This article possibly contains original research. (December 2018) (Learn how and when to remove this template message)
CryptoNote is an application layer protocol that aims to solve the problems outlined in Bitcoin Core, the protocol behind Bitcoin. The protocol powers several decentralized privacy-oriented cryptocurrencies.
|Original author(s)||Nicolas van Saberhagen|
|Operating system||Windows, Unix-like, OS X|
Nothing is known about the original author of CryptoNote, "Nicolas van Saberhagen."
Transactions in the CryptoNote protocol use a one-time destination address, meaning no observer can determine if any transactions were sent to a specific address or link two addresses together.
To prevent sender identification from the recipient, CryptoNote groups the sender's public key with several other keys (more precisely, it groups the sender's output with several other's outputs), making it impossible to tell who actually sent the transaction. If ring signatures are used, all possible senders referenced in the transaction are equiprobable and there is no way to determine the exact private key used while signing.
Since the original release, many additional CryptoNote additions have been made, such as a change to ring signatures known as RingCT which conceals transaction amounts.
Proof of Work
The original CryptoNote protocol proposes a memory-intensive hashing algorithm, CryptoNight, which was designed to close the gap between CPU mining and that of GPUs, FPGAs and ASICs. However since its release in 2014, ASICs have since been designed for the original CryptoNight algorithm.
CryptoNote retargets the difficulty of every block for faster adjustment for when the network hashrate shrinks or grows intensely for a short period of time. Block sizes are dynamic, with a miner penalty fee if the miner produces a block significantly larger than the previous median of 100 blocks.
Bytecoin (BCN), not to be confused Bitcoin (BTC), was the first implementation of the CryptoNote protocol launched to the public on July 4, 2012.
The Bytecoin blockchain contains some extra information not directly related to money transfers: several blocks include geographic coordinates of universities, educational facilities among other buildings.
In September 2014, Monero was attacked when someone exploited a flaw in CryptoNote that permitted the creation of two subchains that refused to recognize the validity of transactions on each other.
In 2014 there were several CryptoNote-based fraudulent coin launches, which exploited CrytoNote's open source code and the anonymity it provides in transactions.
Others articles of the Topics Cryptography AND Economics : Primecoin, Peercoin, BoxyCoin, Zclassic, CoinM, Australia Cash, Nxt
Others articles of the Topics Economics AND Free and open-source software : Australia Cash, Bitcoin Private, CoinM, Vertcoin
Others articles of the Topics Cryptography AND Free and open-source software : Bitcoin Private, Bimil, Vertcoin, Dietbitcoin, CoinM, Australia Cash
Others articles of the Topic Cryptography : Bitwarden, Vertcoin, Securebear, Nxt, ZenCash (cryptocurrency), Cryptography, CoinJoin
Others articles of the Topic Economics : Nxt, BoxyCoin, Bitcoin Private, Vertcoin, Devcoin, Blockchain, CoinM
Others articles of the Topic Free and open-source software : Koseven (framework), ensmallen (C++ library), Australia Cash, Wikimedia Foundation, GENESIS (MD software), Hypnos Music Player, Cjdns
- "CryptoNote v 2.0" (PDF). cryptonote.org. Retrieved 2018-12-21.
- "Meet North Korea and Lana Del Rey's new favorite cryptocurrency". The Daily Dot. 2018-02-09. Retrieved 2018-12-21.
- "Forkmaps". forkmaps.com. Retrieved 2018-12-21.
- Greenberg, Andy (2017-01-25). "Monero, the Drug Dealer's Cryptocurrency of Choice, Is on Fire". Wired. ISSN 1059-1028. Retrieved 2018-12-21.
This article "CryptoNote" is from Wikipedia. The list of its authors can be seen in its historical and/or the page Edithistory:CryptoNote. Articles copied from Draft Namespace on Wikipedia could be seen on the Draft Namespace of Wikipedia and not main one.