LAW professor nelson rosario THE BUILDING BLOCKS OF THE BLOCKCHAIN — NETWORKS + LEDGERS + CRYPTOGRAPHY nelsonmrosario.com @ nelsonmrosario BLOCKCHAINLAWCLASS.COM
I N O I S T E C H + S TA N F O R D C O D E X B LO G | C O M P U TAT I O N A L L E GA L S T U D I E S . C O M PAG E | DA N I E L M A R T I N K AT Z . C O M C O R P | L E X P R E D I C T. C O M NELSON ROSARIO B LO G | L AWO F C RY P TO C U R R E N C Y. C O M PAG E | N E L S O N M RO S A R I O . C O M F I R M | M A R S H A L L I P. C O M BLOCKCHAINLAWCLASS.COM L A B | T H E L AW L A B . C O M E D U | I L L I N O I S T E C H - C H I C AG O K E N T L AW
POLITICS AND CULTURE IN THE PERSIAN BLOGOSPHERE, BERKMAN CENTER FOR INTERNET AND SOCIETY AND INTERNET & DEMOCRACY PROJECT, HARVARD LAW SCHOOL (2008) MAPPING IRAN’S BLOGOSPHERE
SARKAR, R. A. SWEET, V.L. NIMGAONKAR & S. CHAPARALA, SCHIZOPHRENIA INTERACTOME WITH 504 NOVEL PROTEIN–PROTEIN INTERACTIONS, 2 NPJ SCHIZOPHRENIA16012 (2016)
In- cial sciences frame from the financial d system as complex ) and urge policy- olutions with What is often se initiatives also complex st as it seems ory measures AS properties or regulation, o appreciate ystems yield nrealistic as- ng empirical w, there has exity science. cal studies of searchers are ngly evident cientific sup- ch agenda to gap and ad- ons. t what com- y as hallmark e diverse in- res, agencies, due process, actors (e.g., and judges); regulations, are intercon- tic processes s, and rule- mechanisms ourts and ju- n). These are all em- and nonhierarchical e.g., cross-references ns and judicial opin- ies of federal, state, stitutions) that fre- ganizing properties exercise bounded rationality, have only par- tial information, and are able to exercise only varying degrees of control on overall system behavior (2). Efforts to integrate CAS approaches to regulated systems may flounder if complex adaptive characteristics of the legal system it- self are not taken into account. For example, although natural-resources policy theorists have advocated for a new field of adaptive management based on an understanding that ecosystems are CAS, agencies, courts, and other components of the legal system have reacted in unexpected ways that can frustrate adaptive management (3). Legal systems are locked in perpetual co- evolution with their regulatory targets. Co- adaptive dynamics have driven growth in structure and size, punctuated with stages of nonlinear expansion of the U.S. statutory was a factor in the 2008 financial crisis (5) and the Deepwater Horizon oil spill (6). THEORY, ANALYSIS, APPLICATION Application of informatics and big-data– styled research to law offers many potential benefits for conventional empirical legal studies. The CAS framework is neither an extension of nor a replacement for that ap- proach but a different way of envisioning systems in which agent strategies and sys- tem structures evolve, with outcomes stan- dard game theory and equilibrium analyses would not predict (7). Although well behind CAS research in other social sciences, re- searchers have begun to map CAS concepts onto the legal system (2). Researchers are applying empirical tools of complexity sci- ence to understand how to measure, moni- tor, and manage the legal system as a CAS. U.S. Supreme Court term Percentage of cases contained within giant component Giant component (%) 60 1805 1810 1810 1815 1820 1820 1825 1830 1830 1835 50 40 30 20 10 0 United States Supreme Court citation network (1805–1835) Cases are represented as nodes, citations between cases as edges. Emergence of a giant [connected] component after 1815, a hallmark phenomenon in complex systems, represents a transition from jurisprudential reliance on foreign to domestic law following the War of 1812 (4). We include all cases that had been cited at least once over the Court’s history (1791–2015). For figure code and data, see https://github.com/mjbommar/legal-complexity-science. Nashville, TN 37203, USA. cago-Kent College of Law, he Stanford Center for 05, USA. Email: jb.ruhl@ 31 MARCH 2017 • VOL 355 ISSUE 6332 1377 3/29/17 11:31 AM Published by AAAS on March 30, 2017 http://science.sciencemag.org/ Downloaded from J.B. Ruhl, Daniel Martin Katz & Michael Bommarito, Harnessing Legal Complexity, 355 Science 1377 (2017) Michael Bommarito, Daniel Martin Katz, Jonathan Zelner & James Fowler, Distance Measures for Dynamic Citation Networks 389 Physica A 4201 (2010) BLOCKCHAINLAWCLASS.COM
Patent Statistics by Means of Social Network Analysis Tools. 30 World Patent Information 115 (2008) (a) (b) (b) Daniel Martin Katz & Michael Bommarito, Measuring the Complexity of the Law: The United States Code, 22 Journal of Artificial Intelligence & Law 1 (2014) (c) Daniel Martin Katz & Derek Stafford, Hustle and Flow: A Social Network Analysis of the American Federal Judiciary, 71 Ohio State Law Journal 457 (2010) (c)
THOUGHT OF AS NETWORKS C. HERRERA-YAGÜE, C. M. SCHNEIDER, T. COURONNÉ, Z. SMOREDA, R. M. BENITO, P. J. ZUFIRIA & M. C. GONZÁLEZ, THE ANATOMY OF URBAN SOCIAL NETWORKS AND ITS IMPLICATIONS IN THE SEARCHABILITY PROBLEM, 5 SCIENTIFIC REPORTS 10265. (2015)
AS A WAY TO COMMUNICATE AMONG MILITARY. SENDER AND RECIPIENT EACH HAD A CYLINDER OF EXACTLY THE SAME DIAMETER. THE SENDER WOULD WIND A RIBBON OF PARCHMENT PAPER AROUND THE CYLINDER AND WRITE ON IT LENGTHWISE.
READ ONLY BY A PERSON WHO HAD A CYLINDER OF EXACTLY THE SAME CIRCUMFERENCE. IT IS WAS NOT OVERLY SECURE BUT DID IMPOSE SOME COST TO DECRYPTION GREECE ~700 B.C.
adoption of codes [for diplomatic correspondence] was necessary. Codes were an essential part of his correspondence because European postmasters routinely opened and read all diplomatic and any suspect letters passing through their command.” https://www.monticello.org/site/research-and-collections/wheel-cipher JEFFERSON DISK It is not clear to what extent Jefferson actually used the invention.
SELECT A RANDOM ROW AS THE CIPHERTEXT OUTPUT DECRYPT: USING AN IDENTICAL COPY OF THE JEFFERSON DISK TURN WHEEL TO THE CIPHERTEXT OUTPUT AND LOOK FOR AN INTELLIGIBLE ROW MESSENGER ONLY HAS THE CIPHERTEXT NOT THE DEVICE
three, he played knick- knack on his knee INPUT TEXT E5B2621834F9F271503F12 AB984EF2312EC9CBBF257 AE27DAD7E1BE9F93104F9 This old man, he played three, he played knick- knack on his Knee A4AD6A051622F3E1BEBD90 F434A728DB36A62BB8A62D 59782DA2CB9F575FFCB2 SHA-256 SHA-256 HASH FUNCTION HASH VALUE
TWO MESSAGES HAVE SAME HASH 1. SAME MESSAGE RESULTS IN THE SAME HASH 2. QUICK TO COMPUTE THE HASH VALUE 3. ONE WAY STREET 4. SMALL CHANGES TO MESSAGE GENERATE DIFFERENT HASHES
DATA STRUCTURE … IN WHICH EACH LEAF NODE IS A HASH OF A BLOCK OF DATA, AND EACH NON-LEAF NODE IS A HASH OF ITS CHILDREN. MERKLE TREES ARE USED IN DISTRIBUTED SYSTEMS FOR EFFICIENT DATA VERIFICATION. THEY ARE EFFICIENT BECAUSE THE USES HASHES INSTEAD OF FULL FILES.” VIA BRILLIANT.ORG
PUBLIC-KEY CRYPTOGRAPHY USES KEY PAIRS GENERATED BY USE OF A LARGE RANDOM NUMBER 3. HASHING SECURES THE INTEGRITY OF INFORMATION SENT ON A NETWORK 4. DIGITAL SIGNATURES AUTHENTICATE WHO SENT A MESSAGE AND VALIDATE THE INTEGRITY OF THE SENT MESSAGE
TO DIRECTLY CONNECT WITH EACH OTHER AND PERFORM TRANSACTIONS LEDGERS DISTRIBUTED LEDGERS ARE MAINTAINED BY EVERYONE ON THE PEER-TO-PEER NETWORK CRYPTOGRAPHY PUBLIC-KEY CRYPTOGRAPHY PROVIDES THE ADDRESSES AND AUTHENTICATION OF USERS IN THE PEER-TO-PEER NETWORK INFORMATION IS PROTECTED THROUGH THE USE OF HASHES AND DIGITAL SIGNATURES
I N O I S T E C H + S TA N F O R D C O D E X B LO G | C O M P U TAT I O N A L L E GA L S T U D I E S . C O M PAG E | DA N I E L M A R T I N K AT Z . C O M C O R P | L E X P R E D I C T. C O M NELSON ROSARIO B LO G | L AWO F C RY P TO C U R R E N C Y. C O M PAG E | N E L S O N M RO S A R I O . C O M F I R M | M A R S H A L L I P. C O M BLOCKCHAINLAWCLASS.COM L A B | T H E L AW L A B . C O M E D U | I L L I N O I S T E C H - C H I C AG O K E N T L AW
LAW professor nelson rosario THE BUILDING BLOCKS OF THE BLOCKCHAIN — NETWORKS + LEDGERS + CRYPTOGRAPHY nelsonmrosario.com @ nelsonmrosario BLOCKCHAINLAWCLASS.COM