SlideShare a Scribd company logo
Hyperledger Fabric Update
June 2018
2
Distributed ledger platform
• v1.0.0 released July 2017
• v1.1.0 released March 2018
• v1.2.0-rc1 released June 2018
• Expect ~ quarterly releases
• Over 250 developers
• 37 companies and 87 individuals
• Over 7,000 change sets
http://hyperledger-fabric.readthedocs.io/
3
Characteristics
• Permissioned
• Highly modular
• Smart contracts in general purpose languages
• Pluggable consensus
• Privacy
• No “mining” or native crypto-currency required for consensus
• Execute-order-validate vs order-execute
4
Highly Modular and Configurable
• Pluggable ordering service establishes consensus
• Pluggable membership service provider
• Optional peer-to-peer gossip service
• Ledger can be configured to support a variety of DBMSs
• Pluggable endorsement and validation policy enforcement
5
1.1 Business Values
Confidentiality
• Advanced confidentiality
and permissioning ensure
participants only see
network features based on
their role.
– Capabilities: Granular and
dynamic access controls,
event service access
management, revocation
list, attribute based
access control, and
mutual TLS
Development
• Expanded developer
capabilities through
JavaScript support and
transaction encryption
libraries to grow the Fabric
ecosystem.
– Capabilities: NodeJS
Chaincode and SDK,
encryption library for
chaincode, and chaincode
creator API
Data Query
• Faster and simpler data
query to deliver value of
shared ledger at scale.
– Capabilities: CouchDB,
event service
Performance &
Serviceability
• Performance and scale
improvements
• Rolling upgrade via
configured capabilities to
ensure networks don’t need
to be taken down while
updates are made.
– Capabilities: Rolling
upgrade and CouchDB
6
1.2 Business Values
6
Confidentiality
• Confidential and trusted
transactions without
exposing the transaction to
the rest of the network.
– Capabilities: Side DB to
permit peer to peer
transactions, identity
mixer implementation to
mask participant
identities, and anonymous
identities policies
Development
• Start working with Ethereum
Contracts
• Developers gain new tools
to verify certificates and
simplify smart contract
execution
– Capabilities: Service
discovery, local
collections, and
certificates API
Data Query
• Continued modularity of
endorsement to ensure
granular access rights in a
production network
– Capabilities: Pluggable
endorsement and
verification, and state
based endorsement
7
Hyperledger Fabric Roadmap
Q1 Q2 Q3 Q4 (Maybe Jan)
1.1 release
• JS Chaincode
• Channel events
• CouchDB indexes
• CRL
• Mutual TLS
• Connection profiles
• Performance and
scale improvements
• Capabilities
• Experimental:
SideDB, fine-grained,
access control etc.
1.2 release
• UX improvements
• Technical debt
• Pluggable
endorsement and
validation
• Private transactions
with SideDB
• Service Discovery
• Experimental: EVM
chaincode
1.3 release
• Zero Knowledge
Asset Transfer
(ZKAT)
• RAFT Orderer
• State-based
ownership
• Identity Mixer
• Java Chaincode
• Web3 proxy
• Integrate some
Composer function
• ?
1.4 release
• BFT Orderer
• Flexible policies for
chaincode
governance
• ?
8
Privacy Mechanisms in Hyperledger Fabric
Channels
Private transactions
Zero- Knowledge Proof (ZKP) technologies
9
• All peers connect to the same system
channel (blue).
• All peers have the same chaincode and
maintain the same ledger
• Endorsement by peers E0, E1, E2 and E3
Key:
E1
E2
Client
Application
S
D
K
Hyperledger Fabric Network
Ordering-Service
P
A
B
A
B
A
B
E3
A
B
E0
Endorser Ledger
Committing
Peer
Application
Ordering Node
Smart Contract
(Chaincode)
Endorsement
Policy
O
O O
O
• Channel: Data partitioning mechanism with its own total broadcast mechanism, where transaction ordering
takes place independently in each channel
• Channel creation upon properly authenticated & authorized request
• Channel data restricted to a set of organizations/participants
• Channel access defined & enforced by means of Reader policies, Writer policies, Admin policies
Available todaySingle Channel Network
10
• Peers E0 and E3 connect to the red
channel for chaincode Y and Z
• Peers E1 and E2 connect to the blue
channel for chaincode A and B
Key:
E2
Hyperledger Fabric Network
Ordering-Service
P
Y
Z
A
B
A
B
E3
Y
Z
E0
P
E1
Endorser Ledger
Committing
Peer
Application
Ordering Node
Smart Contract
(Chaincode)
Endorsement
Policy
Client
Application
S
D
K
Client
Application
S
D
K
O
O O
O
Available today
Multi Channel Network
11
Channels
Private transactions
Zero- Knowledge Proof (ZKP) technologies
Privacy Mechanisms in Hyperledger Fabric
12
Private Transactions
Transaction privacy at a more fine grained level than channels.
Database storing private data updated alongside the public ledger with hashes on
the public ledger serving verifiable proof of the data
• Chaincode is tuned to store state hashes vs.
state (Private Data) to the Ledger
• Private data grouped in collections
• Collections are associated to access policies
• Private data of a collection would stored solely to
peers who satisfy the collection’s access policy
Available today
13
Privacy Mechanisms in Hyperledger Fabric
Channels
Private transactions
Zero- Knowledge Proof (ZKP) technologies
14
14
In development
15
Relevant in multiple use-cases
• Financial asset transfer
• Securities trading
• Virtual payments
Value: Extend automation, trusted
record keeping without the
need for trusted mediators
Import available
assets
IBM : 2 : Bob
IBM : 3 : Lucy
ABC : 5 : Alice
EMC : 8 : Charlie
Transfer 1 IBM
from Bob to Lucy
Transfer 2 ABC
from Alice to Bob
IBM : 1 : Bob
IBM : 4 : Lucy
ABC : 5 : Alice
EMC : 8 : Charlie
IBM : 1 : Bob
IBM : 4 : Lucy
ABC : 3 : Alice
ABC : 2 : Bob
EMC : 8 : Charlie
Import
available assets
IBM : 2 : Bob
IBM : 3 : Lucy
ABC : 5 : Alice
EMC : 8 : Char
IBM tot: 5
ABC tot: 5
…
Transfer 1 IBM
from Bob to Lucy
Transfer 3K ABC
from Alice to Bob
IBM : 2 : Bob
IBM : 3 : Lucy
ABC : 5 : Alice
EMC : 8 : Char
IBM tot: 5
ABC tot: 5
…
IBM : 2 : Bob
IBM : 3 : Lucy
ABC : 5 : Alice
EMC : 8 : Char
IBM tot: 5
ABC tot: 5
…
Authorized
asset
transfer
Anonymity
of asset
owners
Double-
spending
resistance
Security
Transactional
activity
confidentiality
Privacy
Shareholder example:
Public verifiability of ledger
Compatibility
with
standards
In developmentPrivacy-preserving asset management (UTXO)
16
Hyperledger Fabric w/EVM chaincode
O
O O
O
Ordering Service
Web3 proxy Go SDK
Membership
Services
Provider
Peer
Endorser
Ledger
Committer
evmcc
!Events
Web3 client
Thank you!

More Related Content

PPTX
Blockchain explored
PPTX
Anatomy of a hyperledger application
PDF
Introduction of Hyperledger Fabric & Composer
PPTX
Hyperledger community update 20180528
PDF
Hyperledger fabric 3
PDF
Blockchain explained FIATA Congress 20180910
PDF
An introduction to blockchain and hyperledger v ru
PPTX
Hyperledger
Blockchain explored
Anatomy of a hyperledger application
Introduction of Hyperledger Fabric & Composer
Hyperledger community update 20180528
Hyperledger fabric 3
Blockchain explained FIATA Congress 20180910
An introduction to blockchain and hyperledger v ru
Hyperledger

What's hot (20)

PDF
Hyperledger Overview - 20181024
PDF
Bitmark and Hyperledger Workshop: the Digital Assets and Property
PDF
Ibm blockchain - Hyperledger 15.02.18
PPTX
Hyperledger Fabric
PPTX
Hyperledger fabric 20180528
PDF
Blockchain Hyperledger Fabric
ODP
Hyperledger Fabric and Tools
PDF
Hyperledger Sawtooth Lake Intel's OSS Contribution to Enterprise Blockchain
PDF
Wwc developing hyperledger applications v4
PDF
Hyperledger Fabric - Blockchain for the Enterprise - FOSDEM 20190203
PPTX
Blockchain - HyperLedger Fabric
PDF
Demystify blockchain development with hyperledger fabric
PDF
Technical Introduction to Hyperledger Fabric v1.0
PPTX
Blockchain architected
PDF
Hyperledger Fabric Application Development 20190618
PPTX
Hyperledger Overview Feb 2017
PPTX
Hyperledger fabric architecture
PDF
Hyperledger Fabric & Composer
PDF
Hyperledger Fabric in a Nutshell
PDF
Blockchain Application Design and Development, and the Case of Programmable M...
Hyperledger Overview - 20181024
Bitmark and Hyperledger Workshop: the Digital Assets and Property
Ibm blockchain - Hyperledger 15.02.18
Hyperledger Fabric
Hyperledger fabric 20180528
Blockchain Hyperledger Fabric
Hyperledger Fabric and Tools
Hyperledger Sawtooth Lake Intel's OSS Contribution to Enterprise Blockchain
Wwc developing hyperledger applications v4
Hyperledger Fabric - Blockchain for the Enterprise - FOSDEM 20190203
Blockchain - HyperLedger Fabric
Demystify blockchain development with hyperledger fabric
Technical Introduction to Hyperledger Fabric v1.0
Blockchain architected
Hyperledger Fabric Application Development 20190618
Hyperledger Overview Feb 2017
Hyperledger fabric architecture
Hyperledger Fabric & Composer
Hyperledger Fabric in a Nutshell
Blockchain Application Design and Development, and the Case of Programmable M...
Ad

Similar to Hyperledger Fabric Update - June 2018 (20)

PDF
Hyperledger Fabric update Meetup 20181101
PPTX
Blockchain Intro to Hyperledger Fabric
PPSX
Blockchain HyperLedger Fabric Internals - Clavent
PPTX
Blockchain Hyper Ledger Fabric : Bangkok Conference
PPTX
hyperledger-chaincode & hyperl fabric.pptx
PPTX
Hyperledger introduction
PDF
Blockchain hyerledger-fabric
PDF
Role of hyperledger fabric in blockchain
PDF
02 - Introduction to Hyperledger Fabric
DOCX
UNIT IV.docx.cloud service management document anna university regulation 2021
PDF
Hyperledger Fabric Technical Deep Dive 20190618
PDF
Lecture 8 Hyperledger Fabric 2022f.pdf
PDF
04 - Blockchain Technology - Hyperledger Fabric
PPTX
CCS339 Unit IV HYPERLEDGER FABRIC & ETHEREUM
PPTX
Hyperledger & blockchain meetup - Milano 23.10.2019
PDF
blockchain unit 3
PPTX
Hyperledger fabric
PDF
Blockchain for the Enterprise
PPTX
Block chain fundamentals and hyperledger
PPTX
BlockChain-1.pptx
Hyperledger Fabric update Meetup 20181101
Blockchain Intro to Hyperledger Fabric
Blockchain HyperLedger Fabric Internals - Clavent
Blockchain Hyper Ledger Fabric : Bangkok Conference
hyperledger-chaincode & hyperl fabric.pptx
Hyperledger introduction
Blockchain hyerledger-fabric
Role of hyperledger fabric in blockchain
02 - Introduction to Hyperledger Fabric
UNIT IV.docx.cloud service management document anna university regulation 2021
Hyperledger Fabric Technical Deep Dive 20190618
Lecture 8 Hyperledger Fabric 2022f.pdf
04 - Blockchain Technology - Hyperledger Fabric
CCS339 Unit IV HYPERLEDGER FABRIC & ETHEREUM
Hyperledger & blockchain meetup - Milano 23.10.2019
blockchain unit 3
Hyperledger fabric
Blockchain for the Enterprise
Block chain fundamentals and hyperledger
BlockChain-1.pptx
Ad

More from Arnaud Le Hors (7)

PDF
Towards Self Sovereign Identity 20180508
PDF
Hyperledger community update 201805
PDF
Hyperledger Fabric EVM Integration Feb 20, 2018
PDF
Hyperledger Cello Feb 20, 2018
PDF
Hyperledger community update Feb 20, 2018
PDF
W3C Chair training Focus & Poductivity 2014102
PDF
WWW2014 Overview of W3C Linked Data Platform 20140410
Towards Self Sovereign Identity 20180508
Hyperledger community update 201805
Hyperledger Fabric EVM Integration Feb 20, 2018
Hyperledger Cello Feb 20, 2018
Hyperledger community update Feb 20, 2018
W3C Chair training Focus & Poductivity 2014102
WWW2014 Overview of W3C Linked Data Platform 20140410

Recently uploaded (20)

PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
composite construction of structures.pdf
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
Welding lecture in detail for understanding
PDF
PPT on Performance Review to get promotions
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPT
Project quality management in manufacturing
PPTX
UNIT 4 Total Quality Management .pptx
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
Well-logging-methods_new................
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PPTX
web development for engineering and engineering
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
composite construction of structures.pdf
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Welding lecture in detail for understanding
PPT on Performance Review to get promotions
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Project quality management in manufacturing
UNIT 4 Total Quality Management .pptx
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Well-logging-methods_new................
Operating System & Kernel Study Guide-1 - converted.pdf
Arduino robotics embedded978-1-4302-3184-4.pdf
web development for engineering and engineering
Strings in CPP - Strings in C++ are sequences of characters used to store and...
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Embodied AI: Ushering in the Next Era of Intelligent Systems
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx

Hyperledger Fabric Update - June 2018

  • 2. 2 Distributed ledger platform • v1.0.0 released July 2017 • v1.1.0 released March 2018 • v1.2.0-rc1 released June 2018 • Expect ~ quarterly releases • Over 250 developers • 37 companies and 87 individuals • Over 7,000 change sets http://hyperledger-fabric.readthedocs.io/
  • 3. 3 Characteristics • Permissioned • Highly modular • Smart contracts in general purpose languages • Pluggable consensus • Privacy • No “mining” or native crypto-currency required for consensus • Execute-order-validate vs order-execute
  • 4. 4 Highly Modular and Configurable • Pluggable ordering service establishes consensus • Pluggable membership service provider • Optional peer-to-peer gossip service • Ledger can be configured to support a variety of DBMSs • Pluggable endorsement and validation policy enforcement
  • 5. 5 1.1 Business Values Confidentiality • Advanced confidentiality and permissioning ensure participants only see network features based on their role. – Capabilities: Granular and dynamic access controls, event service access management, revocation list, attribute based access control, and mutual TLS Development • Expanded developer capabilities through JavaScript support and transaction encryption libraries to grow the Fabric ecosystem. – Capabilities: NodeJS Chaincode and SDK, encryption library for chaincode, and chaincode creator API Data Query • Faster and simpler data query to deliver value of shared ledger at scale. – Capabilities: CouchDB, event service Performance & Serviceability • Performance and scale improvements • Rolling upgrade via configured capabilities to ensure networks don’t need to be taken down while updates are made. – Capabilities: Rolling upgrade and CouchDB
  • 6. 6 1.2 Business Values 6 Confidentiality • Confidential and trusted transactions without exposing the transaction to the rest of the network. – Capabilities: Side DB to permit peer to peer transactions, identity mixer implementation to mask participant identities, and anonymous identities policies Development • Start working with Ethereum Contracts • Developers gain new tools to verify certificates and simplify smart contract execution – Capabilities: Service discovery, local collections, and certificates API Data Query • Continued modularity of endorsement to ensure granular access rights in a production network – Capabilities: Pluggable endorsement and verification, and state based endorsement
  • 7. 7 Hyperledger Fabric Roadmap Q1 Q2 Q3 Q4 (Maybe Jan) 1.1 release • JS Chaincode • Channel events • CouchDB indexes • CRL • Mutual TLS • Connection profiles • Performance and scale improvements • Capabilities • Experimental: SideDB, fine-grained, access control etc. 1.2 release • UX improvements • Technical debt • Pluggable endorsement and validation • Private transactions with SideDB • Service Discovery • Experimental: EVM chaincode 1.3 release • Zero Knowledge Asset Transfer (ZKAT) • RAFT Orderer • State-based ownership • Identity Mixer • Java Chaincode • Web3 proxy • Integrate some Composer function • ? 1.4 release • BFT Orderer • Flexible policies for chaincode governance • ?
  • 8. 8 Privacy Mechanisms in Hyperledger Fabric Channels Private transactions Zero- Knowledge Proof (ZKP) technologies
  • 9. 9 • All peers connect to the same system channel (blue). • All peers have the same chaincode and maintain the same ledger • Endorsement by peers E0, E1, E2 and E3 Key: E1 E2 Client Application S D K Hyperledger Fabric Network Ordering-Service P A B A B A B E3 A B E0 Endorser Ledger Committing Peer Application Ordering Node Smart Contract (Chaincode) Endorsement Policy O O O O • Channel: Data partitioning mechanism with its own total broadcast mechanism, where transaction ordering takes place independently in each channel • Channel creation upon properly authenticated & authorized request • Channel data restricted to a set of organizations/participants • Channel access defined & enforced by means of Reader policies, Writer policies, Admin policies Available todaySingle Channel Network
  • 10. 10 • Peers E0 and E3 connect to the red channel for chaincode Y and Z • Peers E1 and E2 connect to the blue channel for chaincode A and B Key: E2 Hyperledger Fabric Network Ordering-Service P Y Z A B A B E3 Y Z E0 P E1 Endorser Ledger Committing Peer Application Ordering Node Smart Contract (Chaincode) Endorsement Policy Client Application S D K Client Application S D K O O O O Available today Multi Channel Network
  • 11. 11 Channels Private transactions Zero- Knowledge Proof (ZKP) technologies Privacy Mechanisms in Hyperledger Fabric
  • 12. 12 Private Transactions Transaction privacy at a more fine grained level than channels. Database storing private data updated alongside the public ledger with hashes on the public ledger serving verifiable proof of the data • Chaincode is tuned to store state hashes vs. state (Private Data) to the Ledger • Private data grouped in collections • Collections are associated to access policies • Private data of a collection would stored solely to peers who satisfy the collection’s access policy Available today
  • 13. 13 Privacy Mechanisms in Hyperledger Fabric Channels Private transactions Zero- Knowledge Proof (ZKP) technologies
  • 15. 15 Relevant in multiple use-cases • Financial asset transfer • Securities trading • Virtual payments Value: Extend automation, trusted record keeping without the need for trusted mediators Import available assets IBM : 2 : Bob IBM : 3 : Lucy ABC : 5 : Alice EMC : 8 : Charlie Transfer 1 IBM from Bob to Lucy Transfer 2 ABC from Alice to Bob IBM : 1 : Bob IBM : 4 : Lucy ABC : 5 : Alice EMC : 8 : Charlie IBM : 1 : Bob IBM : 4 : Lucy ABC : 3 : Alice ABC : 2 : Bob EMC : 8 : Charlie Import available assets IBM : 2 : Bob IBM : 3 : Lucy ABC : 5 : Alice EMC : 8 : Char IBM tot: 5 ABC tot: 5 … Transfer 1 IBM from Bob to Lucy Transfer 3K ABC from Alice to Bob IBM : 2 : Bob IBM : 3 : Lucy ABC : 5 : Alice EMC : 8 : Char IBM tot: 5 ABC tot: 5 … IBM : 2 : Bob IBM : 3 : Lucy ABC : 5 : Alice EMC : 8 : Char IBM tot: 5 ABC tot: 5 … Authorized asset transfer Anonymity of asset owners Double- spending resistance Security Transactional activity confidentiality Privacy Shareholder example: Public verifiability of ledger Compatibility with standards In developmentPrivacy-preserving asset management (UTXO)
  • 16. 16 Hyperledger Fabric w/EVM chaincode O O O O Ordering Service Web3 proxy Go SDK Membership Services Provider Peer Endorser Ledger Committer evmcc !Events Web3 client

Editor's Notes

  • #2: Blockchain essentially a database, but traditional databases have central admins, which makes using them to house transaction data involving parties that don’t trust one another problematic and expensive. So, each entity maintains their own database, resulting in duplicate data and, if there are mistakes or malicious behavior, results in expensive and time consuming disputes over what the actual state of the truth is. This is particularly true when exchanging assets. And lots of different institutions recording different assets.
  • #8: A roadmap chart (so usual caveats apply) for Fabric and Composer. Note that the roadmaps are controlled by the Linux Foundation community and not IBM.
  • #9: Public (in other words, permissionless) blockchain systems like Bitcoin were the first to face privacy challenges. Participation in these systems is open to anyone and, as such, user behavior is shielded behind virtual pseudonyms (or "addresses") that users generate to represent themselves in their transactions. On the other hand, transaction details are in the clear, and available on the public ledger of the system. In certain enterprise use cases, government regulations require understanding who is involved in the transactions, thus preventing the use of public blockchain systems (such as Bitcoin) where identities are pseudonymous. Further, the public availability of the content of transactions in such systems can be problematic for numerous business use cases. Why? Imagine a business obtaining computer parts from a vendor.  Given the large volume of computer parts purchased, the supplier provides a discount to the business when trading the asset for currency. For the supplier, the actual discount is sensitive business information, as the supplier may not want to provide the same discount to businesses who purchase lower volumes. As a response to these challenges, a couple of blockchain systems have been introduced, built on top of Bitcoin. Blockstream’s Confidential Transactions and Assets is a prominent example. It allows pseudonymous transfer of coins and assets without leaking the actual value of the coins or type of assets that are being exchanged. ZeroCash is another example. It's an open network that offers stronger privacy where — in addition to concealing the value of the assets exchanged — it conceals the owner of the coins as well as the actual transaction graph. However, as all these systems target open networks, they offer unconditional privacy. Permissioned blockchains have emerged as an alternative to public ones to address enterprise needs for having known and identifiable participants. They've achieved the scale, confidentiality, and privacy necessary to enable enterprise applications.
  • #10: This slide is an example of a Hyperledger Fabric V1 network which is very similar to a v0.6 PBFT network. All peers run the same chaincode and are part of concensus. Hyperledger Fabric's channel architecture can offer privacy in certain cases. “A channel is like a virtual blockchain network that sits on top of a physical blockchain network with its own access rules. Channels employ their own transaction ordering mechanism and thus provide scalability, ultimately allowing for effective ordering and partition of huge amounts of data.” Channels in Hyperledger Fabric are configured with access policies that govern access to the channel’s resources (chaincodes, transactions, and ledger state), thus preserving the privacy and confidentiality of information exclusively within the nodes that are in the channel. Channels achieve better quality of robustness when a node is down given alternate paths to get to the destination, while also providing scalability allowing for effective sharing of huge amounts of data. From a privacy perspective, channels are useful in cases where a subgroup of the blockchain network’s participants have a lot of transactions in common (enough to justify the creation of a new broadcast order channel), and these transactions can be processed with no dependency on state controlled by entities outside this group. How CLSNet is using channels CLSNet is a revolutionary FX product that addresses the wider post-trade processing needs of FX market participants. Built on a distributed ledger technology platform, CLSNet covers trades settling outside core CLS Settlement while introducing standardization and automation for the entire FX market. CLSNet utilizes key privacy and confidential capabilities in Hyperledger Fabric to achieve their business objective. Learn more in this video. Bilateral business relationships with a heavy volume of transactions can meet their privacy requirements via channels. Take the example of the computer parts supplier. The supplier could establish a different channel with each business partner to serve their bilateral business relationship. Of course, the rate of transactions should be high enough and the number of business partners (and resulting channels) should be low enough for this use case to also preserve the scalability advantages of the network’s channel architecture. The channel access configurability allows for preserving both the privacy of the supplier and each of its partners through shielding the entire transactions of theirs from parties outside this channel. Channels can be further used in combination with private transactions and zero-knowledge proof technologies as described below to strengthen privacy and confidentiality.
  • #11: This slide is an example of a Hyperledger Fabric V1 network with 2 channels.
  • #12: Public (in other words, permissionless) blockchain systems like Bitcoin were the first to face privacy challenges. Participation in these systems is open to anyone and, as such, user behavior is shielded behind virtual pseudonyms (or "addresses") that users generate to represent themselves in their transactions. On the other hand, transaction details are in the clear, and available on the public ledger of the system. In certain enterprise use cases, government regulations require understanding who is involved in the transactions, thus preventing the use of public blockchain systems (such as Bitcoin) where identities are pseudonymous. Further, the public availability of the content of transactions in such systems can be problematic for numerous business use cases. Why? Imagine a business obtaining computer parts from a vendor.  Given the large volume of computer parts purchased, the supplier provides a discount to the business when trading the asset for currency. For the supplier, the actual discount is sensitive business information, as the supplier may not want to provide the same discount to businesses who purchase lower volumes. As a response to these challenges, a couple of blockchain systems have been introduced, built on top of Bitcoin. Blockstream’s Confidential Transactions and Assets is a prominent example. It allows pseudonymous transfer of coins and assets without leaking the actual value of the coins or type of assets that are being exchanged. ZeroCash is another example. It's an open network that offers stronger privacy where — in addition to concealing the value of the assets exchanged — it conceals the owner of the coins as well as the actual transaction graph. However, as all these systems target open networks, they offer unconditional privacy. Permissioned blockchains have emerged as an alternative to public ones to address enterprise needs for having known and identifiable participants. They've achieved the scale, confidentiality, and privacy necessary to enable enterprise applications.
  • #13: Private transactions offer transaction privacy at a more fine-grained level than channels. The database storing the private data is updated alongside the public ledger as transactions containing references to private data are committed. In fact, the hashes on the public ledger serve as verifiable proof of the data. Private transactions can be combined with anonymous client authentication (see next section) to avoid leaking the connection between the identity of the transaction's creator and the ledger stored (hashed) data. This feature is especially useful in cases where, for regulatory or legal reasons, private data is not allowed to reside off the premise of the parties involved in the transaction. Consider an example in the healthcare sector where a patient's health information should be released only for a specified amount of time. For example, a patient's prescription history may be made available to a specialist for a period of time before a specific surgery occurs. Private transactions would ensure data confidentiality in only allowing the patient and the specialist to see the information for a specified amount of time while also recording the hash of the data as evidence that the transaction occurred.  Privacy is achieved in that there is control over who can access the actual sensitive data. If anonymous client authentication is used in addition to this (see the next section), stronger privacy would be offered as the identity of the entity that introduced or updated the (hashed) record will also be concealed. Private transactions should be used with care in cases where the pattern of private data updates is also sensitive information and could be used to derive the actual private data. Although Hyperledger Fabric architecture prevents unauthorized access to the actual private data, shared ledger participants can still see when a private data (hashed) entry is modified. In the previous example, if a private data entry represents the number of visits by a specific patient to a hospital (assuming the patient has regular weekly meetings with his or her doctor), then patterns of updates to this entry could provide information about the reason for that patient’s visit to the doctor (for example, that the patient suffers from chronic disease). While private transactions protect the actual private data from being directly accessed by unauthorized parties, they do not prevent public ledger participants from detecting when this private data is being modified. Private data hashes occupy key-value entries in the ledger state, whose changes are publicly available. Also, private transactions do not conceal the parties who are allowed access to the private data. This information is available on the ledger for private data dissemination to take place properly. Finally, private transactions would need to be accompanied with anonymous client authentication mechanisms (described in the next section) to avoid leaking the connection between the identity of the transaction's creator and the ledger stored (hashed) data.
  • #14: Public (in other words, permissionless) blockchain systems like Bitcoin were the first to face privacy challenges. Participation in these systems is open to anyone and, as such, user behavior is shielded behind virtual pseudonyms (or "addresses") that users generate to represent themselves in their transactions. On the other hand, transaction details are in the clear, and available on the public ledger of the system. In certain enterprise use cases, government regulations require understanding who is involved in the transactions, thus preventing the use of public blockchain systems (such as Bitcoin) where identities are pseudonymous. Further, the public availability of the content of transactions in such systems can be problematic for numerous business use cases. Why? Imagine a business obtaining computer parts from a vendor.  Given the large volume of computer parts purchased, the supplier provides a discount to the business when trading the asset for currency. For the supplier, the actual discount is sensitive business information, as the supplier may not want to provide the same discount to businesses who purchase lower volumes. As a response to these challenges, a couple of blockchain systems have been introduced, built on top of Bitcoin. Blockstream’s Confidential Transactions and Assets is a prominent example. It allows pseudonymous transfer of coins and assets without leaking the actual value of the coins or type of assets that are being exchanged. ZeroCash is another example. It's an open network that offers stronger privacy where — in addition to concealing the value of the assets exchanged — it conceals the owner of the coins as well as the actual transaction graph. However, as all these systems target open networks, they offer unconditional privacy. Permissioned blockchains have emerged as an alternative to public ones to address enterprise needs for having known and identifiable participants. They've achieved the scale, confidentiality, and privacy necessary to enable enterprise applications.
  • #16: Hasini (Shrilanka), Purdue University Would it help if the user knows the auditor secret key? Security & Privacy:Publicly verifiable Authorized asset transfer Double-spending resistance Conditional anonymity & unlinkability of transactions Chaincode executed in SGX enclave Enables encrypted & securely updatable blockchain state Execution trust through remote attestation) Chaincode executed in SGX enclave Becomes a trusted blackbox Provisioned with secrets and/or confidential logic Privacy/Confidentiality (not all parties equally trusted) Bring your own “identity” Identity Mixer inclusion for anonymity, privacy Advanced application ecosystem Privacy-preserving asset management for permissioned systems Privacy-preserving supply chain management Crypto anchors as bindings to the physical world