AI文章摘要

正在生成摘要...
正在生成评分...

While digital signatures offer some solutions, the main benefits of electronic payments are offset when a trusted third party is still needed to prevent double-spending. We propose a solution that uses a peer-to-peer network to solve the problem of double spending. The peer-to-peer network will timestamp each transaction by entering the hashed data of the transaction into an extending, hash-based proof-of-work chain that is impossible to change without a complete redo. The longest chain is used to prove the events that have been witnessed and their order, and on the other hand, to prove that it comes from the largest pool of CPU hashpower. As long as the vast majority of CPU computing power is controlled by benign nodes – that is, they don't cooperate with those who try to attack the network – then benign nodes will generate the longest chain and outpace attackers. The network itself needs a minimal structure. Information will be disseminated on the basis of best efforts, and nodes will come and go freely; However, when joining, it is always necessary to accept the longest chain of proof-of-work as proof of everything that happened during the period in which they were not involved.

Mirror文章信息

Mirror原文:查看原文

作者地址:0x356170ce4D830672dc5d066b794ba8D8E80e97a8

内容类型:application/json

应用名称:MirrorXYZ

内容摘要:s9DFfo8hlD_Km5I_pBEImjALXZVl6cokLCbri16Rvcg

原始内容摘要:rUw8AbyePYfnMqskH1z0RNeinvyfJiLlUF68IrM9UY4

区块高度:1538082

发布时间:2024-10-31 07:50:22