Whitepaper 2.0 on Distributed Ledger Technology
Whitepaper_Chapters 1-8
Whitepaper_Annex
更多
Table of Contents
1
Foreword
...............................................................................
5
2
Executive Summary
......................................................................
7
3
Introduction
...........................................................................
12
3.1
Background and history
.............................................................
13
3.2
Purpose and scope of the second Whitepaper
.........................................
13
3.3
Structure of the second Whitepaper
..................................................
14
3.4
Ways forward
.....................................................................
14
4
Technology Update
.....................................................................
15
4.1
DLT platforms
.....................................................................
16
4.1.1
Hyperledger
.................................................................
16
4.1.2
Corda
......................................................................
17
4.1.3
Bitcoin
......................................................................
18
4.1.4
Ethereum
...................................................................
20
4.2
Unpermissioned DLT technology extension for enterprises
..............................
20
4.2.1
Quorum
....................................................................
20
4.2.2
Enterprise Ethereum Alliance
..................................................
21
4.2.3
Microsoft Enterprise DLT Framework
...........................................
21
4.3
Off-chain services technology for DLT
.................................................
23
4.3.1
Lightning Network on Bitcoin
..................................................
23
4.3.2
The Raiden Network on Ethereum
..............................................
24
4.3.3
Plasma on Ethereum
.........................................................
24
5
Compliance Issues
......................................................................
25
5.1
Background
.......................................................................
26
5.2
Anti-money laundering (AML) and counter-financing of terrorism (CFT) issues
..............
26
5.3
Systemic risk
......................................................................
27
5.4
Technology and operational risks
.....................................................
28
5.5
Reporting and transparency
.........................................................
28
5.6
Governance and controls, cybersecurity and legal risks
..................................
28
5.7
Conclusion
........................................................................
28
6
Governance and Control
.................................................................
29
6.1
Background
.......................................................................
30
6.2
Governance
.......................................................................
30
6.2.1
Governance structure
........................................................
30
6.2.2
Membership on-boarding and ongoing operation
................................
31
6.2.3
Technology audit
.............................................................
32
6.3
Security management
..............................................................
32
6.3.1
Information protection
.......................................................
32
6.3.2
Data privacy from a governance point of view
....................................
33
6.3.3
Authentication and access control (key management)
.............................
33
6.3.4
Security administration and monitoring
.........................................
34
6.3.5
Physical security
.............................................................
34
6.4
System development and change management
........................................
35
6.4.1
System development
.........................................................
35
6.4.2
Portability and compatibility
...................................................
36
6.4.3
Change management
.........................................................
36
6.5
Information processing
.............................................................
37
6.5.1
Disaster recovery and resilience
................................................
37
6.5.2
Minimum viable number of validating nodes
.....................................
38
6.6
Communication networks
...........................................................
38
6.6.1
Security and network connectivity among nodes
.................................
38
6.7
Outsourcing
.......................................................................
39
6.8
Other considerations
...............................................................
39
6.9
Conclusion
........................................................................
40
7
Legal Issues
............................................................................
41
7.1
Background
.......................................................................
42
7.2
Legal basis
........................................................................
42
7.3
Data protection and privacy
.........................................................
42
7.4
Cross-border and localisation issues
..................................................
44
7.5
Smart contracts
....................................................................
44
7.6
Liability
...........................................................................
45
7.7
Competition/Anti-trust
.............................................................
45
7.8
Specific applications
................................................................
45
7.9
Conclusion
........................................................................
48
8
Proof-of-Concept Work
..................................................................
49
8.1
Background
.......................................................................
50
8.2
General observations and lessons learned
.............................................
50
8.2.1
Trade finance
................................................................
50
8.2.2
Digital identity management
...................................................
52
8.2.3
Mortgage loan application
....................................................
55
8.3
Conclusion
........................................................................
56
收起