从“新基建”视角推进政务服务领域区块链应用创新区块链被定义为“新基建”中的新技术基础设施,其“连接”技术的意义凸显,一方面区块链将连接现有的专有网络,服务于政务、金融、工业等专有网络的信息互联;另一方.
2021-08-04
141页




5星级
On the Financing Benefi ts of Supply Chain Transparency and Blockchain Adoption Jiri Chod, Nikolaos Trichakis, Gerry Tsoukalas Henry Aspegren, Mark Weber July 1, 2019 Management Scienceforthcoming Abstract We develop a theory that shows signaling a fi rms fundamental quality (e.g., its operational capabilities) to lenders through inventory transactions to be more e?cientit leads to less costly operational distortionsthan signaling through loan requests, and we characterize how the e?ciency gains depend on fi rm operational characteristics such as operating costs, market size, and inventory salvage value. Signaling through inventory being only tenable when inventory transactions are verifi able at low enough cost, we then turn our attention to how this verifi ability can be achieved in practice and argue that blockchain technology could enable it more e?ciently than traditional monitoring mechanisms. To demonstrate, we develop b verify, an open-source blockchain protocol that leverages Bitcoin to provide supply chain transparency at scale and in a cost eective way. The paper identifi es an important benefi t of blockchain adoptionby opening a window of transparency into a fi rms supply chain, blockchain technology furnishes the ability to secure favorable fi nancing terms at lower signaling costs. Furthermore, the analysis of the preferred signaling mode sheds light on what types of fi rms or supply chains would stand to benefi t the most from this use of blockchain technology. Chod (chodjbc.edu): Carroll School of Management, Boston College; Trichakis (ntrichakismit.edu): MIT Operations Research Center and Sloan School of Management; Tsoukalas (gtsoukwharton.upenn.edu): The Whar- ton School, University of Pennsylvania; Aspegren (): MIT Media Lab Weber (): IBM Research 2) disintermediation, e.g., the ability to provide trust in the absence of a trusted party;43) record integrity, by providing a chain of audit which reduces fraud opportunities; 4) automation, so that tasks such as making loan payments can be automated (Babich and Hilary 2018). In brief, these features can be leveraged to address many of the aforementioned shortcomings including the paper trail ine?ciencies, the need for costly intermediaries, and issues of fraud. There are, however, some potential obstacles that may inhibit the use of blockchain technology in supply chains, or may make it too expensive to deploy. First, it is not obvious to what extent and how exactly blockchains can be successfully ported to provide verifi ability of physical goods transactions, such as procuring inventory. In particular, physical transactions involve a certain amount of human intervention and, therefore, are more susceptible to mistakes or deliberate mis- representation. The ensuing “garbage-in-garbage-out” problem could completely negate the main purpose of blockchain adoption in providing transparency. Second, even if transaction verifi ability can be successfully ported, it is not clear whether blockchain can be deployed in a way that keeps implementation and operating costs low enough to make it relevant to SMEs in developing economies. To this point, there are substantial dierences to consider between private and public blockchain implementations, each having their own advan- (https:/www.fbi.gov/scams-and-safety/common-fraud-schemes/letter-of-credit-fraud). 2Perhaps the most infamous example of falsifying warehouse receipts in asset-based lending is the De Angelis salad oil swindle, which nearly crippled the New York Stock Exchange (Taylor Nov 23, 2013). 3Blockchains were originally designed to solve the infamous double spending problem for digital currency, i.e., to ensure that a digital asset transmitted from one party to another has not already been spent elsewhere. 4In the Bitcoin blockchain, for instance, the task of recording transactions is assigned to individual miners who compete through a proof of work mechanism at every round, to append blocks to the existing chain, in exchange for compensation (composed of transaction fees, and new currency issuance). 4 tages and disadvantages in the context of supply chains. On the one hand, private blockchains have some desirable properties in terms of privacy but 1) are usually not fully decentralized and do not fully eliminate intermediation, 2) have di?culties scaling to achieve adequate security guarantees, and 3) have (relatively speaking) large infrastructure costs. On the other hand, public blockchains, such as the one backing the Bitcoin network, do not suer from these issues, but they do lack some of the desired properties that are important to supply chains, such as identifi cation of verifi ed parties, privacy of data, and transaction costs that are controlled in-network. To demonstrate how these technological and cost issues can be overcome in practice, we devel- oped an open-source software protocol termed b verify. The protocol uses the Bitcoin network to ensure recorded data cannot be retroactively modifi ed or altered. At a high level, the protocol is designed to leverage the infrastructure benefi ts of public blockchains, while taking advantage of several innovations that mitigate some of the aforementioned privacy, identifi cation and transaction cost issues. Unlike previous systems, b verify was designed so that it can provide data integrity at scale and at low cost; it is capable of processing thousands of transactions per second at a fraction of a cent each. More details about the protocol and its key innovations are included in Section 3. In this paper we consider a specifi c use case in agricultural supply chains, demonstrating how the protocol facilitates transaction verifi ability in the context of warehouse inventory. Warehouses often play a central role in supply chains, being frequented by suppliers who deposit inventory, buyers who procure inputs, and banks who utilize warehousing receipts and transactions to process loans (Trichakis, Tsoukalas and Moloney 2015). An enterprise-grade implementation of b verify at this nexus of stakeholder interaction can securely provide, depending on the need, relevant supply chain transanctional information to stakeholders, along with a cryptographic proof that the records are authentic and that no record has been omitted. According to our theory, this in turn should enable high-quality fi rms to use inventory as a credible signaling device and thereby unlock access to favorable fi nancing terms with smaller operational distortions. 1.1Related Literature Signaling models The literature on signaling goes back to the seminal paper by Spence (1973). Whereas Spence (1973) considers only one signaling mechanism (education), herein we allow the informed players to choose between two alternative signaling mechanisms, and study which one prevails in a least-cost separating equilibrium. As we shall see, inventory signaling incurs higher unit signaling costs than cash signaling. While casual intuition could suggest that signaling through the costlier mechanism is automatically more e?cient, a deeper analysis within the classical frame- 5 work laid out by Spence (1973) reveals that this may or may not be the case. Using a generic game, we formally show that if two signaling mechanisms are available that dier only in the unit signaling costs, the high type can prefer the costlier or the cheaper mechanism, depending on the circumstances. In particular, our analysis brings to light the following tradeo. Because the costlier mechanism allows the high type to separate with a smaller distortion, the choice of signaling mech- anism trades o the lower per unit signaling cost of one mechanism against a smaller distortion required to separate with the other. In the context of Spences education signaling, if, say, liberal arts education is costlier than engineering education, a fi rst degree in the former while a postgrad- uate degree in the latter could be required for the high type to separate. We demonstrate that in general, the equilibrium choice of the signaling mechanism by the high type depends the relation between the cost premia of the costlier mechanism for the two types. Within our specifi c context, we fi nd that the inventory/cash signaling cost premia are such that inventory signaling dominates. Signaling to fi nanciers/suppliers Signaling through loan requests to fi nanciers has been well studied in the fi nance literature, going back to Ross (1977) who shows that high-quality fi rms, concerned with short-term valuation, can signal to investors by requesting larger loans. In Besanko and Thakor (1987), lenders screen borrowers using a credit policy consisting of interest rate, loan amount, collateral, and the credit granting probability, and high-quality fi rms signal by borrowing more in equilibrium than they would under full information. Milde and Riley (1988) model a game, in which banks screen borrowers by oering higher loans at higher interest rate, and depending on project characteristics, high-quality borrowers may signal by choosing larger or smaller loans in equilibrium. Duan and Yoon (1993) show that when borrowers choose between spot market borrowing and a loan commitment, high-quality borrowers signal by using larger loan commitments. Signaling through inventory has been studied primarily in the operations management literature in the context of signaling to suppliers and signaling to equity investors. Inventory signaling to suppliers is the subject of Cachon and Lariviere (2001) and Ozer and Wei (2006), both of whom examine how a privately informed manufacturer can credibly share demand forecast with a supplier, which then uses this forecast to build capacity. Taking the perspective of the manufacturer and that of the supplier, respectively, Cachon and Lariviere (2001) and Ozer and Wei (2006) show that the manufacturer can signal by overordering. Chod, Trichakis and Tsoukalas (2018) study supplier diversifi cation in a model that features inventory signaling to suppliers who are also trade creditors. The literature on inventory signaling to equity investors draws upon Bebchuk and Stole (1993), who show that when fi rms are concerned with the short-term valuation and investors observe the investment level, fi rms can signal high productivity by overinvesting. Building on the same premise 6 but in the supply chain context, Lai, Xiao and Yang (2012) show that inventory overinvestment due to signaling can be prevented using a menu of buyback contracts; Lai and Xiao (2018) fi nd that the fi rst-best inventory decisions can be also achieved in equilibrium when the managers short-termism is endogenous; and Schmidt et al. (2015) focus on characterizing pooling equilibria. Our paper contributes to the above literatures by contrasting signaling with loan requests and signaling with inventory, and by establishing the conditions under which the latter dominates. By studying the eect of inventory transaction observability in the context of lending, our paper is intimately related and contributes to the literature on supplier fi nancing. Supplier fi nancing The literature on supplier fi nancing is vast and we only review papers here that are closest to ours. Burkart and Ellingsen (2004) show that observability of the input trans- action by the supplier reduces the borrowers diversion opportunities. Considering multiple inputs, Fabbri and Menichini (2016) and Chod (2016) show that transaction observability also reduces the asset substitution problem. Although these papers focus on moral hazard, our work focuses on information asymmetry, where it aords new insights. In particular, the insights in these papers are less relevant in settings in which opportunistic behavior can be alleviated through other means, such as debt covenants, strong legal institutions, and so forth (Iancu, Trichakis and Tsoukalas 2016). Our theory holds irrespective of buyer opportunism. Closer to our work, within information asymmetry models, Burkart and Ellingsen state that “there is no obvious distinction between lending cash and lending inputs” (p. 571).Our work demonstrates that such a distinction does exist: it characterizes the conditions under which an input transaction (inventory signaling) transmits private information about the borrower quality more e?ciently than a cash transaction (cash signaling). The explanation oered by our model is distinct from, and possibly more robust than, existing explanations that rationalize supplier fi nancing based on the assumption that suppliers have an a priori informational advantage over banks (Emery 1984, Biais and Gollier 1997, Jain 2001). Albeit certainly the case in some instances, it is unlikely that fi nancial institutions specialized in developing lending relationships and assessing creditworthiness are systematically disadvantaged relative to suppliers. Our proposed explanation is immune to this criticism because our model assumes a level playing fi eld between banks and suppliers, and identifi es a monitoring advantage of supplier fi nancing that emerges endogenously from the very nature of the transaction and the supply chain transparency it provides. Our theory, although robust to the foregoing criticisms, admits its own limitation, namely, that it is relevant only in the presence of information asymmetry between buyers (borrowers) and lenders regarding the formers creditworthiness. 7 Blockchain literature Most existing literature on blockchains is in computer science, starting with the original white paper by Nakamoto (2008). Given that blockchain technology is very new and still being actively developed, the management literature on the topic is scarce. Babich and Hilary (2018) provide a qualitative discussion of the technologys potential to improve production and distribution networks and implications for operations management researchers. Several papers examine the economics of mining and/or optimal design of blockchain systems, e.g., Biais et al. (2017), Huberman, Leshno and Moallemi (2017), Budish (2018), Cong, He and Li (2019), Hinzen, John and Saleh (2019), Saleh (2019) and references therein. To the best of our knowledge, ours is the fi rst research paper to explore both practical and theoretical implications of blockchains for supply chain fi nance and operations management. A few recent papers, however, have started exploring the impact of blockchain in other areas. For instance, Yermack (2017) examines implications of blockchains for corporate governance, arguing that the transparency of ownership oered by blockchains may upend the balance of power in traditional governance structures. Catalini and Gans (2017) study how blockchain technology could shape innovation by reducing transaction verifi ability costs and bypassing intermediaries. Chod and Lyandres (2018), Gan, Netessine and Tsoukalas (2019) and Chod, Trichakis and Yang (2019) study fi nancing of entrepreneurial ventures by issuing crypto-tokens (ICOs) on ex
2021-08-02
35页




5星级
2021年7月15日,Dealroom和Sifted共同主办了一个关于区块链未来的专家小组。虽然区块链相关的头条新闻通常聚焦于动荡的加密价格、引人注目的memecoin采用、欺诈和代币热等疯狂的西部,.
2021-08-02
19页




5星级
首先对数据进行平稳性检验,单位根检验结果显示各变量均为平稳序列,由此避免了伪回归。由于该面板模型为长面板模型,为避免异方差影响,实证结果均采用稳健标准误估计。 实证结果表明,区块链发展会促.
2021-07-20
21页




5星级
本周,引人注目的明星公链项目 Algorand 主网正式启动,之前的一周间,Algorand 各节点已经在预上线(Pre-Launch)环境中进行测试。首轮 Algorand 通证拍卖也于北京时间 6.
2021-07-07
13页




5星级
近些年来,随着市场经济的发展,人们对艺术修养要求越来越高,越来越多的人投身于艺术品收藏之中,但传统交易市场本身存在的缺点依然存在,对大众参与艺术交易带来了极大的困难。首先是经济上买不起。对于热衷于艺术.
2021-07-02
36页




5星级
区块链底层核心技术产品或服务,除了传统硬件制造商提供通用的计算、存储、网络设备外,还包括专用硬件设备。区块链技术组件部分主要包含:共识算法、加密算法、分布式数据存储、智能合约等。前三部分呈现出较明显的.
2021-07-02
36页




5星级
安全监管同步模式指利用区块链技术实现各节点达成共识,依据去中心化存储快速同步账本,实现安全监管场景下数据的快速同步与共享,通用场景中被监管的生产或运营环节节点所做的任何动作都将上链存储,共识后同步到相.
2021-07-01
44页




5星级
在现代供应链理论中,供应链是围绕企业,从原材料或配套零件开始,制成中间产品以及最终产品,最后由销售网络将产品送达至用户手中,将供应商、物流服务提供商、制造商、分销商直到最终用户连成一个整体的功能网链结.
2021-06-30
60页




5星级
链间互操作是指不同区块链系统实例之间交换信息,并对所交换信息加以使用的能力,又可称之为跨链。具体指不同区块链系统实例之间通过协商好的接口、通信协议、共识协议实现信息的安全可信交互。主要用于解决区块链世.
2021-06-30
31页




5星级
在高端消费品领域,如母婴奶粉、保健品、美妆、奢侈品等单价值比较高的消费品当中,假货、调包等问题一直是困扰品牌方和消费者的关键问题,通过区块链追溯来记录商品从生产厂商、经销商、仓储物流、零售商、消费者退.
2021-06-30
66页




5星级
微软提出在比特币区块链上建立去中心化身份网络。2018年,微软与ID2020联合开发分布式数字身份认证网络,帮助个人和难民获得基本服务;同年,微软与万事达合作推动数字身份的合作计划,解决难民身份归属的.
2021-06-30
70页




5星级
想要了解Filecoin,我们还是要先从IPFS开始,而了解IPFS,就先要从我们每天都会使用的HTTP开始。HTTP基于TCP/IP的计算机应用层面,从服务器传输超文本数据到本地浏览器,而后进过渲染.
2021-06-30
19页




5星级
63号文、“互联网+招标采购行动方案(2017-2019年)(发改法规2017) 357号)和国务院办公厅转发国家发展改革委关于深化公共资源交易平台整合共享指导意见的通知(国办函201941号)明确要.
2021-06-30
39页




5星级
跨链适配器(Stub)指连接一个区块链的接口实现,可由跨链路由加载。跨链路由可以配置多个区块链适配器,达到连接多条区块链的效果。跨链路由间会自动同步区块链适配器的配置信息,从而帮助用户寻址位于其他区块.
2021-06-29
44页




5星级
(1)公有链公有链是指任何人都有权成为系统中的一个节点参与记账,读取、发送交易且能获得有效确认的区块链网络。它的去中介化度最高,不受第三方的限制,整个账本对所有人公开透明,加入和离开公有链不需要任何人.
2021-06-29
42页




5星级
中国有庞大的互联网消费群体,区块链应用在中国也呈现出多元广泛的特点。凭借区块链技术在重塑信任关系、提高产业效率方面的良好作用,各地政府在区块链产业发展过程中通过政策扶持,引导各地区块链企业以实际应用需.
2021-06-29
187页




5星级
(一)区块链概念2008年,区块链技术作为比特币的底层框架技术出现,其后人们把比特币的底层基础技术称之为区块链技术。区块链技术以密码学、分布式技术、博弈论等理论为基础,结合共识算法、智能合约等技术维护.
2021-06-29
35页




5星级
在日益数字化的经济和社会中,数据交易的安全性和问责制是在数字世界中建立信任和实现突破性创新的关键因素。在这方面,区块链技术可以改变游戏规则,有可能彻底改变从金融到制药行业、从政府公共服务到人道主义工作.
2021-06-29
61页




5星级
如何管理: 中心化管理:登记中心基于传统集中化方法构建,加密只对央行披露; 账户松耦合方式投放:即使用者不需要银行账户即可实现转账; 5)是否使用分布式账本技术(区块链核心底层技术): 发行中心化:D.
2021-06-24
32页




5星级
十五五规划建议全文(25页).pdf
三个皮匠报告:2025银发经济生态:中国与全球实践白皮书(150页).pdf
三个皮匠报告:2025中国情绪消费市场洞察报告(24页).pdf
2025刘润年度演讲PPT:进化的力量.pdf
三个皮匠报告:2025中国AI芯片市场洞察报告(24页).pdf
清华大学:2025年AIGC发展研究报告4.0版(152页).pdf
深圳人工智能协会:2025人工智能发展白皮书(144页).pdf
三个皮匠报告:2025银发经济生态:中国与全球实践白皮书(PPT版)(55页).pdf
三个皮匠报告:2025中国稀土产业市场洞察报告-从资源到战略武器,中美博弈的稀土战场(25页).pdf
三个皮匠报告:2025年 i 人经济洞察报告:社恐如何重塑新消费市场(23页).pdf