Quantum blockchain time entanglement
the core advantage of blockchain technology is decentralization, which can realize point-to-point transaction, coordination and cooperation based on decentralized credit in a distributed system without mutual trust by means of data encryption, time stamp, distributed consensus and economic incentive, so as to solve the high cost and low cost of centralized institutions Low efficiency and data storage insecurity provide solutions
the application fields of blockchain include digital currency, token, finance, anti-counterfeiting traceability, privacy protection, supply chain, entertainment, etc. with the popularity of blockchain and bitcoin, many related top domain names have been registered, which has a great impact on the domain name instry.
legal representative: Xu Rong
time of establishment: April 28, 2018
registered capital: RMB 10 million
enterprise type: limited liability company (invested or controlled by natural person)
address: 205, building 3, No. 6, Jiapin third Street, Shatou street, Panyu District, Guangzhou City
1. POW workload proof, which is familiar with mining, calculates a random number that meets the rules through and or operation, that is, obtains the bookkeeping right, sends out the data that needs to be recorded in this round, and stores it together with other nodes in the whole network after verification
advantages: complete decentralization, free access of nodes
disadvantages: bitcoin has attracted most of the computing power in the world, and other blockchain applications using POW consensus mechanism are difficult to obtain the same computing power to ensure their own security; Mining causes a lot of waste of resources; The period of reaching consensus is long, which is not suitable for commercial application.
2. Proof of rights and interests of POS, a mechanism of upgrading consensus of pow; According to the token proportion and time of each node; It can rece the difficulty of mining in equal proportion, so as to speed up the speed of finding random numbers< Advantages: to a certain extent, it shortens the time to reach a consensus
disadvantages: mining is still needed, which does not solve the pain point of commercial application in essence
3. Dpos share authorization certification mechanism is similar to the voting of the board of directors, in which the coin holders cast a certain number of nodes to verify and account on their behalf
advantages: greatly rece the number of participating verification and accounting nodes, which can achieve second level consensus verification
disadvantages: the whole consensus mechanism still depends on token, and many commercial applications do not need token to exist
4. Pool verification pool, which is based on traditional distributed consistency technology and data verification mechanism; It is a consensus mechanism widely used in the instry chain at present.
advantages: it can work without token, and realizes second level consensus verification on the basis of mature distributed consistency algorithms (pasox and raft)
disadvantages: the degree of decentralization is not as good as that of bictin; The multi center business model is more suitable for multi-party participation
it has great advantages in using consensus mechanism to ensure data consistency (the consensus mechanism is first proposed by ripple, and the network transaction synchronization mechanism with data correctness priority. In the consensus network, no matter how the software code changes, if you can't reach a consensus, you can't enter the network, let alone fork)
- - - - - - - -
PS: a little black, although the consensus mechanism can absolutely ensure that there will be no hard bifurcation at any time. However, the disadvantage of this mechanism is obvious, that is, it is much longer than the current bitcoin network to reach a consensus with other nodes. In extreme cases, the consequences of disconnection in ripple consensus mechanism network are also very terrible
it is possible that one day after the power failure in your home, the whole system will no longer be able to reach a consensus with other rippled nodes (in fact, the consensus mechanism requires more than 80% of the nodes to acknowledge your data before your submission will be accepted by other nodes, otherwise it will be rejected by exclusive nodes), Even you can only empty all your 500 GB data and resynchronize to connect to other ripple nodes
so at present, the existing rippled end is not suitable for civil use (if it is commercial, the impact is relatively small. For example, RL's own rippled node is hosted in Amazon cloud data center. If it has no response for a long time, it can make high claims, and there is almost no break in that place except for large disasters). This is one of the aspects RL has always wanted to improve.
hash function in blockchain is the key to anti tampering, and hash algorithm is a one-way cryptographic mechanism to ensure that transaction information is not tampered in blockchain. After receiving a piece of plaintext, hash algorithm will transform it into a short and fixed hash data in an irreversible way. So block association has but is not limited to tamper proof
2. Quantum secure communication is divided into quantum cryptography communication, quantum teleportation and quantum dense coding. It can be divided into classical communication and quantum communication. The former mainly transmits quantum key, while the latter can be used for quantum teleportation and quantum entanglement distribution. When quantum communication is eavesdropped, although the eavesdropper can't get the information, the communication is interrupted, which affects the normal communication. His anti eavesdropping is at the cost of interrupting the communication, so it doesn't seem as good as the legend.. At present, there are still many unsolved problems in quantum communication, such as short transmission distance, relay difficulty and so on
3. In secure communication, technology competition and complementarity are mutual reference and common development. In secure communication, blockchain should belong to network layer, and quantum communication should belong to physical layer. Therefore, there should be no competition result of who will replace who.
Cheng Weibei quantum blockchain Technology Co., Ltd. is a limited liability company (invested or controlled by a natural person) registered on September 26, 2018, with its registered address at No. 324-18, Huiyuan North Road, Jinjiang District, Cheng (No. 394)
the unified social credit code / registration number of Cheng Weibei quantum blockchain Technology Co., Ltd. is 91510104ma69h8wk8g, and the legal person is Chen Tianxia. At present, the company is in business
the business scope of Cheng Weibei quantum blockchain Technology Co., Ltd. is: Technology Research of Internet of things; Data processing and storage services; Software development; Information technology consulting services (excluding training); Technology research, technology consultation and technology transfer in the computer field; Large scale event organization services The above business scope does not include the items prohibited or restricted by national laws, administrative regulations or decisions of the State Council, and the items that need to be approved according to law can only be carried out with the approval of relevant departments)
view more information of Cheng Weibei quantum blockchain Technology Co., Ltd. through aiqicha
in this society, there are nine frauds out of ten,
you can do anything for money,
as long as you are asked to pay money and say how much money is against it,
all are frauds. In the future, you should be more careful to avoid being cheated.
(2) Libra Trading Law: leverage principle, centrifugal law
(3) blockchain Decentralization: decentralized cross chain transaction technology, encryption technology, heterogeneous multi chain technology< (4) AI Intelligent Technology: AI vision, pattern recognition, language and image understanding. Zyxt688 high policy support!