Bitcoin White Paper

avatar
(Edited)

The Bitcoin White Paper was written by the anonymous creator of Bitcoin, know only as Satoshi Nakamoto.


photo credit


source

The Bitcoin White Paper was written by the anonymous creator of Bitcoin, know only as Satoshi Nakamoto.

  • The history of Bitcoin is that it was built on the effort attempts, and the paper appears to be a collaborative effort with a few different authors. But the person credited with its creation is Satoshi Nakamoto.
  • Since then it is thought that this person or persons authored the so called Bitcoin White Paper, which is an essay explaining Bitcoin from A to Z.
  • It is technical at times, and is explained further by the famous Satoshi E-mails, which are communications sent by Satoshi to the others working on the project, and the last email is the Good Bye Email from this mysterious person or persons, and they have not only not been heard from again, but their wallet used to mine Bitcoin hasn't moved a Bitcoin since then.
  • In August 2008, the domain name Bitcoin.org was registered. It was created by Satoshi Nakamoto and Martti Malmi.
  • In October 2008, Nakamoto announced to the cryptography mailing list at metzdowd.com: "I've been working on a new electronic cash system that's fully peer-to-peer, with no trusted third party." He then published the so called white paper on Bitcoin.org, entitled "Bitcoin: A Peer-to-Peer Electronic Cash System," . Link
  • You can find the full white paper, in it's original form here at this LINK

Bitcoin Glossary

  • Some useful terms you need to know before reading the white paper.

CPU: Central processing unit of computers, e.g. an Intel processor.
Decentralised: A system that doesn’t rely on a central institution, being upgraded and legitimised by a democratic framework of contributors.
Double-spending: Potential flaw in digital finance, when a user can spend the same funds twice.
Peer-to-peer: Transactions that don’t involve a third party, directly from sender to receiver.
Pseudonym: Fictitious name.
Supply-capped: Limited supply of coins that cannot be maximised.
citation

Bitcoin Summary from the White Paper

The opener on the first page of the Bitcoin Whitepaper is the abstract of the publication containing a summary that describes the content and purpose of the whitepaper.
Fundamentally, the purpose of Bitcoin is developing computer technology for enabling multiple parties to send payments online directly to each other (“peer-to-peer cash system”) without requiring a financial institution such as a bank.
First and foremost it goes without saying that the underlying system for such transactions would need to meet a number of security requirements.
As the proposed transaction is to be cashless and be executed online, the problem of double spending would need to be addressed.
Double spending is the potential weakness in a digital cash system - the possibility that the same unit of value (the token) could be spent twice if someone duplicates or falsifies a token.
The prerequisites for this type of decentralised cash system to work are Cooperation between the parties running the system (network structure)
Ensuring that previous records can never be changed (immutability) and Agreement on the validity of transactions according to certain rules (consensus)
In other words: all parties need to agree on rules and cooperate in line with those rules while ensuring that records are valid according to these agreed rules as well as immutable.
source

BitPanda Website Summary

  • This is a summary written and published on the BitPanda website.

Introduction - where did Bitcoin come from?The introductory paragraph of the Bitcoin Whitepaper outlines why the creator thinks that a trustless cash system is needed in the first place.
The main reason stated is that traditional payment systems used in commercial settings operating via financial institutions such as banks have a number of flaws.
For one, traditional payments often involve high transaction and mediation costs that may arise if there is a dispute about a transaction, for instance, if a transaction needs to be reversed.
Secondly, traditional payment systems are prone to fraud and thirdly, they always require a trusted third party. The Bitcoin Whitepaper proposes a system in which third parties, if any, such as escrow services for the primary transacting parties, can easily be implemented but only if needed, by triggering some type of coded action.
Transactions
An electronic coin is basically a chain consisting of digital signatures.
Electronic coins are actually lines of protected computer code which exist in relation to the previous code in line before them.
You can’t hold electronic coins in your hands like a traditional currency, they only exist online.
Let’s say an owner of Bitcoin wants to make a transaction.
If the owner activates a transaction to transfer the coin to the next owner, this value of bitcoins is broadcasted to the network.
The owner activates the transfer of the coin to the next owner by digitally signing a hash - the unique digital fingerprint - of the previous transaction to encrypt the hash.
The encryption behind Bitcoin uses two mathematically related key - a public key and a private key.
They are related but not identical.
The public key is needed to encrypt the transaction along with the owner’s private key to create the digital signature - it is similar to a bank account number, while the private key is similar to the access code for a bank account.
Therefore the public key is also the address of the recipient, to which the owner wants to send bitcoins.
The public key is needed to encrypt the transaction along with the owner’s private key to create the digital signature.
The public key is needed to encrypt the transaction along with the owner’s private key to create the digital signature.
The public key is needed to encrypt the transaction along with the owner’s private key to create the digital signature.
This information is added to “the end” of the coin.Naturally, the next owner - the recipient - wants to ensure that the amount sent to them has not been previously spent in an earlier transaction.
The only way this can be ensured is by the network agreeing on all transactions made before in the order they have been made.
The valid order of all transactions in the network has to be publicly announced so everyone knows what is valid, and for this, the network needs to have an agreement of rules in place on what is valid.
Each recipient of a transaction wants proof that at the time they received their transaction, the majority of the network agrees that it was the recipient who was the first to receive this transaction and no other recipients have received the same transaction before.
The valid order of all transactions in the network has to be publicly announced so everyone knows what is valid, and for this, the network needs to have an agreement of rules in place on what is valid.
Timestamp Server This section of the Bitcoin Whitepaper describes how Satoshi Nakamoto proposes the Bitcoin network uses a “distributed timestamp server” to prove in which order transactions were generated.
source
What does this mean?
The Bitcoin network runs on a distributed system of computers.
All computer processes in the network run simultaneously on hundreds and thousands of computers - i.e. nodes - located in different countries distributed all over the world.
All these computers are connected to each other and anyone with the suitable equipment can set up a computer to join in. The more computers in the network, the more copies of the records, making the system even more secure.
Obviously, it would be close to impossible to simultaneously steal or destroy records from thousands of computers at the same time at once.
Therefore, the system is safe as long as the majority of parties operating the computers collectively agree on the longest “chain” of data records - the “valid” blockchain.
Transactions are bundled into blocks containing several transactions and information on the previous block.
A timestamp server, a piece of software, adds the timestamp to the hash of a block at the same time on all the hundreds and thousands of computers in the network.
The timestamp provides the proof that the data must obviously have existed at this time, and every timestamp includes the previous timestamp in its hash.
This way, a chain is formed with each additional timestamp reinforcing the timestamps before it.
Think of the analogy of Russian stacking dolls - a tiny doll inside a larger doll that is inside a larger doll and so on - this is what a Bitcoin transaction looks like.
A timestamp server, a piece of software, adds the timestamp to the hash of a block at the same time on all the hundreds and thousands of computers in the network. source
Valid block
Valid block Valid block Proof of Work
The fact is that the general time-stamping network suggested by Satoshi in the original Bitcoin Whitepaper was implemented as a peer-to-peer computer network that uses a Proof of Work algorithm in a process known as Bitcoin mining to create a practically unchangeable history of transactions.
In the broadest sense, “Proof of Work” is the solving of a moderately difficult task by a computer user on their computer. This task satisfies certain set requirements and is inherently difficult to execute.
Originally, Proof of Work as a method was invented to curb the sending of spam emails.
By requiring the sender of emails to perform some small task (“work”) before they could dispatch the email, this was to ensure that no flood of emails would be dispatched.
In the Bitcoin network, this moderately difficult task evolved into solving a cryptographic puzzle.
A number of transactions is bundled into a block.
A block contains data - an index, the timestamp, a list of the transactions, a proof and the hash of the previous block and further information.
A number called a nonce (a “number only used once”) is added to this block to hash it.
The nodes (computers) in the Bitcoin network - the “miners” - now start scanning, testing and discarding millions of nonces each second to find a nonce that meets the target set by the network at the time of the block (the grouping of transactions). They perform this “work” until they find a value that gives the block's hash the required difficulty level: a beginning with a number of zero bits.
Once such a value is found by a miner, it is broadcast to the other nodes in the network, validated and a valid new block has been found and added to the blockchain.
No changes can be made to a block, unless the work would be redone.
A block contains data - an index, the timestamp, a list of the transactions, a proof and the hash of the previous block and further information.
You can view all Bitcoin blockchain transactions on Blockexplorer.
The speed at which new blocks are added depends on how many participants in the network are working on the validation or how much computing power is used. If too many blocks are generated within an hour, the complexity of the task - the “difficulty” is increased in order to deliberately delay the generation of new blocks.
The valid blockchain is the longest chain with the most computing power invested in this chain by honest network participants. source
The Network
The next section of the Bitcoin Whitepaper outlines the transaction process.
A sender dispatches a transaction which is broadcast to all participants in the network (although not all transactions need to reach all nodes).
Each participating node gathers the new transactions into a block and tries to find a Proof of Work for it.
Once it is found and it is clear that the transaction has not been previously spent (double-spent), the new block is again broadcast to the Bitcoin network and accepted as valid (or rejected) by the other computers that work on creating a new block using the hash of the last valid block.
The longest chain in the blockchain is considered the correct chain.
It may happen that two nodes simultaneously broadcast different versions of the next block into the Bitcoin network. Consequently, other nodes receive either one version first or the other.
In this case, the nodes will switch to the longest chain.
If a node doesn’t receive a block, it requests the missing block once it realises that it missed it.
Incentive
To encourage computer nodes to participate in the network, Satoshi Nakamoto proposed that nodes supplying computing power should be rewarded if they are the first node to create a block.
Users of the Bitcoin network would pay transaction fees, which at a later point would become the sole reward once enough coins were in circulation.
As it would take a huge amount of computing power to defraud the network, nodes are more likely to stay honest than defraud the network.
The reason is that investing computing power in mining and generating new coins is more profitable than investing funds into gaining control of the network.
Keep in mind that no single company or person is in charge of running the Bitcoin network.
Instead, it is operated and verified by a large community of independent computers.
Reclaiming Disk Space
As the Bitcoin blockchain is immutable and can never be changed, it was evident that it would grow in size to reach a point which would require large amounts of memory for storage.
In the Bitcoin Whitepaper, it is presumed that a single block header containing no transactions would have an approximate size of about 80 bytes.
To counter the issue of required memory, Satoshi Nakamoto proposed that once a transaction is “buried” under a sufficient number of blocks, the spent transactions before it could be “discarded” to save disk space.
In order to ensure that cryptographic structures - the hashes - would not be broken, the Whitepaper suggests reducing all transactions to a single hash - a root hash - which can efficiently be done by using a Merkle tree.
A Merkle tree or hash tree, named after the scientist Ralph Merkle is a hash-based data structure in cryptography and computer science.
This structure assigns data to a key.
A simple example of this concept is speed dialing on a phone - each telephone number is assigned to each key in a hash-based structure.
In the Bitcoin network, Merkle trees are used for data verification which is efficient because hashes are used instead of a complete information file.
A Merkle tree or hash tree, named after the scientist Ralph Merkle is a hash-based data structure in cryptography and computer science.
Merkle trees typically use a binary-tree structure, meaning each node has at most two child nodes, but a higher level of output can be used as well.
The root hash is the upper-most hash in the hash-based data structure and is part of the block header.
It ensures which transactions are present.
At the time of the publication of the Bitcoin whitepaper in 2008, it was estimated that at least 4.2MB (megabytes) of memory storage would be needed per year.
This was based on the assumption that blocks are generated every ten minutes and each block is equal to 80 bytes.
Per hour, this would be equal to 80 multiplied by 6, then multiplied by the cost per day and then per year, i.e. equivalent to 80b multiplied by (6X24) multiplied by 365.
Typical computer systems were sold with 2GB (gigabytes) of RAM in 2008, and at the time Moore's Law was predicting growth of 1.2GB per year, in the Bitcoin Whitepaper it was presumed that storage would not become a problem, even if block headers were to be kept in memory.
Simplified payment verification
Payments in the Bitcoin network can also be verified without a user running a full node in the network by building a Bitcoin implementation that relies on connecting to a trusted full node and downloading only the block headers.
After the download is completed, the client computer verifies the correct connecting of the chain headers and a sufficient level of difficulty to ensure that it is the correct blockchain.
Finally, copies of transactions along with a Merkle branch linking them to their respective correct block are provided as proof of inclusion.
As long as honest nodes control a network and you are connecting to a node known to be reliable, this verification is reliable.
However, to ensure that transactions are not being fabricated by an attacker on an invalid chain, Satoshi Nakamoto suggests that businesses utilising Bitcoin for frequent payments should run their own nodes for speed and increased security.
In very simple terms, this means you do not need the entire record of the chain to verify a transaction is correct.
You only need to download one branch of the merkle tree and check if it has the same root hash.
Combining and Splitting Value
The lessons behind Bitcoin also apply to transactions containing multiple inputs and outputs - similar to how if you need to spend 35 cents, you need to combine 20 cents, 10 cents and 5 cents.
In the Bitcoin network, transactions can have multiple inputs and outputs allowing for the splitting and combining of value. Privacy
Traditional banks ensure the privacy of transactions by limiting information on transactions to the parties involved, including the third-party intermediary.
The Bitcoin network on the other hand, announces all transactions publicly.
Everyone can see that someone is sending a transaction but the transaction cannot be linked to anyone because no one knows who the acting parties are.
Users identify themselves to the network using a public key but need a private key to access the transaction.
Therefore, the Bitcoin Whitepaper recommends to use a new key pair for each transaction in order to ensure that transactions cannot be tracked back or linked to a common owner.
Calculations
Finally, Satoshi Nakamoto wanted to illustrate the unlikelihood that the Bitcoin network would successfully be attacked by fraudsters.
This section of the whitepaper contains calculations to show how complicated it would be for an attacker to start a new chain rivaling the valid chain.
As honest nodes would not accept a matching transaction, a fraudster would need to race the valid chain and utilise massive amounts of computing power to catch up and the probability that they would ever breakeven is miniscule.
source

Zerocap Website Summary

  • This is another summary of the Bitcoin White Paper, which you may find to be an easier read.
    citation

Bitcoin whitepaper objective
The purpose of the Bitcoin network was to essentially eliminate the trust-based model of digital transactions by creating a digital representation of hard cash.
Whether shopping for clothes online or using credit cards in stores, the payment standard until then was always done through financial institutions that approve and execute each transaction.
By creating an electronic cash system, it eliminates the need for trust in third-party providers.
The goal was accomplished by creating an asset, bitcoin, that allows peer-to-peer transactions that are immutable and encrypted through cryptography to protect users from fraud.
The Bitcoin whitepaper explained its goal to fulfil the frameworks of what has been considered sound money throughout the ages.
This white paper on Bitcoin was a revolutionary step in the world of digital finance.
Bitcoin needed to function as a medium of exchange, unit of account and store of value.
In creating a sound alternative to the existing monetary system, Satoshi also imbued the principles of durability, divisibility, portability, intrinsic value and scarcity.
Transactions
For the system to work, what is now called the “Blockchain” was created.
The transactions occur in a cooperative network that is kept active by sharing the transactional tasks with all computing systems that use it.
When someone wants to transfer bitcoin to another user of the blockchain, the network verifies when the sender first received that amount (previous block) and confirms the amount they are now transferring to the receiver (future block).
That way, the network asserts that the amount will no longer be in the sender’s funds, with an irreversible transfer to the receiver, and so on.
To ensure all transactions are verified, and there’s no room for fraud, the Bitcoin network made them public, allowing any user to access a record of transactions on the bitcoin blockchain.
Each transaction is registered in what the Bitcoin whitepaper calls a “timestamp” that displays where the amount existed previously and where it is heading, thus creating the chain of blocks.
Solving double-spending
Double-spending surfaced once digital assets and currencies first became available, with the possibility of respending the same asset.
After all, P2P platforms existed more than a decade before bitcoin, where users could transfer files but still create duplicates in their computers through a simple copy and paste process.
How does bitcoin prevent that from happening?
For double-spending to be avoided, every transaction in the blockchain is verified by all existing nodes, running programs that host and synchronise copies of the whole blockchain.
Most computers available today can become a node, which helps the blockchain in validating transactions and blocks.
Since every transaction is publicly announced, verified by nodes and sender/receiver, the chance of double-spending is significantly reduced the more nodes the network has.
Proof of Work
To prove that the transactions are functioning correctly, a Proof of Work (PoW) system was implemented.
The PoW works by attributing each transaction to a random number that’s attached to a small puzzle.
To conclude the transaction, the sender’s system must solve the mathematical puzzle and send it through to the receiver’s, which checks it into the chain.
Once proven correct, the transaction is executed.
The process of puzzle-solving locks each transaction history into blocks of the network that are piled up and grow in size as more transactions are concluded.
Reversing transactions would require immense computational power; 51% of bitcoin’s entire hashpower to reverse a single hour of transactions, for instance.
To ensure proper PoW, those running the operations are compensated in bitcoin according to the number of validated transactions.
That’s called bitcoin mining.
Bitcoin mining – the incentive
Mining bitcoin simply means using one’s computing system to process blockchain transactions.
In return, miners are compensated in bitcoin as new transaction blocks are created and dictate how the network operates under a 51% majority system.
The mining process is what the bitcoin creator(s) calls the incentive; a reason for people to keep a fully decentralised network up and running while making sure that it continues to grow in adoption.
The Bitcoin whitepaper also mentions a predetermined number of coins to be mined, resulting in bitcoin’s maximum supply of 21 million.
Once all coins are mined, the incentive will continue in the form of transaction fees which oscillate freely and rely on the shifting hashrate of the network.
To learn more about bitcoin mining and how it works, read our article “Bitcoin mining: An overview”.
Solving the Byzantine Fault
Byzantine Fault is the potential issue facing computers that participate in a shared system, where the framework might fail if the participants disagree on a strategy for the network.
The Fault presumes that some members are corrupt, inefficient or non-democratic, noting that a single point of failure is enough to jeopardise the entire approach.
Bitcoin’s blockchain solves the Byzantine Fault through its Proof-of-Work algorithm, allowing new strategies to be implemented only if 51% of the network agrees with the process.
As the number of miners continues to grow, the chances of malevolent participants taking over the blockchain get increasingly unlikely.
According to Business Insider, there are around one million miners currently active globally, which would take roughly 510,000 individuals to agree on intentionally jeopardising the blockchain for the Byzantine Fault to be successful.
Privacy – One of the biggest concerns that led to Bitcoin
Privacy was one of the biggest concerns leading to the Bitcoin creation; the possibility of transacting funds in a secure network without compromising personal information to third parties.
The idea of privacy-enhancing technologies dates back to the early 1990s with the rise of the Cypherpunk movement, cryptography enthusiasts who researched ways to make digital systems more private and under the sole authority of its users.
The fundamental concepts of the movement can be seen in “A Cypherpunk’s Manifesto,” written by mathematician and programmer Eric Hughes.
While traditional banking systems limit user information in transactions, it still relies on the account owner trusting the institution to be able to access their data and to safeguard their privacy.
In the Bitcoin network, all account owners are identified by their addresses; random sequences of 26-35 characters.
To send or receive assets, all a user needs is the blockchain address to interact with.
The public can see all bitcoin transactions in the blockchain with ultimate transparency, but the chain only registers the addresses without linking the transaction to private information.
Take Pay ID, for instance; even if the account owner utilises a randomly generated email or one-time cellphone number to register and conclude transactions, the ID is attached to their banking provider containing full name, social security number, home address, etc.
With blockchain addresses, the random characters represent all the information needed.
source

These summaries are provided here for education and archival purposes.


photo credit



0
0
0.000
16 comments
avatar

I think it's a good idea to provide the original Bitcoin White Paper as an archival item and historical treasure. I also like the explanation articles cited to provide more modern context.

0
0
0.000
avatar

Thank you, I agree, it all should be here where we can read and refer to it, as our point of origin and get an idea how far we have come. Plus we need translations because these people were math maors and their vocabulary is peretty math centric.

0
0
0.000
avatar

It is really nice to have a copy of the original Bitcoin White Paper, or as in this case, a digital archive.
The Bitcoin story is both beautiful and complicated. Learning about Bitcoin can be thrilling, interesting, eye opening and stupifyingly boring. It is a huge rabbit whole of knowledge, from which many people will never ascend.

0
0
0.000
avatar

I agree, we are a cryptocurrency community, so where else should it be easy to find copies of the documents of our founders of this technology like the Crypto Punks and Satoshi Nakamoto but here?

You are right, this idea of archiving the historical material here opens up a big rabbit hole of potential material.

0
0
0.000
avatar

This is pretty, but I want to know more about the cryber-pinks, cryptography and the war

0
0
0.000
avatar

I think the cyber-punks or crypto punks would be cool too.

0
0
0.000