{"title":"Introduction to Blockchain Technology","authors":"Andreas Bolfing","doi":"10.1093/oso/9780198862840.003.0006","DOIUrl":null,"url":null,"abstract":"This chapter gives an introduction to blockchain technology which was proposed by the pseudonymous Nakamoto (2008) with his well-known Bitcoin paper to enable online payments in a decentralized digital cash system, solving the double-spending problem where someone can make two payments with the same coin. The chapter starts with an informal outline of the application of a blockchain and a brief explanation of how a blockchain network is able to reach consensus about the common state of a transaction history. Furthermore, it introduces the Proof-of-Work (PoW) algorithmwhich needs to be donein order to extend the blockchain with new blocks. Since the PoW is a very costly computational algorithm, the transaction data is stored in previous blocks resistant to modification, and thus the PoW safeguards the order of blocks, forming a tamper-proof history of transactions. As a last step, it examines the double-spending attack, which is a fundamental attack to the integrity of a blockchain based system.","PeriodicalId":202275,"journal":{"name":"Cryptographic Primitives in Blockchain Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Cryptographic Primitives in Blockchain Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1093/oso/9780198862840.003.0006","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This chapter gives an introduction to blockchain technology which was proposed by the pseudonymous Nakamoto (2008) with his well-known Bitcoin paper to enable online payments in a decentralized digital cash system, solving the double-spending problem where someone can make two payments with the same coin. The chapter starts with an informal outline of the application of a blockchain and a brief explanation of how a blockchain network is able to reach consensus about the common state of a transaction history. Furthermore, it introduces the Proof-of-Work (PoW) algorithmwhich needs to be donein order to extend the blockchain with new blocks. Since the PoW is a very costly computational algorithm, the transaction data is stored in previous blocks resistant to modification, and thus the PoW safeguards the order of blocks, forming a tamper-proof history of transactions. As a last step, it examines the double-spending attack, which is a fundamental attack to the integrity of a blockchain based system.