Current location - Quotes Website - Personality signature - The encryption technology of blockchain is as follows
The encryption technology of blockchain is as follows
1. First of all, encryption algorithms that introduce blockchain encryption techniques are generally divided into symmetric encryption and asymmetric encryption. Asymmetric encryption refers to the encryption technology integrated into the blockchain to meet the security requirements and ownership verification requirements. Asymmetric encryption usually uses two asymmetric passwords in the process of encryption and decryption, which are called public key and private key.

2. Cryptographic algorithms used in blockchain, such as hash algorithm, zero-knowledge proof, ring signature, etc. As the basic technology of blockchain, the essence of hash function is to map a group of data with arbitrary length (limited) to a group of data streams with defined length.

3. Blockchain cryptography includes Bloom filter, hash function, encryption and decryption algorithm, digital certificate and digital signature, homomorphic encryption, PKI system, etc.

4. At present, many classical algorithms of modern cryptography are used in the application of blockchain, including hash algorithm, symmetric encryption, asymmetric encryption and digital signature. The third is distributed storage. Blockchain is a distributed account book on peer-to-peer network, and each participating node will independently and completely store the data information written into the block.