暂无图片
暂无图片
暂无图片
暂无图片
暂无图片
区块链系列报告 17IOTA The Tangle_Whitepaper.pdf
236
28页
0次
2021-05-08
50墨值下载
The Tangle
Serguei Popov
October 1, 2017. Version 1.3
Abstract
In this paper we analyze the mathematical foundations of IOTA, a cryp-
tocurrency for the Internet-of-Things (IoT) industry. The main feature of this
novel cryptocurrency is the tangle, a directed acyclic graph (DAG) for stor-
ing transactions. The tangle naturally succeeds the blockchain as its next
evolutionary step, and offers features that are required to establish a machine-
to-machine micropayment system.
An essential contribution of this paper is a family of Markov Chain Monte
Carlo (MCMC) algorithms. These algorithms select attachment sites on the
tangle for a transaction that has just arrived.
1 Introduction and description of the system
The rise and success of Bitcoin during the last six years proved that blockchain tech-
nology has real-world value. However, this technology also has a number of drawbacks
that prevent it from being used as a generic platform for cryptocurrencies across the
globe. One notable drawback is the concept of a transaction fee for transactions of
any value. The importance of micropayments will increase in the rapidly developing
IoT industry, and paying a fee that is larger than the amount of value being trans-
ferred is not logical. Furthermore, it is not easy to get rid of fees in the blockchain
infrastructure since they serve as an incentive for the creators of blocks. This leads
to another issue with existing cryptocurrency technology, namely the heterogeneous
nature of the system. There are two distinct types of participants in the system, those
who issue transactions, and those who approve transactions. The design of this sys-
tem creates unavoidable discrimination of some patricipants, which in turn creates
a.k.a. mthcl; author’s contact information: serguei.popov@iota.org
1
conflicts that make all elements spend resources on conflict resolution. The afore-
mentioned issues justify a search for solutions essentially different from blockchain
technology, the basis for Bitcoin and many other cryptocurrencies.
In this paper we discuss an innovative approach that does not incorporate blockchain
technology. This approach is currently being implemented as a cryptocurrency called
iota [1], which was designed specifically for the IoT industry. The purpose of this
paper is to focus on general features of the tangle, and to discuss problems that arise
when one attempts to get rid of the blockchain and maintain a distributed ledger.
The concrete implementation of the iota protocol is not discussed.
In general, a tangle-based cryptocurrency works in the following way. Instead
of the global blockchain, there is a DAG that we call the tangle. The transactions
issued by nodes constitute the site set of the tangle graph, which is the ledger for
storing transactions. The edge set of the tangle is obtained in the following way:
when a new transaction arrives, it must approve two
1
previous transactions. these
approvals are represented by directed edges, as shown in Figure 1
2
. If there is not
a directed edge between transaction A and transaction B, but there is a directed
path of length at least two from A to B, we say that A indirectly approves B. There
is also the “genesis” transaction, which is approved either directly or indirectly by
all other transactions (Figure 2). The genesis is described in the following way. In
the beginning of the tangle, there was an address with a balance that contained all
of the tokens. The genesis transaction sent these tokens to several other “founder”
addresses. Let us stress that all of the tokens were created in the genesis transaction.
No tokens will be created in the future, and there will be no mining in the sense that
miners receive monetary rewards “out of thin air”.
A quick note on terminology: sites are transactions represented on the tangle
graph. The network is composed of nodes; that is, nodes are entities that issue and
validate transactions.
The main idea of the tangle is the following: to issue a transaction, users must
work to approve other transactions. Therefore, users who issue a transaction are
contributing to the network’s security. It is assumed that the nodes check if the
approved transactions are not conflicting. If a node finds that a transaction is in
conflict with the tangle history, the node will not approve the conflicting transaction
in either a direct or indirect manner
3
.
1
This is the simplest approach. One may also study similar systems where transactions must
approve k other transactions for a general k 2, or have an entirely different set of rules.
2
Time always increases from left to right in each figure.
3
If a node issues a new transaction that approves conflicting transactions, then it risks that other
nodes will not approve its new transaction, which will fall into oblivion.
2
of 28
50墨值下载
【版权声明】本文为墨天轮用户原创内容,转载时必须标注文档的来源(墨天轮),文档链接,文档作者等基本信息,否则作者和墨天轮有权追究责任。如果您发现墨天轮中有涉嫌抄袭或者侵权的内容,欢迎发送邮件至:contact@modb.pro进行举报,并提供相关证据,一经查实,墨天轮将立刻删除相关内容。

评论

关注
最新上传
暂无内容,敬请期待...
下载排行榜
Top250 周榜 月榜