Blockchain () is a concept that has been proposed by the academic community but has only been brought by Bitcoin in recent years. Bitcoin is based on blockchain technology. Bitcoin is a cryptocurrency or digital currency. Let's start with Bitcoin to talk about how bitcoin uses blockchain technology.
I assume that during the 2006 World Cup final, two football fans who did not know each other met. Italy played France. French fans said that we would win you in Italy in France. Italy is invincible, do not believe that we gamble 100 euros. What should I do in the real world?
I said that we have been engaged in computers before, and more than 90%of the time is dealing with abnormal conditions. If humans talk about credit, then this world may not be like this now. Qin Guo was not 6 miles to the 600 miles of King Chu Huai. Maybe it was Chu State who unified China. If you pay the money to the third party, what if the third party is running? Swallow the money. Therefore, the real strange world is unreliable by a kind heart alone. It must be able to ensure this commitment and legal contracts steadily. Today, a very common approach is to find authoritative agencies for third parties, such as government, banks, etc., either find a person or organization with heads and faces. In the final analysis, they still find a credible institution or person. However, in general, this third party will definitely "go to the fur" and charge a certain percentage of handling fees.
So can there be no way to solve this problem? This is the original intention of Bitcoin to solve the problem of trust between the two strangers.
Coltage algorithm multiplayer bookkeeping
P first talk about the encryption algorithm. Here I need the asymmetric encryption I mentioned earlier, that is, the public key. Everyone can have a pair or more public key, but a public key can only have a corresponding private key, and vice versa. The principle is that the two very large quality numbers (P and Q) multiply a number (n). If you want to crack the private key according to the public key, you must solve it violently. Come. At present, there is no public key in the world that can crack more than 1024 bits, so it is very safe to use 1024 or 2048 or even longer private keys.
So with the public key, I can use the private key as an individual, and then release the public key. Anyone can use my public key to decrypt Essence In the same way, I can also use his public key to decrypt the transfer of me to me, so as to determine that this is someone's identity, which is also called a digital signature. The principles are the same. They are all encrypted algorithms. The principles are obtained by using mathematical Euler formulas, quality numbers and other principles. This is a very great algorithm called RSA. It is proposed by 3 mathematicians that as long as we ordinary people understand the concept and use of the public key private key.
In the traditional model before, banks or government agencies have their own ledger. For example, Zhang San transferred to Li Si 100 yuan. How can I remember in the ledger? Zhang San's account deducts 100, Li Si's account increases 100, right?
Mocho -person ledger is the same, but it has changed from previous centralized institutions to distributed, decentralized agencies and even individuals. For example, Li Bai turned 100 silver to Du Fu. It was previously an accounting of the Ministry of Finance, and the blockchain was Tang Taizong, Yang Yuhuan, Zhang Xiaojing, He Zhizhang and other people withdrawn together. , Based on this, there is a seal of Li Bai. In this way, with multiple ledger, it is difficult to reach the sky if you want to tamper. Li Bai can rest assured to transfer to Du Fu and not worry about him tampering with the amount or dependent.
This can solve the problem of the fans who start mentioned, but there is still a question. Why should others help us account for?
The answer is compensation, which is in line with humanity, otherwise who is willing to help remember a account that has nothing to do with yourself?
but there is only one person who finally accounts for the final account, otherwise it will be messy.
It the premise of good, how to ensure which person to book account? Here is a math knowledge. In fact, everyone who wants to account for accounting is actually the so -called miner. He must solve a mathematical issue in the bookkeeper. This mathematical problem has no way to take it. In the hard calculation, the algorithm is a hash algorithm, similar to a string of numbers, and miners can only guess, otherwise there is no other method. And at present, the probability of this guess in Bitcoin is one -trillionth. About a normal computer must continue to guess one year before you can guess this number.
. There are tens of thousands of computers in the world. If they calculate together, they will be much faster, because there must be a computer calculated from the probability, and the reality is indeed the case. Look at a real example of Bitcoin.
It, you can also see who Miner (mininger) is, which contains how much a Number of.
. If this miner is an individual and attentive person, what should I do if he calculates the transfer record and amount without permission?
A. Tampered with transaction records/ amount
It we introduced the public and private key encryption technology. The miners themselves have no private key for the issuer or the payee. Therefore, the transaction record he has tampered with will make an error when decrypting with the correct public key, and it is eventually identified as illegal (the author himself is not sure when the time point is made, but it is determined that this record can be faked to be faked. To.
B. Delete transaction records
I assume a scene, Zhang San wants to buy a two -bedroom and one -living house in Beijing 4, but Zhang San does not want to pay this money Bai Zhan's house, thinking of a way to steal chickens and dogs is to tampering the transaction record. In theory, after Zhang San pays, this record is generated but not confirmed. The record needs to wait for a miner who solves the puzzle to do it. Suppose the miner is his own. Essence But there are several ways:
Is to know that Bitcoin mining takes a long time, because it is necessary to mention very troublesome mathematics questions. Now this cycle is about 10 minutes. This is based on the world. This is based on the world. This is based on the world. Under the premise of hundreds of thousands of mining machines at the same time. That is to say, tens of thousands of trading every ten minutes will be uniformly confirmed and placed in an unchanged block, and these hundreds of thousands of mining machines update their local records at the same time.
. 2.1 If this transaction is just generated, the landlord sees it, and then the property right is transferred to Zhang San in the next second. n The difficulty of success depends on how many blocks that have been confirmed after the record of tampering. If there is only one, it is too simple, because the blockchain algorithm defaults to the first and longer blocks when the miners release a new block. Therefore, after this modification, all the ledger will be synchronized, but there is also a problem that the synchronization will be recorded this time. If the landlord cannot check the account, Zhang San will eventually be caught. If there are many, for example, after Zhang San's transfer, the landlord's transfer of property rights 1 hour after confirming the transfer, then Zhang San must tampering with about 6 block information before. Both will point to the upper block, and each block will have an abstract (hash), which is a summary of all transaction records of the current block. So if you try to modify a block a long time ago, the abstracts of the subsequent blocks will change, which is the hash tree (). Other nodes can report the information that the blockchain is tampered with. This involves the most important point. It is often mentioned 51%of the computing power, that is, if Zhang San has more than 50%of the ledger admits this modification, then other nodes will also admit that this modification will be acknowledged according to the algorithm design. Essence However, let's not talk about the world's basis at the same time. Even if it is done, if anyone has doubts about this, you can still compulsor the system. Similar problems have been made before Ethereum. The ending is Ethereum. Tampered with the entire block and recovered the stolen property. Ethereum fork event.
above is a superficial introduction to the characteristics of Bitcoin achieved by application blockchain technology. It can be well realized, fair, neutral and peaceful. Two strangers in the world can rely on Bitcoin or other blockchain technologies to achieve mutual trust.
Blockchain () is a concept that has been proposed by the academic community but has only been brought by Bitcoin in recent years. Bitcoin is based on blockchain technology. Bitcoin is a cryptocurrency or digital currency. Let's start with Bitcoin to talk about how bitcoin uses blockchain technology.
I assume that during the 2006 World Cup final, two football fans who did not know each other met. Italy played France. French fans said that we would win you in Italy in France. Italy is invincible, do not believe that we gamble 100 euros. What should I do in the real world?
I said that we have been engaged in computers before, and more than 90%of the time is dealing with abnormal conditions. If humans talk about credit, then this world may not be like this now. Qin Guo was not 6 miles to the 600 miles of King Chu Huai. Maybe it was Chu State who unified China. If you pay the money to the third party, what if the third party is running? Swallow the money. Therefore, the real strange world is unreliable by a kind heart alone. It must be able to ensure this commitment and legal contracts steadily. Today, a very common approach is to find authoritative agencies for third parties, such as government, banks, etc., either find a person or organization with heads and faces. In the final analysis, they still find a credible institution or person. However, in general, this third party will definitely "go to the fur" and charge a certain percentage of handling fees.
So can there be no way to solve this problem? This is the original intention of Bitcoin to solve the problem of trust between the two strangers.
Coltage algorithm multiplayer bookkeeping
P first talk about the encryption algorithm. Here I need the asymmetric encryption I mentioned earlier, that is, the public key. Everyone can have a pair or more public key, but a public key can only have a corresponding private key, and vice versa. The principle is that the two very large quality numbers (P and Q) multiply a number (n). If you want to crack the private key according to the public key, you must solve it violently. Come. At present, there is no public key in the world that can crack more than 1024 bits, so it is very safe to use 1024 or 2048 or even longer private keys.
So with the public key, I can use the private key as an individual, and then release the public key. Anyone can use my public key to decrypt Essence In the same way, I can also use his public key to decrypt the transfer of me to me, so as to determine that this is someone's identity, which is also called a digital signature. The principles are the same. They are all encrypted algorithms. The principles are obtained by using mathematical Euler formulas, quality numbers and other principles. This is a very great algorithm called RSA. It is proposed by 3 mathematicians that as long as we ordinary people understand the concept and use of the public key private key.
In the traditional model before, banks or government agencies have their own ledger. For example, Zhang San transferred to Li Si 100 yuan. How can I remember in the ledger? Zhang San's account deducts 100, Li Si's account increases 100, right?
Mocho -person ledger is the same, but it has changed from previous centralized institutions to distributed, decentralized agencies and even individuals. For example, Li Bai turned 100 silver to Du Fu. It was previously an accounting of the Ministry of Finance, and the blockchain was Tang Taizong, Yang Yuhuan, Zhang Xiaojing, He Zhizhang and other people withdrawn together. , Based on this, there is a seal of Li Bai. In this way, with multiple ledger, it is difficult to reach the sky if you want to tamper. Li Bai can rest assured to transfer to Du Fu and not worry about him tampering with the amount or dependent.
This can solve the problem of the fans who start mentioned, but there is still a question. Why should others help us account for?
The answer is compensation, which is in line with humanity, otherwise who is willing to help remember a account that has nothing to do with yourself?
but there is only one person who finally accounts for the final account, otherwise it will be messy.
It the premise of good, how to ensure which person to book account? Here is a math knowledge. In fact, everyone who wants to account for accounting is actually the so -called miner. He must solve a mathematical issue in the bookkeeper. This mathematical problem has no way to take it. In the hard calculation, the algorithm is a hash algorithm, similar to a string of numbers, and miners can only guess, otherwise there is no other method. And at present, the probability of this guess in Bitcoin is one -trillionth. About a normal computer must continue to guess one year before you can guess this number.
. There are tens of thousands of computers in the world. If they calculate together, they will be much faster, because there must be a computer calculated from the probability, and the reality is indeed the case. Look at a real example of Bitcoin.
It, you can also see who Miner (mininger) is, which contains how much a Number of.
. If this miner is an individual and attentive person, what should I do if he calculates the transfer record and amount without permission?
A. Tampered with transaction records/ amount
It we introduced the public and private key encryption technology. The miners themselves have no private key for the issuer or the payee. Therefore, the transaction record he has tampered with will make an error when decrypting with the correct public key, and it is eventually identified as illegal (the author himself is not sure when the time point is made, but it is determined that this record can be faked to be faked. To.
B. Delete transaction records
I assume a scene, Zhang San wants to buy a two -bedroom and one -living house in Beijing 4, but Zhang San does not want to pay this money Bai Zhan's house, thinking of a way to steal chickens and dogs is to tampering the transaction record. In theory, after Zhang San pays, this record is generated but not confirmed. The record needs to wait for a miner who solves the puzzle to do it. Suppose the miner is his own. Essence But there are several ways:
Is to know that Bitcoin mining takes a long time, because it is necessary to mention very troublesome mathematics questions. Now this cycle is about 10 minutes. This is based on the world. This is based on the world. This is based on the world. Under the premise of hundreds of thousands of mining machines at the same time. That is to say, tens of thousands of trading every ten minutes will be uniformly confirmed and placed in an unchanged block, and these hundreds of thousands of mining machines update their local records at the same time.
. 2.1 If this transaction is just generated, the landlord sees it, and then the property right is transferred to Zhang San in the next second. n
The difficulty of success depends on how many blocks that have been confirmed after the record of tampering. If there is only one, it is too simple, because the blockchain algorithm defaults to the first and longer blocks when the miners release a new block. Therefore, after this modification, all the ledger will be synchronized, but there is also a problem that the synchronization will be recorded this time. If the landlord cannot check the account, Zhang San will eventually be caught. If there are many, for example, after Zhang San's transfer, the landlord's transfer of property rights 1 hour after confirming the transfer, then Zhang San must tampering with about 6 block information before. Both will point to the upper block, and each block will have an abstract (hash), which is a summary of all transaction records of the current block. So if you try to modify a block a long time ago, the abstracts of the subsequent blocks will change, which is the hash tree (). Other nodes can report the information that the blockchain is tampered with. This involves the most important point. It is often mentioned 51%of the computing power, that is, if Zhang San has more than 50%of the ledger admits this modification, then other nodes will also admit that this modification will be acknowledged according to the algorithm design. Essence However, let's not talk about the world's basis at the same time. Even if it is done, if anyone has doubts about this, you can still compulsor the system. Similar problems have been made before Ethereum. The ending is Ethereum. Tampered with the entire block and recovered the stolen property. Ethereum fork event.
above is a superficial introduction to the characteristics of Bitcoin achieved by application blockchain technology. It can be well realized, fair, neutral and peaceful. Two strangers in the world can rely on Bitcoin or other blockchain technologies to achieve mutual trust.