-
Proposal for Introducing a Quantum Trading Solution (fiction)
~ Enhancing Competitiveness Through Faster Computation, High-Precision Forecasting, and Optimization ~ XYZ Corporation 1. Our Understanding Business Environment We understand that your company seeks to strengthen competitiveness in the trading business amid rapid developments in quantum technology and a volatile market environment. From the external environment perspective, the following factors are noteworthy: We believe quantum…
-
Mathematical Consideration of Pyramid Schemes
Since the birth of Bitcoin, countless digital assets have been created one after another on the blockchain. By using these digital assets, cross-border remittances have become significantly easier than before. Rise in Scam Alongside Digital Asset Adoption While these developments have brought convenience, cross-border crimes involving digital assets (especially scam) are frequently occurring. Examples include…
-
Simple Blockchain Implementation
Introduction We have implemented a node that is part of a blockchain-based decentralized consensus algorithm. The program is designed to receive transactions and blocks as input and maintain an updated blockchain. This is one of the programming assignments from Princeton University’s course, “Bitcoin and Cryptocurrency Technologies.” Blockchain Structure Since multiple forks may exist in a…
-
Implementation of Trust-Based Consensus Algorithm
We have implemented one of the consensus mechanisms in distributed network systems. This is one of the programming assignments from the Princeton University course, “Bitcoin and Cryptocurrency Technologies.” Trust Graph Between Nodes The task involves implementing a distributed consensus algorithm given a trust graph between nodes. This algorithm counteracts Sybil attacks*1 and provides an alternative…
-
Consensus Algorithm in Bitcoin Part 2
This section explains why Bitcoin’s consensus algorithm functions effectively in practice, considering potential attackers (malicious nodes). Consensus Formation Through the Longest Chain Rule In the Bitcoin blockchain⛓️, miners, including malicious ones, autonomously extend the chain. Inevitably, chain forks occur, but Bitcoin enforces a rule that only the longest chain is considered valid*1. This rule allows…