Page 21 - FIGI: Security Aspects of Distributed Ledger Technologies
P. 21

kept offline. There are also online wallets, which, in   out  only  if  certain  conditions  are  met.  Smart  con-
            the current state of the industry, are mostly third par-  tracts are – and must be - executed independently
            ty crypto exchanges also acting as ‘custodian’ of the   by (user) every node on a chain.
            keys so as to ensure that any token can be quickly   Smart contracts are tied to the blockchain-driven
            made liquid so as to be traded.  Crypto-exchanges   transaction itself. For example, in the Ethereum block-
                                        87
            are however vulnerable and have been hacked. If the   chain, its Solidity programming language allows the
            exchange is offline, no tokens can be accessed. 88  use of natural language ‘notes’ in an EtherScript that
               A newer and ostensibly more secure system uses   helps improve human readability in smart contracts.
            what are called secure multiparty computation      These notes are analogous to the wording in a sep-
            (MPC) to secure wallets. This means that multiple   arate (physical) legal contract. The physical contract
            non-trusting computers can each conduct computa-   signature is replaced by the use of cryptographic
            tion on their own unique fragments of a larger data   keys that indicate assent by participant nodes to
            set to collectively produce a desired common out-  the ‘legal’ terms embedded in the blockchain by the
            come without any one node knowing the details of   EtherScript. 94
            the others’ fragments. 89                            Potential benefits of smart contracts include low
               This is combined with what is known as ‘threshold   contracting, enforcement, and compliance costs.
            cryptography’ for the computation function across   They  consequently  make  it  economically  viable  to
            multiple distributed key shares to generate a private   form contracts for numerous low-value transactions.
            key signature  This  allows multiple parties acting   Smart contracts then could be successfully applied
                         90
            as multiple transaction approvers to each provide   in e-commerce, where they can significantly facil-
            their secret share of a private key to MPC algorithms   itate trade by reducing counterparty risk and the
            running locally on their devices to generate a sig-  costs of transacting by minimizing the human fac-
            nature. When the minimum number of pre-defined     tor in the process. In a practical use case example,
            approvers provide their shares, a signature  is gen-  where a contract between the parties to purchase a
            erated without ever creating an entire key or ever   property asset is written into a blockchain and a set
            recombining shares into a whole key on any device,   triggering event, such as a lowering of interest rates
            at any time. There is thus no single vulnerable com-  to a certain level is reached, the contract will execute
            puter where a key can be compromised. In all, this   itself according to the coded terms and without any
            functionality is referred to as ‘Threshold Signatures   human intervention. This could in turn trigger pay-
            using MPC.’ One of the first iterations of this wallet is   ment between parties and the purchase and regis-
            KZen’s ZenGo wallet. 91                            tration of a property in the new owner’s name. Fig-
               There are also web apps to manage a user’s      ure 3 shows the use of a smart contract that provides
            account client-side, given your key (or data required   insurance for crop failure whereby small farmers in
            to recover it, such as a seed or passphrase), secrets   developing  countries  are  automatically paid  out  if
            are not known to the back-end.  Hybrid systems fea-  automated sensors – as oracles to a agri-specific
            ture the key encrypted on the client-side, but stored   DLT– detect insufficient rainfall.
            encrypted in a cloud are used to login to the platform.  The smart contract may also make the need for
                                                               escrow redundant. The legal impact is established
            5�4  Smart Contracts                               through the smart contract execution, without addi-
            As noted above, some  DLT implementations such     tional intervention. This methodology contrasts with
                                 92
            as Ethereum have built-in intelligence, setting (busi-  the conventional, centralized ID database in which
            ness logic) rules about a transaction as part of what   rules are set at the entire database level, or in the
            is called a ‘smart contract.  The smart contract can   application, but not in the transaction.
                                    93
            execute in minutes.                                  In another example, national IDs could be placed
               Smart contracts are contracts whose terms are   on a specific blockchain, and the identifiable person
            recorded in blockchain code and which can be auto-  could embed (smart contract) rules into their unique
            matically executed. The instructions embedded with-  ID entry, allowing only specific entities to access their
            in blocks - such as ‘if’ this ‘then’ do that ‘else’ do this   ID for specific purposes and for a certain time. The
            - allow transactions or other actions to be carried   person can, through the blockchain, monitor this use.









                                                                   Security Aspects of Distributed Ledger Technologies  19
   16   17   18   19   20   21   22   23   24   25   26