issue82:cryptocurrency
Différences
Ci-dessous, les différences entre deux révisions de la page.
Prochaine révision | Révision précédente | ||
issue82:cryptocurrency [2014/06/08 17:05] – créée auntiee | issue82:cryptocurrency [2014/07/02 17:10] (Version actuelle) – [5] auntiee | ||
---|---|---|---|
Ligne 1: | Ligne 1: | ||
+ | ===== 1 ===== | ||
+ | ** | ||
A CryptoCurrency is actually simply a ledger/ | A CryptoCurrency is actually simply a ledger/ | ||
Ligne 11: | Ligne 13: | ||
This can lead to the question: how are coins created? There is a system in place (mining) that allows transactions to give coins to a recipient, without having any specific sender - thus coins are " | This can lead to the question: how are coins created? There is a system in place (mining) that allows transactions to give coins to a recipient, without having any specific sender - thus coins are " | ||
+ | ** | ||
+ | Une monnaie virtuelle [Ndt : | ||
+ | |||
+ | Le livre de comptes contient simplement des transactions (ici exprimées en BTC/ | ||
+ | • Alice a donné 5 BTC à Bob . | ||
+ | • Bob a donné 1,5 BTC àSteve . | ||
+ | • Steve a donné 0,8 BTC à Frank . | ||
+ | |||
+ | Toutes les transactions sont envoyées à l' | ||
+ | |||
+ | Il est en effet difficile d' | ||
+ | |||
+ | Cela peut conduire à la question : comment sont créées les pièces ? | ||
+ | |||
+ | ** | ||
Making Sure a Person Has Enough Coins to Cover a Transaction | Making Sure a Person Has Enough Coins to Cover a Transaction | ||
Ligne 22: | Ligne 39: | ||
Once this is done, the referred transactions (also known as the inputs of a transaction) will be considered to have been flagged as “Spent”, | Once this is done, the referred transactions (also known as the inputs of a transaction) will be considered to have been flagged as “Spent”, | ||
+ | ** | ||
+ | |||
+ | S' | ||
+ | |||
+ | Supposons qu' | ||
+ | |||
+ | Être sûr qu' | ||
+ | • « J' | ||
+ | • « J' | ||
+ | Par conséquent : « Je peux envoyer 5 bitcoins sur le portefeuille de Bob. » | ||
+ | |||
+ | Une fois cela fait, les transactions en référence (aussi appelées les entrées de la transaction) seront considérées comme « dépensées », | ||
+ | ===== 2 ===== | ||
+ | ** | ||
In effect, given a long list of transactions, | In effect, given a long list of transactions, | ||
Ligne 28: | Ligne 59: | ||
• one that goes to Bob, for 5 BTC | • one that goes to Bob, for 5 BTC | ||
• one that goes back to Alice, for her remaining Balance | • one that goes back to Alice, for her remaining Balance | ||
- | |||
In other words, with this outgoing transaction, | In other words, with this outgoing transaction, | ||
This solves the issue of knowing whether Alice has enough to cover the outgoing transaction. | This solves the issue of knowing whether Alice has enough to cover the outgoing transaction. | ||
+ | ** | ||
+ | |||
+ | Effectivement, | ||
+ | |||
+ | Pour résoudre ce problème, à chaque transaction sortante, Alice va simplement se référer à l' | ||
+ | • celle qui va à Bob, pour 5 BTC. | ||
+ | • celle qui retourne à Alice, pour son Solde restant. | ||
+ | |||
+ | En d' | ||
+ | |||
+ | Cela résout la question de savoir si Alice a assez d' | ||
+ | ** | ||
An example is as below: | An example is as below: | ||
• Alice received 7 bitcoins from Peter (Transaction1) | • Alice received 7 bitcoins from Peter (Transaction1) | ||
Ligne 43: | Ligne 85: | ||
• Transactions 1,2,3 are therefore spent, and cannot be used as referral transactions to send money anymore | • Transactions 1,2,3 are therefore spent, and cannot be used as referral transactions to send money anymore | ||
• A new transaction, | • A new transaction, | ||
+ | ** | ||
+ | Par exemple : | ||
+ | • Alice a reçu 7 bitcoins de Pierre. (Transaction1) | ||
+ | • Alice a reçu 10 bitcoins de Jason. (Transaction2) | ||
+ | • Alice a reçu 6 bitcoins d' | ||
+ | • Alice veut envoyer 15 bitcoins à Bob. (Transaction4) | ||
+ | |||
+ | Ce qu'il va se passer : | ||
+ | • Alice crée la Transaction4, | ||
+ | • Les Transactions 1,2 et 3 sont ainsi dépensées et ne peuvent plus être utilisées comme des transactions de référence pour envoyer de l' | ||
+ | • Une nouvelle transaction, | ||
+ | |||
+ | ===== 3 ===== | ||
+ | ** | ||
Making Sure That Alice is the True Originator of the Send Request | Making Sure That Alice is the True Originator of the Send Request | ||
Ligne 51: | Ligne 107: | ||
Basically, when receiving money from Peter and Frodo, Alice gave each sender a public key (her receiving public key, effectively an address that identifies an account), which is a 64-digit hexadecimal number. When she generated that public key, she also generated a private key, that she alone knows - it is critical to protect that private key. | Basically, when receiving money from Peter and Frodo, Alice gave each sender a public key (her receiving public key, effectively an address that identifies an account), which is a 64-digit hexadecimal number. When she generated that public key, she also generated a private key, that she alone knows - it is critical to protect that private key. | ||
+ | ** | ||
+ | S' | ||
+ | |||
+ | L'un des problèmes rencontrés par les monnaies virtuelles était : quand on regarde la transaction « Alice envoie 5 BTC à Bob », comment sommes-nous sûrs que c'est vraiment Alice qui a envoyé 5 BTC à Bob ? Serait-il possible que Bob ait envoyé un faux message sur le réseau pair à pair, disant qu'il y avait une telle transaction, | ||
+ | |||
+ | Prouver qu' | ||
+ | |||
+ | Fondamentalement, | ||
+ | |||
+ | ** | ||
For each incoming transaction (input) that Alice refers to when she wants to send money, Alice needs to prove that she is the owner of the Public key that this incoming transaction was sent to. To do so, she mathematically combines her transaction message “Alice sends 5 BTC to Bob” to the private key (linked to her incoming account public key) to generate a signature that is appended to her transaction message. This signature does not contain her private key, nor can her private key be inferred from it. However, it is possible to verify that a message was properly signed by the relevant private key by comparing the public key to that signature and the message. | For each incoming transaction (input) that Alice refers to when she wants to send money, Alice needs to prove that she is the owner of the Public key that this incoming transaction was sent to. To do so, she mathematically combines her transaction message “Alice sends 5 BTC to Bob” to the private key (linked to her incoming account public key) to generate a signature that is appended to her transaction message. This signature does not contain her private key, nor can her private key be inferred from it. However, it is possible to verify that a message was properly signed by the relevant private key by comparing the public key to that signature and the message. | ||
Ligne 59: | Ligne 125: | ||
• check the signature of the send transaction against each public key and the send transaction message content; | • check the signature of the send transaction against each public key and the send transaction message content; | ||
• if the signature matches the public key, then it means that indeed the sender is the owner of the private key linked to the public key that the referral transactions were sent to. The sender is therefore entitled to send that money, and mark the referral transactions as spent. | • if the signature matches the public key, then it means that indeed the sender is the owner of the private key linked to the public key that the referral transactions were sent to. The sender is therefore entitled to send that money, and mark the referral transactions as spent. | ||
+ | ** | ||
+ | Pour chaque transaction en entrée (input) à laquelle se réfère Alice quand elle veut envoyer de l' | ||
+ | |||
+ | Ainsi, tous les nœuds du réseau pair à pair peuvent effectuer les opérations suivantes pour chaque transaction envoyée : | ||
+ | • vérifier les transactions en référence qui prouvent que l' | ||
+ | • obtenir la clé publique (ou les clés publiques) vers laquelle (lesquelles) les transactions en référence ont été envoyées (qui devrait être la clé publique de réception de l' | ||
+ | • comparer la signature de la transaction d' | ||
+ | • si la signature correspond à la clé publique, cela signifie que l' | ||
+ | |||
+ | ===== 4 ===== | ||
+ | ** | ||
This ingenious system makes it easy for anybody to check whether a sender owns the private key to a public key to which money was sent, and therefore to check that the sender indeed was the recipient of enough money to be able to send money. All of this without knowing the sender’s private key! | This ingenious system makes it easy for anybody to check whether a sender owns the private key to a public key to which money was sent, and therefore to check that the sender indeed was the recipient of enough money to be able to send money. All of this without knowing the sender’s private key! | ||
Ligne 67: | Ligne 144: | ||
Terminology point: referral transactions are usually referred to as the “input” to a transaction, | Terminology point: referral transactions are usually referred to as the “input” to a transaction, | ||
+ | ** | ||
+ | Ce système ingénieux permet facilement, à quiconque, de vérifier si un expéditeur possède la clé privée d'une clé publique à laquelle l' | ||
+ | |||
+ | Ce qui est également intéressant, | ||
+ | |||
+ | Générer de nouvelles clés publiques et clés privées est facile et peut se faire sans accès à Internet ; il est presque impossible d' | ||
+ | |||
+ | Point de terminologie : les transactions de référence sont généralement désignées par le nom d' | ||
+ | |||
+ | ** | ||
Checking the Input Transactions | Checking the Input Transactions | ||
Ligne 75: | Ligne 162: | ||
Thus a peer-to-peer security network, requiring no trust between nodes, is formed. | Thus a peer-to-peer security network, requiring no trust between nodes, is formed. | ||
+ | ** | ||
+ | |||
+ | Vérification des transactions en entrée | ||
+ | |||
+ | Bien sûr, toutes les transactions de référence doivent être vérifiées aussi ! Cela se fait en regardant leurs entrées (leurs propres transactions de référence) et ensuite en les vérifiant depuis le début. | ||
+ | |||
+ | Lors du téléchargement d'un client de monnaie virtuelle (comme un client Bitcoin), la première chose que le client fait est, en fait, de télécharger tout l' | ||
+ | |||
+ | Ainsi se forme un réseau pair à pair sécurisé, ne nécessitant pas de relation de confiance entre les nœuds. | ||
+ | ===== 5 ===== | ||
+ | ** | ||
Quick Summary of What We Have Seen Thus Far | Quick Summary of What We Have Seen Thus Far | ||
Ligne 85: | Ligne 183: | ||
All cryptocurrency transactions are irreversible. There is no customer support, no central entity to refund you. Transactions cannot be rolled back because they are already part of the public record across many nodes. | All cryptocurrency transactions are irreversible. There is no customer support, no central entity to refund you. Transactions cannot be rolled back because they are already part of the public record across many nodes. | ||
+ | ** | ||
+ | |||
+ | Résumé rapide de ce que nous venons de voir | ||
+ | |||
+ | Une monnaie virtuelle n'est qu'une liste de transactions, | ||
+ | |||
+ | En effet, toute clé publique utilisée sur le réseau est un compte, également appelé un portefeuille. La seule chose nécessaire pour revendiquer le droit sur cette clé publique (et donc la revendication de propriété de toutes les transactions qui ont été envoyées à cette clé publique) est la clé privée liée à celle de la clé publique. Cette clé privée donne le pouvoir d' | ||
+ | |||
+ | Vous pouvez à tout moment savoir combien d' | ||
+ | |||
+ | Toutes les transactions de monnaie virtuelle sont irréversibles. Il n'y a pas de support client, aucune entité centrale ne vous remboursera. Les transactions ne peuvent pas être annulées parce qu' | ||
+ | |||
+ | |||
+ | ** | ||
Main sources: | Main sources: | ||
• the bitcoin paper: http:// | • the bitcoin paper: http:// | ||
Ligne 91: | Ligne 203: | ||
• the Primecoin paper: http:// | • the Primecoin paper: http:// | ||
• an explanation of the paper: http:// | • an explanation of the paper: http:// | ||
- | |||
COMPETITION | COMPETITION | ||
Win 500 Dogecoin (DOGE) by answering the following question: | Win 500 Dogecoin (DOGE) by answering the following question: | ||
- | Referral transactions are usually referred to as _______ | + | Referral transactions are usually referred to as _ _ _ _ _ _ ? |
(Hint: the answer is in the article) | (Hint: the answer is in the article) | ||
Ligne 102: | Ligne 213: | ||
Another 500 DOGE will be up for grabs next month in Cryptocurrency Part 2. | Another 500 DOGE will be up for grabs next month in Cryptocurrency Part 2. | ||
+ | |||
+ | ** | ||
+ | |||
+ | |||
+ | Principales sources : | ||
+ | • le document de bitcoin : http:// | ||
+ | • l' | ||
+ | • le document de Primecoin : http:// | ||
+ | • une explication du document : http:// | ||
+ | |||
+ | CONCOURS | ||
+ | |||
+ | Gagnez 500 Dogecoin (DOGE) en répondant à la question suivante : | ||
+ | Les transactions de référence sont généralement appelés _ _ _ _ _ _ _ ? | ||
+ | (Indice : la réponse est dans l' | ||
+ | |||
+ | Envoyez votre réponse à : ronnie@fullcirclemagazine.org avant le vendredi 21 mars. Le gagnant sera avisé par courriel et recevra une adresse de portefeuille Dogecoin valide. | ||
+ | |||
+ | Un autre lot de 500 DOGE sera à gagner le mois prochain dans la Partie 2. | ||
+ |
issue82/cryptocurrency.1402239954.txt.gz · Dernière modification : 2014/06/08 17:05 de auntiee