1 / 14
文档名称:

区块链技术应用研究外文文献翻译2017.docx

格式:docx   大小:39KB   页数:14页
下载后只包含 1 个 DOCX 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

分享

预览

区块链技术应用研究外文文献翻译2017.docx

上传人:119060444 2017/11/16 文件大小:39 KB

下载得到文件列表

区块链技术应用研究外文文献翻译2017.docx

文档介绍

文档介绍:外文文献翻译原文及译文
文献出处:Amanda E. The research of the block chain technology application fJ] International Conference on Financial Cryptography and Data Security 2017, 3(12):528-539.
原文
The research of the block chain technology application
Amanda Elys
Abstract
The development and application of block chain technology research has caused the great attention of the academia and industry, many people think that block chain technology is a revolution in the future of the technology, information technology is the great innovation. Block chain technology is the main characteristic of decentralization,was established based on cryptography algorithm is the basis of a global credit agreement. In general, block chain is distributed books based on technology, because the books by sharing ensure the books cannot be tampered with. Through the consensus algorithm, so as to realize ’’decentralized” trust. The core of block chain,is a global distributed database, the technology platform is open and programmable.
Keywords: block chain; Technological revolution; application
Introduction
Chain block is a data structure that is made, the smallest unit block by each block according to the time sequence linked together, the smallest unit of block is the carrier of trading information. In order to realize the traceability and safety,each block design has the timestamp as markers, and contains two parts: only the head and the block body. Each relied on the block header link to the previous block, forming a chain structure. In the context munication structure, chain block is a point-
to-point plane grid,the work without serious centralized storage munications equipment. Peer in work,each node status,but at the same time as the user and the server in the data update and verification, and save the participation of all the data and information. Trust mechanism was established by asymmetric encryption algorithm and asymmetric encryption algorithm pared with the traditional symmetric algor