By @AnilSaidSo

Satoshi Nakamoto cites 8 references in the Bitcoin white paper. Each one uniquely influencing the design of the Bitcoin protocol. In this thread we’ll explore what they are and why they’re important.

Image

First, for context, it’s helpful to understand that the Bitcoin protocol combines several existing tools, technologies and systems in a highly novel way.

Embedded video

‘b-money’ by Wei Dai is the very first reference listed. Dai was also one of the first people contacted by Nakamoto. “efficient cooperation requires a medium of exchange (money) and a way to enforce contracts. I describe a protocol by which these services can be provided.”

Image

It should be noted that Dai has questioned the influence of his paper on Bitcoin’s design: “My understanding is..Nakamoto didn't even read my article before reinventing the idea himself. He learned about it afterward and credited me in his paper.” An excerpt from ‘b-money’:

Image

“we need a system for participants to agree on a single history..” -Nakamoto “There are two families of timestamping techniques: those that work with a trusted third party and those that are based on the concept of distributed trust.” -Massias et al. http://bit.ly/3bZpklp

Image

Each block in Bitcoin’s chain includes an approximate timestamp (which is then included in the block header) making it a de facto global public store of record. “such as in a newspaper… timestamp proves that the data must have existed at the time” -Nakamoto

Embedded video

Haber & Stornetta feature three times in the white paper’s reference list. “The problem is to time-stamp the data, not the medium. We propose..time-stamping of such documents so that it is infeasible for a user either to back-date or to forward-date his document..”

Image

Satoshi incorporated the concept of 𝘭𝘪𝘯𝘬𝘪𝘯𝘨 hashed data to easily prove integrity and transaction sequencing. “The sequentially numbered, sewn-in pages a the notebook make it difficult to tamper with the record without leaving telltale signs” -Haber & Stornetta

Image

Key to Bitcoin’s decentralization are Merkle Trees for data storage efficiency. “By using trees, we show how to achieve an exponential increase in the publicity obtained for each time-stamping event, while reducing the storage and the computation required..” -Bayer et al.

Image

Invented by Ralph Merkle, Nakamoto utilized data structures known as Merkle Trees as a way to- a) save on disk space b) prove tx validity (via proofs) Each block contains only the merkle root, but “it is possible to verify payments without running a full network node” -Nakamoto

Embedded video

Concerned with naming schemes of digital documents, for ease of discoverability and verifiability, Haber & Stornetta proposed combining one-way hash functions with Merkle Trees to verify integrity and check for completeness in the case of lists. https://nakamotoinstitute.org/static/docs/secure-names-bit-strings.pdf…

Image

In implementing a mechanism for distributed timestamping, Nakamoto posits- “we will need to use a proof-of-work system similar to Adam Back's Hashcash” “Hashcash was originally proposed as a mechanism to throttle systematic abuse of un-metered internet resources..” -@adam3us

Image

For more detail on the influence of Adam Back’s work in the design of Bitcoin’s incentive system, the following interview with @prestonpysh covers lots of ground.

Dr. Adam Back's Bitcoin's Proof of Work | The Investor's PodcastPreston talks with Dr. Adam Back. who's a core developer, inventor of Proof of Work, and CEO/ Founder of Blockstream.theinvestorspodcast.com

Merkle’s paper explores the various schemes for public key distribution and protocols for digital signatures. “Digital signatures are also an ideal method of broadcasting authenticated messages from a central source which must be confirmed by many separate recipients” -Merkle

Image

The Bitcoin protocol utilizes digital signatures (ECDSA) to enable you to prove ownership and send bitcoin from your address, without having to publicly reveal your private key. Others can then verify this by combining your signed transaction + your public key.

Embedded video

Lastly, a 1957 mathematics textbook by William Feller was cited by Satoshi in relation to calculating the probability of an attacker  generating “an alternate chain faster than the honest chain” in order to double-spend their bitcoins.

Image


About the Author

Anil is an independent bitcoin educator based in Canada. He holds an MBA, CBP and was part of MIT's inaugural FinTech certificate cohort. He's guest-lectured at Business schools and launched the first Bitcoin-specific university scholarship in Canada. His focus is on simplifying concepts through visuals and storytelling to make bitcoin easier to comprehend.

You can follow him on Twitter @anilsaidso

You can pre-order his book representing approximately 3,000 hours of research, teaching, writing and design in an effort to best communicate Bitcoin as a concept.

FEW UNDERSTAND THIS: A Visual Guide to Bitcoin’s Rise
Bitcoin is hard to understand because we’ve never had anything quite like it before.It’s a disruptive innovation that is set to fundamentally change how we perceive and communicate value. This book distills the key concepts, mental models, and use cases that help explain Bitcoin’s rise to legitimacy…


Share this post