为广大币圈朋友提供币圈基础入门专业知识!
当前位置首页 > 比特币基础> 正文

一张图看懂区块链政策

发布时间:2023-12-20-23:38:00 来源:网络 比特币基础 区块   看懂   一张图

一张图看懂区块链政策

区块链技术是一种革命性的分布式数据存储技术,它可以将数据存储在网络中的节点中,从而实现数据的安全性和可靠性。区块链技术的发展也带来了一系列新的政策,下面我们就来看看关于区块链政策的三个关键词:

数据安全性

数据安全性是指在区块链系统中,数据的安全性和可靠性。区块链技术可以将数据存储在节点中,而不是将数据存储在中心化的服务器上,从而大大提高了数据的安全性。此外,区块链技术还具有去中心化、不可篡改和共识机制等特点,这些特点都有助于提高数据的安全性。

隐私保护

隐私保护是指在区块链系统中,个人信息的安全性和可靠性。区块链技术可以使用加密技术来保护个人信息,从而大大提高了个人信息的安全性。此外,区块链技术还可以使用匿名技术,从而让个人信息不易被泄露,从而更好地保护个人隐私。

政策监管

政策监管是指在区块链系统中,政府和监管机构对区块链技术的监管。由于区块链技术的特殊性,政府和监管机构需要制定严格的政策来监管区块链技术,以确保区块链技术的安全性和可靠性。同时,政府和监管机构还需要定期对区块链技术进行审查,以确保其符合当前的政策要求。

以上就是关于区块链政策的三个关键词:数据安全性、隐私保护和政策监管。区块链技术的发展将会带来一系列新的政策,我们期待着这些政策的出台,以更好地保护我们的数据安全和隐私安全。


请查看相关英文文档

1. Illustration of what is blockchain

Blockchain is so popular that it has begun to affect my life. I don’t even want to understand it anymore. Let’s look at it today. See what exactly blockchain is.

Structure of this article:

As its name suggests,
A blockchain is a chain composed of a set of blocks.
A block is a block of information that contains information. , the chain also contains information.

Blockchain technology was first developed by a group of researchers in 1991 to time-stamp digital documents so that these documents cannot be tampered with. It essentially played no other role after that, until 2009, when Satoshi Nakamoto used blockchain technology to create the digital cryptocurrency Bitcoin.

A blockchain is a distributed ledger that is completely open to everyone. It has a very interesting property: once certain data is recorded in a blockchain, the data is very It is difficult to change.

Let’s take a look at the composition of a block:

Each block contains some data, the hash value of this block, and the hash value of the previous block. Hope value.

The data saved in the block is related to the type of blockchain. For example, the blocks in the Bitcoin blockchain save relevant transaction information, including sellers, buyers, and transaction Bitcoins. quantity.

Each block contains a hash value. The hash value is used to identify a block and all the content it contains, and it is unique, like a fingerprint. Once a block is created, its hash value is calculated accordingly. If you change something in the block, the hash value will change. If the fingerprint of a block changes, it will no longer be the previous block.

The third element contained in the block is the hash value of the previous block. This element allows links to be formed between blocks and makes the blockchain very secure.

Suppose we have a blockchain containing 3 blocks
Each block contains its own hash value and the hash value of the previous block
No. 3 Block points to block No. 2, and block No. 2 points to block No. 1
Block No. 1 is a bit special, it cannot point to the previous block because it is the first
We put 1 The block number is called the genesis block.

Now suppose we tamper with the second block
This will cause the hash value of the second block to change
This will then cause block 3 and all subsequent blocks connected to block 3 to become illegal
Because the previous block number they stored has now become illegal
, changing one block alone will jointly cause all subsequent content to become invalid.

But to prevent tampering, hashing is not enough
Because today’s computer computing speed is powerful enough and can calculate thousands of hash values ​​per second
This way You can tamper with a block and recalculate the hashes of other blocks, making your block legal again.

So in order to reduce this risk, the blockchain also uses a technology called proof of work
This is a mechanism that slows down the creation process of new blocks
In the Bitcoin area In the blockchain, it takes about 10 minutes to complete the required proof of work and add a new block to the blockchain
This mechanism makes the tampering of the blockchain more difficult
because once it is tampered Once a block is obtained, the proof of work of all subsequent blocks needs to be recalculated.

Therefore, the security of blockchain technology mainly comes from hash value and workload proof mechanism.

Blockchain also has a mechanism to protect its own security, which is distributed
Compared to using a centralized entity to manage the blockchain network, blockchain uses A peer-to-peer network that anyone can join
When someone joins this network, he will get a copy of the entire blockchain
This person can use this to verify that all The blocks are still legal and untampered, that is, different nodes can use this to verify each other.

When someone creates a new block,
the new block is sent to everyone on the network.
Everyone then verifies the block to ensure that it has not been tampered with.
If everything is verified to be correct, then everyone can add the new block to their own area. On the blockchain
We can call it that everyone on the network has reached a "consensus".

All nodes in the blockchain network reach a consensus
They agree on which blocks in the network are legal and which are illegal
Those that have been tampered withThe block will be rejected by other users on the network
So, to successfully tamper with a blockchain, you need to tamper with all blocks on the blockchain
Recomplete the proof of work for each block , and control more than 50% of the users in the blockchain network
Only in this way will the blocks you tamper with will be recognized by everyone
It can be said that this is basically impossible to do!

Blockchain technology itself is also constantly developing
For example, a later technological improvement is called smart contracts
Smart contracts are simple programs stored on the blockchain
br /> It can automatically execute based on the conditions recorded in the contract. As long as the conditions are met, transactions will be automatically completed in accordance with the contract
For example, automated Bitcoin transactions can be realized under specific conditions.

Learning materials:
https://www.youtube.com/watch?v=SSo_EIwHSd4

2. What are the policies to promote the development of blockchain?

Legal analysis: On October 25, national leaders presided over a collective study meeting of the Political Bureau of the Central Committee and listed blockchain as an important breakthrough for independent innovation technology.

In the 19 days since then, local governments have issued a total of 44 related policies to encourage the development of blockchain, involving 20 provinces.

Government affairs, medical care, finance and smart cities have become the areas where local governments value blockchain implementation most.

In the process of actively promoting the implementation of blockchain, local governments are also trying to combine their own advantages and local characteristics. For example, in Shanxi, energy has become a key area for blockchain implementation.

Legal basis: "The Fourteenth Five-Year Plan for National Economic and Social Development of the People's Republic of China and the Outline of Long-term Goals for 2035" Article 3 Strategic Orientation: Promote high-quality development during the "14th Five-Year Plan" period , we must base ourselves on the new development stage, implement new development concepts, and build a new development pattern. Grasping the new development stage is the realistic basis for implementing the new development concept and building a new development pattern. Implementing the new development concept provides an action guide for grasping the new development stage and building a new development pattern. Building a new development pattern is to respond to the opportunities and challenges of the new development stage. , strategic choices to implement new development concepts. We must persist in deepening supply-side structural reforms, lead and create new demands with innovation-driven, high-quality supply, and improve the resilience of the supply system and its adaptability to domestic demand. We must establish an effective system to expand domestic demand, accelerate the cultivation of a complete domestic demand system, strengthen demand-side management, and build a strong domestic market. We must unswervingly advance reform, break down institutional obstacles that restrict economic circulation, and promote the circulation of production factors and the organic connection between production, distribution, circulation, and consumption. must be steadfastExpand opening up, continue to deepen openness based on the flow of factors, steadily expand openness based on institutions, and rely on the domestic economic cycle system to form a strong gravitational field for global factor resources. It is necessary to strengthen the leading role of the domestic general cycle, improve the efficiency and level of the domestic general cycle with the international cycle, and realize the mutual promotion and advancement of the domestic and international dual cycles.

3. What is the most understandable explanation of blockchain

Blockchain has become very popular in recent years, and its attention and exposure have continued to rise. Many domestic giants have embraced it with open arms and embraced it. Blockchain is regarded as a great disruptive innovation in the Internet era, and everyone is studying how to turn blockchain into a tool to seize business opportunities.

So, what exactly is blockchain technology? You can recognize each Chinese character individually, but you don't know what they mean when put together. For the blockchain, which everyone thinks is extremely mysterious, now there is a most understandable explanation.

What is blockchain? Let’s first use the love story that everyone loves to talk about as a simple example.

Build a simple blockchain model, then the following situations will occur when falling in love in this blockchain model.

In the future, all the men and women of the right age will fall in love and the whole process of commitment to get married will be agreed upon by all other men and women of the right age, and all the stories that happen between two people together will form a block.

All other men and women are the chain. If a third party intervenes or you violate your partner, others can see it, and you will never find a partner in the future.

To be precise, the blockchain is a "full center" system, that is, every node on the chain is the center.

Men and women in trial marriage fall in love, show off their love on friends, promise to love each other for a lifetime and be known by all other marriageable men and women is the application of blockchain. If one day one party breaks their promise, don't think that deleting the photos will be useful, because every piece of it has been recorded by all marriageable men and women.

It cannot be deleted or changed, this is blockchain technology.

If this technology is applied to the business field, its "purifying" effect on the business environment will be imaginable, which explains why blockchain technology is so popular.

The Internet has entered the ecological era, and its applications have penetrated into many fields such as financial services, Internet of Things, supply chain management, digital asset transactions, and e-commerce. The emergence of the blockchain has transformed the development of the Internet from the information Internet to the value Internet and the order Internet. Its "distributed business" model with the sharing economy and value link as the main features will give birth to a large number of new cross-institutional innovative cooperation scenarios and build The creation of a new industrial ecosystem with blockchain technology as the virtual center will have a disruptive impact on economic and social governance, industrial transformation and innovation.

On this basis, Caoliu Commune built Caoxin, Caoshang, Caodao, and Caoai projects based on blockchain technology, consisting of founding nodes, institutional nodes, and partner nodes., first-level nodes, second-level and below nodes, and ordinary members constitute a new Internet ecosystem, outlining an environment that is fully in line with today's national policies and allows users to have the opportunity to participate in blockchain technology. Users can obtain benefits through participating in community work. Grass coins. The grass coins obtained by users can be exchanged for Grass Letter CT or traded on the trading platform to realize the circulation and appreciation of grass coins.

This is the first blockchain technology to be applied to the real industry ecosystem. It is also an example of financial thinking with Chinese characteristics that is deeply adapted to the commercial and financial environment based on China’s national conditions and uses blockchain technology to transform the traditional commercial and financial system. A historic innovation in decentralized reconstruction.

4. [Blockchain Mind Map] 002: Bitcoin

Here, Sir Jay gives you the 002nd blockchain mind map: 002 Bitcoin~

The following is a brief introduction to Bitcoin:

Bitcoin (English: Bitcoin) is a decentralized, non-universally globally payable electronic cryptocurrency. Bitcoin was invented by Satoshi Nakamoto (pseudonym) on January 3, 2009, based on a borderless peer-to-peer network and using consensus-active open source software. As of February 12, 2018, Bitcoin is currently the cryptocurrency with the highest market capitalization. 【1】

Why was a cryptocurrency like Bitcoin created? In other words, why is Bitcoin so popular among the public, from a trendy gadget in the geek circle to a daily investment for ordinary people? ?

Some people believe that the advent of Bitcoin is the result of people’s hatred of the excessive issuance of national sovereign currencies in the commodity economy and monetary policy intervention, and their yearning for community consensus currency autonomy in the gift economy. I believe everyone will have deep feelings about the issue of "inflation", right?

Check the information: Inflation is generally defined as: under the credit currency system, the amount of currency in circulation exceeds the actual needs of the economy, causing currency depreciation and a comprehensive and sustained rise in price levels-- In more common language: over a given period of time, the price level in a given economy generally continues to increase, resulting in a sustained decline in the purchasing power of money. 【2】

In China, we can use a vivid example to illustrate: around 1980, at the beginning of reform and opening up, “thousand-yuan households” were all very wealthy; Today, more than 30 years later, it is estimated that one has to reach the level of billions of assets to be considered a "rich man", right? ? Behind this tens of millions of times difference is the huge problem of currency depreciation caused by the over-issuance of currency.

Satoshi Nakamoto hates this kind of "inflation" problem. So, he proposed to solve the problem himselfMethodology of the problem: Based on the belief in technology and liberal monetarism, a blockchain technology system was proposed; and relying on blockchain technology, Bitcoin was created.

Interestingly, Satoshi Nakamoto created the first block of the Bitcoin system, the "Genesis Block", with the sentence "The Times 03/Jan/2009 Chancellor on brink of second lout for banks” (on January 3, 2009, the chancellor was on the verge of implementing a second round of emergency bank bailout), and this sentence was the headline of the front page article of The Times that day.

At this point, people’s bold attempt to issue their own currency system began, and once the experimental wheels were started, it was difficult to stop them. Later, Bitcoin went through continuous iterative development and produced many hard fork currencies.

Data shows:

Of course, the development of Bitcoin is not smooth sailing. Hackers will attack Bitcoin trading websites; and many criminal organizations will also use Bitcoin to Bitcoin is used for illegal transactions; many people even still think that Bitcoin is a "Ponzi scheme."

In addition, celebrities have different opinions on Bitcoin. The data shows:

Paul Kluman, the Nobel Prize winner in economics, believes that "Bitcoin It’s evil” and expressed several views on Bitcoin.

David Woo, global head of interest rate and foreign exchange research at Bank of America Merrill Lynch, believes that "Bitcoin can become a major payment method for e-commerce and become a strong competitor for traditional currency transactions." . . 【3】

What exactly is Bitcoin? Everyone will have their own different opinions. However, Sir Jay thinks: Before we easily make judgments about new things that are unclear to us, we should take the initiative to learn and understand them. To learn Bitcoin, it is a good methodology to first understand the Bitcoin white paper.

Sir Jay has also written about the interpretation of Bitcoin’s official white paper in his previous article. You are welcome to check it out:

Title: [Talk about Digital Currency] Interpretation of Bitcoin’s White Paper

Link: https://mp.weixin.qq.com/s?__biz=MzU1MTA2NDM1NA==&mid=2247483713&idx=1&sn=&chksm=5c761a#rd

In general, a new era has arrived, and new things such as blockchain and Bitcoin will surely show their huge power in the future! We are all the lucky ones and witnesses of the times, so hurry up and learn and understand the world of blockchain! ! !

Note:

[1] Excerpted from Wikipedia: Bitcoin

[2] Excerpted from the Internet: Inflation

[3] Excerpted from Wikipedia: Bitcoin

5. What is blockchain

Let’s talk about some basic concepts first.

The network said that blockchain is a new usage model of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanisms, and encryption algorithms. It is essentially a decentralized database, and as the underlying technology of Bitcoin, it is a series of data blocks generated by cryptography.

We try to translate "what is blockchain" into "human language".

The definition refers to the "decentralized database" nature of blockchain3354. This is very different from the traditional "centralized database" in storage, update and operation.

A centralized database can be thought of as having this shape:

For example, if I want to use Alipay to pay a Taobao seller, all data requests from when I make money to when he receives the money will be centrally processed by Alipay. The advantage of this data structure is that as long as Alipay is responsible for the efficient and safe operation of the system, others can unconditionally believe it without worrying; the disadvantage is that if there is a problem with Alipay, such as being hacked, the server being burned, a traitor appearing, and the company running away (Of course, the possibility of the above is extremely low), the balance details and other information in our Alipay will be confused.

Then some people think that this kind of low-probability event can use any technical means to avoid individual risks, and not only hand over the data to a centralized organization. For example, everyone can store and process data.

The database structure may look like this:

This picture is a schematic structural diagram of a "distributed database". Each point is a server, they all have equal rights to record and calculate data, and information is spread point-to-point. At first glance, it seems that it can indeed resist the risk caused by the crash of a certain node, but it is also very confusing and inefficient intuitively. Who will handle my information, and who has the final say on the results?

At this time, the "consensus mechanism" in the definition of blockchain comes into play. The consensus mechanism mainly "stipulates" the following things: who will process a data request (what qualifications are required); who will verify the results (to see if he has handled it well); how to prevent processors and verifiers from colluding with each other, etc.

Some people may like to be questioned when a "rule" is made. In order to form a stronger consensus, in addition to making the rules more reasonable, they must also be more attractive so that people are interested and motivated to participate in data processing. This involves the incentive mechanism of the public chain. We will start again later when we discuss the classification of blockchain and the role of digital currencies.

When we hand over a transaction to a distributed network, there is also a "psychological threshold": there are so many nodes that can process information, and I don't know any of them (unlike Alipay, if it hurts me, I will You can go to it and file a lawsuit). They all have my data, why should I trust them?

At this time, encryption algorithm (the last descriptive word in the definition of blockchain) comes on stage.

In the blockchain network, the data requests we send will be encrypted according to cryptographic principles into a string of characters that the recipient cannot understand at all. Behind this encryption method is the support of a hash algorithm.

Hash algorithms can quickly convert any type of data into hash values. This change is one-way irreversible, deterministic, random, and anti-collision. Because of these characteristics, the person handling my data request could record the information for me, but they had no idea who I was or what I was doing.

So far, the working principle of the decentralized network has been introduced. But we seem to have overlooked one detail. The previous diagram is a net. Where are the pulleys and chains? Why do we call it blockchain?

To understand this matter, we need to clarify a few knowledge points first:

The previous picture is actually a "macro" database perspective, showing the basic rules and processes of the blockchain system for processing information. . And specifically at the "micro" data log level, we will find that the ledger is packaged, compressed, stored in blocks, and strung together in chronological order to form a "chain structure", like this:

Figure Each ring in can be regarded as a building block, and many links are linked together to form a blockchain. Blocks store data, unlike ordinary data storage: on a blockchain, the data in a later block contains the data in the previous block.

In order to academically explain the fields of each part of the data in the block, we tried to use a book metaphor to describe what a blockchain data structure is.

Usually, when we read a book, we read the first page, then the second and third pages. The spine is a physical existence that fixes the order of each page. Even if the book is scattered, the order of each numbered page can be determined.

Inside the blockchain, each block is marked with a page number, the second page contains the content of the first page, the third page contains the content of the first and second pages. The tenth page contains the previous Nine pages of content.

It is such a nested chain that can be traced back to the original data.

This brings up an important attribute of blockchain: traceability.

When the data in the blockchain needs to be updated, that is when new blocks are generated in sequence, the "consensus algorithm" comes into play again. This algorithm stipulates that a new block can only be formed if it is recognized by more than 51% of the nodes in the entire network. To put it bluntly, it is a matter of voting, and it can be elected if more than half of the people agree. This makes the data on the blockchain difficult to tamper with. If I were to force a change, there would be too many people to bribe and the cost would be too high to be worth it.

This is what people often call the "non-tamperable" feature of blockchain.

Another reason why blockchain gives people a sense of trust is because of "smart contracts."

SmartA contract is a commitment agreement defined and executed automatically by a computer program. It is a set of transaction rules executed by code, similar to the current automatic repayment function of credit cards. If you turn on this function, you don’t have to worry about anything. The bank will automatically deduct the money you owe when it is due.

When your friend borrows money from you but doesn't remember to pay it back, or makes excuses not to pay it back, smart contracts can prevent breach of contract. Once the terms in the contract are triggered, such as when it is time to pay back the money, or there is a limit in his account, the code will automatically execute, and the money he owes you will be automatically transferred back whether he wants it or not.

Let’s briefly summarize. Blockchain technology is mainly decentralized, difficult to tamper with, and traceable, which represents more security and trustlessness. But it also brings new problems: redundancy and inefficiency, which requires many nodes to agree with the rules and actively participate.

This concludes the "drying" section. Next, let’s talk about unofficial history and the official history of blockchain.

A new technology is often used to serve a certain task.

Or goals. So where was blockchain first used, and who came up with it first?

Let's go back to 2008.

On September 21, Wall Street investment banks collapsed one after another, and the Federal Reserve announced that it would convert the only two remaining investment banks (Goldman Sachs Group and Morgan Stanley) into commercial banks; it hoped to survive the financial crisis by absorbing savings. On October 3, the Bush administration signed a $700 billion financial rescue package.

Twenty-eight days later, on November 1, 2008, a new post appeared in a cryptography mailing group: "I am developing a new electronic currency system that is completely peer-to-peer and does not require a third party. Three-party trust institution." The text of the post is a paper titled "Bitcoin: A Peer-to-Peer Electronic Cash System", signed by Satoshi Nakamoto.

The paper explains the design of this peer-to-peer electronic cash system with a more rigorous logic. It first discusses the problem that financial institutions are subject to "trust based" (based on credit), and then explains step by step how to achieve "no third-party agency" , and cleverly solved the technical problems left by the predecessors.

Two months later, Satoshi Nakamoto released the first version of the open source Bitcoin client and mined 50 Bitcoins for the first time. The block that generated the first batch of Bitcoins is called the "Genesis block". The genesis block was compiled into block 0 and was not uploaded to the chain. It took Satoshi Nakamoto 6 days to mine this block. This also sparked discussion in the bitcointalk forum. Bitcoin "believers" thought of the Bible, "God created the heavens and the earth in six days, and then rested on the seventh day."

Although concepts such as decentralized, token, and economy did not appear in the paper, Satoshi Nakamoto explained in detail the role of blocks and chains in the network.working principle. So, there is Block Chain.

This paper later became the "Bible" of the "Bit Cult", technology became the cornerstone of faith, and developer documentation became the "Code of Hammurabi".

After that, Bitcoin realized the first real-life payment by exchanging pizza, WikiLeaks, whose account was blocked by the US government, miraculously survived by relying on Bitcoin, Satoshi Nakamoto's "decentralization" and retirement, and the appearance of the real and the fake A series of legends such as and refutation of rumors, combined with the expectations, imagination and speculation of later generations, became "Bible stories".

There are also people who are not satisfied with the world described in the "Old Testament" and start new sects, write the doctrines into white papers, and tell the story of their faith in the ten years after Bitcoin. Just like the writing of the 66 books of the Bible spanned 1,500 years, and after 2,000 years of interpretation, Christianity has divided into 33,000 branches.

CoinMarketCap shows that there are more than 4,900 types of digital currencies, and the overall digital currency market size is nearly 140 million yuan. Bitcoin still leads the entire digital currency market with a market share of 66%, and the recent price has been hovering around US$7,200 per coin.

So many currencies have different functions and are divided into different categories: digital currencies represented by Bitcoin are positioned as "digital gold" and have certain value storage and hedging characteristics; Ethereum The digital currency represented by Bitcoin has become the "operational fuel" in its network system; the stable currency represented by USDT and Libra has good payment properties due to its low volatility; the digital currency issued by the central bank represented by DCEP will definitely To a certain extent, it replaces M0, allowing commercial institutions and ordinary people to receive and pay without delay when they are out of cash and disconnected from the Internet.

It can be seen that after 10 years of development of blockchain technology, the first and largest application is digital currency.

Digital currency has also become an attractive reward for participants to maintain the public chain.

So besides digital currency, where else can blockchain technology be used?

Let us recall what the essence of blockchain is—a decentralized database, and its corresponding characteristics: traceability, publicity, anonymity, and tamper-proofing. In theory, you can try to use blockchain to transform traditional scenarios that use centralized databases to see if they are suitable.

Next, let’s talk about several industries and scenarios where blockchain has been successfully implemented:

Blockchain can prove the existence of a certain file or digital content at a specific time through hash timestamps, providing judicial authentication, Identity proof, property rights protection, anti-counterfeiting traceability, etc. provide perfect solutions

In the field of anti-counterfeiting traceability, blockchain technology can be widely used in various fields such as food and medicine, agricultural products, alcohol, and luxury goods through supply chain tracking.

Give two examples.

Blockchain can allow government data to be run, greatly streamlining service processes

The distributed technology of blockchain can allow government departments to be centralized on one chain, and all service processes are delivered to smart contracts, and the workers only need to be in one department Through identity authentication and electronic signature, smart contracts canAutomatically process and transfer, and complete all subsequent approvals and signatures in sequence.

Blockchain invoices are the earliest use of blockchain technology in China. The tax department launched the "Tax Chain" platform for blockchain electronic invoices. The tax department, the issuer, and the payee join the "Tax Chain" network through unique digital identities, truly realizing "instant invoicing for transactions" and "instant reimbursement after invoicing" - in seconds Level invoicing and minute-level reimbursement accounting significantly reduce tax collection and management costs, and effectively solve problems such as data tampering, over-reporting of one ticket, and tax evasion.

Poverty alleviation is another practical application of blockchain technology. Utilize the characteristics of openness, transparency, traceability, and non-tampering of blockchain technology to achieve transparent use, precise investment, and efficient management of poverty alleviation funds.

Give two examples as well.

The eID network identity operation agency guided by the Third Research Institute of the Ministry of Public Security is jointly developing a "digital identity chain" with Gongyilian, which will be issued to Chinese citizens based on the citizen's identity number as the root and cryptographic algorithm. Since it was put into operation, the eID digital identity system has served the full life cycle management of 100 million eIDs, effectively alleviating the problems of personal identity information being fraudulently used, abused and privacy leaked.

Odaily Planet Daily compiled 5 identity chain projects registered with the Cyberspace Administration of China

Blockchain technology naturally has financial attributes

In terms of payment and settlement, under the blockchain distributed ledger system, there are many markets Participants jointly maintain and synchronize a "general ledger" in real time. In just a few minutes, they can complete payment, clearing, and settlement tasks that currently take two or three days to complete, reducing the complexity and cost of cross-bank and cross-border transactions. At the same time, the underlying encryption technology of the blockchain ensures that participants cannot tamper with the ledger, ensuring that transaction records are transparent and safe. Regulators can easily track transactions on the chain and quickly locate high-risk capital flows.

In terms of securities issuance transactions, the traditional stock issuance process is long, costly and complicated. Blockchain technology can weaken the role of underwriting institutions and help all parties establish a fast and accurate information exchange and sharing channel. The issuer can handle the issuance on its own through smart contracts. , regulatory authorities conduct unified review and verification, and investors can also bypass intermediaries for direct operations.

In terms of digital bills and supply chain finance, blockchain technology can effectively solve the financing difficulties of small and medium-sized enterprises. It is difficult for current supply chain finance to benefit small and medium-sized enterprises in the upper reaches of the industrial chain, because they often do not have direct trade relations with core enterprises, and it is difficult for financial institutions to evaluate their credit qualifications. Based on blockchain technology, we can establish a consortium chain network covering core enterprises, upstream and downstream suppliers, financial institutions, etc. The core enterprises issue accounts receivable vouchers to their suppliers. After the bills are digitized and uploaded to the chain, they can be uploaded to the supplier Transfer between them, each level of supplier can realize the corresponding amount of financing with the digital bill certificate.

Give me an example.

The China Enterprise Cloud Chain, jointly launched by ICBC, Postal Savings Bank of China, 11 central enterprises, etc., has covered 48,000 companies since its establishment in 2017, with the amount of rights confirmed on the chain reaching 100 billion yuan, and factoring financing of 57 billion yuan. , cumulative transactions reached 300 billion yuan. After receiving the loan application, the financial institution can verify it on the chain.Verify the authenticity of the contract and whether the contract has been verified multiple times (multiple loans); smart contracts automatically clear and settle, reducing costs and increasing efficiency; at the same time, the accounts payable of core enterprises can have corresponding vouchers and be split by first-tier suppliers , and hand it over to second- and third-tier suppliers in the chain to help them with financing; core enterprises can also use this to understand whether the entire chain is operating normally and avoid emergency payment pressure.

Blockchain technology will greatly optimize the existing use of big data and play a huge role in data circulation and sharing

The aforementioned areas are areas that we are relatively familiar with. As more new technologies develop, blockchain may be able to be combined with them and play a role in unexpected cross-fields and new scenarios that are currently unforeseen.

In the future, the Internet, artificial intelligence, and the Internet of Things will generate massive amounts of data. The existing centralized data storage (computing model) will face huge challenges. Edge storage (computing) based on blockchain technology is expected to become a future solution. Furthermore, the non-tampering and traceability mechanism of blockchain ensures the authenticity and high quality of data, which becomes the basis for the use of all data such as big data, deep learning, and artificial intelligence.

Finally, blockchain can realize multi-party collaborative data calculations while protecting data privacy, and is expected to solve the problems of "data monopoly" and "data islands" and realize the value of data circulation.

In response to the current blockchain development stage, in order to meet the blockchain development and use needs of general business users, many traditional cloud service providers have begun to deploy their own BaaS ("Blockchain as a Service") solutions. The combination of blockchain and cloud computing will effectively reduce enterprise blockchain deployment costs and promote the implementation of blockchain usage scenarios. In the future, blockchain technology will also play an important role in many fields such as charity, insurance, energy, logistics, and the Internet of Things.

During this trial process from traditional technology to blockchain, we found that when certain scenarios have stronger demands for traceability, tamper-proofing, and decentralization, they also have problems with the weaknesses of blockchain (such as performance). , the requirements are not high, and this field is quite suitable for combining blockchain.

At the same time, in the process of blockchain evolution, it has also developed from a highly decentralized public chain accessible to everyone to a consortium chain with different permissions and maintained by multiple centers. Balances the advantages and disadvantages of the two systems.

Typical examples of alliance chains include: FISCO BCOS jointly developed by WeBank and the Golden Alliance Open Source Working Group, Fabric, a major contribution from IBM, and Ant Alliance Chain led by Ant Blockchain, etc.

These trustless systems represent more secure data authentication and storage mechanisms, where data is effectively authenticated and protected. Businesses or individuals can exchange or enter into contracts digitally, where these contracts are embedded in code and stored in transparent, shared databases where they cannot be deleted, tampered with, or revised.

Bold prediction that in the future, contracts, audits, tasks, and payments will all be digitized with unique and secure signatures. Digital signatures will be permanently identified, authenticated, legalized, and stored, andand cannot be tampered with. There is no need for an intermediary to guarantee each of your transactions. You can conduct transactions without knowing the basic information of the other party. While improving information security, it effectively reduces transaction costs and improves transaction efficiency.

Generally speaking, there has been a lot of progress in the implementation of blockchain compared to two years ago.

Many improvements are at the bottom of the system, and users cannot directly see that blockchain is used, but they have actually benefited from it; some applications are still in pilot mode, and users have not yet been able to experience it. In the future, blockchain is expected to be used on a large scale and become one of the Internet infrastructure.

I hope that after reading this, you have a general understanding of what blockchain is and what blockchain can do.

Related Q&A: What is blockchain

Blockchain is actually equivalent to a disintermediated database, which is composed of a series of data blocks. Each of its data blocks contains information about a Bitcoin network transaction, which is used to verify the validity of the information and generate the next block.

In a narrow sense, blockchain is a chain data structure that combines data blocks in a sequential manner in chronological order, and is cryptographically guaranteed to be non-tamperable and non-forgeable. distributed ledger.

In a broad sense, blockchain is actually a distributed infrastructure and computing method, which is used to ensure the security of data transmission and access.

Blockchain infrastructure:

Blockchain is composed of six infrastructures: data layer, network layer, consensus layer, incentive layer, contract layer and usage layer.

6. What is the country’s policy on blockchain?

Currently, the country has a recognized attitude towards blockchain technology and supports and encourages the research and development of independent blockchain technology. , the country’s expectation for the blockchain industry is to be supported by specific implementation and application value. The future expectation for the blockchain is that the blockchain will become a breakthrough for independent innovation of core technologies. And blockchain is legal. Blockchain is a term in the field of information technology. In essence, it is a shared database, and the data or information stored in it has the characteristics of being unforgeable, leaving traces throughout the process, traceable, open and transparent, and collectively maintained.
1. The composition of the blockchain system:
1. Data layer
2. Network layer
3. Consensus layer
4. Incentive layer
5. Contract layer
6. Application layer
2. Types of blockchain
1. Public blockchain
2. Industry blockchain
3. Private blockchain
3. Blockchain Features
1. Decentralization. Blockchain technology does not rely on additional third-party management agencies or hardware facilities, and there is no central control. In addition to the self-contained blockchain itself, each node realizes self-verification, transmission and management of information through distributed accounting and storage. Decentralization is the most prominent and essential feature of blockchain.
2. Openness. The foundation of blockchain technology is open source. In addition to the private information of the transaction parties being encrypted, the data of the blockchain is open to everyone and anyone canQuery blockchain data and develop related applications through public interfaces, so the entire system information is highly transparent.
Legal basis:
"Civil Code of the People's Republic of China"
Article 123 Civil subjects enjoy intellectual property rights in accordance with the law. Intellectual property rights are the exclusive rights enjoyed by obligees in accordance with the law with respect to the following objects:
(1) Works;
(2) Inventions, utility models, and designs;
(3) Trademarks;
( 4) Geographical indications;
(5) Trade secrets;
(6) Integrated circuit layout designs;
(7) New plant varieties;
(8) Other objects specified by law

7. What is the popular explanation of blockchain, and you can understand the blockchain with one picture

What is the popular explanation of blockchain, and you can understand the blockchain with one picture

Blockchain is a hot topic recently. Many people are discussing blockchain issues. Recently, some domestic companies have begun to use blockchain technology to develop some products. Blockchain is a It is an underlying technology of Bitcoin. It is because of the popularity of Bitcoin that many people have paid attention to Bitcoin. However, many people still do not understand what blockchain is. Let me explain blockchain to me.

Bitcoin is a digital currency that many people are paying close attention to, and the underlying technology of Bitcoin is blockchain. Blockchain is a computer technology and a new application model. The blockchain is like a large database ledger, in which all transactions are recorded. The person who records this ledger is very different from traditional bookkeepers. Traditional bookkeepers are usually led by specialized bookkeepers. The accounting party performs the operations. For example, Taobao and Tmall are accounted for by Alibaba, and WeChat transactions are accounted for by Tencent. In the blockchain, all people participate in accounting. Everyone who participates in accounting has a ledger. .

Let me give you an example. For example, A wants to borrow 10,000 yuan from B. B wants to lend the money to A, but is worried that A will default on the debt after borrowing the money, so he will ask for a loan when borrowing money. A third-party notary helps B write down the account. This is the traditional accounting method, which relies on a third party to gain trust. The accounting books are in the hands of the third party. This kind of accounting There is the possibility of a third party tampering with the ledger, and decentralization means that there is no need for a notary when borrowing money, and there is no need to rely on a third party to gain trust. The decentralized situation is like when B lends money to A, B takes Using a loudspeaker, he shouted, "A asked me to borrow 10,000 yuan. Please help me write down the account." At this time, everyone will take the account book in their hand and record the account. Everyone has an account book and can Avoid the possibility of ledger tampering.

8. What are the policies to accelerate the research and development and industrialization of blockchain technology?

In order to speed up the research and development and industrialization of blockchain technology, the government can adopt a series of policy measures. First, we need to increase investment in the blockchain industry to provide enterprises and researchers with sufficient resources.sufficient funds to develop new applications. Secondly, corresponding laws and regulations must be implemented to promote industry standardization, regulatory compliance, risk management, and market competition. In addition, it is necessary to publicize, educate and promote Sprocket blockchain technology; and carry out some national strategic talent training such as "learning talents". In short, promote it through the above methods_

9. [In-depth knowledge] Illustration of the encryption principle of the blockchain (encryption, signature)

First put an architecture diagram of Ethereum :

In the learning process, I mainly use a single module to learn and understand, including P2P, cryptography, network, protocols, etc. Let’s start with the summary directly:

The problem of secret key distribution is also the problem of secret key transmission. If the secret key is symmetric, then the secret key can only be exchanged offline. If the secret key is transmitted online, it may be intercepted. Therefore, asymmetric encryption is used, with two keys, one private key is kept privately, and the other public key is made public. Public keys can be transmitted over the Internet. No offline transactions required. Ensure data security.

As shown in the figure above, node A sends data to node B, and public key encryption is used at this time. Node A obtains the public key of node B from its own public key, encrypts the plaintext data, and sends the ciphertext to node B. Node B uses its own private key to decrypt.

2. Unable to solve message tampering.

As shown in the figure above, node A uses B's public key to encrypt, and then transmits the ciphertext to node B. Node B uses the public key of node A to decrypt the ciphertext.

1. Since A’s public key is public, once an online hacker intercepts the message, the ciphertext will be useless. To put it bluntly, this encryption method can be decrypted as long as the message is intercepted.

2. There is also the problem of being unable to determine the source of the message and the problem of message tampering.

As shown in the figure above, before sending data, node A first encrypts it with B's public key to obtain ciphertext 1, and then uses A's private key to encrypt ciphertext 1 to obtain ciphertext 2. After node B obtains the ciphertext, it first decrypts it using A's public key to obtain ciphertext 1, and then decrypts it using B's private key to obtain the plaintext.

1. When data ciphertext 2 is intercepted on the network, since A's public key is public, you can use A's public key to decrypt ciphertext 2 and obtain ciphertext 1. So this seems to be double encryption, but in fact the private key signature of the last layer is invalid. Generally speaking, we all hope that the signature is signed on the most original data. If the signature is placed at the end, since the public keyIf it is public, the signature lacks security.

2. There are performance issues. Asymmetric encryption itself is very inefficient, and two encryption processes are performed.

As shown in the figure above, node A is first encrypted with A's private key, and then encrypted with B's public key. After receiving the message, node B first uses B's private key to decrypt it, and then uses A's public key to decrypt it.

1. When the ciphertext data 2 is intercepted by a hacker, since the ciphertext 2 can only be decrypted using B's private key, and B's private key is only owned by node B, others cannot keep it secret. Therefore, the safety is the highest.
2. When node B decrypts and obtains ciphertext 1, it can only use A’s public key to decrypt it. Only data encrypted by A's private key can be successfully decrypted with A's public key. Only node A has A's private key, so it can be determined that the data was transmitted by node A.

After two asymmetric encryptions, the performance problem is serious.

Based on the above problem of data tampering, we introduced message authentication. The encryption process after message authentication is as follows:

Before node A sends a message, it first performs a hash calculation on the plaintext data. A digest is obtained, and then the illumination and original data are sent to Node B at the same time. When node B receives the message, it decrypts the message. Parse out the hash digest and original data, then perform the same hash calculation on the original data to obtain digest 1, and compare the digest and digest 1. If they are the same, they have not been tampered with; if they are different, they have been tampered with.

As long as ciphertext 2 is tampered with during the transmission process, the resulting hash will be different from hash1.

The signature problem cannot be solved, that is, both parties attack each other. A never acknowledges the message he sent. For example, A sends an error message to B, causing B to suffer losses. But A denied that he did not send it himself.

In the process of (3), there is no way to solve the problem of mutual attacks between the two interacting parties. What does that mean? It may be that the message sent by A is not good for node A, and later A denies that the message was not sent by it.

In order to solve this problem, signatures were introduced. Here we combine the encryption method in (2)-4 with the message signature.

In the above figure, we use node A's private key to sign the summary information sent by it, then add the signature + original text, and then use B's public key to encrypt. After B obtains the ciphertext, he first uses B's private key to decrypt it, and then uses A's public key to decrypt the digest. Only by comparing the contents of the two digests is the same.. This not only avoids the problem of anti-tampering, but also circumvents the problem of attacks from both parties. Because A signed the information, it cannot be repudiated.

In order to solve the performance problem when asymmetrically encrypting data, hybrid encryption is often used. Here we need to introduce symmetric encryption, as shown below:

When encrypting data, we use a symmetric secret key shared by both parties to encrypt. The symmetric secret key should not be transmitted on the network to avoid loss. The shared symmetric key here is calculated based on one's own private key and the other party's public key, and then the symmetric key is used to encrypt the data. When the other party receives the data, it also calculates the symmetric secret key and decrypts the ciphertext.

The above symmetric key is unsafe because A's private key and B's public key are generally fixed in the short term, so the shared symmetric key is also fixed. To enhance security, the best way is to generate a temporary shared symmetric key for each interaction. So how can we generate a random symmetric key during each interaction without transmitting it?

So how to generate a random shared secret key for encryption?

For the sender node A, a temporary asymmetric secret key pair is generated every time it is sent, and then a symmetric secret key can be calculated based on the public key of node B and the temporary asymmetric private key. (KA algorithm-Key Agreement). The symmetric secret key is then used to encrypt the data. The process here for the shared secret key is as follows:

For node B, when receiving the transmitted data, the random public key of node A is parsed. Then the symmetric secret key (KA algorithm) is calculated using the random public key of node A and the private key of node B itself. The data is then encrypted using a symmetric key.

For the above encryption methods, there are still many problems, such as how to avoid replay attacks (adding Nonce to the message), and problems such as rainbow tables (refer to the KDF mechanism to solve). Due to limited time and ability, I will ignore it for now.

So what kind of encryption should be used?

Mainly based on the security level of the data to be transmitted. Unimportant data can actually be authenticated and signed, but very important data needs to use an encryption scheme with a relatively high security level.

Cipher suite is a concept of network protocol. It mainly includes algorithms for identity authentication, encryption, message authentication (MAC), and secret key exchange.

During the entire network transmission process, according to the passwordThe suite is mainly divided into the following categories of algorithms:

Key exchange algorithms: such as ECDHE, RSA. Mainly used for authentication when the client and server handshake.

Message authentication algorithm: such as SHA1, SHA2, SHA3. Mainly used for message summarization.

Batch encryption algorithm: such as AES, mainly used to encrypt information flow.

Pseudo-random number algorithm: For example, the pseudo-random function of TLS 1.2 uses the hash function of the MAC algorithm to create a master key - a 48-byte private key shared by both parties in the connection. The master key serves as a source of entropy when creating session keys (such as creating a MAC).

In the network, a message transmission generally needs to be encrypted in the following four stages to ensure safe and reliable transmission of the message.

Handshake/network negotiation phase:

During the handshake phase between both parties, link negotiation is required. The main encryption algorithms include RSA, DH, ECDH, etc.

Identity authentication phase:

In the identity authentication phase, the source of the sent message needs to be determined. The main encryption methods used include RSA, DSA, ECDSA (ECC encryption, DSA signature), etc.

Message encryption stage:

Message encryption refers to encrypting the sent information flow. The main encryption methods used include DES, RC4, AES, etc.

Message identity authentication phase/anti-tampering phase:

Mainly to ensure that the message has not been tampered with during transmission. The main encryption methods include MD5, SHA1, SHA2, SHA3, etc.

ECC: Elliptic Curves Cryptography, elliptic curve cryptography. It is an algorithm that generates public and private keys based on point multiple products on ellipses. Used to generate public and private keys.

ECDSA: used for digital signatures and is a digital signature algorithm. A valid digital signature gives the recipient reason to believe that the message was created by a known sender, so that the sender cannot deny that the message has been sent (authentication and non-repudiation), and that the message has not been altered in transit. The ECDSA signature algorithm is a combination of ECC and DSA. The entire signature process is similar to DSA. The difference is that the algorithm used in the signature is ECC, and the final signed value is also divided into r and s. Mainly used in the identity authentication phase.

ECDH: It is also a Huffman tree secret key based on the ECC algorithm. Through ECDH, both parties can negotiate a shared secret without sharing any secrets, and this shared secret key is the current The communication is temporarily and randomly generated. Once the communication is interrupted, the secret keyJust disappear. Mainly used in the handshake negotiation phase.

ECIES: is an integrated encryption scheme, also known as a hybrid encryption scheme, which provides semantic security against selected plaintext and selected ciphertext attacks. ECIES can use different types of functions: key agreement function (KA), key derivation function (KDF), symmetric encryption scheme (ENC), hash function (HASH), H-MAC function (MAC).

ECC is an elliptical encryption algorithm, which mainly describes how the public and private keys are generated on the ellipse, and is irreversible. ECDSA mainly uses the ECC algorithm to make signatures, while ECDH uses the ECC algorithm to generate symmetric keys. All three of the above are applications of the ECC encryption algorithm. In real-world scenarios, we often use hybrid encryption (a combination of symmetric encryption, asymmetric encryption, signature technology, etc.). ECIES is a set of integrated (hybrid) encryption solutions provided by the underlying ECC algorithm. This includes asymmetric encryption, symmetric encryption and signature functions.

<meta charset="utf-8">

This precondition is to ensure that the curve does not contain singular points .

Therefore, as the curve parameters a and b continue to change, the curve also shows different shapes. For example:

All the basic principles of asymmetric encryption are basically based on a formula K = k G. Among them, K represents the public key, k represents the private key, and G represents a selected base point. The asymmetric encryption algorithm is to ensure that the formula cannot be inverted (that is, G/K cannot be calculated). *

How does ECC calculate the public and private keys? Here I describe it according to my own understanding.

I understand that the core idea of ​​ECC is to select a base point G on the curve, then randomly pick a point k on the ECC curve (as the private key), and then calculate our public key based on k G K. And ensure that the public key K is also on the curve. *

So how to calculate k G? How to calculate k G to ensure that the final result is irreversible? This is what the ECC algorithm is supposed to solve.

First, let’s randomly select an ECCCurve, a = -3, b = 7, the following curve is obtained:

On this curve, I randomly select two points. How to calculate the multiplication of these two points? We can simplify the problem. Multiplication can be expressed by addition, such as 2 2 = 2+2, 3 5 = 5+5+5. Then as long as we can calculate addition on the curve, we can theoretically calculate multiplication. Therefore, as long as addition calculations can be performed on this curve, multiplication can theoretically be calculated, and the value of an expression such as k*G can theoretically be calculated.

How to calculate the addition of two points on the curve? Here, in order to ensure irreversibility, ECC has customized an addition system on the curve.

In reality, 1+1=2, 2+2=4, but in the ECC algorithm, the addition system we understand is impossible. Therefore, it is necessary to customize a set of addition systems suitable for this curve.

The definition of ECC is to randomly find a straight line in the graph and intersect the ECC curve at three points (or possibly two points). These three points are P, Q, and R respectively.

Then P+Q+R = 0. Among them, 0 is not the 0 point on the coordinate axis, but the infinity point in ECC. In other words, the infinity point is defined as point 0.

Similarly, we can get P+Q = -R. Since R and -R are symmetrical about the X-axis, we can find their coordinates on the curve.

P+R+Q = 0, so P+R = -Q, as shown in the figure above.

The above describes how addition operations are performed in the world of ECC curves.

As can be seen from the above figure, there are only two intersection points between a straight line and a curve, which means that the straight line is the tangent line of the curve. At this time, P and R coincide.

That is, P = R. According to the above-mentioned ECC addition system, P+R+Q = 0, it can be concluded that P+R+Q = 2P+Q = 2R+Q=0

So we get 2 P = -Q (is it getting closer to the formula K = k G of our asymmetric algorithm?).

So we come to the conclusion that multiplication can be calculated, but it can only be calculated at the tangent point, and it can only be calculated by 2.

If 2 can be turned into any number for multiplication, then it means that multiplication can be performed in the ECC curve, then the ECC algorithm can meet the requirements of an asymmetric encryption algorithm.

So can we calculate the multiplication of any random number? The answer is yes. That is the dot product calculation method.

Choose a random number k, then what is k * P equal to?

We know that in the computer world, everything is binary. Since ECC can calculate the multiplication of 2, we can describe the random number k as binary and then calculate it. Suppose k = 151 = 10010111

Since 2 P = -Q, so k P is calculated. This is the dot product algorithm. Therefore, multiplication can be calculated under the ECC curve system, so this asymmetric encryption method is feasible.

As for why this calculation is irreversible. This requires a lot of deduction, and I don't understand it either. But I think it can be understood this way:

Our watches usually have time scales. Now if we take 0:00:00 on January 1, 1990 as the starting point, and if we tell you that a full year has passed until the starting point, then we can calculate the current time, that is, we can calculate it on the watch. The hour, minute and second hands should point to 00:00:00. But conversely, I said that the hour, minute and second hands on the watch are now pointing to 00:00:00. Can you tell me how many years have passed since the starting point?

The ECDSA signature algorithm is basically similar to other DSA and RSA, both using private key signature and public key verification. It’s just that the algorithm system uses the ECC algorithm. Both parties interacting must adopt the same set of parameter systems. The signature principle is as follows:

Select an infinite point on the curve as the base point G = (x, y). Randomly pick a point k on the curve as the private key, and K = k*G to calculate the public key.

Signature process:

Generate a random number R and calculate RG.

According to the random number R, the HASH value H of the message M, and the private key k, Calculate the signature S = (H+kx)/R.

Send the message M, RG, S to the receiver.

Signature verification process:

Receive message M, RG, S

Calculate the HASH value H according to the message

According to the sender For the public key K, calculate HG/S + xK/S, and compare the calculated result with RG. If equal, the verification is successful.

Formula inference:

HG/S + xK/S = HG/S + x(kG)/S = (H+xk)/GS = RG

Before introducing the principle, let me explain that ECC satisfies the associative law and the commutative law, that is to say, A +B+C = A+C+B = (A+C)+B.

Here is an example on WIKI to illustrate how to generate a shared secret key. You can also refer to the example of Alice And Bob.

For Alice and Bob to communicate, both parties must have public and private keys generated by ECC based on the same parameter system. So there is a common base point G for ECC.

Secret key generation stage:

Alice uses the public key algorithm KA = ka * G, generates the public key KA and the private key ka, and makes the public key KA public.

Bob uses the public key algorithm KB = kb * G, generates the public key KB and the private key kb, and makes the public key KB public.

Calculation ECDH stage:

Alice uses the calculation formula Q = ka * KB to calculate a secret key Q.

Bob uses the calculation formula Q' = kb * KA to calculate a secret key Q'.

Shared key verification:

Q = ka KB = ka * kb * G = ka * G * kb = KA * kb = kb * KA = Q'

Therefore, the shared secret keys calculated by both parties do not need to be disclosed before they can be encrypted using Q. We call Q the shared secret key.

In Ethereum, other contents of the ECIEC encryption suite used:

1. The HASH algorithm uses the most secure SHA3 algorithm Keccak.

2. The signature algorithm uses ECDSA

3. The authentication method uses H-MAC

4. The ECC parameter system uses secp256k1, others The parameter system can be found here

The whole process of H-MAC is called Hash-based Message Authentication Code. Its model is as follows:

In Ethereum's UDP communication (RPC communication encryption methods are different), then The above implementation method is adopted and extended.

First, Ethereum’s UDPThe structure of the communication is as follows:

Among them, sig is the signature information encrypted by the private key. mac can be understood as a summary of the entire message, ptype is the event type of the message, and data is the RLP-encoded transmission data.

The entire encryption, authentication, and signature model of UDP is as follows:

10. How does the blockchain “move up” in the future of carbon neutrality


#01

We are serious about achieving carbon neutrality

In recent years, the issue of global warming has received increasing attention. The issue of climate change is gradually being recognized by everyone.

In order to deal with the global climate crisis, our country is also vigorously promoting the concept of "carbon neutrality". On the one hand, it is a solemn commitment to address global climate issues; on the other hand, energy substitution is also an important engine for economic growth in the post-epidemic era.

Xiaoou’s note: What are carbon peak and carbon neutrality?


"Carbon peak" refers to a certain moment when carbon dioxide emissions reach a historical high and then gradually fall back;

" "Carbon neutrality" refers to offsetting the carbon dioxide or greenhouse gas emissions produced by itself through afforestation, energy conservation and emission reduction, achieving positive and negative offsets, and achieving relatively "zero emissions."

It is understood that China will achieve carbon peak and carbon neutrality goals by 2030 and 2060 respectively.

The global carbon neutrality goals are as follows:


Currently, we choose to adopt a "carbon pricing mechanism" to achieve the goal of carbon neutrality. The so-called carbon pricing, that is, "who pollutes, pays" means that if you want to emit greenhouse gases such as carbon dioxide, you must first obtain the right to carbon emissions, and then pay for this right. There are two specific methods: levying a carbon tax and establishing a carbon emissions trading system (referred to as carbon trading).

Carbon tax policy is not difficult to understand. At present, the public discussion is more about carbon trading.

The so-called carbon trading refers to treating carbon dioxide emission rights as a commodity, which can be bought and sold between enterprises through a certain mechanism. This market formation is usually artificially created by the government through emission control of energy-consuming enterprises.

However, from a global perspective, a unified global carbon trading market has not yet been formed, and my country is still in the pilot stage of carbon emissions trading.

Currently, a total of 8 regions are carrying out carbon emissions trading pilot projects, respectively.They are: Beijing, Tianjin, Shanghai, Chongqing, Hubei, Guangdong, Shenzhen and Fujian.

According to ICAP statistics, the total amount of quotas in the world's 21 operating carbon markets in 2020 is approximately 4.782 billion tons. Among them, the eight pilot markets totaled 1.425 billion tons, accounting for 29.8%, second only to the EU.

According to Guosen Securities’ prediction, as the market improves and coverage increases, transactions will become more and more active, and the national carbon trading market transactions may reach more than 100 billion in 2030.

#02

What kind of chemical reaction will blockchain + carbon neutrality produce?

Today, the carbon neutrality movement is in full swing. In addition to energy-saving and emission-reduction measures in real life, some emerging new technologies are also providing more solutions to achieve this goal. Taking blockchain as an example, it trades efficiency for energy saving, thereby reducing carbon emissions, and may speed up the achievement of carbon neutrality.

A special researcher at Ouke Cloud Chain Research Institute said:

“In terms of helping achieve carbon neutrality goals and industrial transformation and upgrading, the advantages of blockchain-related technologies and models are mainly reflected in the following: Three aspects: First, on the enterprise side, the natural advantages of blockchain data transparency and traceability and supply chain management can effectively improve the overall output efficiency and resource utilization of each link in the industrial chain, and activate low-carbon and zero-carbon related suppliers. and the market value and competitiveness of related processes; secondly, on the management side, carbon accounting standards based on blockchain technology and smart contract execution can be established to achieve unified management of the entire industry, automatic sorting, and carbon emission early warning with clear rights and responsibilities. Rewards and penalties, etc.; thirdly, on the energy side, blockchain technology is deeply involved in energy distribution, trading, recycling and other aspects, such as focusing on energy distribution in low-carbon industries, promoting the transformation of the energy market from centralized to decentralized, reducing waste, etc. Objectively, it also stimulates the vitality of the renewable energy market."

In addition, he also pointed out that in the process of assisting "carbon neutrality", blockchain technology does not exist independently. It can only be integrated with big data. , privacy computing, knowledge graph, Internet of Things and other technologies, only by opening up data islands and analyzing and summarizing data on the chain can the role of blockchain be better utilized, thereby creating a more visible and credible carbon regulatory environment.

Today, the carbon trading market is gradually getting on the right track, and the application of blockchain in this field is also maturing. At present, IBM, State Grid, Huawei, etc. have also joined the practice. As a new generation of disruptive core technology that has emerged after steam engines, electricity, and the Internet, the blessing of blockchain is bound to make my country's carbon trading market more standardized and dynamic.

博客主人唯心底涂
男,单身,无聊上班族,闲着没事喜欢研究股票,无时无刻分享股票入门基础知识,资深技术宅。
  • 39647 文章总数
  • 3637500访问次数
  • 3092建站天数