The Minimum Hybrid Contract (MHC): Combining legal and blockchain smart
contracts
- URL: http://arxiv.org/abs/2002.06850v1
- Date: Mon, 17 Feb 2020 09:19:20 GMT
- Title: The Minimum Hybrid Contract (MHC): Combining legal and blockchain smart
contracts
- Authors: J{\o}rgen Svennevik Notland, Jakob Svennevik Notland, Donn Morrison
- Abstract summary: Corruption through contract fraud is often conducted by withholding and/or altering financial information.
We propose the Minimum Hybrid Contract (MHC), with the aim of 1) auditability, 2) transparency, and 3) immutability to the contract's financial transactions.
Secure peer-to-peer financial transactions, transparency, and cost accounting are automated by the smart contract, and legal issues or disputes are carried out by civil courts.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Corruption is a major global financial problem with billions of dollars
rendered lost or unaccountable annually. Corruption through contract fraud is
often conducted by withholding and/or altering financial information. When such
scandals are investigated by authorities, financial and legal documents are
usually altered to conceal the paper trail.
Smart contracts have emerged in recent years and appear promising for
applications such as legal contracts where transparency is critical and of
public interest. Transparency and auditability are inherent because smart
contracts execute operations on the blockchain, a distributed public ledger.
In this paper, we propose the Minimum Hybrid Contract (MHC), with the aim of
introducing 1) auditability, 2) transparency, and 3) immutability to the
contract's financial transactions. The MHC comprises an online smart contract
and an offline traditional legal contract. where the two are immutably linked.
Secure peer-to-peer financial transactions, transparency, and cost accounting
are automated by the smart contract, and legal issues or disputes are carried
out by civil courts. The reliance on established legal processes facilitates an
appropriate adoption of smart contracts in traditional contracts.
Related papers
- ML Study of MaliciousTransactions in Ethereum [0.0]
This paper presents two successful approaches for detecting malicious contracts.
One uses opcode and relies on GPT2 and the other uses the Solidity source and a LORA fine-tuned CodeLlama.
arXiv Detail & Related papers (2024-08-16T13:50:04Z) - Theorem-Carrying-Transaction: Runtime Certification to Ensure Safety for Smart Contract Transactions [8.32630869646569]
We present a viable technological roadmap for the community toward this ambitious goal.
Our technology, called Theorem-Carrying-Transaction (TCT), combines the benefits of concrete execution and symbolic proofs.
Our prototype incurs a negligible runtime overhead, two orders of magnitude lower than a state-of-the-art approach.
arXiv Detail & Related papers (2024-08-12T20:27:41Z) - A Practical System Architecture for Contract Automation: Design and Uses [0.294944680995069]
We present a refined and extended summary of our work taking key technologies from the blockchain sphere and applying them to the ricardian contract.
Our architecture circumvents the legal issues of blockchains by facilitating an artifact very much alike a traditional contract.
To demonstrate its utility, we also present how it could be used for (1) private data purchasing, (2) treasury management, (3) order-driven manufacturing and (4) automated device on-boarding.
arXiv Detail & Related papers (2024-08-12T12:00:09Z) - Versioned Analysis of Software Quality Indicators and Self-admitted Technical Debt in Ethereum Smart Contracts with Ethstractor [2.052808596154225]
This paper proposes Ethstractor, the first smart contract collection tool for gathering a dataset of versioned smart contracts.
The collected dataset is then used to evaluate the reliability of code metrics as indicators of vulnerabilities in smart contracts.
arXiv Detail & Related papers (2024-07-22T18:27:29Z) - Contractual Reinforcement Learning: Pulling Arms with Invisible Hands [68.77645200579181]
We propose a theoretical framework for aligning economic interests of different stakeholders in the online learning problems through contract design.
For the planning problem, we design an efficient dynamic programming algorithm to determine the optimal contracts against the far-sighted agent.
For the learning problem, we introduce a generic design of no-regret learning algorithms to untangle the challenges from robust design of contracts to the balance of exploration and exploitation.
arXiv Detail & Related papers (2024-07-01T16:53:00Z) - Formally Verifying a Real World Smart Contract [52.30656867727018]
We search for a tool capable of formally verifying a real-world smart contract written in a recent version of Solidity.
In this article, we present our search for a tool capable of formally verifying a real-world smart contract written in a recent version of Solidity.
arXiv Detail & Related papers (2023-07-05T14:30:21Z) - Computable Contracts in the Financial Services Industry [1.713291434132985]
A computable contract is a contract that a computer can read, understand and execute.
We argue that the use of computable contracts in the financial services industry will lead to substantial improvements in customer experience.
arXiv Detail & Related papers (2022-07-03T00:06:39Z) - Detecting Logical Relation In Contract Clauses [94.85352502638081]
We develop an approach to automate the extraction of logical relations between clauses in a contract.
The resulting approach should help contract authors detecting potential logical conflicts between clauses.
arXiv Detail & Related papers (2021-11-02T19:26:32Z) - ESCORT: Ethereum Smart COntRacTs Vulnerability Detection using Deep
Neural Network and Transfer Learning [80.85273827468063]
Existing machine learning-based vulnerability detection methods are limited and only inspect whether the smart contract is vulnerable.
We propose ESCORT, the first Deep Neural Network (DNN)-based vulnerability detection framework for smart contracts.
We show that ESCORT achieves an average F1-score of 95% on six vulnerability types and the detection time is 0.02 seconds per contract.
arXiv Detail & Related papers (2021-03-23T15:04:44Z) - Second layer data governance for permissioned blockchains: the privacy
management challenge [58.720142291102135]
In pandemic situations, such as the COVID-19 and Ebola outbreak, the action related to sharing health data is crucial to avoid the massive infection and decrease the number of deaths.
In this sense, permissioned blockchain technology emerges to empower users to get their rights providing data ownership, transparency, and security through an immutable, unified, and distributed database ruled by smart contracts.
arXiv Detail & Related papers (2020-10-22T13:19:38Z) - Regulation conform DLT-operable payment adapter based on trustless -
justified trust combined generalized state channels [77.34726150561087]
Economy of Things (EoT) will be based on software agents running on peer-to-peer trustless networks.
We give an overview of current solutions that differ in their fundamental values and technological possibilities.
We propose to combine the strengths of the crypto based, decentralized trustless elements with established and well regulated means of payment.
arXiv Detail & Related papers (2020-07-03T10:45:55Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.