区块链身份证加密怎么解除,区块链身份证加密怎么弄
区块链身份证加密是一种可靠的数据安全技术,用于保护个人信息和数据安全。本文将介绍区块链身份证加密解除的三个关键技术:数字签名、数据加密和公钥加密。
一、数字签名数字签名是一种常用的区块链身份证加密解除方式。数字签名是一种密码学技术,它将一个文件的摘要(也称为消息摘要)与一个用户的公钥结合起来,形成一个数字签名。这种数字签名可以验证文件的完整性和可靠性,从而解除区块链身份证加密。
二、数据加密数据加密是另一种常用的区块链身份证加密解除方式。数据加密是一种密码学技术,它将数据进行加密,使其更加安全。加密后的数据只有在使用正确的密钥时才能解密。因此,采用数据加密技术可以解除区块链身份证加密,从而保护个人信息的安全。
三、公钥加密公钥加密是另一种常用的区块链身份证加密解除方式。公钥加密是一种密码学技术,它使用一对公钥和私钥来加密和解密数据。公钥可以公开,私钥则只能保存在受信任的安全位置中。因此,采用公钥加密技术可以解除区块链身份证加密,从而保护个人信息的安全。
本文介绍了区块链身份证加密解除的三种关键技术:数字签名、数据加密和公钥加密。这三种技术都可以有效地解除区块链身份证加密,从而保护个人信息的安全。
请查看相关英文文档
Ⅰ The significance of digital identity in the blockchain (with an excellent blockchain article that triggers thinking)
As the infrastructure and connector of the current Internet, WeChat The value of the Internet is based on "connection", the connection between people, the connection between people and money, the connection between people and things. Now it can also be the connection between people and things (scan the code of Mobike mini program to ride a bike), but all "connections" "The premise is that I trust WeChat, I trust Tencent, I trust the legal regulation of the Internet, and I trust that everyone around me is using WeChat. The root cause of this trust is trust in centralization, trust in companies with good reputations, and trust in institutions. , the rule of law, and community trust.
Nowadays, the blockchain seems to be able to turn each node in the blockchain network into a "WeChat". In order to form this kind of decentralized trust, we need to define a unique identifier for the node "WeChat". Trust the digital identity. This digital identity is not only the private key for managing your own digital assets in the blockchain network, but also allows this digital identity to ultimately serve real life and implement application scenarios. Therefore, it also needs to be endowed with prerequisites. The credit label of the legal system, institutions and communities.
The future world is distributed, and each node is verifiable and trustworthy. Whether placed in the blockchain or in the real world, each node becomes a "WeChat" trusted by all of us. , and at the same time, we ourselves can also become “WeChat” trusted by others.
Attachment: The significance of digital identity for blockchain - Liu Yongxin (NEL)
1. Ship of Theseus - How to define yourself
In life, we often use Regarding identity, we often introduce ourselves to others. Sometimes we give out our business cards, and sometimes we show our ID cards. However, many people may not know what the meaning of identity is and how to define it.
There is a famous thought experiment called "The Ship of Theseus". The Ship of Theseus can sail uninterruptedly on the sea for hundreds of years. If a plank rots, a new plank will be replaced until there is a plank. One day, all the planks on the ship were not the original planks. So was the ship still the original ship of Theseus?
The human body is like the ship of Theseus. Cells are always undergoing metabolism. So all the cells have been renewed. Are you still the same person? What if your thoughts and personality also change?
Therefore, how to define yourself does not seem to be a simple matter.
2. Identities in life
In life, we have many identities. For example, in a company, you have your own position. In a family, you may be a husband or a wife. Or a child, for the bank, you are its customer, for your house, you are its owner, the tenant's landlord, for your car, you are the owner.
So we find that in different scenarios, you have different identities, and different identities usually correspond to different objects. For a bank, what it cares about is whether you are its customer. It doesn’t matter what role you play in the family. For a car, as long as you have its key, you can start it. Whether you are the landlord Don't care.
3. Define identity
Based on the previous discussion, I try to define identity:
Identity is the identifier of relationship,
Relationship is Bidirectional,
A relationship represents the rights and obligations between the parties.
So you have different relationships with different objects, you have different rights and obligations, and you have different identities.
For the country, you have citizenship, which is usually represented by an ID card. Citizenship means that you have the obligation to pay taxes and that you have the right to vote in elections. To the bank, you are its customer, representing your deposits and liabilities with it. For blockchain, you master the private key, which means you own the assets controlled by the private key, and the private key is your identity.
Therefore, we should not abandon the object and explore identity. What is important is not who you are, but who you are in the eyes of others.
In the process of using identity, there are two processes: authentication and verification. For example, after a Chinese is born, he has to go to the police station to register his household registration. This is the authentication process. After that, presenting his ID card is the verification process. Registration and login of accounts on the Internet are identity authentication and verification processes. The certification and verification of asset ownership in the blockchain is achieved through a consensus algorithm, which can be simply considered to be 51% voting approval.
4. Trusted data
Satoshi Nakamoto wrote a sentence in Bitcoin’s genesis block: “The Times 03/Jan/2009 Chancellor on brink of second lout for banks", this sentence was the front page headline of The Times that day, meaning "the Prime Minister saved the banks from the brink for the second time".
Many people believe that this sentence proves that The Times must have published this article that day, reflecting the existence proof capability of the blockchain.
However, the blockchain can only ensure that the written data cannot be tampered with, but cannot guarantee the authenticity of the data. The reason why we believe that this newspaper article must exist is because it was Satoshi Nakamoto who wrote the blockchain, and the authenticity of the data is guaranteed by Satoshi Nakamoto’s credibility.
In fact, the authenticity of data is generated in two ways:
Decentralized method, or 51% democratic voting, such as Bitcoin transaction numberThe authenticity of the data is actually guaranteed through 51% computing power voting. When off-chain data is uploaded to the chain, the authenticity of the data can also be guaranteed through manual voting, such as the decentralized prediction platform Augur.
However, not all consensus can be reached through majority rule.
For example, whether a work of art is authentic or fake must be authenticated by experts, but cannot be determined by the majority. The credibility of the appraisal results is guaranteed by the credit of experts. Whether a person is Chinese or not is verified by the police station when registering for residence, not by a vote of all Chinese people. Therefore, for specific scenarios, sometimes it is necessary to confirm the authenticity of the event through recognized authorities.
Normally, data native to the chain, such as token distribution, transactions and other data, can be easily reached consensus through a minority-subject-majority voting mechanism. However, when off-chain data is uploaded to the chain, its data Authenticity relies on the identity and reputation endorsement of the person on the chain, and sometimes legal means are needed to deter fraud through accountability mechanisms.
5. Trusted data uploading to the chain
Therefore, for the uploading of off-chain data, the authenticity of the data can be completed through the vote of a minority subject to the majority or the credibility endorsement of an authoritative identity.
The basic process of uploading trusted data to the chain should be as follows:
First, you need to have a digital identity. The authentication of this identity may be generated by 51% of the votes. It may also be through authoritative certification.
Then when the data is uploaded to the chain, identity information needs to be attached.
After obtaining the data, the data user verifies the identity information, and then determines the credibility of the data based on the verification results.
6. Identity management
When we use network applications, we need to register and log in to our account. Sometimes, for convenience, we will use third-party applications to register and log in. This Although the identity hosting method provides convenience, third-party applications can actually log in to the application without our authorization, perform operations, and obtain personal data.
So ideally, we want to be able to balance convenience and security. We want to be able to log in to different applications through the same account and be completely controlled by ourselves.
Digital identities can be roughly divided into three categories:
Digital sovereign identities, in the form of CA certificates, EIDs and other solutions in China, must be known to meet government supervision and be compatible with national laws. Sovereign identity.
Digital network identity, that is, the login account of various APPs
Digital asset identity, that is, the addresses and private keys of various blockchain assets
Digital identity management applications should be compatible with these identities and be able to achieve identity authentication, verification, cancellation, and loss retrieval. wait.
There should also be a data management platform to realize data storage and permission management.
The blockchain platform can be used as a data storage platform to store data fingerprints, reading and writing records, etc. Smart contracts can realize identity verification and avoid redundant information leakage through encryption technology. Multi-signature enables key retrieval. At the same time, the blockchain is also a registration platform for digital assets.
On this basis, a variety of application scenarios can be realized, such as: APP login, electronic contract signing, supply chain, copyright protection, and asset digitization.
When digital identity and blockchain are combined, coupled with a data management platform, the needs of the alliance chain can be realized, such as the KYC alliance between banks. The essence of the alliance chain is identity-based data mutual trust. It does not matter whether it is a separate chain.
Once blockchain assets are associated with sovereign identities, they can meet government regulatory needs, and regulatory strategies that meet regulatory needs can be added at the application layer.
Therefore, if blockchain is to be applied on a large scale in the future, it is necessary to solve the problem of digital identity. Digital identity is the bridge between the on-chain and off-chain, and the bridge between blockchain and compliance supervision.
As more and more applications and assets are built on the blockchain, big data analysis becomes possible because of the unified identity. Therefore, the combination of big data and blockchain, It’s also inseparable from digital identity.
II DR’s response to the 800 yuan deletion of purchase records is untrue: Blockchain technology encryption, why is this marketing questioned?
Many people around me do this when getting married or proposing. The first reason for choosing DR diamond rings is actually better publicity. The second reason is that many people firmly believe in this concept. Tonight, let’s talk about DR diamond rings with you.
How do you view this matter?First of all, when this brand makes diamond rings, it has a higher calcium content than those worth thousands or tens of thousands of dollars. In fact, in terms of workmanship and design, it is not very unique in the industry. But the fact that one person can customize one is a very selling point. If even this can be faked, it doesn’t really matter whether he buys it or not. So from now on, I think this news is still not true, after all. It can be regarded as the biggest selling point of a product, and it will not make this reputation very bad.
III How does blockchain technology protect the privacy and rights of information subjects
Privacy protection methods can be divided into three categories:
First, the privacy protection of transaction information;Privacy protection for transaction senders, transaction recipients, and transaction amounts includes currency mixing, ring signatures, and confidential transactions.
The second is privacy protection for smart contracts, and protection solutions for contract data, including zero-knowledge proof, multi-party secure calculation, homomorphic encryption, etc.
The third is the privacy protection of data on the chain, which mainly includes solutions such as ledger isolation, private data and data encryption authorized access.
Extended information:
1. Blockchain encryption algorithm isolates identity information and transaction data
1. Transaction data on the blockchain, including transaction address, amount, transaction time, etc., are open, transparent and queryable . However, the identity of the user corresponding to the transaction address is anonymous. Through the blockchain encryption algorithm, the separation of user identity and user transaction data is achieved. Before the data is saved to the blockchain, the user's identity information can be hashed, and the resulting hash value is used as the user's unique identifier. The user's hash value is stored on the chain instead of the real identity data information. Transaction data is bundled with hash values rather than user identity information.
2. Therefore, the data generated by users is real. When using these data for research and analysis, due to the irreversibility of the blockchain, no one can restore the name, phone number, and email address of registered users through hash values. and other private data, playing a role in protecting privacy.
2. Blockchain "Encrypted Storage + Distributed Storage"
Encrypted storage means that a private key must be provided to access data. Compared with ordinary passwords, private keys are more secure and almost impossible to be cracked by violence. . Distributed storage and decentralized features reduce the risk of all data being leaked to a certain extent. However, with centralized database storage, once the database is attacked by hackers, all data can easily be stolen. Through "encrypted storage + distributed storage", users' data privacy can be better protected.
3. Blockchain consensus mechanism prevents individual risks
The consensus mechanism is a mechanism for blockchain nodes to reach a consensus on block information across the entire network, which can ensure that the latest blocks are accurately added to the blockchain and node storage The blockchain information is consistent and unforked, which can resist malicious attacks. One of the values of the blockchain lies in the consensus governance of data, that is, all users have equal management rights to the data on the chain. Therefore, the risk of individual mistakes is first eliminated from the operation. Data decentralization is solved through the network-wide consensus of the blockchain, and zero-knowledge proofs can be used to solve verification problems and realize the scenario of using user privacy data in a public decentralized system. While meeting the needs of the Internet platform, it also So that part of the data is still only in the hands of the user.
4. Blockchain Zero-Knowledge Proof
Zero-knowledge proof means that the prover can make the verifier believe that a certain assertion is correct without providing any useful information to the verifier, that is, proof The investor can fully prove that he is the legal owner of certain rights and interests without leaking relevant information, that is, the "knowledge" to the outside world is "zero". Applying zero-knowledge proof technology can achieve data correlation in the case of ciphertextRelationship verification enables data sharing while ensuring data privacy.
IV The understanding of “blockchain” and the application of “blockchain”
The understanding of “blockchain” and the application of “blockchain”
“ "Blockchain" can be said to be the hottest keyword right now. Whether it is online information or daily chat, you can hear about it everywhere. Although there is a lot of discussion, most people are still relatively ignorant about "blockchain". Therefore, we often hear many people ask "What is blockchain technology?" "What is the relationship between digital currency and blockchain?" "How can we identify a good blockchain project?" and other related questions.
As for what exactly is blockchain?
Blockchain technology refers to a way for all people to participate in accounting. There is a database behind all systems. You can think of the database as a big ledger. Currently, each system keeps its own account.
But now in the blockchain system, everyone can keep accounts. The system will automatically select the person with the best and fastest accounting, write the contents of his accounting into the ledger, and record the information in the ledger. The content is distributed to everyone in the system for backup.
So what are the benefits of such universal accounting?
First of all, the biggest benefit is security. With this central ledger, others cannot change or destroy it, because it is not a computer Computer control can not only greatly reduce costs, but also improve efficiency. And since everyone has the same ledger, it can ensure that the ledger recording process is open and transparent.
Secondly, the most important thing about blockchain technology is that it can solve the problem of intermediary credit. In the past, it was difficult for two people who did not trust each other to cooperate and had to rely on a third party, just like transfers must go through a bank, but through Blockchain technology, Bitcoin, without the participation of any intermediary agency, has for the first time achieved a transfer behavior in which both parties can trust each other;
Because the blockchain does not require the participation of an intermediary, the process is efficient and transparent, and the cost is very low, Data is highly secure, so any industry or field that has needs in any of these three aspects will have the opportunity to use blockchain technology.
If you still say that "blockchain" can only be used for currency speculation, then you are too behind:
With the improvement of living standards and the upgrade of the consumption era, many people like to buy when traveling abroad Buy, buy, even people who don’t go abroad also like to buy some imported goods online. As a result, cross-border online shopping has risen rapidly in recent years. However, many processes and links of cross-border online shopping occur abroad. As a cross-border online shopping user, how can you ensure that the goods you buy are not A-grade or counterfeit goods?
In order to solve the problem of allowing consumers to buy their favorite goods At the same time, it is genuine and licensed. Now we have a reliable and convenient solution, which is blockchain technology. It has the following characteristics:
1. Use block chain data structure to verify and store data.
2. Use distributed node consensus algorithm to generate andUpdate data
3. Use cryptography to ensure the security of data transmission and access
4. Use smart contracts composed of automated script codes to program and operate data
Nowadays, many e-commerce companies see Taking advantage of these advantages of blockchain technology, it can be used in overseas shopping businesses, such as JD.com. It is understood that JD.com has now reached cooperation with brands such as Kelaisi Mask, Cheonggwanjang Korean Ginseng and Red Ginseng, Amore Cosmetics, Oberton Apricot Dried Raisin Fruit Oatmeal and other brands. With the help of blockchain technology, the products of these brands Information on the raw material process, production process, circulation process, and marketing process is integrated and written into the blockchain to achieve full-process authenticity traceability down to one item and one code.
Thus, each piece of information has its own unique blockchain ID "identity card", and each piece of information is accompanied by the digital signature and timestamp of each subject for consumers to query and verify. The data signature and encryption technology of blockchain enables full-link information to achieve tamper-proof, unified standards and efficient exchange.
Now that we have reliable technology like blockchain, and reliable cross-border traceability and cross-border logistics, we no longer need to go abroad to buy in person, nor do we need to worry about what we are doing on e-commerce platforms. The product purchased is not genuine. As long as we sit at home and move the mouse, our favorite overseas big-name products will arrive as scheduled. I believe that in the near future, blockchain technology will also be applied to other e-commerce companies.
IV Are blockchain transactions anonymous? Why do exchanges require identity authentication?
Identity authentication originates from the KYC system. First, let’s talk about what KYC is. KYC (know-your-customer) is a basic system in the financial industry. Traditional financial institutions will require customers to provide identification, location, employment certificate, income and other information, mainly to comply with anti-money laundering and the Anti-Terrorist Financing Rules (AML-CFT), while the requirements for cryptocurrency exchanges are relatively low, generally only requiring real-name authentication.
Ordinary users conduct cryptocurrency transactions through exchanges. Centralized exchanges basically require KYC. Although there are now decentralized exchanges that do not require KYC, they have few users, poor liquidity, and Compared with centralized exchanges, they are still non-mainstream (although Binance DEX is a decentralized exchange, it also requires KYC). This has also resulted in KYC becoming a step that users must go through to enter the crypto market.
Many people have doubts about this. Does KYC violate the decentralized spirit of cryptocurrency? Will their KYC information be abused? The author believes that these two points are not contradictory. Although cryptocurrency is decentralized, the exchange itself is not. In today's chaotic currency circle, KYC is still necessary.
The purpose of KYC by exchanges is to ensure that only qualified people can use a service and to prevent minors, illegal elements or users from countries that do not provide services from using it.
At the beginning, many exchanges did not requireKYC, when the crypto market was still very weak, did not attract the attention of regulators. However, as the size and influence of the encryption market grows, the government can no longer continue to ignore it. Regulators in various countries have introduced policies to incorporate the cryptocurrency industry into the traditional financial supervision field. The price of cryptocurrency compliance is having to adhere to strict KYC/AML-CFT regulations.
The anonymity and transnational circulation of cryptocurrency make it very suitable for use in various illegal activities. This is also a very powerful excuse for anti-crypto people to attack Bitcoin. During the Libra hearing, both Trump and the U.S. Treasury Secretary focused on this issue. The AML-CFT rules are a system designed to prevent criminals from being used by criminals involved in illegal activities such as terrorist financing and money laundering.
Of course, the implementation of KYC by exchanges is not entirely due to policy reasons. Security factors are also a major motivation. If an exchange allows anyone to trade without verifying their identity, it will easily attract criminals and become a breeding ground for money laundering and fraud. After KYC, the exchange can grasp the true identity of the users and find them if problems arise, which is conducive to combating crime and protecting the security of user assets.
KYC also plays a role in suppressing fraudsters and fake accounts. In order to attract new and active users, many exchanges have various activities such as airdrops, invitation rebates, and trading competitions. Without KYC, the wool party can register a large number of accounts at almost zero cost through the code receiving platform, but KYC has raised the threshold a lot, which is also the way many platforms now combat the army of account swiping.
The method that takes into account both privacy and KYC does not yet exist. In order to ensure the interests of exchanges and customers, it is foreseeable that the current KYC model will continue to exist for a long time.
As users, we can only improve our security awareness. In order to ensure the security of KYC information as much as possible, we must choose a large and guaranteed trading platform. The KYC systems of these exchanges are more complete and are relatively safer. In addition, information such as watermarks and timestamps can be added to the image before submitting KYC information, so that the harm of leakage is very limited.
VI How to set private privacy of Jack Ma's blockchain
As a decentralized database technology, the private privacy setting of blockchain is a very important part. Jack Ma may set up the following aspects of privacy protection on his own blockchain:
1. Identity verification: On Jack Ma’s blockchain, individual users can protect their privacy through identity verification. This means that only authenticated users can access specific information.
2. Encrypted data: Jack Ma can use blockchain technology to encrypt personal data to prevent unauthorized access. This encryption technology protects user privacy by ensuring that only authorized users can access data.
3. Anonymous transactions: An anonymous transaction function can be set up on Jack Ma’s blockchain so that users canMake transactions without revealing your identity. This approach can protect user privacy to the greatest extent.
4. Restrict access rights: Jack Ma can set access limits on the blockchain to only allow specific users or organizations to access specific information. This approach protects user privacy by ensuring that only authorized people have access to sensitive information.
In short, Jack Ma can protect his blockchain privacy through various means such as identity verification, encrypted data, anonymous transactions and restricted access rights. These measures ensure that users’ data and privacy are protected to the greatest extent possible.
Ⅶ How does blockchain bring about a “revolution” in personal data protection
How does blockchain bring about a “revolution” in personal data protection
US media on the evening of the 17th local time It was disclosed that the British company Cambridge Analytica, which was deeply involved in the scandal of abusing personal privacy data, originally planned to launch a personal privacy data storage service and sell it in the form of cryptocurrency through blockchain technology. The concept of encrypting personal information is actually not new. The key to this idea lies in everyone's autonomy over personal information. Some industry insiders believe that blockchain technology may bring about a "revolution" in personal data protection.
In the era of big data, personal data is considered as precious as gold. The leakage of personal data is worrying, but most people are unlikely to cut off their connection with the Internet because they are afraid that their data will be collected. At this stage, companies, schools, hotels, social networking sites, etc. that are responsible for keeping personal information often fail to take responsibility. Experts believe that blockchain technology, as a "middleware" with features such as encryption, trust, peer-to-peer, and difficulty in tampering, is expected to solve this problem.
The emergence of blockchain technology has transferred the control of personal data from Internet companies to the hands of users themselves, making it possible for everyone to control their own personal data. Through it, users' personal data can be associated with personal digital ID cards. Users can choose whether the digital ID card is anonymous, pseudonymous or public. They can also access the blockchain application platform from any device anytime, anywhere to control their Internet personal data.
For example, the information on a person’s ID card number on the blockchain may be converted into a string of ciphertext, and the facial image information may also be encrypted. When he checks in at the hotel, he only needs to send the encrypted text of his ID number to the hotel through the application. The hotel will compare the information with the encrypted data on the blockchain application. It does not need to know any of his real information, but as long as the encrypted data compares If the results match, you can guarantee your stay.
At the same time, big data and artificial intelligence development require a large amount of user data resources. Users can selectively sell personal data as cryptocurrency and receive certain returns. For example, if an e-commerce company needs user data to develop a new application, users can choose to sell their shopping history data, but their address, account number and other information can still be kept confidential.
In the field of gene sequencing, blockchain applications have begun to allow traditional gene sequencing companies to "make money" by selling personal data.Be challenged.
In recent years, gene sequencing services for ordinary people have become highly sought after. Taking the American Chromosome Biotechnology Company "23&Me" as an example, consumers can obtain family genetic information for less than $100 and a few mouthfuls of saliva. If they pay an additional $80, they can obtain genetic health risks based on the original data. In-depth analysis of other aspects. However, this company is not satisfied with the revenue from sequencing services. It also packages millions of customer genetic data it has in its possession and sells them to pharmaceutical companies. The Parkinson's disease data sold in early 2015 alone was worth US$60 million. Many similar biotech companies earn service revenue from consumers while reselling consumers' data to "make double money."
In February this year, George Church, a geneticist from Harvard University in the United States, founded the company "Nebula Gene", hoping to break this pattern through blockchain technology. The company plans to complete whole-genome sequencing at a price of less than $1,000. This cost will be borne by the customer. In return, the customer will have an intuitive understanding of the disease risks corresponding to their genetic information and will also have autonomy over the sequencing data. Genetic information will be secured through blockchain technology, encrypted and stored and sold according to the customer's wishes.
This company plans to launch a "Nebula Coin" as a transaction medium. Customers can exchange their genetic information for "Nebula Coins" and can also use "Nebula Coins" to pay for their own sequencing. Pharmaceutical companies can use Traditional currency purchases "Nebula Coins" to obtain the genetic information data of ordinary people. The entire transaction process is completed through the blockchain platform, and the encryption is transparent and secure.
Church said that after comprehensive factors such as sequencing costs, genetic information protection, data management and genomic big data processing, blockchain technology allows more people to truly "own" their own genetic information.
Ⅷ Getting Started with Blockchain What You Need to Know!
What is a blockchain?
Literally: a blockchain is a chain composed of small blocks that record various information, similar to what we will Bricks are stacked one after another, and they cannot be removed after being stacked. Each brick also has various information written on it, including: who stacked it, when it was stacked, what material the brick was made of, etc. You can use this information There is no way to modify it.
From a computer perspective: Blockchain is a relatively special distributed database. A distributed database stores data information on each computer separately, and the stored information is consistent. If one or two computers in Taiwan are broken, the information will not be lost, and you can still view it on other computers.
Blockchain is distributed, so it has no central point. Information is stored in all nodes that join the blockchain network, and the data of the nodes is synchronized. A node can be a server, laptop, mobile phone, etc.
What you need to know is that the data stored in these nodes are exactly the same.
Blockchain Features
Decentralization: Because it is distributed storage, so there is no central point. It can also be said that each node is a central point. Applications in life do not require a third-party system (banks, Alipay, real estate agencies, etc. are all third parties).
Openness: The system data of the blockchain is open and transparent, and everyone can participate. For example, when renting a house, you can know the previous rental information of the house and whether there have been any problems. Of course, some individuals here Private information is encrypted.
Autonomy: The blockchain adopts consensus-based specifications and protocols (such as a set of open and transparent algorithms), and then each node operates according to this specification, so that everything is done by machines and there is no human touch. Element. This changes trust in people to trust in machines, and any human intervention has no effect.
Information cannot be tampered with: If the information is stored in the blockchain, it will be saved permanently and there is no way to change it. As for the 51% attack, it is basically impossible to achieve.
Anonymity: There is no personal information on the blockchain, because it is all encrypted and is a string of letters and numbers, so your ID card information and phone number will not be resold. Phenomenon.
Block structure
A block contains two parts:
1. Block header (Head): records meta-information of the current block
2. Block body (Body): actual data
>Contains data as shown below:
How blockchain works
Let’s take transfer as an example:
Currently our transfers are centralized, and the bank is a centralized ledger. For example, there is 400 in account A There are 100 yuan in account B.
When A wants to transfer 100 yuan to B, A needs to submit a transfer application through the bank. After the bank verification is passed, 100 yuan will be deducted from A's account and 100 yuan will be added to B's account.
After calculation, the balance of account A after deducting 100 is 300 yuan, and the balance of account B after adding 100 is 200 yuan.
The steps for transferring money on the blockchain are: A wants to transfer 100 yuan to B. A will tell everyone about the transfer on the Internet, and everyone will check whether there is enough money in A's account. To complete the transfer, if the verification is passed, everyone will record this information in the blockchain on their computers, and the information recorded by everyone will be synchronized and consistent, so that A will successfully transfer 100 yuan to on B’s account. You can see that there is no bank involved.
Related questions
What is the relationship between blockchain and Bitcoin?
Bitcoin was proposed by Satoshi Nakamoto in 2009, and then the blockchain technology was refined with reference to the implementation of Bitcoin.
If Bitcoin is noodles, then blockchain is flour. Later, everyone discovered that flour can be used to make steamed buns and steamed buns in addition to noodles.
Why do I need to help you store block information?
It’s not worth it. To put it simply, you help me store the information and I’ll give it to you.due remuneration.
Key technical points that need to be understood in blockchain?
Use Hash and asymmetric encryption to ensure that data cannot be tampered with:
Hash: y = hash(x), perform a hash operation on x to obtain y , the original information x can be hidden, because you cannot calculate x through y, thus achieving anonymity.
Asymmetric encryption: The public key and the private key are a pair. If the public key is used to encrypt the data, only the corresponding private key can be used to decrypt it; if the private key is used to encrypt the data, then only It can be decrypted with the corresponding public key.
Consensus algorithm: Ensure data consistency between nodes.
Is there a sentence or two that can explain the blockchain?
Yes.
Mahjong is a traditional Chinese blockchain project. A group of four miners work together. The miner who first collides with the correct hash value of 13 numbers can obtain the accounting rights and be rewarded.
- 上一篇: 警方端掉区块链传销组织怎么处理,警方端掉区块链传销组织怎么办
- 下一篇: 区块链快递物流,区块链 园区