-
Cryptocurrencies
-
Exchanges
-
Media
All languages
Cryptocurrencies
Exchanges
Media
Wisdom Chain is a basic public chain oriented to commercial applications. Its functional design revolves around asset definition, multi-signature, conditional payment and certificate storage. It is based on the design principles of stability, security and multi-party autonomy, in terms of performance, security and The open design of the system introduces a unique technology stack implementation. For a basic public chain, cryptographic technology, consensus mechanism, P2P network layer, ledger storage layer, and script system are the five core basic modules. Wisdom Chain has absorbed the advantages of predecessors in the design of these five modules. A lot of flaws and lessons, and in-depth research and innovation on the basis.
Safe and reliable
The public chain network is deployed on the Internet, with nodes all over the world, and thousands of users define and manage their own data assets on the chain. For a peer-to-peer network system, the security of technical design is very important. From the selection of cryptographic algorithm, the design of consensus mechanism, especially the design of script instruction system, Wisdom Chain focuses on the fair design of the network and the ability to resist various attacks that may occur. Safety and reliability are the cornerstone of the Wisdom Chain network.
In the core command system part, Wisdom Chain adopts an external trigger mechanism, uses rule templates to provide flexibility, and prevents vulnerability attacks in the process of command programming.
Low Latency
The data throughput capability and block generation rate of the public chain system are indicators that need to be considered comprehensively. The block size of Wisdom Chain is limited to 4M, and the block generation period is 10 seconds, which can provide a full network full load of 1400 TPS processing capacity. Balanced consideration of the performance requirements of block data broadcast in an asynchronous network environment, while also reducing the orphan block rate and the probability of temporary forks as much as possible.
Fork Resistance
Fork is a typical problem in the public chain system. For a purely competitive consensus network, fork is relatively easy to trigger. For users, the occurrence of a fork means that the assets on the chain may have a potential risk of loss, and the stability of the network will also be challenged. Wisdom Chain mixes DPoS and PoW mechanisms. Miner nodes need to pay basic computing power costs to generate blocks, and at the same time need to enter the top 15 voting rankings. Unless more than 2/3 of the nodes perform forks at the same time, it is difficult for individual nodes Initiated a network fork. If more than 2/3 of the nodes initiate a fork, the network is still stable, because the stability of the network is determined by the majority of nodes.
Low threshold
The public chain is open to the public and generally does not have a special identity authentication mechanism. The threshold for its use is mainly reflected in two aspects:
I. Miner's handling fee
br> II. Difficulty in using the function
The minimum handling fee for issuing transactions on Wisdom Chain is only 0.002 WDC, which is almost negligible. For various functions on the chain, users can also call them through a very direct interface. With the support of interface tools, operations such as asset definition and multi-signature do not even require programming skills, thus greatly improving Lowered the barriers to use for ordinary users.
Low cost
The low cost of Wisdom Chain is not only in the entry-level handling fee, but also in the node deployment cost. The recommended hardware requirements for deploying a Wisdom Chain full node It is: 1), 8-core CPU, 16G memory
2), network bandwidth of 100M and above
Whether it is an ordinary full node or a miner node, no special hardware configuration is required. The unique consensus mechanism can also avoid the problem of mining centralization caused by the monopoly of computing power brought by high-performance mining machines, so that ordinary users have the opportunity to participate in becoming network nodes and miner nodes.
Ledger storage
For the processing of the ledger storage layer, it combines the KV structure of block storage and the advantages of relational data storage, and can quickly send binary serialized transactions when synchronizing data between nodes and blocks, while relational queries improve processing performance when doing retrieval queries. When performing continuous and fast data reading and writing, optimize the processing of read-write locks and indexes to ensure that the stability and performance of synchronization reach a balance point.
Script system
The design of the script system is a major feature of Wisdom Chain. It is neither a purely fixed reverse Polish expression instruction structure nor a simple migration of a Turing-complete programming environment. . The former function is too fixed and rigid, and the latter lacks security. Wisdom Chain uses a specially designed verifiable rule programming engine. It uses a fixed instruction structure for built-in WDC forwarding, voting, mortgage and deposit; it uses rule programming for asset definition, multi-signature and conditional payment.
Aggregate Signature
Signature arrays are required in multi-signature situations. The array format needs to process the order of signatures. Wisdom Chain does not care about the order of signatures. Aggregated signatures are an appropriate solution when dealing with multiple signatures.
Polynomial hiding
This is Wisdom Chain's implementation of zero-knowledge proof, which is based on the hiding of polynomial calculations. In the Wisdom Chain, the traceability relationship between each transaction can always be queried, and then when it is necessary to hide the amount or the result of some expressions, it can be efficiently realized by elliptic line addition and homomorphic hiding.
Privacy group
Privacy group is a kind of fair protection for Wisdom Chain to participate in collective affairs, such as voting activities. Voters may not want to let others know who they voted for. Or I don't want other people to know who else they voted for. Then you can create a privacy group, put several account addresses in the group, and define the behavior range of the group. As long as the transaction action initiated by the address in the group, it will be blurred into the identity of the "group". For the actions inside the "group", the verifier only needs to know whether the collective concept of "group" is legal, and does not need to go Verify a specific member, so that the behavior of group members can be prevented from being exposed.