Breaking News

Than the original chain technology notes: how to create a world-class security blockchain platform

"The original chain is a multi-bit asset interactive protocol that operates on different forms of heterogeneous bit-assets (native digital currencies, digital assets) and atomic assets (with the traditional physical world Counterparts' warrants, equities, dividends, bonds, intelligence information, forecasting information, etc.) can register, exchange, bet, and contract-based more complex interactions through this agreement "

Than the original application scenarios

Positioning than the original chain design is a decentralized asset interaction protocol, in which users can use smart contracts to manage / invest their assets over the original chain. Unlimited than the original chain of applications, such as the following few examples.

Can be without credit endorsement C2C currency trading tools: blockchain investors at this stage if you want to make a currency transaction, you must pass a third-party intermediaries. The advantage over the original is that atomized currency transactions can be done on the chain.

It can be a guarantee that the agreement in the forecasted market will be executed fairly: a protocol is written into a smart contract more than the original chain, and automatically executed as it expires without the need for a third party to intervene in order to stop the black-box operation.

Can be the manager of the company's allocation of options: the company's options to blockchain management, options and incentives to rely on smart contracts to achieve.

It can be seen from the above, than the original chain management assets are very valuable, so the need to design a safe and stable system.

Chain certification to ensure that assets can not be faked

Than the original chain is a dedicated asset management chain, so it allows anyone to issue their own assets above. This brings with it an unavoidable question: How is the authenticity of so many assets protected? To solve this problem, " ODIN " (Open Data Index Name) was introduced over the original chain to provide "blockchain CA certification" to trusted companies / individuals, and the company that got the root certification possesses the capability of self-certification , You can do two or more levels of asset verification for your company's assets. In this way you can guarantee the uniqueness of the entire network of assets, even in the cross-chain scenario.

Contract fault isolation

On November 7, a developer called devops199 triggered an Ethereum parity wallet vulnerability that frozen 511,700 Ethernetes to this day. The mistake is not Parity wallet, loopholes in the wallet called a library (Ethereum's underlying library functions, can be understood as public contracts). Because Ethereum's contract call is to use the address as a pointer, every execution of the user-written smart contract call library. "Devops199" at the same time destroy the underlying library functions at the same time destroyed all the pointers to contracts, so that all wallet funds are permanently frozen, can only look forward to the future of the hard fork to solve this problem.

Design thinking than the original chain is actually closer to bitcoin, that is, everything is based on UTXO (Unspend Transaction Out). Each of the original assets UTXO than the original chain are Turing complete smart contract. Compared with the original contract, the call contract is added as a subcontract when the smart contract is created. Afterwards, the smart contract will not be affected regardless of whether the invoked contract template is changed or not loosed.

Privacy design than the original chain

Pyramid-level control over the original chain ensures user privacy is protected. Each user with a ratio of the original chain can have N private keys, and different combinations of private keys can generate different accounts.

As shown in the figure above, each account may be controlled by a private key of a user, which may be controlled by more than one private key from one user, or may be controlled by a private key of a different user. Under each account, there are N different smart contracts. The relationship between contracts and accounts is somewhat similar to the relationship between private and public keys.

In the design than the original chain account only resides in the local, the only chain is a smart contract, and each transaction will automatically generate a new smart contract. Such a design guarantees a tree-like distribution rather than a circular relationship over all assets traded on the original chain. This means that no one can derive a better privacy experience than the relationship network in the original world through the relationship between transactional behaviors.

Invisible contract design

No one must be sure that the smart contract written is foolproof, such as being hacked, privacy issues, the agreement on the gambling was leaked ahead of time. Than the original chain for this proposed "invisible contract" concept, can be seen without the contract the specific content of the case automatically. That is, users write a contract after the contract after a hash, and then use the contract's hash to lock an asset, you need to unlock the asset when the smart contract open.

To sum up

Than the original design chain does not like Ethereum covers all aspects of the complex functions, we only focus on building the best asset management blockchain. The design of smart contracts is also targeted at simplicity and ease of use, as the more complex the system, the easier it is for a BUG. Although our trading designs are based on UTXO like Bitcoin, we not only support an unlimited number of assets but also Turing complete smart contracts. Through the collection of director of Wanjia, thus providing a business-class security blockchain platform.