The BIMA workshop is organized by the members of the Blockchain Project of the Digital Transformation group at the Norwegian University of Science and Technology. The Digital Transformation group conducted a series of internal workshops in the past and opens now up to invite researchers, practitioners and policy makers with this workshop and 2 co-located hackathons:
- Self-sovereign identity
- Off-chain Scaling with the Lightning Network.
The goal of the BIMA workshop is to encourage people working in decentralised systems to get together and discuss the potential disruption as well as the impact blockchain technologies can have on the fabric of our society, with specific focus on Institutions, Mobility and Anonymity.
Fundamental concepts of Blockchain Technology, such as autonomous and anonymous decentralisation of trust, represent a disruption in a number of contemporary areas where centralised solutions are used. The workshop shoud be of interest to finance and fintech, cloud computing providers, social, non-governmental and governmental institutions, mobile applications, identity systems, and many others. The technology also have an impact on self-organised groups such as in open source software development, and self-sovereign identity systems. All of these can benefit, or be disrupted, by the innovation in the blockchain research.
Self-sovereign institutions and ability to part-take in efficient decentralised organisations is one of the holy grails of Blockchain technology researchers and enthusiasts. This line of work has its roots in cyberpunk movement and libertarian worldviews, and has been an initial trigger to blockchain experiments and world deployments of open public blockchain systems. The early DAO experiments demonstrated inherent issues and problems with such decentralised organizations. Can these issues be solved?
Blockchain technology disruption in the mobile, IoT, and vehicle network space is already visible, however, most of the mainstream research is focused on systems that rely on servers and fixed network connectivity. This might be counter-intuitive that technology focused on decentralisation itself relies on centralised service providers. What will happen when the network is down? Mobile blockchains and mobile blockchain applications can provide improved decentralisation and help in addressing the network connectivity problems by providing solutions based, for example, on mobile ad-hoc peer-to-peer mesh networks, such as those used for vehicle-to-vehicle communication.
We encourage discussion and submissions on decentralised networking, decentralised infrastructures, ad-hoc and mesh networks, and related areas in the context of blockchain and blockchain applications.
Anonymity and pseudo-anonymity offered by the existing decentralised public blockchain systems is already disrupting the financial and legal spheres. It impacts the social organisation, export control, value transfer control, and value transfer in general. It also disrupts the identity management.
While the pseudo-anonymity aspect of blockchain systems is already appreciated by its users, anonymous blockchain systems are on the rise. They enhance both the application and the network layer by adding privacy preserving techniques. Connections between transactions and identities are obscured. The origin of a published transaction is hidden. On the other hand, many anonymity schemes still leak data: By applying heuristics on analyzed on-chain and network data of blockchain systems one can remove the added privacy benefits.
Are current solutions secure? Can existing anonymity techniques be strengthen? How can privacy-enhanced systems be monitored and kept internally consistent, without sacrificing privacy?
This workshop allows two type of submissions:
- Extended abstracts of maximum 2 pages, including references. Those can be based on work in progress, like PhD projects. The work with the extended abstracts can be published elsewhere.
- Full submissions of maximum 8 pages, including references. This must be original and not simultaneously submitted to another journal or conference.
Each full submission will be peer-reviewed by at least two experts in the field for originality, significance, clarity, impact, and soundness and is supposed to be published in conference proceedings
All submissions must be handed in via easy chair at: https://easychair.org/my/conference?conf=intap2020#
Further details to be provided after negotiations with the publisher.
Special Issue journal publication
The workshop participants are encouraged to consider a submission of an extended version of their contributions to a Special Issue “Blockchain-Based Technology for Mobile Application”, on open access journal Electronics (IF 1.764, ISSN 2079-9292). The submission deadline is 31 August 2020, and papers maybe submitted immediately or at any point until 31 August 2020, as papers will be published on an ongoing basis.
Please check detailed information about this special issue at the following link: https://www.mdpi.com/journal/electronics/special_issues/BTMA
Electronics is a peer-reviewed, open access journal on the science of electronics and its applications. The journal is indexed by the Science Citation Index Expanded (Web of Science), Inspec (IET), and Scopus. Its Impact Factor is 1.764 (2018). The CiteScore 2018 is 2.49.
Please get in touch if you have any questions to the assistant editor: email@example.com
List of Topics
- Decentralised Autonomous Organisations
- Decentralised Autonomous Institutions
- Institutions utilising blockchain technology
- Self-sovereign Institutions
- Decentralised networking layers
- Ad-hoc blockchains, ad-hoc networks
- Off-chain (off-network) transactions
- Network-less payment systems
- Vehicle-to-vehicle blockchain applications
- Decentralised IoT networks
- Anonymity, Pseudo-anonymity & Privacy
- Self-sovereign identity systems
- Blockchain forensics
- Colin Boyd (Prof., NTNU)
- Mariusz Nowostawski (Assoc.Prof., NTNU)
- Mariusz Nowostawski
- Javed Ahmed - Assistant Professor of Computer Science, Sukkur IBA University, Pakistan
- Christopher Frantz - Assoc. Prof. Computer Science, NTNU, Norway
- Sheikh Idrees
- Pedro Gómez, Hoplite Software, Salamanca, Spain
- Jingye Li - Assoc. Prof. Computer Science, NTNU, Norway
- Abylay Satybaldy
- Hao Wang - Assoc. Prof. Computer Science, NTNU, Norway
- Bartlomiej Slawski, Senior Vice President, European Private Equity Fund, Warsaw, Poland
- Bian Yang - Assoc. Prof. Computer Science, NTNU, Norway
- Md Sadek Ferdous - Assistant Professor, Department of CSE, SUST, Sylhet, Bangladesh, Research Associate, Centre for Global Finance and Technology, Imperial College Business School, London, UK
- Paul Kengfai Wan
- Michael Ziegler
- Mitsuaki Nakasumi - Prof. Economics , Komazawa University
- Juan Caballero - Communications/Research at Spherity
- Wilfried Pimenta de Miranda - Business Dev Director / Nordics at the IOTA Foundation, CEO at Alpha Venturi
- Abylay Satybaldy
- Sheikh Idrees
- Rene Pickhardt
- Linda Derawi
- Snorre Lothar von Gohren Edwin (Co-Founder & CTO, Diwala)
BIMA-2020 proceedings will be published in (currently negotiating with Springer).
There is an option to submit extended version of submissions, with the deadline of 31st of August, 2020, to special issue journal publication (see above).
The workshop will take place in Gjovik, which is 120km north of Oslo. It is collocated with INTAP 2020 - 3rd International Conference on Intelligent Technologies and Applications
Abstract registration deadline
July 5, 2020
July 5, 2020
July 12, 2020
July 14, 2020
Special Issue journal submission
August 31, 2020
All questions about submissions should be emailed to:
- Rene Michael Pickhardt -- rene.m.pickhardt at ntnu.no
SSI Hackathon 2020
The Self-Sovereign Identity ecosystem consists of a transparent trust framework and associated common infrastructure, empowers people and organizations to drive societal change.
This hackathon track strives to contribute open source technical enhancements and extensions for SSI framework. Participants will collaborate and deliver solutions by utilizing a set of open standards (including DIDs, VC, and the once under work DIDComm, Secure Data Storage). We also want to see the usage of open-source technologies (e.g. Hyperledger Aries, DAF Framework from uPort). A list and links to possible open source technologies exists here: Existing librariers & Tools
Possible successful outcomes
- Showcase the concept “Bring your own identity”
- Examples of applications to showcase interoperability.
- Proof of Concept that integrates SSI protocols with other existing identity solutions (FIDO2, OpenID Connect).
- Peer to peer communication and data exchange solutions based on DIDs.
- Easy to use key recovery mechanisms for identity wallets.
- Showcase an example of cloud agent SSI solution
- Showcase an interoperable example of cloud agent SSI solution
- Secure storage example for data exchange
- Demonstrate its solutions fit and make sense in the bigger picture.
- Ensure interoperability.
- Ensure their technology is agnostic, open-source and scalable.
- The identity solution should adhere to existing standards, like DID & VC from W3C, the work happening at DIF and GDPR rules. It has to empower the users!
- All stakeholders (individuals, institutions, government) privacy and legal roles should be taken into account.
Interoperability, user-centric, privacy-enhancing.
All questions about the hackathon should be emailed to:
Abylay Satybaldy -- abylay.satybaldy at ntnu.no
Lightning Network Scaling Hackathon 2020
The Lightning network is the designated scaling solution to Bitcoin and on mainnet since the beginning of 2018. This hackathon aims to bring together people who want to gain a better understanding of the lightning network protocol and gain experiences with it or who want to build small research oriented projects with existing implementations of the Protocol (c-Lightning, lnd, eclair, rust-lightning)
Read the specification of the Protocol at: https://github.com/lightningnetwork/lightning-rfc
Possible successful outcomes
- Lapps (Lightning Network Applications)
- Backup solutions
- Anlytics solutions
- Statistical analysis (of the network or log files)
- Protocol Extensions
- Path finding strategyies
- Proof of Concepts
All questions about the Lightning hackathon should be emailed to:
Rene Pickhardt -- rene.m.pickhardt at ntnu.no