为广大币圈朋友提供币圈基础入门专业知识!
当前位置首页 > 比特币基础> 正文

区块链能被破解吗知乎,区块链能被破解吗

发布时间:2023-12-09-17:44:00 来源:网络 比特币基础 区块   链能被

区块链能被破解吗知乎,区块链能被破解吗

区块链能被破解吗?这是一个很多人都想要知道的问题,因为区块链技术已经被广泛应用于金融、物联网、数据存储等领域,它的安全性和可靠性对于这些领域来说都非常重要。本文将介绍三个与区块链安全相关的关键词:51%攻击、拜占庭容错算法和零知识证明。

51%攻击:51%攻击是一种比特币区块链上的攻击方式,它是指攻击者拥有比特币网络的大多数算力,可以控制网络的确认交易,从而篡改交易记录,或双花花费,从而破坏整个网络的安全性。如果攻击者成功控制了网络,他们可以拒绝其他人的交易,拒绝挖矿奖励,甚至可以发行虚拟货币,从而破坏区块链的安全性。

拜占庭容错算法:拜占庭容错算法是一种可以用来保护区块链系统免受51%攻击的算法,它可以检测出网络中的故障节点,并将其替换为新的节点,从而使网络的安全性得到提高。拜占庭容错算法的原理是,当网络中有大量节点出现故障时,它可以将其自动替换,从而保证网络的安全性。

零知识证明:零知识证明是一种可以用来保护区块链系统安全的算法,它可以在不暴露用户隐私的情况下,验证用户的身份和交易记录的真实性。零知识证明的原理是,它可以在不暴露用户隐私的情况下,验证用户的身份和交易记录的真实性,从而保护用户的隐私,保护区块链系统的安全性。

以上就是关于区块链能被破解吗的相关关键词:51%攻击、拜占庭容错算法和零知识证明的介绍。51%攻击是一种比特币区块链上的攻击方式,拜占庭容错算法可以检测出网络中的故障节点,而零知识证明可以在不暴露用户隐私的情况下,验证用户的身份和交易记录的真实性,从而保护区块链系统的安全性。


请查看相关英文文档

❶ Why no one hacks Bitcoin

1. Bitcoin is a peer-to-peer electronic cash system based on blockchain technology. The total number of Bitcoins is 21 million. There will be no more and no less, and in a Bitcoin transaction, the transaction content will be broadcast to the entire network of users. If more than 50% of the transactions are approved, the transaction will be recognized, so even if the hacker has modified himself If the account balance is not recognized by more than 50% of the world's users, there will still be as many coins as there should be.
2. Member nodes in the blockchain network do not rely on third parties (such as financial institutions) to arbitrate transactions. They use consistency protocols to negotiate ledger contents, and use cryptographic hashing algorithms and digital signatures to ensure the authenticity of transactions. Integrity. Consistency: This ensures that the shared ledger is an exact copy and reduces the risk of transaction fraud, since tampering needs to be performed in many places at the same time.
3. Password hashing algorithm: (such as SHA256 calculation algorithm) can ensure that any changes to the transaction input - even the smallest change - will calculate a different hash value, indicating that the transaction input may be corrupted.
4. Digital signature: Ensure that the transaction originates from the sender (signed with the private key) and not from an impostor. Decentralized peer-to-peer blockchain networks prevent any single or group of participants from taking control of the underlying infrastructure or disrupting the entire system. Participants in the network are equal and abide by the same protocols. They can be individuals, state representatives, businesses or a combination of all three actors. At its core, the system records the chronology of transactions, and all nodes agree on the validity of transactions using a chosen consensus model. This makes the transaction irreversible and accepted by all members of the network.
Extended information:
1. The concept of Bitcoin was first proposed by Satoshi Nakamoto on November 1, 2008, and was officially born on January 3, 2009.
2. Design and release the open source software based on Satoshi Nakamoto’s ideas and build the P2P network on top of it. Bitcoin is a P2P form of digital currency. Bitcoin’s transaction records are open and transparent. Peer-to-peer transmission means a decentralized payment system.
3. Unlike most currencies, Bitcoin does not rely on the issuance of a specific monetary institution. It is generated through a large amount of calculations based on a specific algorithm. The Bitcoin economy uses a distributed database composed of many nodes in the entire P2P network to confirm and record All transactions use cryptographic design to ensure the security of all aspects of currency circulation. The decentralized nature of P2P and the algorithm itself ensure that currency value cannot be artificially manipulated by mass production of Bitcoins. Design based on cryptography allows Bitcoin to be transferred or paid only by real owners. This also ensures the anonymity of currency ownership and circulation transactions. The total number of Bitcoins is very limited and is scarce. The currency system had no more than 10.5 million coins in 4 years, after which the total number will be permanently limited to 21 million coins.
4.In June 2021, El Salvador passed the "El Salvador Bitcoin Law", which makes Bitcoin legal tender in the country. On September 7, Bitcoin officially became El Salvador’s legal tender, becoming the first country in the world to grant legal status to digital currencies.
5. On September 24, 2021, the People's Bank of China issued a notice to further prevent and deal with the risks of speculation in virtual currency transactions. The notice states that virtual currencies do not have the same legal status as legal tender.
6. On November 10, 2021, the price of Bitcoin hit a record high again, approaching US$69,000 per coin for the first time.

❷ Lesson 3 of Shuowenjiezi: Blockchain

A few years ago, there was a Bitcoin trend, and readers may have thought about it at that time. I have heard of blockchain, but recently domestic and foreign financial institutions have begun to study and launch financial services based on blockchain technology. What is so special about it that it can attract the favor of formal financial institutions?

Decentralized accounting system

Blockchain is one of the core technologies of Bitcoin. Its most important feature is its ability to create an untamperable and A centralized, highly transparent, and anonymous accounting system can provide low-cost, high-security transfer services, and can further be used as a financial management tool.

To understand the blockchain, we must first start with how it works. Taking the application of Bitcoin as an example, during each transaction, the system will seal the transaction content and related information into a set of blocks, and arrange all the blocks according to time to produce a so-called blockchain.

Since the blockchain records the information of every transaction in the world in detail, you can figure out which "wallet" is just by counting from the first data to the last data. How much "money" do you have.

It should be noted that the blockchain does not directly store the balance in each "wallet", but the flow of "money" in each transaction. Therefore, when querying the balance, you only need to verify the area By counting the authenticity of each piece of information in the blockchain, the final balance of each "wallet" can be obtained.

Since generating blocks requires complex cryptographic calculations, if a centralized server is used for calculations, many high-performance computers will need to be prepared to meet the demand. However, Bitcoin’s approach is to distribute operations to all computers that perform “mining.” These computers are called nodes and will receive a certain amount of rewards after verifying transactions and encapsulating blocks. Therefore, there will be many miners trying to earn Bitcoins. Bitcoins are put into computers for calculation, so that no specific server is needed, but all calculation work is distributed to various nodes of the Bitcoin network.

▲The blockchain is formed by connecting many blocks in series. Since it can record transfers from the first to the last and has a high degree of security, it is very suitable for financial applications. . (Image source: Bitcoin:A Peer-to-Peer Electronic Cash System)

Theoretically it can be cracked, but in practice it is not feasible

During the operation of the blockchain, All nodes will jointly verify each newly added block to ensure the correctness of the transaction. When the block information recorded by some nodes does not match that of other nodes, other nodes will not recognize the transaction, so the transaction record will not be consistent. will be written to the blockchain.

However, the security of blockchain is not theoretically unbreakable. As long as someone can control more than half of the computing performance of the entire network (that is, control 51% of the computing performance), it can create fake transaction records and ensure that it can complete the block operation before other nodes complete the operation and raise objections. The data is written to the blockchain so that it can modify its own transaction records and reuse the same bitcoin for payment.

Using video games as a simple example, this attack is like using a cheat, which can modify the money to never decrease.

However, from a practical point of view, there are many users of Bitcoin, so there are quite a few nodes in the network, including many professional miners who use special computers to perform calculations, so the computing power of all nodes The total value is quite large, and it is difficult for ordinary people or organizations to grasp 51% of computing performance by themselves.

Assuming that the current computing power of all nodes is equivalent to 100 supercomputers, then the attacker would need to prepare 101 supercomputers to obtain more than half of the computing performance, which is unlikely to be achieved in the actual implementation.

If you take a step back and think about it, assuming that someone can really control more than half of the computing performance, then he can also monopolize the issuance of Bitcoin and transaction fees, and earn considerable profits from it. On the contrary, if If he chose to tamper with transaction data, Bitcoin users would lose confidence in the currency, causing the value of Bitcoin to collapse, or even "banknotes turning into wallpaper" overnight.

Therefore, assuming that the attacker is motivated by profit, then even if he can launch a 51% attack, he will not do so. This will ensure that Bitcoin and the blockchain are still safe.

▲Bitcoin is one of the most representative application examples of blockchain.

Example of using Shuowenjiezi: Blockchain

O: Blockchain can distribute the load of verifying transactions to everyone in the network node.

X: After parking the bicycle, remember to lock it with the blockchain.

❸ Blockchain, how to solve the financing difficulties of small and medium-sized enterprises

In recent years, companies arrears with wages and bosses run away have become commonplace in the news, "Jiangnan" Jokes about "tannery" also appear on social media from time to time. These haveThe constant "news" has repeatedly reminded everyone that the old problems of corporate financing for many years have become long-term unresolved "new" dilemmas. Everyone is wondering if there is any way to solve the problem. With the development of financial technology, Maybe blockchain is bringing new ideas to this old problem?

Economic Perspective Viewing the World WeChat Official Account [Jianghan Vision Observation] ID: jianghanview

❹ How to ensure the safety of blockchain use

Blockchain itself solves the problem of large-scale collaboration between strangers, that is, strangers can collaborate with each other without trusting each other. So how to ensure trust between strangers to achieve each other's consensus mechanism? The centralized system uses credible third-party endorsements, such as banks. Banks are regarded as reliable and trustworthy institutions by ordinary people. People can trust banks and let banks resolve real-life disputes. But how does a decentralized blockchain ensure trust?
In fact, blockchain uses the basic principles of modern cryptography to ensure its security mechanism. The knowledge system involved in the field of cryptography and security is very complicated. I will only introduce the basic knowledge of cryptography related to blockchain, including Hash algorithm, encryption algorithm, information digest and digital signature, zero-knowledge proof, quantum cryptography, etc. You can use this lesson to understand how the blockchain using cryptography technology can ensure its confidentiality, integrity, authentication and non-repudiation.
Lesson 7 of the basic course: Basic knowledge of blockchain security
1. Hash algorithm (Hash algorithm)
Hash function (Hash), also known as hash function. Hash function: Hash (original information) = digest information. The hash function can map a binary plaintext string of any length into a shorter (usually fixed-length) binary string (Hash value).
A good hash algorithm has the following 4 characteristics:
1. One-to-one correspondence: The same plaintext input and hash algorithm can always get the same summary information output.
2. Input sensitivity: Even if there is any slight change in the plain text input, the newly generated summary information will change greatly, which is hugely different from the original output.
3. Easy to verify: both the plaintext input and the hash algorithm are public, and anyone can calculate by themselves whether the output hash value is correct.
4. Irreversible: If there is only the output hash value, it is absolutely impossible to deduce the plaintext from the hash algorithm.
5. Conflict avoidance: It is difficult to find two plaintexts with different contents, but their hash values ​​are consistent (collision occurs).
Example:
Hash (Zhang San lent Li Si 100,000, with a loan period of 6 months) = 123456789012
A record of 123456789012 is recorded in the ledger.
It can be seen that the hash function has 4 functions:
Simplified information
Easy to understand, the hashed information becomes shorter.
Identification information
You can use 123456789012 to identify the original information, and the summary information is also called the id of the original information.
Concealed information
The ledger contains a record such as 123456789012, and the original information is concealed.
Verification information
If Li Si deceives when repaying the loan, Zhang San only lent Li Si 50,000, both parties can use the hash value and the previously recorded hash value 123456789012 to verify the original information
Hash (Zhang San lent Li Si 50,000, with a loan period of 6 months) = 987654321098
987654321098 is completely different from 123456789012, which proves that Li Si lied, successfully ensuring that the information cannot be tampered with .
Common Hash algorithms include MD4, MD5, and SHA series algorithms. Nowadays, the SHA series algorithms are basically used in mainstream fields. SHA (Secure Hash Algorithm) is not an algorithm, but a set of hash algorithms. It was originally the SHA-1 series. Now the mainstream applications are SHA-224, SHA-256, SHA-384, and SHA-512 algorithms (commonly known as SHA-2). Recently, SHA-3 related algorithms have also been proposed, such as those used by Ethereum. KECCAK-256 belongs to this algorithm.
MD5 is a very classic Hash algorithm, but unfortunately both it and the SHA-1 algorithm have been cracked, and are considered by the industry to be not secure enough to be used in commercial scenarios. It is generally recommended to use at least SHA2-256 or higher. Safe algorithm.
Hash algorithms are widely used in blockchains. For example, in a block, the next block will contain the hash value of the previous block, and the content of the next block + the hash value of the previous block The hash values ​​are used together to calculate the hash value of the next block, ensuring the continuity and non-tamperability of the chain.
2. Encryption and decryption algorithms
Encryption and decryption algorithms are the core technology of cryptography. They can be divided into two basic types in terms of design concepts: symmetric encryption algorithms and asymmetric encryption algorithms. They are distinguished according to whether the keys used in the encryption and decryption processes are the same. The two modes are suitable for different needs and form a complementary relationship. Sometimes they can also be used in combination to form a hybrid encryption mechanism.
Symmetric encryption algorithm (symmetric cryptography, also known as public key encryption, common-key cryptography) uses the same encryption and decryption keys. Its advantages are high computational efficiency and high encryption strength; its disadvantage is that it needs to be advanced in advance. Shared key, easy to leak and lose the key. Common algorithms include DES, 3DES, AES, etc.
Asymmetric cryptography, also known as public-key cryptography), is different from the encryption and decryption keys. Its advantage is that it does not need to share the key in advance; its disadvantage is that the calculation efficiency is low and it can only encrypt short content. Common algorithms include RSA, SM2, ElGamal and elliptic curve series algorithms. Symmetric encryption algorithm is suitable for the encryption and decryption process of large amounts of data; it cannot be used in signature scenarios: and the key often needs to be distributed in advance. Asymmetric encryption algorithms are generally suitable for signature scenarios or key negotiation, but are not suitable for encryption and decryption of large amounts of data.
3. Information Digest and Digital Signature
As the name suggests, information digest is to perform a Hash operation on the information content to obtain a unique summary value to replace the original complete information content. Information summary is the most important use of the Hash algorithm. Utilizing the anti-collision characteristics of the Hash function, information summary can solve the problem that the content has not been tampered with.
Digital signatures are similar to signing on paper contracts to confirm contract content and prove identity. Digital signatures are based on asymmetric encryption and can be used to prove the integrity of a certain digital content and at the same time confirm the source (or non-repudiation) .
We have two property requirements for digital signatures that make them consistent with what we expect from handwritten signatures. First, only you can make your signature, but anyone who sees it can verify its validity; second, we want the signature to be relevant only to a specific file and not to other files. These can all be used to achieve digital signatures through our asymmetric encryption algorithm above.
In practice, we generally sign the hash value of the information rather than the information itself. This is determined by the efficiency of the asymmetric encryption algorithm. Corresponding to the blockchain, the hash pointer is signed. If this method is used, the previous one is the entire structure, not just the hash pointer itself.
4. Zero Knowledge proof
Zero knowledge proof means that the prover makes the verifier believe that a certain assertion is correct without providing any additional information to the verifier.
Zero-knowledge proofs generally meet three conditions:
1. Completeness: a true proof can allow the verifier to successfully verify;
2. Reliability (Soundness): a false proof It is impossible for the verifier to pass the verification;
3. Zero-Knowledge: If it is proved, no information other than the proof information can be learned from the proof process.
5. Quantum cryptography
As the research on quantum computing and quantum communication receives more and more attention, quantum cryptography will have a huge impact on cryptographic information security in the future.
The core principle of quantum computing is to use qubits to processBased on multiple coherent superposition states, a large amount of information can theoretically be expressed through a small number of qubits and processed simultaneously, greatly increasing the calculation speed.
In this case, a large number of current encryption algorithms are theoretically unreliable and can be cracked, which makes the encryption algorithms have to be upgraded, otherwise they will be broken by quantum computing.
As we all know, quantum computing is still in the theoretical stage and is still far away from large-scale commercial use. However, the new generation of encryption algorithms must take into account the possibility of this situation.

❺ Will the blockchain be attacked by hackers

Blockchain is a "consensus" implementation technology. Through the blockchain, all transactions on the Internet can be recorded for block The users of the chain realize "consensus" and the information content on the chain "cannot be tampered with". This "non-tamperability" increases the cost of malicious tampering of content through the existence of multiple copies in the system. “Blockchain is not a privacy solution. It is a verification solution. It is very important to understand this. Blockchain can definitely be combined with other technologies to create various systems that help users better manage their data, but These systems cannot prevent data leaks." Blockchain technology can solve the problem of identity hacking because if your identity is controlled by a private key and you keep that private key yourself, then there is no way to hack your identity. Or at least the likelihood of an attack is very low compared to traditional database systems." Blockchains are all based on a mechanism, and the information on the blockchain is immutable. "One of the greatest values ​​of blockchain is that you You cannot change the value at will as an administrator. No one controls the blockchain. This is short-term. "Technically speaking, blockchain alone may not be the solution to data hacking and identity theft, but it is still a major technological leap in personal information security, and information security changes from cyberspace to routine.

❻ Can the Haomeiji Financial Network blockchain fraud case be solved? It is estimated that hundreds of people were defrauded, and the amount involved was tens of millions

In this Haomeiji Financial Network, because many people Everyone wants more, so this case involves hundreds of people being defrauded, and the amount is tens of millions. It may be a bit difficult to solve this case, because you went there with your heart, work, emotion, and willingness. Isn’t it so beautiful? It’s hard to break the saying that finance pulls you there.

❼ Personal understanding and thoughts on blockchain technology

I know blockchain It has been less than 3 months since I started to understand the blockchain. From my limited understanding and knowledge, I have some ideas. The following are my personal views and associations about the latest technology of the blockchain.

The first feature of the blockchain is its encryption method. It uses a 256-bit hash algorithm. According to current technology, it cannot be reversely cracked. In other words, no one has the ability to open a keyless Lock. This does not exist in the real world. In today’s world, no matter how strong the lock is, it can be cracked. This technologyOne of the most important issues solved by technology is privacy protection and security. From this technology, we can see that everyone in today's society actually has no sense of security. When it comes to a sense of security, everyone may think of it as physical safety. In fact, the word safety exists in every aspect of our lives. Blockchain technology first solves security problems with technology. This also makes everyone believe in his absolute safety. The first consensus emerged.

The second feature is decentralization. Human society has been centralized from the day it was established. The formation of tribes, families, nations, armies, and states. They are all manifestations of centralization.

Centralization means concentration of management. In this process of centralization of management, the whole world is pursuing democracy, giving rise to democratic centralism. Various forms of democracy are actually just conceptual manifestations. True democracy is difficult to form in a centralized structure. Looking at all the advanced social systems in the world, they are not true democracies. First of all, I think democracy cannot be hierarchical. In other words, it cannot be top-down. Democracy is the best embodiment of equality. Human beings have been pursuing freedom and equality for thousands of years. Discover that absolute freedom and equality are impossible to achieve. So from the moment the decentralized concept of blockchain emerged. The idealistic concept of freedom and equality seems to be emerging. Let the whole society see the possibility of realizing freedom, equality and democracy. Although decentralization is an ideal, there is a glimmer of hope in the ideal. Everyone started to get excited. The current hype over cryptocurrencies such as Bitcoin is clearly beside the point. But it was really made possible by a group of idealists. It is this group of fanatical blockchain believers. Let blockchain influence the entire cryptocurrency market.

❽ Will there be highly intelligent criminals who can crack the blockchain encryption?

Think too much... Take sha256 as an example. The probability of you colliding with the private key is about the same. Yu finds a special atom among all the observable atoms in the universe. It is equivalent to winning millions of billion-yuan jackpots in a row. This has nothing to do with IQ. This encryption method is brutal and effective, and it is not high-tech.
In the future, blockchain encryption can be said to be crackable. Of course, it is not the current computer system, but a quantum computer. Once this thing is mass-produced, the blockchain will be obsolete.

❾ What are the core blockchain technologies of blockchain technology?


What is the hottest Internet topic at the moment? You don’t need to explain it to me, it’s blockchain. Blockchain technology, but many friends have only heard of this technology and do not have much in-depth understanding of it. So what are the blockchain technologies? Below we will bring you an introduction to the core technology of blockchain for your reference.
What are the core elements of blockchain technology?
Blockchain technology can be a public ledger (visible by anyone) or a permissioned network (visible only by those authorized), which solves supply chain challenges ,becauseBecause it is an immutable record, it is shared among network participants and updated in real time.
Blockchain technology----data layer: designing the data structure of the ledger
Core technology 1. Block + chain:
Technically speaking, block is a data structure that records transactions. Reflects the flow of funds for a transaction. The blocks of transactions that have been reached in the system are connected together to form a main chain, and all nodes participating in the calculation record the main chain or part of the main chain.
Each block consists of a block header and a block body. The block body is only responsible for recording all transaction information in the previous period, mainly including the number of transactions and transaction details; the block header encapsulates the current version number, previous A block address, timestamp (recording the time when the block was generated, accurate to the second), random number (recording the value of decrypting the answer to the math question related to the block), the target hash value of the current block, and the Merkle number Root value and other information. From a structural point of view, most functions of the blockchain are implemented by the block header.
Core technology 2. Hash function:
The hash function can convert data of any length into a set of fixed-length codes through the Hash algorithm. The principle is based on a cryptographic one-way hash function. This kind of function is easy to verify, but difficult to crack. Usually, the industry uses y=hash(x) to represent it. This hash function implements operations on x to calculate a hash value y.
Commonly used hash algorithms include MD5, SHA-1, SHA-256, SHA-384 and SHA-512, etc. Taking the SHA256 algorithm as an example, inputting any string of data into SHA256 will result in a 256-bit Hash value (hash value). Its characteristics: the same data input will get the same result. As long as the input data changes slightly (for example, a 1 becomes a 0), a completely different result will be obtained, and the result cannot be predicted in advance. Forward calculation (calculating the corresponding Hash value from the data) is very easy. Reverse calculation (cracking) is extremely difficult and is considered impossible under current technological conditions.
Core technology 3. Merkle tree:
Merkle tree is a hash binary tree, which can be used to quickly verify the integrity of large-scale data. In the blockchain network, the Merkle tree is used to summarize all transaction information in a block, and ultimately generates a unified hash value of all transaction information in the block. Any change in transaction information in the block will cause Merkle tree changes.
Core technology 4. Asymmetric encryption algorithm:
Asymmetric encryption algorithm is a key secret method that requires two keys: public key and private key. The public key and the private key are a pair. If the public key is used to encrypt data, only the corresponding private key can be used to decrypt it, thereby obtaining the corresponding data value; if the private key is used to sign the data, then only the corresponding public key can be used to sign the data. In order to verify the signature, the sender of the verification information is the holder of the private key.
Because encryption and decryption use two different keys, this algorithm is calledAsymmetric encryption algorithm, while symmetric encryption uses the same key in the encryption and decryption process.
Blockchain technology----network layer: realize the decentralization of accounting nodes
Core technology 5. P2P network:
P2P network (peer-to-peer network), also known as point-to-point technology, is no Central server, Internet system that relies on user groups to exchange information. Unlike a centralized network system with a central server, each client in a peer-to-peer network acts as both a node and a server. Domestic Xunlei software uses P2P technology. The P2P network has the characteristics of decentralization and robustness.
Blockchain technology----Consensus layer: allocate the task load of accounting nodes
Core technology 6. Consensus mechanism:
Consensus mechanism is how to reach consensus among all accounting nodes to identify The validity of a record is both a means of identification and a means of preventing tampering. There are currently four main types of consensus mechanisms: PoW, PoS, DPoS and distributed consensus algorithms.
PoW (Proof of Work, proof of work): PoW mechanism, which is like Bitcoin’s mining mechanism, miners package existing transactions that have not been recorded by the network into a block, and then continue to traverse and try to find a random number , so that the hash value of the new block plus the random number meets certain difficulty conditions. Finding a random number that meets the conditions is equivalent to determining the latest block of the blockchain, and is also equivalent to obtaining the current round of accounting rights of the blockchain. Miners broadcast blocks that meet the mining difficulty conditions in the Yuanfu network. After verifying that the block meets the mining difficulty conditions and that the transaction data in the block meets the protocol specifications, other nodes in the entire network will each Blocks are linked to their own version of the blockchain, thereby forming a network-wide consensus on the current network state.
PoS (ProofofStake, Proof of Stake): PoS mechanism requires nodes to provide proof of a certain number of tokens to obtain a distributed consensus mechanism for competing for blockchain accounting rights. If you rely solely on the token balance to determine the bookkeeper, you will inevitably make the rich win, which will lead to the centralization of bookkeeping rights and reduce the fairness of the consensus. Therefore, different PoS mechanisms use different methods to increase the amount of money based on the proof of equity. The randomness of accounting rights avoids centralization. For example, in the PeerCoin PoS mechanism, the Bitcoin with the longest chain age has a greater chance of obtaining accounting rights. NXT and Blackcoin use a formula to predict the next accounting node. The more tokens you own, the greater the probability of being selected as an accounting node. In the future, Ethereum will also switch from the current PoW mechanism to a PoS mechanism. Judging from the information currently available, Ethereum's PoS mechanism will use nodes to place bets on the next block. The winner of the bet will receive an additional Ethereum currency award. Those who do not win will be deducted Ether coins to reach consensus on the next block.
DPoS (DelegatedProof-Of-Stake, share authorization certificate): DPoS is veryIt is easy to understand and similar to the modern corporate board of directors system. The DPoS mechanism adopted by BitShares is that shareholders vote to select a certain number of witnesses. Each witness has two seconds of authority to generate blocks in order. If the witness cannot generate a block within the given time slice, The block generation authority is given to the witness corresponding to the next time slice. Shareholders can replace these witnesses at any time by voting. This design of DPoS makes the generation of blocks faster and more energy-saving.
Distributed Consistency Algorithm: Distributed Consistency Algorithm is based on traditional distributed consistency technology. Among them are Byzantine fault-tolerant algorithms that solve the Byzantine Generals problem, such as PBFT (Byzantine fault-tolerant algorithm). In addition, distributed consensus algorithms (Pasox, Raft) that solve non-Byzantine problems are not explained in this article. This type of algorithm is currently a commonly used consensus mechanism in alliance chain and private chain scenarios.
Taken together, POW is suitable for public chains. If you build a private chain, it is more suitable to use POS because there is no trust problem in verification nodes; and because there are untrustworthy local nodes in the alliance chain, it is more suitable to use DPOS.
Blockchain technology----Incentive layer: Develop a "salary system" for accounting nodes
Core technology 7. Issuance mechanism and incentive mechanism:
Take Bitcoin as an example. Bitcoins are initially rewarded by the system to miners who create new blocks, and this reward is halved approximately every four years. At the beginning, miners were rewarded with 50 Bitcoins for each new block recorded, and this reward is halved approximately every four years. By analogy, by around AD 2140, newly created blocks will no longer receive rewards from the system. By then, the total number of Bitcoins will be approximately 21 million. This is the total number of Bitcoins, so it will not increase indefinitely.
Another source of incentives is transaction fees. When there are no system rewards for newly created blocks, the miners' income will change from system rewards to transaction fees. For example, when you transfer, you can specify 1% of it as a handling fee to be paid to the miner who records the block. If the output value of a transaction is less than the input value, the difference is the transaction fee, which will be added to the incentive for that block. As long as a given amount of electronic currency has entered circulation, the incentive mechanism can gradually be converted to rely entirely on transaction fees, so there is no need to issue new currency.
Blockchain technology----Contract layer: giving the ledger programmable features
Core technology 8. Smart contract:
Smart contract is a set of programmed rules and logic that respond to scenarios. Implemented by decentralized, trusted shared script code deployed on the blockchain. Normally, after the smart contract is signed by all parties, it is attached to the blockchain data in the form of program code, and is recorded in a specific block of the blockchain after being propagated through the P2P network and verified by nodes. Smart contracts encapsulate a number of predefined states and transition rules, scenarios that trigger contract execution, response actions under specific scenarios, etc. The blockchain can monitor the status of smart contracts in real time and activate and verify them by checking external data sources and confirming that specific trigger conditions are met.Execute the contract.
The above is what blockchain technologies the editor has brought to you? All content introduced to the core technology of blockchain.

博客主人唯心底涂
男,单身,无聊上班族,闲着没事喜欢研究股票,无时无刻分享股票入门基础知识,资深技术宅。
  • 37680 文章总数
  • 3637288访问次数
  • 3081建站天数