Bookkeeping and ledgers
An increasingly extensive and complex financial system gave rise to the need for trusted intermediaries and credible accounting systems. The development of double-entry bookkeeping in Renaissance Italy was a major innovation that strengthened the role of large private banks. In modern times, central banks emerged at the apex of payment systems. With computerized bank ledgers, the coordinating role of central banks increased.
How do such ledgers work? Financial institutions adjust the positions of their account holders in their internal ledgers, while the central bank validates transactions among financial institutions in a central ledger. For example, Mehrnaz uses money from her account in bank A to buy goods from Mary, who has an account in bank B. Bank A debits the money from Mehrnaz’s account. The central bank moves money from bank A to bank B and records the transaction in its central ledger. Bank B then adds the money to Mary’s account. As you can see, the system is based on trust in the central bank and in its ability to safeguard the integrity of the central ledger and ensure that the same money is not spent twice.
With many cryptocurrencies, on the other hand, there is no need for a trusted central agent. Instead, they rely on distributed ledger technology, such as blockchain, to construct a ledger (effectively a database) that is maintained across a network. To ensure that the same cryptocurrency is not spent twice, each member of the network verifies and validates transactions using technologies derived from computing and cryptography. Once a decentralized consensus is achieved among members of the network, the transaction is added to the ledger, which is validated. The ledger provides a complete history of the transactions associated with a particular cryptocurrency that is permanent and cannot be manipulated by a single entity. This ability to achieve consensus on the validity of transactions between accounts in a distributed network is a foundational technological shift.
Network members who verify and validate transactions are usually rewarded with newly minted cryptocurrency. Many cryptocurrencies are also pseudo-anonymous: holders of the currency have two keys. One is public, such as an account number; another, private key is required to complete a transaction. So, to continue the previous example, Mehrnaz wants to buy goods from Mary using a cryptocurrency. To do so, she initiates a transaction with her private key. Mehrnaz is identified in the network by her public key, ABC, and Mary is identified by hers, XYZ. Network members verify that ABC has the money she wants to transfer to XYZ by solving a cryptography puzzle. Once the puzzle is solved, the transaction is validated, a new block representing the transaction is added to the blockchain, and the money is transferred from ABC’s wallet to XYZ’s.