Professional Documents
Culture Documents
APPLICATIONS OF
Cryptographic Components 03
Blockchain Protocol 05
Cost Savings 11
Efficiency 11
Transparency 12
Digital Currency 13
KYC 18
Chapter 5: A Prospective Roadmap for the Adoption of BCT to Banking and Finance in India 26
Use Cases 29
R. Gandhi
Date: January 05, 2017 Deputy Governor, Reserve Bank of India
Place: Hyderabad Chairman, IDRBT
PREFACE
I T is almost two years since a small team of researchers at IDRBT has been studying the structure,
security features, process flows and use cases of Blockchain Technology (BCT), especially in the
area of banking and finance. In the process, the Institute has been interacting individually with
academicians, organizations, banks and technology partners working in the area.
In order to bring all of them together, the Institute organized a brainstorming workshop on
Blockchain technology. All the participants of the workshop showed interest and keenness to work
jointly to prepare a White Paper on Implementation of BCT in the areas of banking and finance in
India. Accordingly, the Institute formed a Working Group with experts from RBI, IBA, NPCI, CCIL, ISI,
State Bank of India, Punjab National Bank, Bank of Baroda, ICICI Bank, HDFC Bank, Axis Bank, Citi
Bank, Deutsche Bank, Infosys, TCS, IBM Research, Deloitte and MonetaGo as members.
All the members of the Working Group have given inputs from their expertise and experience. The
IDRBT coordinating team put together the inputs along with their study results into five chapters.
The first chapter introduces the cryptographic components, protocols and ledger classifications of
blockchains. While the second chapter provides the advantages of BCT, the third chapter presents the
potential areas of its application, both in currency and non-currency areas. The fourth chapter
critically examines the crucial features required in banking and financial sectors – security, privacy,
traceability and scalability.
Drawing from the strength of analysis presented in the first four chapters and the global experiences,
the Working Group proposes a prospective roadmap for adoption of BCT in Indian banking and
finance in the fifth chapter.
In order to gain first-hand experience of the implementation, the Institute organized a Proof-of-
Concept (PoC) of BCT for a typical trade finance application with active participation of NPCI, banks
and the technology partner. The results of the PoC have been quite encouraging, giving comfort and
confidence in the implementability of BCT.
It is a rewarding moment to the Institute and the Working Group to present the White Paper to all
stakeholders in the country for further course of action. I am personally happy to get the White Paper,
with a foreword from our Chairman, Shri R Gandhi, Deputy Governor, Reserve Bank of India, released
by Dr. Duvvuri Subbarao, Former Governor, Reserve Bank of India, during the inauguration of the
International Conference on Distributed Computing and Networking (ICDCN) today.
Chapter 1
Introduction to Blockchain Technology
However, contrary to the case of the blockchains, it is hash pointers) and the Merkle Tree (binary tree
possible to both insert and append a node from the based on hash pointers), another practical
Merkle Tree with O(log n) operations, where n is the authenticated data structure is the Patricia Tree or
total number of nodes (data blocks) in the tree, as the Merkle Trie, which is a modified form of the Trie
appending a data block requires an alteration of only data structure based on hash pointers, instead of the
the shortest path from the leaf node to the root. regular pointers. In case of a Patricia Tree or a Merkle
Trie, the collection of data blocks is stored in a (key,
If any inadvertent error or malicious tampering
value) format, where the maximum length of the key
causes the data in any of the nodes of the tree to
values controls the depth of the tree. Thus, in a
change, it will be evident to everyone holding the
Patricia Tree, operations like insertion, appending,
hash pointer to the root node. In case of a network,
proof of membership etc., become O(k), while the
the hash pointer to the root node may be stored as a
commitment remains O(1). This data structure is
commitment in a distributed fashion, with every
used in the modern smart contract platform –
entity, and in such a case, the Merkle Tree will act as a
Ethereum.
decentralized tamper-evident storage for data.
It is interesting to note that appending to the tree is Blockchain Protocol
exactly the same as inserting a node, and thus, this The driving force behind the recent fame and success
non-linear structure acts as a generic set, rather than of blockchain technology is the wide range and
a list. In addition, Merkle Trees allow an O(log n) flexibility of protocols that can be realized using the
proof-of-membership for any leaf node, which may basic data structures defined in the previous section.
be used for consistency or audit proofs in the set of To understand the blockchain protocols, we need to
data blocks. To prove the membership of any leaf define some essential functional components, as
node in a Merkle Tree, one needs to produce only an follows:
Network
The blockchain protocol, in its most
generality, establishes a consensus
over a decentralized network of
members involved in the respective
protocol. The members participating
in the protocol may have various roles
and actions in managing the
authenticated data structure, as
specified in the protocol. Such roles
and actions may depend upon a pre-
specified access control mechanism,
or a set of permissions, as and when
applicable, to make the protocol fully
Figure 3. Merkle Tree as a binary tree connected by hash pointers flexible. Consequently, the structure
(Source: Wikipedia) of the blockchain network may be
peer-to-peer (flat) or hierarchical, as
O(log n) size proof, in the form of the sibling hash and when required by the respective protocol.
pointers along the shortest path from the leaf node to
the root of the tree. Similar proofs may be provided to Transactions
verify that a collection of data blocks is a certain A mutual contract struck between any set of entities
subset of another. in the blockchain network is generally termed as a
Patricia Tree: Tamper-evident Trie transaction. Owing to the historical origin of
blockchain technology from Bitcoin, any such
In addition to the blockchain (linked-list based on contract is called a 'transaction'. However, in its most
05
Block: A Bitcoin block contains the hash of itself, the verification routine combines the new input script of
hash of the previous block, the Merkle root of the a new transaction with the output script of the input
transactions that are included in the block, a nonce transactions, and executes the combination. It might
that is used by a miner to solve the Bitcoin be necessary in certain cases to obtain the approval
computational hash-puzzle, and the time at which of multiple parties in order to process a transaction;
the block was created. The first block in the ledger is this is done in Bitcoin using multisig. Bitcoin scripts
the genesis block, and subsequent blocks form a are even more flexible, and can allow payments to be
block chain, publicly maintained in a ledger. Some redeemed after a certain time interval (defined by a
examples of such ledgers are available at time lock).
blockchain.info, blockexplore.com, etc. A new block
Mining: Bitcoin follows a competitive mining
is added approximately every 10 minutes through a
scheme, based on a hash-puzzle. The miners have to
mining process.
compete with one another, using the computing
Transaction: A Bitcoin transaction contains a header, resources at their disposal, to append a new block to
inputs and outputs: the blockchain ledger. Bitcoin employs a smart
incentive mechanism to ensure honesty of the
! The header contains the transaction ID, hash of
miners, as well as to regulate the influx of Bitcoins in
the transaction, number of inputs and outputs,
the market. To further regulate the flow of Bitcoins,
time of the transaction, and a version number
the hash-puzzle in designed in such a way that new
that tells the verifier which set of rules to use to
Bitcoin blocks are created (mined) every 10 minutes,
validate the transaction
on an average. The mining competition based on the
! Input to a Bitcoin transaction is another hash-puzzle is also known as a proof-of-work
transaction. Each input contains sequence strategy for consensus.
number of the input transaction, address
Consensus: Bitcoin follows a standard majority
information about the previous output, input
consensus, where each miner may choose which
script containing the signature with the private
block in the chain to append to, and eventually the
key of the user who is spending the coins, and the
longest chain sustains. It is widely believed that as
valueofthe transaction
long as honest parties control majority of the
! Each output contains the transaction index, computing power, the longest chain will grow and
address of the recipient, value of the output, outperform other forks.
and an output script described below.
Ethereum is another widely used crypto-currency
Verification: Verification of Bitcoin transactions is facilitating the users of the platform to extend the
p e r f o r m e d t h ro u g h s c r i p t s ,
i m p l e m e n t e d i n a Tu r i n g
incomplete stack based scripting
language. There are two types of
scripts – input scripts and output
scripts. Every transaction contains
an output script, which states that –
“This transaction can be redeemed
(spent) by anyone who possesses
the public key which hashes to
address of the recipient, and also
possesses the signature from the
owner of that public key”. The
verification of a transaction is
essentially verification of the digital
signature against the Figure 6. Bitcoin as a specific instance of the Permissionless
corresponding public key. This Blockchain Architecture
08
Chapter 2
Advantages of Blockchain Technology in Banking and Finance
typically exchanging data or messages between transaction can be approved by the remaining nodes
them to conclude transactions. As a result, the in the network. BCT also brings in a high level of
processes are sometimes inefficient, expensive, and redundancy in the network, as the copy of the ledger
vulnerable. is available with all the nodes in the network.
BCT has the potential to address certain limitations of Reduced time for processing: Most of the
the current processes by modernizing, streamlining conventional banking processes are linear and
and simplifying the traditional siloed design of the hierarchical, akin to the assembly line of the
financial industry infrastructure with a shared fabric manufacturing industry, e.g., maker-checker/cross
of common information. The advantages brought by check/approval processes. While the maker-
BCT can be broadly classified into cost savings, checker-approver process helps the banks and FIs to
efficiency, and transparency. gain control and puts the emphasis on ownership of
decisions, it delays in decision making and can lead
Cost Savings to longer processing time, costs and lower customer
Fraud Prevention: As BCT is built on the concept of satisfaction. BCT can radically alter the way such
sharing information across parties and consensus transactions are processed by banks and FIs today.
during transactions; it saves on reconciliation cost In BCT, the transaction is relayed to all the approving
between banks and prevents losses because of nodes simultaneously, as and when the approvals are
documentary frauds. provided, the information is updated in the ledgers
Save costs on forex volatility: BCT used in cross of all the nodes, instantly. Thus, BCT can help in
border payments can help the consumers and banks improving the speed of processing transactions by
to take advantage of the forex marketplace to get the reduction in decision making time across the
best deal transparently from the market players. organizations resulting in reduced cost of processing
Since the transactions are processed in near real- and enhanced transparency of decisions to all
time, the players need not suffer through the participating nodes.
vagaries of currency volatility. Smart Contracts are business terms that are
Save costs over delayed settlements: In case of a embedded in the transaction database and gets
distributed payment network, BCT ensures the automatically executed when certain business
transaction settlement information is also processed conditions are met. Smart Contract feature in the
simultaneously along with the payment messages. BCT enables speed of processing and helps banks to
Since, the payments and settlements happen in real- create and execute complex business rules that have
time, the participating banks and financial minimal human intervention and it can address the
institutions can enjoy reduced pressure on the market needs that could not be satisfied before.
treasury management to keep their settlement Faster settlements: Blockchain can also help to
accounts well-funded. address KYC and identity management challenges as
a lot of the data to prove identity is already in digital
Efficiency form and BCT could enable instant verification. Use
Resilience through redundancy: Being a distributed of BCT can reduce duplicative recordkeeping,
architecture by design, BCT enables the network to eliminate reconciliation, minimize error rates and
be operated by all permissioned nodes in the facilitate faster payment/asset settlement. In turn,
ecosystem. All the important members of the faster settlement means less risk in the financial
payment ecosystem – banks, financial institutions system and lower capital requirements.
shall effectively become the participating nodes in One of the most frequently suggested example
the BCT network. In the case of an untoward event where BCT can be readily applied to banking is in the
affecting the ecosystem (like war, floods, Trade Finance area.
earthquakes, cyber-attacks), even if some nodes of
the network are unavailable, the consensus A trade finance solution with letter of credit, bill of
algorithms built as a part of the BCT network ensure a lading and multi-signature solutions based on BCT
11
Chapter 3
Applications of Blockchain Technology
Control and Security: Users are in control of their The degree of anonymity provided by some digital
transactions, without foregoing their privacy while currency schemes may discourage a range of
overcoming identity theft. Due to the fact that financial system participants from direct use or from
blockchain transactions cannot be reversed, do not providing facilities for digital currency use to their
carry with them personal information, and are customers, as AML/CFT requirements may be
secure, merchants are protected from potential difficult to satisfy in relation to digital currency
losses that might occur from fraud. transactions. Also increased adoption and use of
digital currencies could affect the conduct of
Transparency: All finalized transactions are available monetary policy.
for everyone to see thus allowing immediate
verification of transactions. Protocols being open Central Bank Issued Digital Currencies
source undergo wide scrutiny, thus enabling trust in While there are disadvantages of existing
the underlying platform and guaranteeing that they cryptocurrencies, many central banks around the
cannot be manipulated by any single person, world have stepped up their efforts towards
organization, or government. It is possible to send developing digital versions of their fiat currency to
and receive money anywhere in the world at any leverage the benefits of the underlying technology –
given time, without a central authority. BCT.
13
Figure 9: Pre- and Post IoT trade finance highlighting advantages of the IoT
(Source: “The Fintech 2.0 Paper: rebooting financial services”)
trade have to be created for buyer, seller, broker, Trade: BCT ensures a Secure, real-time transaction
clearer and third parties and then continuously matching, and immediate irrevocable settlement; it
reconciled across multiple systems. Cobalt DL uses also helps in Automatic DVP on a cash ledger and
BCT, eliminating multiple trade records for buyer, automatic reporting & more transparent supervision
seller, broker, clearer and third parties from each for market authorities, establishing higher AML
transaction. By presenting a shared view of a trade, standards.
Cobalt DL frees up back- and middle-office resources
Post-Trade: Eliminates intermediaries as no central
that are currently overwhelmed by the need for
clearing is needed for real-time cash transactions;
continuous reconciliation across multiple systems.
results in reduced margin/ collateral requirements;
This is backed by eight major banks and financial
faster and efficient post-trade processing; fungible
institutions.
use of assets on BCT as collateral; auto-execution of
The technology is designed to integrate seamlessly smart contracts establishes the liabilities of parties
with all trading sources and venues, providing over the life-cycle, like in derivatives.
immediate efficiency benefits, analysis of which has
Custody & Securities Servicing: Securities are
shown to deliver a significant cost reduction when
directly issued onto a blockchain to the parties; the
compared with existing infrastructure. FX market
servicing processes are automated and duplication
participants incur multiple unnecessary license fees,
avoided. Fund subscriptions and redemptions are
ticketing charges, IT overheads and staff costs as a
processed automatically making it simple for
result of the complexity of existing structures.
accounting, allocations and administration.
BCT in Capital Markets: R3 is a financial innovation
Pre-IPO shares allotment: NASDAQ announced that
firm that leads a consortium partnership with over 50
it has issued its first investor shares on the platform
of the world's leading financial institutions, to work
Linq, a blockchain-based service, to issue pre-IPO
together to design and deliver advanced distributed
shares of companies.
ledger technologies to the global financial markets.
Loan Syndication: Financial services giant Mizuho
BCT can revolutionize the Capital Market trading
has announced a BCT trial to be focused on
processes. There are several intermediaries involved
syndicated loans, including Information Services
in a trade, like exchanges, central counterparties
International-Dentsu (ISID), blockchain startup
(CCPs), central securities depositories (CSDs),
Currency Port and Microsoft Japan.
brokers, custodians and investment managers. For
correct accounting and to complete the business Bond Trading: IBM and SBI Securities, a subsidiary of
transaction, intermediaries need to update their SBI Holdings, are looking to create new mechanisms
respective ledgers based on the messages exchanged for trading bonds, using IBM’s Hyperledger as a basis
between them. This creates a delay and also for the trials. The goal of the collaboration between
additional cost. Sometimes, to enable a particular SBI and IBM is to test commercially viable platforms
transaction and the corresponding ledger updates, for blockchain-based bond trading.
intermediaries may need to complete a few additional
Supply Chain Financing: The IBM business unit deals
ledger transfers in the form of realignment, securities
with 4,000 suppliers, financing customers and
borrowing or cash management. This introduces
partners who conduct about three million
additional delays in the transaction lifecycle,
transactions per year, worth $44 billion. About
increasing the time for final settlement.
25,000 disputes arise annually over issues such as
BCT will benefit Capital Market Services at all stages the wrong number of computer parts in an order or
of Trade and securities servicing. deliveries that go awry. Normally, it takes an average
of 44 days to resolve such issues. Furthermore,
Pre-Trade: A blockchain system that stores and
employees use roughly six to seven software
facilitates KYC data will help in reducing cost and
applications to verify steps taken in the arrangement
eliminating the number of KYC checks. It will also
as well as having to call banks, financial institutions,
help in Transparency and verification of holdings,
and associated partners. IBM said the use of
leading to reduced credit exposures.
16
Distributed Ledger Technology (DLT) records faster and more accurately than IBM's traditional resources, has
resulted in a 10-day resolution period. The same solution can be deployed by any big corporate and banks for
supply chain finance.
Figure 10: Blockchain in Capital Markets: The Prize and the Journey
17
Chapter 4
Security, Privacy & Scalability Aspects of Blockchain Systems
Smart contracts (also called self-executing contracts, Many blockchain systems have a native token or
blockchain contracts, or digital contracts) are simply digital currency associated with the ledger. These
computer programs that act as agreements where tokens or digital currencies might be acting as a fuel
the terms of the agreement can be pre-programmed for the functioning of the ledger either by burning
with the ability to self-execute and self-enforce. the token during transactions or as a form of
Smart contracts are written using programming incentives to participants. In case this native token or
languages such as C++, JavaScript, Java, Go, Python, digital currency has value in the external world, then
etc. one needs to consider the impact of volatility of the
value with regards to normal functioning of the
As with any computer program, there is a possibility ledger. A crash or spike in the value of the native
that the creator of the contract program intentionally token might impact business models drastically.
or otherwise creates a flawed program which can Malicious events that happen in the external world
introduce vulnerabilities for the assets controlled by can impact the functioning of the ledger in this case.
the contract. To circumvent this, contracts loaded
onto the blockchain should conform to certain base It might be therefore prudent to have a ledger that is
rules outlined by the network and should be asset agnostic and one which does not have any
thoroughly audited for vulnerabilities or unfair bias native token or currency that has value of its own in
before deployment. the outside world.
21
Chapter 5
A Prospective Roadmap for the Adoption of BCT to Banking
and Finance in India
Annexure
Blockchain Application to Trade Finance - PoC
Specifications
Hardware
! Validating peers – 8 Xeon cores, 32GB RAM
dedicated servers
! Application Servers – 4 Xeon cores, 16GB RAM into the contents, maintaining the privacy of the
dedicated servers parties involved. For EIPS, the remitting bank,
receiving bank and clearer may view the transaction
! Certificate Authority Server - 4 Xeon cores, contents, and for the sight LC the buyer's bank,
16GB RAM dedicated server. seller's bank and clearer may view the transaction
Software contents. Any external party attempting to query the
transaction will have its call rejected. The ledger data
! OS - Ubuntu 14.04 is also encrypted to stop external parties from
! Validating peers – Hyperledger Fabric 0.6.1 gaining access to the raw data stored on it.
preview Certificates issued by the certificate authority
(member services) are used for authenticating a user
! Application Servers – Node JS, React & Redux in a transaction.
with Fabric NodeSDK.
Application Servers
Hyperledger Fabric & Chaincode
Hyperledger Fabric peers do not provide many tools
Hyperledger Fabric 0.6.1 is used as the blockchain beyond those described above. Most tasks are
platform to maintain the distributed ledger and run performed by the application servers. The
the chaincode. Each use case has its own chaincode, application logic must be managed by an application
transaction type and ledger. The validating peers that interacts with the Fabric peers to process the
representing each of the banks run the Fabric peer workflow of a transaction. The application server
service which executes chaincode, broadcasts and primarily provides the interface to the users of the
receives any resulting state change to the ledger, blockchain network. The chaincode simply defines
reaches consensus on the state changes through a the rules of a transaction.
standardized PBFT algorithm, and records state
changes to the local ledger. Each validating peer and The application servers initiate new transactions,
user of the validating peers (the banks) must register listen to new events and react to those events
with the certificate authority server to gain access to appropriately. In the case of EIPS and the sight LC
the network and submit transactions. The certificate they also handle the file data that is associated with a
authority server runs the Fabric 'member services' transaction, as only the hash of the files is kept 'on
service. This mechanism makes it a 'permissioned' chain'. The files are uploaded to the application
network. server, encrypted, hashed and stored on a shared
distributed file system. The hash of the file is stored in
The chaincode provides the methods by which the a field in the blockchain transaction. When file
state of the ledger is changed or queried. Any action retrieval is required, the application server will fetch
that results in a change of state to the ledger must be the file, rehash it to compare with the original hash
called with an 'Invoke' function call. Any action that stored in the transaction to ensure it has not been
simply returns information from the ledger without tampered with, decrypt it and present it to the user.
resulting in a state change is called with a 'Query' Application servers must also deal with the
function call. The chaincode allows for cryptographic key management for file encryption.
authentication of the caller to verify if the caller is
authorized to use a specific function. Using this One or multiple clearing servers may be charged
mechanism, the chaincode can control access to the with communicating transactions to an external
information stored in the ledger. In the case of the clearing organization at the appropriate times for
EIPS and Sight LC chaincode, only parties that have real-world settlement of any monetary exchange in
been named on the transaction may gain visibility the transaction.
28
Use Cases
Domestic Trade Finance Letter of Credit
The sight letter of credit (LC) use case highlights the
! The seller's bank to review the LC
ability of the blockchain platform to leverage
chaincode to implement any complex workflow with a ! The seller to upload and attach shipping
shared document repository, automatic settlement documentation after acceptance of the LC and
and recording of full transaction history on a single shipping of the goods
system. Simple user interfaces have been built for ! The clearer to process settlements at the
demonstration and to allow manual execution of appropriate time in the transaction.
review and approval actions with the transaction
running through multiple states. UIs have been Access to the transaction details and the associated
provided for: documents is restricted to the counterparties
involved. A full and real-time transaction history is
! The buyer to initiate an LC application after a available to counterparties with all associated
purchase has been agreed documents securely stored and encrypted.
! The buyer's bank to review, process the Below is a simplified workflow diagram of the LC use
applicationandattachtheapprovedLCdocument case.
Figure D. A"er approval of the application, the letter of credit is attached to the transaction
(Credits: MonetaGo)
30
Figure E. Completion of transaction. Full history of the transaction recorded with all
associated documentation. (Credits: MonetaGo)
Inputs on payments
2 NPCI
component
Implementation of the
4 MonetaGo
technical platform
32
Coordinators
Dr. M. V. Sivakumaran, IDRBT
© An IDRBT Publication, January 2017. All Rights Reserved. Dr. N. V. Narendra Kumar, IDRBT
Dr. S. Nagesh Bhattu, IDRBT
Published by: Explore, Enable, Excel
Castle Hills, Road No. 1, Masab Tank, Hyderabad - 500 057, India.
EPABX : +91 - 40 - 2329 4999, Fax : +91 - 40 - 23535157
Web : www.idrbt.ac.in E-mail : publisher@idrbt.ac.in