当前位置:网站首页>Prevention strategy of Chang'an chain Shuanghua transaction
Prevention strategy of Chang'an chain Shuanghua transaction
2022-07-25 06:25:00 【Handsome Wutong】
What is double flower transaction
That is, a sum of money is spent twice or more , Also called “ Double pay ”. In the digital money system , Due to the replicability of data , This makes it possible that the same digital asset may be reused due to improper operation .
How to solve bitcoin “ Two flowers ” problem
Bitcoin as a decentralized point-to-point e-cash system , It mainly depends on the transaction output that is not spent (unspend transaction output, UTXO) And timestamp “ Two flowers ” problem .
The system uses digital timestamp to ensure that each block is connected into a blockchain in chronological order , The timestamp also marks the time of every data on the blockchain .
Suppose Xiao Ming will exist in himself UTXO Medium 1 individual BTC At the same time, transfer money to Li Lei and Han Meimei , Only one of the two transactions will be successfully completed . Why? ? Because the node in the system will selectively record the transaction received first . When two transactions are recorded by the same node at the same time , According to the timestamp data , Only the transactions recorded first can be confirmed to be successful .
If Xiao Ming's two transfers are very, very close ,“ Xiao Ming is in 12 spot 34 branch 56 Seconds to Li Lei 1 Bitcoin ”、“ Xiao Ming is in 12 spot 34 branch 57 Second to Hanmeimei 1 Bitcoin ” It happens to be recorded by two different nodes , There will be “ Two flowers ” Do you ? Not even . These two nodes will broadcast their respective blocks containing related transactions to the bitcoin network at the same time , At this point, the blockchain will fork , The remaining nodes choose to build new blocks on what they think is the longest chain . Last , Take the lead in building a new block and become the transaction on the longest chain ( Usually it is 6 Block ), Can be confirmed to be successful . All subsequent nodes will build new blocks on this longest chain .
To sum up , face “ Double flower problem ”, Bitcoin cash system is solved in this way :
First , Each transaction must first confirm the situation before the corresponding bitcoin , Check whether it exists in Xiaoming's UTXO in . If not , Then the transaction will be rejected by the system .
If Xiao Ming uses the same pen UTXO Pay Li Lei and Han Meimei , The node in the system only confirms the one received first .
边栏推荐
- The code spell checker plug-in avoids some specific vocabulary errors "XXX": unknown word.cspell
- “font/woff“ and “font/woff2“ in file “mime.types“
- SAP FICO section III BDC and ltmc import S4 financial account
- node.express中req.body总是undefind解决
- 函数模板学习记录
- 【datawhale202207】强化学习:策略梯度和近端策略优化
- Data too long for column 'data' at row 1 and the garbled code caused by setting to longblob are solved. node-mysql
- C#控件开源库:MetroFramework的下载
- Koa2 learning
- Android interview question: why do activities rebuild ViewModel and still exist—— Jetpack series (3)
猜你喜欢
![[datawhale202207] reinforcement learning: strategy gradient and near end strategy optimization](/img/4e/aabc603e47977503a4bcc5d07b4c61.png)
[datawhale202207] reinforcement learning: strategy gradient and near end strategy optimization
![[ultra detailed diagram] FPN + mask RCNN](/img/ef/ddd62fe7e54074c134aa5ee4cc5840.png)
[ultra detailed diagram] FPN + mask RCNN

Daily question brushing record (XXVIII)

10. Rendering Basics

Req.body in node.express is always undefind

VO, dto, do, Po distinction and use
![[C language] program environment and preprocessing](/img/d6/d59a0d8d286ea9408043d8ad1e1348.png)
[C language] program environment and preprocessing
![[jailhouse article] base architectures for virtual physical computing (2018)](/img/ea/480d3e0743639d2f2e0d447b3ca050.png)
[jailhouse article] base architectures for virtual physical computing (2018)

The code spell checker plug-in avoids some specific vocabulary errors "XXX": unknown word.cspell
![[datawhale202207] reinforcement learning: the foundation of reinforcement learning](/img/1e/6ba657da14508854207aac51992ad8.png)
[datawhale202207] reinforcement learning: the foundation of reinforcement learning
随机推荐
Classic cases of static keywords and block blocks
日期(DAY 76)
MySQL queries the table name under the current database
【datawhale202207】强化学习:强化学习基础
Some interview questions collected
VB variable types and control statements (basic)
Seekbar属性参考
Qunhui NPV Suite (NPV server) Download
[datawhale202207] reinforcement learning: the foundation of reinforcement learning
你了解PowerBI中的去年同期吗
When the graduation season comes, are you ready? What are we going to do
What projects can make money online? Is it reliable to be we media?
Interlocked atom access series of functions
The macro definition of embedded C language development and the skills of finding the maximum value of two numbers
[C language] document processing and operation
The code spell checker plug-in avoids some specific vocabulary errors "XXX": unknown word.cspell
“font/woff“ and “font/woff2“ in file “mime.types“
Seekbar attribute reference
Tutorial: encryption keys in cloud (using golang and CLI)
DOM event type