From cryptography to the history of blockchain
At the beginning of self-learning blockchain related knowledge, we can adopt the "bottom-up" method, that is, through reading books, reading white papers , we can check the information , and then summarize and connect these knowledge , and integrate them into a relatively complete knowledge system Before I went to university, I read a lot of books about the Analects of Confucius, all about how to read and understand the Analects of Confucius. Until one day, I found that I was so fond of the Analects, but I never had patience to read the original of the Analects seriously
so I went to the bookstore and bought a of the Analects of Confucius. I read it from the beginning to the end and found that there were too many details and insights in it, which could not be transmitted through any interpretation. Actually, I spent a lot of time and read a lot of interpretation before. I really want to abandon the essence and pursue the end. I have to work hard
it's the same in every field. When you don't understand it, you will have a kind of inexplicable fear of it, thinking that it is high and unattainable. In order to step into these fields quickly, you will look for a lot of so-called "interpretation" and "news" around it
2. technical perspective
Basic Stage:
1. Blockchain Development Guide - author Shentu Qingchun:
the author's research on the bottom layer of rendant bitcoin is very in-depth, and the explanation is very easy to understand
2. Blockchain technology guide - author Zou Jun:
as the first domestic book to explain blockchain from a technical perspective, it is worth reading. Since its publication in 2016, it has been consistently evaluated well
3. Principles, design and application of blockchain by Yang Baohua and Chen Chang:
as the CTO of Zhigui, Chen Chang remembers that the previous ink chain was based on hyperledger fabric, so this book has a thorough explanation of hyperledger related open source procts
3. Blockchain world is divided into two parts. The first part comprehensively reviews the birth, growth and graal development of blockchain in 2008 through full and accurate information, introces in detail the originality of blockchain technology, the scientific mechanism and the artistic logic, and introces the application characteristics of blockchain through more than ten instry scenarios such as finance, anti-counterfeiting and medical treatment. In the second part, combined with the spirit of G20 summit and the 13th five year plan, the author explores the combination of blockchain and digital economy, as well as the author's views and suggestions on the development trend of the instry
1. Lianzhuang data block structure based on blocks
2. Network wide shared ledger
3. Asymmetric encryption
4. Source code open source
blockchain 2.0 era technical basis:
1. Smart contract; It is an application in the blockchain system. It is a business logic that can run automatically by coding. It usually has its own token and special development language
2. DAPP: it includes the user's applications, including but not limited to various cryptocurrencies, such as Ethereum wallet
3. Virtual machine: used to execute the compiled code of smart contract. Virtual machine is Turing complete
with the application and deepening of blockchain technology, the era of blockchain 3.0 has come. The mode of blockchain cooperation can be seen from behind the operation of all walks of life. Therefore, blockchain will change the way of human life widely and profoundly, so the whole life service will enter the era of blockchain. In the process of Internet development, blockchain + physical instry, blockchain e-commerce and blockchain community operation can be applied to blockchain technology
of course, 3.0 came into being with the development of modern cryptography. Today's applied cryptography is the result of cryptography 20 years ago. Therefore, in order to apply blockchain technology to more participation scenarios, especially in Internet economy and other aspects, more verification is needed to verify whether the existing encryption technology can meet the demand, and more in-depth integration of cryptographic frontier technology and continuous innovation are needed.