The cryptographic technology of blockchain includes digital sign
blockchain refers to the technical solution of collective maintenance of a reliable database through centralization and distrust in the past, and it is a technical way for the whole people to participate in bookkeeping. Previous bookkeeping methods were all centralized and needed centralized intermediary, whether it was traditional government, financial institutions, notarization institutions or emerging e-commerce platform and online payment platform
in economic hypothesis, information is sufficient. In fact, it is precisely because of insufficient information that there are very large intermediaries. The existence of intermediaries increases the transaction cost and raises the transaction threshold. In essence, blockchain technology is a large-scale collaboration tool. It makes direct value transfer possible by using pure technology for the first time, and continues the trend of Internet decentralization and disintermediation. Disintermediated blockchain technology will greatly subvert the information intermediary instry
blockchain technology is the basic technology for building bitcoin data structure and encrypted transmission of transaction information, which realizes the issue and transaction of bitcoin. The core of blockchain technology is that all the current participating nodes jointly maintain the transaction and database, so that the transaction is based on the principle of cryptography rather than trust, so that any agreed parties can directly carry out payment transactions without the participation of a third party
technically, a block is a data structure for recording transactions, reflecting the capital flow of a transaction. In the system, the transaction blocks are connected to form a main chain, and all the nodes participating in the calculation record the main chain or part of the main chain
a block contains the following three parts: transaction information, hash formed by the previous block and random number. Transaction information is the task data carried by the block, including the private keys of both parties, the number of transactions, the digital signature of electronic currency, etc; The hash hash formed by the previous block is used to connect the blocks and realize the sequence of past transactions; Random number is the core of the transaction. All nodes compete to calculate the answer of the random number. The node that gets the answer the fastest generates a new block and broadcasts it to all nodes for updating, so as to complete a transaction.
From the perspective of technology and architecture, I will tell you my understanding of blockchain in common language
what is blockchain? In a word, blockchain is a storage system. To be more specific, blockchain is a distributed storage system without an administrator and each node has all the data
What are the common storage systems like
first, how to ensure high availability
the common storage system usually uses "rendancy" to solve the problem of high availability. As shown in the figure above, if the data can be copied into several copies and rendant to multiple places, high availability can be guaranteed. The data in one place is hung, and there is data in other places. For example, the master-slave cluster of MySQL is the same principle, and the raid of disk is also the same principle
two points need to be emphasized in this place are: data rendancy often leads to consistency problems
1. For example, in the master-slave cluster of MySQL, there is actually a delay in reading and writing, which means there is a inconsistency in reading and writing in a short period of time. This is a side effect of data rendancy
The second point is that data rendancy often reces the efficiency of writing, because data synchronization also consumes resources. If you add two slave libraries, the write efficiency will be affected. The common storage system is to use rendancy to ensure the high availability of dataso the second question, ordinary storage system, can write more
the answer is yes, for example, take this graph as an example:
in fact, MySQL can do a master-slave synchronization of al masters, master-slave synchronization of al masters, two nodes can be written at the same time. If you want to do a multi room multi live data center, in fact, multi room multi live data synchronization. What we should emphasize here is that multi-point writing often leads to the consistency problem of writing conflicts. Take MySQL as an example, suppose that the attribute of a table is self incrementing ID, then the data in the database is 1234 now. If one of the nodes writes and inserts a piece of data, it may become 5, and then these 5 pieces of data are synchronized to another master node, Before synchronization, if another write node inserts a piece of data, a piece of data with self incrementing ID of 5 will be generated. Then, after the generation, synchronize to another node, and the synchronized data will conflict with the two local 5's after it arrives, which will lead to synchronization failure and write consistency conflict. This problem will occur in the case of multi-point writing
how to ensure consistency in multi-point writing
the reform "Swan class" gives you more technical work
blockchain technology has been questioned by the collapse of the centralized currency exchange, but its potential to solve the trust and centralization problems of the existing information architecture has attracted a lot of attention. Blockchain technology first gained great popularity in the field of bitcoin and digital currency. It uses a single shared ledger to store information. It is no longer to let a single central organization obtain the account book, but to obtain multiple copies of the same distributed account book by different nodes in the peer-to-peer network. Shenzhen yuanzhongrui blockchain technology adopts advanced encryption technology to ensure that any new information in the account book can not be tampered, unless it meets some preset parameters. Moreover, this kind of Ledger has stronger defense against external attacks, such as network attacks, because this decentralized system does not have a single point of failure with high cost of centralized information architecture. At the same time, all trusted nodes can affect any modification of the ledger, provided that they meet the specific preset parameters. These changes will be immediately reflected in the ledger, and all trusted nodes can obtain relevant data to make correct decisions. It can also adjust the design of the distributed ledger, create a hierarchical system within the architecture, and configure appropriate access rights and different levels of authority
blockchain and distributed ledger technology are concive to change the management mode of land registration. At present, the credibility of the real estate market is at the lowest level, which is attributed to the inefficient and opaque property registration system. The system relies on the centralized acquisition of land registration and corresponding property transaction information. Using distributed ledger technology to obtain, manage and modify these information can ensure that the public will not be infringed by land transaction fraud. Similarly, distributed ledger can simplify and integrate cross instry and cross regulatory compliance process, because it contains real-time compliance information needed by government departments, banks, investors and other third parties. By integrating data points of multiple projects and providing feedback on beneficiaries' project participation, we can better track the implementation of social welfare plans
at present, the biggest problems of technology development include: transformation cost of unique data storage system, data reliability verification of network nodes or all levels, privacy and security dimension of decentralized data acquisition, and revision of information technology act. What's important is that blockchain technology will change the way the government interacts with citizens, and this huge change is bound to be resisted by civil servants. These are all possible problems. We should take immediate action to formulate a regulatory framework to guide application development in addition to adopting blockchain technology.
when the economy is stable, it doesn't rise. When the economy is in turmoil, people begin to store digital currency. Of course, it is convenient for some corrupt elements
now the economy is stable, the digital currency is in a bear market, the financial crisis, the crisis, and only when there is a crisis can there be an opportunity. At that time, the rapid growth of bitcoin was the opportunity in the financial crisis. Don't worry, there will be a bull market in digital currency, which is expected to come in the second half of next year
asymmetric encryption algorithm is a function that converts the original plaintext file or data into a series of unreadable ciphertext codes by using an encryption key. The encryption process is irreversible. Only holding the corresponding decryption key can the encrypted information be decrypted into readable plaintext. Encryption enables private data to be transmitted through the public network under the condition of low risk, and protects the data from being stolen and read by the third party
the core advantage of blockchain technology is decentralization, which can realize point-to-point transaction, coordination and cooperation based on decentralized credit in a distributed system without mutual trust by means of data encryption, time stamp, distributed consensus and economic incentive, so as to solve the high cost and low cost of centralized institutions Low efficiency and data storage insecurity provide solutions
the application fields of blockchain include digital currency, token, finance, anti-counterfeiting traceability, privacy protection, supply chain, entertainment, etc. with the popularity of blockchain and bitcoin, many related top domain names have been registered, which has a great impact on the domain name instry.
in the distributed network of blockchain, the communication and trust between nodes need to rely on digital signature technology, which mainly realizes the identity confirmation and information authenticity and integrity verification
digital signature
digital signature (also known as public key digital signature, electronic signature) is a kind of common physical signature written on paper, but it uses the technology in the field of public key encryption to identify digital information. A digital signature usually defines two complementary operations, one for signature and the other for verification. Only the sender of information can proce a digital string which can not be forged by others. This digital string is also an effective proof of the authenticity of the information sent by the sender. Simply prove that "I am who I am."