Position: Home page » Bitcoin » How many signatures are needed for bitcoin's midstream storag

How many signatures are needed for bitcoin's midstream storag

Publish: 2021-04-15 22:31:43
1. The concept of bitcoin was first proposed by Nakamoto on November 1, 2008, and was officially born on January 3, 2009. According to the idea of Nakamoto, the open source software is designed and released, and the P2P network on it is constructed. Bitcoin is a virtual encrypted digital currency in the form of P2P. Point to point transmission means a decentralized payment system
unlike all currencies, bitcoin does not rely on a specific currency institution to issue. It is generated by a large number of calculations based on a specific algorithm. Bitcoin economy uses a distributed database composed of many nodes in the whole P2P network to confirm and record all transactions, and uses cryptography design to ensure the security of all aspects of currency circulation. The decentralized nature and algorithm of P2P can ensure that it is impossible to artificially manipulate the value of bitcoin through mass proction. The design based on cryptography can make bitcoin only be transferred or paid by the real owner. This also ensures the anonymity of money ownership and circulation transactions. The biggest difference between bitcoin and other virtual currencies is that the total amount of bitcoin is very limited and it has a strong scarcity.
2. I'll give you my address (address). You can find my zip code (public key). You can write to me with my zip code (public key) + address. The mail will be sent to my mail cabinet. I'll open the mail cabinet (private key) with the key I have. The key of express cabinet is stored in my wallet (wallet)
1. The mail cabinet is stolen (the database is stolen)
2. The key is stolen (the private key is stolen)
3. Knowing my home address (the public key is stolen), the lock of the mail cabinet is opened violently (the private key is cracked violently).
3. The digital signature of bitcoin is an anti-counterfeiting string generated only by the transferor of bitcoin transfer. By verifying the digital string, on the one hand, it proves that the transaction is initiated by the transferor, on the other hand, it proves that the transaction information has not been changed in the transmission
digital signature shortens transaction information to a fixed length string through digital digest technology. For example, when Niuniu initiates a bitcoin transfer, it needs to first digest the transaction into a string, and then encrypt the digest with its own private key to form a digital signature. After the completion, Niuniu needs to broadcast the original (transaction information) and digital signature to the miner, and the miner uses Niuniu's public key for verification. If the verification is successful, it means that the transaction is indeed sent by Niuniu, and the information has not been changed
at the same time, the private key encrypted by digital signature is inconsistent with the public key decrypted by digital signature, so asymmetric encryption technology is adopted. It looks so complicated. In fact, you only need to input the private key to complete the transfer instantly!
4. The digital signature in bitcoin is generated by the initiator in the transaction. In order to ensure that this transaction is initiated by this person, and the data is not tampered with ring transmission. Digital signature is simply a complete transaction information, compressed into a fixed format string by digital digest technology, and then generated a private key by asymmetric encryption technology. The complete transaction information and digital signature are sent to the miner. The miner decrypts the digital signature with the public key of the transaction initiator. If the decryption is successful, the transaction data will be written into the block.
5.

Analysis of the role of adventure and mining skills, what are the roles of skills in adventure and mining mobile games, and what are the differences of different skills. Today, I'd like to introce the role of adventure and mining skills{ RRRRR}

< critical hit

class A certain probability causes 150% of the attack power & mdash; 400% of the damage. Some skills can't be dodged, some skills can only be triggered when the enemy's combat power or own combat power is lower than what percentage, and some skills can't be launched until a certain round

< percentage

class It has a certain probability to damage the enemy's current combat power percentage. Heroes with this skill are best placed in the front row. The earlier you trigger, the better. Armor can resist the damage of this ability

< recovery class

It has a certain probability to recover the combat power of your damage percentage or the combat power of the enemy. Hit damage will be resisted by armor, but recovered combat power will not count as armor. When you regain your combat power, you will ignore the enemy's armor

< four dimensional

class Increase your four dimensions, attack, defense, dodge and king

6. Bitcoin can be cashed and converted into the currency of most countries. Users can use bitcoin to buy some virtual goods, such as clothes, hats and equipment in online games. As long as someone accepts it, they can also use bitcoin to buy real-life goods
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750