Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Crypto Art: A Decentralized View

View through CrossRef
Abstract Crypto art is limited-edition digital art, cryptographically registered with a token on a blockchain. Tokens represent a transparent, auditable origin and provenance for a piece of digital art. Blockchain technology allows tokens to be held and securely traded without the involvement of third parties. Crypto art draws its origins from conceptual art—sharing the immaterial and distributive nature of artworks, the tight blending of artworks with currency and the rejection of conventional art markets and institutions. The authors propose a collection of viewpoints on crypto art from different actors within the system: artists, collectors, gallerists, art historians and data scientists. A set of emerging themes and open challenges surfaces.
Title: Crypto Art: A Decentralized View
Description:
Abstract Crypto art is limited-edition digital art, cryptographically registered with a token on a blockchain.
Tokens represent a transparent, auditable origin and provenance for a piece of digital art.
Blockchain technology allows tokens to be held and securely traded without the involvement of third parties.
Crypto art draws its origins from conceptual art—sharing the immaterial and distributive nature of artworks, the tight blending of artworks with currency and the rejection of conventional art markets and institutions.
The authors propose a collection of viewpoints on crypto art from different actors within the system: artists, collectors, gallerists, art historians and data scientists.
A set of emerging themes and open challenges surfaces.

Related Results

Handling Of Crypto Assets As Evidence In Criminal Cases
Handling Of Crypto Assets As Evidence In Criminal Cases
The increasing number of users and transactions of crypto assets every year has the potential to increase the modus operandi of criminal acts that use crypto assets, either as a to...
Volume 10, Index
Volume 10, Index
<p><strong>Vol 10, No 1 (2015)</strong></p><p><strong> </strong></p><p><a href="http://www.world-education-center.org/index...
Study of Factors Influencing Consumer to Adopt Cryptocurrency
Study of Factors Influencing Consumer to Adopt Cryptocurrency
Cryptocurrencies have become one of the most traded financial assets in the last decade. The first half of 2022 will not be easily forgotten by the crypto faithful as it shifted in...
Decentralized rural electrification, human development and equality: a case study of two villages in the dry zone area of Myanmar
Decentralized rural electrification, human development and equality: a case study of two villages in the dry zone area of Myanmar
Myanmar, a newly democratic and developing country has the lowest electrification level among the ASEAN region. The electrification rate for the whole country was 11% in 2005, whic...
Crypt-Pay (WEB-3.0)
Crypt-Pay (WEB-3.0)
Embark on an extensive and immersive journey into the fascinating realm of Web 3.0 technologies and methodologies, where the decentralized internet, driven by blockchain and smart ...
Secure Data Sharing in Decentralized Networks: Encryption Techniques, Access Control Mechanisms, and Data Integrity Verification
Secure Data Sharing in Decentralized Networks: Encryption Techniques, Access Control Mechanisms, and Data Integrity Verification
The introduction of decentralized systems in a rapidly changing technological world has introduced many issues and risks regarding privacy and secure data exchange. This paper addr...
Secure Data Sharing in Decentralized Networks: Encryption Techniques, Access Control Mechanisms, and Data Integrity Verification
Secure Data Sharing in Decentralized Networks: Encryption Techniques, Access Control Mechanisms, and Data Integrity Verification
The introduction of decentralized systems in a rapidly changing technological world has introduced many issues and risks regarding privacy and secure data exchange. This paper addr...
A review of cryptographic properties of S-boxes with generation and analysis of crypto secure S-boxes.
A review of cryptographic properties of S-boxes with generation and analysis of crypto secure S-boxes.
In modern as well as ancient ciphers of public key cryptography, substitution boxes find a permanent seat. Generation and cryptanalysis of 4-bit as well as 8-bit crypto S-boxes is ...

Back to Top