Bitcoin 2

1. Basic concepts:

0. Bitcoin is a decentralized consensus mechanism based on proof of work.

1. Mining: Make sure to add a new block (a lot of accounts are recorded in it). The transaction information is put into the unverified transaction pool first, and then into the block.

2. A node in the bitcoin-cli network. wallet: wallet (which stores url and private key)

3. A wallet is a container for private keys

4. The process of transaction: creation, signature (implemented by script), broadcast, miner record

5. Bitcoin network (inefficiency of p2p convergence) node functions: wallets, miners, complete blockchain, network routing nodes

6. Fork: Blockchain fork/double-spend attack refers to the attacker generating a new fork by not acknowledging a recent transaction and reconstructing a new block before this transaction, thereby realizing double-spending (Theoretically, 30% of the machines can be activated.)

 

2. Hierarchical structure

Data (structure of blocks, organization of records), network (creation and verification of new blocks), consensus, incentives, contracts (guarantee, delay, prediction), application

 

The problem with Bitcoin

1. Calculations during mining and verification are wasted

2. In theory, the consensus mechanism based on proof of work can be broken

3. Based on p2p and distributed consensus, the convergence speed is slow

4. The capacity of the block is too small

4. Extended application

1. Contract (conditions meet mandatory transfer?)

2. Name registration to avoid confirming the sequence relationship)

3. Registration of stock certificates, real estate and other information (to prevent tampering)

4. Full life cycle tracking (product id plus signature, cannot be imitated)

5. Lifelong accountability for decision-making (cannot be tampered with)

6. Storage of personal information of certificates and passwords (encryption)

7. Message communication (anti-impersonation, anti-monitoring)

8. Voting (preventing proxy voting, anonymous,)

9. Chips for gambling (automatically give chips if the conditions are met, and automatically deduct chips if you lose)

10. Anti-counterfeiting of lottery tickets (for example, the activation method is a private key, and the public key is drawn)

 

 

5. Security

1. Advantages: Don't worry about transactions being monitored; don't worry about exposing personal privacy; don't worry about someone pretending to consume yourself; don't worry about private property being robbed (such as Jianguan); don't worry about money being embezzled and misappropriated.

2. Disadvantages: secret key = money; easy to back up, but it will be lost as long as it is seen; all transactions are irrevocable; lost secret key = lost money; relatives cannot inherit property when they die;

3. Solutions

External storage (e.g. printing to paper), dedicated hardware, multi-signature

 

Guess you like

Origin http://43.154.161.224:23101/article/api/json?id=326447770&siteId=291194637