Abstract : Only a secure public chain that can prevent quantum cracking and 51% computing power attacks will have a big future.
Author: Roger R. Ford (Lao Luo)
As a believer of Satoshi Nakamoto, , he believe that the medium and long term value of decentralized communities is fair and inclusive for hUMAn beings.
ByteDance Community Senior Manager (former), specializing in community brand building and strategic resource integration.
The first person to preach the ACT public chain in Greater China.
1. Anti-cracking public chain has a big future
In the field of decryption, we have Chinese decryption expert Wang Xiaoyun (academician of the Chinese Academy of Sciences), who has cracked the MD5 and SHA-1 cryptographic algorithms, which is very powerful; but in the field of anti-quantum cracking, the US NIST (US National Institute of Standards and Technology) began to organize algorithm bidding in 2016, which concentrated the global elite and is still the most authoritative in the world.
ACT anti-crack public chain anti-quantum crack algorithm, from the Commonwealth of Manx cryptography team, their signature algorithm successfully passed the third round of NIST bidding (see the appendix for details), and the high probability is likely to become the NIST recommended global standard.
Five years ago, ACT overseas technology side realized that due to the encryption and decryption circle and hacker circle are inextricably linked, based on Shor algorithm, with the exponential growth of quantum computing power, hackers are more and more likely to use quantum computing power to crack traditional public chains such as BTC in advance, in order to obtain more than 15% of the realization value of all BTC market value.
In this way, the block chain building is in danger of completely collapsing at any time. Without preventing 51% calculation force from attacking this pillar, the block chain building cannot keep its original heart.
Not every public chain is called anti-cracking public chain!
Only a secure public chain that can prevent quantum cracking and 51% computing power attacks will have a big future.
2. Anti-quantum cracking requires ACT community
Overseas technical parties have been following up the anti-quantum cracking technology and the community since 2016. Although there are more powerful algorithms and several preachers have been preaching for a long time, they are still at a very early stage in community consensus and construction.
As far as ACT anti-cracking public chain is concerned, after Hero.Act.Cash went online, it has won the support of dozens of communities and won the first battle.
The Isle of Man technical side will hold the GPoC and anti-cracking public chain summit in the UK and China in January-March; the Greater China summit is funded and hosted by a local government and hosted by well-known block chain financial media. The goal is to share anti-cracking technology to the entire industry through the summit. Major media are very welcome to contact marketing evangelists to discuss summit hosting matters.
In a sense, ACT evangelists are not just preaching for ACT, but preaching for the track of anti-quantum public chain and the safe foundation of the block chain building. In this sense, anti-quantum cracking requires the ACT community.
3. ACT is the first to prevent 51% calculation force attack
- In the next year, anti-quantum cracking will become standard in the public chain.
As the most important exploration of the block chain, digital cash has categories such as sovereign currency (such as China's DCEP currency), super-sovereign currency (such as cross-central bank, promoted by international monetary and financial organizations such as the IMF), non-universal currency (specific to a certain field), securities, and non-homogeneous pass (such as the recently popular non-homogeneous pass NFT).
No matter what category, it is technically necessary to ensure that the user's private key is not cracked. Because the private key is equivalent to the account and password of your bank card, and is the protective door of your asset vault. Since it is a vault, it needs a strong lock, and the encryption algorithm is the lock of your vault protective door, and the private key is the key of your vault protective door. Ordinary people and ordinary technicians cannot open the lock of your vault protective door, but hackers with the most advanced quantum computing power are just like locksmiths with various powerful unlocking tools. When the tools and locks are fully matched, they are basically opened in seconds.
Based on the same concerns, NIST started bidding for the next generation of anti-cracking algorithms as early as 2016.
To sum up, ACT overseas technical parties and communities believe that in the next year, public chains that do not have sufficient protection will be threatened by quantum computing power, and anti-quantum cracking will become standard for public chains.
- Launching the public chain within six months will cure the pain point of the industry for the first time (prevent 51% computing power attack).
If Nakamoto has any regrets, the 51% computing power attack must be the biggest one.
As the world's first bottom-up creator of phenomenal financial technologies and products that appreciate millions of times, Satoshi Nakamoto's first intention is to promote the birth of a fairer and inclusive financial society through decentralized technology.
After more than 10 years of development, there are indeed many people who are rich and free because of BTC, but the current situation of BTC seems to have begun to deviate from the original intention of Satoshi Nakamoto. There is a risk of centralization of BTC calculation power, and the price of BTC may be manipulated by capital giants.
Therefore, how to prevent 51% calculation force attack, that is, how to prevent a very small number of people from using capital advantages to control 51% calculation force, and how to prevent a certain center from finally controlling the entire public chain, is the key pillar that the entire block chain building has needed to complete since its birth.
Without anti-quantum cracking, the blockchain edifice could collapse at any time. And without the pillar of preventing 51% computing power attack, the blockchain building cannot be consistent with its original intention.
In order to solve this big problem, ACT overseas technology and research and development volunteers in Greater China work closely together, relying on the anti-quantum cracking algorithm, relying on the verifiable random function VRF (Verifiable Random Function) based on zero knowledge proof, through community mass selection, reverse selection, and ultimate arbitration. Three random steps, independent decoupling but interlocking, extreme random and dynamic balance completely eradicate the 51% computing power attack problem.
Therefore, the ACT public chain will become the first public chain in the world to prevent 51% calculation force attacks, in order to implement the concept of Satoshi Nakamoto; it is expected to be launched within six months, that is, by the end of the year.
After the public chain goes online, about one month, the Global Signature Hacking Week Contest (Global ACT Hacking Week) will be held. At that time, Academician Wang Xiaoyun will be fully invited to host and participate in the cracking contest to see if Academician Wang, global hackers and global decryption experts can crack the ACT signature algorithm and witness the miracle of the ACT anti-quantum cracking signature algorithm together!
4. Greater China Anti-cracking Public Chain Summit is about to be held
ACT community evangelists will start roadshows in Ningbo, Chengdu, Xi'an, Guangzhou, Shenzhen and other cities in the near future. Opinion leaders and team leaders who are interested in cracking the public chain are welcome to attend the meeting.
Every day, bro from all sub-communities enthusiastically preached and welcomed and helped the first Greater China Anti-cracking Public Chain Summit to be held smoothly.
Appendix-Introduction to the standardization process of NIST anti-quantum algorithm
The standardization process of NIST anti-quantum algorithm began in December 2016 (https://csrc.nist.gov/projects/post-quantum-cryptography),第一轮征集共有82个候选者提交.
NIST plans to hold the third NIST Standardization Conference in the spring or summer of 2021, with the hope that there will be only seven final candidates and eight alternative candidates.
NIST is pleased with the progress of the standardization work, but also recognizes that current and future research may produce some promising schemes that are not part of the NIST standardization project.
Third round shortlist
Public key encryption/KEMs
7. Rainbow signature