| |
|
开发:
C++知识库
Java知识库
JavaScript
Python
PHP知识库
人工智能
区块链
大数据
移动开发
嵌入式
开发工具
数据结构与算法
开发测试
游戏开发
网络协议
系统运维
教程: HTML教程 CSS教程 JavaScript教程 Go语言教程 JQuery教程 VUE教程 VUE3教程 Bootstrap教程 SQL数据库教程 C语言教程 C++教程 Java教程 Python教程 Python3教程 C#教程 数码: 电脑 笔记本 显卡 显示器 固态硬盘 硬盘 耳机 手机 iphone vivo oppo 小米 华为 单反 装机 图拉丁 |
-> 区块链 -> 【1】比特币白皮书中英文对照翻译及解析 -> 正文阅读 |
|
[区块链]【1】比特币白皮书中英文对照翻译及解析 |
Bitcoin: A Peer-to-Peer Electronic Cash System 比特币:一个点对点的电子支付系统 本文提供比特币白皮书中英文逐句翻译及关键点解释,有兴趣的小伙伴可关注微信公众号:Candy链上笔记,后台回复001获取pdf文件下载链接。 目录 7、Reclaiming Disk Space -回收磁盘空间 8、Simplified Payment Verification-简化的支付验证 9、Combining and Splitting Value-合并和分割交易额 Abstract-摘要摘要 A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution. Digital signatures provide part of the solution, but the main benefits are lost if a trusted third party is still required to prevent double-spending. We propose a solution to the double-spending problem using a peer-to-peer network.The network timestamps transactions by hashing them into an ongoing chain of hash-based proof-of-work, forming a record that cannot be changed without redoing the proof-of-work. The longest chain not only serves as proof of the sequence of events witnessed, but proof that it came from the largest pool of CPU power. As long as a majority of CPU power is controlled by nodes that are not cooperating to attack the network, they'll generate the longest chain and outpace attackers. The network itself requires minimal structure. Messages are broadcast on a best effort basis, and nodes can leave and rejoin the network at will, accepting the longest proof-of-work chain as proof of what happened while they were gone. 1. A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution. 一个真正的点对点的电子货币应该是允许其中一方不经过任何第三方金融机构,直接在线支付给另外一方。 electronic cash:电子货币 2. Digital signatures provide part of the solution, but the main benefits are lost if a trusted third party is still required to prevent double-spending. 数字签名提供了部分的解决方案,但是为了防止双重支付(双花),仍旧需要一个可信的第三方,可是如果采取这种方案,电子货币最大的优势就丧失了。 trust:信任,信赖;trusted:被信任的 3. We propose a solution to the double-spending problem using a peer-to-peer network. 针对双重支付问题,我们提出了一种点对点的网络的解决方案。 4. The network timestamps transactions by hashing them into an ongoing chain of hash-based proof-of-work, forming a record that cannot be changed without redoing the proof-of-work. 该网络通过将交易哈希进一条持续增长的基于哈希的工作量证明链,来给交易打上时间戳,从而形成一条除非重做工作量证明否则就无法改变的记录。 timestamps:时间戳 redoing the proof-of-work:重做工作量证明 5. The longest chain not only serves as proof of the sequence of events witnessed, but proof that it came from the largest pool of CPU power. 最长的链不仅可作为见证序列事件的证据,而且是它来源于最大CPU算力池的证据。 serve:招待,供应;为…服务;对…有用;可作…用 6. As long as a majority of CPU power is controlled by nodes that are not cooperating to attack the network, they'll generate the longest chain and outpace attackers. 只要大部分的CPU算力被被一些不打算联合去攻击网络的节点控制,,那么这些节点就能生成最长的链并且超过攻击者。 cooperate:合作,协力,配合;generate:产生,引发,生成;outpace:超过,赶超......速度 attackers:进攻者,攻击者 7. The network itself requires minimal structure. 这个点对点网络本身需要一个极简的架构 minimal:最低的,最小限度的; 8. Messages are broadcast on a best effort basis, and nodes can leave and rejoin the network at will, accepting the longest proof-of-work chain as proof of what happened while they were gone. 在点对点网络里面,信息将最大限度地被传播,并且节点可以随意离开或加入网络,只需接受最长的工作量证明链作为他们离开时事件发生的证据。 1、Introduction-简介
Commerce on the Internet has come to rely almost exclusively on financial institutions serving as trusted third parties to process electronic payments. While the system works well enough for most transactions, it still suffers from the inherent weaknesses of the trust based model. 1. Commerce on the Internet has come to rely almost exclusively on financial institutions serving as trusted third parties to process electronic payments. 互联网上的贸易已经变得完全依靠可信的第三方金融机构来处理电子支付。 commerce:贸易,商业,商务;exclusively:唯一地,专有的;process:加工,审核,处理rely:依靠,rely on ; have come to:已经; 2. While the system works well enough for most transactions, it still suffers from the inherent weaknesses of the trust based model. 尽管对于大部分交易这种系统运行的足够好了,但是它依旧存在基于信任模型这个与生俱来的缺点。 inherent: 固有的;内在的;与生俱来的,遗传的; 3. Completely non-reversible transactions are not really possible, since financial institutions cannot avoid mediating disputes. 由于金融机构无法避免调节争端,因此完全不可撤销的交易是不存在的。 reversible:可逆的;可撤消的;可反转的;mediate:调解;斡旋;居中;dispute:辩论;争吵;意见不同 4. The cost of mediation increases transaction costs, limiting the minimum practical transaction size and cutting off the possibility for small casual transactions, and there is a broader cost in the loss of ability to make non-reversible payments for nonreversible services. 仲裁成本增加了交易成本,因此限制日常交易额度从而切断日常小额交易,由于支持不可撤销支付的能力的丧失,因此进行不可撤销的服务支付时,需要更大的成本。 the cost of mediation:仲裁成本;cut off:切断,中断;small casual transactions:日常小额交易; 5. With the possibility of reversal, the need for trust spreads. 由于交易存在被撤销的可能性,因此对于信任的需求将更加广泛。 reversal:逆转 6. Merchants must be wary of their customers, hassling them for more information than they would otherwise need. 商人们必须更加警惕他们的客户,向客户询问更多他们本不需要的信息。 Merchant:商人,批发商;be wary of:提防,当心;hassle:与......争辩 7. A certain percentage of fraud is accepted as unavoidable. 一定比例的欺诈被认为是无法避免的。 fraud: 欺骗;骗子;诡计; unavoidable 8. These costs and payment uncertainties can be avoided in person by using physical currency, but no mechanism exists to make payments over a communications channel without a trusted party. 虽然这些成本和支付的不确定性可以通过使用物理货币当面支付被避免,但是不存在不引入一个可信任方而能在通信通道上进行支付的机制 。 in person:亲自;currency:货币,通货;mechanism:机制;原理,途径;进程;机械装置;技巧 What is needed is an electronic payment system based on cryptographic proof instead of trust,allowing any two willing parties to transact directly with each other without the need for a trusted third party. Transactions that are computationally impractical to reverse would protect sellers from fraud, and routine escrow mechanisms could easily be implemented to protect buyers. In this paper, we propose a solution to the double-spending problem using a peer-to-peer distributed timestamp server to generate computational proof of the chronological order of transactions. The system is secure as long as honest nodes collectively control more CPU power than any cooperating group of attacker nodes. 1. What is needed is an electronic payment system based on cryptographic proof instead of trust, allowing any two willing parties to transact directly with each other without the need for a trusted third party. 因此我们需要的是一个基于密码验证的而不是信任的电子支付系统,该系统允许任何有交易意愿的双方可以不经过可信的第三方直接交易。 cryptographic:密码的;cryptographic proof:密码验证; 2. Transactions that are computationally impractical to reverse would protect sellers 交易在计算上的不可逆转性将保护卖家不被欺骗,常规托管机制也应该能很容易地被实现来保护买家的权益。 computationally:计算地;impractical:不切实际的,不现实的;不能实行的;escrow:暂由第三者保存的契据;暂交第三方保管的保证金(或款项);暂由第三方保管 3. In this paper, we propose a solution to the double-spending problem using a peer-to-peer distributed timestamp server to generate computational proof of the chronological order of transactions. 为解决双重支付问题,本文提出了一种使用点对点的分布式邮箱服务来生成计算证明,这个计算证明是基于时间序列发生的交易。 4. The system is secure as long as honest nodes collectively control more CPU power than any cooperating group of attacker nodes. 只要诚实节点控制的CPU算力大于任何合作的攻击节点,那么这个系统就是安全的。 collectively:集体地,共同地 2、Transactions-交易2、交易 We define an electronic coin as a chain of digital signatures. Each owner transfers the coin to the next by digitally signing a hash of the previous transaction and the public key of the next owner and adding these to the end of the coin. A payee can verify the signatures to verify the chain of ownership. 1. We define an electronic coin as a chain of digital signatures. 我们定义一条链上的数字签名就是一个电子货币。 2. Each owner transfers the coin to the next by digitally signing a hash of the previous transaction and the public key of the next owner and adding these to the end of the coin. 通过对上一次交易和下一个货币拥有者的公钥的哈希值进行数字签名,并且将这些签名添加到货币的最后,每一个货币的拥有者通过这种方式将货币转移给下一个拥有者。 【分析】 本段的重点:Each owner transfers the coin to the next by + doing是做整个句子的状语从句,那么我们来分析状语从句的结构。 状语从句中: digitally signing ......and adding......是并列关系,by digitally signing......,by adding....... by digitally signing a hash of the previous transaction and the public key of the next owner and adding these to the end of the coin. 3. A payee can verify the signatures to verify the chain of ownership. 每一个收款方都可以通过验证数字签名来验证该链的拥有者。 payee:领款人,收款人 The problem of course is the payee can't verify that one of the owners did not double-spend 1. The problem of course is the payee can't verify that one of the owners did not double-spend the coin. 这个过程中唯一的问题是收款人无法确认任何一个收款者有没有对电子货币进行双重支付。 course:科目;课程;过程;进程;道路;路线,航向;一道菜 2. A common solution is to introduce a trusted central authority, or mint, that checks every transaction for double spending. 通常的解决办法是通过引入一个可信的中央权威机构或者造币厂来验证每笔交易是否进行了双重支付。 authority :n. 权威;权力;当局 ; mint:薄荷;[金融] 造币厂,巨款 3. After each transaction, the coin must be returned to the mint to issue a new coin, and only coins issued directly from the mint are trusted not to be double-spent. 在每笔交易之后,这枚货币必须被返回造币厂用来发行一个新的货币,并且只有从造币厂直接发行的货币才能保证没有被双重支付。 4. The problem with this solution is that the fate of the entire money system depends on the company running the mint, with every transaction having to go through them, just like a bank. 这种解决方案的问题在于,整个货币体系的命运依赖于运营造币厂的公司,因为每笔交易都需要经过他们,就像银行一样。 the fate of .......:......的命运;entire:整个,全部的; We need a way for the payee to know that the previous owners did not sign any earlier 1. We need a way for the payee to know that the previous owners did not sign any earlier 我们需要一种能让领款人知道前一个拥有者没有对更早期的交易签名的方法。 2. For our purposes, the earliest transaction is the one that counts, so we don't care 对我们来说,最早的交易是唯一的,因此我们不关心本次交易之后的双重支付尝试。 3. The only way to confirm the absence of a transaction is to be aware of all transactions. 唯一能确认一笔交易不存在的方法是知晓之前所有的交易。 4. In the mint based model, the mint was aware of all transactions and decided which arrived first. 在基于造币厂的模型里面,造币厂是清楚所有交易的,并且能决定哪一笔交易首先到达。 5. To accomplish this without a trusted party, transactions must be publicly announced , and we need a system for participants to agree on a single history of the order in which they were received. 为了在没有可信方的前提下实现这种模型,所有的交易必须公开发布,并且我们需要一个能让所有参与者对交易收到顺序的单一历史达成共识的系统。 participant:参与者 6. The payee needs proof that at the time of each transaction, the majority of nodes agreed it was the first received. 收款人在每笔交易时,都需要多数节点认同此交易是最先收到的证据。
3、时间戳服务器
1. The solution we propose begins with a timestamp server. 我们提出的解决方案从一个时间戳服务器开始。 2. A timestamp server works by taking a hash of a block of items to be timestamped and widely publishing the hash, such as in a newspaper or Usenet post . 一个时间戳服务器的工作方式是,先通过求一组需要被打上时间戳的记录的哈希值,然后广泛地发布这些哈希值,就像在报纸或者新闻组里面一样。 Usenet:世界新闻组网络 3. The timestamp proves that the data must have existed at the time, obviously, in order to get into the hash. 显然,时间戳为了求出这些数据的哈希值,时间戳就能证明这些数据在当时一定是存在的。 4. Each timestamp includes the previous timestamp in its hash, forming a chain, with each additional timestamp reinforcing the ones before it. 在每一个时间戳的哈希里面,包含了前一个时间戳,进而形成了一条链,随着每一个额外的时间戳的增加都加强了它之前的时间戳。 reinforcing:加强;additional:额外地,附加地 4、Proof-of-Work-工作量证明4、工作量证明 To implement a distributed timestamp server on a peer-to-peer basis, we will need to use a proof-of-work system similar to Adam Back's Hashcash , rather than newspaper or Usenet posts. The proof-of-work involves scanning for a value that when hashed, such as with SHA-256, the hash begins with a number of zero bits. The average work required is exponential in the number of zero bits required and can be verified by executing a single hash. 1. To implement a distributed timestamp server on a peer-to-peer basis, we will need to use a proof-of-work system similar to Adam Back's Hashcash , rather than newspaper or Usenet posts. 为了实现一个基于点对点网络的分布式时间戳服务,我们需要一个类似Adam Back提出的哈希货币的工作量证明系统,而不是像报纸或新闻小组那样。 implement:实施,执行,实现;Adam Back:人名;Hashcash:哈希货币; 2. The proof-of-work involves scanning for a value that when hashed, such as with SHA-256, the hash begins with a number of zero bits. 工作量证明包含求一个数字,这个数字使得在求哈希时,例如用SHA-256算法,得到的哈希值是以一系列的0开始的。 3. The average work required is exponential in the number of zero bits required and can be verified by executing a single hash. 随着所需0比特的个数的增加,平均所需的工作量是呈指数增加的,然后验证工作量只需执行一次哈希。 exponential:指数的;execute:实行,执行,处死
1. For our timestamp network, we implement the proof-of-work by incrementing a nonce in the block until a value is found that gives the block's hash the required zero bits. 对于我们的时间戳网络,实现工作量证明的方式是,通过在区块中增加一个随机数,直到使区块的哈希值满足所需的0比特的数被找到。 【分析】该句的主语是we implement the proof-of-work,实现工作量证明。 by incrementing a nonce in the block until a value is found that gives the block's hash the required zero bits. by引导状语从句。通过什么样的方式来实现工作量证明。 implement:实施,执行;实现,使生效; 2. Once the CPU effort has been expended to make it satisfy the proof-of-work, the block cannot be changed without redoing the work. 一旦消耗了CPU算力实现了工作量证明,那么除非重做工作否则无法改变区块。 3. As later blocks are chained after it, the work to change the block would include redoing all the blocks after it . 由于后面的区块是链在这个区块后面的,要改变当前区块的也必须重做它之后的所有区块。 The proof-of-work also solves the problem of determining representation in majority decision 1. The proof-of-work also solves the problem of determining representation in majority decision making. 工作量证明也解决了在大多数需要决策的时候决定代表的方式。 2. If the majority were based on one-IP-address-one-vote, it could be subverted by anyone able to allocate many IPs. 如果大多数是基于一个IP地址代表一票的方式,那么有人能分配大量的IP地址,这种方式就有可能被推翻。 subvert:颠覆,推翻; allocate:分配; 3. Proof-of-work is essentially one-CPU-one-vote. 工作量证明本质上是一个CPU一票制。 essentially :本质上 4. The majority decision is represented by the longest chain, which has the greatest proof-of-work effort invested in it. 最长的链代表了多数的决定,因为有最大的计算工作量证明的精力投入到这条链上。 invest:投资;覆盖;耗费;授予;包围; 5. If a majority of CPU power is controlled by honest nodes, the honest chain will grow the fastest and outpace any competing chains. 如果大部分CPU算力被诚实的节点控制,那么诚实的链就是增长的最快,并且超过其他竞争的链。 outpace:超过; 6. To modify a past block, an attacker would have to redo the proof-of-work of the block and all blocks after it and then catch up with and surpass the work of the honest nodes. 为了更改某个过去的区块,攻击者不得不重做这个区块的工作量证明以及其后所有的区块,从而赶上并超过诚实节点。 modify:修改,修饰,更改;catch up with:追上,赶上,追捕,处罚;surpass:超过,胜过,优于。 7. We will show later that the probability of a slower attacker catching up diminishes exponentially as subsequent blocks are added. 稍后我们将证明,随着后续区块的增加,一个缓慢的攻击者赶上诚实节点的概率将呈指数级下降。 probability:可能性,机率;diminishes :减少,缩小;exponentially:以指数方式的;subsequent:随后的。 【分析】:该句的核心是:We will show later that the probability diminishes exponentially
1. To compensate for increasing hardware speed and varying interest in running nodes over time, the proof-of-work difficulty is determined by a moving average targeting an average number of blocks per hour. 为了抵消硬件运算速度的增加及平衡不同时期运行节点的利益 ,工作量证明的难度将由移动平均数法来确定每小时生成区块的平均数。 compensate:补偿,赔偿,抵消; 2. If they're generated too fast, the difficulty increases. 如果区块生成的速度过快,那么难度将增加。 5、Network-网络5、网络 The steps to run the network are as follows: Nodes always consider the longest chain to be the correct one and will keep working on extending it. If two nodes broadcast different versions of the next block simultaneously, some nodes may receive one or the other first. In that case, they work on the first one they received, but save the other branch in case it becomes longer. The tie will be broken when the next proofof-work is found and one branch becomes longer; the nodes that were working on the other branch will then switch to the longer one. The steps to run the network are as follows: 网络运行的步骤如下:
新的交易被广播给所有的节点。
每个节点将新的交易收集到一个区块。
每个节点为这个区块寻找工作量证明。
当其中一个节点找到了工作量证明,那么它向所有节点广播这个区块。
只有当这个区块的交易是有效的,并且没有被支付的时候,其他的节点才会接受这个区块。 valid: 有效的,有根据的,合法的,正当的;
其他节点接受这个节点的方式是,这个区块的哈希值作为上一个哈希值在链中创建下一个区块 。 Nodes always consider the longest chain to be the correct one and will keep working on extending it. If two nodes broadcast different versions of the next block simultaneously, some nodes may receive one or the other first. In that case, they work on the first one they received, but save the other branch in case it becomes longer. The tie will be broken when the next proofof-work is found and one branch becomes longer; the nodes that were working on the other branch will then switch to the longer one. 1. Nodes always consider the longest chain to be the correct one and will keep working on extending it. 节点总是认为最长的链是正确的,并将持续延长它。 2. If two nodes broadcast different versions of the next block simultaneously, some nodes may receive one or the other first. 如果两个节点同时广播了下一个区块的不同版本,那么一些节点可能接收了其中一个,而其他节点接收到另外一个。 simultaneously:同时地; 3. In that case, they work on the first one they received, but save the other branch in case it becomes longer. 在这种情况下,节点基于他们接收到的第一个区块工作,但是同时保存另外一个分支以防它变成更长的链。 4. The tie will be broken when the next proof-of-work is found and one branch becomes longer; the nodes that were working on the other branch will then switch to the longer one. 当下一个工作量证明被发现并且一个分支变得更长,这种关系就会被打破;在另一个分支上工作的节点将切换到更长的链上来。 tie:领带,鞋带,领结;绳子,金属丝;关系,纽带;束缚;系梁;平局;不分胜负;(英)淘汰赛(尤指足球);延音线 New transaction broadcasts do not necessarily need to reach all nodes. As long as they reach many nodes, they will get into a block before long. Block broadcasts are also tolerant of dropped messages. If a node does not receive a block, it will request it when it receives the next block and realizes it missed one. 1. New transaction broadcasts do not necessarily need to reach all nodes. 新的交易广播时不是必须要广播给所有的节点。 2. As long as they reach many nodes, they will get into a block before long. 只要到达一些节点,不久 这些新的交易就会进入一个区块。 before long:不久 3. Block broadcasts are also tolerant of dropped messages. 区块广播时容忍消息丢失的。 tolerant:宽容的,容忍的,有耐药力的; dropped:丢失; 4. If a node does not receive a block, it will request it when it receives the next block and realizes it missed one. 如果一个节点没有接收到某个区块,那么在他接收下一个区块的时候,将会发现他丢失了一个区块,并且同时再次去请求这个区块。 6、Incentive-激励Incentive :动机,刺激 6、激励 By convention, the first transaction in a block is a special transaction that starts a new coin owned by the creator of the block. This adds an incentive for nodes to support the network, and provides a way to initially distribute coins into circulation, since there is no central authority to issue them. The steady addition of a constant of amount of new coins is analogous to gold miners expending resources to add gold to circulation. In our case, it is CPU time and electricity that is expended. 1. By convention, the first transaction in a block is a special transaction that starts a new coin owned by the creator of the block. 按照惯例,区块中的第一笔交易是区块创建者(创世区块)开启一枚属于他的新货币的特殊交易。 by convention:按照惯例; 2. This adds an incentive for nodes to support the network, and provides a way to initially distribute coins into circulation, since there is no central authority to issue them. 这就为支持网络的节点提供了一种激励的方式,并且提供了一种分发货币流通的方式,因为这里没有中央机构来发行货币。 initially:最初,首先,开头;circulation:流通,传播,循环;distribute:分配,散步; 3. The steady addition of a constant of amount of new coins is analogous to gold miners expending resources to add gold to circulation. 新货币按固定量稳定地增加就像金矿矿工消耗资源并增加黄金到流通领域一样。 4. In our case, it is CPU time and electricity that is expended. 对我们而言,新货币的缠身消耗的是CPU和电力。
1. The incentive can also be funded with transaction fees. 激励也可以由交易费充当。 2. If the output value of a transaction is less than its input value, the difference is a transaction fee that is added to the incentive value of the block containing the transaction. 如果一笔交易输出的价值比它输入的价值少,那么不同之处就是一笔交易费被作为包括这笔交易的区块的激励。 3. Once a predetermined number of coins have entered circulation, the incentive can transition entirely to transaction fees and be completely inflation free. 一旦一笔预先确定的货币进入了流通域,激励将完成变为只含有交易费。 predetermined:预先确定的;transition:n-过渡,转变;
1. The incentive may help encourage nodes to stay honest. 激励将估计节点保持诚实。 2. If a greedy attacker is able to assemble more CPU power than all the honest nodes, he would have to choose between using it to defraud people by stealing back his payments, or using it to generate new coins. 如果一个贪婪的攻击者可以聚集更多的CPU算力,比全部诚实节点加起来都多,那么这个贪婪的攻击者将面临的选择是,使用这些CPU算力通过骗回已付款的方式去欺骗人们还是使用它生成新的货币。 greedy:贪婪的;assemble:集合,聚集,装配,收集; defraud:欺骗 3. He ought to find it more profitable to play by the rules, such rules that favour him with more new coins than everyone else combined, than to undermine the system and the validity of his own wealth. 他应该通过规则,找到一个更有利可图的方式去继续游戏。他会发现,与破坏系统和他财产的有效性比起来,遵守规则会获得比其他人都多的新货币。 ought:应当,应该; profitable:有利可图的,赚钱的,有益的; 7、Reclaiming Disk Space -回收磁盘空间reclaim:开拓;回收再利用;改造某人,使某人悔改 7、回收磁盘空间 Once the latest transaction in a coin is buried under enough blocks, the spent transactions before it can be discarded to save disk space. To facilitate this without breaking the block's hash, transactions are hashed in a Merkle Tree, with only the root included in the block's hash. Old blocks can then be compacted by stubbing off branches of the tree. The interior hashes do not need to be stored. 1. Once the latest transaction in a coin is buried under enough blocks, the spent transactions before it can be discarded to save disk space. 一旦某个货币的最新交易被最够多的区块覆盖,那么为了节省磁盘空间,之前的支付交易就可以被丢弃。 bury:埋葬,隐藏; 2. To facilitate this without breaking the block's hash, transactions are hashed in a Merkle Tree, with only the root included in the block's hash. 为了便于丢弃之前的交易操作的进行而又不破坏区块的哈希,交易将被哈希进默克尔树,只有根节点被纳入到区块的哈希值。 facilitate:促进,帮助; 3. Old blocks can then be compacted by stubbing off branches of the tree. 老区块可以减除分支的方式进行压缩。 4. The interior hashes do not need to be stored. 树枝内部的哈希不需要被保存。 interior:内部,里面 A block header with no transactions would be about 80 bytes. If we suppose blocks are generated every 10 minutes, 80 bytes * 6 * 24 * 365 = 4.2MB per year. With computer systems typically selling with 2GB of RAM as of 2008, and Moore's Law predicting current growth of 1.2GB per year, storage should not be a problem even if the block headers must be kept in memory. 1. A block header with no transactions would be about 80 bytes. 每个不包含交易的去块头大约是80个字节。 2. If we suppose blocks are generated every 10 minutes, 80 bytes * 6 * 24 * 365 = 4.2MB per year. 如果我们假设每 10 分钟生成一个区块,每年生成 80 bytes * 6 * 24 * 365 = 4.2 MB 3. With computer systems typically selling with 2GB of RAM as of 2008, and Moore's Law predicting current growth of 1.2GB per year, storage should not be a problem even if the block headers must be kept in memory. 2008 年在售的典型计算机有 2 GB 内存,并且摩尔定律预测目前每年内存增加 1.2 GB,所以就算区块头一定要存在内存里,存储也不是问题。 8、Simplified Payment Verification-简化的支付验证
8、简化的支付验证 It is possible to verify payments without running a full network node. A user only needs to keep a copy of the block headers of the longest proof-of-work chain, which he can get by querying network nodes until he's convinced he has the longest chain, and obtain the Merkle branch linking the transaction to the block it's timestamped in. He can't check the transaction for himself, but by linking it to a place in the chain, he can see that a network node has accepted it, and blocks added after it further confirm the network has accepted it. 1. It is possible to verify payments without running a full network node. 不运行一个完整的网络节点也是可以进行支付验证的。 2. A user only needs to keep a copy of the block headers of the longest proof-of-work chain, which he can get by querying network nodes until he's convinced he has the longest chain, and obtain the Merkle branch linking the transaction to the block it's timestamped in. 一个用户只需要拥有最长链的工作量证明的区块头的副本,他可以通过向网络中的其他节点询问直到他人为他拥有了最长的链,并获取链接交易到给交易打时间戳区块的默克尔分支 。 3. He can't check the transaction for himself, but by linking it to a place in the chain, he can see that a network node has accepted it, and blocks added after it further confirm the network has accepted it. 虽然它自己不能验证这个交易,但是但如果交易已经链接到到链中的某个位置,就说明一个网络节点已经接受了此交易,而其后追加的区块进一步确认网络已经接受了它。 As such, the verification is reliable as long as honest nodes control the network, but is more vulnerable if the network is overpowered by an attacker. While network nodes can verify transactions for themselves, the simplified method can be fooled by an attacker's fabricated transactions for as long as the attacker can continue to overpower the network. One strategy to protect against this would be to accept alerts from network nodes when they detect an invalid block, prompting the user's software to download the full block and alerted transactions to 1. As such, the verification is reliable as long as honest nodes control the network, but is more vulnerable if the network is overpowered by an attacker. 因此,只要诚实节点控制了网络,这种验证方式就是可靠的,但是如果网络被攻击者控制,这种验证方式就比较脆弱。 vulnerable:易受攻击的,易受伤害的; 2. While network nodes can verify transactions for themselves, the simplified method can be fooled by an attacker's fabricated transactions for as long as the attacker can continue to overpower the network. 虽然网络节点可以自己验证交易,但是只要攻击者继续控制网络,这种简化验证方式就可能被攻击者的伪造交易欺骗。 3. One strategy to protect against this would be to accept alerts from network nodes when they detect an invalid block, prompting the user's software to download the full block and alerted transactions to 一种对策是接受其他网络节点发现一个无效区块时发出的警告,提醒用户软件下载整个区块和被警告的交易来检查一致性。 4. Businesses that receive frequent payments will probably still want to run their own nodes for more independent security and quicker verification. 为了更加独立的安全性以及更快的支付确认,收款频繁的公司可能仍需运行他们自己的节点。
|
|
|
上一篇文章 下一篇文章 查看所有文章 |
|
开发:
C++知识库
Java知识库
JavaScript
Python
PHP知识库
人工智能
区块链
大数据
移动开发
嵌入式
开发工具
数据结构与算法
开发测试
游戏开发
网络协议
系统运维
教程: HTML教程 CSS教程 JavaScript教程 Go语言教程 JQuery教程 VUE教程 VUE3教程 Bootstrap教程 SQL数据库教程 C语言教程 C++教程 Java教程 Python教程 Python3教程 C#教程 数码: 电脑 笔记本 显卡 显示器 固态硬盘 硬盘 耳机 手机 iphone vivo oppo 小米 华为 单反 装机 图拉丁 |
360图书馆 购物 三丰科技 阅读网 日历 万年历 2024年12日历 | -2024/12/27 10:58:38- |
|
网站联系: qq:121756557 email:121756557@qq.com IT数码 |
数据统计 |