AICHAIN Yellowpaper Version

AICHAIN Yellowpaper Version

AICHAIN yellowpaper AICHAIN Yellowpaper Version: 9.1 AICHAIN 2017 Page 1 of 47 AICHAIN yellowpaper 1. ABSTRACT................................................................................................................................. 3 2. DEFINITION OF PRIVATE KEY, PUBLIC KEY AND ADDRESS ..................................... 4 2.1 PUBLIC KEY CRYPTOGRAPHY ................................................................................................................ 4 2.2 RELATED ALGORITHMS ......................................................................................................................... 4 2.2.1 Elliptic Curve Signature Algorithm ............................................................................................... 4 2.2.2 Hash Function ............................................................................................................................... 5 2.2.3 Base58 encoding ............................................................................................................................ 5 2.3 PRIVATE KEY AND PUBLIC KEY ............................................................................................................. 5 2.4 GENERATING THE ADDRESS ................................................................................................................... 6 2.5 SOME ADDRESS FORMS .......................................................................................................................... 7 2.5.1 P2PKH(Pay to Public Key Hash) ............................................................................................. 7 2.5.2 P2PK(Pay to Public Key) ....................................................................................................... 10 2.5.3 P2SH(Pay to Script Hash) ...................................................................................................... 10 3. MINING ALGORITHM .......................................................................................................... 11 3.1 LYRA2DC (DC – DYNAMIC COMPLEXITY).......................................................................................... 11 3.2 PASSWORD HASHING SCHEMES (PHS) ................................................................................................ 14 3.3 SCRYPT ................................................................................................................................................ 17 3.4 LYRA2.................................................................................................................................................. 19 4. APPLICATION INFORMATION IN THE UTXO TRADING MODEL............................ 22 4.1 APPLICATION DEPLOYMENT PRINCIPLES ............................................................................................. 22 4.2 THE EXPANSION OF TRANSACTION DATA ............................................................................................. 22 4.3 APPLICATION DEPLOYMENT UNIT : ADU ............................................................................................ 23 4.3.1 Customizable data content ........................................................................................................... 24 4.3.2 Application case: standard application unit information ............................................................ 26 4.4 APPLICATION EXECUTION UNIT : AEU ................................................................................................. 27 4.4.1 Custom data modification execution unit information ................................................................. 28 4.4.2 Application case: standard application executive unit information............................................. 31 5. APPLICATION DEPLOYMENT AND IMPLEMENTATION ........................................... 31 5.1 ADU LOCATION IDENTIFIER................................................................................................................. 31 5.2 P2SH ADDRESS OF ADU UNIT ............................................................................................................. 32 5.3 OPERATING ENVIRONMENT OF THE APPLICATION ................................................................................ 33 5.4 TYPES OF APPLICATIONS ...................................................................................................................... 34 5.4.1 Provide executable files ............................................................................................................... 34 5.4.2 Provide direct access to services ................................................................................................. 35 5.4.3 Provides running platform resources ........................................................................................... 35 5.4.4 Data resources ............................................................................................................................. 35 5.4.5 Extend other types of resources ................................................................................................... 35 5.5 USING THE ADU APPLICATION ............................................................................................................ 36 5.5.1 Transaction data containing AEU units ....................................................................................... 36 5.5.2 Transaction data verification ....................................................................................................... 36 5.5.3 The application provider verifies the identity of the user ............................................................ 39 5.6 RUNNING PROCESS .............................................................................................................................. 40 5.6.1 Developers use data resources ..................................................................................................... 41 5.6.2 Applications for users. ................................................................................................................. 42 5.6.3 users use the resources and applications of running platforms ................................................... 43 REFERENCE .................................................................................................................................... 46 AICHAIN 2017 Page 2 of 47 AICHAIN yellowpaper 1. Abstract The aim of AICHAIN is to provide a public blockchain platform for the AI with complex applications. The data resources provider, application development team and runtime platform resources provider and users, they all can deploy the data or application on AICHAIN, and setup an ecology chain system for AI application on blockchain technology with lower cost and lower technology threshold. AICHAIN will build a benign ecosystem, encourage more people to participate in the development and landing of AI applications, promote the development of AI in a credible and reliable environment, and transform the data generated by individuals into more precise services for individuals. The key issues to be solved by the AICHAIN: 1. Based on the blockchain technology of bitcoin and implement a non-chip mining algorithm. Bitcoin-HASH, LTC-scrypt, DASH-X11 have been implemented inside ASIC. ETH is to take up a lot of graphics resources. High-end graphics cards are now also monopolized by big companies. A less expensive graphics card resource is expected, but at the same time it must not be easily implemented inside ASIC). Its purpose is to make blockchain safer, to ensure that participating users have enough the computing power and the right to deploy their own applications. 2. Develop AI application deployment functions based on bitcoin blockchain and definitions of the application deployment or execution unit based on the data format of the transaction. 3. AICHAIN separates the application running environment from the blockchain node. Use docker as the application running platform, which allows AICHAIN to provide standard, upgradeable, customizable and supporting multiple programming languages APP running environment. AICHAIN node program comes with a public standard docker IMG with application running environment. This running environment can be continuously upgraded, even be modified by user freely, and users can deploy their own docker IMG with AICHAIN nodes. 4. Only put the description of AI application on the blockchain, and will not include complete application data, which allows that the size of application data can be very large, and can save the storage space of blockchain. The deployer provides download address for application executable file and data resources, or an address for direct service. Only the description information of those application or resource is recorded in the AI application information unit. AICHAIN 2017 Page 3 of 47 AICHAIN yellowpaper 5. Provide the interface for verification of user’s identity and blockchain transaction information. This allows developers make more customized on their application, which is suitable for more complex application development and running environment. 2. Definition of private key, public key and address 2.1 Public Key Cryptography Asymmetric encryption requires two (one pair) keys: public key and private key. Only the corresponding private key can decrypted the data encrypted with the public key. And vice versa. (If the private key is used in Encryption, only the corresponding public key can be used to decrypt it.) Both parties can establish secure communication

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    47 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us