找到约 12 条结果

文章 默克尔准备金证明

...ssential cryptographic tool that is thought to boost the public confidence and transparency of user assets. It utilizes a particular data structure, Hash Tree or Merkle tree, to prove that the centralized exchange has adequate assets to serve its customers. The above picture from the wiki shows t...

文章 有趣的比特币脚本(五):闪电通道与闪电网络

...合约 [1](https://www.btcstudy.org/2023/04/24/interesting-bitcoin-scripts-and-its-use-cases-part-5-lightning-channels-and-lightning-network/#note1)。在签名承诺交易之后,支付的一方签名花费这个 2-of-2 输入的交易,并产生两个输出,一个输出给对方,面额是完...

文章 推出 Twist 和 Shout

...现在,Srinath Setty 和我发布了一篇新论文,揭示了 [Twist and Shout](https://eprint.iacr.org/2025/105),这是两个新的内存检查参数,用于确保证明者正确处理对 VM 内存的每次读取和写入。 Twist and Shout 背后的关键见解是,证明者可以快速...

文章 Samczsun talk about Re-entrancy

...he only difference between an attacker doing something in an external call and attacker do something before calling your contract is they are now in the middle of execution. whatever an attacker does they have to take advantage of the fact that they are in the middle of execution ### 1st patt...

文章 Substrate 入门(11)-学习Runtime必备的技能

...用嵌套元素的形式定义,而`on_initialize`的调用顺序即是`construct_runtime!`中模块定义的顺序** 例如`Runtime` 我们在原本的`bin/node/runtime/lib.rs`中可以看到,每个runtime module导出的trait都实现给了`Runtime`类型,但是我们却不知道`Runtim...

文章 同化博格:DAO相邻实体的新型密码法律框架

...索赔都被 “ [经济损失原则](https://www.americanbar.org/groups/construction_industry/publications/under_construction/2021/spring2021/economic_loss_doctrine/)” 排除或严重阻碍,该原则(在冒着一些简化的风险的情况下)指出,在被告与原告之间不存在 “...

文章 加密朋克宣言 - 中英双语

...parties speak together in the same forum, each can speak to all the others and aggregate together knowledge about individuals and other parties. The power of electronic communications has enabled such group speech, and it will not go away merely because we might want it to. 如果两个当事方...

文章 区块链4.0之实现后量子区块链的必要性

..., G. et al. A novel quantum blockchain scheme base on quantum entanglement and DPoS. Quantum Inf Process 19, 420 (2020). [2] R. Shelke and S. B. Bagal, Iris Recognition System: A Novel Approach for Biometric Authentication, 2017 International Conference on Computing, Communication, Control and A...

文章 BRC-20, from Newbie to be Awesome

...C-20 named E**. It has a similar name, but what's the difference between B and E? B will bring about an electronic version of a text protocol without any code control, and E will guide to join a series of bright activities which is transaprently coded on blockchain. #### What is the definition of...

文章 2024-08-11 zk-insights Weekly

...rpose cryptography to programmable cryptography. - ### SuperSpartan by Hand The goal of this article is to dive into the techniques behind the SuperSpartan's polynomial IOP, which uses the sum-check protocol to prove CCS instances, by writing the protocol explicitely for a specific example. - ...

文章 基于先到先服务的交易排序能否防止抢跑?

...反馈和审核!** ![](https://img.learnblockchain.cn/2025/03/04/fcfs-and-front-running.png) ## 引言与问题陈述 交易提交到内存池的顺序通常不是它们在账本中最终的顺序。术语 _最大可提取价值_ (MEV)包括通过主动操纵交易的顺序、插入和审...

文章 强化区块链:安全措施与协议

...](https://blockapps.net/blog/fortifying-the-blockchain-security-measures-and-protocols/#) ## 理解区块链安全挑战和漏洞 区块链技术已经彻底改变了我们对安全性、透明度和去中心化的看法。然而,随着区块链应用的增长,威胁其完整性的挑战和漏...