How bitcoin block chain operations?

Block chain from Bitcoin , but before that, there are a number of cross-cutting technology, are all key technologies constitute the block chain; and block chain technology and applications today, has far more than Bitcoin block chain . To trace the block chain (Blockchain) is how come, first think of nothing more than Bitcoin (Bitcoin) , bitcoin block chain is the first use of P2P technology to create electronic money system applications, but bitcoin block chain It is not a new technology, but the combination of cross-cutting over the past few decades accumulated technology base.

Bitcoin block chain implemented based on a zero basis of trust and genuine decentralized distributed systems , in fact, solve a 30 years ago by Leslie Lamport, who raised the Byzantine generals problem.

1982 Leslie Lamport to military troops around each other to obtain a consensus decision-making process of whether to send troops, extended to the field of computing, managed to establish a decentralized system with fault tolerance, even if part of the node failure can still ensure the normal operation of the system, allows multiple based zero trust-based nodes to reach a consensus and ensure consistency of information delivery, and in 2008 appeared bitcoin block chain will solve this problem. Bit block chain while the credits work proved the most critical mechanism, is the use of the invention in the 1997 year of Adam Back Hashcash (hash cash) , as a proof algorithm (Proof of Work, POW) workload , this calculation France rely on the cost function irreversible characteristics, to be easily verified, but it is difficult to crack the characteristics of the first to be applied to block spam.

Technology in privacy security, dating back to 1982, David Chaum proposed pay attention to the privacy of cryptographic network payment system, with features untraceable, bitcoin block chain to become the prototype of privacy in the face, after David Chaum it is also based on the theory of cryptography to create a network payment system eCash untraceable, but not to the center eCash system.

Every transaction in the chain block using elliptic curve digital signature algorithm (Elliptic the Curve Digital the Signature Algorithm, the ECDSA) , dating back to 1985 Neal Koblitz and Victor Miller are proposed Elliptic Curve Cryptography (Elliptic curve cryptography, ECC) , the first time for the elliptic curve cryptography, the establishment of public key encryption algorithm. Compared to the RSA algorithm, using ECC benefit is shorter keys can achieve the same security strength. By 1992, put forward by the ECDSA Scott Vanstone et al.

Operation process

Bitcoin network from January 2009 and since then has been running smoothly without someone to maintain the situation more than seven years, there was no time during the downtime. 4 to Bob from Alice receives a bit credits scene graph, a detailed description of the mode of operation of the bit block chain credits, to be construed as one involving the wallet and address (Wallets and Addresses), a private key and a public key (Private Key and public Key), cryptographic hash (Cryptographic hashes), a random number (Nonces) concepts.

Published 435 original articles · won praise 269 · views 560 000 +

Guess you like

Origin blog.csdn.net/qq_32146369/article/details/105262448