block-news.club

Crypto Club

Smart contracts

Smart contract

From Wikipedia, the free encyclopediaJump to navigationJump to search

Smart contractshideThis article has multiple issues. Please help improve it or discuss these issues on the talk page(Learn how and when to remove these template messages)This article possibly contains original research(December 2016)This article may be confusing or unclear to readers(November 2016)This article’s factual accuracy is disputed(August 2019)

smart contract is a computer program or a transaction protocol respectively, which is intended to automatically execute, control or document respectively legally relevant events and actions according to the terms of a contract, of an agreement or of a negotiation.[1][2][3][4] The objectives of smart contracts are the reduction of need in trusted intermediators, arbitrations and enforcement costs, fraud losses, as well as the reduction of malicious and accidental exceptions.[5][2]

Vending machine is mentioned as the oldest piece of technology equivalent to smart contract implementation.[3] 2014’s white paper about cryptocurrency Ethereum mentions Bitcoin protocol to be a weak version of the concept of smart contracts as defined by Nick Szabo.[6] Since Ethereum, various cryptocurrencies support scripting languages for more advanced smart contracts between untrusted parties.[7]

Contents

History

Smart contracts were first proposed in the early 1990s by computer scientist, lawyer and cryptographer Nick Szabo, who coined the term.[8][9] In 1998, the term was utilized to describe objects in rights management service layer of the system The Stanford Infobus, which was a part of Stanford Digital Library Project.[1]

With the 2015’s implementation of Ethereum, based on blockchains,[10][11][12] “smart contract” is mostly used more specifically in the sense of general purpose computation that takes place on a blockchain or distributed ledger. In this interpretation, used for example by the Ethereum Foundation[6] or IBM,[13] a smart contract is not necessarily related to the classical concept of a contract, but can be any kind of computer program. A smart contract also can be regarded as a secured stored procedure as its execution and codified effects like the transfer of some value between parties are strictly enforced and can not be manipulated, after a transaction with specific contract details is stored into a blockchain or distributed ledger. That’s because the actual execution of contracts is controlled and audited by the platform, not by any arbitrary server-side programs connecting to the platform.[14][15]

In 2017, by implementing the Decree on Development of Digital EconomyBelarus has become the first-ever country to legalize smart contracts. Belarusian lawyer Denis Aleinikov is considered to be the author of a smart contract legal concept introduced by the decree.[16][17][18]

In 2018, a US Senate report said: “While smart contracts might sound new, the concept is rooted in basic contract law. Usually, the judicial system adjudicates contractual disputes and enforces terms, but it is also common to have another arbitration method, especially for international transactions. With smart contracts, a program enforces the contract built into the code.”[19]

Implementations

Byzantine fault-tolerant algorithms allowed digital security through decentralization to form smart contracts. Additionally, the programming languages with various degrees of Turing-completeness as a built-in feature of some blockchains make the creation of custom sophisticated logic possible.[6][20]

Notable examples of implementation of smart contracts include the following:

  • Bitcoin provides a Turing-incomplete script language that allows the creation of custom smart contracts on top of Bitcoin like multisignature accounts, payment channels, escrows, time locks, atomic cross-chain trading, oracles, or multi-party lottery with no operator.[21]
  • Ethereum implements a Turing-complete language on its blockchain, a prominent smart contract framework.[22]
  • Ripple (Codius), smart contract development halted in 2015
  • DAML is a smart contract language implementation based on GHC.
  • Solidity is a object-oriented smart contract language.
  • Blockchain domains are another emerging technology powered by smart contracts. They are built from a collection of complex smart contracts.[23][24]

Replicated titles and contract execution

In 1998, Szabo proposes that smart contract infrastructure can be implemented by replicated asset registries and contract execution using cryptographic hash chains and Byzantine fault-tolerant replication.[25] Askemos implemented this approach in 2002[26][27] using Scheme (later adding SQLite[28][29]) as contract script language.[30]

One proposal for using bitcoin for replicated asset registration and contract execution is called “colored coins”.[31] Replicated titles for potentially arbitrary forms of property, along with replicated contract execution, are implemented in different projects.

As of 2015, UBS was experimenting with “smart bonds” that use the bitcoin blockchain[32] in which payment streams could hypothetically be fully automated, creating a self-paying instrument.[33]

Security issues

A blockchain-based smart contract is visible to all users of said blockchain. However, this leads to a situation where bugs, including security holes, are visible to all yet may not be quickly fixed.[34] Such an attack, difficult to fix quickly, was successfully executed on The DAO in June 2016, draining US$50 million in Ether while developers attempted to come to a solution that would gain consensus.[35] The DAO program had a time delay in place before the hacker could remove the funds; a hard fork of the Ethereum software was done to claw back the funds from the attacker before the time limit expired.[36]

Issues in Ethereum smart contracts, in particular, include ambiguities and easy-but-insecure constructs in its contract language Solidity, compiler bugs, Ethereum Virtual Machine bugs, attacks on the blockchain network, the immutability of bugs and that there is no central source documenting known vulnerabilities, attacks and problematic constructs.[22]

Copyright © All rights reserved. | Newsphere by AF themes.