and statesponsored) political misinformation operations and
the calculated spreading of so-called “fake news.”
The Evangelists believe that these and other problems
can only be solved with more technology, rather
than through more rules and regulations. And, in
the strongest version of this story, Evangelists claim
that blockchain technologies have the potential to
transform capitalism and herald in a more sustainable,
egalitarian, and decentralised world. In this piece, we
would like to offer a defense of this Evangelist view.
Not least because it offers a more compelling vision
The JBBA | Volume 2 | Issue 2 | October 2019
of the future than those in denial about the scale of
the challenges created by the digital revolution or those
arguing that more and better rules and regulations are
the answer.
Nevertheless, it is easy to be skeptical or cynical in
the face of such idealism. After all, the Evangelist
narrative cuts against previous experience of disruptive
technologies.i Historians have often noted that new
technologies start in the hands of nerds and dreamers
motivated by the desire to make the world a better place
(the Apple of Steve Wozniak). But this rarely lasts,
and successful technologies ultimately end up in the
hands of powerful corporations driven the desire to
maximize profits and shareholder value (the Apple of
Steve Jobs). According to this view, the Internet story is
just the latest chapter in a sorry tale of a human failure
to ensure that technology works for the benefit of all.
After all, the corporate giants of today are amongst
the biggest companies that have ever existed and there
is ever-increasing inequality in wealth distribution.ii
Everything we know about the history of technology
and capitalism should make us treat the Evangelist
101
jbba
the
position with caution.
Moreover, the transformative potential of distributed
ledgers can sometimes be difficult to see through
all the noise and hyperbole that surrounds the
“Blockchain Revolution.”iii It is unfortunate, for
instance, that blockchain technologies have attracted
greedy opportunists and fraudsters keen to make a
quick profit. The result? A series of ICO scams and
other scandals that discredited the technology in many
people’s eyes before it had any real-world impact on
our everyday lives. But, once the blockchain hype fades,
and the opportunists have moved on to the next “big
thing,” will these technologies be able to deliver on
their potential and promise? Or, are the skeptics and
nay-sayers right when they suggest that this is just hype
“all the way down?”
The paper has three parts. In the next section (‘The
Rise of Centralized Platforms’), we describe the
emergence of the new tech giants that leveraged the
new possibilities of the Internet to develop a platform
business model. Furthermore, we identify various
pressures that create ever-more centralization and
concentrations of economic power in the platform
economy. The next section (‘The Decentralized
Alternative of Blockchain Evangelists’) identifies the
Evangelical alternative; a radically different account
of the future that seeks to utilize distributed ledger
technologies to realize the idealistic vision of the
original architects of the Internet as a decentralized
global communications network. In doing so, a genuine
alternative to the current tech giants can be conceived.
We conclude (‘Experiments in Decentralization’)
with some brief reflections on the need for more
participation in the development of blockchain
technology, smart contracts, and cryptocurrencies to
address the current shortcomings of decentralization
and to ensure that we will soon see mainstream
applications of the technology.
The takeaway? We are currently living in a fastdeveloping “space” between two competing realities:
a centralized “old world” reality and a fast-emerging,
but, as yet, incomplete, “decentralized reality.” We are
cautiously optimistic that decentralization is coming,
but acutely aware of the competing forces that seek to
preserve the status quo.
2. The Rise of Centralised Platforms
The Internet today comprises two connected, but
distinct, layers. Firstly, there are a series of open source
protocols, such as HTTP, GPS, IMAP, POP, SMPT,
etc., that first allowed computers to communicate with
one another across global networks and which still
provide the basic infrastructure of the system. The
key characteristic of such protocols is that no one
owns them, and anyone can use them free of charge.
The JBBA | Volume 2 | Issue 2 | October 2019
There is no license fee involved in using HTTP to set
up a web page, or in using SMTP to send an email,
or GPS to identify location. Secondly, there is the
web-based layer, which emerged later, and which sits
on top of the protocols providing various services.
Think Amazon, Facebook, Google, Twitter: this layer
is operated by profit-seeking corporations that – in
contrast to the authors of the protocols – have always
sought to maintain tight control over their services and
operations. The history of the Internet can be told
as a story of a shift in power from the open protocol
idealism of the early years to the closed, centralized
and controversial capitalism that dominates today.iv
Many of the companies operating on this second layer
provide what me might call a coordination function
between two or more groups of users, and this business
model is usually described as a “platform.”v Some
platforms facilitate connections between the buyer and
seller of goods (eBay, Amazon, Alibaba); some facilitate
connections between those wanting a service and those
willing to provide it (Uber, Airbnb); and others simply
facilitate connections (information exchange) between
friends (Facebook), content creators and consumers
(You Tube, Medium, Netflix) or app developers and
users (Google, Apple). However, what is common to all
platforms is that they coordinate connections between
“creators” and “extractors” of value and the platform
generates a profit from making these connections,
either by taking a commission or advertising.
The emergence and growth of platforms is a significant
economic and cultural event, not least because they
have become a routinized feature of everyday life
within a short period. To illustrate this rise, consider
that it took the radio 38 years to reach 50 million users.
It took television 13 years to achieve the same degree
of market penetration. But Facebook “only” needed
two years to gain the same number of users. Now, it
has an active user base of over 2 billion.
Moreover, the global proliferation of digital
technologies and communication networks means that
platforms can be established anywhere. The emergence
of hugely successful platforms in China (Alibaba) or
Indonesia (Go-Jek) illustrate the universal appeal and
adaptability of this business model. It also shows how
less developed economies might employ platforms as
a means of “leapfrogging” an earlier (industrial) phase
of economic development and “jump” directly into the
digital age.vi Go-Jek “only” needed three years to go
from 100,000 orders a day (in 2015) to 100+ million
orders across 18+ services in 2018.vii
What is clear, however, is that as platforms have scaled,
they have struggled to maintain their initial promise
and platforms that were once disruptive have lost
much of their initial appeal. And it is hard to ignore the
problems experienced and created by platforms. There
102
jbba
the
are too many recent examples of well-known platforms
“forgetting” the importance of improving people’s
lives. Although there are a number of reasons why
platforms have tended to become more centralized and
more “corporate,” and have experienced these kinds of
difficulties, two factors are worth emphasizing:
Firstly, markets tend to prefer a single service provider.
Take Airbnb as an example. When a new platform
service like Airbnb starts to take off, there’s a strong
incentive for the market to consolidate around that
single provider. The fact that more customers start to
use the Airbnb app means that more room-providers
are attracted to join the platform, which in turn attracts
more people looking for a room, as there are now
more choices of rooms. As such, platforms are acutely
sensitive to network effects.viii The more users there are
on one platform, the more everyone benefits (more
and better choices, more ratings, etc.). In addition,
individuals who already have the app installed and
their details stored on Airbnb have a strong incentive
to stay with that platform. The costs of migrating to
a different provider become prohibitive, even if the
company or individuals running the company are
revealed to be engaged in dubious practices. Although
many consumers may very well prefer multiple service
providers, there are clear incentivizes pushing everyone
to stick with one dominant player, once that dominant
platform has emerged.
Second, the need to innovate continually, whilst at
the same managing the legal risk created by rapid
expansion, requires more centralized forms of
organization and governance. Platforms often start
with a simple, idealistic proposition (“let’s bring people
together”). But, over time, they add more and more
features, making their technological infrastructure
more complex.ix The downside of this is that more
developers are then needed to accurately deal with the
increased technology complexity and managing such
complexity requires more centralized and hierarchical
organizational forms with more elaborate control
mechanisms. This is particularly true of companies
that scale globally. And when platforms become more
prominent, they need to attract more investors and
investment to fund further innovation. Again, this
transforms the incentives of platform owners and
short-term performance becomes critical. To improve
financial performance or save costs, platforms may
feel the need to change the rules of the game from
one day to the other (without consulting the users of
the platform) and the belief that such agility is better
achieved with hierarchical and centralized governance
structures can easily gain ascendancy.
We might say that platforms have exhibited a tendency
towards two different types of centralization. On the
one hand, “cartelization,” in which fewer and fewer
players dominate the market for a particular service,
The JBBA | Volume 2 | Issue 2 | October 2019
and, on the other hand, “corporatization,” in which
there is an ever-greater internal concentration of
authority based on a clear and closed hierarchy.
If we accept this story of the inevitable decline of
platforms, how should we respond? Again, there are
competing views. Some claim that our only hope
is to use the power of the Leviathan (the state or
regional organizations, such as the EU) to rein in these
corporate giants, through more and better rules and
regulation.x Think anti-trust laws, data protection laws
or laws controlling online speech. According to this
line of thinking, we can’t fix the problems with more
technology. Recently, we can hear more and more talk
around this “top-down,” regulatory solution.
3. The Decentralised Alternative of the Blockchain
Evangelists
The Evangelists, however, take a different view. These
are not problems that can easily be solved by more or
even smarter regulation, as the power and reach of
the Internet giants is just too great for any regulation
to be meaningful or effective. The size of many
platforms makes them largely immune to state actionxi.
Instead, the Evangelists recognize the importance of
technology-based solutions that can provide us with
the vision and direction to build something better. This
is a view that needs to be taken seriously and it is in this
context that we need to think about distributed ledger
technologies, such as blockchain, and smart contracts.xii
The key claim of Evangelists is that things can be
different and that distributed ledger technologies
have the potential to bring about a transformation
to a better world.xiii To understand why and how, it is
helpful to briefly go back to the origins of blockchain
and the original white paper by Satoshi Nakamoto.xiv
In this first statement, Nakamoto proposed a system
for a digital currency that did not require a centralized
trusted authority to verify transactions. Two key
elements characterize the general system that was
proposed in the Bitcoin whitepaper:
Firstly, a database scattered across many computers,
with no single authority controlling and verifying
the authenticity of the data. Secondly, the “work” of
maintaining the database – what we now refer to as
“mining” – was rewarded with small payments, in the
form of tokens. If you used a part of your computer’s
power to maintain the integrity and security of the
database, you would receive a reward in the form of
tokens that could then be used to “buy” services or
sold to third parties for profit. These tokens would
grow increasingly difficult to earn over time, ensuring a
certain amount of scarcity in the system. If you helped
in the beginning (and helped the database to develop
and grow) you would receive a larger reward, thus
incentivizing early stage participation.
103
jbba
the
Evangelists believe that this combination of ideas
are revolutionary.xv Firstly, they provide a way of
agreeing on the contents of a database without anyone
being in charge of, owning or otherwise controlling
that database. Secondly, they provide a mechanism
for rewarding people that made the database more
valuable, but – crucially – without those people being
paid by an owner of the database or owning shares
in the corporation that controls the database. There
would be no owner or controlling corporation of such
decentralized databases. Nakamoto provided a model
for supporting open protocols that wasn’t available
when the first tech giants emerged. And, for this
reason, they have the potential to challenge the tech
giants and change the world.
But, how does this technology have potential to
transform capitalism and how is it connected to the
protocol layer of the Internet described above? A
comparison with Airbnb can be used to illustrate the
possibilities of a distributed ledger model. A new open
protocol could be created that contains a request: “I
would like a room in PLACE between DATES.” A
decentralized blockchain database might then record
the metadata of all users, such as personal information,
past trips, credit card details, preferences and user
and host rankings. The protocol for transmitting this
request out onto the Internet would be completely
open. Anyone (individuals, private companies, public
authorities) who wanted to develop an app for
responding to such requests would then be free to do
so. In this model, when you transmit your request, you
would not need to commit ex ante to a single provider
(as you do now with Airbnb), but you would instead
be free to announce your wishes to the world via the
secure protocol and wait for competing offers from
diverse providers of accommodation, ranging from
anyone with a spare room though to large multinational
hotel companies.
Tokens would be vital in allowing such a protocol
to develop and scale, and early adopters would be
rewarded with tokens that they could then use to
either buy accommodation services themselves
or sell on an exchange for real world currencies.
Moreover, early adopters (app developers, providers of
accommodation, etc.) would receive a proportionately
larger share of tokens for entering and helping to
develop the new ecosystem. As the protocol developed
it would then attract outside investors, which would
give the token a greater monetary value that, in turn,
would encourage more participation.
Critics might argue that one company or group of
companies might monopolize the new protocol, in the
same way that the tech giants of today dominate various
sectors of the Internet economy. Indeed, fully-fledged
decentralized blockchain networks do not exist yet.
Consider the technical and operational shortcomings
The JBBA | Volume 2 | Issue 2 | October 2019
of the Bitcoin blockchain. In discussions with
mathematicians and other technologists, the following
weaknesses are usually highlighted. Bitcoin’s proof of
work protocol has led to “mining pools” because of
economies of scale and unbalanced reward structures.
The anonymity in the blockchain network means that it
is prone to “Sybil attacks” and “51% attacks.”
Still, there are advantages in an open source plus
decentralized database model that makes such a
process of “cartelization” much less likely. For a start, it
wouldn’t present the same opportunities for abuse and
manipulation that you find in the closed, centralized
systems of Amazon, Facebook, etc. If a particular
service provider did something I didn’t like, it would
be much easier to switch to an alternative service
provider, as my information would not be retained by
the service provider on a centralized database, but a
decentralized, open source database connected to the
protocol. The open standard would have a discipling
effect on platform operators, as it would facilitate a
level of migration (to other providers or simply opting
out altogether) that is simply impossible today.
Tokens would also give a blockchain-based open
protocol a number of advantages, in that it would
provide an infrastructure to reward content creators.
This seems preferable to the current situation on many
platforms – especially social media platforms – where
most content providers act without compensation,
while the platform companies receive all the economic
value of that content by selling advertising.
Finally, there are the potential security gains of a
decentralized network. Would our personal information
or transactions be more secure in a distributed
blockchain than behind the elaborate firewalls of giant
corporations like Google or Facebook? An openly
readable ledger means anyone can check the integrity of
transactions. The distributed cooperation component
implies that “attackers” must be able to “out-compute”
the entire network (which is practically impossible).
4. Experiments in Decentralisation
The takeaway from all of this? We are currently
living in a fast developing “space” between two coexisting realities: a centralized “old world” reality
and an emerging but incomplete new “decentralized
reality.” The centralized reality with its hierarchical
organizations, rules, regulations, and institutions still
prevails. It appears unlikely that we will soon say
goodbye to our familiar, centralized procedures and
organizations anytime soon.
Nevertheless, a more decentralized reality has already
started to emerge.xvi As we have seen, trust in the
“centralized companies” is already declining (mainly
due to the concentration of power, wealth and
104
jbba
the
information), and distributed ledger technologies,
including blockchain, are viewed by many as offering a
superior long-term model. These technologies have the
potential to create real level playing fields, transparency
and applications that run exactly as programmed
without any possibility of downtime, censorship, fraud
or third-party interference.
We have already passed the “tipping point” in our
experimenting with decentralized technologies.xvii
There’s simply no going back. So, instead of being
locked into the traditional “centralized” world or
remaining trapped in the space between the two
realities, it is better to see how digital technologies
are shaping the “new world” and affecting all of our
relationships.
As such, it is necessary to become actively involved
in the further development of blockchain and smart
contracts and the creation of a decentralized reality.
Only, if we build the new reality together, will we ensure
that a decentralized world can reach its full potential
and offer greater transparency, convenience, and trust.
When we co-create the future together in this way, new
jobs, opportunities, possibilities will inevitably emerge.
And incorporating multiple perspectives – business,
mathematics, and law – will be essential to make sure
that we make the right decisions in our journey towards
a better decentralized world.
The broader context for this project is a number
of significant cultural shifts. Digital technologies
have already changed our expectations. Consumers
have become smarter, better connected, and more
demanding. They love the “speed” and “convenience”
offered by digital technologies and they are not willing
to give it up. The consumers’ “voice” has become more
powerful than ever before. As a result, their relationship
with business has changed dramatically. Even businessto-business companies need to take consumer views
more seriously.
Who, when and where people “trust” has also changed.
Whereas in the past, we relied heavily on institutions,
intermediaries, and other third parties, we increasingly
place our trust in digital systems and algorithms.
It appears that we have less and less confidence in
“old world” institutions. The speedy development of
distributed ledger technology (including blockchain),
smart contracts and artificial intelligence will only
further automate trust. Institutionalized trust is
replaced by “digital trust.” It is obvious that the
automation of “trust,” “faith,” and “confidence” has a
tremendous impact on worker-employer relationships,
the meaning of leadership, and how management
operates. The opportunity to communicate and
interact with peers directly (through social media and
without the interference of third parties) makes us
more entrepreneurial and creates new opportunities to
The JBBA | Volume 2 | Issue 2 | October 2019
be creative.
Our “new” relationship with digital technology also
makes it possible to have peer-to-peer connections,
communications, interactions, and transactions.
Algorithms and data-analytics help us find partners,
assistants, sponsors, help, accommodation, etc.
Of course, these digital systems aren’t flawless,
but the fact is that we increasingly rely on more
decentralised, peer-to-peer systems. The convenience
of these new systems attracts us. The looser (digital)
connections and interactions are so much faster and
more comfortable than the old “formal” ways of
making fixed appointments and ritualized meetings.
The Millennial generation, in particular, appears to
understand this. They view decentralization as a given
for autonomy, responsibility, and happiness. Millennials
– and this is a mindset, more than a generation – just
seem more attuned to the freedoms and possibilities
of a flatter world. They understand that hierarchical
structures and an overreliance on formal procedures
often discourage open and honest discussion, leading
to either indifference, apathy or burnout.
“Fully-fledged” decentralization doesn’t exist yet. But
the decentralization trend is evident, and we must be
better prepared. There is no time for procrastination,
and we need to become smarter about decentralization
in order to ensure that the Evangelist vision of the future
comes to fruition. Of course, current technologies
and developments aren’t perfect (misuse of data,
fake news, etc.). But these issues cannot be solved by
traditional and centralized means (regulations, etc.). We
must collaborate to find decentralized and tech-driven
solutions now.
i
See, for example, Carlota Perez, Technological
Revolutions & Financial Capital (2002); Timothy Wu,
The Master Switch: The Rise and Fall of Information
Empires (2010).
ii
See Scott Galloway, The Four: The Hidden DNA of
Amazon, Apple, Facebook, and Google (2017).
iii
Don Tapscott & Scott Tapscott, Blockchain
Revolution: How the Technology Behind Bitcoin is
Changing Money, Business, and the World (2016).
William Craig, 15 Biggest Internet Controversies of
the Past Decade, FX Blog, (2018) available at: https://
www.webfx.com/blog/web-design/15-big gestinternet-controversies-of-the-past-decade/.
iv
See Geoffrey G Parker, Marshall W. Van Alsyne &
Shandgeet Paul Choudry, Platform Revolution: How
Networked Markets are Transforming the Economy
and How to Make them Work for You (2016); Alex
Moazed & Nicholas J. Johnson, Modern Monopolies:
What it Takes to Dominate the Twenty First Century
Economy (2016).
v
105
jbba
the
The World Bank, for example, organized a Disrupting
Development event on this theme in Bali in October
2018, available at: https://live.worldbank.org/
disrupting-development.
vi
Erik P. M. Vermeulen, Three Ways to Grow Your
Business in a Digital Age, Medium (2017) available
at:
https://hackernoon.com/3-ways-to-grow-yourbusiness-in-a-digital-age-86e8bb3f33d1.
https://doi.org/10.2139/ssrn.3379443.
xiv
Satoshi Nakamoto, Bitcoin: A Peer-to-Peer
Electronic Cash System (2008), available at: https://
bitcoin.org/bitcoin.pdf.
vii
xv
Steven Johnson, Beyond the Bitcoin Bubble, New
York Times Magazine (January 16, 2018).
See Mark Fenwick, Wulf Kaal, & Erik P. M.
Vermeulen, Why Blockchain Will Disrupt Corporate
Organizations: What Can be Learned from the Digital
Transformation, Journal of the British Blockchain
Association, 1(2), 1-11, (2018) available at: https://doi.
org/10.31585/jbba-1-2-(9)2018.
xvi
See Paul Belleflamme & Martin Peitz, Platforms
and Network Effects, Handbook of Game Theory &
Industrial Organization 286-317 (2018); Nirmala Reddy,
How to Harness the Power of Network Effects, Forbes
(2018) available at: https://www.forbes.com/sites/
forbescoachescouncil/2018/01/02/how-to-harnessthe-power-of-network-effects/#2b41823462e8.
ix
Platforms often use open source software and a
“microservices” architecture to accelerate growth, be
adaptable to change, and give more value to the endusers of the services. Think of these platforms as a
collection of loosely coupled applications which are
configured to interact through internal and external
application programming interfaces (APIs). The
API approach provides flexibility and windows to
new and other platforms. It allows the platforms to
attract innovative ideas from third-party developers.
The downside is that more developers and more
automation are needed to accurately deal with
the increased technology complexity. This require
more investments (more of which later) and a more
centralized organization with more control and
governance mechanisms.
viii
See, for example, Mark Fenwick, Wulf A. Kaal,
Erik P.M. Vermeulen, The Unmediated & TechDriven Corporate Governance of Today's Winning
Companies, University of St. Thomas (Minnesota)
Legal Studies Research (2017) available at: https://doi.
org/10.2139/ssrn.2922176; Mark Fenwick & Erik P.
M. Vermeulen, Technology & Corporate Governance,
The Texas Journal of Business Law (2019) vol. 48(1),
1-22.
xvii
x
See, for example, Scott Galloway, The Four: The
Hidden DNA of Amazon, Apple, Facebook, and
Google (2017).
xi
Mark Fenwick, Joseph A. McCahery, & Erik P.
M. Vermeulen, (2019). The End of ‘Corporate’
Governance: Hello ‘Platform’ Governance. European
Business Organization Law Review, Vol. 20, No. 1,
171–199; Mark Fenwick & Erik P. M. Vermeulen,
A Sustainable Platform Economy & the Future
of Corporate Governance. European Corporate
Governance Institute Law Working Paper, No.
441/2019, p. 1-38 (2019) available at: https://doi.
org/10.2139/ssrn.3331508.
xii
Mark Fenwick & Erik P. M. Vermeulen, Time for
Regulators to Open the 'Black Box' of Technology,
Lex Research Topics in Corporate Law & Economics
Working Paper, No. 2019-2 (2019) available at: https://
doi.org/10.2139/ssrn.3379205.
xiii
Mark Fenwick & Erik P. M. Vermeulen. A Primer
on Blockchain, Smart Contracts & Crypto-Assets,
Lex Research Topics in Corporate Law & Economics
Working Paper, No. 2019-3, p. 1-20, (2019) available at:
The JBBA | Volume 2 | Issue 2 | October 2019
106
jbba
the
The JBBA | Volume 2 | Issue 2 | October 2019
107
jbba
the
perspective
Is Blockchain Part
of the Future of Art?
OPEN ACCESS
ISSN Print: 2516-3949
https://doi.org/10.31585/jbba-2-2-(10)2019
Stylianos Kampakis
University College London, UK
Correspondence: stylianos.kampakis@gmail.com
Received: 30 July 2019 Accepted: 13 August 2019 Published: 17 August 2019
Art is an important part of our culture, and economy.
The global art market reached $67 billion in 2018i.
While some individuals might purchase art solely for
their own enjoyment, for others it can be a status
symbol or an investment.
However, the world of art is not without its problems.
Two of the most important challenges are are fraud,
and ownership of digital assets. However, blockchain is
promising to solve both of these issues soon.
Fraud in artwork usually shows up in the form
of forging. While it is not easy to estimate the total
amount of money exchanged in forged art, it is clear
that individuals and museums might be losing millions
of dollars every year because of forging. In 2018, it
was reported that a museum in Franceii dedicated
to the art of Étienne Terrus, discovered that most
of the artworks were not real. There are also plenty
other famous cases of forgery last year, such as that
of an exhibition about Amedeo Modigliani in Genoa,
where 21 of the 30 artworks were confirmed as fakesiii.
While these paintings might have been worth millions
of dollars (if they were authentic), the fakes were
practically worthless.
These are only two of the forgery cases that took
place in 2018. It is easy to find more examples, but
what is shocking, is that a large part of the forgeries is
never uncovered. It is possible that a forged artwork
exchanges hands many times, until the final owner
realizes that the actual value is zero.
Given blockchain’s ability to help in the provenance of
goods, it is a natural ally in the battle against art forgery.
The problem of authenticity in art, is not different to
the problem of provenance in supply chains. A work
can be identified through a single identifier which can
be, for example, an image hash, such as perceptual
hashing. The ownership of the work can be stored
on the blockchain. A smart contract or a Ricardian
contract can be used in order to transfer ownership of
the artwork.
The JBBA | Volume 2 | Issue 2 | October 2019
There are different companies working on that problem
right now, like Vastari and Thomas Crown Art. While
no standard solutions have emerged, we are likely to
see one in the next few years.
Another important problem that blockchain is aiming
to solve, is the ownership of digital assets. While for
physical assets the only problem is forgery, digital
assets can be copied an unlimited number of times.
Therefore, until blockchain came about, it was
impossible to create digital collectibles.
The first instance of a blockchain-based collectible
was the Rare Pepe Wallet, in 2016, based on an internet
memeiv. However, the most monumental moment for
crypto collectibles was the creation of Cryptokitties in
2017. Cryptokitties is by far the most successful game
of crypto collectibles. In this game, the users own cats
that have certain attributes, like colour or weird features
like wings. The cats can mate with each other creating
new cats with unique combinations of attributes. There
are in total 4 billion cats that can be bred.
The game combines elements of collectible card
games, with the breeding mechanism that could only
exist inside a computer. The game reached a total
number of 1 million transactions in October 2018.
At the time of writing, there are multiple exchanges
for crypto-collectibles and blockchain-based artworks:
opensea.io, digitalobjects.art, rareart.io, pixura.io,
Known Origin, Maecenas and Makers Place are some
of them. Artists can easily secure ownership their
artworks on blockchain through Mintable or Pixura.
On some of those exchanges, you can find collectibles
and artwork that have reached higher price tags. Some
artworks on Digital Objects can go up to $1000. On
Open Sea, there are collectibles that are sold for 10
ethers or more, which, at the time of writing, amounts
to more than $3000. Finally, a digital card of Elon
Musk was recently sold for over $50,000.
Ethereum has fully supported crypto-collectibles,
109
jbba
the
through the ERC-721 standard. Much like the ERC-20
standard describes how to setup smart contracts for
fungible tokens, the ERC-721 standard, describes how
to setup a smart-contract for non-fungible tokens. That
is, all tokens that are using this standard are unique.
The aforementioned exchanges are all based on this
standard.
So, to answer the question that was set out in the
beginning of the article: Yes, blockchain is definitely
going to play a key role in the future of art, and we
saw in this short article two ways in which it is going
to disrupt the world of art. It is clear that there are
still some barriers to the widespread adoption of
blockchain.
Cryptocurrency prices can still fluctuate rapidly,
and the speculative bubble that burst in December
2018 might have hurt the credibility and popularity
of cryptocurrencies. Also, buying Ethereum and
exchanging is something that is not easy for everyone.
While in practice, tools like the Metamask Chrome
extension or the Brave browser make it easy to
use Ethereum, audiences that are less familiar with
technology might find this challenging. Given that a
large part of high net-worth art buyers might be of
older age, this can become a significant barrier.
However, given the usefulness of blockchain and its
rising popularity, we expect that in the next few years
accessibility will increase, and use cases will multiply.
Therefore, blockchain for art is here to stay.
Disclaimer: The author of this article is personally involved in this
space, by using generative adversarial networks to create works of art
and sell them on blockchain.
https://www.artsy.net/article/artsy-editorial-globalart-market-reached-674-billion-2018-6
i
https://www.theguardian.com/global/2019/jun/15/
french-art-museum-full-of-fakes-etienne-terrus
ii
https://www.telegraph.co.uk/news/2018/01/10/
modigliani-paintings-thought-worth-tens-millionsdenounced-fakes/
iii
iv
https://rarepepewallet.com/
The JBBA | Volume 2 | Issue 2 | October 2019
110
jbba
the
The JBBA | Volume 2 | Issue 2 | October 2019
111
jbba
the
For Authors
We are now accepting manuscripts for
Volume 3, Issue 1 (March 2020).
Please submit your article by using the document
template provided in the link below. Please do NOT
include any author/institute identifiable details
in the manuscript as this document is sent to the
reviewers for a 'double blind' review. The details
including author(s), affiliations, correspondence email,
acknowledgements/COI/ if any, should be provided
as a separate document.
https://www.britishblockchainassociation.org/
jbba-template
(Max. word count = 5000 words, excluding references)
Step-by-step guide to manuscript submission:
1.
2.
3.
Author submits the article via JBBA Scholastica site
by using the above template, which must include:
an article header, an abstract (max 300 words), a
conclusion, and references (in IEEE referencing
style). The abstract should reflect both content
and emphasis of the paper. Please use 'British
English' when spelling words, for example, write
'centralisation' with an 'S', and not 'centralization'
with a 'z'. The article submission fee is $10 per
artcile and is paid directly to Scholastica.
The article will undergo quick initial screening
by the Managing/ Associate Editor-in-Chief. If
it was deemed that the article is inappropriate
for the journal for a reason that can be quickly
ascertained, such as the subject matter being too
far from the scope of the journal, the authors
will normally be informed within 1-2 weeks of
submission.For all other submissions, we will first
seek to gauge the level of interest that the paper
will have, on the assumption that it is correct and
well written. This will normally mean sending
the paper out to the editor for "quick opinions",
after which its suitability will be discussed by the
Associate Editors-in-Chief.
The paper will then be sent for review. Post review,
there are 3 possible outcomes:
•
•
•
Accepted (will be allocated for publication)
Rejected
Revise and submit
4.
The author(s) is/are informed of the review
outcome by the Managing Editor. The final
decision for all manuscripts is taken by the Editorin-Chief or an Associate EIC. The handling
editor will make a recommendation – sometimes
a tentative one – and this will be discussed. In
The JBBA | Volume 2 | Issue 2 | October 2019
5.
cases of doubt, more quick opinions will usually
be sought. Some stages of the above process may
occasionally be bypassed if the content is so close
to the expertise of one or more of the editors that
extra external information is clearly not necessary
for a fair decision to be made.
We aim for a turnaround time of 5 weeks from
submission to publication.
References
References should follow IEEE style referencing.
IEEE referencing style, also known as the numerical
system, uses numerical citations in square brackets to
refer to a reference list at the end of the paper. You
may wish to chose the resources below to easily cite the
references in IEEE format:
http://www.citationmachine.net/ieee
OR
http://www.citethisforme.com/citation-generator/
ieee
Here is an example of indicating relevant reference
in the text:
"...The theory was first put forward in 1987 [1]."
"...Scholtz [2] has argued that......."
"...Several recent studies [3, 4, 15, 16] have suggested
that..."
"...For example, see [7]."
Check out the link below for more information on
IEEE referencing:
https://libguides.murdoch.edu.au/IEEE/text
Here is an example of how an IEEE reference list
should appear at the end of the paper:
[1] T. Kaczorek, "Minimum energy control of fractional
positive electrical circuits", Archives of Electrical
Engineering, vol. 65, no. 2, pp.191–201, 2016.
[2] P. Harsha and M. Dahleh, "Optimal management
and sizing of energy storage under dynamic pricing for
the efficient integration of renewable energy", IEEE
Trans. Power Sys., vol. 30, no. 3, pp. 1164–1181, May
2015.
[3] A. Vaskuri, H. Baumgartner, P. Kärhä, G. Andor, and
E. Ikonen, "Modeling the spectral shape of InGaAlPbased red light-emitting diodes," Journal of Applied
Physics, vol. 118, no. 20, pp. 203103-1–203103-7, Jul.
2015. Accessed on: Feb. 9, 2017. [Online]. Available:
doi: 10.1063/1.4936322
[4] K. J. Krishnan, "Implementation of renewable
energy to reduce carbon consumption and fuel cell as a
113
jbba
the
back-up power for national broadband network (NBN)
in Australia," Ph.D dissertation, College of Eng. and
Sc., Victoria Univ., Melbourne, 2013.
[5] C. R. Ozansoy, "Design and implementation of a
Universal Communications Processor for substation
integration, automation and protection," Ph.D.
dissertation, College of Eng. and Sc., Victoria Univ.,
Melbourne, 2006. [Online]. Accessed on: June 22,
2017. [Online]. Available: http://vuir.vu.edu.au/527/
Article Processing Charge
If your article is accepted for publication, we will ask
you to pay the Article Processing Charge (APC) of
£685 (£585 for members of the British Blockchain
Association). For full details about the APC and our
waiver policies, please visit the 'About us' section of
the journal:
https://jbba.scholasticahq.com/about
Listing sources of information at the end of a paper
is an important part of professional scholarship and
writing. It is highly suggested that all references should
be checked if they are complete and there should be no
missing or uncited references.
Papers that have not been published, even if they
have been submitted for publication, should be cited
as “unpublished”. Papers that have been accepted for
publication should be cited as “in press”. Capitalize
only the first word in a paper title, except for proper
nouns and element symbols. For papers published in
translation journals, please give the English citation
first, followed by the original foreign-language citation.
The APC covers the cost of administration, copy editing,
formatting, layout, online hosting, archiving, digital
object identifier, journal marketing, designing, print
publication and print distribution. Article processing
charges will enable full, immediate, and continued
open access for all work published in the JBBA. This
allows unrestricted access; to authors, through the
widest possible dissemination of their work; and to the
blockchain community in general, through facilitation
of information availability and scientific advancement
of distributed ledger technologies and allied disciplines.
Plagiarism Policy
The JBBA accept articles in the following
categories:
•
•
•
•
•
•
•
•
•
•
•
Original Scientific Research (Qualitative,
Quantitative)
Systematic Reviews
Meta-analysis
Conference Research Abstracts
Comparative studies
Case Studies & Essays
Book Reviews
Critical reviews and Analysis
Interviews / Opinions of Key Influencers/
Thought Leaders
Editorial
Commentary on latest issues and trends in
blockchain & DLT
We may also include selected mix of articles published
on our website. Interviews/ opinions are not peer
reviewed but all content must be approved by the
handling editor to assess suitablility for publication.
Editor-in-chief has overall responsibility for the
content, production and strategic direction of the
JBBA.
Time to publication
On average, papers receive a decision in 4 weeks from
first submission and accepted articles are published
online and indexed in an additional 14 days.
The JBBA | Volume 2 | Issue 2 | October 2019
We have a very stringent plagiarism policy in place and
all articles are screened on Viper Plagarism Checking
Tool for detection of plagiarism. We accept a plagiarism
score of less than 10%. This allows the highest possible
level of scholarly integrity and transparency in contents
published by the JBBA.
General Guidance for Authors
The editors request that all articles shall be submitted
via Scholasticahq portal using the word template
document provided via the above link and must include
an abstract. We prefer text in Garamond font, size 12,
double spacing except for references at the end of the
paper, which should be single space.
The Journal allows authors to deposit a copy of their
own work at an instituitional repository.
The JBBA does not publish the work that has been
published elsewhere. The only exception to that rule
are original research papers published as "pre-print
repositories" on SSRN or ResearchGate. Submission
implies that the work is not being considered for
publication elsewhere and that it has been approved by
all authors. Original research articles should not exceed
10 A4 size pages (c. 500 words per page, excluding
Tables and Figures).
Author names and contact information are provided
during the submission process. The person who submits
the paper via Scholastica is the corresponding author
and an active email address is needed.) The first author
114
jbba
the
or primary author is the person who conducted most
of the work described in the paper, and is usually the
person who drafted the manuscript. The “senior author”
is usually the last person named, and is generally the
one who directed or oversaw the project. The names of
the “contributing authors” appear between the primary
and senior authors, and the order should reflect their
relative contribution to the work. By completing the
submission, you automatically agree to the statement
that the manuscript has not been published elsewhere
and that it has not been submitted simultaneously for
publication elsewhere. Authors who fail to adhere to
this condition will be charged with all costs which
JBBA incurs, and their papers will not be published.
The text of accepted manuscripts can sometimes be
edited to enhance communication between the author
and the reader.
The link below provides useful instructions on how to
write an academic/ scholarly article:
https://canvas.hull.ac.uk/courses/371/pages/
academic-writing-style
Duties of Authors
Authors should submit original research work only
(except if it this is clearly not the intention of the
article – as might be the case, for example, with a
survey paper, interview, analysis, commentary). Any
results that are not due to the authors should be clearly
cited. Copying or paraphrasing substantial parts of
another paper without attribution is unacceptable, as is
any other form of plagiarism.
No paper should be submitted to JBBA that is
already published elsewhere or is being considered for
publication by another journal.
Those named as authors of a paper should have
made a substantial contribution to the paper, or to a
more general project of which the paper is a part, and
anybody who has made such a contribution should be
offered authorship.
Authors who discover important errors in their
articles, whether published or under consideration for
publication, should notify the journal promptly.
______________
The JBBA | Volume 2 | Issue 2 | October 2019
115
jbba
the
The Journal of The
British Blockchain
Association
VOLUME 1 | ISSUE 1 | ISSN PRINT: 2516-3949
INAUGURAL EDITION JULY 2018
Collaboration. Innovation. Excellence
EUROPE'S FIRST PEER REVIEWED SCIENTIFIC BLOCKCHAIN JOURNAL
jbba
the
The Journal of The
British Blockchain
Association
britishblockchainassociation.org/jbba
Volume 1 | issue 2 | issN PriNt: 2516-3949
he
editioNtdecember
2018
collaboration. innovation. excellence
decentralised healthcare on the blockchain
challenges of investigating
cryptocurrencies
& blockchain
related crime
Setting the "Gold
Standard"
in Blockhain
e-Voting on the
blockchain
International
Blockchain
Standards:
A Research
by ConsenSys
ethereum
registration
Authorities for
Private sidechains
Blockchain &
Post Brexit
United Kingdom
crypto ricardian
rent & a
crypto coase
theorem
utility tokens &
Quantity theory
of money
IBM and Walmart
Blockchain Pilot
by BRI
the cost of trust:
A Pilot study
Blockchain & GDPR:
A Delphi Study
blockchain research:
exclusive interview with
Andreas m. Antonopoulos
EXCLUSIVE INTERVIEW WITH
LORD HOLMES OF
RICHMOND MBE
UK BLOCKCHAIN
APPG VICE CHAIR
britishblockchainassociation.com/jbba
AcAdemic pArtners
SPONSORS & ACADEMIC PARTNERS
The JBBA | Volume 1 | Issue 1 | July 2018
Portrait courtesy The House of Lords