Next Article in Journal
Fuzzy Logic to Measure the Degree of Compliance with a Target in an SDG—The Case of SDG 11
Next Article in Special Issue
Borel Chain Conditions of Borel Posets
Previous Article in Journal
Realized Stock-Market Volatility of the United States and the Presidential Approval Rating
Previous Article in Special Issue
A Comprehensive Formalization of Propositional Logic in Coq: Deduction Systems, Meta-Theorems, and Automation Tactics
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Axiomatization of Blockchain Theory

by
Sergey Goncharov
and
Andrey Nechesov
*,†
Sobolev Institute of Mathematics, 630090 Novosibirsk, Russia
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Mathematics 2023, 11(13), 2966; https://doi.org/10.3390/math11132966
Submission received: 6 June 2023 / Revised: 25 June 2023 / Accepted: 28 June 2023 / Published: 3 July 2023
(This article belongs to the Special Issue Mathematical Logic, Algorithms and Applications)

Abstract

:
The increasing use of artificial intelligence algorithms, smart contracts, the internet of things, cryptocurrencies, and digital money highlights the need for secure and sustainable decentralized solutions. Currently, the blockchain technology serves as the backbone for most decentralized systems. However, the question of axiomatization of the blockchain theory in the first-order logic has been open until today, despite the efficient computational implementations of these systems. This did not allow one to formalize the blockchain structure, as well as to model and verify it using logical methods. This work introduces a finitely axiomatizable blockchain theory T that defines a class of blockchain structures K using the axioms of the first-order logic. The models of the theory T are well-known blockchain implementations with the proof of work consensus algorithm, including Bitcoin, Ethereum (PoW version), Ethereum Classic, and some others. By utilizing mathematical logic, we can study these models and derive new theorems of the theory T through automatic proofs. Also, the axiomatization of blockchain opens up new opportunities to develop blockchain-based systems that can help solve some of the open problems in the fields of artificial intelligence, robotics, cryptocurrencies, etc.

1. Introduction

The revolutionary technology of blockchain [1] is well known for providing a decentralized and transparent way of managing and maintaining information. Most people associate blockchain with cryptocurrencies such as Bitcoin [2,3,4] and Ethereum [5,6], but it has countless other applications beyond that. One of the most significant potential applications is facilitating the efficient tracking and management of supply chains, especially in fields such as food and pharmaceuticals. The popularity of DeFi [7] further highlights the possibilities of blockchain in finance [8], while governments [9] worldwide are exploring blockchain’s potential from identity verification to tax collection. Smart contracts [10] based on blockchain technology could revolutionize the legal industry by providing secure and transparent mechanisms to create and enforce contracts. Some blockchains are designed exclusively for the internet of things (IoT) [11] as an efficient and secure solution for managing a huge amount of data generated by IoT devices.
Artificial intelligence algorithms have significantly impacted our daily routines as they provide prompt answers mostly by learning quickly on the basis of neural networks [12]. Nevertheless, the limitation of such systems lies in their high error rate, particularly when exposed to new data. Additionally, these systems do not explain their results and thus present a black box problem. The need for transparent and humanized AI algorithms is paramount to gaining trust in artificial intelligence. The focus now is on explainable artificial intelligence (XAI) [13] using hybrid methods with neural networks and high-level logic programming languages (such as L [14] and L [15]) that provide clear execution logic, to ensure accurate results and logical explanations. To protect these programs from code alterations and breaches, blockchain structures [16] secured through consensus algorithms are required. It is imperative to employ operational decentralized blockchain implementations such as Ethereum and Bitcoin, and also express these structures mathematically with axioms for further mathematical analysis, enhancement, and protection.
Attempts to axiomatize the blockchain have been made for a long time. One of the first works in this direction was the work [17], in which a blockchain structure of a special type was defined, and a system of axioms was set using modal operators of non-classical logic. However, it was the simplest structure, not connected in any way with efficient systems such as Bitcoin and Ethereum (PoW version). These were the first attempts at axiomatization, which gave rise to further study in this direction. Three axioms for decentralized protocols were presented in the work [18]: axiom of Anonymity, axiom of Robustness to Sybil Attacks, and axiom of Robust to Merging. Further, axioms for automated market makers within decentralized environments were proposed in the work [19] but all these works almost did not touch upon the axiomatic nature of real blockchain models used in Bitcoin, Ethereum, and other well-known crypto systems.
The problem of axiomatization of the blockchain theory with the help of the first-order logic remained open. Axiomatization would bridge the gap between logic and computable implementations such as Bitcoin and Ethereum blockchains. Moreover, the formalization of the theory makes it possible to use a unified interpretation of signature symbols to build blockchain libraries in high-level programming languages for modeling and verifying various types of blockchains. As shown in related work Section 6, this is one of the key areas of research today. We offer effective tools to solve these problems.
The axiomatization in the work [20] prompted us to construct an axiomatization of blockchain structures. In the current work, the blockchain theory T is specified using the axioms of the first-order logic. There are several reasons for this. First, most mathematicians work in the terminology of the first-order logic. Second, the main logical results can be transferred here as well. Third, with the help of predicate calculus, one can obtain new statements and prove new theorems. Fourth, this theory defines a class of structures K such that T h ( K ) = T . This class will be called the class of blockchain structures.
The paper is structured as follows. Section 2 gives the basic definitions related to the blockchain, and also presents various consensus algorithms. Section 3 is devoted to the axiomatization of the blockchain theory. This section defines blockchain theory T and gives a list of axioms using first-order logical formulas. It also defines the concept of a class of blockchain structures K . Section 4 shows that the Bitcoin blockchain and the Ethereum blockchain are models of our theory T . Section 5 proves the complete or partial independence of most axioms of our theory. Section 6 describes related works and the potential application of the blockchain axiomatization to them. Section 7 discusses the perspectives and applications of our research. Section 8 is the conclusion.

2. Blockchain Basics

Since many different types of blockchain have appeared [21] in the world over the past 15 years, in this work, by blockchain we mean a special tree of blocks that are interconnected using cryptographic hashes. Each block of this special tree contains a cryptographic hash of the previous block, transaction data (generally represented as a Merkle tree [22,23], where data nodes are represented by leaves), a timestamp, etc. [24]. In this special tree, with the help of some computable procedure, we can select the “true” blockchain (a chain or subtree of blocks with only approved transactions). In the case of Bitcoin, the blockchain coincides with the longest chain of blocks (“true” blockchain) in the tree of blocks. In the case of Ethereum, the blockchain also contains ommer blocks (Figure 1, more details in the works [25,26,27]) that are not part of the “true” blockchain, but play a key role in the selection of blocks with approved transactions.
Since we have a computable selection procedure for choosing the “true” subtree of blocks, we have some consensus algorithm which has been fixed on the choice of a subtree in the tree of blocks. This consensus can be reached using various algorithms such as: Proof of Work (PoW) [2], Proof of Stake (PoS) [6], Proof of Activity (PoA) [28], etc. This work deals only with the blockchain structures using the PoW consensus algorithm. Moreover, almost all leading cryptocurrency projects, such as Bitcoin, Ethereum (PoW version), Ethereum Classic, and others use a PoW consensus algorithm. All blocks in the tree of blocks are related to each other using a sequence of computable relations that establishes a relationship between two blocks. There is some computable procedure for adding a new block to the tree of blocks. In addition, there is some computable procedure for comparing two trees of blocks in terms of complexity, and so on. All necessary operations and relationships for blockchain structures will be defined below.
Figure 2 shows different options for building a blockchain on a tree of blocks depending on the definition of the blockchain operation:
The main chain according to GHOST (or Greedy Heaviest Observed Sub-Tree) [29]: the longest branch of blocks is inductively chosen so that at the i + 1 -th step, the block b i + 1 lies in the most branching subtree with the root being the block b i .
The main chain is selected according to the “longest” rule: the “longest” branch in the tree of blocks is selected.
As can be seen from Figure 2, the GHOST algorithm is sometimes more preferable to the “longest” rule algorithm. There are other blockchain selection algorithms, so we are going to build a single blockchain theory that covers all these situations.

3. Blockchain Axiomatization

In the blockchain theory, there are two main concepts: blocks and trees of blocks. Variables for blocks will be denoted as x, y, z, etc. By default, we assume that in the axioms where such variables are presented, the B l o c k predicate is true for them. Variables for the trees of blocks will be denoted as T, T 1 , …, T n . We also assume that in all axioms, the predicate T r e e 0 is true for these variables. Additionally, all trees of blocks will have one common root (genesis block), which will be given by the constant symbol 0.
Let σ be the final signature of the following form:
σ = { 0 , T r e e 0 ( 1 ) , B l o c k ( 1 ) , B ( 1 ) , B C ( 1 ) , T ( 3 ) , t ( 2 ) , ( 2 ) , ( 3 ) , P ( 3 ) , a d d ( 3 ) }
In the following chapters, it will be shown that the interpretation of signature symbols for models of the blockchain theory can be very different. However, in most cases, signature symbols “intuitively” define the following:
  • B—function that builds a blockchain from a tree of blocks T.
  • B C —function that builds a “true” blockchain from a blockchain B ( T ) .
  • x t T —binary relation of membership of block x in the tree of blocks T.
  • P ( T , x , y ) —parent relationship, which verifies that the block x is the parent for the block y relative to the tree of blocks T. Note that the relation P ( T , x , y ) can also be true if the block y t T .
  • a d d ( T , x , y ) —function that adds the child block y to block x in the tree of blocks T.
  • ( T , x , y ) —operation of finding the greatest lower block for blocks x and y in the tree of blocks T.
  • 0—constant symbol highlighting the genesis block.
  • T —linear preorder on trees of blocks.
  • ≡—equivalence relation on blocks.
The equality = is understood as a character-by-character comparison of two elements from the main set of the model.
Let us introduce the following notation:
  • b ( T , x , y ) : ( T , x , y ) = x
  • = b ( T , x , y ) : b ( T , x , y ) & b ( T , y , x )
  • T 1 = T T 2 : ( T 1 T T 2 ) & ( T 2 T T 1 )

3.1. Blockchain Axioms

Axioms of Blockchain Theory T
  • Blockchain axiom 1: B ( B ( T ) ) = B ( T )
  • Blockchain axiom 2: x t B ( T ) x t T
  • Blockchain axiom 3: T r e e 0 ( B ( T ) )
  • Blockchain axiom 4: x t B C ( B ( T ) ) x t B ( T )
  • Blockchain axiom 5: T r e e 0 ( B C ( B ( T ) ) )
  • Equiv axiom 1: x x
  • Equiv axiom 2: x y y x
  • Equiv axiom 3: ( x y ) & ( y z ) ( x z )
  • Order axiom 1: T T T
  • Order axiom 2: ( T 1 T T 2 ) ( T 2 T T 1 )
  • Order axiom 3: ( T 1 T T 2 ) & ( T 2 T T 3 ) T 1 T T 3
  • Order axiom 4: x t T 1 y ( a d d ( T 1 , x , y ) = T 2 ) T 1 T T 2
  • Zero axiom 1: 0 t T
  • Zero axiom 2: x t T b ( T , 0 , x )
  • Boundary axiom 1: x , y t T ( T , x , y ) = ( T , y , x )
  • Boundary axiom 2: x , y , z t T ( T , ( T , x , y ) , z ) = ( T , x , ( T , y , z ) )
  • Boundary axiom 3: x t T ( T , x , x ) = x
  • Boundary axiom 4: x , y , z t T b ( T , ( T , x , y ) , ( T , y , z ) ) ( T , x , y ) = ( T , x , z )
  • Boundary axiom 5: x , y t T B l o c k ( ( T , x , y ) ) & ( ( T , x , y ) t T )
  • Generation axiom 1:
    x t T 1 y T 2 P ( T 1 , x , y ) & ( z t T 1 z ¬ y ) ( a d d ( T 1 , x , y ) = T 2 & y t T 2 ) & P ( T 2 , x , y ) & & ( z z t T 1 ( z t T 2 ) & ( z y ) ) & ( z , t t T 1 b ( T 1 , z , t ) b ( T 2 , z , t ) )
  • Generation axiom 2:
    T 1 x , y t T 2 P ( T 2 , x , y ) & ( ¬ z t T 2 ( z y ) & b ( T 2 , y , z ) ) ( a d d ( T 1 , x , y ) = T 2 ) & P ( T 1 , x , y ) & ( x t T 1 ) & ( y t T 1 ) & & ( z z t T 1 ( z t T 2 ) & ( z y ) ) & ( z , t t T 1 b ( T 1 , z , t ) b ( T 2 , z , t ) )
  • Parent axiom:
    x , y t T P ( T , x , y ) ( x y ) & b ( T , x , y ) & & ( ¬ z t T b ( T , x , z ) & b ( T , z , y ) & ( x z ) & ( z y ) )
  • Identity axiom 1: x , y t T = b ( T , x , y ) x = y
  • Identity axiom 2: x , y t T x = y x y

3.2. Blockchain Axioms: Some Informal Remarks

Blockchain axiom 1 says that once a blockchain B ( T ) is built for a tree T, then the next application of function B to B ( T ) will produce the same blockchain.
Blockchain axiom 2 says that all the blocks that lie in the blockchain B ( T ) lie in the tree T.
Blockchain axiom 3 says that the result of applying the function B to the tree T is the tree.
Blockchain axiom 4 says that all the blocks that lie in the “true” blockchain B C ( B ( T ) ) lie in the blockchain B ( T ) .
Blockchain axiom 5 says that the “true” blockchain B C ( B ( T ) ) is a tree.
Order axiom 4 states that for any two trees T 1 and T 2 where T 2 is obtained from T 1 using the addition operation a d d ( T 1 , x , y ) for block x T 1 and some block y: the complexity of tree T 1 does not exceed the complexity T 2 .
Boundary axioms 1–5 define a tree structure for model elements using the operation ∧.
Generation axiom 1 (the axiom of building a larger tree) says that for every tree T 1 , every block x of T 1 , and every block y is not from T 1 if a number of conditions in Generation axiom 1 are met, then there is a tree T 2 that contains only the blocks of the tree T 1 , as well as the block y.
Generation axiom 2 (the axiom of building a smaller tree) informally states that for every tree T 2 and any leaf block y in T 2 , it is possible to construct a smaller tree T 1 that does not contain block y, such that tree T 2 contains only those blocks that are in T 1 as well as block y.
Parent axiom says that in any tree T and for any blocks x , y from T, the relation P ( T , x , y ) is true if and only if b ( T , x , y ) for x y and there is no block z lying between them with respect to b .

3.3. Axiomatizable Class of Blockchain Structures

Denote by T the theory given by the axioms of the blockchain described above. This theory T of signature σ defines a class of structures K of signature σ for which T h ( K ) = T will be satisfied. The class K is referred to as a class of blockchain structures. Therefore, any structure < M , σ > from K is referred to as a blockchain structure. Moreover, any structure < B , σ σ > for some finite signature σ is referred to as a blockchain structure if the structure < B , σ > K .

4. Models of Blockchain Theory T

In this section, we will show that the theory T is consistent. To show this, we will build step by step the model < B , σ > of the theory T , which is a computably isomorphic real copy of the bitcoin blockchain model [2] where the longest branch in the block tree specifies the blockchain (Figure 3) and the “true” blockchain is exactly this blockchain.
Then, using the model < B , σ >, we will construct a model < G , σ > of the theory T , in which the operation B will be implemented according to the algorithm G H O S T (Figure 2).
Let Σ be some finite alphabet and the set M Σ . Let us describe the hereditarily finite list model < B , σ > with the following elements: M H W ( M ) , where H W ( M ) is the set of hereditarily finite lists, defined inductively with the help of elements of the set M (more details in the work [30]).
In this model, using the predicates Block and Tree 0 , two kinds of list elements will be distinguished: blocks and trees of blocks (consisting of a finite number of blocks). The block b, as shown in Figure 4, consists of a finite set of name:value; therefore, the block code has the following form:
[ b ] : < < B l o c k h e i g h t , h b > , < B l o c k s i z e , s b > , >
Trees of blocks will also be stored as lists, which are defined inductively as follows: Base of Induction: the tree T consists of one block b, then its list code will be < [ b ] > .
Step of induction: if the tree T with the root b consists of more than one block, and T 1 , , T n are all various subtrees listed from left to right, whose roots are directly connected to the root block b of the tree T. Then, the code of the tree T has the following form:
[ T ] : < [ b ] , [ T 1 ] , , [ T n ] >
Remark 1. 
Everywhere below, by blocks and trees of blocks, we will mean their list codes, so we will omit the square brackets for these elements.
The interpretation of the signature symbols in the model < B , σ > is as follows:
  • The predicate Block selects those and only those list elements that have the form (2):
  • The value of the parameter Block hash is obtained as the value of the standard hash function f [31] for Bitcoin, which is shown in Figure 5:
  • The number of zeros at the beginning of each hash must be consistent with the current block difficulty
  • Merkle hash [22] for transactions list in the block must match the parameter hashMerkleRoot.
  • The constant symbol 0 highlights the genesis block [32] in the Bitcoin blockchain with the following parameter and the value:
    Block hash : 000000000019 d 6689 c 085 ae 165831 e 934 ff 763 ae 46 a 2 a 6 c 172 b 3 f 1 b 60 a 8 ce 26 f
  • The predicate T r e e 0 checks the correctness and consistency of all blocks in T:
    -
    The root of the tree must be a genesis block.
    -
    The tree is checked for the correctness of the list code (3).
    -
    The tree is checked for equivalent blocks.
    -
    The complexity of each block must satisfy the following formula [33]:
    n e w D i f f u c u l t y = o l d D i f f i c u l t y 20 , 160 t
    The difficulty is recalculated on each block with the parameter Block height equal to n, where n 1 is a multiple of 2016, t is the time in minutes spent getting the last 2016 blocks.
    -
    The tree is checked for consistency of the Block hash and hashPrevBlock parameters with the tree structure, where the child block must immediately follow the parent block.
    -
    All blocks in the tree T, all addresses, transactions, amounts, signatures, and public keys must be agreed upon.
  • The value of the operation B ( T ) is the first leftmost longest branch found in the tree T.
  • The function B C is defined as follows: B C ( B ( T ) ) = B ( T ) (“true” blockchain is equal to blockchain).
  • The binary relation T 1 T T 2 is true if the length of the blockchain B ( T 1 ) does not exceed the length of the blockchain B ( T 2 ) .
  • The membership relation t of block b in the tree T is true if the list code of the block b is included in the list code of the tree T as an element participating in the construction of this list code of the tree T.
  • An equivalence relation ≡ on blocks is true if the hashes of blocks are the same.
  • The operation a d d ( T , x , y ) of adding a block y to the block x in the tree T is uniquely defined. Without loss of generality, we assume that the operation is defined as follows: a new block y is added to the list code of the block x as the rightmost child if the result of this operation is a new tree for which the formula T r e e 0 ( a d d ( T , x , y ) ) is true, else a d d ( T , x , y ) = T .
  • The predicate P ( T , a , b ) is implemented using the following algorithm:
    -
    If a , b t T , the predicate P ( T , a , b ) is true if and only if the block b immediately follows the block a in the tree T.
    -
    If a block a t T and a block b t T , then the following should hold:
    B P ( T , a , b ) B T r e e 0 ( a d d ( T , a , b ) )
  • The operation of the greatest lower block ( T , x , y ) is defined as standard [20]. The result of the operation ( T , x , y ) where x , y t T is the such block z, which is the greatest lower block for blocks of x and y by relation b in the tree of blocks T.
Theorem 1. 
< B , σ > is a model of the theory T .
Proof. 
Let us show that in < B , σ > all axioms of the theory T are satisfied.
Blockchain axioms 1–5 are satisfied by construction.
Equiv axioms 1–3 are satisfied: blocks are considered equivalent if their hashes coincide.
Order axioms 1–3 are satisfied by construction.
Order axiom 4 follows from the interpretation of the relation T that the length of B ( T 1 ) does not exceed the length of B ( T 2 ) . Hence, T 1 T T 2 .
Zero axioms 1–2 are satisfied due to the interpretation of the ∧ operation.
Boundary axioms 1–5 are satisfied by construction.
Generation axiom 1 is satisfied due to the given interpretations of the signature symbols on the model < B , σ >.
Generation axiom 2 is satisfied due to the given interpretations of the signature symbols on the model < B , σ >.
Obviously, the Parent axiom, given the above interpretation of the signature symbols, is satisfied on the model < B , σ >.
Identity axioms 1–2 are satisfied by definition of the = b , = and ≡ relations.
Thus, all the axioms are satisfied, which means that the theory T is satisfied on the model < B , σ >.   □
Let the model < G , σ > be obtained from < B , σ > as a result of redefining the operations B and B C , and all other interpretations of signature symbols remain unchanged. The operation B is specified via the G H O S T algorithm (returns the heaviest subtree). The operation B C produces the longest branch (“true” blockchain) in the heaviest subtree B ( T ) .
Corollary 1. 
The theory T is satisfiable in the model < G , σ >.
Proof. 
The operations B and B C only appear in Blockchain axioms 1–5. Due to the fact that the interpretations of the remaining signature symbols remained unchanged, all other axioms are satisfied in < G , σ >.
Blockchain axioms 1–5 are also satisfied by construction.   □
Consider the model < ETH , σ > that is a computably isomorphic copy of Ethereum blockchain (PoW version). This model is built similarly to the model < B , σ >, but with its own parameters that satisfy the ethereum blockchain properties: hash functions, block generation time, block structure, smart contracts, ommer blocks, etc.
Similarly, we can build the model < ETC , σ > for Ethereum Classic blockchain.
Corollary 2. 
< ETH , σ > is a model of the theory T .
Proof. 
The main difference between Ethereum blockchain and Bitcoin blockchain is the definition of blockchain operations B and B C .
In the model < B , σ > these operations output the longest branch of the tree, but in the model < ETH , σ > operation B outputs the subtree with ommer blocks (Figure 1) and operation B C outputs the heaviest chain in this subtree.
By construction, we get that the theory T is satisfiable in the model < G , σ >.   □
Corollary 3. 
< ETC , σ > is a model of the theory T .
Proof. 
The proof of this statement completely coincides with the proof of Corollary 2.   □

5. Independence of the Axioms of the Theory T

In this section, for some axioms of the theory T , we will show their complete or partial independence. Due to the fact that in the model < B , σ > all axioms of our theory T are satisfied, then to prove the independence of one or another axiom, we will take its negation and build an appropriate model using the model < B , σ > as a basic one, in which we will change the interpretation of some signature symbols. If all the remaining axioms and the negation of the basic axiom are satisfied in the constructed model, then the independence will follow.
Lemma 1. 
Blockchain axiom 1 is independent.
Proof. 
Using the model < B , σ >, we construct the model < B ¬ b l a 1 , σ >. Below, we redefine the interpretation of some signature symbols in the model < B , σ >.
The relation B is defined as follows:
  • If the tree T has incomparable blocks with respect to b , then B ( T ) will return the first longest branch of T.
  • If the tree T consists of a single block, then B ( T ) = T .
  • If all blocks in the tree T are comparable with each other with respect to b and the number of blocks in the tree T is greater than one, then B ( T ) will produce this tree without a maximum element with respect to b .
The interpretations of the rest of the signature symbols will be exactly the same as in the model < B , σ >.
Let us show that the negation of Blockchain axiom 1 is satisfied on the model < B ¬ b l a 1 , σ >:
B ¬ b l a 1 T B ( B ( T ) ) B ( T )
The expression (6) will be true if T is any tree with the number of blocks greater than 2.
Blockchain axioms 2–5 are satisfied by construction.
The remaining axioms of the theory T are satisfied because the relation B does not participate in them.   □
Lemma 2. 
Blockchain axiom 2 is independent.
Proof. 
As before, we build the model < B ¬ b l a 2 , σ > using the model < B , σ >.
Let us change the block condition in the predicate T r e e 0 by removing the check for the parameter Block hash on the number of leading zeros. Now, it is not necessary to require the number of zeros at the beginning of Block hash depending on the value of the parameter Diffuculty.
Let n 0 be some natural number. Since all trees of blocks in the main set of the model < B ¬ b l a 2 , σ > have a finite number of blocks, we define operation B as follows:
  • Find the first longest branch in the tree T.
  • Find a leaf element in this branch.
  • Replace the value Nonce in this block with n 0 .
  • Find the new value Block hash for this element using the hash function f.
  • If there was no block with this name in the tree T, then we replace this block with a block with new parameters Nonce and Block hash, otherwise we leave the leaf element unchanged.
It is clear that with this interpretation, taking into account the hashing width of the hash function f, there will be a tree T for which the negation of Blockchain axiom 2 will be satisfied.
All other signature symbols will be interpreted in the same way as in the model < B , σ >. Changing the requirement for the number of leading zeros in the Block Hash does not affect the remaining axioms in any way. Therefore, all remaining axioms will be satisfied in < B ¬ b l a 2 , σ >.   □
Lemma 3. 
Blockchain axiom 3 is independent.
Proof. 
As before, we build the model < B ¬ b l a 3 , σ > using the model < B , σ >.
The function B ( T ) of the new model for the tree T is defined through the function B ( T ) in the model < B , σ >, where the final value is obtained by replacing the largest element with zero block 0.
The function B C is defined as a constant function, and its value will be the subtree with only zero block 0.
Now, we can easily check the satisfiability of all the remaining axioms of the blockchain. In this case, the negation of Blockchain axiom 3 will be satisfied.   □
Lemma 4. 
Blockchain axiom 4 is independent.
Proof. 
To prove this statement, it suffices to define the value of the function B C as a tree consisting of two elements of the zero block 0 and a new block, which was not in the tree T.   □
Lemma 5. 
Blockchain axiom 5 is independent.
Proof. 
Let the function B C replace the zero block 0 in the tree B ( T ) with some other block.   □
Lemma 6. 
Order axiom 4 is independent.
Proof. 
To prove this lemma, it suffices to define the relation T in the new model < B ¬ o a 4 , σ > as follows:
T 1 T T 2 | B ( T 1 ) | | B ( T 2 ) |
where | B ( T ) | —the number of blocks in the blockchain B ( T ) .
If the rest of the signature symbols are interpreted as in the model < B , σ >, then in this case in the model < B ¬ o a 4 , σ > all the axioms of the blockchain theory T will be satisfied, except for Order axiom 4. Instead, the negation of its negation will be satisfied.   □
The axioms of Generation 1–2 and Parent axiom depend very strongly on each other and are quite large, so we will show that each of them is independent with respect to the set of axioms, which is obtained from the set of axioms S of the theory T as a result of deleting the axioms of Generation 1–2 and Parent axiom. Denote the new set as S G .
Lemma 7. 
Generation Axiom 1 is independent with respect to the set of axioms S G .
Proof. 
Let us build the < B G , σ > model using the model < B , σ >.
In this model, all axioms from the S G set will be satisfied, as well as the negation of the Generation Axiom 1 axiom, which has the following form:
T 1 x t T 1 y T 2 P ( T 1 , x , y ) & ( z t T 1 z ¬ y ) & & ( ¬ ( a d d ( T 1 , x , y ) = T 2 & y t T 2 ) ¬ P ( T 2 , x , y ) ¬ ( z z t T 1 ( z t T 2 ) & ( z y ) ) ¬ ( z , t t T 1 b ( T 1 , z , t ) b ( T 2 , z , t ) ) )
The predicate T r e e 0 will be redefined in the same way as in Lemma 2, removing the check of the parameter Block hash for the number of leading zeros in the tree of blocks.
We define the relation P ( T 1 , x , y ) as follows:
  • x , y t T 1 —the truth of this relation remains the same as in the model < B , σ >
  • x t T 1 , y t T 1 —the truth of this relation will be given as follows:
    -
    check the possibility of adding block y as in < B , σ >.
    -
    checks the additional possibility of adding block t as a child block to y with an empty set of transactions. The parameter Nonce in the block t contains the smallest natural number such that the parameter Hash block of the block t does not coincide with the hash of any block from the tree T 1 or with the hash of the block y.
We define the operation a d d ( T 1 , x , y ) as follows:
  • if the relation P ( T 1 , x , y ) is true and y not in T 1 , then the result of the function a d d ( T 1 , x , y ) for y not in T 1 is a tree T 2 , where in the tree T 1 the block y is added to the block x, and the block t is added to the block y.
The negation of Generation Axiom 1 will be satisfied by construction, due to the fact that if there is some tree T 2 where a d d ( T 1 , x , y ) equals T 2 and y not in T 1 then in T 2 addition to y, there is also a block t not from T 1 .   □
Lemma 8. 
Generation Axiom 2 is independent with respect to the set of axioms S { G } .
Proof. 
Let us show that if we take the constructed model < B G , σ > from the proof in Lemma 7 then the negation of Generation Axiom 2 will be satisfied.
Informally, Generation axiom 2 says that for any tree T 2 with n vertices where n 1 there exists a tree T 1 with n 1 vertices and blocks x , y T 2 such that a d d ( T 1 , x , y ) = T 2 .
Take the negation of Generation Axiom 2:
T 2 T 1 x , y t T 2 P ( T 2 , x , y ) & & ( ¬ z t T 2 ( z y ) & b ( T 2 , y , z ) ) & & ( ¬ ( a d d ( T 1 , x , y ) = T 2 ) ¬ P ( T 1 , x , y ) ¬ ( x t T 1 ) ¬ ( y t T 1 ) ¬ ( z z t T 1 ( z t T 2 ) & ( z y ) ) ¬ ( z , t t T 1 b ( T 1 , z , t ) b ( T 2 , z , t ) ) )
Taking into account the interpretation of the relation P and the operation a d d in the model < B G , σ >, we construct a tree T 2 that satisfies the negation of Generation Axiom 2.
Let us take a tree T 2 consisting of two nodes: the genesis block and the block referring to it. For this tree, taking into account the interpretation of the operation a d d with an additional block t the negation of Generation axiom 2 is satisfied. The remaining axioms from the set S G are also satisfied. □
Lemma 9. 
Parent Axiom is independent with respect to the set of axioms S { G } .
Proof. 
The independence of Parent axiom comes from the fact that there are no more axioms in S { G } with the relation P. Therefore, the relation P can be defined in any way. Including so that the negation of Parent axiom will be satisfied and all other axioms S { G } are satisfied. □

6. Related Works and Axiomatization Capabilities

Today, there are so many works on blockchain technology and so few on its axiomatization. Therefore, it makes sense to consider related works on the topic of blockchain, multi-party blockchain-based systems, consensus algorithms, smart contracts, and protocols. Let us start with the work [34] on modeling multi-party blockchain-based systems. The authors present two schemes for modeling such systems using logical transitions on their diagrams, which make it possible to better understand the advantages of blockchain over other data storage and processing solutions. Also note that these schemes do not fully describe all types of blockchains. From the point of view of modeling, in our work, blockchain axioms can be viewed as abstract modeling in which the main properties of the blockchain are revealed. Without an explicit analysis of these properties, it is not always clear what role blockchain plays in multi-party blockchain-based systems.
In work [35], the authors present a way to build a rolling blockchain as a viable alternative to the classic one. Rolling blockchain solves the problem of scalability by reducing the amount of information stored in the blockchain. In our opinion, the axiomatization of the rolling blockchain using first-order logic formulas would also help to more clearly see the possibilities of this technology and its security and scalability.
In work [36], with the help of logical programs of a special language based on logical rules, the bytecode is split into blocks, which allows us to control the computational costs and other parameters of the execution of smart contracts on the Ethereum Virtual Machine. Modeling the smart contract implementation as well as the blockchain behavior using a BIP (Behavior Interaction Priorities) framework based on finite state automata is presented in work [37]. Paper [38] presents the blockchain simulator SIMBA, which is based on open source and allows us to test already developed blockchains.
In paper [39], the authors explore the main PoW blockchains and how they affect the reliability of systems built on top of them. First of all, they include issues of the availability of functions that such systems need and properties that cause their negative consequences. The issues of reducing the number of unconfirmed transactions in blockchains such as Bitcoin and Ethereum are also being explored. We would like to note that there would be fewer problems if the logic for adding such transactions were correctly described. Therefore, the correct construction of the theory and its further axiomatics are also important in these directions.
The next two papers [40,41] are similar in their subject matter. In the first one, the model-based formalization is presented for the blockchain protocol by SDL formalism of Telegonic Tau. In the second, smart contracts are verified where finite automata simulate the smart contract execution. Both in the first and second case, mathematical methods are used for formalization and verification. Moreover, verification using finite automata can be transferred to the language of logic since there is an axiomatization [42,43] of the theory of finite automata.
The following paper [44] explores the application of a model-checking approach to Ethereum blockchain applications based on smart contracts. They used model-checking to check whether a smart contract conforms to its specification. Just like in that work, the blockchain axioms presented in our work are a kind of verification for those blockchain structures that are being created. Moreover, with the help of axioms, it is easy to check the correctness of the given basic operations and relations.
Works on formal modeling and verification [45,46,47,48] as well as stochastic modeling [49,50] use various methods based on mathematical approaches. More and more works are coming out on the topic of describing the blockchain and other ledgers using already known mathematical theories such as the category theory [51], the group theory [52], and others. However, any mathematical theory is based on axioms, so we can try to apply the axiomatic approach. Our approach naturally extends this line of research. It also helps to better understand the relationship between other mathematical theories and the blockchain theory.

7. Discussion

The axiomatization of blockchain theory opens up new perspectives in the study of the computational complexity of blockchain structures and the identification of new properties and methods. The independence of some axioms of this theory gives an understanding of the key properties of the blockchain. The constructed models of the blockchain theory T show that this theory is consistent and can be developed further. This research focuses on the study of models with PoW consensus algorithms, but these approaches can be used for models with other consensus algorithms such as PoS and PoA.
Approaches and methods for modeling and formalizing blockchains, smart contracts, and other blockchain-based systems described in related works can be considered from the point of view of the axiomatization of such structures in the first-order logic. Axioms help us understand what types of structures we work with, what properties they have, and what methods and approaches to use for modeling and verification. Moreover, the axioms define the skeleton of these structures. This makes it easy to translate these structures into other environments. This is important because most of the related work uses mostly graphical interpreters in which transitions are specified using the simplest logical rules, but this is clearly not enough.
We would especially like to highlight the possibility of applying logic and axioms to the creation of smart contracts that work on blockchain structures. We have already developed a p-complete logical object-oriented programming language L for creating smart contracts. We have developed a virtual machine to execute them. Blockchain axiomatics allows us to create special blockchain libraries for our language and apply ready-made solutions in such areas as artificial intelligence, finance, swarm intelligence, etc.
In this section, we will also discuss such structures as multi-blockchains. Multi-blockchains are a revolutionary development in the world of blockchain technology that has various applications in different industries such as finance, healthcare, and supply chain management. Multi-blockchains utilize multiple blockchain networks to create a more scalable, secure, and efficient solution. They can be used to streamline processes, reduce transaction costs, and improve data privacy. In order to provide a formal and precise description of the properties of multi-blockchains, axiomatization in the first-order logics is necessary. Axiomatization enables the formulation of precise, rigorous, and unambiguous statements about the characteristics and behavior of multi-blockchains, providing a clear understanding of their potential benefits and limitations. This approach can help facilitate the development and deployment of multi-blockchain systems, paving the way for a more innovative and reliable technological landscape.

8. Conclusions

In this work, an axiomatization of the blockchain theory has been proposed using the logic of first-order predicates. We have divided all these axioms into groups and shown that most of them are independent. This makes it possible to highlight the key properties of blockchain structures. We have also shown that both Bitcoin blockchain and Ethereum blockchain are models of our theory. We have also studied related works by other authors and the possibility of applying our results in them. Many of these works are based on mathematical concepts and theories, which have their own axiomatics as well.
Axiomatization made it possible to clearly define the concept of a blockchain structure, which allows modeling and verification of such structures to be used. It also allows enriching the theory with new axioms and creating new types of data storage. Moreover, signature operations and relations clearly define the structure of libraries for creating high-level libraries for their further use in various blockchain-based systems. This has opened up new possibilities for creating innovative solutions that can help address some of the most pressing challenges of our time. We hope that the axiomatization of blockchain in first-order logic marks a significant milestone in the evolution of blockchain technology, and its impact is likely to be felt for many years to come.
Overall, the future use of blockchain technology in AI, robotics, DeFi, IoT, chipping, medicine, logistics, space industry, and other areas is set to bring significant benefits. These benefits will include increased efficiency, transparency, security, and cost-effectiveness. The future is bright for the integration of blockchain, and it is expected to transform different sectors. In some cases, blockchain technology becomes critical. For example, as artificial intelligence systems continue to evolve and mature, there is a growing concern that they may eventually go beyond the limits set by their developers. This could lead to unintended consequences, ranging from minor glitches to catastrophic failures that could put lives at risk. To prevent this, some experts are calling for the use of blockchain technology as a controlling authority. By leveraging the transparency and immutability of the blockchain, developers and regulators can work together to establish clear rules and parameters for AI systems. These rules can be encoded into the blockchain, creating a tamper-proof record of the system’s behavior. In this way, the blockchain can help ensure that AI systems operate within safe and ethical boundaries, giving us greater confidence in their continued development and deployment.

Author Contributions

Conceptualization, S.G. and A.N.; methodology, S.G. and A.N.; formal analysis, S.G.; validation, S.G.; investigation, S.G. and A.N.; writing—original draft preparation, A.N.; writing—review and editing, A.N.; supervision, S.G.; project administration, S.G.; software, A.N. All authors have read and agreed to the published version of the manuscript.

Funding

The work was performed within the state task of the Sobolev Institute of Mathematics (project No. FWNF-2022-0011). This research received no external funding.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Singhal, B.; Dhameja, G.; Panda, P. Beginning Blockchain; Apress: New York, NY, USA, 2018; 386p, ISBN 978-1-4842-3444-0. [Google Scholar]
  2. Nacamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. 2008. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 25 March 2023).
  3. Narayanan, A.; Bonneau, J.; Felten, E.; Miller, A.; Goldfeder, S.; Clark, J. Bitcoin and Cryptocurrency Technologies; Princeton University Press: Princeton, NJ, USA, 2016; 336p, ISBN 978-0-6911-7169-2. [Google Scholar]
  4. Henrique, C. A Complete Decoding of the Bitcoin Block. 2021. Available online: https://levelup.gitconnected.com/a-complete-decoding-of-the-bitcoin-block-578904267142 (accessed on 25 March 2023).
  5. Buterin, V. Ethereum: A Next-Generation Smart Contract and Decentralized Application Platform. 2014. Available online: https://ethereum.org/669c9e2e2027310b6b3cdce6e1c52962/Ethereum_Whitepaper_-_Buterin_2014.pdf (accessed on 1 June 2023).
  6. Ethereum.org. Proof-of-Stake (PoS). Available online: https://ethereum.org/en/developers/docs/consensus-mechanisms/pos/ (accessed on 4 April 2023).
  7. Zetzsche, D.A.; Arner, D.W.; Buckley, R.P. Decentralized Finance (DeFi). J. Financ. Regul. 2020, 6, 172–203. [Google Scholar] [CrossRef]
  8. Jurgelaitis, M.; Drungilas, V.; Ceponiene, L.; Butkiene, R.; Vaiciukynas, E. Modelling principles for blockchain-based implementation of business or scientific processes. In Proceedings of the International Conference on Information Technology, Shanghai, China, 20–23 December 2019. [Google Scholar]
  9. Lykidis, I.; Drosatos, G.; Rantos, K. The Use of Blockchain Technology in e-Government Services. Computers 2021, 10, 168. [Google Scholar] [CrossRef]
  10. Zakrzewski, J. Towards Verification of Ethereum Smart Contracts: A Formalization of Core of Solidity; Part of the Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2018; Volume 11294. [Google Scholar] [CrossRef]
  11. Kumar, S.; Tiwari, P.; Zymbler, M. Internet of Things is a revolutionary approach for future technology enhancement: A review. J. Big Data 2019, 6, 111. [Google Scholar] [CrossRef] [Green Version]
  12. Goncharov, S.S.; Nechesov, A.V. Polynomial-Computable Representation of Neural Networks in Semantic Programming. J 2023, 6, 48–57. [Google Scholar] [CrossRef]
  13. Xu, F.; Uszkoreit, H.; Du, Y.; Fan, W.; Zhao, D.; Zhu, J. Explainable AI: A Brief Survey on History, Research Areas, Approaches and Challenges; Natural Language Processing and Chinese Computing. NLPCC 2019. Lecture Notes in Computer Science; Springer: Cham, Switzerland, 2019; Volume 11839. [Google Scholar] [CrossRef]
  14. Goncharov, S.S.; Nechesov, A.V. Solution of the problem P = L. Mathematics 2021, 10, 113. [Google Scholar] [CrossRef]
  15. Goncharov, S.S.; Nechesov, A.V. Semantic programming for AI and Robotics. In Proceedings of the IEEE International Multi-Conference on Engineering, Computer and Information Sciences (SIBIRCON), Yekaterinburg, Russia, 11–13 November 2022; pp. 810–815. [Google Scholar] [CrossRef]
  16. Nechesov, A.V. Blockchain Structures and Smart Contracts in Semantic Programming. In Proceedings of the International Conference “Maltsev Readings 2022”, Novosibirsk, Russia, 14–18 November 2022; p. 210. [Google Scholar]
  17. Brünnler, K.; Flumini, D.; Studer, T. A logic of blockchain updates. J. Log. Comput. 2020, 30, 1469–1485. [Google Scholar] [CrossRef]
  18. Leshno, J.D.; Strack, P. Bitcoin: An Axiomatic Approach and an Impossibility Theorem. Am. Econ. Rev. Insights 2020, 2, 269–286. [Google Scholar] [CrossRef]
  19. Bichuch, M.; Feinstein, Z. Axioms for Automated Market Makers: A Mathematical Framework in FinTech and Decentralized Finance. arXiv 2022, arXiv:2210.01227. [Google Scholar] [CrossRef]
  20. Reed, R.C. A decidable Ehrenfeucht theory with exactly two hyperarithmetic models. Ann. Pure Appl. Log. 1991, 53, 135–168. [Google Scholar] [CrossRef] [Green Version]
  21. Sultan, K.; Ruhi, U.; Lakhani, R. Conceptualizing Blockchains: Characteristics & Applications In Proceedings of the 11th IADIS International Conference on Information Systems, Lisbon, Portugal, 14–16 April 2018.
  22. Majeed, A.; Ahmad, A.; Doss, R. Malicious Node Traceback in Opportunistic Networks Using Merkle Trees. In Proceedings of the IEEE International Conference on Data Science and Data Intensive Systems, Sydney, Australia, 11–13 December 2015; pp. 147–152. [Google Scholar] [CrossRef]
  23. Lin, I.; Sung, C. An Efficient Source Authentication for Multicast Based on Merkle Hash Tree. In Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Darmstadt, Germany, 15–17 October 2010; pp. 5–8. [Google Scholar] [CrossRef]
  24. Blockchain. Wikipedia. Available online: https://en.wikipedia.org/wiki/Blockchain (accessed on 15 May 2023).
  25. Frankenfield, J. What Is an Ommer (Uncle) Block in Cryptocurrency? Investopedia, 31 May 2023. Available online: https://www.investopedia.com/terms/u/uncle-block-cryptocurrency.asp (accessed on 8 May 2023).
  26. Seberino, C. Ethereum Classic Technical Reference. 2020. Available online: https://buildmedia.readthedocs.org/media/pdf/etc-tech-ref/latest/etc-tech-ref.pdf (accessed on 8 May 2023).
  27. Orphan Blocks, Stale Blocks and the GHOST Protocol. 2022. Available online: https://www.minima.global/post/orphan-blocks-stale-blocks-and-the-ghost-protocol (accessed on 25 May 2023).
  28. Bentov, I.; Lee, C.; Mizrahi, A.; Rosenfeld, M. Proof of Activity: Extending Bitcoin’s Proof of Work via Proof of Stake. ACM SIGMETRICS Perform. Eval. Rev. 2014, 42, 34–37. [Google Scholar] [CrossRef]
  29. Sompolinsky, Y.; Zohar, A. Secure High-Rate Transaction Processing in Bitcoin. In Financial Cryptography and Data Security; Springer: Berlin/Heidelberg, Germany, 2015; pp. 507–527. [Google Scholar] [CrossRef]
  30. Goncharov, S.S.; Nechesov, A.V. Polynomial analogue of Gandy’s fixed point theorem. Mathematics 2021, 9, 2102. [Google Scholar] [CrossRef]
  31. Nitsche, N. What Is Bitcoin Mining and How Does It Actually Work? 2020. Available online: https://paymentandbanking.com/what-is-bitcoin-mining-and-how-does-it-actually-work/ (accessed on 10 May 2023).
  32. Bitcoin.it. Available online: https://en.bitcoin.it/wiki/Genesis_block (accessed on 28 April 2023).
  33. Oettler, M. In-Depth Explanation of Bitcoin Mining Difficulty. Blockchain Academy Mittweida. 2021. Available online: https://blockchain-academy.hs-mittweida.de/courses/blockchain-introduction-technical-beginner-to-intermediate/lessons/lesson-14-bitcoin-mining-difficulty/topic/in-depth-explanation-of-bitcoin-mining-difficulty/ (accessed on 10 March 2023).
  34. Lo, S.K.; Staples, M.; Xu, X. Modelling schemes for multi-party blockchain-based systems to support integrity analysis. Blockchain Res. Appl. 2021, 2, 100024. [Google Scholar] [CrossRef]
  35. Dennis, R.; Owenson, G.; Aziz, B. A Temporal Blockchain: A Formal Analysis. In Proceedings of the International Conference on Collaboration Technologies and Systems (CTS), Orlando, FL, USA, 31 October–4 November 2016; pp. 430–437. [Google Scholar] [CrossRef] [Green Version]
  36. Amani, S.; Begel, M.; Bortin, M.; Staples, M. Towards Verifying Ethereum Smart Contract Bytecode in Isabelle/HOL. In Proceedings of the 7th ACM SIGPLAN International Conference on Certified Programs and ProofsJanuary, Los Angeles, CA, USA, 8–9 January 2018; pp. 66–77. [Google Scholar] [CrossRef]
  37. Abdellatif, T.; Brousmiche, K.L. Formal verification of smart contracts based on users and blockchain behaviors models. In Proceedings of the International Conference on New Technologies, Mobility and Security (NTMS), Paris, France, 26–28 February 2018; IEEE: Piscataway, NJ, USA, 2018. [Google Scholar]
  38. Fattahi, S.; Makanju, A.; Fard, A. SIMBA: An Efficient Simulator for Blockchain Applications. In Proceedings of the 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S), Valencia, Spain, 29 June–2 July 2020; pp. 51–52. [Google Scholar] [CrossRef]
  39. Weber, I.; Gramoli, V.; Ponomarev, A.; Staples, M.; Holz, R.; Tran, A.; Rimba, P. On Availability for Blockchain-Based Systems. In Proceedings of the IEEE 36th Symposium on Reliable Distributed Systems (SRDS), Hong Kong, China, 26–29 September 2017. [Google Scholar] [CrossRef]
  40. Bai, X.; Cheng, Z.; Duan, Z.; Hu, K. Formal Modeling and Verification of Smart Contracts. In Proceedings of the 7th International Conference on Software and Computer Applications, Kuantan, Malaysia, 8–10 February 2018; pp. 322–326. [Google Scholar] [CrossRef]
  41. Duan, Z.; Mao, H.; Chen, Z.; Bai, X.; Hu, K.; Talpin, J.-P. Formal Modeling and Verification of Blockchain System. In Proceedings of the 10th International Conference on Computer Modeling and Simulation, Sydney, Australia, 8–10 January 2018; pp. 231–235. [Google Scholar] [CrossRef]
  42. Esik, Z.; Kuich, W. Equational Axioms for a Theory of Automata; Formal Languages and Applications. Studies in Fuzziness and Soft Computing; Springer: Berlin/Heidelberg, Germany, 2004; Volume 148. [Google Scholar] [CrossRef]
  43. Piedeleu, R.; Zanasi, F. A String Diagrammatic Axiomatisation of Finite-State Automata; Foundations of Software Science and Computation Structures. FOSSACS 2021. Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2021; Volume 12650. [Google Scholar] [CrossRef]
  44. Nehai, Z.; Piriou, P.Y.; Daumas, F. Model-checking of smart contracts. In Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS, Canada, 30 July–3 August 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 980–987. [Google Scholar]
  45. Yang, Z.; Dai, M.; Guo, J. Formal Modeling and Verification of Smart Contracts with Spin. Electronics 2022, 11, 3091. [Google Scholar] [CrossRef]
  46. Tolmach, P.; Li, Y.; Lin, S.; Liu, Y.; Li, Z. A Survey of Smart Contract Formal Specification and Verification. ACM Comput. Surv. (CSUR) 2020, 54, 1–38. [Google Scholar] [CrossRef]
  47. Afzaal, H.; Imran, M.; Janjua, M.; Gochhayat, S. Formal Modeling and Verification of a Blockchain-Based Crowdsourcing Consensus Protocol. IEEE Access 2022, 10, 8163–8183. [Google Scholar] [CrossRef]
  48. Leo, B.; Ghodous, P.; Gelas, J.-P.; Silva, C. Modelling of Decentralised Blockchain Applications Development. In Proceedings of the 2020 International Conference on High Performance Computing & Simulation (HPCS 2020), Barcelone, Spain, 10–14 December 2020; Available online: https://hal.science/hal-03340842 (accessed on 14 January 2023).
  49. Zhang, Z.; Zargham, M.; Preciado, V.M. On modeling blockchain-enabled economic networks as stochastic dynamical systems. Appl. Netw. Sci. 2020, 5, 19. [Google Scholar] [CrossRef] [Green Version]
  50. Bistarelli, S.; Nicola, R.; Galletta, L.; Laneve, C.; Mercanti, I.; Veschetti, A. Stochastic Modelling and Analysis of the Bitcoin Protocol in the Presence of Block Communication Delays. Concurr. Comput. Pract. Exp. 2023, 35, e6749. [Google Scholar] [CrossRef]
  51. Nester, C. A Foundation for Ledger Structures. In Proceedings of the 2nd Tokenomics Conference: On Blockchain Economics, Security and Protocols, Online, 26–27 October 2020; Available online: https://arxiv.org/pdf/2010.08337.pdf (accessed on 7 February 2023).
  52. Zhao, D. Algebraic Structure of Blockchains: A Group-Theoretical Primer. arXiv 2020, arXiv:2002.05973. [Google Scholar]
Figure 1. Ommer blocks (or uncle blocks) in the Ethereum blockchain.
Figure 1. Ommer blocks (or uncle blocks) in the Ethereum blockchain.
Mathematics 11 02966 g001
Figure 2. Longest path or GHOST algorithm.
Figure 2. Longest path or GHOST algorithm.
Mathematics 11 02966 g002
Figure 3. Bitcoin blockchain: the longest branch of the tree of blocks.
Figure 3. Bitcoin blockchain: the longest branch of the tree of blocks.
Mathematics 11 02966 g003
Figure 4. Bitcoin block structure.
Figure 4. Bitcoin block structure.
Mathematics 11 02966 g004
Figure 5. Bitcoin hash function f.
Figure 5. Bitcoin hash function f.
Mathematics 11 02966 g005
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Goncharov, S.; Nechesov, A. Axiomatization of Blockchain Theory. Mathematics 2023, 11, 2966. https://doi.org/10.3390/math11132966

AMA Style

Goncharov S, Nechesov A. Axiomatization of Blockchain Theory. Mathematics. 2023; 11(13):2966. https://doi.org/10.3390/math11132966

Chicago/Turabian Style

Goncharov, Sergey, and Andrey Nechesov. 2023. "Axiomatization of Blockchain Theory" Mathematics 11, no. 13: 2966. https://doi.org/10.3390/math11132966

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop