{"id":43,"date":"2016-05-15T00:13:01","date_gmt":"2016-05-15T00:13:01","guid":{"rendered":"https:\/\/www.w3.org\/community\/cryptoledgers\/?page_id=43"},"modified":"2017-05-20T23:32:22","modified_gmt":"2017-05-20T23:32:22","slug":"principles-and-capabilities","status":"publish","type":"page","link":"https:\/\/www.w3.org\/community\/cryptoledgers\/principles-and-capabilities\/","title":{"rendered":"CryptoLedgers guiding principles and critical capabilities"},"content":{"rendered":"<h3>Preface<\/h3>\n<ol>\n<li>The success of BitCoin as alternative CryptoCurrency and its underlying <a href=\"http:\/\/blockchain.info\/unconfirmed-transactions\" target=\"_blank\" rel=\"nofollow\">BlockChain<\/a> technology has inspired many others in the exchange of digital assets.  Given the proliferation of emerging BlockChain variants, it is timely to establish critical capabilities for evaluation, analysis and offer deeper insights to help Enterprises set direction to consolidate and eliminate &#8216;silo or point solutions&#8217; leading to issues that are costly and difficult to unwind.<\/li>\n<li>This article sets out the guiding principles and critical capabilities of CryptoLedger implementations.  These areas give context to help Enterprises solicit views for comparisons by the anatomy of the BlockChain technology.<\/li>\n<\/ol>\n<h3>Guiding Principles<\/h3>\n<p>Start with these three guiding principles.<\/p>\n<ol>\n<li><b><u>D<\/u>isintermediate<\/b> or <b>automate<\/b> intermediation.<\/li>\n<li><b><u>S<\/u>ecure<\/b> communication, distribution and interaction.<\/li>\n<li><b>Manage <u>r<\/u>isks<\/b> for higher throughput, lower latency.<\/li>\n<\/ol>\n<h3>Critical Capabilities<\/h3>\n<p>The structure of guiding principles collectively defines and guides implementation of nine critical capabilities below.<\/p>\n<table border=\"1\">\n<caption style=\"text-align:center\">Table: CryptoLedger guiding principles and critical capabilities.<\/caption>\n<tr>\n<td colspan=\"3\" style=\"background:#DAE4FA;color:#1E78C9;text-align:center\">G1. <i><b><u>D<\/u>isintermediate<\/b> or <b>automate<\/b> intermediation.<\/i><\/td>\n<\/tr>\n<tr>\n<td style=\"background:#D8D8D8;font-weight:bold;text-align:center;width:33%\">D1. <u>D<\/u>igital Identities &amp; Assets<\/td>\n<td style=\"background:#D8D8D8;font-weight:bold;text-align:center;width:33%\">D2. <u>D<\/u>istributed Ledger<\/td>\n<td style=\"background:#D8D8D8;font-weight:bold;text-align:center;width:33%\">D3. <u>D<\/u>istributed Consensus<\/td>\n<\/tr>\n<tr>\n<td colspan=\"3\" style=\"background:#DAE4FA;color:#1E78C9;text-align:center\">G2. <i><b><u>S<\/u>ecure<\/b> communication, distribution and interaction.<\/i><\/td>\n<\/tr>\n<tr>\n<td style=\"background:#D8D8D8;font-weight:bold;text-align:center;width:33%\">S1. <u>S<\/u>ecure Interaction<\/td>\n<td style=\"background:#D8D8D8;font-weight:bold;text-align:center;width:33%\">S2. <u>S<\/u>ecure Transaction<\/td>\n<td style=\"background:#D8D8D8;font-weight:bold;text-align:center;width:33%\">S3. <u>S<\/u>ecure Communication<\/td>\n<\/tr>\n<tr>\n<td colspan=\"3\" style=\"background:#DAE4FA;color:#1E78C9;text-align:center\">G3. <i><b>Manage <u>r<\/u>isks<\/b> for higher throughput, lower latency.<\/i><\/td>\n<\/tr>\n<tr>\n<td style=\"background:#D8D8D8;font-weight:bold;text-align:center;width:33%\">R1. Strong, tamper-<u>R<\/u>esistant Cryptography<\/td>\n<td style=\"background:#D8D8D8;font-weight:bold;text-align:center;width:33%\">R2. <u>R<\/u>eliable Storage<\/td>\n<td style=\"background:#D8D8D8;font-weight:bold;text-align:center;width:33%\">R3. <u>R<\/u>obust, <u>R<\/u>esilient Network<\/td>\n<\/tr>\n<\/table>\n<p>Collectively, CryptoLedger critical capabilities must provision for fit and acceptance criteria applicable to:<\/p>\n<ol>\n<li>Local Laws &amp; Regulatory Jurisdictions on Privacy, Sovereignty, Sanctions (e.g., <a href=\"https:\/\/scsanctions.un.org\/consolidated\/\" target=\"_blank\" rel=\"nofollow\">United Nations Security Council<\/a> to maintain or restore security and peace, or <a href=\"http:\/\/www.fatf-gafi.org\" target=\"_blank\" rel=\"nofollow\">Financial Action Task Force<\/a> to combat the financing of terrorism) and acceptance of Digital Signatures to prevent forgery, in alignment to <a href=\"http:\/\/www.uncitral.org\/pdf\/english\/texts\/electcom\/06-57452_Ebook.pdf\" target=\"_blank\" rel=\"nofollow\">United Nations Convention on the Use of Electronic Communications in International Contracts.<\/a><\/li>\n<li>Future-proof with respect to independent research in Post-Quantum Cryptography or in alignment to <a href=\"http:\/\/dx.doi.org\/10.6028\/NIST.SP.800-57pt1r4\" target=\"_blank\" rel=\"nofollow\">NIST Special Publication 800-57 Part 1 Revision 4 Recommendation for Key Management<\/a> for strong, tamper-resistant cryptography beyond year 2030.<\/li>\n<li>And performance\/risk trade-off decisions as many emerging BlockChain variants has yet to publish their benchmarking and performance criteria.  At this juncture, leverage on benchmarks such as <a href=\"http:\/\/spec.org\" target=\"_blank\" rel=\"nofollow\">Standard Performance Evaluation Corporation<\/a> and <a href=\"http:\/\/tpc.org\" target=\"_blank\" rel=\"nofollow\">Transaction Processing Performance Council<\/a> on Relational\/Non-Relational Databases.  Figure below provides an abstract of the CryptoLedger storage structure.\n<\/li>\n<\/ol>\n<figure>\n  <img decoding=\"async\" src=\"https:\/\/www.w3.org\/community\/cryptoledgers\/files\/2016\/05\/CryptoLedgers-1024x460.png\" alt=\"CryptoLedger\" width=\"600px\"><figcaption style=\"text-align:center\">Figure: Crow&#8217;s foot notation illustrating how Transactions placed into a Block and like doubly linked-list, how each Block is linked to the previous and referred by the next to maintain chronology, in order of occurrence in time.<br \/>\n<\/figcaption><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Preface The success of BitCoin as alternative CryptoCurrency and its underlying BlockChain technology has inspired many others in the exchange of digital assets. Given the proliferation of emerging BlockChain variants, it is timely to establish critical capabilities for evaluation, analysis &hellip; <a href=\"https:\/\/www.w3.org\/community\/cryptoledgers\/principles-and-capabilities\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":9659,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_s2mail":"","footnotes":""},"class_list":["post-43","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.w3.org\/community\/cryptoledgers\/wp-json\/wp\/v2\/pages\/43","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.w3.org\/community\/cryptoledgers\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.w3.org\/community\/cryptoledgers\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.w3.org\/community\/cryptoledgers\/wp-json\/wp\/v2\/users\/9659"}],"replies":[{"embeddable":true,"href":"https:\/\/www.w3.org\/community\/cryptoledgers\/wp-json\/wp\/v2\/comments?post=43"}],"version-history":[{"count":4,"href":"https:\/\/www.w3.org\/community\/cryptoledgers\/wp-json\/wp\/v2\/pages\/43\/revisions"}],"predecessor-version":[{"id":48,"href":"https:\/\/www.w3.org\/community\/cryptoledgers\/wp-json\/wp\/v2\/pages\/43\/revisions\/48"}],"wp:attachment":[{"href":"https:\/\/www.w3.org\/community\/cryptoledgers\/wp-json\/wp\/v2\/media?parent=43"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}