2020
DOI: 10.24251/hicss.2020.770
|View full text |Cite
|
Sign up to set email alerts
|

Do Not Be Fooled: Toward a Holistic Comparison of Distributed Ledger Technology Designs

Abstract: Distributed Ledger Technology (DLT) enables a new way of inter-organizational collaboration via a shared and distributed infrastructure. There are plenty of DLT designs (e.g., Ethereum, IOTA), which differ in their capabilities to meet use case requirements. A structured comparison of DLT designs is required to support the selection of an appropriate DLT design. However, existing criteria and processes are abstract or not suitable for an in-depth comparison of DLT designs. We select and operationalize DLT char… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 16 publications
(10 citation statements)
references
References 24 publications
(46 reference statements)
0
10
0
Order By: Relevance
“…User incentivization IoT, DA [58], [78] Attracting new users to share limited resources [48] Overcoming barriers between network environments Scalability IoT, DA, GA [11], [38], [79] An increase in the load on the centralized node occurs with an increase in traffic or the number of users All DLT methods, DAG, vDLT, Sharding, Sidechain, and cross-chain Creation of applications, where data exchange is based on the distributed registry principles Identity, security, and data management IoT, IR, GA [28], [45] The identification of an organization's assets (including people, buildings, cars, systems, and information assets) DLT design in system functionality GA [52], [30] Depending on the chosen design, the system may have certain functions.…”
Section: Dlt-based Technical Conceptmentioning
confidence: 99%
See 1 more Smart Citation
“…User incentivization IoT, DA [58], [78] Attracting new users to share limited resources [48] Overcoming barriers between network environments Scalability IoT, DA, GA [11], [38], [79] An increase in the load on the centralized node occurs with an increase in traffic or the number of users All DLT methods, DAG, vDLT, Sharding, Sidechain, and cross-chain Creation of applications, where data exchange is based on the distributed registry principles Identity, security, and data management IoT, IR, GA [28], [45] The identification of an organization's assets (including people, buildings, cars, systems, and information assets) DLT design in system functionality GA [52], [30] Depending on the chosen design, the system may have certain functions.…”
Section: Dlt-based Technical Conceptmentioning
confidence: 99%
“…The article [30] outlines DLT characteristics that are selected according to an in-depth comparison of DLT elements. In addition, a benchmarking process is proposed to structure of the DLT projects according to the application requirements.…”
Section: Dlt Design Aspectsmentioning
confidence: 99%
“…However, the presented processes are highly abstract and generic, they focus on questions related to whether a distributed ledger is useful at all. Some articles consider select DLT designs and compare them but hardly address causes for the viability of investigated DLT designs for applications (e.g., [17,76,77]). Other articles address the degree of decentralization (e.g., [68,70]).…”
Section: Prior Research On Trade-offs Between Dlt Characteristicsmentioning
confidence: 99%
“…Figure 6: The blockchain trilemma is illustrated by a triangle like the one in this figure where one cannot draw a single point that is close to all the triangle corners, meaning that a trade-off among the three properties must be chosen [80].…”
Section: Scalability Decentralization Securitymentioning
confidence: 99%