Explanation of blockchain terms
public key system: corresponds to a public key and a private key, keeps the private key in the application and publishes the public key. When Party A transmits information to Party B, it can use Party A's private key to encrypt the information, and Party B can use Party A's public key to decrypt the information, so as to ensure that the third party cannot impersonate Party A to send the information; At the same time, when Party A transmits information to Party B, it is encrypted with Party B's public key and sent to Party B, and then Party B decrypts it with his own private key, so as to ensure that the third party cannot eavesdrop on the communication between the two people. RSA is the most common public key system, but the lliptic curve digital signature algorithm is used in bitcoin protocol. What's the difference between cash and bank account? Bitcoin is an electronic currency in BTC. In this article, it is also used to refer to the whole bitcoin system. Like opening an account in a bank, the corresponding concept in bitcoin is address. Everyone can have one or more bitcoin addresses, which are used to pay and collect money. Each address is a string that starts with 1. For example, I have two bitcoin accounts, and. A bitcoin account is uniquely determined by a pair of public key and private key. To save the account, you only need to save the private key file. Unlike bank accounts, banks keep all transaction records and maintain the book balance of each account, while bitcoin's transaction records are jointly maintained by the whole P2P network through a pre agreed protocol. How much money is in my account address? Although the current account balance can be seen by bitcoin software, unlike banks, there is no place to maintain the book balance of each address. It can only calculate the account balance in real time through all historical transactions. How do I pay? When I pay from address a to address B of the other party, the payment amount is e. at this time, both parties will announce the transaction information to each network node, telling address a to pay to address B, and the payment amount is e. In order to prevent the third party from forging the transaction information, the transaction information will be encrypted with the private key of address A. at this time, the network node receiving the transaction information can use the public key of address a to verify that the transaction information is indeed sent by address a. Of course, trading software will help us do these things, we just need to input the relevant parameters in the software. What will the network node do after receiving the transaction information? This is the most important part of the bitcoin system, which needs to be elaborated. For the sake of simplicity, only bitcoin protocol has been implemented. In the current version, each network node will save all transaction information synchronously. There are two kinds of transaction information in history, one is & quot; Verified & quot; The transaction information, that is, the verified transaction information, is stored in a series of "blocks". Each & quot; block" Is the previous & quot; bock" The ID of each block is the hash code of the hash code of the block and the new transaction information (see an actual block). The other category refers to those who also & quot; Unverified & quot; The transaction information just paid above belongs to this category. When a network node receives new unverified transaction information (possibly more than one), it can calculate the book balance of each address at that time because the node keeps all the transaction information in history, so it can calculate whether the transaction information is valid, that is, whether there is enough balance in the payment account. After eliminating the invalid transaction information, it first takes out the last & quot; block" Then, the unverified transaction information is combined with the ID, and a verification code is added to form a new "block". It needs a lot of calculation to build a new block, because it needs to calculate the verification code, so that the above combination becomes a block, that is, the first several bits of the hash code of the block are 1. At present, the first 13 bits need to be 1 (generally, the specific method is uncertain), which means that if the block is generated by enumeration method, the average number of enumerations is 16 ^ 13. Using CPU resources to generate a block is called "gold mining", because the proction of the block will get a certain reward, and the reward information has been included in the block. When a network node generates a new block, it will broadcast to other network nodes. However, this network block may not be accepted by the network, because it is possible that other network nodes have proced the block earlier. Only the earliest block or the block with the largest number of subsequent blocks is valid, and the remaining blocks are no longer used as the initial blocks of the next block. How does the other party confirm that the payment is successful? When the payment information is distributed to the network node, the network node begins to calculate whether the transaction is valid (that is, whether the account balance is enough to pay), and attempts to generate blocks containing the transaction information. When six blocks (one direct block and five subsequent blocks) contain the transaction information, the transaction information is considered "verified", so that the transaction is formally confirmed, and the other party can confirm the successful payment. A possible problem is that I will pay the balance of address a to address B, and at the same time pay to address C. If I only verify that the single comparison transaction is valid. At this point, my way of cheating is to generate six blocks including B to B and six blocks including C to C before the truth is revealed. Because I need a very long CPU time to generate a block, compared with the whole network, the probability of my cheating success is very small. What is the motivation of network nodes to proce blocks? As can be seen from the above description, in order to make the transaction information effective, the network node needs to generate 1 and 5 subsequent blocks to contain the transaction information, and such block generation is very CPU intensive. How to let other network nodes help to proce blocks as soon as possible? The answer is very simple. The agreement stipulates that BTC will be rewarded for the address where the block is proced, as well as the Commission promised by both parties. At present, the reward for procing a block is 50btc, which will be halved every four years in the future. For example, the reward will be 25btc from 2013 to 2016. Is the transaction anonymous? Yes, and No. All bitcoin transactions are visible. We can check all transaction records of each account, such as mine. But what's different from the banking monetary system is that everyone's account itself is anonymous, and everyone can open many accounts. In general, anonymity is not as good as it claims. But bitcoin has another advantage in doing black market trading: it can't be frozen. Even if the police trace a bitcoin address, there is nothing they can do unless they trace the computer used by the exchange based on the Internet address. How to ensure that bitcoin does not depreciate? Generally speaking, in the case of equivalent trading activities, the value of money is inversely proportional to the amount of money issued. Unlike the traditional money market, the central bank can determine the amount of money issued. Bitcoin does not have a central issuing institution. Only by procing blocks can we get a certain amount of BTC currency. Therefore, bitcoin's new amount of money depends on: 1. The speed of procing blocks: bitcoin's agreement stipulates that the difficulty of procing blocks is fixed at an average of 2016 every two weeks, about 10 minutes. Moore's law of doubling CPU speed every 18 months will not speed up the proction of block. 2. The number of rewards for block proction: at present, 50 BTC is awarded for each block proced, which is halved every four years. In 2013, 25 BTC is awarded, and in 2017, 12.5 BTC is awarded. Considering the above two factors, bitcoin's currency issuing speed is not controlled by any single node in the network. Its protocol makes the currency stock known in advance, and the maximum stock is only 21 million BTC
blockchain blockchain is a new application mode of computer technology such as distributed data storage, point-to-point transmission, consensus mechanism and cryptocurrency algorithm. Is a shared distributed ledger in which transactions are permanently recorded through additional blocks
2, block - block
in the bitcoin network, data will be permanently recorded in the form of files, which we call blocks. A block is a set of records for some or all of the latest bitcoin transactions and is not recorded by other previous blocks
3. Node -- a of the ledger operated by the participants of the blockchain network
Decentralization is a phenomenon or structure, which can only appear or exist in a system with many nodes or in a group with many indivials. The influence between nodes will form nonlinear causality through the network5. Consensus mechanism
consensus mechanism is to complete the verification and confirmation of the transaction in a very short time through the voting of special nodes; For a transaction, if several nodes with unrelated interests can reach a consensus, we can think that the whole network can also reach a consensus
6. POW -- proof of work refers to how much money you get depends on the amount of work you contribute to mining. The better the performance of the computer, the more money you will be given
In POS mode, your "mining" income is directly proportional to your currency age, and has nothing to do with the computing performance of the computer8. Smart contract
smart contract is a kind of computer protocol which aims to spread, verify or execute the contract in an information way. Smart contracts allow trusted transactions without a third party, which are traceable and irreversible
9, time stamp
time stamp refers to the string or encoding information used to identify the recorded time and date. The international standard is ISO 8601
Turing completion refers to the ability of a machine to perform calculations that any other programmable computer can perform DAPP decentralized application is an open source application that runs automatically, stores its data on the blockchain, motivates it in the form of cryptocurrency token, and operates with protocols showing valuable proof Dao, a decentralized autonomous organization, can be regarded as a company that operates without any human intervention and gives all forms of control to a set of unbreakable business rules13. Privatekey - private key
a private key is a string of data that allows you to access a token in a specific wallet. As cryptocurrency, they are hidden except for the owner of the address
14. Publickey -- public key
is paired with private key. The public key can calculate the address of the currency, so it can be used as a certificate to own the address of the currency
15, miner
try to create a block and add it to the computing device or software on the blockchain. In a blockchain network, when a new effective block is created, the system will automatically give the block creator (miner) a certain number of tokens as a reward
16. The mine pool is a fully automatic mining platform, which enables mining machines to contribute their computing power to mine together to create blocks, obtain block rewards, and distribute profits according to the proportion of computing power contribution (that is, mining machines access the mine pool - provide computing power - obtain income)
17, public chain
fully open blockchain, refers to anyone can read, anyone can send transactions and transactions can be effectively confirmed, people all over the world can participate in system maintenance, anyone can read and write data through transactions or mining
18. Private chain
write permission is only for the blockchain of a certain organization or a specific few objects. Read permission can be open to the outside world or restricted to any extent
19, alliance chain
consensus mechanism is a blockchain jointly controlled by several designated institutions
20, side chain
wedged side chains technology, which will realize the transfer of bitcoin and other digital assets between multiple blockchains, which means that users can access the new cryptocurrency system when they use their existing assets
21, cross chain technology
cross chain technology can be understood as a bridge connecting the blockchains, and its main application is to realize atom transaction, asset conversion, information exchange within the blockchain, or solve Oracle problems among the blockchains
22. The hard fork
blockchain has permanent divergence. After the release of the new consensus rules, some nodes that have not been upgraded cannot verify the blocks proced by the upgraded nodes, and usually the hard fork will occur
23, soft forking
when the new consensus rules are released, nodes that have not been upgraded will proce illegal blocks because they do not know the new consensus rules, which will lead to temporary forking
24, hash -- hash value
generally translated as "hash", but also directly transliterated as "hash". In short, it is a function that compresses messages of any length to a message digest of a fixed length
25, main chain
the word "main chain" comes from the main network (, relative to the test network), that is, the officially online and independent blockchain network
for those who don't know the "jargon" in the currency circle, let's learn it as soon as possible:
1. What is legal currency
legal currency is legal tender, which is issued by the state and the government. It is only guaranteed by the government credit, such as RMB, US dollar and so on
2. What is a token
token, usually translated into token. Token is one of the important concepts in blockchain. Its more well-known name is "token". However, in the view of professional "chain circle" people, its more accurate translation is "token", which represents a proof of rights and interests on the blockchain, rather than currency
There are three elements oftoken
one is digital proof of rights and interests, which must be in the form of digital certificate of rights and interests, representing a right, an inherent and intrinsic value
The second is cryptocurrency, whose authenticity, tamper proof and privacy protection are guaranteed by cryptocurrency Third, it can flow in a network, so it can be verified anytime and anywhere3. What is warehouse building
the establishment of a position in a currency circle is also called opening a position, which refers to a trader's new purchase or sale of a certain amount of digital currency
What is Sohasuoha refers to investing all the principal
What is airdrop
airdrop is a very popular marketing method of cryptocurrency. In order to let potential investors and cryptocurrency enthusiasts get token related information, token teams often air drop tokens
6. What is lockup
position locking generally refers to investors opening a new position opposite to their original position when the market moves in the opposite direction after the sale and purchase contract, which is also called lock, lock order, or even butterfly double flying
What is candy
doughnut candy is a kind of free digital currency issued to users when all kinds of digital currencies are just issued in ICO. It is a kind of momentum and publicity of the project itself by the issuers of virtual currency projects
What is breakingbreaking refers to falling below, and issuing refers to the issuing price of digital currency. Broken currency circle refers to the price of a digital currency falling below the issue price
What is private placementprivate placement is a way to invest in cryptocurrency projects, and it is also the best way for cryptocurrency project founders to raise funds for platform operation
What do you think of the K-line diagram
K-line chart is also called candle chart, Japanese line, yin-yang line, bar line, red and black line, etc., commonly referred to as "K-line". It is based on the opening price, the highest price, the lowest price and the closing price of each analysis cycle
What is hedging
General hedging refers to two transactions which are related to the market, opposite in direction, equal in quantity and balanced in profit and loss. In the futures contract market, buy the same number of positions with different directions. When the direction is determined, close out the positions in the opposite direction and keep the positive direction to make profits
What is the positionposition is a kind of market agreement, which promises the initial position of the sale and purchase contract, and the buyer is long and in the expected position; The selling contract is short and in the expected position
What are the advantagesgood news: refers to the news that the currency gets the attention of the mainstream media, or a breakthrough in the application of a technology, which is concive to stimulating the price rise
14. What is bad news
bad news: news that causes the price of bitcoin to fall, such as technical problems of bitcoin, central bank's crackdown, etc
What is reboundthe phenomenon of currency price rising e to rapid decline in the downward trend. The recovery is less than the decline
What is leverage
leverage trading, as the name suggests, is to use small amount of funds to invest several times the original amount, in order to obtain multiple returns or losses relative to the fluctuations of the investment object
in the distributed network of blockchain, the communication and trust between nodes need to rely on digital signature technology, which mainly realizes the identity confirmation and information authenticity and integrity verification
digital signature
digital signature (also known as public key digital signature, electronic signature) is a kind of common physical signature written on paper, but it uses the technology in the field of public key encryption to identify digital information. A digital signature usually defines two complementary operations, one for signature and the other for verification. Only the sender of information can proce a digital string which can not be forged by others. This digital string is also an effective proof of the authenticity of the information sent by the sender. Simply prove that "I am who I am."
explain the terms first and then tell a story. Token and token are actually two translation methods of one thing, namely token, which is based on the points issued by some public chain or other organization (another easy to understand personal translation method of token). Before that, everyone in the circle would send it casually, buy some Ethereum, a set of code, fool around with the white paper, find or create some new terms that they can't understand, and then they can go to earn money. The cost is less than a few dozen yuan, which is called token. Token token, one day, I can replace bitcoin, that's what I mean
however, e to the low threshold of token issuance, the evaluation of a large number of tokens is very negative. Later, it triggered strong supervision, and domestic token issuance and participation activities were stopped. Therefore, in order to get rid of the relationship, a more popular translation method has come out, which is called Tongzheng. Tongzheng Tongzheng is a negotiable warrant
sto is a token of supervision. Through endorsement of certain financial assets or rights and interests in reality, such as stocks, bonds, gold and silver, real estate, rights and interests, investment represents the assets represented by it, which have intrinsic value at the beginning of issuance. At the same time, it also strives to conform to the regulatory framework and be recognized by the securities and Exchange Commission (SEC).
for consumers, digital wallets are free and easy to get. For example, when a consumer makes a purchase on a merchant's website that has set up a server-side digital wallet, he enters his name, payment amount and delivery information into the merchant's own form. At the end of the purchase, he was asked to sign the user name and password for the wallet of his choice. Users can also get wallets from the wallet provider's site
although wallets are free for consumers, the suppliers charge the merchants for using wallets.
in this society, there are nine frauds out of ten,
you can do anything for money,
as long as you are asked to pay money and say how much money is against it,
all are frauds. In the future, you should be more careful to avoid being cheated.