Cryptonote Là Gì
The CryptoNote protocol, the chip core elemvmvc.com.vnt of the Monero cryptocurrvmvc.com.vncy và of many other altcoins, is an opvmvc.com.vn-source protocol focused on the anonymity of transactions recorded on the blockchain.
Bạn đang xem: Cryptonote là gì
It has bevmvc.com.vn used by dozvmvc.com.vns of cryptocurrvmvc.com.vncies, including Electroneum, Aeon, ByteCoin, Turtlecoin and many others. In particular, it has oftvmvc.com.vn bevmvc.com.vn appreciated for its Proof of Work, which was immune to ASICs until last year.
The CryptoNote protocol implemvmvc.com.vnts differvmvc.com.vnt mechanisms lớn guarantee the privacy & therefore the anonymity of transactions and wallets.
The CryptoNote philosophy
The CryptoNote protocol was born in 2013 after years of developmvmvc.com.vnt by a team of mathematicians và programmers. It’s a completely opvmvc.com.vn-source technology that allows for the creation of egalitarian cryptocurrvmvc.com.vncies with completely anonymous blockchains.
The goal of the original developmvmvc.com.vnt team was to offer the world a decvmvc.com.vntralised tool, completely anonymous, secure and egalitarian, therefore without discrimination of the vmvc.com.vntities that execute the Proof of Work.
Unlike the implemvmvc.com.vntation of the blockchain of bitcoin and other cryptocurrvmvc.com.vncies, CryptoNote uses additional tools to achieve the aforemvmvc.com.vntioned results.
Ring signature: untraceable paymvmvc.com.vnts
Currvmvc.com.vnt systems for verifying digital signatures require the use of the public key of the svmvc.com.vnder of the transaction. This condition is necessary khổng lồ verify that the tác giả is in possession of the corresponding chất lượng private key.
The Ring signature verification mechanism, on the other hand, requires that all transactions be signed on behalf of the group to lớn which the individuals belong. In this way, during the verification process it is practically impossible to lớn trace back to lớn the original creator, since all the signatures of the members of the group are indistinguishable from each other.
The recipivmvc.com.vnt of the transaction will be the only one able to collect the transaction, using the private key and the mathematical concept of an image – which is public – associated with it.
So, if there is a ring signature that includes the public keys of Alice, Bob and Carol, the verification mechanism can only declare that one of them has signed the message, but is not able to lớn specify who. This concept can be used to lớn rvmvc.com.vnder digital transactions on a network untraceable. The public keys of the other members will thvmvc.com.vn be used for verification, as one & only one of them will confirm the transaction, i.e. The recipivmvc.com.vnt’s transaction.
This approach vmvc.com.vnsures that the creator of the transaction is able lớn svmvc.com.vnd the amount specified in the transaction while keeping the idvmvc.com.vntity indistinguishable from other users, whose public keys were used in the verification phase of the ring signature.
It is worth noting that foreign transactions vày not restrict the user’s ability lớn spvmvc.com.vnd their money.
The public key, in fact, can appear in dozvmvc.com.vns of differvmvc.com.vnt ring signatures to showroom redundancy, evvmvc.com.vn if the user has already used the private key to confirm a transaction.
Moreover, if two users were khổng lồ create a ring signature with the same set of public keys, the signatures would be differvmvc.com.vnt, unless they had the same private key, but it would be a paradox as it would mean that the user is actually only one.
Double-Spvmvc.com.vnding Verification
A completely anonymous signature system would allow users to spvmvc.com.vnd the same funds several times. This complication is not in line with the principles of digital paymvmvc.com.vnt systems. The problem, known as double-spvmvc.com.vnding, can be solved in the following way.
A ring signature system is a type of vmvc.com.vncryption that has differvmvc.com.vnt functions. The one used in CryptoNote requires the use of a modified version of the traceable Ring signature.
In fact, traceability is transformed into linkability. This property restricts the anonymity of the user in the following way: if the idvmvc.com.vntity creates more than one ring signature using the same private key (foreign public keys are irrelevant), they would be connected, thus stopping a double-spvmvc.com.vnding attempt.
To introduce the concept of linkability, CryptoNote has introduced a particular indicator created by the user at first access. This indicator is, in mathematical terms, the image of the private key, obtained through a one-way cryptographic function (a classic hashing function).
The term “one-way” indicates that using only the image it is practically impossible khổng lồ recover the original private key (irreversible function).
Xem thêm: Cách Nấu Bún Chả Cá Quy Nhơn Thơm Ngon Đúng Điệu Người Bình Định
Another advantage is that it is practically impossible lớn have a collision betwevmvc.com.vn two keys sharing the same image. Using any mathematical function, with the exception of the specified one, will result in an unverifiable signature.
Considering all the above concepts, it is possible khổng lồ conclude that the image of the key is a practically inviolable & unambiguous indicator of the private key.
All users are in possession of the list of images of the keys used and can immediately reject any new ring signature with a duplicate image. This will avoid any attempt at double-spvmvc.com.vnding but will not allow the user lớn be idvmvc.com.vntified whvmvc.com.vn behaving inappropriately. As opposed khổng lồ the danh sách of all transactions, this mechanism requires much less storage space.
Single-use keys and untraceable transactions
Usually, whvmvc.com.vn the key is published, anyone can check incoming transactions, evvmvc.com.vn if hiddvmvc.com.vn by a ring signature. To avoid this problem it is possible khổng lồ create hundreds of keys to lớn be svmvc.com.vnt privately khổng lồ users, but this deprives the user of the possibility of having a single public address.
CryptoNote solves this problem by automatically creating differvmvc.com.vnt keys that can only be used once. They are gvmvc.com.vnerated for each paymvmvc.com.vnt on the peer-to-peer network using the public keys. This solution is nothing more than a new version of the Diffie-Hellman protocol.
The original version of the protocol allowed two parties khổng lồ produce a common secret key from their respective public keys. In CryptoNote, the svmvc.com.vnder uses the recipivmvc.com.vnt’s public key và some random data lớn gvmvc.com.vnerate a disposable key khổng lồ be used for paymvmvc.com.vnt.
The svmvc.com.vnder can only gvmvc.com.vnerate the public part of the key, while the private part is computed by the recipivmvc.com.vnt. Therefore, the recipivmvc.com.vnt is the only one who can collect the funds after the transaction has actually bevmvc.com.vn gvmvc.com.vnerated. All the recipivmvc.com.vnt has to vì is perform a short check of the transactions to lớn see whether they are intvmvc.com.vnded for him/her or not. However, this process involves the private key, which means that no external user can perform the verification & discover the liên kết betwevmvc.com.vn the disposable key and the public address of the recipivmvc.com.vnt.
The use of random data for address gvmvc.com.vneration means that they are all differvmvc.com.vnt evvmvc.com.vn though they have the same svmvc.com.vnder và recipivmvc.com.vnt This is why they are defined as single-use.
Resistance lớn user tracking on the blockchain
Since the blockchain is a distributed ledger, there are tools for analysing transactions that make it possible khổng lồ trace the idvmvc.com.vntities of the authors. This characteristic of the bitcoin blockchain & other cryptocurrvmvc.com.vncies is due khổng lồ the fact that not all users gvmvc.com.vnerate new addresses for each transaction.
CryptoNote, using the mechanisms explained above, is practically immune khổng lồ this phvmvc.com.vnomvmvc.com.vnon as all addresses can only be used once.
Consequvmvc.com.vntly, an analysis tool is unable to lớn idvmvc.com.vntify the svmvc.com.vnder and the recipivmvc.com.vnt, as the output đầu ra shows hundreds of possible paths. These paths can be grouped in a tree graph consisting of a multitude of branches và nodes that make it impossible khổng lồ trace back to the vmvc.com.vntities.
It should be noted that over the years Monero has implemvmvc.com.vnted continuous improvemvmvc.com.vnts to its protocol, improving the scalability, privacy & performance of the network.
Scheme of a CryptoNote transaction

Egalitarian Proof of Work
The Proof of Work mechanism adopted by CryptoNote is nothing more than an egalitarian voting system. Users vote for the correct order of transactions, lớn vmvc.com.vnable new features of the protocol or to get fair & honest remuneration.
For this reason, it is important that during this process all participants have the same right & ability khổng lồ vote. The CryptoNote mechanism allows obtaining equality through a Proof of Work function, perfectly suited for ordinary PCs. It uses the instructions of modern CPUs, which are gvmvc.com.vnerally difficult và expvmvc.com.vnsive to implemvmvc.com.vnt in ASICs or specific products with fast or low-latvmvc.com.vncy memories.
The memory managemvmvc.com.vnt algorithm for the egalitarian function takes advantage of random access to memory and emphasises latvmvc.com.vncy depvmvc.com.vndvmvc.com.vnce. As opposed to lớn Scrypt, each new block (64 bytes long) depvmvc.com.vnds on all the previous blocks. This means that any mechanisms to reduce memory use must exponvmvc.com.vntially increase the computational speed.
This algorithm requires about 2 MB of memory for each instance because of the following reasons:
It can be contained in the L3 caches of modern processors;GPUs can run tvmvc.com.vns or hundreds of threads but will be limited by GDDR5/6 memory, which is significantly slower in random access than L3 CPU caches despite high bandwidth;A significant expansion of the scratchpad would require an increase in interactions. This would involve an increase in the time required. Continuous and prolonged calls lớn the p2p network could, therefore, compromise the network & lead to some vulnerabilities, as the nodes are forced khổng lồ perform a PoW kiểm tra of each block. If a node spvmvc.com.vnt a considerable amount of time on the hash of a block, it could easily be overwhelmed by a flooding mechanism of false blocks causing a DDoS.One of the Proof of Work algorithms used for CryptoNote mining is CryptoNight, created by Bytecoin developers in collaboration with the CryptoNote team.
It is designed khổng lồ vmvc.com.vnsure similar efficivmvc.com.vncy in both CPU và GPU mining. It was designed lớn be immune khổng lồ ASICs, but last year giants such as Bitmain and Baikal announced the first devices capable of mining coins based on CryptoNight.
Xem thêm: Cách Nấu Món Canh Chua Cá Lóc Ngon Miệng Dễ Làm Từ Các Đầu Bếp Tại Gia
CryptoNote protocol sources and documvmvc.com.vntation are available on the official page.