Block
Chặn
Network & Protocol
47 references
Một loạt dữ liệu (thường là giao dịch) được thêm vào chuỗi khối dưới dạng một đơn vị. Các khối được liên kết bằng cách đưa hàm băm của khối trước đó vào tiêu đề khối.
Xuất hiện trong 47 phần whitepaper
$BTC
Bitcoin
Timestamp Server
... begins with a timestamp server. A timestamp server works by taking a hash of a block of items to be timestamped and widely publishing the hash, such as in a newspap...
Proof-of-Work
...imestamp network, we implement the proof-of-work by incrementing a nonce in the block until a value is found that gives the block's hash the required zero bits. Once...
Network
...tions are broadcast to all nodes.
2. Each node collects new transactions into a block.
3. Each node works on finding a difficult proof-of-work for its block.
4. When...
Incentive
By convention, the first transaction in a block is a special transaction that starts a new coin owned by the creator of the blo...
Reclaiming Disk Space
...it can be discarded to save disk space. To facilitate this without breaking the block's hash, transactions are hashed in a Merkle Tree [^7] [^2] [^5], with only the ...
Simplified Payment Verification
...ts without running a full network node. A user only needs to keep a copy of the block headers of the longest proof-of-work chain, which he can get by querying networ...
Calculations
... accept an invalid transaction as payment, and honest nodes will never accept a block containing them. An attacker can only try to change one of his own transactions...
$ETH
Ethereum
Mining
...of transactions called "blocks." The network is intended to produce roughly one block every ten minutes, with each block containing a timestamp, a nonce, a reference...
Merkle Trees
...o children, recursively building up to a single root hash that is stored in the block header. This hierarchical structure allows anyone to verify that a specific tra...
Code Execution
...address, the amount of ether sent, the data payload provided by the caller, and block-level properties like the current block number, timestamp, and miner address. T...
Blockchain and Mining
...list, Ethereum stores both the transaction list and the most recent state. Each block in Ethereum contains the previous block's hash, a state root (the root hash of ...
Token Systems
...nance rights. This flexibility has made token systems the foundational building block for much of the Ethereum ecosystem.
Miscellanea And Concerns
... for uncle inclusion and rewards. Uncles must be direct children of the current block's ancestor (between 2 and 7 generations back), must be valid block headers, mus...
References and Further Reading
...ribed in a 2013 cryptography paper, addresses security issues arising from fast block times and forms the basis for Ethereum's consensus mechanism. These references ...
$USDT
Tether
Technology Stack
...ers can verify tether transactions using the same infrastructure -- full nodes, block explorers, SPV wallets -- that they use for Bitcoin itself.
The second layer i...
Process of Tethering
...dded in a standard Bitcoin transaction and is recorded permanently in a Bitcoin block. The newly created tokens are then transferred to the user's Bitcoin address vi...
Proof of Reserves
...Layer Protocol. Anyone running an Omni Layer-compatible node, or using a public block explorer that supports Omni Layer tokens, can query the exact number of tethers...
Advantages
...ent methods. A tether transfer settles in approximately 10 minutes (one Bitcoin block confirmation) regardless of the geographic distance between sender and receiver...
Challenges and Risks
...kchain impose constraints on Tether's scalability and cost structure. Bitcoin's block size limits transaction throughput to approximately seven transactions per seco...
$XRP
XRP
Introduction
...mputationally expensive cryptographic puzzles, and the winner proposes the next block of transactions. While this approach elegantly solves the double-spending probl...
Existing Consensus Algorithms
...56 hash puzzles, and the first miner to find a valid solution proposes the next block. The difficulty of the puzzle is adjusted dynamically so that the network produ...
$SOL
Solana
Introduction
...rages PoH as a global clock, enabling a pipeline of optimizations: leader-based block production with predetermined schedules, streaming block propagation, GPU-accel...
Outline
...ign of Solana, including the leader rotation mechanism, the data plane used for block propagation, and the transaction forwarding protocol that eliminates the need f...
Network Design
...ests transactions from clients, orders them into the PoH stream, and produces a block that is streamed to the rest of the network. At the end of its slot, the next l...
Proof of Stake Consensus
...lementing exponentially increasing lockout periods. When a validator votes on a block at a specific PoH slot, it commits to that fork of the ledger. Each consecutive...
Streaming Proof of Replication
...ng another validator's encrypted data.
The encryption process uses CBC (Cipher Block Chaining) mode, where each encrypted block depends on the plaintext of the curr...
System Architecture
...counts are stored in separate memory regions, so accessing one account does not block access to another. This architecture ensures that the state storage layer does ...
Performance
...is number rises to approximately 5 million transactions per second. The Turbine block propagation protocol ensures that the network's aggregate bandwidth is utilized...
Conclusion
...simple confirmation step. This separation enables a pipeline architecture where block production, propagation, signature verification, and transaction execution all ...
$DOGE
Dogecoin
Abstract
... community. Built on the Scrypt proof-of-work algorithm, Dogecoin features fast block times, low transaction fees, and an inflationary monetary policy designed to en...
Introduction
...erate design choices that differentiated Dogecoin from its predecessors: faster block generation times, a more abundant coin supply, and a friendly, approachable bra...
Background
... design prioritized security and decentralization, resulting in relatively slow block generation times of approximately ten minutes and a deflationary monetary polic...
Technical Specifications
...guishing it from Bitcoin's purely computation-intensive SHA-256 algorithm.
The block generation target for Dogecoin is one minute, making it significantly faster th...
Monetary Policy
....
During its initial distribution phase, Dogecoin employed a unique randomized block reward system. From blocks 1 through 99,999, the reward for mining a block was ...
Network Architecture
...ctions and blocks across the network. When a node receives a new transaction or block, it validates it against the protocol rules and, if valid, relays it to its con...
Use Cases and Community
... cent, making it economically viable to send very small amounts. The one-minute block time provides reasonably fast confirmation for in-person transactions. The larg...
Development History
...lly Markus made modifications to customize the coin's parameters, including the block reward schedule, block time, and branding. The software was released as Dogecoi...
Conclusion
...rvice of the project's survival. The Scrypt proof-of-work algorithm, one-minute block time, and inflationary monetary policy combine to create a cryptocurrency that ...
$BCH
Bitcoin Cash
Abstract
...reated in response to Bitcoin's scaling limitations, Bitcoin Cash increased the block size limit to enable greater transaction throughput and lower fees, restoring t...
Introduction
...ntal constraint began to limit its utility as electronic cash. The one-megabyte block size limit, originally introduced as a temporary anti-spam measure, created an ...
Background: The Scaling Debate
...tralization, technical philosophy, and the very identity of Bitcoin.
Bitcoin's block size limit of one megabyte was introduced by Satoshi Nakamoto in 2010 as a temp...
The Fork
The Bitcoin Cash hard fork was executed on August 1, 2017, at block height 478,558. At that point, the Bitcoin blockchain split into two separate c...
Technical Specifications
... the secp256k1 elliptic curve for digital signatures, and the ten-minute target block interval. However, several key modifications differentiate it from the Bitcoin ...
Transaction Throughput and Scalability
...ng through larger blocks is the most reliable way to achieve this.
With a 32MB block size limit and a ten-minute block interval, Bitcoin Cash has a theoretical maxi...
Network Architecture
...dopted a new algorithm in November 2017 that adjusted difficulty based on a 144-block moving window.
In November 2020, Bitcoin Cash upgraded to the ASERT (Absolutel...
Monetary Policy
...e same issuance history and continues with the same future issuance rules.
The block reward started at 50 BCH per block (inherited from Bitcoin's genesis parameters...
Conclusion
... the original Bitcoin vision as peer-to-peer electronic cash. By increasing the block size limit and pursuing on-chain scaling, Bitcoin Cash has maintained the low f...