Nervos Network

Last updated
Nervos Network
Nervos-wordmark-black.svg
Logo of Nervos Network
Denominations
PluralCKBytes, CKBs
CodeCKB
Development
Original author(s)Jan Xie
Terry Tai
Kevin Wang
Daniel Lv
Cipher Wang
White paper Positioning whitepaper

Cryptoeconomics whitepaper

Common Knowledge Base whitepaper
Initial release19 November 2019;4 years ago (2019-11-19) (mainnet)
Code repository https://github.com/nervosnetwork
Development statusActive
Written in Rust
Developer(s) Nervos Foundation
Source model decentralized open-source
License https://github.com/nervosnetwork/docs-new/blob/develop/LICENSE
Ledger
Timestamping scheme Proof-of-work
Block timeapprox. 10 seconds
Block explorer https://explorer.nervos.org/
Circulating supply43,549,596,169 CKB (as of 16 February 2024)
Website
Website https://www.nervos.org/

Nervos Network is a proof-of-work blockchain platform [1] [2] which consists of multiple blockchain layers that are designed for different functions. [3] The native cryptocurrency of this layer is called CKB. Smart contracts and decentralized applications can be deployed on the Nervos blockchain. The Nervos Network was founded in 2018.

Contents

History

According to the organization's website, Nervos Network was founded in 2018 by Jan Xie, Terry Tai, Kevin Wang, Daniel Lv, and Cipher Wang. [4]

Architecture

Nervos Network utilizes multiple blockchain layers to for different functions. [3] The base layer prioritizes security and decentralization, and is optimized to verify transactions. It can settle transactions submitted from upper layers and resolves disputes. Layer 2 and above are designed for smart contract and decentralized applications. [5] [6]

NC MAX

Layer 1 achieves cryptographic consensus through proof of work, using a modified version of Bitcoin's Nakamoto consensus algorithm: NC-MAX. This algorithm changes the original in three ways: a two-step transaction process (propose, commit) which aims to improve block propagation; dynamic adjustment to block interval based on network performance to keep orphan blocks low and improve transaction throughput; and accounting for all blocks (including orphans) during the difficulty adjustment calculation to resist "selfish mining attacks," whereby one group of miners can increase their own profits at the expense of other miners on the network. NC-MAX was presented at the Internet Society's Network and Distributed System Security (NDSS) Symposium in 2022. [7] The consensus process uses a novel hash function called "Eaglesong." [8] [9]

Related Research Articles

Proof of work (PoW) is a form of cryptographic proof in which one party proves to others that a certain amount of a specific computational effort has been expended. Verifiers can subsequently confirm this expenditure with minimal effort on their part. The concept was first implemented in Hashcash by Moni Naor and Cynthia Dwork in 1993 as a way to deter denial-of-service attacks and other service abuses such as spam on a network by requiring some work from a service requester, usually meaning processing time by a computer. The term "proof of work" was first coined and formalized in a 1999 paper by Markus Jakobsson and Ari Juels. The concept was adapted to digital tokens by Hal Finney in 2004 through the idea of "reusable proof of work" using the 160-bit secure hash algorithm 1 (SHA-1).

Trusted timestamping is the process of securely keeping track of the creation and modification time of a document. Security here means that no one—not even the owner of the document—should be able to change it once it has been recorded provided that the timestamper's integrity is never compromised.

Double-spending is the unauthorized production and spending of money, either digital or conventional. It represents a monetary design problem: a good money is verifiably scarce, and where a unit of value can be spent more than once, the monetary property of scarcity is challenged. As with counterfeit money, such double-spending leads to inflation by creating a new amount of copied currency that did not previously exist. Like all increasingly abundant resources, this devalues the currency relative to other monetary units or goods and diminishes user trust as well as the circulation and retention of the currency.

<span class="mw-page-title-main">Bitcoin</span> Decentralized digital currency

Bitcoin is the first decentralized cryptocurrency. Nodes in the peer-to-peer bitcoin network verify transactions through cryptography and record them in a public distributed ledger, called a blockchain, without central oversight. Consensus between nodes is achieved using a computationally intensive process based on proof of work, called mining, that secures the bitcoin blockchain. Mining consumes large quantities of electricity and has been criticized for its environmental impact.

Namecoin is a cryptocurrency originally forked from bitcoin software. It uses proof-of-work algorithm. Like bitcoin, it is limited to 21 million coins.

<span class="mw-page-title-main">Bitcoin protocol</span> Rules that govern the functioning of Bitcoin

The bitcoin protocol is the set of rules that govern the functioning of bitcoin. Its key components and principles are: a peer-to-peer decentralized network with no central oversight; the blockchain technology, a public ledger that records all bitcoin transactions; mining and proof of work, the process to create new bitcoins and verify transactions; and cryptographic security.

Proof-of-stake (PoS) protocols are a class of consensus mechanisms for blockchains that work by selecting validators in proportion to their quantity of holdings in the associated cryptocurrency. This is done to avoid the computational cost of proof-of-work (POW) schemes. The first functioning use of PoS for cryptocurrency was Peercoin in 2012, although the scheme, on the surface, still resembled a POW.

Nicholas Szabo is a computer scientist, legal scholar, and cryptographer known for his research in smart contracts and digital currency.

<span class="mw-page-title-main">Ethereum</span> Open-source blockchain computing platform

Ethereum is a decentralized blockchain with smart contract functionality. Ether is the native cryptocurrency of the platform. Among cryptocurrencies, ether is second only to bitcoin in market capitalization. It is open-source software.

A blockchain is a distributed ledger with growing lists of records (blocks) that are securely linked together via cryptographic hashes. Each block contains a cryptographic hash of the previous block, a timestamp, and transaction data. Since each block contains information about the previous block, they effectively form a chain, with each additional block linking to the ones before it. Consequently, blockchain transactions are irreversible in that, once they are recorded, the data in any given block cannot be altered retroactively without altering all subsequent blocks.

A decentralised application is an application that can operate autonomously, typically through the use of smart contracts, that run on a decentralized computing, blockchain or other distributed ledger system. Like traditional applications, DApps provide some function or utility to its users. However, unlike traditional applications, DApps operate without human intervention and are not owned by any one entity, rather DApps distribute tokens that represent ownership. These tokens are distributed according to a programmed algorithm to the users of the system, diluting ownership and control of the DApp. Without any one entity controlling the system, the application is therefore decentralised.

<span class="mw-page-title-main">Ethereum Classic</span> Blockchain computing platform

Ethereum Classic is a blockchain-based distributed computing platform that offers smart contract (scripting) functionality. It is open source and supports a modified version of Nakamoto consensus via transaction-based state transitions executed on a public Ethereum Virtual Machine (EVM).

Proof of space (PoS) is a type of consensus algorithm achieved by demonstrating one's legitimate interest in a service by allocating a non-trivial amount of memory or disk space to solve a challenge presented by the service provider. The concept was formulated in 2013 by Dziembowski et al. and by Ateniese et al.. Proofs of space are very similar to proofs of work (PoW), except that instead of computation, storage is used to earn cryptocurrency. Proof-of-space is different from memory-hard functions in that the bottleneck is not in the number of memory access events, but in the amount of memory required.

A cryptocurrency wallet is a device, physical medium, program or an online service which stores the public and/or private keys for cryptocurrency transactions. In addition to this basic function of storing the keys, a cryptocurrency wallet more often offers the functionality of encrypting and/or signing information. Signing can for example result in executing a smart contract, a cryptocurrency transaction, identification, or legally signing a 'document'.

<span class="mw-page-title-main">OpenTimestamps</span>

OpenTimestamps (OTS) is an open-source project that aims to provide a standard format for blockchain timestamping. With the advent of systems like Bitcoin, it is possible to create and verify proofs of existence of documents (timestamps) without relying on a trusted third party; this represents an enhancement in term of security, since it excludes the possibility of a malicious trusted third party to compromise the timestamp.

In blockchain, a fork is defined variously as:

A blockchain is a shared database that records transactions between two parties in an immutable ledger. Blockchain documents and confirms pseudonymous ownership of all transactions in a verifiable and sustainable way. After a transaction is validated and cryptographically verified by other participants or nodes in the network, it is made into a "block" on the blockchain. A block contains information about the time the transaction occurred, previous transactions, and details about the transaction. Once recorded as a block, transactions are ordered chronologically and cannot be altered. This technology rose to popularity after the creation of Bitcoin, the first application of blockchain technology, which has since catalyzed other cryptocurrencies and applications.

<span class="mw-page-title-main">Avalanche (blockchain platform)</span> Open-source blockchain computing platform

Avalanche is a decentralized, open-source proof-of-stake blockchain with smart contract functionality. AVAX is the native cryptocurrency of the platform.

Algorand is a proof-of-stake blockchain and cryptocurrency. Algorand's native cryptocurrency is called ALGO.

Colored Coins is an open-source protocol that allows users to represent and manipulate immutable digital resources on top of Bitcoin transactions. They are a class of methods for representing and maintaining real-world assets on the Bitcoin blockchain, which may be used to establish asset ownership. Colored coins are bitcoins with a mark on them that specifies what they may be used for. Colored coins are also considered the initial step toward NFTs built on top of the Bitcoin network.

References

  1. "China's CMB International and Nervos Foundation launch $50m blockchain fund". CityAM. 20 May 2021. Archived from the original on 2022-09-28. Retrieved 2022-09-28.
  2. "Public blockchain Nervos Network raises $72 million in token sale". Reuters. 6 November 2019. Retrieved 2022-09-28.
  3. 1 2 "Crypto Startup Raises $28 Million To Combine Public And Private Blockchains For Enterprises". Forbes. Archived from the original on 2022-09-29. Retrieved 2022-09-29.
  4. "Team". Nervos Network. Archived from the original on 2023-12-03. Retrieved 2023-11-29.
  5. "Better Than Bitcoin? This Man Has a New Plan to Disrupt the Finance Industry". Newsweek. 2 October 2019. Archived from the original on 2022-09-30. Retrieved 2022-09-28.
  6. Zhong, Lin; Wu, Qianhong; Xie, Jan; Li, Jin; Qin, Bo (2019-04-01). "A secure versatile light payment system based on blockchain". Future Generation Computer Systems . 93: 327–337. doi:10.1016/j.future.2018.10.012. ISSN   0167-739X. S2CID   67791755.
  7. Zhang, Ren; Zhang, Dingwei; Wang, Quake; Wu, Sichen; Xie, Jan; Preneel, Bart (2019-04-01). "NC-Max: Breaking the Security-Performance Tradeoff in Nakamoto Consensus" (PDF). Network and Distributed Systems Security (NDSS) Symposium 2022. ISBN   978-1-891562-74-7. Archived (PDF) from the original on 2022-10-05. Retrieved 2022-10-05.
  8. Network, Nervos (2019-08-03). "The Proof-of-Work Function of Nervos CKB". Nervos Network. Archived from the original on 2022-09-08. Retrieved 2022-08-17.
  9. Szepieniec, Alan; Ashur, Tomer (2020). "Eaglesong: An ARX hash with fast diffusion" (PDF). Proceedings of the Romanian Academy, Series A. 21 (1): 69–76. Archived (PDF) from the original on 2023-04-10. Retrieved 2022-10-05.

Further reading