IPFs is a representative project in the field of decentralized storage, and its main network line of economic incentive layer filecoin is also getting closer. The network communication module libp2p in the IPFs technology stack is a necessary reference for the network layer implementation of blockchain projects. Blockchain implements decentralized computing, but it is not suitable for storing a large amount of data. IPFs can be used as the data storage layer of the blockchain. …
1、 Introduction to zero knowledge proof
1.1 Dilemma of blockchain technology in data privacy protection
The characteristic of blockchain technology is that the data stored on the blockchain is open, transparent and unalterable to all people, which is the technical basis for blockchain technology to establish a Commercial Trust Center at low cost. But in practical business practice, for example, if we put the patient’s electronic medical record on the chain, as a result, everyone can know what disease the patient has, which is obviously unacceptable. …
Cryptography is the basis of blockchain, and a lot of cryptography algorithms are used in blockchain, including symmetric encryption, asymmetric encryption, one-way hash algorithm, digital signature and other technologies.
In order to realize the independent control of cryptography technology, China has also defined its own national Cryptography Standards. In the “financial distributed ledger technology security specification” issued by the central bank in 2020, it is clearly required that domestic blockchain technology must support national cryptography algorithm. Ultrain blockchain has now completed the support for the national secret algorithm, which meets all the requirements of the central bank’s security specifications.
This…
Cryptography technology is the cornerstone of information technology. Blockchain uses a lot of technological achievements of modern information security and cryptography, mainly including: hash algorithm, symmetric encryption, asymmetric encryption, digital signature, digital certificate and so on. …
Following is the monthly report on the progress of the project from Jul. 6th -Jul- 31th, which contains two items: project development progress and community dynamic update. It is for the community members to check. Thank you for your attention.
Ultrain’s Core Technology
1) The transaction signature is verified by the sub thread through the lockless data structure and segmented locking idea, and the transaction processing performance is improved by 20%;
2) The automatic deployment scheme based on USB installation code is designed and completed, and the diagnosis system based on USB is completed;
3) Improve the thread synchronization mechanism…
Following is the monthly report on the progress of the project from Jun. 8th -Jul- 5th, which contains two items: project development progress and community dynamic update. It is for the community members to check. Thank you for your attention.
Ultrain’s Core Technology
1) The design of signature multithreading verification scheme is completed, and the coding implementation is started to improve the system performance;
2) Complete the design and implementation of the automatic deployment of the home node of the Ubuntu version, and complete the deployment of the first machine;
3) The node certificate management tool adds the functions of…
Cryptography is the basis of blockchain, and a lot of cryptography algorithms are used in blockchain, including symmetric encryption, asymmetric encryption, one-way hash algorithm, digital signature and other technologies.
In order to realize the independent control of cryptography technology, China has also defined its own national Cryptography Standards. In the “financial distributed ledger technology security specification” issued by the central bank in 2020, it is clearly required that domestic blockchain technology must support national cryptography algorithm. Ultrain blockchain has now completed the support for the national secret algorithm, which meets all the requirements of the central bank’s security specifications.
This…
1、 Introduction to zero knowledge proof
1.1 Dilemma of blockchain technology in data privacy protection
The characteristic of blockchain technology is that the data stored on the blockchain is open, transparent and unalterable to all people, which is the technical basis for blockchain technology to establish a Commercial Trust Center at low cost. But in practical business practice, for example, if we put the patient’s electronic medical record on the chain, as a result, everyone can know what disease the patient has, which is obviously unacceptable. …
Following is the monthly report on the progress of the project from May. 11th -Jun.7th, which contains two items: project development progress and community dynamic update. It is for the community members to check. Thank you for your attention.
Ultrain’s Core Technology
• Ultrain infrastructure
1) Complete the development of the Windows version of the family mining machine software, and implement the Windows 10 environment automation deployment tool to complete the internal test;
2) Node software adds on-chain data compression and encrypted storage, and increases data distributed storage mechanism support;
3) Improve the certificate system management tool to support encrypted…
Cryptography technology is the cornerstone of information technology. Blockchain uses a lot of technological achievements of modern information security and cryptography, mainly including: hash algorithm, symmetric encryption, asymmetric encryption, digital signature, digital certificate and so on. …