供應鏈與區塊鏈的區別(《區塊鏈下供應鏈企業知識共享研究》——2.1區塊鏈的相關概念)
分享興趣,傳播快樂,增長見聞,留下美好!親愛的您,這里是LearningYard學苑。
今天走進論文欄目為大家帶來:《區塊鏈環境下供應鏈企業知識共享影響因素研究》——2.1區塊鏈的相關概念,歡迎您的用心訪問!本期推文時長大約4分鐘,請您耐心閱讀。
Share interest, spread happiness, increase knowledge, and leave beautiful. Dear, this is the Learing Yard Academy!
Today, enter the thesis column brings you the paper: Research on Influential Factors of Supply Chain Enterprise Knowledge Sharing in Blockchain Environment—— 2.1 Blockchain related concepts. Welcome to visit! This tweet usually takes about 4 minutes to read. Please read patiently.
本期推文將從思維導圖、精讀內容、知識補充三個方面進行精讀分享。
This tweet will share intensive reading from three aspects: mind map, intensive reading content and knowledge supplement.
思維導圖|
精讀內容|
區塊鏈相關概念這一部分對區塊鏈的定義、特點描述的非常清楚,還對區塊鏈技術的應用領域進行了拓展介紹。讀完這一部分大致能夠了解區塊鏈的相關信息,也方便了后文的閱讀。
In this part, the definition and characteristics of block chain are clearly described, and the application field of block chain technology is expanded and introduced. After reading this part, we can generally understand the relevant information of blockchain, and also facilitate the reading of the following article.
知識補充|
在閱讀過程中,遇到了幾個不太熟悉的詞語,讓我們一起來了解一下吧!
In the process of reading, encountered a few unfamiliar words, let's get to know!
對稱加密
Symmetric encryption algorithm is an early encryption algorithm with mature technology. In the symmetric encryption algorithm, the sender of data transforms the plaintext (original data) and encryption key into complex encrypted ciphertext after they are processed by a special encryption algorithm. If the recipient wants to decode the ciphertext after receiving it, it needs to use the used encryption key and the inverse algorithm of the same algorithm to decrypt the ciphertext to restore it to legible plaintext. In symmetric encryption algorithms, only one key is used. Both sender and receiver use this key to encrypt and decrypt data. Therefore, the decryptor must know the encryption key in advance.
非對稱加密
Unlike symmetric encryption algorithms, asymmetric encryption algorithms require two keys: the public key and the private key. The public key and the private key are a pair. If the public key is used to encrypt data, only the corresponding private key can be used to decrypt the data. If data is encrypted with a private key, it can only be decrypted with the corresponding public key. This algorithm is called asymmetric encryption because two different keys are used for encryption and decryption.
比特幣
Bitcoin is not a real currency, but a digital currency created through Internet technology.
There are 21 million bitcoins in the world, a fixed total that moves from one owner to another through online transactions, with the price rising or falling in response to repeated transactions.
Bitcoin has the characteristics of decentralization, globalization, anonymity and so on. It is very simple to transact globally, with very low cost and strong liquidity.
Decentralization:
When a user makes a Bitcoin transaction, : the selling user will transfer the Bitcoin in his account to the buyer, and the corresponding amount of Bitcoin will be added to the buyer's account. The whole transaction is completed online, without face-to-face delivery.
When the transfer of Bitcoin is completed, all nodes will know that the transaction has taken place between the buyer and seller, and this data will be saved in each node, which is the decentralization of bitcoin. That's the simplest way to describe how bitcoin works, and it's actually quite complicated.
Globalization:
All transactions of Bitcoin are completed online and do not need to be conducted through offline physical outlets. Therefore, the transactions of Bitcoin will not be limited by national borders. As long as the Bitcoin exchange platform, Bitcoin transactions can be realized in all parts of the world.
Anonymity:
The transaction of Bitcoin is purely online, and the buyers and sellers do not need to carry out real-name authentication during the transaction process. They can trade Bitcoin by logging in the Bitcoin exchange website. Therefore, the transaction of Bitcoin is characterized by anonymity.
Because of the anonymity of Bitcoin, many people transfer their wealth to Bitcoin. Because Bitcoin does not have a real name, it is impossible to verify the ultimate ownership of Bitcoin.
數字貨幣
Digital money is an alternative to electronic money forms that can be used for real goods and services transactions.
Digital currency has the main characteristics of a network packet. Such a packet consists of a data code, which is what needs to be sent, and an identifier, which specifies attributes such as where the packet is coming from and where it is going.
Electronic money and virtual money are collectively referred to as digital money. According to the definition of the European Central Bank, virtual currency is issued by non-central bank credit institutions, electronic money institutions, and in some cases can be used as a digital representation of the value of a monetary substitute.
哈希(Hash)值
A HASH value is a hash value that maps a long piece of data to a short piece of data using certain hash algorithms (such as MD5 and SHA-1). The small piece of data is the hash value of the big piece of data. It is a set of binary values obtained by encrypting the contents of a file. It is used for file verification or signature. Because of this, it is often used to determine whether two files are the same.
For example, to download a file from the network, as long as the original hash value of this file is compared with the hash value of the downloaded file, if the same, it means that the two files are exactly the same, the download process did not damage the file. If not, the downloaded file is different from the original file, and the file is damaged during the download process.
It's the only one, and as soon as the big data changes, even a small change, its hash will change.
Merkle樹
Merkle tree is a hash binary tree. It is a kind of data structure used for fast induction and verification of large-scale data integrity. This binary tree contains encrypted hashes. The term "tree" is often used in computer science to describe a data structure with branches.
In the Bitcoin network, Merkle tree is used to summarize all the transactions in a block, generate the digital fingerprint of the whole transaction set, and provide an efficient way to verify the existence of a certain transaction in the block.
Generating a complete Merkle tree requires recursively hashing pairs of hash nodes and inserting the newly generated hash nodes into the Merkle tree until there is only one hash node left, which is the root of the Merkle tree. The SHA256 algorithm is used twice in Bitcoin's Merkle tree, so its encrypted hash algorithm is also known as double-SHA256.
END
今天的分享就到這里了,如果您對文章有獨特的想法,歡迎給我們留言。讓我們相約明天,祝您今天過得開心快樂!
That's all for today's sharing. If you have a unique idea about the article, please leave us a message, and let us meet tomorrow. I wish you a nice day!
參考資料:Deepl翻譯、CSDN、百度
參考文獻:
柴毅. 區塊鏈環境下供應鏈企業知識共享影響因素研究[D].吉林:吉林大學,2022.
https://blog.csdn.net/qq_40452317/article/details/90482721
https://wenda.so.com/q/1462136082722454
本文由LearningYard學苑整理并發出,如有侵權請在后臺留言溝通!