Position: Home page » Blockchain » Blockchain prevents information leakage
Blockchain prevents information leakage
Publish: 2021-04-28 14:15:57
1. The birth of jinwowo network technology blockchain + big data technology builds a lowest cost trust mode with code. Blockchain only needs to execute code to achieve real, whole process and tamperable data records
2. The analysis of Chongqing jinwowo network is as follows:
each node on the blockchain can verify the integrity and authenticity of the account book to ensure that all transaction information is not tampered with, true and effective
every node on the blockchain keeps copies of all transaction information. When the number of data and participants on the blockchain is very large, the cost of modifying information will be very high. At least 51% of the computing power of the whole network is needed to modify information, and the modification cost may far exceed the expected revenue
when the information of some nodes is maliciously tampered with, other nodes on the blockchain will find the information that has not formed a "consensus" in a short time and maintain and update it.
each node on the blockchain can verify the integrity and authenticity of the account book to ensure that all transaction information is not tampered with, true and effective
every node on the blockchain keeps copies of all transaction information. When the number of data and participants on the blockchain is very large, the cost of modifying information will be very high. At least 51% of the computing power of the whole network is needed to modify information, and the modification cost may far exceed the expected revenue
when the information of some nodes is maliciously tampered with, other nodes on the blockchain will find the information that has not formed a "consensus" in a short time and maintain and update it.
3. 1. Blockchain is an anti tampering, shared and traceable distributed ledger technology. Anti tampering lies in that the modification of a single node can only be recognized through the consensus of other nodes; Traceability means that the whole account book of the blockchain can only be written in, not deleted, and all modification records will be left marks on the whole chain; Sharing means that the account book of the whole blockchain is transparent to multiple nodes in the distributed network
hash function in blockchain is the key to anti tampering, and hash algorithm is a one-way cryptographic mechanism to ensure that transaction information is not tampered in blockchain. After receiving a piece of plaintext, hash algorithm will transform it into a short and fixed hash data in an irreversible way. So block association has but is not limited to tamper proof
2. Quantum secure communication is divided into quantum cryptography communication, quantum teleportation and quantum dense coding. It can be divided into classical communication and quantum communication. The former mainly transmits quantum key, while the latter can be used for quantum teleportation and quantum entanglement distribution. When quantum communication is eavesdropped, although the eavesdropper can't get the information, the communication is interrupted, which affects the normal communication. His anti eavesdropping is at the cost of interrupting the communication, so it doesn't seem as good as the legend.. At present, there are still many unsolved problems in quantum communication, such as short transmission distance, relay difficulty and so on
3. In secure communication, technology competition and complementarity are mutual reference and common development. In secure communication, blockchain should belong to network layer, and quantum communication should belong to physical layer. Therefore, there should be no competition result of who will replace who.
hash function in blockchain is the key to anti tampering, and hash algorithm is a one-way cryptographic mechanism to ensure that transaction information is not tampered in blockchain. After receiving a piece of plaintext, hash algorithm will transform it into a short and fixed hash data in an irreversible way. So block association has but is not limited to tamper proof
2. Quantum secure communication is divided into quantum cryptography communication, quantum teleportation and quantum dense coding. It can be divided into classical communication and quantum communication. The former mainly transmits quantum key, while the latter can be used for quantum teleportation and quantum entanglement distribution. When quantum communication is eavesdropped, although the eavesdropper can't get the information, the communication is interrupted, which affects the normal communication. His anti eavesdropping is at the cost of interrupting the communication, so it doesn't seem as good as the legend.. At present, there are still many unsolved problems in quantum communication, such as short transmission distance, relay difficulty and so on
3. In secure communication, technology competition and complementarity are mutual reference and common development. In secure communication, blockchain should belong to network layer, and quantum communication should belong to physical layer. Therefore, there should be no competition result of who will replace who.
4. Can solve, bit box is a good application proof
5. The distributed architecture and tamper proof features of blockchain technology help to solve the problems of bill authenticity and information opacity. When participants need to check whether the bill has been tampered or transferred, blockchain can provide indisputable proof of consistency
digital currency also makes use of this feature of blockchain. Puyin is a kind of tea standard digital currency developed based on blockchain technology.
digital currency also makes use of this feature of blockchain. Puyin is a kind of tea standard digital currency developed based on blockchain technology.
6. A new type of blockchain has been developed to make the public transactions used for verification contain only part of the information
Cooper takes interest rate swap as an example. Dodd Frank requires both parties to record 140 data fields. However, in the blockchain, other banks can only see specific data points, and they may just display the code of transaction nature and price range
at the same time, the blockchain will store complete transactions, which can only be seen by relevant parties and regulators with monitoring obligations
of course, the most important thing about blockchain is that it can not be tampered with, and the protection of intellectual property rights is very important, such as the recent foreign project of decent, which is a distributed content publishing platform.
Cooper takes interest rate swap as an example. Dodd Frank requires both parties to record 140 data fields. However, in the blockchain, other banks can only see specific data points, and they may just display the code of transaction nature and price range
at the same time, the blockchain will store complete transactions, which can only be seen by relevant parties and regulators with monitoring obligations
of course, the most important thing about blockchain is that it can not be tampered with, and the protection of intellectual property rights is very important, such as the recent foreign project of decent, which is a distributed content publishing platform.
7. This technology not only reces the risk of the transaction, but also makes the transaction transparent, timely follow-up transaction data, effectively improves the security and reces the risk of information leakage. Now, apps like six degree chain are actively introcing this technology.
8. The advantages of blockchain in information security of jinwowo group are summarized in the following three aspects:
1. Using highly rendant database to ensure the data integrity of information
2. Using the relevant principles of cryptography to verify data and ensure that it can not be tampered with
3. In terms of authority management, using multiple private key rules to control access rights
1. Using highly rendant database to ensure the data integrity of information
2. Using the relevant principles of cryptography to verify data and ensure that it can not be tampered with
3. In terms of authority management, using multiple private key rules to control access rights
9. Unknown_Error
Hot content