Is blockchain algorithm far away
There is no doubt that blockchain has development prospects, and the necessary condition for development prospects is to enter the mainstream market
North America blockchain infrastructure the oan (former aion network) founder and CEO Matt spoke published an article entitled "in order to successfully enter the mainstream market, blockchain projects must" eat dog food "in Forbes on July 24, in which Matt mentioned his views on how blockchain should enter the mainstream market - & quot; Eat dog food strong>
in the science and technology circle, there is a jargon called & quot; Eat dog food Dogfood (also known as eating your own dog food) refers to companies using their own procts and becoming users of their own procts. Many high growth companies (such as Microsoft, Facebook, Amazon, apple, Netflix and Google) also test their procts by "eating dog food" or help build credibility“ "Eat dog food" is often used to find and fix bugs, but it has another value: to create reliable use cases for the company's procts
this is worth learning from blockchain projects, because blockchain projects often hold & quot; Once built, they (users) will come naturally , which habitually leaves the responsibility of creating new and interesting blockchain applications to a third party
this attitude is very common, even the well-known blockchain summit consensus 2019 also held a conference entitled & quot; Once built, they (users) will naturally come: to build a global blockchain Center & quot; To discuss how governments around the world can make efforts to attract blockchain projects while balancing regulatory, investment and innovation needs
to be fair, this strategy may be effective for blockchains that only focus on people in the currency circle. For the security token, especially for the exchange represented by the transaction, it makes more sense - "supply creates demand" is the usual idea here, especially considering that the realization of these transactions requires the construction of complex infrastructure
in contrast, "eat dog food" is more likely to be adopted by blockchain project developers who seek mainstream audiences (such as those in financial instry, manufacturing and supply chain, identity management, etc.). If blockchain technology wants to enter these mainstream fields, blockchain companies must first "eat dog food". This can not only clearly prove that blockchain technology is feasible outside the coin circle, but also highlight that blockchain can not only optimize existing use cases, but also create new use cases
and the oan team has been adhering to this concept, and relying on the oan and aion's technology stack built over the years, it has developed a financial technology platform moves for independent workers
Matt said that in the development and development of moves, the team hopes that the relevant functions of the OAN blockchain network can be brought into full play, so it will focus on the following three aspects:
1. How to use the OAN blockchain network to improve the credit efficiency of the proct
there are two main considerations to improve credit efficiency: 1) can we use the mechanism of the defi market to rece the cost of capital; 2) Can the blockchain technology be used to increase the external trust in the credit process of moves. Here, moves will form a mechanism of "pooling wisdom", so that everyone can contribute to recing credit risk and increasing the credibility of credit process, and may even develop a micro guarantee mechanism in the future. Therefore, users will be able to participate in the market established by the platform as borrowers, lenders or guarantors
How to make the interests of procts and users consistentspecifically, by connecting moves with the oan network, and with the help of digital asset aion, a relationship of interest consistency is formed between procts and users, so that users can personally experience the success of moves procts and directly participate in the oan, a blockchain network supporting moves
3. How to create the first open system of financial reputation data with moves
this open system may become a substitute for traditional credit scores or related mechanisms. Over the years, banks and financial institutions have been using Equifax, Fico or other similar institutions' scores as risk indicators, and the moves team believes that the procts they are building will be a good start - the beginning of a more perfect and modern financial reputation system. This is a long-term goal
moves supports North American mainstream carpooling, take out and other casual work economic platforms, and will be the flagship open application developed by the oan on its blockchain network. In June, moves expanded its operations from Ontario to Alberta and British Columbia into western Canada
all the initiatives of the oan team adhere to the spirit of "eating dog food" and strive to make blockchain technology enter the mainstream market as soon as possible. Blockchain is not for the minority, but for the mainstream. In addition to the oan team, many projects and institutions in the blockchain instry are also aiming at this goal. Can you say that such an excellent and targeted blockchain has no development prospects
In a narrow sense, blockchain is a kind of chain data structure that combines data blocks in a sequential way according to the time sequence, and it is a distributed account book that can not be tampered with and forged by means of cryptography
broadly speaking, blockchain technology is a new distributed infrastructure and computing method, which uses blockchain data structure to verify and store data, uses distributed node consensus algorithm to generate and update data, uses cryptography to ensure the security of data transmission and access, and uses intelligent contracts composed of automated script code to program and operate data
working principle
blockchain system is composed of data layer, network layer, consensus layer, incentive layer, contract layer and application layer. Among them, the data layer encapsulates the underlying data blocks and related basic data and algorithms such as data encryption and timestamp; The network layer includes distributed networking mechanism, data transmission mechanism and data verification mechanism; The consensus layer mainly encapsulates all kinds of consensus algorithms of network nodes; The incentive layer integrates economic factors into the blockchain technology system, mainly including the issuance mechanism and distribution mechanism of economic incentives; The contract layer mainly encapsulates all kinds of scripts, algorithms and smart contracts, which is the basis of the programmable characteristics of blockchain; The application layer encapsulates various application scenarios and cases of blockchain. In this model, chain block structure based on timestamp, consensus mechanism of distributed nodes, economic incentive based on consensus computing power and flexible and programmable smart contract are the most representative innovations of blockchain technology
asymmetric encryption algorithm is a function that converts the original plaintext file or data into a series of unreadable ciphertext codes by using an encryption key. The encryption process is irreversible. Only holding the corresponding decryption key can the encrypted information be decrypted into readable plaintext. Encryption enables private data to be transmitted through the public network under the condition of low risk, and protects the data from being stolen and read by the third party
the core advantage of blockchain technology is decentralization, which can realize point-to-point transaction, coordination and cooperation based on decentralized credit in a distributed system without mutual trust by means of data encryption, time stamp, distributed consensus and economic incentive, so as to solve the high cost and low cost of centralized institutions Low efficiency and data storage insecurity provide solutions
the application fields of blockchain include digital currency, token, finance, anti-counterfeiting traceability, privacy protection, supply chain, entertainment, etc. with the popularity of blockchain and bitcoin, many related top domain names have been registered, which has a great impact on the domain name instry.
As an emerging technology, blockchain has attracted more and more attention. It is a new application of traditional technology in the Internet era, including distributed data storage technology, consensus mechanism and cryptography. With the establishment of various blockchain research alliances, more and more funds and personnel support related research. Hash algorithm, zero knowledge proof, ring signature and other cryptographic algorithms used in blockchain:
hash algorithm
as the basic technology of blockchain, the essence of hash function is to map a set of data of any length (limited) to a set of defined length data stream. If this function satisfies the following conditions:
(1) the calculation of hash value for any group of data is very simple
(2) it is difficult to find two different data with the same hash value
hash functions satisfying the above two properties are also called encrypted hash functions. In case of no contradiction, hash functions usually refer to encrypted hash functions. For the hash function, finding such that is called a collision. The current popular hash functions are MD5, SHA1, Sha2, Sha3
bitcoin uses sha256, and most blockchain systems use sha256 algorithm. So here's sha256< Step 1: additional filling bits. The length of the message is congruent with that of 448 mod512 (length = 448 mod512). The number of bits to be filled ranges from 1 to 512. The highest bit of the filled bit string is 1, and the rest bits are 0
Step2: additional length value. The bit length of the initial message (before filling) represented by 64 bit is appended to the result of step 1 (the low byte takes precedence)
Step3: initialize cache. A 256 bit cache is used to store the intermediate and final results of the hash function
Step 4: process 512 bit (16 word) packet sequence. The algorithm uses six basic logic functions and consists of 64 steps of iterative operation. Each step takes the 256 bit cache value as the input, and then updates the cache content. Each step uses a 32-bit constant KT and a 32-bit wt. Where WT is the packet after the packet, t = 1,2,..., 16
step5: after all 512 bit packets are processed, the output of the last packet of sha256 algorithm is 256 bit packet< In 2001, Rivest, Shamir and TauMan proposed ring signature for the first time. It is a simplified group signature, only ring members have no manager, and it does not need the cooperation between ring members. In the ring signature scheme, the signer first selects a temporary signer set, which includes signers. Then the signer can generate the signature independently by using his private key and the public key of others in the signature set without the help of others. Members of the signer collection may not know that they are included in it
ring signature scheme consists of the following parts:
(1) key generation. A key pair (public key PKI, private key ski) is generated for each member of the ring
(2) signature. The signer uses his private key and the public keys of any n ring members (including himself) to generate the signature a for the message M
(3) signature verification. According to the ring signature and message M, the verifier verifies whether the signature is signed by the member in the ring. If it is valid, it will be received, otherwise it will be discarded
ring signature satisfies the following properties:
(1) unconditional anonymity: the attacker can not determine which member of the ring generated the signature, even if the private key of the ring member is obtained, the probability is not more than 1 / n
(2) Correctness: the signature must be verifiable by all others
(3) unforgeability: other members of the ring can't forge the real signer's signature, and even if an external attacker obtains a valid ring signature, he can't forge a signature for message M
(1) anonymity. The verifier can verify that the signature is signed by a member of the group, but can't know which member it is, so that the signer can be anonymous< (2) traceability. In group signature, the existence of group administrator ensures the traceability of signature. The group administrator can revoke the signature and expose the real signer. The ring signature itself cannot reveal the signer unless the signer wants to expose or add additional information to the signature. A verifiable ring signature scheme is proposed. In this scheme, the real signer wants the verifier to know his identity. At this time, the real signer can confirm his identity by disclosing his secret information< (3) management system. Group signature is managed by group administrator, ring signature does not need to be managed, signer can only select a set of possible signers, obtain its public key, and then publish the set, all members are equalthe Xueshuo innovation blockchain Technology Workstation of Lianqiao ecation online is the only approved "blockchain Technology Specialty" pilot workstation of "smart learning workshop 2020 Xueshuo innovation workstation" launched by the school planning, construction and development center of the Ministry of ecation of China. Based on providing diversified growth paths for students, the professional station promotes the reform of the training mode of the combination of professional degree research, proction, learning and research, and constructs the applied and compound talent training system< br />
