“If we see data as the petroleum of the digital era, then BNB Greenfield is the Saudi Aramco, providing a series of upstream services including exploration, production, refining and transportation, and downstream companies can further utilize its product for sales or reproduction.”“If we see data as the petroleum of the digital era, then BNB Greenfield is the Saudi Aramco, providing a series of upstream services including exploration, production, refining and transportation, and downstream companies can further utilize its product for sales or reproduction.”

Web3 Infrastructure Upgrade: BNB Greenfield Boosts Data Monetization through Decentralized Storage

2023/02/10 12:00

The “power” of data is self-evident. Many Internet products are free to use because profits can be made from the data provided for free by users. As the digital economy thrives, people have come to recognize data as the backbone and driver of the economy. They also recognized the value of their data and tried to own it, which is the starting point of the Web3 era.

From the birth of Reuther and the emergence of “Reuther killers”, from cloud storage to decentralized storage, data infrastructure continues to expand and improve. BNB Smart Chain (also known as BSC) with the highest active user volume recently launched decentralized storage infrastructure BNB Greenfield, aiming to achieve data-centered synergy of smart contracts, and boost monetization of data in the information era.

Web3 Infrastructure Upgrade: BNB Greenfield Boosts Data Monetization through Decentralized Storage

Combination of storage with computing

Against the backdrop of exponential growth of data and breach of data privacy, people have been exploring the solution of decentralized storage for nearly a decade. Back in 2014, Storj has been exploring storage services based on blockchain technologies; in 2015, Ria has begun to create distributed cloud system; in the same year, IPFS proposed its decentralized storage solution; in 2017, inspired by IC0 and the token economy model, Freebased File coin and permanent storage solution Ar weave were launched, followed by other public chain-based storage projects.

In fact, public chains like Ethereum also have storage functions. For example, some users recorded their censored publications on Ethereum; Pa News recorded the information of award winners on its annual events. This information will be stored on Ethereum permanently. However, due to limited blockchain capacity and loading speed, public chains like Ethereum are not ideal for massive storage, thus the need for specialized public chains for storage arises.However, distributed storage capacity is not native on Ethereum or EVM public chains, such as Polygon. The only way to make up is to build a storage chain on the public chain.

Another issue emerged. Storage public chain and smart contract public chains are like two separated continents, in particular, most storage public chains are only for data storage and not able to compute and analyze data independently. To build complicated dApps, virtual machines are required to realize smart contract functions. How shoulde we combine decentralized storage and smart contract to provide real-time analysis, implementation and trading, so as to maximize the value of data? This has become a main difficulty and focus in technology development.

As a traditional leader in decentralized storage, Filecoin has been promoting the development of FVM (File coin Virtual Machine) to combine verifiable storage and smart contract function, but the progress has been very slow. According to official data and planning, FVM testnet is expected to be launched in February 2023, and mainnet in May. In view of the fact that Filecoin has a record of delays, whether it will keep its promise this year is still uncertain.

Arweave realized permanent storage of flies through an innovative consensus mechanism. It proposed the concept of “Smart weave” and built some ecosystem projects around it. But the characteristics of Arweave restricted its potential use cases to mainly decentralized H5-APPs, such as media, NFT and web front-ends. Also, Arweave isn’t compatible with Ethereum and it’s hard to do so under the current technological framework. Other storage projects such as Storj and Ria Coin are similar. They are in nature a connection between storage resources without an effective content addressing method, which makes it difficult to share files like movies and audios, showing less competitiveness in storage functionality.

It’s worth mentioning that the early-stage public chain Infinity has realized the smart contract function via the “container” concept, with built-in distributed storage structure. But the ecosystem is less competitive and less integrated among other public chains for its slow progress and EVM incompatibility.

The launch of BNB Greenfield has provided a great solution to the gap between the two major infrastructures. According to BNB Greenfield White Paper, BNB Greenfield dApps are new types of decentralized applications. There are data endpoints, transaction interfaces, P2P networks, and corresponding SDK to help developers to build BNB Greenfield dApps. The use cases officially raised include: personal cloud drive, decentralized front-end web, block chain storage, social media, personal data market and personal digital publishing. If we see data as the petroleum of the digital era, then BNB Greenfield is the Saudi Aramco, providing a series of upstream services including exploration, production, refining and transportation, and downstream companies can further utilize its product for sales or reproduction.

Strengthen the foundation of Web3 with data programmability

Web3 natives accustomed to DeFi mining and NFT minting probably no longer pay attention to the implementation part after clicking “approve”, which are automatically executed by smart contracts. Early in 1994, the renowned cryptologist Nick Sabot, inspired by AVM machines, proposed the concept of “smart contract”. To some extent, AVM can be regarded as the first wave of massive adoption of smart contracts.

If Bitcoin aiming at decentralized peer-to-peer transactions represents the 1.0 era of blockchains, Ethereum with the Turing-complete smart contract functionality is ushering the block chains into the 2.0 era. Only with the smart contract can the blockchain technology be applied to various industries including finance, healthcare, Internet of Things and AI and the smart contract has become one of the cornerstones of the future digital society. Subsequent emerging public chains such as BNB Chain were created to further improve the performance and enhance the computing capabilities of the smart contract on the basis of Ethereum.

However, to bring real changes to the world in the future, the smart contract requires different data support, connection to different systems such as the Internet of Things, Internet and financial system as well as data support from such systems. Unlike the public chain smart contract, the development of which has enabled us to experience many decentralized applications, decentralized data storage is the first step toward development, and the volume of data stored through decentralized storage is much larger than that of traditional storage. And, mass data generated each day will accelerate its production scale only, which makes storage an important and profitable business. According to the IDC report titled Quarterly Tracking Report on Global Corporate Infrastructure: Buyers and Cloud Deployment, it is predicted that the size of the global cloud storage market will reach over USD100 billion between 2020 and 2025.

The reason that centralized storage is important is because it addresses various pain points of the above Web2.0 centralized storage and better caters to the development needs of the big data era. In comparison with traditional centralized storage, the advantages of the decentralized storage mainly lie in protection of privacy, support for edge storage as well as lower costs from co-creation and sharing. According to the IDC report, in the future, 75% of the newly added data will be non-structured edge data. Decentralized data storage has obvious cost advantages for non-structured data in particular. As distributed storage changes the production relationship in the form of nodes and token incentives, it is difficult for the end users to use the services such as storage and indexing at very low prices.

Web3 Infrastructure Upgrade: BNB Greenfield Boosts Data Monetization through Decentralized Storage

The core infrastructure of BNB Greenfield includes the Greenfield blockchain and SPN (storage provider network). At the beginning, some validators run by the BNB community or SP (storage provider) will initiate BNB Greenfield through genesis , and some SPs will initiate corresponding storage infrastructure and register themselves to the Greenfield blockchain. SPs forms another P2P network, providing the applications and users with a complete function set to create, store, read and exchange data while using the Greenfield blockchain as the metadata and ledger layer.

The real strong point of the Greenfield ecosystem lies in the fact that the platform not only stores data, but also supports value creation based on the data assets and the derived economy. The data asset is characterized firstly in authority, for instance, the authority to read and write data. When such a right is disconnected from the data themselves, they become tradable assets, amplifying the value of the data. When the data themselves can be executed (a new type of “smart contract”), interact with each other and generate new data, this can be amplified. This creates a great space for building a new, data intensive and trustless computing environment.

The BNB Greenfield dApps are also part of the BNB Chain infrastructure and both of them have a native cross-chain bridge. Although it is possible to create and read data on Greenfield Core Infra at lower costs, relevant data operations can be transferred to BSC and integrated with the smart contract systems(for instance, DeFi) there to cause the multiplier effect, which will open up new business opportunities based on data and their operations.

The address format of the Greenfield blockchain will be fully compatible with BSC( and Ethereum). It also accepts EIP-712 transaction signature and verification. This enables the existing wallet infrastructure to interact with Greenfield naturally at the very beginning. Hence, Greenfield will integrate with existing systems and reuse existing infrastructure and dApps, for instance, NFT trading platform, data index and blockchain browser.

The infrastructure core of BNB Greenfield, the Dapp ecosystem of Greenfield and BSC form a “three into one” ecosystem.

Web3 Infrastructure Upgrade: BNB Greenfield Boosts Data Monetization through Decentralized Storage

From the perspective of BNB Greenfield DApps, these applications can help the users create, read and execute data on BNB Greenfield, Greenfield SP and BSC and serve the needs of the users. From the perspective of BNB Greenfield, they accept requests and observations from Greenfield dApp on behalf of the users and in the meanwhile accept commands from BSC and work together depending on different business scenarios. From the perspective of BSC, they can accept data assets transferred from BNB Greenfield and provide the new Greenfield dApp with more business scenarios through the smart contract.

In this “three into one” ecosystem, the users can interact with part of the ecosystem directly or indirectly for different purposes.DApps can define how they wish to package the assets from Greenfield to realize the programmability of the data in a real sense.

BNB Integrating a New Function of Decentralized Storage

From the launch of the platform token of Binance until the launch of BNB Smart Chain in September 2022, BNB has evolved from a platform token into an ecosystem token. Today, with the introduction of new use cases, BNB has become the native governance and Gas token of the public chain/BSC sidechain of distributed storage.

There is a native cross-chain bridge between the Greenfield blockchain and BSC. Initially, BNBs are locked on BSC and re-minted on Greenfield. The total supply of BNBs remains unchanged, but they flow among BNB Beacon Chain, BSC and Greenfield. The collection of initial validators of Greenfield upon genesis will lock a certain number of BNBs to the “Greenfield Token Hub” contract on BSC. The contract will also be used as part of the native bridge for transfer following BNB genesis. These BNBs locked initially will be used as the staking and initial Gas fee of the validators.

So far, Greenfield has not disclosed its economy model, for instance, how many BNBs need to be held and staked for the election of the registration and validation nodes of SP and incentive design is needed to ensure there are a suitable number of SPs. SPs need to comply with a series of actions to ensure user’s data redundancy; otherwise, they will be fined.

However, with the launch of Greenfield, some new needs for BNBs arise, for instance, SPs may have the need to purchase or borrow BNBs for staking, and the users need BNBs for paying storage or execution fees in using Greenfield. In the future, if the real-time burn mechanism like that of BSC is implemented, the burning of Gas fee charged by the validation nodes within each block in accordance with the fixed proportion will further reduce the total supply of BNBs in circulation and aggravate the scarcity of BNBs.

How much value will be added to BNB with the introduction of Greenfield? We can take a look at the existing mainstream decentralized storage projects: FIL boasts the highest market cap of USD 2 billion and Arweave has a total market cap of nearly USD 800 million, both of which are dwarfed before BNB with a total market cap of USD 65 billion. This is because decentralized storage is in the nascent stage of development and there are fewer applications.

Web3 Infrastructure Upgrade: BNB Greenfield Boosts Data Monetization through Decentralized Storage

However, with the robust need for decentralized storage in the foreseeable future and the development of data programmability, data as the petroleum resource in the new era will be further mined and explored and cause considerable multiplier effects in other areas.

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.
Share Insights

You May Also Like

BDACS Launches KRW1, South Korean Won-Backed Stablecoin, Marking Key Digital Asset Milestone

BDACS Launches KRW1, South Korean Won-Backed Stablecoin, Marking Key Digital Asset Milestone

BDACS launches KRW1, a won-backed stablecoin with strong institutional backing. Avalanche blockchain powers KRW1, ensuring high performance and security. KRW1 aims for diverse use cases in payments and remittances. BDACS has officially launched KRW1, a stablecoin fully backed by the South Korean won, after completing a proof of concept (PoC) that validated its technical infrastructure. This launch is a big move towards BDACS the company has incorporated fiat deposits and issuing of stablecoins as well as blockchain verification into an ever functioning and operational ecosystem. KRW1 will become an important participant in the market of digital assets, where the priority will be compliance with the regulation, openness, and scalability. The stablecoin is fully backed by South Korean won kept in escrow at the Woori Bank, which is the key participant in this project. It also allows for the verification of reserves in real time by means of an integrated banking API, which supports the stability and reliability of KRW1. This is what makes BDACS a unique solution to the problem of breaking the barrier between the old financial system and the digital economy due to its integration of conventional banking and blockchain technology. Also Read: Bitcoin’s Next Move Depends on $115,440: Here’s What Happens Next! Leveraging Avalanche Blockchain for Enhanced Security and Scalability For its blockchain infrastructure, BDACS has chosen the Avalanche network, which is known for its high-performance capabilities and security. Avalanche’s speed and reliability make it an ideal choice for supporting KRW1’s stablecoin operations, ensuring that they can scale effectively while maintaining the highest levels of security. The collaboration between BDACS and Avalanche underscores the company’s belief in utilizing cutting-edge blockchain technology to provide a safe and scalable solution to the digital asset exchange. Looking ahead, BDACS envisions KRW1 as a versatile stablecoin that can be used for various purposes, including remittances, payments, investments, and deposits. The company also intends to incorporate the use case of KRW1 into the public sector, as the company will be able to provide low-cost payment options in emergency relief disbursements and other basic services. This growth will assist in decreasing transaction charges and increasing accessibility to digital financial solutions. BDACS aims to make KRW1 a key component of South Korea’s burgeoning digital economy by making strategic commitments with Woori Bank and using the latest blockchain technology. The company is determined to play a pivotal role in shaping the future of stablecoins in the region. Also Read: Top Investor Issues Advance Warning to XRP Holders – Beware of this Risk The post BDACS Launches KRW1, South Korean Won-Backed Stablecoin, Marking Key Digital Asset Milestone appeared first on 36Crypto.
Share
Coinstats2025/09/18 21:39
Bitcoin White Paper: A Peer-to-Peer Cash System

Bitcoin White Paper: A Peer-to-Peer Cash System

PANews Editor's Note: On October 31, 2008, Satoshi Nakamoto published the Bitcoin white paper, and today marks its 17th anniversary. The following is a translation of the white paper by Li Xiaolai, for everyone to revisit this classic work. Summary: A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution. While digital signatures offer a partial solution, the main advantage of electronic payments is negated if a trusted third party is still required to prevent double-spending. We propose a scheme using a peer-to-peer network to address the double-spending problem. The peer-to-peer network timestamps each transaction by recording the transaction's hash data onto a continuously expanding, hash-based proof-of-work chain, forming a record that cannot be altered unless completely rewritten. The longest chain serves two purposes: proving witnessed events and their order, and simultaneously proving it originated from the largest pool of CPU power. As long as the vast majority of CPU power is controlled by benign nodes—that is, nodes that do not cooperate with those attempting to attack the network—benign nodes will generate the longest chain and outpace attackers. The network itself requires a minimal structure. Information will propagate on a best-effort basis, and nodes are free to come and go; however, upon joining, they must always accept the longest proof-of-work chain as proof of everything that happened during their absence. 1. Introduction Internet commerce relies almost entirely on financial institutions as trusted third parties to process electronic payments. While this system works reasonably well for most transactions, it is still hampered by the inherent flaws of its trust-based model. Completely irreversible transactions are practically impossible because financial institutions cannot avoid arbitrating disputes. Arbitration costs increase transaction costs, which in turn limit the minimum possible transaction size and effectively prevent many small payments. Beyond this, there are even greater costs: the system cannot provide irreversible payments for irreversible services. The possibility of reversibility creates an omnipresent need for trust. Merchants must be wary of their customers, requiring them to provide additional information that would otherwise be unnecessary (if trusted). A certain percentage of fraud is considered unavoidable. These costs and payment uncertainties, while avoidable when paying with physical currency directly between people, lack any mechanism that allows payments to be made through communication channels when one party is not trusted. What we truly need is an electronic payment system based on cryptographic proofs rather than trust, allowing any two parties to transact directly without needing to trust a third party. Irreversible transactions guaranteed by computational power help sellers avoid fraud, while everyday guarantee mechanisms to protect buyers are easily implemented. In this paper, we propose a solution to double-spending by using peer-to-peer, distributed timestamping servers to generate computational power-based proofs, recording each transaction chronologically. This system is secure as long as honest nodes collectively possess more CPU power than colluding attackers. 2. Transactions We define an electronic coin as a digital signature chain. When an owner transfers a coin to another person, they append the following digital signature to the end of this chain: the hash of the previous transaction and the new owner's public key. The recipient can verify ownership of the digital signature chain by verifying the signature. The problem with this approach is that the recipient cannot verify that none of the previous owners have double-spended the currency. A common solution is to introduce a trusted centralized authority, or "mint," to check every transaction for double-spending. After each transaction, the coin must return to the mint, which then issues a new coin. Thus, only coins directly issued by the mint are considered trustworthy and free from double-spending. The problem with this solution is that the fate of the entire monetary system is tied to the company operating the mint (much like a bank), and every transaction must go through it. We need a way for the recipient to confirm that the previous owner did not sign any previous transactions. For our purposes, only the earliest transaction counts, so we are not concerned with subsequent double-spending attempts. The only way to confirm the non-existence of a transaction is to know all transactions. In the mint model, the mint already knows all transactions and can confirm their order. To accomplish this without the involvement of a "trusted party," the transaction record must be publicly announced, thus requiring a system that allows participants to agree on the same unique transaction history they receive. The recipient needs to prove that at the time each transaction occurs, a majority of nodes agree that it was the first one received. 3. Timestamp Server This solution begins with a timestamp server. A timestamp server works by timestamping the hash of a block of items and then broadcasting the hash, much like a newspaper does or a post in a Usenet newsgroup [2-5]. Clearly, the timestamp proves that the data existed before that point in time; otherwise, the hash couldn't be generated. Each timestamp contains previous timestamps in its hash, thus forming a chain; each new timestamp is added after the previous ones. 4. Proof of Work To implement a peer-to-peer distributed timestamp server, we need a proof-of-work system similar to Adam Burke's HashCash, rather than something like a newspaper or newsgroup post. Proof-of-work involves finding a value that meets the following condition: after hashing it—for example, using SHA-256—the hash must begin with a certain number of zeros. Each additional zero increases the workload exponentially, while verifying this workload only requires calculating a single hash. In our timestamp network, we implement proof-of-work as follows: A random number is continuously added to each block until a value that meets a condition is found: the block's hash begins with a specified number of zeros. Once the CPU's computational power yields a result that satisfies the proof-of-work, the block can no longer be modified unless all previous work is redone. As new blocks are continuously added, modifying the current block means redoing the work for all subsequent blocks. Proof-of-Work (PoL) also solves the problem of determining who represents the majority in making decisions. If the so-called "majority" is determined by a "one IP address, one vote" system, then anyone who can control a large number of IP addresses could be considered part of the "majority." PoL, in essence, is "one CPU, one vote." The so-called "majority decision" is represented by the longest chain, because it's the chain with the most work invested. If the majority of CPU power is controlled by honest nodes, then the honest chain grows the fastest, far outpacing other competing chains. To change an already generated block, an attacker would have to re-complete the proof-of-work for that block and all subsequent blocks, and then catch up with and surpass the work done by the honest nodes. The following section explains why the probability of a delayed attacker catching up decreases exponentially with the number of blocks. To cope with the continuous increase in overall hardware computing power and the potential changes in the number of participating nodes over time, the proof-of-work difficulty is determined by a moving average based on the average number of blocks generated per hour. If blocks are generated too quickly, the difficulty will increase. 5. Network The steps to run a network are as follows: All new transactions are broadcast to all nodes; Each node packages new transactions into a block; Each node begins by finding a challenging proof-of-work for this block; When a block finds its proof of work, it must broadcast this block to all nodes; Many other nodes will accept a block if and only if all of the following conditions are met: all transactions in the block are valid and have not been double-spended; The way numerous nodes indicate to the network that they accept a block is to use the hash of the accepted block as the hash of the previous block when creating the next block. Nodes consistently recognize the longest chain as correct and continuously add new data to it. If two nodes simultaneously broadcast two different versions of the "next block," some nodes will receive one first, while others will receive the other. In this case, nodes will continue working on the block they received first, but will also save the other branch in case the latter becomes the longest chain. When the next proof-of-work is found, and one of the branches becomes the longer chain, this temporary divergence is resolved, and the nodes working on the other branch will switch to the longer chain. New transactions don't necessarily need to be broadcast to all nodes. Once they reach enough nodes, they will soon be packaged into a block. Block broadcasting also allows some messages to be dropped. If a node doesn't receive a block, it will realize it missed the previous block when it receives the next block, and will therefore issue a request to resubmit the missing block. 6. Incentive As agreed, the first transaction of each block is a special transaction that generates a new coin, owned by the block's creator. This rewards nodes that support the network and provides a way to issue coins into circulation—in this system, there's no centralized authority issuing those coins. This steady increase in the number of new coins entering circulation is analogous to gold miners continuously consuming their resources to add gold to the system. In our system, the resources consumed are CPU time and the electricity they use. Rewards can also come from transaction fees. If the output value of a transaction is less than its input value, the difference is the transaction fee; this fee is used to reward nodes for including the transaction in the block. Once a predetermined number of coins are in circulation, the rewards will be entirely distributed through transaction fees, and there will be absolutely no inflation. The reward mechanism may also incentivize nodes to remain honest. If a greedy attacker manages to acquire more CPU power than all honest nodes combined, he must choose: use that power to cheat others by stealing back the money he's spent, or use it to generate new coins? He should be able to see that following the rules is more advantageous; the current rules allow him to acquire more coins than all the others combined, which is clearly more profitable than secretly destroying the system and losing his wealth. 7. Reclaiming Disk Space If a coin's most recent transaction occurred a sufficient number of blocks ago, then all previous transactions involving that coin can be discarded—this is to save disk space. To achieve this without corrupting the block's hash, the transaction hashes are incorporated into a Merkle tree [7, 2, 5], with only the root of the tree included in the block's hash. By pruning the branches, older blocks can be compressed. The internal hashes do not need to be preserved. A block header without any transactions is approximately 80 bytes. Assuming a block is generated every ten minutes, 80 bytes multiplied by 6, 24, and 365 equals 4.2 MB per year. As of 2008, most computers on the market had 2GB of RAM, and according to Moore's Law, this would increase by 1.2 GB per year, so even if block headers had to be stored in memory, it wouldn't be a problem. 8. Simplified Payment Verification Payment confirmation is possible even without running a full network node. A user only needs a copy of the block header from the longest chain with proof-of-work—which they can verify by checking online nodes to confirm it comes from the longest chain—and then obtains the branch node of the Merkle tree, connecting to the transaction at the time the block was timestamped. The user cannot check the transaction themselves, but by connecting to somewhere on the chain, they can see that a network node has accepted the transaction, and subsequent blocks further confirm that the network has accepted it. As long as honest nodes retain control of the network, verification remains reliable. However, verification becomes less reliable if the network is controlled by an attacker. Although network nodes can verify transaction records themselves, simplified verification methods can be fooled by forged transaction records if an attacker maintains control of the network. One countermeasure is for client software to receive alerts from network nodes. When a network node discovers an invalid block, it issues an alert, displays a notification on the user's software, instructs the user to download the complete block, and warns the user to confirm transaction consistency. Merchants with high-frequency transactions should still prefer to run their own full nodes to ensure greater independent security and faster transaction confirmation. 9. Combining and Splitting Value While processing coins one by one is possible, keeping a separate record for each penny is cumbersome. To allow for the division and merging of value, transaction records contain multiple inputs and outputs. Typically, there is either a single input from a relatively large previous transaction, or a combination of many inputs from smaller amounts; meanwhile, there are at most two outputs: one is the payment (to the recipient), and if necessary, the other is the change (to the sender). It's worth noting that "fan-out" isn't the issue here—"fan-out" refers to a transaction that depends on several transactions, which in turn depend on even more transactions. There's never any need to extract a complete, independent historical copy of any single transaction. 10. Privacy Traditional banking models achieve a degree of privacy by restricting access to information about transacting parties and trusted third parties. This approach is rejected due to the need to make all transaction records public. However, maintaining privacy can be achieved by cutting off the flow of information elsewhere—public-key anonymity. The public can see that someone transferred a certain amount to someone else, but no information points to a specific individual. This level of information disclosure is somewhat like stock market transactions, where only the time and the amounts of each transaction are published, but no one knows who the transacting parties are. 11. Calculations Imagine an attacker attempting to generate an alternative chain that is faster than the honest chain. Even if he succeeds, it won't leave the current system in an ambiguous situation; he cannot create value out of thin air, nor can he acquire money that never belonged to him. Network nodes will not accept an invalid transaction as a payment, and honest nodes will never accept a block containing such a payment. At most, the attacker can only modify his own transactions, attempting to retrieve money he has already spent. The competition between the honest chain and the attacker can be described using a binomial random walk. A successful event is when a new block is added to the honest chain, increasing its advantage by 1; while a failed event is when a new block is added to the attacker's chain, decreasing the honest chain's advantage by 1. The probability that an attacker can catch up from a disadvantaged position is similar to the gambler's bankruptcy problem. Suppose a gambler with unlimited chips starts from a deficit and is allowed to gamble an unlimited number of times with the goal of making up the existing deficit. We can calculate the probability that he can eventually make up the deficit, which is the probability that the attacker can catch up with the honesty chain[8], as follows: Since we have already assumed that the number of blocks an attacker needs to catch up with is increasing, their probability of success decreases exponentially. When the odds are against them, if the attacker doesn't manage to make a lucky forward move at the beginning, their chances of winning will be wiped out as they fall further behind. Now consider how long a recipient of a new transaction needs to wait to be fully certain that the sender cannot alter the transaction. Let's assume the sender is an attacker attempting to mislead the recipient into believing they have paid the due, then transfer the money back to themselves. In this scenario, the recipient would naturally receive a warning, but the sender would prefer that by then the damage is done. The recipient generates a new public-private key pair and then informs the sender of the public key shortly before signing. This prevents a scenario where the sender prepares a block on a chain in advance through continuous computation and, with enough luck, gets ahead of the time until the transaction is executed. Once the funds have been sent, the dishonest sender secretly begins working on another parachain, attempting to insert a reverse version of the transaction. The recipient waits until the transaction is packaged into a block, and then another block is subsequently added. He doesn't know the attacker's progress, but can assume the average time for an honest block to be generated in each block generation process; the attacker's potential progress follows a Poisson distribution with an expected value of: To calculate the probability that the attacker can still catch up, we multiply the Passon density of each attacker's existing progress by the probability that he can catch up from that point: To avoid rearranging the data after summing the infinite series of the density distribution… Convert to C language program... From the partial results, we can see that the probability decreases exponentially as Z increases: If P is less than 0.1%... 12. Conclusion We propose an electronic transaction system that does not rely on trust. Starting with a simple coin framework using digital signatures, while providing robust ownership control, it cannot prevent double-spending. To address this, we propose a peer-to-peer network using a proof-of-work mechanism to record a public transaction history. As long as honest nodes control the majority of CPU power, attackers cannot successfully tamper with the system solely from a computational power perspective. The robustness of this network lies in its unstructured simplicity. Nodes can work simultaneously instantaneously with minimal coordination. They don't even need to be identified, as message paths do not depend on a specific destination; messages only need to be propagated with best-effort intent. Nodes are free to join and leave, and upon rejoining, they simply accept the proof-of-work chain as proof of everything that happened while they were offline. They vote with their CPU power, continuously adding new valid blocks to the chain and rejecting invalid ones, indicating their acceptance of valid transactions. Any necessary rules and rewards can be enforced through this consensus mechanism.
Share
PANews2025/10/31 17:05