SlaughterMamaWarrior
vip

Popular science post



At first, the "Byzantine Fault Tolerance (BFT)" mechanism was used, similar to a meeting vote where more than two-thirds of the nodes must agree for it to count. Later, it was changed to the "Proof of Stake (PoS)" Typhon mechanism, allowing different chains to reach consensus independently, which is more efficient and orderly.

2⃣, Privacy Verification: Confidential Status Verification of Transactions

Using "multi-currency zero-knowledge transfer circuits" is like depositing money without revealing the amount, but the system can verify that you have funds to transfer. The multi-asset shielded pool acts like a confidential box, protecting transaction privacy while confirming validity.

3⃣、Node Reputation: Score and kick out bad elements

Create a 'reputation profile' for nodes and node groups, recording message processing speed and any disruptive behaviors. Those with low reputation will be directly expelled, and it can also detect if small groups are being attacked, forcing nodes to honestly maintain the network.

4⃣, Intent Matching: Automatic Matching for Transaction Verification

Users broadcast trade intentions (for example, "exchange 1 Bitcoin for 5 Ethereum"), and nodes act as intermediaries to check for matches. If a match is found, they are combined into a formal transaction and verified for compliance with the rules.
View Original
post-image
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Share
Comment
0/400
No comments
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate app
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)