Application of blockchain signature system
what is centralization
the so-called centralization means "ownership" or ownership by the company. For example, Tencent's q-coin, which is issued by Tencent, is a kind of centralized electronic currency, including the total amount and the issuing method, is supervised and controlled by Tencent. You can use it, trade and go shopping, but you always have to operate in the framework of Tencent, and the final right of interpretation belongs to Tencent
the issuing mode of bitcoin is preset by the program and encryption algorithm, and runs on multiple nodes all over the world. No one or organization can modify it (everyone has his own account book, so it is impossible for one person to control everyone's account book at the same time. If there is such a technology, why should it be so complicated, If you want to blackmail money into your account, you will be the richest man in the world. There is no one left, And it is not controlled by any single person or organization
take an example: for example, Lao Zhang borrows 100 yuan from Lao Li, but Lao Li is afraid that he will default, so he asks the village head to do notarization and write down the account. This is called centralization. But if you don't find the village head, you can use the loudspeaker to shout in the village: "I Lao Li lent Lao Zhang 100 yuan! Please put it in the account book. "We all put this account in our own account book. This is called decentralization
anyone who transfers money between them will release information through loudspeakers. After receiving the information, everyone will record the transaction in their own account book. With distributed ledgers, it doesn't matter if Lao Zhang or Lao Li's ledgers are lost, because Lao Zhao, Lao Ma, Lao Wang and other families have ledgers
the main advantages of blockchain are that it does not need intermediary participation, the whole process is open and transparent, and the cost is low, and the data security is high
at present, blockchain is in a stage where everyone talks about blockchain, but can't perceive its actual technical charm. Since 2017, it has graally come into our sight, and we have graally realized that bitcoin is more fierce than real estate speculation (the price of mining machinery has skyrocketed! The news is on the screen But I still don't know
so, in which fields can blockchain be applied, what kind of changes will it bring to our future life
the core key: everyone has an account book, everyone has an account book, and the information recorded in each person's account book is consistent and synchronous, and the information is completely transparent. If it is fake, it will be the public enemy of the whole people, which greatly increases the cost of data fraud
core key 2: decentralization, which does not need a central system to manage data, prevents some people from changing data and damages the interests of the majority of people
Application:
1. Account security and privacy protection: currency transfer, exchange, payment system. Blockchain can help prevent data manipulation and fraud, prevent distributed denial of service attacks (DDoS), and effectively protect users' network privacy. Key words: anti counterfeiting, anti-counterfeiting, loan payment
2. Copyright regulation and interest disputes: for example, when a song is downloaded, from the author to the procer and then to the singer, they can get payment in real time through the blockchain, without having to wait for a long time like the traditional way, or even get no reward e to right disputes. Instead of waiting for publishers to provide royalty checks, creators can freely control the process from publishing to payment through blockchain application. Key words: real time receipt, no property dispute
3. Internet of things + artificial intelligence: the intelligent devices in the Internet of things based on the blockchain will be used to monitor the real-time situation of urban infrastructure such as bridges, roads, power grids, etc. the blockchain can connect these intelligent devices together for unified management to help them monitor more efficiently. This will help people better understand how to build a smart city in the future. Key words: unified monitoring, intelligent city
4: proof of existence: in life, once you are asked to prove that you are you, that your mother is your mother, that you have never been married, that the house belongs to you, and so on, things seem very simple. Once it falls on you, it is a great trouble. The application of blockchain technology can perfectly solve the above embarrassment. At that time, all the information that belongs to you will be recorded accurately and can not be tampered with. No one has the right to change it. When the technology develops to a certain stage, birth certificate and marriage certificate may be recorded on the blockchain. Keywords: no keywords
in addition to the application scenarios mentioned above, blockchain technology can also be applied to e-commerce, data storage, logistics and other fields. As long as we grasp the characteristics of blockchain technology, it will become easy to understand.
in the distributed network of blockchain, the communication and trust between nodes need to rely on digital signature technology, which mainly realizes the identity confirmation and information authenticity and integrity verification
digital signature
digital signature (also known as public key digital signature, electronic signature) is a kind of common physical signature written on paper, but it uses the technology in the field of public key encryption to identify digital information. A digital signature usually defines two complementary operations, one for signature and the other for verification. Only the sender of information can proce a digital string which can not be forged by others. This digital string is also an effective proof of the authenticity of the information sent by the sender. Simply prove that "I am who I am."
jump out of the verification interface, click the return button in the upper left corner, and then upgrade to the latest version to refresh the node. Or uninstall again and restore the account with mnemonics Refresh node] in free communication, the + sign in the upper right corner, "node detection & quot;
in order to ensure the data security of users, the blockchain system is implemented through a cryptographic algorithm. Specifically, it is implemented through a public cryptographic algorithm mechanism. We all know how a cryptographic algorithm can have a secret key, and the public secret key algorithm is a pair of (that is, two) secret keys, just like tiger amulet, which are used together. One is called public key, which can be disclosed to others. The private key should be kept by itself. In the blockchain system, the public key is used to identify the identity, and the private key is equivalent to the key to decrypt. But the difference is that a public key is only for a unique private key, that is to say, if you forget the private key, it will not be retrieved for you, In the blockchain system, it will not help you retrieve the private key, so you should keep the private key properly
in the blockchain system structure, the data encrypted with public key must be decrypted with the corresponding private key, while the data encrypted with private key
must be decrypted with the corresponding public key, so the data encrypted with private key (usually called "signature") must be decrypted with the corresponding public key, which can play a great role
for a simple example, if Zhang San wants to send a check to Li Si, how can it be sent? In the past, it would be taken by the bookkeeper, so Zhang San thought of a way. He encrypted the check with Li Si's public key, and then signed his name (signed with his private key). At this time, other people would not use it even if they got the check, because only Li Si had his private key, That is, only Li Si can use this check. This function design is called "script system" in the blockchain system
therefore, the private key encrypted by the blockchain digital signature cannot be decrypted by the original encrypted private key, but must be decrypted by the corresponding public key.