WhitePaper EN
  • WhitePaper DeflationCoin
  • 1. Introduction
  • 1.0. Preface
  • 1.1. The Socio-Economic Consequences of Inflation
  • 1.2. The process of exporting inflation from the U.S. to other countries
  • 1.3. A Global Bankrupt Disguised as a "Financial Leader"
  • 1.4. The Birth of the Crypto Industry
  • 1.5. Bitcoin’s Limitations
  • 1.6. A Cryptocurrency Without the Flaws of "Digital Gold"
  • 2. Mission and Objectives
    • 2.0. Mission and Objectives
  • 3. Operating and design principles
    • 3.0. Preface
    • 3.1. Limited Supply with Zero Inflation
    • 3.2. Daily Smart-Burning of Coins
    • 3.3. Deflationary Halving—Unlike Bitcoin.
    • 3.4. Smart-Staking
    • 3.5. Smart Dividends
    • 3.6. Gradual Unlocking
    • 3.7. Basket and Pump (BaP)
    • 3.8. Attention Capture Mechanism
    • 3.9. Blockchain-Integrated Affiliate Marketing
  • 3.10. Smart Fees
  • 3.11. Deflationary Ecosystem
  • 3.11.1. Educational Gambling
  • 3.11.2. Potential Directions for Scaling the Ecosystem
  • 3.11.3. Legal and Regulatory Aspects of the Ecosystem
  • 3.12. Environmental Principle
  • 3.13. Geometric Progression in Coin Distribution
  • 3.14. Automated Diversification Across Exchanges
  • 3.15. Online Node
  • 3.16. Open Source Blockchain and Financial Transparency of the Ecosystem
  • 3.17. Three-Level Decision-Making Mechanism: "Proof-of-Deflation"
  • 3.17.1. Meritocracy of Ideas
  • 3.17.2. Skin in the game
  • 3.17.3. The Right to Veto
  • 3.18. The principle of “Humor and Memes”
  • 4. Team
    • 4.0. Preface
    • 4.1. Natoshi Sakamoto
  • 4.2. Vitalik But Not-Buterin
  • 4.3. DeflationCoin Mafia
  • 5. Tokenomics
    • 5.0. Preface
  • 5.1. Token Distribution
  • 5.2. The 50% | 50% Expenditure Principle
  • 6. Blockchain architecture level
    • Minus 1 level (-L1)
  • 7. Technical Architecture
    • 7.0. Technical Architecture
    • 7.1. Reliability and Security Architecture
    • 7.2. Cryptographic Security Methods
    • 7.3. Conceptual Architecture of DeflationCoin
    • 7.3.1. Smart Contract Architecture
  • 7.3.2. Online Node
  • 7.3.3. Deflationary Ecosystem
  • 7.3.4. Automated Order Placement on DEX
  • 7.4. Development and Transition to a Proprietary Innovative Blockchain.
  • 8. asset rating
    • 8.0. Asset Rating
  • 8.1. Detailed analysis of indicators
  • 9. Conclusion
    • 9. Conclusion
  • 10. Reference
    • 10. Reference
  • 11. Contact Information
    • 11. Contact Information
Powered by GitBook
On this page
  • The private key kkk is randomly selected as follows:
  • The public key is calculated as:
  • Steps for creating a signature:
  • 1. Calculate the hash mark of the message M:
  • 2. Select a random number r:
  • 3. Compute a point on the curve:
  • 4. Calculate the second part of the signature:
  • To Verify a Signature r,s Using the Public Key P:
  • 1. Calculate the hash mark of the message:
  • 2. Compute the parameters:
  • 3. Compute the point:
  • 4. If , the signature is considered valid.
  • The secp256k1 Elliptic Curve is Defined by the Equation:
  • Features of secp256k1:
  • Hashing Formula:
  1. 7. Technical Architecture

7.2. Cryptographic Security Methods

Binance Smart Chain (BSC) employs advanced cryptographic methods to ensure the security of transactions, signatures, and data storage. The primary algorithms include the Elliptic Curve Digital Signature Algorithm (ECDSA) based on the secp256k1 curve and the Keccak256 hash function to guarantee data immutability.

The ECDSA algorithm provides authentication for transactions and protection against forgery. The main steps of the algorithm involve key generation, signature creation, and verification. Key generation includes the formation of a private and a public key.


The private key kkk is randomly selected as follows:

k∈{1,2,…,n−1} k \in \{1, 2, \ldots, n - 1\}k∈{1,2,…,n−1}
  • n — is the order of the point group G (the generator of the elliptic curve).


The public key is calculated as:

P=k⋅G P = k \cdot G P=k⋅G
  • G — is the base point of the elliptic curve.


Steps for creating a signature:

1. Calculate the hash mark of the message M:

z=keccak256⁡(M) z = \operatorname{keccak256}(M) z=keccak256(M)

2. Select a random number r:

r∈{1,2,…,n−1} r \in \{1, 2, \ldots, n - 1\}r∈{1,2,…,n−1}

3. Compute a point on the curve:

R=r⋅G R = r \cdot GR=r⋅G

and take the xRx_{R}xR​ coordinate:

r=xR mod n r = x_{R} \bmod nr=xR​modn

If r=0, select another r.

4. Calculate the second part of the signature:

s=r−1⋅(z+k⋅r) mod n s = r^{-1} \cdot (z + k \cdot r) \bmod ns=r−1⋅(z+k⋅r)modn

If s=0, select another r.

The resulting signature is the pair r,s.


To Verify a Signature r,s Using the Public Key P:

1. Calculate the hash mark of the message:

z=keccak256⁡(M) z = \operatorname{keccak256}(M) z=keccak256(M)

2. Compute the parameters:

u1=s−1⋅z mod n,u2=s−1⋅r mod n u_1 = s^{-1} \cdot z \bmod n, \quad u_2 = s^{-1} \cdot r \bmod n u1​=s−1⋅zmodn,u2​=s−1⋅rmodn

3. Compute the point:

Q=u1⋅G+u2⋅P Q = u_1 \cdot G + u_2 \cdot P Q=u1​⋅G+u2​⋅P

4. If xQ mod n=r x_{Q} \bmod n = r xQ​modn=r, the signature is considered valid.


The secp256k1 Elliptic Curve is Defined by the Equation:

y2=x3+7 mod p y^2 = x^3 + 7 \bmod py2=x3+7modp

where:

  • p=2256−232−977p = 2^{256} - 2^{32} - 977p=2256−232−977 — a prime number (modulus),

  • G — the base point of the curve with fixed coordinates,

  • n — the order of point G.


Features of secp256k1:

  • High computational speed due to optimizations for modern processors.

  • Compactness: keys are 32 bytes (256 bits) in size.

  • Resistance to attacks based on the discrete logarithm problem.

The Keccak256 function (a variant of SHA-3) is used for hashing data and transaction identifiers in BSC. The hash function takes input data of any size and returns a fixed-size hash (256 bits).


Hashing Formula:

H(M)=Keccak256⁡(M)H(M) = \operatorname{Keccak256}(M)H(M)=Keccak256(M)

where:

  • M — the original message,

  • H(M) — its hash.

Hashing is irreversible, preventing recovery of the original message.


Every transaction is signed with the sender's private key. The signature is verified by network nodes, ensuring the authenticity of the transaction. Merkle trees are used to verify the integrity of block data. The root hash combines all transactions in the block, and any change in the data results in a change in the root hash. Validators in the Proof-of-Stake Authority algorithm use cryptographic methods to validate blocks and participate in voting.

The cryptographic algorithms used in Binance Smart Chain provide high speed, data compactness, and resistance to attacks. These methods make BSC a secure and efficient blockchain platform.

Previous7.1. Reliability and Security ArchitectureNext7.3. Conceptual Architecture of DeflationCoin

Last updated 2 hours ago