Wa0008.
Wa0008.
Tyler Cowen
Alex Tabarrok
Alice. To be more precise, encrypting a message that Alice’s public key decrypts
proves that the sender knows “Alice’s” private key. Public-private key encryp-
tion thus authenticates control of the private key.
He who controls the private key controls the identity. Often this alone is
quite useful. Smart cards, for example, use public-private keys for authentica-
tion. Each smart card has a unique public key known to the credit card com-
pany, say Visa, and a corresponding private key stored on the chip in the card.
When the card is presented for payment, Visa sends it a random number. The
chip in the card encrypts the random number using its private key and sends
the encrypted message back to Visa.Visa then attempts to decrypt the message
using the card’s public key. If the decrypted message reveals the random num-
ber sent by Visa, then Visa knows exactly which card is being used. Of course,
the card could still be stolen and used by a nonrightful owner but unlike earlier
credit cards, a smart card cannot be duplicated using any transmitted informa-
tion and it would be very difficult to physically duplicate a card even if it were
stolen. Thus, public-private key encryption and smart cards limit the value of a
stolen card and add significantly to the security of the credit card system.
Not only is a public key a type of identity, it is a powerful new type of identity.
Writers have long used pseudonyms. Federalist 51, for example, was signed by
Publius, a pseudonym who most historians think was James Madison.1 The Pub-
lius pseudonym offered Madison some anonymity but what if another writer
started publishing papers under the name Publius? How could Madison prove
that the new Publius was a fake? He could not—but a modern Madison could. A
modern Madison wishing to remain anonymous could create a public-private key
pair and associate the public key with the name Publius. He could then encrypt
his letters using the private Publius key. Since only Publius’s public key could
decrypt Publius’s letters, no one else could credibly claim to be Publius.
It would be a bit of a pain to have to decrypt every new Publius letter. So Pub-
lius publishes his letters to the web and then signs them with a digital signature. A
digital signature is a message that can only be decrypted using Publius’s public key.
The message might be as simple as “I am Publius,” but then we have a problem—
someone could take Publius’s digital signature and attach it to a different message.
To avoid this problem, we create a practically unique digital signature for every
message by binding the digital signature to a cryptographic “hash” of the letter.
A cryptographic hash is like a digital fingerprint, a much shorter message
that in practice can be uniquely associated with any message. The SHA256
hash algorithm, for example, hashes any input message into an output message
of 256 bits, a binary number composed of 1’s and 0’s that is 256 digits long. In
other words, we can feed any message into the SHA256 algorithm—it could
be a sentence, an entire novel like War and Peace, or a digital picture—and the
algorithm will hash it into a string of 1’s and 0’s that is 256 digits long.
256 digits isn’t that long—it’s about the length of two to three sentences. But
since each digit can be either a 0 or a 1 there are 2256 possible hashes and 2256 is a
very, very big number. It’s just a little bit smaller than all the atoms in the known
universe.
Now here is what’s amazing about these cryptographic hash algorithms—
the output is “as good as random.” In other words, anytime you hash something
new the output could be any of 2256 possible outputs and there is no way to
predict the output in advance. Guessing is useless since there are so many pos-
sibilities.Yet even though the output can’t be guessed before hashing, the func-
tion isn’t random.
Here, for example, is a hash of the entire text of War and Peace:
AB8257AE34CE51933B7D6F0B06A486CD1E189636C572B0723A5F
4E341B57A37A
If you are wondering why it’s not a string of 256 0s and 1s, that’s simply
because we encoded the same date in a shorter Hexadecimal format. An “A” in
this format converts to 1010, for example. Now here is War and Peace hashed
but with just one comma missing.
F92D49FF6BF02E4B29469C8AC71A7D662E82139F0AD4EC9D027
DF1AA86B23426
The two hashes look completely different and that is the sense in which
You can try the SHA256 hash
function yourself at websites such as: a hash produces a digital fingerprint. Another important implication is that a
https://emn178.github.io/online hash function like SHA256 is said to be collision-resistant, meaning that it is
-tools/sha256.html. infeasible to find two messages with the same hash.
Ok, now let’s go back to Publius. Publius publishes his letter to the web and
then he hashes the letter and encrypts the hash with his private key. Anyone
who wants to be sure that Publius wrote the letter can decrypt the hash using
Publius’s public key and then compare the decrypted hash to the hash of the
publicly posted letter. If the two hashes match, the readers know not only that
Publius wrote the letter but also that the letter wasn’t tampered with. Remem-
ber that if a single comma in the published letter has been altered its hash will
not match the hash found in the digital signature.
Summarizing, digital signatures offer three key properties: authenticity, message
Several people have claimed integrity, and nonrepudiation. Authenticity means that a digital signature is strong
to be Satoshi Nakamoto, the
evidence that the signer has the identity associated with the public key. The integ-
anonymous creator of bitcoin.
None, however, have passed the rity of the message is provided by comparing the message hash within the signature
acid test—sign a letter using with the hash of the message. Finally, since only the holder of the private key can
Satoshi’s digital signature. sign the digital signature, the signer cannot repudiate having signed the document.
We’re still going to get to bitcoin, but to clarify these cryptographic princi-
ples and to introduce the idea of a blockchain, we will first explain the simpler
topic of Non-Fungible Tokens, or NFTs as they are known.
Non-Fungible Tokens
Perhaps you have heard of NFTs, digital art sold on a blockchain for what
sometimes seem like astounding prices. Jack Dorsey, the co-founder of Twitter,
for example, sold an NFT of his first tweet for $2.9 million dollars! Here it is:
Mininyx Doodle/Alamy
that are signified by a picture of, well, a bored ape. The NFTs have sold
for an average price of $200,000. Why would anyone pay so much for
Stock Photo
a bored ape? Well, owning one of these NFTs makes you a member of
a club that includes future giveaways, invitations to real-life parties, and
simply the knowledge that you belong to a club that includes Steph Here are 3 of the 10,000 Bored Ape Yacht
Curry, Jimmy Fallon, and Snoop Dogg as members. NFTs, therefore, Club NFTs.
can connect sellers to buyers but they can also help to create a commu- Source: https://boredapeyachtclub.com/#/home.
nity. Remember, lots of people bought memberships in yacht clubs even
when they rarely sailed.
You can also see that NFTs can serve as a system of property rights for inter-
net goods. The concept of a “membership ticket” here is quite general. A ticket
might let you post in a particular internet forum or let you decide who else
can post in a forum or it might give you ownership of Excalibur in the King
Arthur online world and Luke Skywalker’s lightsaber in a Star Wars universe. In
essence you own those rights, and your ownership is securely validated by these
cryptographic systems.
If you think that virtual reality or the internet more generally is going to
be even more important in the future, plausibly its property rights will be a
lot more important, too. So with NFTs we have invented a whole new type
of property right. And property rights are a key economic concept, as we have
explained throughout this textbook. One reason that we, Tyler and Alex, are
interested in NFTs is because we are intrigued that humans have invented a
new kind of artwork and a new kind of property right at the same time. Almost
nobody was expecting this even 15 years ago.
There are also many experiments going on that tie NFTs to other digital
and nondigital assets. Royal.io, for example, is a platform that sells song rights
as NFTs. Users can buy NFTs of songs and musicians can earn royalties as their
songs increase in popularity. Using NFTs in this way requires connecting NFTs
and other digital assets to real-world legal institutions like copyright law and
music publishers. It remains to be seen how successful such connections will be
but the increased consumption of music online (streaming) does suggest that
there are opportunities to use cryptoeconomics to simplify and streamline the
royalty process, again helping to solve a property rights problem.
Now, let’s imagine that instead of bored apes that someone created a series of
NFTs with pictures of presidents much like the picture below.
nimon/Shutterstock.com
As before, each artwork is unique. The artwork shown here, for example, is
artwork B03542754F.You will also note that the “artist,” in this case Timothy F.
Geithner, has signed his artwork.
Now let’s imagine that people get bored with looking at presidents and sim-
ply just trade the serial number and the signature. Serial numbers aren’t very
memorable so perhaps after some time, people start to treat every serial number
like any other, in other words, serial numbers become fungible. We have now
created a type of digital cash.
To make digital cash work well, however, we must also solve the double-
spend problem. Or in other words, how do we stop a person from using the
same digital signature twice. Using the cryptographic tools we have described,
Alice can send Bob a token—which we now know is just a message and a
digital signature—and Bob can prove that Alice sent him the token. What Bob
can’t do, however, is prove that Alice didn’t also send the same token to Tom,
Dick, and Harry. Or what if Alice tried to use the same digital asset to buy
something from both Walmart and 7–11? What is to stop this from happening?
Solving the double-spend problem is easy if Alice and Bob can trust a third
party. Let’s call the trusted third party, the Trust Bank. The Trust Bank keeps a
set of accounts, a ledger. Every time Alice wants to send Bob a token she routes
her message to the Trust Bank. The Trust Bank checks its accounts and if Alice
hasn’t previously sent the token to someone else it validates the transaction
and updates Alice and Bob’s accounts. If Alice tries to send the token again, the
Trust Bank will mark the transaction as invalid. Easy!
In fact, firms did create digital cash mechanisms similar to what we have
just described and some central banks are in the process of creating digital
cash along these lines.3 But what if we don’t trust the Trust Bank? We might
be worried, for example, that the Trust Bank will secretly change its accounts
in favor of some of its members or perhaps in favor of its owners. We can solve
this problem by making the ledger public. A public ledger might look some-
thing like this:
Making the ledger public makes it harder for the Trust Bank to cheat but
suppose that the Trust Bank does cheat then we would have to compare their
accounts with someone else’s accounts, say the accounts of the Super Trust
Bank. But how do we know that the Super Trust Bank isn’t cheating?
Amazingly, cryptographic hash functions provide a solution to this problem.
Remember that a cryptographic hash function takes any data as input and out-
puts a digital fingerprint of that data, an essentially unique ID such that if any
piece of the data is ever changed it won’t hash to the same ID. Now general-
izing, let’s post each day’s ledger publicly except now we will call each day a
block and let’s link each block like the ones shown in Figure 1.4
We call this a blockchain. How does the blockchain make our data
tamper-proof?
Suppose we are worried that some of the data in Block 1 has been tampered
with. We can quickly hash the data in block 1 and compare it with the hash of
Block 1 in Block 2. If the hashes match we gain some confidence that Block 1
FIGURE 1
Block 0
Block 1 Block 2 Block 3 Block 4
(Genesis Block)
was not tampered with, but how do we know that Block 1 and Block 2 weren’t
both tampered with? Well, we can hash Block 2 and compare that hash with
the hash of Block 2 in Block 3. If those hashes match, that give us confidence
that neither Block 1 nor Block 2 have been tampered with (since the hash of
Block 2 also contains the hash of Block 1). By the same logic, if the hash of the
most recent block matches the hash listed then we can be quite confident that
none of the previous blocks have been tampered with.
Wait. Did you notice the one way to tamper with a blockchain? Yes, it would
be possible to change one piece of data if you replaced every subsequent block.
Security is never perfect. Nevertheless, what we have shown is that using a
blockchain we can create a database that is highly immutable—changing any
element in any block requires making changes to every subsequent block and
that is much more difficult than changing one element of a block. Blockchains,
therefore, greatly increase the security of databases and the more blocks subse-
quent to a given block, the greater the security.
To review briefly. Our digital cash mechanism now works reasonably well.
Alice and Bob can send secure messages. Trust Bank can verify their accounts
so that double-spends don’t happen, and we can verify Trust Bank’s accounts
using a secure public blockchain.
But notice that we are still relying on the Trust Bank to post the ledger’s data to
the blockchain and to validate transactions. That gives Trust Bank a lot of power.
Even if Trust Bank can be trusted not to fake data, maybe they can’t be trusted
not to abuse their monopoly. And what happens if the Trust Bank goes bankrupt?
This is where bitcoin comes in. Bitcoin replaces trust in institutions with
trust in the invisible hand. Let’s see how it works.
Bitcoin
All of the cryptographic tools that we have described, most notably, public-private
key cryptography, cryptographic hashes, and blockchains, preceded bitcoin. But
Satoshi Nakamoto, the pseudonymous creator of bitcoin, assembled these tools in a
new and remarkable way.
In our previous example the Trust Bank validates transactions and assem-
bles them into a publicly verifiable blockchain. Satoshi didn’t trust banks,
not even Trust Bank. So Satoshi created a mechanism that incentivized indi-
viduals and firms all over the world to validate and assemble blocks, thereby
maintaining the bitcoin network, and to do so based on self-interest without
the intervention of any central guiding hand or authority. In Adam Smith’s
words, individuals are incentivized to maintain the bitcoin network “as if
guided by an invisible hand.”
The big picture looks like this. When Alice wants to send Bob a bitcoin she
doesn’t contact her bank or Visa or Stripe. Instead she broadcasts a message to
the bitcoin network that says “I authorize a transfer of bitcoin to Bob. Here’s
my digital signature.” Bitcoin “miners” listen for transaction messages, verify
that the transactions are valid and compile them into blocks. In about 10 min-
utes (we explain why it takes 10 minutes further below) a block with Alice’s
new transaction will be added to the blockchain. Anyone in the world can
then verify that Alice transferred a bitcoin to Bob and if Bob wants to make
a subsequent transaction with Tom anyone can verify that he has the funds to
do so. Alice has no contract with the miners and they are not obligated to pro-
duce blocks. Nevertheless, when Alice broadcasts her message many thousands
FIGURE 2
1 2 3
it lives in computers that are distributed all over the world, so there is no single
place where the blockchain is kept, no center to the network, and no single
measure of which block was mined “first.”
To slow down mining and reduce the potential for competing blocks,
Satoshi required that in addition to validating transactions and preparing blocks,
miners must also win a lottery. To create the lottery Satoshi used a familiar tool,
cryptographic hashes. Recall that cryptographic hashes are as good as random;
that is, each input is equally likely to produce any of the possible outputs,
numbers running from 0 to 2256. The way to win Satoshi’s lottery is simple—
hash the data in the block plus a bit of extra text that the miners can adjust to
find a “rare” hash.5 For example, one that starts with many 0’s. Each hash is thus
a lottery ticket—more hashes, more chances to win the lottery. The first miner
to find the rare hash wins the new bitcoins and writes their block to the chain.
In practice, bitcoin miners must try trillions of hashes to find the rare hash
that wins Satoshi’s lottery. It is a part of the system that how rare a winning
ticket has to be adjusts over time so that on average it always takes about
10 minutes to find a winning hash and mine a new block. If computers get
faster, for example, blocks will temporarily be discovered more quickly but very
soon the lottery will become more difficult to win (more 0’s will be required
in the hash) and the block discovery rate will return to an average of one block
every 10 minutes. All of this was built into the original bitcoin “rules of the
game,” as developed by the ingenious Satoshi.
the A′ chain? Yes. It’s possible. But if most miners follow the longest chain norm
then the longest chain will soon become longer than any competing chain.
Why? Computing lottery tickets (trying new hashes) requires a lot of comput-
ing power. If most miners are following the longest chain norm then most of
the computing power is following the longest chain norm and so that group
will create the longest chain. A group with less computing power might get
lucky once or even twice, but over time the group with the most computing
power will produce the longest chain.
The bottom line is that there are occasional “orphaned” blocks on the bit-
coin blockchain, so if you are making a big transaction you want to wait until
the block with your transaction is say six levels deep into the blockchain. A
block six or more levels deep is very safe, in essence the data on those blocks
is immutable, because the computing power necessary to rewrite six or more
blocks is immense. Do you recall earlier when we said a blockchain makes
data more secure because tampering with one element requires changing every
subsequent block? That is exactly what is going on with the bitcoin blockchain
except now we are also making clear that changing a block requires a costly
expenditure of computing power.
We need to answer just one more question: Why do miners follow the lon-
gest chain norm? The answer is that the longest chain norm is self-sustaining—
if other people follow the norm then it is in your self-interest to follow the
norm.6 Miners want to earn the block reward of more bitcoin but miners who
mine an orphan block earn nothing. In fact, miners aren’t able to spend their
rewards until their block is 100 deep into the blockchain. So to earn the block
reward, miners must create a block that future miners build upon. If future
miners will build upon the longest chain then the best bet for a miner today is
to build on the longest chain. It’s a subtle argument but in practice quite pow-
erful. It’s a bit like driving on the right side of the road or the left. There is no
strong reason to favor one rule or the other but there is a very strong reason to
follow the rule that other people follow.
Is Bitcoin a Bubble?
Some critics have charged that high bitcoin prices reflect bitcoin as a bubble or
even a kind of fraud. But bitcoin prices have been high now for years, and they
have bounced back repeatedly from major downward swings. Usually once a true
bubble bursts, it doesn’t come back at all. At the very least, bitcoin seems to be
proving itself as a store of value, thereby giving some backing to its market price.
It is estimated there is about $8 trillion worth of gold in the world, and
most of that is held for purposes of investment and speculation, rather than it
all going into tooth fillings.7 It doesn’t seem crazy for the stock of bitcoin to
have some percentage of gold’s value; after all, bitcoin is a kind of digital gold
because of its limited supply and it has become a well-known, focal asset, just
as gold is. Bitcoin bulls, of course, think bitcoin is likely to displace more of the
gold market as a store of value, while bitcoin bears hold the opposite view.
Energy Cost
At a bitcoin price of around $40,000, the bitcoin network computes about
200 million trillion hashes per second or 200 quintillion hashes per second!
That’s a lot of computing power and no one wants the results of these quin-
tillions of hash computations. The computations are wasted or least not used
for any purpose other than securing the bitcoin network.
You will sometimes read that bitcoin uses as much electricity as a small
country. That’s true but it’s mostly a reflection of how cheap electricity
is. At a price of $40,000, bitcoin spends on the order of $10 billion on
electricity annually. $10 billion in spending is less than the world spends
on toothpaste ($30 billion), much less than the United
States spends on cigarettes ($80 billion), and consider-
ably less than the U.S. federal government spends in one
day ($18.65 billion). $10 billion is about the same as
the United States spends on Halloween costumes every
year. $10 billion isn’t negligible and bitcoin’s resource
MARK FELIX/AFP/Getty Images
cost rises with the price of bitcoin, but $10 billion isn’t
earthshaking.
Even though the total resource cost of bitcoin isn’t
enormous, the per transaction cost is high relative to other
payment systems. Visa, for example, can process transac-
tions for about 16 cents per transaction. In contrast, as
The Whinstone bitcoin mine in Rockdale, Texas, is the largest we write this chapter, the typical bitcoin transaction has a
bitcoin mine in North America. social cost of about $130.8
Governing Cryptocurrencies
One of the advantages of decentralized networks like bitcoin and Ethereum
is that they aren’t owned by anyone, not even a big corporation. But this also
raises the issue of how these networks are to be governed and improved over
time and, as of yet, that is mostly an unsolved problem with lots of experimen-
tation going on.
Blockchains do have methods for voicing disagreements and changing rules
but those methods are fairly “crude”. Satoshi Nakamoto famously disappeared
shortly after creating bitcoin, which emphasized bitcoin’s decentralized and
fixed nature: It worked more or less the way Satoshi designed even with no one
in charge. Other cryptocurrencies have more procedures for evolving. Vitalik
Buterin is the co-founder of the Ethereum protocol and he is commonly
regarded as the movement’s intellectual leader. Unlike Satoshi,Vitalik is his real-
world name and he hasn’t disappeared.
As a result, the Ethereum protocol continues to evolve under the guidance of
Buterin and others, especially the Ethereum Foundation. The Ethereum Foun-
dation coordinates the Ethereum community around new rules and standards
and it updates those rules on a regular basis and tries to improve them. The
Ethereum platform is thus more of a “moving target” than is bitcoin when it
comes to explaining it. For instance, the Ethereum chain currently uses a fairly
high-cost “proof of work” algorithm just as does bitcoin, but there are plans
(not yet realized at the moment of writing) to move it to a very different sys-
tem known as “Proof of Stake.” We’ll see when that happens, but odds are that
Ethereum will change more than bitcoin over time.
Some observers prefer the fact that the Ethereum platform can adapt and
change to new developments under the guidance of the Ethereum Foundation
while others prefer the more difficult to change bitcoin. Bitcoin can and has
improved over time but it’s a slower and more decentralized process than with
Ethereum, making bitcoin a more conservative platform.
When disagreements cannot be resolved by voice they may be resolved
by exit. A sufficiently large group of miners who think a change in the rules
would be beneficial may copy the blockchain code, change it, and then branch
or “fork” into a new blockchain. For instance, Bitcoin Cash split off from
bitcoin proper, under the premise that different rules would make it easier to
use for smaller retail transactions. So now we have both Bitcoin Cash and orig-
inal bitcoin. Bitcoin Cash hasn’t been that successful in either being used for
transactions, or for that matter in attracting general interest and support. None-
theless it still exists, and so a single crypto asset may split into multiple assets.
Forking is like dissidents leaving for a new country and it’s a one reason why
blockchains evolve rapidly. How easy should it be to create a new country or a
new blockchain? The potential to fork a blockchain can be a check on monop-
oly power but it may also be a threat to stability.
Beyond Bitcoin
The success of bitcoin spurred on the creation of other faster, more capable,
and less energy-intensive blockchains such as Ethereum, Solana, Elrond9, and
Avalanche, among others. Now let’s turn to some of the economic innovations
that new blockchains make possible.
with that smart contract by paying the “gas” required for computation. Inter-
acting with a smart contract is something like using a vending machine—put
your money in and the vending machine will operate automatically.
A smart contract is a kind of contract where the performance is guaranteed
by software instead of by lawyers and judges. For example, consider a simple
insurance contract: Alice pays Bob 1 ETH [the cryptocurrency ether] today, but
A smart contract is like a vending if the temperature in Washington, DC, falls below 15°F for five days in a row in
machine. Insert your money (“gas”)
March 2025, then Bob pays Alice 4 ETH.
and it will automatically perform
many wonderful and amazing feats One virtue of this contract is that the funds can be held by the smart con-
and maybe even make you a fortune. tract in the form of collateral so there is no question that Bob will pay if he is
supposed to. Once the contract has been entered into it is self-enforcing and
executed by the software. On the other hand, if the contract is made in Fahren-
heit when Alice and Bob meant Celsius, it will still execute regardless of what
the parties originally may have wanted.
Smart contracts need to be written very carefully! It’s also not as easy as it
sounds to prove what the temperature was in March 2025 in Washington, DC.
Sure, it’s easy for a human to look that information up, but it’s more difficult
for a software-based smart contract to be able to access that information and
know that it is valid and hasn’t been tampered with. In the blockchain world
this is known as the Oracle problem and it is an active area of research and also
a potential obstacle for the growth of smart contracts.
It is true that insurance companies, or other intermediaries, can p erform
the same functions as smart contracts but the hope is that smart contracts
can work more reliably and at lower cost. Furthermore, these smart con-
tracts can be made across international borders without tariffs or other
trade restrictions. At least as it stands at the time of writing, smart contracts
are bringing a form of automatic free trade and free capital movements to
many financial services.
Smart contracts have made especially significant inroads into decentralized
finance or DeFi, so let us now turn to that topic.
FIGURE 4
Ry 50 Rx × Ry = 100
40
30
Slope = p = 4
Dx
20
Dy
Slope = p = 1
10
0
0 10 20 30 40 50
Rx
people buy x by sending y to the smart contract the price of x goes up which
makes some sense but the relationship is purely mechanical. Shouldn’t prices be
set by supply and demand?
The puzzle is resolved by arbitrage. Arbitrage keeps AMM prices close to
market prices. If traders start purchasing lots of x, thus increasing the price of x
on the AMM and perhaps exceeding the “market” price, arbitrageurs will step
in and send x to the AMM and receive lots of y in return. Thus, there are profits
to be made from trading with an AMM to bring it closer to the “true” price.
Arbitrage in DeFi works especially well because in DeFi it’s possible for
anyone in the world to borrow millions of dollars without any collateral. Now
to be sure, anyone can’t borrow money to fund a vacation but it is possible to
borrow millions of dollars for arbitrage in what is called a flash loan. Flash loans
are another innovation that DeFi has brought to the world.
You might wonder where the initial reserves for the AMM, Rx and Ry,
come from and why anyone provides those reserves. The people who provide
reserves are called liquidity providers and the AMM is coded so that providers
get a percentage of every trade. Anyone in the world can trade with an AMM
and anyone with funds on a blockchain can be a liquidity provider. Notice, that
once the smart contract has been deployed to the blockchain it runs essentially
by itself—attracting traders and liquidity providers in a decentralized manner.
Using AMMs to trade securities is very new and strange but it does have
several advantages. Order books require thick markets which is one reason why
the NYSE is only open from 9:30 am to 4 pm daily and not on weekends or
holidays. By restricting its hours, the NYSE concentrates traders making the
market thicker. In contrast, since AMMs are run by smart contracts they can be
available 24 hours a day, 365 days a year, and from anywhere in the world.
Another big advantage of AMMs and smart contracts (SC) is that they are
“composable”—meaning one SC can call another SC. Here’s a simple example,
if we have a $/BTC AMM and a BTC/Egld AMM then by sequential trade we
have a $/Egld AMM. A more complex example is a smart contract mutual fund
that invests and trades in multiple assets according to a fixed set of rules. Com-
posability makes it possible to create sophisticated financial contracts by putting
together smart contracts like Lego blocks. More generally, since code uploaded
to a blockchain doesn’t go away each new smart contract added to the system
adds to the potential capabilities of every other smart contract.
AMMs are very new. Buterin sketched the idea in a Reddit post in 2017
(based in part on earlier ideas from our colleague Robin Hanson). Uniswap, the
quantum leap in this field, launched in November 2018. Not only is the field new,
it is changing rapidly. The rapid pace is not an accident. Anyone in the world can
launch a Uniswap competitor and many people have, bringing new ideas to the
field. Uniswap responded by creating more powerful method of liquidity staking
in Uniswap3. By the time you read this, there will be more innovations.
The DeFi markets are still small relative to traditional markets, which trade
trillions of dollars’ worth of securities every day. But in just a few years, AMMs
went from nothing to more than a hundred billion dollars in liquidity provided.
DeFi is a field dominated by creative destruction, namely that new products
displace older products at a high rate. The future will be interesting.
mentioned earlier, this is also possible in the DeFi world but you must borrow
and lend quickly. Flash loans are loans that are made and repaid in one com-
bined transaction so that if the loan can’t be repaid then it is never made. Flash
loans are an entirely new financial innovation.
accounts, and the 50% to 100% rates paid by many borrowers. It seems that
there are large additional gains from trade if blockchains can reduce transaction
costs.
In short, one of the major promises of the blockchain revolution is a reallo-
cation of capital to the parts of the world with higher yields and higher rates
of return. This has not yet happened, but it is one reason why blockchains have
at least the potential to tie into a central concern of macroeconomics, namely
boosting economic growth and increasing gains from trade. Most generally,
cryptocurrencies span countries so the concept of cross-border capital flows
makes less sense the more that we come to live in the “metaverse.”
Takeaway
The technologist Marc Andreessen has argued that “software is eating the
world” and that includes software written to a blockchain. If blockchains and
smart contracts can reduce transaction costs in payments, borrowing and lend-
ing, and buying and selling securities then they can have a big effect on money,
banking, and finance. It’s possible that most assets—stocks, bonds, real estate,
and more—will move online and be represented by a token (“coin”) on a
blockchain and traded on an AMM or something similar—this trend is some-
times called the “tokenization of everything.”
Cryptoeconomics combines cryptography and economics to produce
new methods of communication, cooperation, and organization. Without the
security of public key exchange, the modern internet would not be possible.
Satoshi Nakamoto showed how cryptographic primitives like cryptographic
hash functions and digital signatures could be combined to produce something
new, namely a reliable form of decentralized consensus. Satoshi used decentral-
ized consensus to create bitcoin, which is in essence an invisible hand process
for transferring money.
Bitcoin hasn’t fulfilled Satoshi’s original goal of creating a money for “small
casual transactions,” but it has become a tremendous store of wealth with a
market capitalization circa 2022 of about $700 billion. Even more importantly,
bitcoin led to new blockchains capable of executing smart contracts, invisible
hand processes for computation. Smart contracts hold the potential of replac-
ing costly intermediaries with less costly code. Integrating smart contracts on
a blockchain with legal contracts and regulation will be an important step in
making these technologies widespread and more useful.
In all of these crypto and blockchain areas, there are at least two kinds of uncer-
tainty. The first is how effectively crypto and blockchain innovators will be able
to capture additional gains from trade.The second question is how the authorities
will regulate these markets. Cryptocurrencies and decentralized finance are not
immune to problems of traditional finance including b ubbles, excess leverage, and
bank runs. Thus, as these markets get bigger, we may expect more regulation. As
regulation increases on crypto innovations that may slow their future growth and
also make traditional and decentralized finance more similar. Governments may
also create new digital currencies of their own, sometimes called central bank
digital currencies (CBDCs), which will be convenient but won’t necessarily have
the privacy or security of an unregulated digital currency like bitcoin or ZCash.
Most of all, we would stress the point that these markets are changing rap-
idly. We’ve given you some basics, but the latest innovations require you to pay
close attention to the markets as they are evolving.
FURTHER READING
A good introduction to cryptoeconomics is:
Schar, Fabian and Aleksander Berentsen. 2020. Bitcoin, Blockchain, and Cryptoassets:
A Comprehensive Introduction. Cambridge, MA: MIT Press.
More details and cryptography can be found in:
Narayanan, Arvind, Joseph Bonneau, Edward Felten, Andrew Miller, and Steven
Goldfeder. 2016. Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction.
Princeton, NJ: Princeton University Press.
A useful history of key cryptographic primitives is:
Narayanan, Arvind, and Jeremy Clark. 2017. “Bitcoin’s Academic Pedigree.” Com-
munications of the ACM 60(12): 36–45. https://doi.org/10.1145/3132259.
A game theoretic discussion of the long chain norm and whether it is a Nash
equilibrium can be found here:
Eyal, Ittay, and Emin Gun Sirer. 2013. “Majority Is Not Enough: Bitcoin Mining
Is Vulnerable.” ArXiv:1311.0243 [Cs], November. http://arxiv.org/abs/1311.0243.
Many of the original papers on cryptoeconomics are technical but well worth
reading including:
Adams, Hyden, Noah Zinsmeister, Moody Salem, River Keefer, and Dan
Robinson. n.d. “Uniswap v3 Core.” https://uniswap.org/whitepaper-v3.pdf.
Buterin,Vitalik. 2013. “Ethereum Whitepaper.” Ethereum.org. 2013. https://
ethereum.org.
Diffie, Whitfield, and Martin Hellman. 1976. “New Directions in Cryptography.”
IEEE Transactions on Information Theory 22(6): 644–654. https://doi.org/10.1109
/TIT.1976.1055638.
Nakamoto, Satoshi. 2008. “Bitcoin: A Peer-to-Peer Electronic Cash System.”
October 31, 2008. https://bitcoin.org/en/bitcoin-paper.
Rivest, Ron L., Adi Shamir, and Leonard Adleman. 1978. “A Method for Obtain-
ing Digital Signatures and Public-Key Cryptosystems.” Communications of the ACM
21(2): 120–126. https://doi.org/10.1145/359340.359342.
To follow new developments in crypto, it is often necessary to camp out on Twit-
ter and follow whoever are the most interesting people in the crypto space at the
time.You can type crypto terms into Twitter search to get an idea of what is going
on at any moment, and to see who is generated the most interesting comments.