Position: Home page » Blockchain » Quantum blockchain time entanglement

Quantum blockchain time entanglement

Publish: 2021-05-20 17:57:50
1. If you find something wrong, it's the right way to get out early
the core advantage of blockchain technology is decentralization, which can realize point-to-point transaction, coordination and cooperation based on decentralized credit in a distributed system without mutual trust by means of data encryption, time stamp, distributed consensus and economic incentive, so as to solve the high cost and low cost of centralized institutions Low efficiency and data storage insecurity provide solutions
the application fields of blockchain include digital currency, token, finance, anti-counterfeiting traceability, privacy protection, supply chain, entertainment, etc. with the popularity of blockchain and bitcoin, many related top domain names have been registered, which has a great impact on the domain name instry.
2. Introction: quantum blockchain technology is a professional Internet technology service provider integrating computer software and hardware research and development, digital currency proction and asset management. Its main business is to mine the most core value digital currency in the world, especially bitcoin. It belongs to quantum blockchain Technology (Guangzhou) Co., Ltd
legal representative: Xu Rong
time of establishment: April 28, 2018
registered capital: RMB 10 million
enterprise type: limited liability company (invested or controlled by natural person)
address: 205, building 3, No. 6, Jiapin third Street, Shatou street, Panyu District, Guangzhou City
3. At present, there are four main types of consensus mechanisms: pow, POS, dpos, pool
1. POW workload proof, which is familiar with mining, calculates a random number that meets the rules through and or operation, that is, obtains the bookkeeping right, sends out the data that needs to be recorded in this round, and stores it together with other nodes in the whole network after verification
advantages: complete decentralization, free access of nodes
disadvantages: bitcoin has attracted most of the computing power in the world, and other blockchain applications using POW consensus mechanism are difficult to obtain the same computing power to ensure their own security; Mining causes a lot of waste of resources; The period of reaching consensus is long, which is not suitable for commercial application.

2. Proof of rights and interests of POS, a mechanism of upgrading consensus of pow; According to the token proportion and time of each node; It can rece the difficulty of mining in equal proportion, so as to speed up the speed of finding random numbers< Advantages: to a certain extent, it shortens the time to reach a consensus
disadvantages: mining is still needed, which does not solve the pain point of commercial application in essence

3. Dpos share authorization certification mechanism is similar to the voting of the board of directors, in which the coin holders cast a certain number of nodes to verify and account on their behalf
advantages: greatly rece the number of participating verification and accounting nodes, which can achieve second level consensus verification
disadvantages: the whole consensus mechanism still depends on token, and many commercial applications do not need token to exist

4. Pool verification pool, which is based on traditional distributed consistency technology and data verification mechanism; It is a consensus mechanism widely used in the instry chain at present.
advantages: it can work without token, and realizes second level consensus verification on the basis of mature distributed consistency algorithms (pasox and raft)
disadvantages: the degree of decentralization is not as good as that of bictin; The multi center business model is more suitable for multi-party participation

it has great advantages in using consensus mechanism to ensure data consistency (the consensus mechanism is first proposed by ripple, and the network transaction synchronization mechanism with data correctness priority. In the consensus network, no matter how the software code changes, if you can't reach a consensus, you can't enter the network, let alone fork)
- - - - - - - -
PS: a little black, although the consensus mechanism can absolutely ensure that there will be no hard bifurcation at any time. However, the disadvantage of this mechanism is obvious, that is, it is much longer than the current bitcoin network to reach a consensus with other nodes. In extreme cases, the consequences of disconnection in ripple consensus mechanism network are also very terrible

it is possible that one day after the power failure in your home, the whole system will no longer be able to reach a consensus with other rippled nodes (in fact, the consensus mechanism requires more than 80% of the nodes to acknowledge your data before your submission will be accepted by other nodes, otherwise it will be rejected by exclusive nodes), Even you can only empty all your 500 GB data and resynchronize to connect to other ripple nodes

so at present, the existing rippled end is not suitable for civil use (if it is commercial, the impact is relatively small. For example, RL's own rippled node is hosted in Amazon cloud data center. If it has no response for a long time, it can make high claims, and there is almost no break in that place except for large disasters). This is one of the aspects RL has always wanted to improve.
4. 1. Blockchain is an anti tampering, shared and traceable distributed ledger technology. Anti tampering lies in that the modification of a single node can only be recognized through the consensus of other nodes; Traceability means that the whole account book of the blockchain can only be written in, not deleted, and all modification records will be left marks on the whole chain; Sharing means that the account book of the whole blockchain is transparent to multiple nodes in the distributed network
hash function in blockchain is the key to anti tampering, and hash algorithm is a one-way cryptographic mechanism to ensure that transaction information is not tampered in blockchain. After receiving a piece of plaintext, hash algorithm will transform it into a short and fixed hash data in an irreversible way. So block association has but is not limited to tamper proof
2. Quantum secure communication is divided into quantum cryptography communication, quantum teleportation and quantum dense coding. It can be divided into classical communication and quantum communication. The former mainly transmits quantum key, while the latter can be used for quantum teleportation and quantum entanglement distribution. When quantum communication is eavesdropped, although the eavesdropper can't get the information, the communication is interrupted, which affects the normal communication. His anti eavesdropping is at the cost of interrupting the communication, so it doesn't seem as good as the legend.. At present, there are still many unsolved problems in quantum communication, such as short transmission distance, relay difficulty and so on
3. In secure communication, technology competition and complementarity are mutual reference and common development. In secure communication, blockchain should belong to network layer, and quantum communication should belong to physical layer. Therefore, there should be no competition result of who will replace who.
5.

Cheng Weibei quantum blockchain Technology Co., Ltd. is a limited liability company (invested or controlled by a natural person) registered on September 26, 2018, with its registered address at No. 324-18, Huiyuan North Road, Jinjiang District, Cheng (No. 394)

the unified social credit code / registration number of Cheng Weibei quantum blockchain Technology Co., Ltd. is 91510104ma69h8wk8g, and the legal person is Chen Tianxia. At present, the company is in business

the business scope of Cheng Weibei quantum blockchain Technology Co., Ltd. is: Technology Research of Internet of things; Data processing and storage services; Software development; Information technology consulting services (excluding training); Technology research, technology consultation and technology transfer in the computer field; Large scale event organization services The above business scope does not include the items prohibited or restricted by national laws, administrative regulations or decisions of the State Council, and the items that need to be approved according to law can only be carried out with the approval of relevant departments)

view more information of Cheng Weibei quantum blockchain Technology Co., Ltd. through aiqicha

6. In reality,
in this society, there are nine frauds out of ten,
you can do anything for money,
as long as you are asked to pay money and say how much money is against it,
all are frauds. In the future, you should be more careful to avoid being cheated.
7. Jungle law infinite superposition flying bug steps: first enter the game after parachuting, first find a safe place, and then open the top left gear set key. After the setting key is turned on, this interface will appear. Click the reset key to enter the reset key page. It will prompt [when the terrain is stuck, please click the reset button], click Reset, and then the next time you click the gear, it will automatically return to reset. Then, click open the gear, click Reset all the time, click open the gear, and then click Reset... Repeat all the time. Next, friends will find a surprising event, that is, as you keep clicking the reset button, your height keeps rising, and then you fly up.
8. (1) Quantum technology: quantum entanglement, quantum communication, quantum computing
(2) Libra Trading Law: leverage principle, centrifugal law
(3) blockchain Decentralization: decentralized cross chain transaction technology, encryption technology, heterogeneous multi chain technology< (4) AI Intelligent Technology: AI vision, pattern recognition, language and image understanding. Zyxt688 high policy support!
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750