Chapter 1 Quiz

Multiple Choice

1. The Byzantine Generals Problem describes the difficulty of:

(a) Encrypting military communications during wartime (b) Achieving consensus among parties when some may be dishonest or faulty (c) Defending a city against a siege by multiple armies (d) Transmitting data across unreliable network connections

Answer: (b). The Byzantine Generals Problem is about achieving agreement (consensus) among distributed parties when some participants may be malicious (traitors). While the original paper used a military metaphor, the problem applies to any distributed system where participants cannot fully trust each other.


2. According to the proof by Lamport, Shostak, and Pease, what is the maximum fraction of participants that can be faulty (traitorous) while still allowing the remaining honest participants to reach consensus?

(a) Less than one-quarter (b) Less than one-third (c) Less than one-half (d) Any number, as long as at least one is honest

Answer: (b). The original proof showed that consensus is impossible when one-third or more of the participants are faulty. The system can tolerate up to (but not including) one-third being traitors. Note that Bitcoin's proof-of-work system has a different threshold (50% of computing power), which we will discuss in Chapter 4.


3. The double-spending problem refers to:

(a) A user accidentally paying twice for the same item (b) The risk that digital currency can be copied and spent more than once (c) Two miners creating the same block simultaneously (d) A merchant charging a customer twice for a single transaction

Answer: (b). Digital information can be copied perfectly, so a unit of digital currency could potentially be duplicated and sent to multiple recipients. Solving this without a central authority was the key challenge that prior digital cash systems (like DigiCash) addressed through centralization and that Bitcoin addressed through a distributed consensus mechanism.


4. DigiCash, founded by David Chaum, failed primarily because:

(a) Its cryptography was broken by researchers (b) It was a centralized system dependent on a single company (c) Digital payments were not yet technically feasible in the 1990s (d) Governments banned the use of blind signatures

Answer: (b). DigiCash's cryptography (blind signatures) was technically sound and innovative. The company failed due to business difficulties and the fundamental architectural problem of being centralized — a single company operated the system, and when that company went bankrupt, the system died. This pattern repeated with e-gold and Liberty Reserve.


5. Which of the following was NOT a direct precursor technology or proposal that influenced Bitcoin?

(a) Hashcash (Adam Back, 1997) (b) b-money (Wei Dai, 1998) (c) BitTorrent (Bram Cohen, 2001) (d) BitGold (Nick Szabo, 2005)

Answer: (c). While BitTorrent demonstrated the viability of large-scale peer-to-peer networks (and Bram Cohen was associated with the cypherpunk community), it was not a digital cash system and is not cited in the Bitcoin whitepaper. Hashcash, b-money, and BitGold are all direct intellectual precursors to Bitcoin and are cited or referenced in Satoshi's work.


6. Satoshi Nakamoto's primary innovation in the Bitcoin whitepaper was:

(a) Inventing cryptographic hash functions (b) Creating the first digital signature algorithm (c) Synthesizing existing techniques (proof of work, hash chains, digital signatures) into a system that solved the double-spending problem without a central authority (d) Discovering the Byzantine Generals Problem

Answer: (c). Hash functions, digital signatures, proof of work, and linked data structures all predated Bitcoin. Satoshi's contribution was combining them in a specific architecture that achieved decentralized consensus on a transaction ledger. It was an engineering synthesis, not a cryptographic invention.


7. The Bitcoin genesis block (Block 0) contained a reference to a newspaper headline about:

(a) The launch of a new cryptocurrency (b) A government bailout of banks during the 2008 financial crisis (c) The election of Barack Obama as U.S. president (d) The collapse of Lehman Brothers

Answer: (b). The genesis block contained the text "The Times 03/Jan/2009 Chancellor on brink of second bailout for banks," from the front page of The Times of London. This served as both a timestamp proof and a commentary on the financial system.


8. In a blockchain, each block contains a hash of the previous block. If an attacker modifies the data in Block 5 of a 100-block chain, what happens?

(a) Only Block 5's hash changes; the rest of the chain is unaffected (b) Block 5's hash changes, which invalidates Block 6's reference, which invalidates Block 7's reference, and so on through Block 100 (c) The blockchain automatically corrects the modification (d) Block 5 is deleted and the chain reconnects Block 4 to Block 6

Answer: (b). Because each block contains the hash of the previous block, modifying Block 5 changes its hash, which means Block 6's stored reference no longer matches, making Block 6 invalid, which cascades through every subsequent block. This cascading invalidation is what makes the chain tamper-evident.


9. Which of the following is NOT one of the four components that distinguish a blockchain system from a simple hash-linked data structure?

(a) A distributed network of independent nodes (b) A consensus mechanism (c) A graphical user interface (d) An incentive design (economic rewards for honest participation)

Answer: (c). A blockchain system requires: (1) a hash-linked data structure, (2) a distributed network, (3) a consensus mechanism, and (4) incentive design. A user interface is a practical necessity for usability but is not a defining architectural component of a blockchain system.


10. According to the decision framework presented in this chapter, a blockchain is most likely appropriate when:

(a) A single organization needs a fast, efficient database (b) Multiple parties who do not trust each other or a common intermediary need to share tamper-evident data (c) Data needs to be stored as cheaply as possible (d) A system needs to process millions of transactions per second

Answer: (b). The decision framework requires all four conditions: multiple parties sharing data, no trusted intermediary, need for tamper-evidence, and the value of decentralization exceeding its cost. Options (a), (c), and (d) describe scenarios where traditional databases are almost certainly superior.


11. The term "trustless" as applied to blockchain systems is best understood as:

(a) No trust of any kind is required (b) Trust is redistributed and minimized, not eliminated (c) Users should not trust the system (d) The system has been proven mathematically secure against all attacks

Answer: (b). "Trustless" is a misleading term. Users of blockchain systems still trust the cryptographic algorithms, the software implementation, the assumption that a majority of participants are honest, and other factors. The trust is distributed across many participants and cryptographic guarantees rather than concentrated in a single institution, but it is not eliminated.


12. Proof of work, as used in Bitcoin, was originally proposed by Adam Back in 1997 for the purpose of:

(a) Mining digital currency (b) Securing military communications (c) Combating email spam (d) Verifying digital signatures

Answer: (c). Adam Back's Hashcash used proof of work to make sending email computationally expensive, which would be trivial for normal users but prohibitive for spammers sending millions of messages. The concept was later adapted by Satoshi Nakamoto as Bitcoin's consensus mechanism.


13. e-gold failed primarily because:

(a) Gold proved to be an unstable backing for digital currency (b) As a centralized system, its operators became a single point of regulatory failure (c) Users preferred credit cards for online purchases (d) The underlying cryptography was broken

Answer: (b). e-gold processed over $2 billion annually and was technically functional. Its centralized operator, however, became legally liable for the criminal activity occurring on the platform. The U.S. Department of Justice indicted its founder, and the system was shut down. A decentralized system like Bitcoin has no equivalent single operator to arrest or indict.


14. Ethereum's transition from proof of work to proof of stake (called "The Merge") in September 2022:

(a) Reduced Ethereum's energy consumption by approximately 99.95% (b) Made Ethereum twice as fast as Bitcoin (c) Eliminated all transaction fees on the Ethereum network (d) Was reversed due to security concerns

Answer: (a). The Merge replaced Ethereum's energy-intensive proof-of-work consensus with proof of stake, which does not require computational mining. This reduced energy consumption by approximately 99.95%. Transaction fees and processing speeds are separate concerns addressed by other protocol changes and Layer 2 solutions.


15. Which statement best characterizes this textbook's stated approach to blockchain technology?

(a) Blockchain will revolutionize every industry (b) Cryptocurrency is primarily a speculative bubble (c) The technology is examined on its technical merits, with balanced presentation of both capabilities and limitations (d) Regulation should be avoided to allow innovation

Answer: (c). The textbook explicitly states it will not advocate for or against blockchain technology, will not provide investment advice, and will present multiple perspectives on contentious questions. The goal is to provide analytical frameworks rather than ideological positions.


True or False

16. True or False: The Bitcoin whitepaper introduced several new cryptographic algorithms that had not existed before.

Answer: False. The Bitcoin whitepaper did not introduce any new cryptographic primitives. It combined existing technologies — hash functions (SHA-256), digital signatures (ECDSA), proof of work (adapted from Hashcash), and hash-linked data structures (from Haber and Stornetta) — into a novel system architecture.


17. True or False: A blockchain is always more secure than a traditional centralized database.

Answer: False. Security depends on the threat model. A well-managed centralized database with proper access controls, backups, and auditing may be more secure than a blockchain for many applications. Blockchains provide specific security properties (tamper evidence, censorship resistance) but sacrifice others (speed, efficiency, ease of error correction). The appropriate choice depends on the specific requirements.


18. True or False: The identity of Satoshi Nakamoto, the creator of Bitcoin, has been conclusively established.

Answer: False. Despite numerous claims and investigations, the true identity of Satoshi Nakamoto remains unknown. Satoshi communicated only through pseudonymous online accounts and withdrew from public participation in mid-2010. The approximately 1.1 million bitcoins in wallets associated with Satoshi have never been moved.


19. True or False: Hal Finney's RPOW (Reusable Proofs of Work) system was fully decentralized.

Answer: False. RPOW relied on a central server (running on tamper-resistant hardware) to verify that each proof-of-work token had been used only once. While the use of trusted computing hardware reduced the trust required in the server operator, it was still a centralized system with a single point of failure.


20. True or False: If no single entity controls more than 50% of a proof-of-work blockchain's computing power, the system is guaranteed to be secure against all attacks.

Answer: False. The 50% threshold (often called a "51% attack") is the threshold for being able to reliably rewrite the chain's history. However, there are other attack vectors that do not require majority computing power, including selfish mining strategies, eclipse attacks, and exploits in the software implementation. Additionally, even below 50%, an attacker with significant computing power can probabilistically succeed in double-spending if the victim does not wait for sufficient confirmations.


Short Answer

21. Explain the difference between a blockchain as a data structure and a blockchain as a system. Why is this distinction important?

Model Answer: A blockchain as a data structure is simply a linked list where each element (block) contains a cryptographic hash of the previous element, making the chain tamper-evident. This data structure has existed since the early 1990s (Haber and Stornetta's work on document time-stamping) and is used in non-blockchain contexts like Git.

A blockchain as a system combines the data structure with three additional components: a distributed network of independent nodes, a consensus mechanism that allows these nodes to agree on which blocks to add, and an incentive design that rewards honest participation. It is this combination that produces the emergent properties of decentralization, censorship resistance, and permissionlessness.

The distinction is important because many proposed "blockchain" applications use only the data structure (a hash-linked ledger maintained by a single organization), which provides tamper evidence but not decentralization. Such applications could often be achieved more efficiently with a traditional database and digital signatures.


22. The chapter presents four conditions that must all be met for a blockchain to be an appropriate technology choice. List all four conditions and explain why the absence of any single condition makes a traditional database preferable.

Model Answer: The four conditions are:

  1. Multiple parties need to share data. If only one organization controls the data, a traditional database provides better performance and simpler management.

  2. Those parties cannot or will not trust a single intermediary. If a trusted third party is available and acceptable, that party can maintain a centralized database more efficiently.

  3. The data needs to be tamper-evident. If data can legitimately be modified by administrators (as in most business applications), the immutability of a blockchain is a hindrance, not a benefit.

  4. The value of decentralization exceeds its cost. Blockchain systems are slower, more expensive, and harder to modify than centralized databases. If the application does not require censorship resistance or trustless operation, these costs are not justified.

If any condition is absent, the overhead of a blockchain (slower performance, higher storage costs, more complex development, difficulty correcting errors) is not offset by a corresponding benefit. A traditional database or a simpler cryptographic solution (like digitally signed records) would be more appropriate.


23. The chapter traces a history from DigiCash (1989) through e-gold and Liberty Reserve to Bitcoin (2009). What is the common lesson from the failures of the pre-Bitcoin systems, and how did Bitcoin's design address that lesson?

Model Answer: The common lesson is that centralized digital currency systems create a single point of failure. DigiCash depended on a company that went bankrupt. e-gold depended on an operator who was indicted. Liberty Reserve depended on a founder who was imprisoned. In each case, the system died because a single entity — the operator — could be shut down.

Bitcoin addressed this by eliminating the operator entirely. There is no Bitcoin company, no CEO, no server that can be seized. The system is a protocol run by thousands of independent nodes. No single entity controls the network, and no single entity can be targeted to shut it down. This was achieved through the combination of proof of work (allowing anonymous participants to create blocks without permission), the distributed ledger (every node maintains a copy), and the incentive design (miners are economically motivated to follow the rules).

The trade-off is that a system with no operator has no one to fix bugs, resolve disputes, or make decisions quickly. Protocol changes require broad consensus among participants, which is slow and contentious. This is the fundamental trade-off of decentralization: resilience against single-point-of-failure at the cost of governance flexibility.