Abstract
AbstractIn order to realize all functions of the sovereignty network while guarantee the security at the same time, what key technologies should be used in the architecture? This chapter will elaborate on the key technologies of the sovereignty network. Firstly, on application layer, we proposed a large-scale multilateral managed consortium blockchain technology named as Proof of Vote to construct the multi-identifier system (MIS) for all nations in the world to jointly and equally co-manage the top-level identifiers, which assures the intercommunication between different nations. Meanwhile, each nation owns autonomy on low-level identifiers of its corresponding top-level identifiers, which reflects independent of cyberspace sovereignty. Then, we proposed some efficient algorithms to support inter-translating and addressing for multi-identifier and huge size of hundred billion identifiers, together with the hyperbolic routing scheme forming the core technologies of network layer in MIN Architecture. Technologies for guaranteeing privacy, security, and transmission control, etc. were also presented.
Reference32 articles.
1. Jacobson V, Smetters DK, Thornton JD et al (2009) Networking named content. In: Proceedings of the 5th international conference on emerging networking experiments and technologies-CoNEXT, pp 1–12
2. Li H, Ma H, Li HP et al (2017) Blockchain based domain name resolution system. US Patent. App. No. 15768833, 2018.04.16
3. Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system. https://bitcoin.org/bitcoin.pdf. Accessed 14 Jan 2020
4. Eyal I, Gencer AE, Sirer EG et al (2016) Bitcoin-NG: a scalable blockchain protocol. In: Proceedings of the 13th usenix conference on networked systems design and implementation, Berkeley, CA, pp 45–59
5. Kiayias A, Russell A, David B et al (2017) Ouroboros: a provably secure proof-of-stake blockchain protocol. In: Proceedings of annual international cryptology conference. Springer, Cham, pp 357–388