区块链信息共享方法有哪些,区块链信息共享方法包括
区块链信息共享方法是指在区块链技术的支持下,通过分布式节点和去中心化的方式,实现信息的共享和存储,以及所有参与者的操作行为被记录的一种技术。区块链信息共享方法包括:去中心化,分布式账本和共识机制。
去中心化:去中心化是指不存在中心控制,而是由多个节点组成的网络,每个节点都可以接收、处理和存储信息。去中心化的优势在于,它能够有效地防止信息的泄露,并且网络中的每个节点都可以接收、处理和存储信息,从而保证信息的安全性。
分布式账本:分布式账本是一种分布式数据库,它可以记录所有参与者的操作行为,并且每一笔交易都会被记录在账本中,从而保证交易的安全性和可追溯性。此外,分布式账本还具有高效率和安全性的特点,可以有效地防止信息的改动和篡改。
共识机制:共识机制是指在区块链网络中,所有参与者都必须遵循一定的规则,以确保网络的安全性和可靠性。共识机制可以有效地防止信息的篡改,并且能够保证网络的安全性和可靠性。此外,共识机制还可以用于解决分布式网络中的冲突,从而保证网络的正常运行。
总之,区块链信息共享方法包括去中心化、分布式账本和共识机制,它们能够有效地保证信息的安全性和可靠性,并且能够防止信息的泄露和篡改。请查看相关英文文档
A. How does blockchain achieve distributed consensus?
The entire human society can only constantly find a balance between distribution and consensus. The two have shown an alternating pattern in the past. situation. The distribution is constantly iterating, and each new cycle will inherit the results left by the previous cycle. As a result, human beings can continue to reach a larger scope and higher level of civilization.
The distribution period is mainly characterized by the development of individual interests, but this does not mean that there is no centralized decision-making; the consensus period adopts centralized management that prioritizes efficiency, and distribution will be appropriately considered for overall stability and other demands.
The emergence of distribution often occurs at the end of consensus. At this time, due to uneven distribution and lack of incentives, the public has been unable to obtain further benefits, and the development of the entire society has also slowed down significantly. At this time, we prefer to use distribution Overturn the original small-scale consensus.
Significance
The reason why the Internet can play a huge role in social development lies in the establishment of a decentralized and distributed network and the The use of the TCPIP protocol, which promotes equality and realizes resource sharing, eliminates the problem of over-concentration of information and decision-making caused by centralization in the industrial age.
The emergence of blockchain is based on the prosperity created by the Internet. Through the technological innovation brought by the new distributed ledger, there is an opportunity to further promote the transfer of value. This can solve the obstacles encountered by today's Internet in the process of interconnection and interoperability entering deeper areas, and once again enhance the level of human prosperity.
B. In addition to issuing coins, what are the application scenarios of currency-free blockchain?
The actual application scenarios of blockchain now include:
1. The pain points of traditional information sharing
Either a centralized center publishes and distributes information, or regular batch reconciliation between each other (typically once a day). Information sharing that requires timeliness is difficult to achieve real-time sharing.
The two parties sharing information lack a mutually trusting communication method, and it is difficult to determine whether the information received was sent by the other party.
2. Blockchain information sharing
First of all, the blockchain itself needs to maintain the data consistency of each node, and it can be said to have its own information sharing function; secondly, real-time The problem can be realized through the P2P technology of blockchain; finally, using the immutability and consensus mechanism of blockchain, a safe and reliable information sharing channel can be constructed.
Okay. You may have this question: To solve the above problem, I can build an encrypted channel myself without using blockchain technology! But I want to say that since blockchain technology can solve these problems and it is very convenient to add nodes, why not use blockchain technology before you have built a safe and reliable information sharing system?
3. Application cases
Let’s take Tencent’s own application—Public Welfare Human Search Chain and the value of blockchain in information sharing. Bitcoin solutionTo solve the problem of trust in currency issuance and accounting, let’s take a look at how Bitcoin solves the above two problems one by one.
The problem of spam issuance: Bitcoins can only be obtained through mining, and the total number of Bitcoins available is 21 million. The problem of currency spam issuance is solved in the issuance process; The issue of ledger modification: Bitcoin Coin transaction records form a network through chain storage and decentralized global node balances to solve the problem of ledger modification.
Chain storage can be simply understood as: the blocks that store records are connected one to another, forming a chain; the records of all blocks except the first block contain the calibration of the previous block. Verification information, changing the information of any block will cause subsequent block verification errors. Because of this correlation, other blocks cannot be inserted in the middle, so it is difficult to modify existing records.
C. What changes can blockchain bring to data sharing
What changes can blockchain bring to data sharing
Currently, text sharing on social networking sites Taking photos and sharing each other's joys, sorrows and joys have become an important part of public life.
With the progress of the times, sharing is gradually entering the real society. A series of shared economic models such as shared bicycles, shared umbrellas, shared power banks, and shared cars have emerged, bringing great convenience to human life. .
As a distributed shared ledger, blockchain technology seems to be inherently inseparable from sharing, and industry insiders continue to claim that this technology can bring revolutionary progress to sharing.
So, what is the difference between blockchain-based sharing and Internet-based sharing? This article takes data sharing as an example to answer this question.
Blockchain shares more than just data
Data sharing is an innate need of human beings. For example, talking about life ideals in a cafe, writing text, etc., these are all An important way for ordinary people to communicate information with others.
The emergence of the Internet has broken the geographical and time limitations of data sharing. It allows different people to communicate instantly in different locations on the earth. The emergence of email, online instant messaging and other technologies has greatly improved the efficiency of information transmission. efficiency.
In addition, the Internet can collect massive amounts of data, providing a larger capacity than paper archives, allowing users to obtain rich information in a short period of time.
So, how is all this different under blockchain technology?
In fact, blockchain technology is not concerned with the sharing of data, but the sharing of data control permissions. The permissions here mainly refer to the power to modify and increase data. It mainly contains two meanings:< br />One is who can modify the data
The other is how to modify it.
In the Internet model, data reading, writing, editing and deletion are generally accompanied by identity authentication operations. Only specific people can modify the data. In the blockchain model, especially the public chain system Anyone can participateWith the reading and writing of data, a trustless system is built in the form of a distributed ledger. The various organizations or individuals involved in reading and writing can not trust each other, but can reach a consensus on the final status of the data stored in the system.
To put it simply, the essential difference between blockchain-based sharing and Internet-based sharing is that blockchain shares not just data, but the control of data. So, how exactly does blockchain handle data control?
Blockchain controls data through rules
Before the emergence of blockchain technology, Internet data was usually controlled by a single entity. Since the website operator has complete control over the central server, these organizations can edit and process the data at will. Although organizations also need to complete data modification and other behaviors under certain laws and agreements, because they are the party that controls the resources, it is difficult for individual users to enjoy complete control.
To give a simple example, a user uploads a photo to the website platform and hopes that friends can see the photo. Excluding some illegal elements, who has the final control over this photo?
Obviously, from the user's point of view, this photo belongs to them, but in fact, these social networking sites are the real controllers. They can modify it at will, but users have nothing to do.
In other words, under the existing Internet system, as long as you have the right to operate the website platform, you can completely control the data on the platform.
Under the blockchain system, data is not controlled by any authoritative party, and its authority is controlled by rules. The main goal of these rules is to stipulate what kind of information is valid, and also stipulates How participants should provide feedback on it.
These rules are usually predefined and participants joining the blockchain network must abide by the rules. Of course, technically speaking, participants can ignore certain rules and construct invalid data based on their own interests. However, due to the existence of the blockchain consensus mechanism, other participants can exclude these invalid data from the network based on predefined rules.
For example, in the blockchain blacklist sharing platform system launched by Suning Financial, there are many such rules-no data can be queried without points, only the organization has the authority to modify the data of this organization, etc. Once an institution performs an operation outside the rules, these operations will be regarded as invalid transactions and are prohibited from occurring.
In general, blockchain regulates data writing behavior based on a technical rule system, while the Internet controls data through power and resources. This is the foundation of blockchain-style sharing and Internet-style sharing. sexual distinction.
Blockchain rules are jointly maintained by participants
Although there are some rules in the Internet environment, because the rules are completely maintained by the power parties, it is difficult to avoid black-box operations and other behaviors. In the blockchain system, the rules are jointly maintained by all participants, and each participant will independently verify the data according to the rules.
In this process,We cannot assume that all participants can fully comply with the rules. Therefore, each participant will independently verify the data it receives and determine whether it violates the rules. If the verification data is valid, then the participant will accept the data and forward it to others, otherwise, it will be rejected directly.
Within the blockchain network, new data can be considered valid data and added to the final blockchain shared ledger only after relevant participants agree.
Depending on how the blockchain is constructed, there are major differences in how data is confirmed. For example, in a public chain, most participants need to agree on the validity of the data, while in a consortium chain or private chain, Only a few participants need to agree.
In this method, the participants themselves are the managers, which is the core expression of blockchain decentralization: no institution is superior to others and has complete control authority over the data.
Blockchain is a form of permission sharing, allowing each participant to serve as a data provider, verifier and user at the same time, jointly maintaining the security and validity of blockchain data.
Since the popularity of blockchain, blockchain for everything seems to have become the advertising slogan of the industry, especially some data sharing applications are considered to be excellent examples of blockchain.
In fact, the emergence of the Internet has solved the problem of data sharing to a certain extent. Blockchain realizes the sharing of permissions. This is the most revolutionary change that blockchain has brought to the industry.
D. How to integrate blockchain and sharing economy
In general, grasping the essence of blockchain should be weak control, decentralization, autonomous mechanism, network architecture and coupling connection. The essence of blockchain should be a new social structure in the information society era that is completely different from industrial society. The five core points about blockchain have something in common with the sharing economy. The essence of the sharing economy is to abandon the old development mechanism and no longer emphasize concentration. Instead, use decentralized social resources in a peer-to-peer manner to allow participants to participate and contribute in different ways. to benefit.
Blockchain and sharing economy, two mutually relevant Internet hotspots, happen to have ample "space for cooperation." From theory to practice, there have been many bold explorations in the industry, and there have even been some phenomena that challenge traditional business models. In this way, the sharing economy tied to the blockchain will be a brand new business model and a new subversion of interpersonal relationships. I plan to invest in the blockchain industry. After all, in the Internet era, I searched for Guangzhou Xuanling Technology Co., Ltd. and looked at the web page. They are a company that develops software blockchain smart contracts. There are many cases developed and the team is strong.
E. What are the core blockchain technologies of blockchain technology?
What is the hottest Internet topic at the moment? You don’t need to tell me what the editor knows, that is the area Blockchain technology, but many friendsI have only heard of this technology and don’t have much in-depth understanding of it. So what are the blockchain technologies? Below we will bring you an introduction to the core technology of blockchain for your reference.
What are the core elements of blockchain technology?
Blockchain technology can be a public ledger (visible by anyone) or a permissioned network (visible only by those authorized), which solves supply chain challenges , because it is an immutable record that is shared among network participants and updated in real time.
Blockchain technology----data layer: designing the data structure of the ledger
Core technology 1. Block + chain:
Technically speaking, block is a data structure that records transactions. Reflects the flow of funds for a transaction. The blocks of transactions that have been reached in the system are connected together to form a main chain, and all nodes participating in the calculation record the main chain or part of the main chain.
Each block consists of a block header and a block body. The block body is only responsible for recording all transaction information in the previous period, mainly including the number of transactions and transaction details; the block header encapsulates the current version number, previous A block address, timestamp (recording the time when the block was generated, accurate to the second), random number (recording the value of decrypting the answer to the math question related to the block), the target hash value of the current block, and the Merkle number Root value and other information. From a structural point of view, most functions of the blockchain are implemented by the block header.
Core technology 2. Hash function:
The hash function can convert data of any length into a set of fixed-length codes through the Hash algorithm. The principle is based on a cryptographic one-way hash function. This kind of function is easy to verify, but difficult to crack. Usually, the industry uses y=hash(x) to represent it. This hash function implements operations on x to calculate a hash value y.
Commonly used hash algorithms include MD5, SHA-1, SHA-256, SHA-384 and SHA-512, etc. Taking the SHA256 algorithm as an example, inputting any string of data into SHA256 will result in a 256-bit Hash value (hash value). Its characteristics: the same data input will get the same result. As long as the input data changes slightly (for example, a 1 becomes a 0), a completely different result will be obtained, and the result cannot be predicted in advance. Forward calculation (calculating the corresponding Hash value from the data) is very easy. Reverse calculation (cracking) is extremely difficult and is considered impossible under current technological conditions.
Core technology 3. Merkle tree:
Merkle tree is a hash binary tree, which can be used to quickly verify the integrity of large-scale data. In the blockchain network, the Merkle tree is used to summarize all transaction information in a block, and ultimately generates a unified hash value of all transaction information in the block. Any change in transaction information in the block will cause Merkle tree changes.
Core technology 4. Asymmetric encryption algorithm:
Asymmetric encryption algorithm isA key secret method that requires two keys: a public key and a private key. The public key and the private key are a pair. If the public key is used to encrypt data, only the corresponding private key can be used to decrypt it, thereby obtaining the corresponding data value; if the private key is used to sign the data, then only the corresponding public key can be used to sign the data. In order to verify the signature, the sender of the verification information is the holder of the private key.
Because encryption and decryption use two different keys, this algorithm is called an asymmetric encryption algorithm, while symmetric encryption uses the same key in the encryption and decryption processes.
Blockchain technology----network layer: realize the decentralization of accounting nodes
Core technology 5. P2P network:
P2P network (peer-to-peer network), also known as point-to-point technology, is no Central server, Internet system that relies on user groups to exchange information. Unlike a centralized network system with a central server, each client in a peer-to-peer network acts as both a node and a server. Domestic Xunlei software uses P2P technology. The P2P network has the characteristics of decentralization and robustness.
Blockchain technology----Consensus layer: allocate the task load of accounting nodes
Core technology 6. Consensus mechanism:
Consensus mechanism is how to reach consensus among all accounting nodes to identify The validity of a record is both a means of identification and a means of preventing tampering. There are currently four main types of consensus mechanisms: PoW, PoS, DPoS and distributed consensus algorithms.
PoW (Proof of Work, proof of work): PoW mechanism, which is like Bitcoin’s mining mechanism, miners package existing transactions that have not been recorded by the network into a block, and then continue to traverse and try to find a random number , so that the hash value of the new block plus the random number meets certain difficulty conditions. Finding a random number that meets the conditions is equivalent to determining the latest block of the blockchain, and is also equivalent to obtaining the current round of accounting rights of the blockchain. Miners broadcast blocks that meet the mining difficulty conditions in the Yuanfu network. After verifying that the block meets the mining difficulty conditions and that the transaction data in the block meets the protocol specifications, other nodes in the entire network will each Blocks are linked to their own version of the blockchain, thereby forming a network-wide consensus on the current network state.
PoS (ProofofStake, Proof of Stake): PoS mechanism requires nodes to provide proof of a certain number of tokens to obtain a distributed consensus mechanism for competing for blockchain accounting rights. If you rely solely on the token balance to determine the bookkeeper, you will inevitably make the rich win, which will lead to the centralization of bookkeeping rights and reduce the fairness of the consensus. Therefore, different PoS mechanisms use different methods to increase the amount of money based on the proof of equity. The randomness of accounting rights avoids centralization. For example, in the PeerCoin PoS mechanism, the Bitcoin with the longest chain age has a greater chance of obtaining accounting rights. NXT and Blackcoin use a formula to predict the next accounting node. The token with the most is selected as the accounting sectionThe probability of clicking will be high. In the future, Ethereum will also switch from the current PoW mechanism to a PoS mechanism. Judging from the information currently available, Ethereum's PoS mechanism will use nodes to place bets on the next block. The winner of the bet will receive an additional Ethereum currency award. Those who do not win will be deducted Ether coins to reach consensus on the next block.
DPoS (DelegatedProof-Of-Stake, share authorization certificate): DPoS is easy to understand and is similar to the modern corporate board of directors system. The DPoS mechanism adopted by BitShares is that shareholders vote to select a certain number of witnesses. Each witness has two seconds of authority to generate blocks in order. If the witness cannot generate a block within the given time slice, The block generation authority is given to the witness corresponding to the next time slice. Shareholders can replace these witnesses at any time by voting. This design of DPoS makes the generation of blocks faster and more energy-saving.
Distributed Consistency Algorithm: Distributed Consistency Algorithm is based on traditional distributed consistency technology. Among them are Byzantine fault-tolerant algorithms that solve the Byzantine Generals problem, such as PBFT (Byzantine fault-tolerant algorithm). In addition, distributed consensus algorithms (Pasox, Raft) that solve non-Byzantine problems are not explained in this article. This type of algorithm is currently a commonly used consensus mechanism in alliance chain and private chain scenarios.
Taken together, POW is suitable for public chains. If you build a private chain, it is more suitable to use POS because there is no trust problem in verification nodes; and because there are untrustworthy local nodes in the alliance chain, it is more suitable to use DPOS.
Blockchain technology----Incentive layer: Develop a "salary system" for accounting nodes
Core technology 7. Issuance mechanism and incentive mechanism:
Take Bitcoin as an example. Bitcoins are initially rewarded by the system to miners who create new blocks, and this reward is halved approximately every four years. At the beginning, miners were rewarded with 50 Bitcoins for each new block recorded, and this reward is halved approximately every four years. By analogy, by around AD 2140, newly created blocks will no longer receive rewards from the system. By then, the total number of Bitcoins will be approximately 21 million. This is the total number of Bitcoins, so it will not increase indefinitely.
Another source of incentives is transaction fees. When there are no system rewards for newly created blocks, the miners' income will change from system rewards to transaction fees. For example, when you transfer, you can specify 1% of it as a handling fee to be paid to the miner who records the block. If the output value of a transaction is less than the input value, the difference is the transaction fee, which will be added to the incentive for that block. As long as a given amount of electronic currency has entered circulation, the incentive mechanism can gradually be converted to rely entirely on transaction fees, so there is no need to issue new currency.
Blockchain technology----Contract layer: giving the ledger programmable features
Core technology 8. Smart contract:
Smart contract is a set of programmed rules and logic that respond to scenarios. Decentralized, trusted shared script code deployed on the blockchainrealized. Usually, after the smart contract is signed by all parties, it is attached to the blockchain data in the form of program code, and is recorded in a specific block of the blockchain after being propagated through the P2P network and verified by nodes. Smart contracts encapsulate a number of predefined states and transition rules, scenarios that trigger contract execution, response actions under specific scenarios, etc. The blockchain can monitor the status of smart contracts in real time, and activate and execute the contract by checking external data sources and confirming that specific trigger conditions are met.
The above is what blockchain technologies the editor has brought to you? All content of the introduction to the core technology of blockchain.