Do Smart Contract Languages Need to Be Turing Complete?

@inproceedings{Jansen2019DoSC,
  title={Do Smart Contract Languages Need to Be Turing Complete?},
  author={Marc Jansen and Farouk Hdhili and Ramy Gouiaa and Ziyaad Qasem},
  booktitle={BLOCKCHAIN},
  year={2019}
}
Blockchain based systems become more and more prominent. While starting by developing (crypto)currency payment schemes, a lot of the latest development goes in the direction of executing source code directly in the peer-to-peer network blockchains are usually built on. These so called smart contracts have become popular in order to reduce the amount of necessary middle-mans involved in different processes. Despite the large amount of research already invested in the design of languages which… 
SoK: TEE-assisted Confidential Smart Contract
TLDR
This work investigates and categorizes the existing TEE-assisted smart contracts into two types: the layer-one solution and layer-two solution, and establishes an analysis framework to capture their common lights, covering the desired properties, threat models, and security considerations.
Analysis of a Consensus Protocol for Extending Consistent Subchains on the Bitcoin Blockchain
TLDR
This paper proposes an improved version of a consensus protocol formalized in the previous work, built on top of the Bitcoin protocol, to incentivize third-party nodes to consistently extend their subchains, and performs an extensive analysis of this protocol.
A Survey on Blockchain Consensus with a Performance Comparison of PoW, PoS and Pure PoS
TLDR
A review of the main consensus procedures, including the new consensus proposed by Algorand: Pure Proof-of-Stake—Pure PoS is presented, which provides a framework to compare the performances of PoW, PoS and the Pure PoS, based on throughput and scalability.
SCUR: Smart Contracts with a Static Upper-bound on Resource Usage
  • Markus Knecht, B. Stiller
  • Computer Science
    2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
  • 2020
TLDR
This work proposes a new approach enabling security benefits by defining an upper-bound on resource usage for general SCs, and allows for the payment of fees in any currency and not just the native currency of the BC.
How Do Smart Contracts Benefit Security Protocols?
TLDR
This paper investigates state of the art studies and establishes a formalized model of smart contract protocols with well-defined syntax and assumptions and abstracts three generic properties and identifies two patterns: (1) a smart contract can be as an autonomous subscriber to assist the trusted third party (TTP); (2) aSmart contract can replace traditional TTP.
General Concept of Real Estate Tokenization on Blockchain
TLDR
The research introduces a theory of a Title Token – a digital record of ownership on the blockchain that is the key to decentralization and introduces a theoretical basis for developing a new type of property registries.
Gravity: a blockchain-agnostic cross-chain communication and data oracles protocol
TLDR
The concept of Oracle Consensus is introduced and its implementation in the Gravity protocol named the Pulse Consensus algorithm allows Gravity to be considered a singular decentralized blockchain-agnostic oracle.
SMART ENERGY SYSTEMS WITH SMART CONTRACTS
TLDR
This paper gets a holistic review in the smart contract life cycle, what potential new vulnerabilities and threats will they introduce and how can they be prevented, and what smart contract specific issues programmers should focus on.
Smart contracts in energy systems: A systematic review of fundamental approaches and implementations
SodsMPC: FSM based Anonymous and Private Quantum-safe Smart Contracts
  • S. Dolev, Ziyu Wang
  • Computer Science, Mathematics
    2020 IEEE 19th International Symposium on Network Computing and Applications (NCA)
  • 2020
TLDR
All SodsMPC components, including a verifiable secret sharing scheme, are quantum-safe, asynchronous, coping with t < n/3 compromised servers, and robust (tolerates Byzantine servers) in both preprocessing and online phases.
...
...

References

SHOWING 1-8 OF 8 REFERENCES
Sustainable blockchain-enabled services: Smart contracts
TLDR
The smart-contract focused methods introduced in this paper contribute to the overall goal towards a sustainable adaptive mechanism for processing evolving volumes, versatility, and complexity of blockchain transactions, traffic, and services.
Formal Verification of Smart Contracts: Short Paper
TLDR
This paper outlines a framework to analyze and verify both the runtime safety and the functional correctness of Ethereum contracts by translation to F*, a functional programming language aimed at program verification.
Turing Complete Bitcoin Script White Paper
TLDR
The invention of an Oracle module that continuously monitors the state of Blockchain and implements looping constructs that makes the combined Oracle and Blockchain system Turing Complete.
A critical review of blockchain and its current applications
TLDR
This paper thoroughly review state-of-the-art blockchain-related applications emerged in the literature and a number of published works were carefully included based on their contributions to the blockchain's body of knowledge.
A Survey of Attacks on Ethereum Smart Contracts (SoK)
TLDR
This work analyses the security vulnerabilities of Ethereum smart contracts, providing a taxonomy of common programming pitfalls which may lead to vulnerabilities, and shows a series of attacks which exploit these vulnerabilities, allowing an adversary to steal money or cause other damage.
An Unsolvable Problem of Elementary Number Theory
Terms and Conditions of Use provides, in part, that unless you have obtained prior permission, you may not download an entire issue of a journal or multiple copies of articles, and you may use
Understanding a Revolutionary and Flawed Grand Experiment in Blockchain: The DAO Attack
TLDR
The DAO experiment failed shortly after inception as an anonymous hacker stole over $50M USD worth of Ethers out of $168M invested and the Ethereum community voted to return the state of the network to one prior to the hack.