Nervos Network

Last updated
Nervos Network
Nervos-wordmark-black.svg
Logo of Nervos Network
Denominations
PluralCKBytes, CKBs
CodeCKB
Development
Original author(s)Jan Xie
Terry Tai
Kevin Wang
Daniel Lv
Cipher Wang
White paper Positioning whitepaper

Cryptoeconomics whitepaper

Common Knowledge Base whitepaper
Initial release19 November 2019;4 years ago (2019-11-19) (mainnet)
Code repository https://github.com/nervosnetwork
Development statusActive
Written in Rust
Developer(s) Nervos Foundation
Source model decentralized open-source
License https://github.com/nervosnetwork/docs-new/blob/develop/LICENSE
Ledger
Timestamping scheme Proof-of-work
Block timeapprox. 10 seconds
Block explorer https://explorer.nervos.org/
Circulating supply43,549,596,169 CKB (as of 16 February 2024)
Website
Website https://www.nervos.org/

Nervos Network is a proof-of-work blockchain platform [1] [2] which consists of multiple blockchain layers that are designed for different functions. [3] The native cryptocurrency of this layer is called CKB. Smart contracts and decentralized applications can be deployed on the Nervos blockchain. The Nervos Network was founded in 2018.

Contents

History

According to the organization's website, Nervos Network was founded in 2018 by Jan Xie, Terry Tai, Kevin Wang, Daniel Lv, and Cipher Wang. [4]

Architecture

Nervos Network utilizes multiple blockchain layers to for different functions. [3] The base layer prioritizes security and decentralization, and is optimized to verify transactions. It can settle transactions submitted from upper layers and resolves disputes. Layer 2 and above are designed for smart contract and decentralized applications. [5] [6]

NC MAX

Layer 1 achieves cryptographic consensus through proof of work, using a modified version of Bitcoin's Nakamoto consensus algorithm: NC-MAX. This algorithm changes the original in three ways: a two-step transaction process (propose, commit) which aims to improve block propagation; dynamic adjustment to block interval based on network performance to keep orphan blocks low and improve transaction throughput; and accounting for all blocks (including orphans) during the difficulty adjustment calculation to resist "selfish mining attacks," whereby one group of miners can increase their own profits at the expense of other miners on the network. NC-MAX was presented at the Internet Society's Network and Distributed System Security (NDSS) Symposium in 2022. [7] The consensus process uses a novel hash function called "Eaglesong." [8] [9]

Related Research Articles

Proof of work (PoW) is a form of cryptographic proof in which one party proves to others that a certain amount of a specific computational effort has been expended. Verifiers can subsequently confirm this expenditure with minimal effort on their part. The concept was invented by Moni Naor and Cynthia Dwork in 1993 as a way to deter denial-of-service attacks and other service abuses such as spam on a network by requiring some work from a service requester, usually meaning processing time by a computer. The term "proof of work" was first coined and formalized in a 1999 paper by Markus Jakobsson and Ari Juels. The concept was adapted to digital tokens by Hal Finney in 2004 through the idea of "reusable proof of work" using the 160-bit secure hash algorithm 1 (SHA-1).

A smart contract is a computer program or a transaction protocol that is intended to automatically execute, control or document events and actions according to the terms of a contract or an agreement. The objectives of smart contracts are the reduction of need for trusted intermediators, arbitration costs, and fraud losses, as well as the reduction of malicious and accidental exceptions. Smart contracts are commonly associated with cryptocurrencies, and the smart contracts introduced by Ethereum are generally considered a fundamental building block for decentralized finance (DeFi) and NFT applications.

Non-interactive zero-knowledge proofs are cryptographic primitives, where information between a prover and a verifier can be authenticated by the prover, without revealing any of the specific information beyond the validity of the statement itself. This function of encryption makes direct communication between the prover and verifier unnecessary, effectively removing any intermediaries.

Trusted timestamping is the process of securely keeping track of the creation and modification time of a document. Security here means that no one—not even the owner of the document—should be able to change it once it has been recorded provided that the timestamper's integrity is never compromised.

Double-spending is a fundamental flaw in a digital cash protocol in which the same single digital token can be spent more than once. Due to the nature of information space, in comparison to physical space, a digital token is inherently almost infinitely duplicable or falsifiable, leading to ownership of said token itself being undefinable unless declared so by a chosen authority. As with counterfeit money, such double-spending leads to inflation by creating a new amount of copied currency that did not previously exist. Like all increasingly abundant resources, this devalues the currency relative to other monetary units or goods and diminishes user trust as well as the circulation and retention of the currency.

<span class="mw-page-title-main">Bitcoin</span> Decentralized digital currency

Bitcoin is the first decentralized cryptocurrency. Nodes in the peer-to-peer bitcoin network verify transactions through cryptography and record them in a public distributed ledger, called a blockchain, without central oversight. Consensus between nodes is achieved using a computationally intensive process based on proof of work, called mining, that requires increasing quantities of electricity and guarantees the security of the bitcoin blockchain.

Namecoin is a cryptocurrency originally forked from bitcoin software. It uses proof-of-work algorithm. Like bitcoin, it is limited to 21 million coins.

<span class="mw-page-title-main">Bitcoin protocol</span> Rules that govern the functioning of Bitcoin

The Bitcoin protocol is the set of rules that govern the functioning of Bitcoin. Its key components and principles are: a peer-to-peer decentralized network with no central oversight; the blockchain technology, a public ledger that records all Bitcoin transactions; mining and proof of work, the process to create new bitcoins and verify transactions; and cryptographic security.

<span class="mw-page-title-main">Dash (cryptocurrency)</span> Cryptocurrency

Dash is an open source cryptocurrency. It is an altcoin that was forked from the Bitcoin protocol. It is also a decentralized autonomous organization (DAO) run by a subset of its users, which are called "masternodes".

A blockchain is a distributed ledger with growing lists of records (blocks) that are securely linked together via cryptographic hashes. Each block contains a cryptographic hash of the previous block, a timestamp, and transaction data. Since each block contains information about the previous block, they effectively form a chain, with each additional block linking to the ones before it. Consequently, blockchain transactions are irreversible in that, once they are recorded, the data in any given block cannot be altered retroactively without altering all subsequent blocks.

A decentralised application is an application that can operate autonomously, typically through the use of smart contracts, that run on a decentralized computing, blockchain or other distributed ledger system. Like traditional applications, DApps provide some function or utility to its users. However, unlike traditional applications, DApps operate without human intervention and are not owned by any one entity, rather DApps distribute tokens that represent ownership. These tokens are distributed according to a programmed algorithm to the users of the system, diluting ownership and control of the DApp. Without any one entity controlling the system, the application is therefore decentralised.

<span class="mw-page-title-main">Ethereum Classic</span> Blockchain computing platform

Ethereum Classic is a blockchain-based distributed computing platform that offers smart contract (scripting) functionality. It is open source and supports a modified version of Nakamoto consensus via transaction-based state transitions executed on a public Ethereum Virtual Machine (EVM).

Proof of space (PoS) is a type of consensus algorithm achieved by demonstrating one's legitimate interest in a service by allocating a non-trivial amount of memory or disk space to solve a challenge presented by the service provider. The concept was formulated in 2013 by Dziembowski et al. and by Ateniese et al.. Proofs of space are very similar to proofs of work (PoW), except that instead of computation, storage is used to earn cryptocurrency. Proof-of-space is different from memory-hard functions in that the bottleneck is not in the number of memory access events, but in the amount of memory required.

<span class="mw-page-title-main">Cardano (blockchain platform)</span> Public blockchain platform

Cardano is a public blockchain platform. It is open-source and decentralized, with consensus achieved using proof of stake. It can facilitate peer-to-peer transactions with its internal cryptocurrency, ADA.

A blockchain is a shared database that records transactions between two parties in an immutable ledger. Blockchain documents and confirms pseudonymous ownership of all transactions in a verifiable and sustainable way. After a transaction is validated and cryptographically verified by other participants or nodes in the network, it is made into a "block" on the blockchain. A block contains information about the time the transaction occurred, previous transactions, and details about the transaction. Once recorded as a block, transactions are ordered chronologically and cannot be altered. This technology rose to popularity after the creation of Bitcoin, the first application of blockchain technology, which has since catalyzed other cryptocurrencies and applications.

<span class="mw-page-title-main">Avalanche (blockchain platform)</span> Open-source blockchain computing platform

Avalanche is a decentralized, open-source proof of stake blockchain with smart contract functionality. AVAX is the native cryptocurrency of the platform.

<span class="mw-page-title-main">Ouroboros (protocol)</span> Blockchain protocol

Ouroboros is a family of proof-of-stake consensus protocols used in the Cardano and Polkadot blockchains. It can run both permissionless and permissioned blockchains.

Algorand is a cryptocurrency protocol providing pure proof-of-stake on a blockchain. Algorand's native cryptocurrency is called ALGO.

Proof of identity (PoID) is a consensus protocol for permission-less blockchains, in which each uniquely identified individual receives one equal unit of voting power and associated rewards. The protocol is based on biometric identification, humanity identification parties and additional verification parties.

Colored Coins is an open-source protocol built on the Bitcoin 2.0 that allows users to represent and manipulate immutable digital resources on top of Bitcoin transactions. They are a class of methods for representing and maintaining real-world assets on the Bitcoin blockchain, which may be used to establish asset ownership. Colored coins are bitcoins with a mark on them that specifies what they may be used for. Colored coins are also considered the initial step toward NFTs built on top of the Bitcoin network.

References

  1. "China's CMB International and Nervos Foundation launch $50m blockchain fund". CityAM. 20 May 2021. Retrieved 2022-09-28.
  2. "Public blockchain Nervos Network raises $72 million in token sale". Reuters. 6 November 2019. Retrieved 2022-09-28.
  3. 1 2 "Crypto Startup Raises $28 Million To Combine Public And Private Blockchains For Enterprises". Forbes. Retrieved 2022-09-29.
  4. "Team". Nervos Network. Retrieved 2023-11-29.
  5. "Better Than Bitcoin? This Man Has a New Plan to Disrupt the Finance Industry". Newsweek. 2 October 2019. Retrieved 2022-09-28.
  6. Zhong, Lin; Wu, Qianhong; Xie, Jan; Li, Jin; Qin, Bo (2019-04-01). "A secure versatile light payment system based on blockchain". Future Generation Computer Systems . 93: 327–337. doi:10.1016/j.future.2018.10.012. ISSN   0167-739X. S2CID   67791755.
  7. Zhang, Ren; Zhang, Dingwei; Wang, Quake; Wu, Sichen; Xie, Jan; Preneel, Bart (2019-04-01). "NC-Max: Breaking the Security-Performance Tradeoff in Nakamoto Consensus" (PDF). Network and Distributed Systems Security (NDSS) Symposium 2022. ISBN   978-1-891562-74-7.
  8. Network, Nervos (2019-08-03). "The Proof-of-Work Function of Nervos CKB". Nervos Network. Retrieved 2022-08-17.
  9. Szepieniec, Alan; Ashur, Tomer (2020). "Eaglesong: An ARX hash with fast diffusion" (PDF). Proceedings of the Romanian Academy, Series A. 21 (1): 69–76. Retrieved 2022-10-05.

Further reading