Figure 1 - uploaded by Mansi Bosamia
Content may be subject to copyright.
An example of Merkle Tree

An example of Merkle Tree

Source publication
Article
Full-text available
A current popular trend of wallet security research is cryptography. For that Merkle tree is one of the solutions to enhance wallet security. It is basically used for cryptocurrencies, file system authentication, backup system, control system, database, etc. but it can be used for communication authentication and many more. And that is highlighted...

Context in source publication

Context 1
... leaves is called blocks. The constant transactions are the tree leaves from a single block access by Merkle root. In Merkle tree each leaf node has the block data hash and each non-leaf node has its child nodes cryptographic hash. Merkle tree manages the complete account ledger of each user's transactions. The structure of Merkle tree shown in Fig. 1, in this example it contains Transactions ABCD and Hash. This figure is very basic; an average block generally works with 500 or more transactions, not just four. All the bottom nodes are leave nodes and intermediate hash nodes are branches and top hash indicates the Merkle root. This kind of figure through leaf nodes of the Merkle ...

Similar publications

Preprint
Full-text available
We examine the high-frequency return and volatility of major cryptocurrencies and reveal that spillovers among them exist. Our analysis shows that return and volatility clustering structures are distinct among different cryptocurrencies, suggesting that return and volatility might have different spillover patterns. Further investigation via minimal...

Citations

... Organizational success now depends more than ever on adaption techniques [14]. Businesses that use structured adaptation frameworks have 89% better return on investment and 67% higher success rates in technology integration. ...
... Bitcoin transactions are efficiently stored in a hash-based Merkle tree. All operations are performed efficiently on the Merkle tree [5]. Within each block, the first transaction is coin-based, serving as the reward for the winning miner. ...
Article
Full-text available
In permissionless blockchain systems, Proof of Work (PoW) is utilized to address the issues of double-spending and transaction starvation. When an attacker acquires more than 50% of the hash power of the entire network, they gain the ability to engage in double-spending activities, posing a significant threat to the PoW consensus algorithm. This research focuses on the consensus algorithm employed in the Bitcoin system, explaining how it operates and the security challenges it faces. The proposed modification to the PoW algorithm imposes a restriction on miners: they are not allowed to accept consecutive blocks from the same miner into the final local blockchain to prevent the 51% attack problem. This modification supports transactions that require six confirmations. In the event an attacker attempts a 51% attack with a private chain that consists of fewer than 6 blocks, it becomes easier to detect a double-spending attack before accepting the attacker’s private chain. The modified algorithm introduces a "Safe Mode Detection Algorithm" that scrutinizes incoming blocks for adjustments at the top of the local blockchain. If inconsistencies are identified, the consensus algorithm proceeds cautiously by comparing the UTXO dictionaries from the attacker’s chain with those from the miner’s own blockchain. This meticulous comparison aims to detect instances of double-spending. If such instances are detected, the miner rejects the attacker’s chain, establishing a double-spend-free environment and thwarting 51% attacks.
... A Merkle tree stores all transactions in a block by creating a digital fingerprint of the whole data of the block. In general, the Merkle tree is used to structure the records in a given block (Bosamia and Patel 2018). Also, each new block consists of a hash of a previous block. ...
Chapter
Although blockchain technology tied (and sometimes is reduced to) cryptocurrency digital assets, it has significant capabilities to manage and control markets. This chapter proposed an open energy market using blockchain technology to ensure developing a sustainable and reliable trade market. The concept of an open (liberalized) energy market and emerging challenges for import and export sides are introduced and the way blockchain technology can facilitate introducing reliable open energy markets. Moreover, major aspects of such markets are introduced and explained.
... Merkle ağaçları kavramının (Wikipedia, 2021c), birden çok belgenin bir blok halinde toplanması yeni bir yaklaşım olarak; 1992'de Bayer, Haber ve Stornetta tarafından geliştirmiştir. Merkle ağaçları kavramı güvenli doğrulamayı gerçekleştirirken (Bosamia & Patel, 2018;Wikipedia, 2021c), ilk blok zincirin kavramlaşması da Nakamoto tarafından, kripto-para birimi bitcoin ile gerçekleşmiştir (Wikipedia, 2021a). Bitcoin'in 2009 yılında Satoshi Nakamoto (Trottier, 2013) ismiyle ortaya çıkmasıyla birlikte dijital varlık kavramının güçlenmesi, fikirlerin ortaya çıkmasının motivasyon kaynağını oluşturmaya başladığı söylenebilmektedir. ...
Article
Full-text available
The reproduction of the work of art with technical possibilities has occupied the intellectual and artistic circles with the industrial revolution. The reproduction of the work of art, which started with photography, brought with it some ethical problems and caused it to be experienced in discussions. The forms of production changed by the technologies allows it to change in the social of structure and to reach new realities. In addition to developments that change production forms such as augmented reality and artificial intelligence, new approaches and realities are emerging in the production of works of art. In this article, the production system, method, platforms and value system of non-Fungible Token (NFT), in other words, unchangeable unique assets, which is called crypto art, of the reproduction of the work of art with technical possibilities are examined. At the same time, the sociological and economic aspects of the artist's new field of action, which is gained by the acceptance of the artwork or representative asset attached to the standard contract and account codes that produce unique value, such as ERC721 and ERC-1155 over the Ethereum blockchain, are examined. Details about NFT's blockchain technology, general structure and usage are examined and the concept of crypto art is explained with technical details. The basic structure, limits, usage costs are explained and the methods of being a part of NFT are explained step by step. The crypto-code relationship between smart contracts and Ethereum, which is the key feature of immutable unique assets is explained. The fundamental dependence of the concept of crypto art on motion graphics and the determinants of the production methods of the crypto art work are expressed. Considering the fact that data decentralization is realized with IPFS protocol instead of HTTP protocol and that collective production is a result of hyperreal life forms, the movement of digital art production forms is emphasized. In addition, technological innovations and production methods are examined and discussed starting from the first examples.
... For more security sometimes anonymous transactions can join by bank id [3]. Blockchain can also be used for KYC (Know Your Customer) process by sharing the identity proof not the data [5,11]. Blockchain can be used in other financial services like online payment, transfer of funds, digital assets, issue and trade assets like bonds, crypto-currency like Bit coin, smart contracts, distributed ledger technology for clearing and settlement, public services, internet of things (IoT), security services, reputation systems, insurance sector like insurance deductible and DAO application etc. [5,6]. ...
Article
Full-text available
The blockchain is a relatively new technology in the field of computer science. It has received enhanced interests in recent years for Research and Scientific Industry. As its first implementation attention is crypto-currency. Blockchain provides as an immutable distributed ledger which performs transactions with untrusted participants in a decentralized network. It forms a new distributed architectures, which has no central authority and has smart contracts to shared states and perform transactions. Blockchain applications are crypto-currency based online wallets, Internet of Things, springing up, financial services, risk management, reputation system, etc. This paper aims to share knowledge on the growing importance of blockchain technology in real-world applications. This paper also focused on Blockchain core components and technologies to lay out the comparisons of typical Consensus Algorithm for security aspects. This comparison and blockchain applications concludes that alternative Merkel tree based blockchains are available in the market for faster and secure transactions.
Chapter
A blockchain functions as a decentralized network, serving both as a digital ledger and a mechanism for securely transferring assets without the need for a central authority. Much like the internet facilitates the digital flow of information, blockchain empowers the digital exchange of various value units. The tokenization of various assets, including currencies and real-world applications, is a feasible endeavor within the realm of blockchain networks. This technology not only facilitates secure value transfers but also maintains a persistent record of transactions, establishing a singular version of truth referred to as the network state. This chapter provides a succinct overview of blockchain, highlighting its defining characteristics that position it as a prominent and transformative technology.
Chapter
After the COVID pandemic, the healthcare sector has faced many challenges as telehealth increased and the need for a secure and efficient healthcare record system became essential. Nowadays, the healthcare sector suffers from many problems, such as security, trust, availability of data, and drug traceability. Blockchain technology is a recent technology that has proven its efficiency in many sectors, such as finance, banking, bitcoin, and healthcare sectors. This chapter describes blockchain integration in the healthcare sector to cover these problems. The authors will start by introducing blockchain technology. After that, they will present the healthcare sector challenges. Then, they focus on advantages of Blockchain usage to resolve existing problems in the healthcare sector, especially in the electronic health record and drug traceability.
Article
The popularity of blockchain, which is a technology with a distributed architecture, is increasing day by day due to the advantages it provides. Along with blockchain, interest in high-performance and efficient hash algorithm applications is increasing rapidly. While considering the amount of power and environmental problems required for these applications, more efficient algorithms were needed. In this study, a comparison of SHA-256 and BLAKE2b, one of the most popular algorithms, is presented. In the experiments, a standard Intel i5 based computing system is used. The benchmarking approach focuses on computationally heavy processes such as Proof of Work and Merkle Tree. This article presents a comparison of these two algorithms in a Bitcoin-like mining architecture.