search
HomeCommon ProblemWhat are the four core technologies of blockchain

What are the four core technologies of blockchain

Jun 15, 2021 pm 01:53 PM
Blockchaintechnology

The four core technologies of blockchain are point-to-point distributed technology, asymmetric encryption technology, hash algorithm, and consensus mechanism. Among them, point-to-point technology, also called peer-to-peer Internet technology, relies on the computing power and bandwidth of network participants, rather than concentrating reliance on a few servers.

What are the four core technologies of blockchain

#The operating environment of this article: windows10 system, thinkpad t480 computer.

The four core technologies of blockchain are:

Point-to-point distributed technology (P2P)

Peer-to-peer technology (peer-to-peer, referred to as P2P) is also known as It is a peer-to-peer Internet technology that relies on the computing power and bandwidth of network participants, rather than concentrating the reliance on a few servers. P2P technology has obvious advantages. The distributed nature of a peer-to-peer network, which replicates data through multiple nodes, also increases reliability against failures. In a pure P2P network, nodes do not need to discover data through a central index server. In the latter case, there is no single point of failure for the system.

Asymmetric encryption technology

Asymmetric encryption (public key encryption) refers to the use of different keys in the two processes of encryption and decryption. In this encryption technology, each user has a pair of keys: a public key and a private key. The public key is used during encryption and the private key is used during decryption. The public key can be disclosed online, but the private key needs to be kept by the user. This resolves the security dangers of key sharing in symmetric encryption. Asymmetric encryption is more secure than symmetric encryption: both parties to the symmetric encryption communication use the same key. If one party's key is leaked, the entire communication will be cracked. Symmetric encryption uses a pair of keys, one pair of keys, one pair of keys, and the other pair of keys is made public. The keys are kept by themselves. There is no need to synchronize the keys before communication like symmetric encryption.

Hash algorithm

The hash algorithm is also called the hash algorithm, which reflects a binary value of any length into a short fixed-length binary value. This small binary value is called a hash Hope value. The principle is actually very simple, which is to convert transaction information into a fixed-length text string.

Consensus mechanism

Cryptocurrencies mostly adopt centralized block chain design, with nodes dispersed and parallel everywhere. The system must be designed to maintain the order and fairness of system operation, unify the block chain version, and encourage the provision of resources. Maintain the users of the blockchain and punish those who cause malicious harm. Such a system must use some method to prove who has obtained the packaging rights of the block chain (also called accounting rights) and can get the reward for packaging the block, or whoever intends to be harmed will be subject to certain penalties. This is Consensus mechanism. Generally speaking, if Chinese Weibo celebrities, American virtual currency players, African students, and European travelers don't know you, but they think you are a good person, they can basically judge that you are not bad.

Free learning video sharing: Programming video

The above is the detailed content of What are the four core technologies of blockchain. For more information, please follow other related articles on the PHP Chinese website!

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
4 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
4 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
4 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Chat Commands and How to Use Them
4 weeks agoBy尊渡假赌尊渡假赌尊渡假赌

Hot Tools

mPDF

mPDF

mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),

Dreamweaver Mac version

Dreamweaver Mac version

Visual web development tools

Safe Exam Browser

Safe Exam Browser

Safe Exam Browser is a secure browser environment for taking online exams securely. This software turns any computer into a secure workstation. It controls access to any utility and prevents students from using unauthorized resources.

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

PhpStorm Mac version

PhpStorm Mac version

The latest (2018.2.1) professional PHP integrated development tool