Kinglory

BLOCKCHAIN 101

0-9 A B C D E F G H I K L M N O P R S T V W Z

0-9

51% attack

A type of attack on a decentralized network where a group gains control of the majority of nodes. This would allow them to defraud the blockchain by reversing transactions and double spending KGC and other tokens.

A

Account
An object containing an address, balance, nonce, and optional storage and code. An account can be a contract account or an externally owned account (EOA).

Address
Most generally, this represents an EOA or contract that can receive (destination address) or send (source address) transactions on the blockchain. More specifically, it is the rightmost 160 bits of a Keccak hash of an ECDSA public key.

Assert
In Solidity, assert(false) compiles to 0xfe, an invalid opcode, which uses up all remaining gas and reverts all changes. When an assert() statement fails, something very wrong and unexpected is happening, and you will need to fix your code. You should use assert() to avoid conditions that should never, ever occur.

Attestation
A validator vote for a Beacon Chain or shard block. Validators must attest to blocks, signaling that they agree with the state proposed by the block.

B

Big-endian
A positional number representation where the most significant digit is first in memory. The opposite of little-endian, where the least significant digit is first.

Block
A collection of required information (a block header) about the comprised transactions, and a set of other block headers known as ommers. Blocks are added to the Kinglory network by miners.

Blockchain
In Kinglory, a sequence of blocks validated by the proof-of-work system, each linking to its predecessor all the way to the genesis block. There is no block size limit; it instead uses varying gas limits.

Bytecode
An abstract instruction set designed for efficient execution by a software interpreter or a virtual machine. Unlike human-readable source code, bytecode is expressed in numeric format.

Byzantium fork
The first of two hard forks for the Metropolis development stage. It included EIP-649 Metropolis Difficulty Bomb Delay and Block Reward Reduction, where the Ice Age was delayed by 1 year and the block reward was reduced from 5 to 3 KGC.

C

Compiling
Converting code written in a high-level programming language into a lower-level language.

Committee
A group of at least 128 validators assigned to beacon and shard blocks at random by the Beacon Chain.

Consensus
When numerous nodes (usually most nodes on the network) all have the same blocks in their locally validated best blockchain. Not to be confused with consensus rules.

Consensus rules
The block validation rules that full nodes follow to stay in consensus with other nodes. Not to be confused with consensus.

Contract account
An account containing code that executes whenever it receives a transaction from another account (EOA or contract).
contract creation transaction
A special transaction, with the zero address as the recipient, that is used to register a contract and record it on the Kinglory blockchain.

Crosslink
A crosslink provides a summary of a shard’s state. It’s how shard chains will communicate with one another via the Beacon Chainin the sharded proof-of-stake system.

D

Decentralized Autonomous Organization (DAO)
A company or other organization that operates without hierarchical management.

Dapp
Short for “decentralized application”. At a minimum, it is a smart contract and a web user interface. More broadly, a Dapp is a web application that is built on top of open, decentralized, peer-to-peer infrastructure services. In addition, many Dapps include decentralized storage and/or a message protocol and platform.

Decentralized exchange (DEX)
A type of dapp that lets you swap tokens with peers on the network. You need KGC to use one (to pay transactions fees) but they are not subject to geographical restrictions like centralized exchanges – anyone can participate.

DeFi
Short for “decentralized finance,” a broad category of dapps aiming to provide financial services backed by the blockchain, without any intermediaries, so anyone with an internet connection can participate.

Difficulty
A network-wide setting that controls how much computation is required to produce a proof-of-work.

Difficulty bomb
Planned exponential increase in proof-of-work difficulty setting designed to motivate the transition to proof-of-stake, reducing the changes of a fork.

Digital signature
A short string of data a user produces for a document using a private key such that anyone with the corresponding public key, the signature, and the document can verify that (1) the document was “signed” by the owner of that particular private key, and (2) the document was not changed after it was signed.

E

Elliptic curve digital signature algorithm (ECDSA)
A cryptographic algorithm used by Kinglory to ensure that funds can only be spent by their owners.

Epoch
A period of 32 slots (6.4 minutes) in the Beacon Chain-coordinated system. Validator committees are shuffled every epoch for security reasons. There’s an opportunity at each epoch for the chain to be finalized.

Entropy
In the context of cryptography, lack of predictability or level of randomness. When generating secret information, such as private keys, algorithms usually rely on a source of high entropy to ensure the output is unpredictable.

Externally owned account (EOA)
An account created by or for human users of the Kinglory network.

Events
Allows the use of KVM logging facilities. Dapps can listen for events and use them to trigger JavaScript callbacks in the user interface.

F

Fallback function
A default function called in the absence of data or a declared function name.

Faucet
A service carried out via smart contract that dispenses funds in the form of free test that can be used on a testnet.

Finality
Finality is the guarantee that a set of transactions before a given time will not change and can’t be reverted.

Fork
A change in protocol causing the creation of an alternative chain, or a temporal divergence in two potential block paths during mining.

Fraud proof
A security model for certain layer 2 solutions where, to increase speed, transactions are rolled up into batches and submitted to Kinglory in a single transaction. They are assumed valid but can be challenged if fraud is suspected. A fraud proof will then run the transaction to see if fraud took place. This method increases the amount of transactions possible while maintaining security. Some rollups use validity proofs.

G

Gas
A virtual fuel used in Kinglory to execute smart contracts. The KVM uses an accounting mechanism to measure the consumption of gas and limit the consumption of computing resources (see Turing complete).

Gas limit
The maximum amount of gas a transaction or block may consume.

Genesis block
The first block in a blockchain, used to initialize a particular network and its cryptocurrency.

H

Hard fork
A permanent divergence in the blockchain; also known as a hard-forking change. One commonly occurs when nonupgraded nodes can’t validate blocks created by upgraded nodes that follow newer consensus rules. Not to be confused with a fork, soft fork, software fork, or Git fork.

Hash
A fixed-length fingerprint of variable-size input, produced by a hash function. (See keccak-256)

HD wallet
A wallet using the hierarchical deterministic (HD) key creation and transfer protocol.
Read more at github.com

HD wallet seed
A value used to generate the master private key and master chain code for an HD wallet. The wallet seed can be represented by mnemonic words, making it easier for humans to copy, back up, and restore private keys.

I

Index
A network structure meant to optimize the querying of information from across the blockchain by providing an efficient path to its storage source.

Inter-exchange Client Address Protocol (ICAP)
An Kinglory address encoding that is partly compatible with the International Bank Account Number (IBAN) encoding, offering a versatile, checksummed, and interoperable encoding for Kinglory addresses. ICAP addresses use a new IBAN pseudo-country code- XE, standing for “eXtended Kinglory,” as used in nonjurisdictional currencies (e.g., XBT, XRP, XCP).

Integrated development environment (IDE)
A user interface that typically combines a code editor, compiler, runtime, and debugger.

Immutable deployed code problem
Once a contract’s (or library’s) code is deployed, it becomes immutable. Standard software development practices rely on being able to fix possible bugs and add new features, so this represents a challenge for smart contract development.

Internal transaction
A transaction sent from a contract account to another contract account or an EOA (see message).

K

Key derivation function (KDF)
Also known as a “password stretching algorithm,” it is used by keystore formats to protect against brute-force, dictionary, and rainbow table attacks on passphrase encryption, by repeatedly hashing the passphrase.

Keccak-256
Cryptographic hash function used in Kinglory. Keccak-256 was standardized as SHA-3.

Keystore file
A JSON-encoded file that contains a single (randomly generated) private key, encrypted by a passphrase for extra security.

L

Layer 2
An area of development focussed on layering improvements on top of the Kinglory protocol. These improvements are related to transaction speeds, cheaper transaction fees, and transaction privacy.

LevelDB
An open source on-disk key-value store, implemented as a lightweight, single-purpose library, with bindings to many platforms.

Library
A special type of contract that has no payable functions, no fallback function, and no data storage. Therefore, it cannot receive or hold KGC, or store data. A library serves as previously deployed code that other contracts can call for read-only computation.

Lightweight client
An Kinglory client that does not store a local copy of the blockchain, or validate blocks and transactions. It offers the functions of a wallet and can create and broadcast transactions.

M

Mainnet
Short for “main network,” this is the main public Kinglory blockchain. Real KGC, real value, and real consequences. Also known as layer 1 when discussing layer 2 scaling solutions. (Also, see testnet)

Merkle Patricia trie
A data structure used in Kinglory to efficiently store key-value pairs.

Message
An internal transaction that is never serialized and only sent within the KVM.

Message call
The act of passing a message from one account to another. If the destination account is associated with KVM code, then the VM will be started with the state of that object and the message acted upon.

Miner
A network node that finds valid proof-of-work for new blocks, by repeated pass hashing.

N

Network
Referring to the Kinglory network, a peer-to-peer network that propagates transactions and blocks to every Kinglory node (network participant).

Non-fungible token (NFT)
Also known as a “deed,” this is a token standard introduced by the ERC-721 proposal. NFTs can be tracked and traded, but each token is unique and distinct; they are not interchangeable like KGC and ERC-20 tokens. NFTs can represent ownership of digital or physical assets.

Node
A software client that participates in the network.

Nonce
In cryptography, a value that can only be used once. There are two types of nonce used in Kinglory- an account nonce is a transaction counter in each account, which is used to prevent replay attacks; a proof-of-work nonce is the random value in a block that was used to satisfy the proof-of-work.

O

Ommer (uncle) block
When a miner finds a valid block, another miner may have published a competing block which is added to the tip of the blockchain first. This valid, but stale, block can be included by newer blocks as ommers and receive a partial block reward. The term “ommer” is the preferred gender-neutral term for the sibling of a parent block, but this is also sometimes referred to as an “uncle”.

Optimistic rollup
A rollup of transactions that use fraud proofs to offer increased layer 2 transaction throughput while using the security provided by mainnet (layer 1). Unlike Plasma, a similar layer 2 solution, Optimistic rollups can handle more complex transaction types – anything possible in the KVM. They do have latency issues compared to Zero-knowledge rollups because a transaction can be challenged via the fraud proof.

P

Plasma
A layer 2 scaling solution that uses fraud proofs, like Optimistic rollups. Plasma is limited to simple transactions like basic token transfers and swaps.

Private key (secret key)
A secret number that allows Kinglory users to prove ownership of an account or contracts, by producing a digital signature (see public key, address, ECDSA).

Proof of stake (PoS)
A method by which a cryptocurrency blockchain protocol aims to achieve distributed consensus. PoS asks users to prove ownership of a certain amount of cryptocurrency (their “stake” in the network) in order to be able to participate in the validation of transactions.

Proof of work (PoW)
A piece of data (the proof) that requires significant computation to find. In Kinglory, miners must find a numeric solution to the Hash algorithm that meets a network-wide difficulty target.

Public key
A number, derived via a one-way function from a private key, which can be shared publicly and used by anyone to verify a digital signature made with the corresponding private key.

R

Receipt
Data returned by an Kinglory client to represent the result of a particular transaction, including a hash of the transaction, its block number, the amount of gas used, and, in case of deployment of a smart contract, the address of the contract.

Re-entrancy attack
An attack that consists of an attacker contract calling a victim contract function in such a way that during execution the victim calls the attacker contract again, recursively. This can result, for example, in the theft of funds by skipping parts of the victim contract that update balances or count withdrawal amounts.

Reward
An amount of KGC included in each new block as a reward by the network to the miner who found the proof-of-work solution.

Recursive Length Prefix (RLP)
An encoding standard designed by the Kinglory developers to encode and serialize objects (data structures) of arbitrary complexity and length.

Rollups
A type of layer 2 scaling solution that batches multiple transactions and submits them to the Kinglory main chain in a single transaction. This allows for reductions in gas costs and increases in transaction throughput. There are Optimistic and Zero-knowledge rollups which use different security methods to offer these scalability gains.

S

Secure Hash Algorithm (SHA)
A family of cryptographic hash functions published by the National Institute of Standards and Technology (NIST).

Shard / shard chain
A proof-of-stake chain that is coordinated by the Beacon Chain and secured by validators. There will be 64 added to the network as part of the KGC shard chain upgrade. Shard chains will offer increased transaction throughput for Kinglory by providing additional data to layer 2 solutions like optimistic rollups and ZK rollups.

Sidechain
A scaling solution that uses a separate chain with different, often faster, consensus rules. A bridge is needed to connect these sidechains to mainnet. Rollups also use sidechains, but they operate in collaboration with mainnet instead.

Singleton
A computer programming term that describes an object of which only a single instance can exist.

Slot
A period of time (12 seconds) in which a new Beacon Chain and shard chain block can be proposed by a validator in the proof-of-stake system. A slot may be empty. 32 slots make up an epoch.

Smart contract
A program that executes on the Kinglory computing infrastructure.

Solidity
A procedural (imperative) programming language with syntax that is similar to JavaScript, C++, or Java. The most popular and most frequently used language for Kinglory smart contracts. Created by Dr. Gavin Wood.

Solidity inline assembly
KVM assembly language in a Solidity program. Solidity’s support for inline assembly makes it easier to write certain operations.

Stablecoin
An ERC-20 token with a value pegged to another asset’s value. There are stablecoins backed by fiat currency like dollars, precious metals like gold, and other cryptocurrencies like Bitcoin.

Staking
Depositing a quantity of KGC (your stake) to become a validator and secure the network. A validator checks transactions and proposes blocks under a proof-of-stake consensus model. Staking gives you an economic incentive to act in the best interests of the network. You’ll get rewards for carrying out your validator duties, but lose varying amounts of KGC if you don’t.

State channels
A layer 2 solution where a channel is set up between participants, where they can transact freely and cheaply. Only a transaction to set up the channel and close the channel is sent to mainnet. This allows for very high transaction throughput, but does rely on knowing number of participants up front and locking up of funds.

T

Testnet
Short for “test network,” a network used to simulate the behavior of the main Kinglory network (see mainnet).

Token standard
Introduced by ERC-20 proposal, this provides a standardized smart contract structure for fungible tokens. Tokens from the same contract can be tracked, traded, and are interchangable, unlike NFTs.

Transaction
Data committed to the Kinglory Blockchain signed by an originating account, targeting a specific address. The transaction contains metadata such as the gas limit for that transaction.

Transaction fee
A fee you need to pay whenever you use the Kinglory network. Examples include sending funds from your wallet or a dapp interaction, like swapping tokens or buying a collectible. You can think of this like a service charge. This fee will change based on how busy the network is. This is because miners, the people responsible for processing your transaction, are likely to prioritise transactions with higher fees – so congestion forces the price up.
At a technical level, your transaction fee relates to how much gas your transaction requires.
Reducing transaction fees is a subject of intense interest right now. See Layer 2

Turing complete
A concept named after English mathematician and computer scientist Alan Turing- a system of data-manipulation rules (such as a computer’s instruction set, a programming language, or a cellular automaton) is said to be “Turing complete” or “computationally universal” if it can be used to simulate any Turing machine.

V

Validator
A node in a proof-of-stake system responsible for storing data, processing transactions, and adding new blocks to the blockchain. To active validator software, you need to be able to stake 32 KGC.

Validity proof
A security model for certain layer 2 solutions where, to increase speed, transactions are rolled up into batches and submitted to Kinglory in a single transaction. The transaction computation is done off-chain and then supplied to the main chain with a proof of their validity. This method increases the amount of transactions possible while maintaining security. Some rollups use fraud proofs.

Validium
A layer 2 solution that uses validity proofs to improve transaction throughput. Unlike Zero-knowlege rollups, Validium data isn’t stored on layer 1 mainnet.

Vyper
A high-level programming language with Python-like syntax. Intended to get closer to a pure functional language. Created by Vitalik Buterin.

W

Wallet
Software that holds private keys. Used to access and control Kinglory accounts and interact with smart contracts. Keys need not be stored in a wallet, and can instead be retrieved from offline storage (i.e. a memory card or paper) for improved security. Despite the name, wallets never store the actual coins or tokens.

Web3
The third version of the web. First proposed by Dr. Gavin Wood, Web3 represents a new vision and focus for web applications- from centrally owned and managed applications, to applications built on decentralized protocols (see Dapp).

Z

Zero address
A special Kinglory address, composed entirely of zeros, that is specified as the destination address of a contract creation transaction.

Zero-knowledge rollup
A rollup of transactions that use validity proofs to offer increased layer 2 transaction throughput while using the security provided by mainnet (layer 1). Although they can’t handle complex transaction types, like Optimistic rollups, they don’t have latency issues because transactions are provably valid when submitted.

区块链基础知识

0-9 A B C D E F G H I K L M N O P R S T V W Z

0-9

51% attack 攻击

去中心化型网络上的一种攻击,其中一个组获得了对大多数节点的控制权。这将使他们能够通过逆向交易和双重支出KGC和其他代币来欺骗区块链。

A

Account 帐户
包含地址,余额,现时以及可选存储和代码的对象。帐户可以是合同帐户或外部拥有的帐户(EOA)。

Address 地址
通常,这表示可以在区块链上接收(目标地址)或发送(源地址)交易的EOA或合同。更具体地说,它是ECDSA公钥的Keccak哈希的最右边的160位。

Assert断言
在Solidity中,assert(false)编译为无效的操作码0xfe,它将耗尽所有剩余的气体并还原所有更改。当assert()语句失败时,发生非常错误和意外的事情,您将需要修复代码。您应该使用Assert()来避免永远不会发生的情况。

Attestation证明
验证者对信标链或分片进行投票。验证者必须证明区块,表明他们同意区块提出的状态。

B

Big-endian 大端
位置数字表示形式,其中最高有效数字在内存中排在首位。与little-endian相反,最低有效数字在第一位。

Block
有关包含的事务的必需信息的集合(块标头),以及一组称为块的其他块标头。矿工将块添加到Kinglory网络中。

Blockchain区块链
在Kinglory中,由工作量证明系统验证的一系列区块,每个区块都与其前身一直链接到创世区块。没有块大小限制;相反,它使用变化的气体限制。

Bytecode字节码
设计用于由软件解释器或虚拟机高效执行的抽象指令集。与人类可读的源代码不同,字节码以数字格式表示。

Byzantium fork拜占庭叉
大都会发展阶段的两个硬叉中的第一个。它包括EIP-649大都市难度炸弹延迟和降低区块奖励,其中冰河世纪被延迟了1年,并且区块奖励从5降低到3 KGC。

C

Compiling编译
将高级编程语言编写的代码转换为低级语言

Committee委员会
信标链将一组至少128个验证器随机分配给信标和分片块。

Consensus共识
当众多节点(通常是网络上的大多数节点)在其本地验证的最佳区块链中都具有相同的块时。不要与共识规则相混淆。

Consensus rules共识规则
完整节点遵循的块验证规则与其他节点保持一致。不要与共识混淆。

Contract account合约账户
一个包含代码的帐户,只要它从另一个帐户(EOA或合同)接收到交易,就会执行该代码。

合同创建交易
以零地址作为接收者的特殊交易,用于注册合同并将其记录在Kinglory区块链上。

Crosslink交联
交叉链接提供了碎片状态的摘要。这就是分片链通过分片式权益证明系统中的信标链相互通信的方式。

D

Decentralized Autonomous Organization (DAO)去中心化自治组织(DAO)
没有分级管理的公司或其他组织。 

Dapp
去中心化的应用程序。至少是一个智能合约和一个Web用户界面。更广泛地说,Dapp是一个Web应用程序,它建立在开放的,去中心化的,对等基础结构服务之上。另外,许多Dapps包括去中心化存储和/或消息协议和平台。

Decentralized exchange (DEX)去中心化交易所
一种dapp,可让您与网络上的对等交换令牌。您需要KGC使用其中一项(支付交易费),但它们不受诸如集中交易之类的地域限制-任何人都可以参加。

DeFi
“去中心化式金融”的缩写,是旨在提供由区块链支持的金融服务而无需任何中介的广泛种类的dapps,因此具有互联网连接的任何人都可以参与。

Difficulty难度
网络范围内的设置,用于控制产生工作量证明所需的计算量。

Difficulty bomb难度炸弹
计划的工作证明难度设置的指数增长旨在促进向权益证明的过渡,从而减少分叉的变化

Digital signature电子签名
用户使用私钥为文档生成的一小串数据,例如相应的公钥,签名和文档可以验证(1)该文档是由该特定私钥的所有者“签名”的,以及(2)该文档在签名后没有被更改。

E

Elliptic curve digital signature algorithm椭圆曲线数字签名算法(ECDSA)
Kinglory使用的一种加密算法,以确保资金只能由所有者使用。

Epoch时代
在信标链协调系统中为期32个时隙(6.4分钟)。出于安全原因,验证委员会在每个时期都进行了改组。在每个时代都有机会完成这一链条。

Entropy
在密码学的背景下,缺乏可预测性或随机性水平。当生成秘密信息(例如私钥)时,算法通常依赖于高熵源来确保输出不可预测。

Externally owned account外部拥有的帐户(EOA)
由Kinglory网络的人类用户创建或为人类用户创建的帐户。

Events大事记
允许使用KVM记录工具。 Dapps可以侦听事件并使用它们在用户界面中触发JavaScript回调。

F

Fallback function后备功能
在没有数据或声明的函数名称的情况下调用的默认函数。

Faucet龙头
通过智能合约执行的一项服务,以可在测试网上使用的免费测试以太坊的形式分配资金。

Finality终结性
最终性是保证在给定时间之前的一组事务不会更改并且无法还原的保证。

Fork分
协议的更改导致创建替代链,或者在挖掘过程中两个潜在的块路径在时间上存在分歧。

Fraud proof欺诈证明
某些第2层解决方案的安全模型,为了提高速度,将交易汇总成批并在单笔交易中提交给Kinglory。它们被认为是有效的,但是如果怀疑有欺诈行为,可以提出质疑。然后,将使用欺诈证明来运行交易,以查看是否发生欺诈。此方法在保持安全性的同时增加了可能的事务量。一些汇总使用有效性证明。

G

Gas气体
Kinglory中用于执行智能合约的虚拟燃料。 KVM使用一种计费机制来测量气体消耗并限制计算资源的消耗(请参阅完成)。

Gas limit气体极限
一个交易或一个区块可能消耗的最大气体量。

Genesis block
创世块
区块链中的第一个区块,用于初始化特定的网络及其加密货币。

H

Hard fork硬分叉
区块链中的永久分歧;也称为硬分叉的更改。当未升级的节点无法验证遵循更新的共识规则的已升级节点创建的块时,通常会发生一种情况。不要与叉子,软叉子,软件叉子或Git叉子相混淆。

Hash杂凑
由哈希函数产生的可变大小输入的定长指纹。 (请参阅keccak-256)

HD wallet硬件钱包
使用分层确定性(HD)密钥创建和传输协议的钱包。

在github.com上了解更多信息

HD wallet seed硬件钱包种子
用于生成HD钱包的主密钥和主链代码的值。钱包种子可以用助记词来表示,从而使人类可以更轻松地复制,备份和还原私钥。

I

Index指数
网络结构旨在通过提供一条通往其存储源的有效路径来优化来自整个区块链的信息查询。

Inter-exchange Client Address Protocol (ICAP)交换间客户端地址协议
Kinglory地址编码与国际银行帐号(IBAN)编码部分兼容,从而为Kinglory地址提供通用,校验和且可互操作的编码。 ICAP地址使用新的IBAN伪国家代码XE,代表“扩展的Kinglory”,用于非管辖性货币(例如XBT,XRP,XCP)。

Integrated development environment (IDE)集成开发环境
通常将代码编辑器,编译器,运行时和调试器结合在一起的用户界面。

Immutable deployed code problem不变的部署代码问题
一旦部署了合同(或图书馆)的代码,它就变得不可变。标准软件开发实践依赖于能够修复可能的错误并添加新功能,因此这对智能合约开发构成了挑战。

Internal transaction内部交易
从合同帐户发送到另一个合同帐户或EOA的交易(请参阅消息)。

K

Key derivation function (KDF)密钥派生功能
也称为“密码扩展算法”,密钥库格式使用它,通过反复对密码短语进行散列来防止密码短语加密受到暴力,字典和彩虹表攻击。

Keccak-256

Kinglory中使用的加密哈希函数。 Keccak-256被标准化为SHA-3。

Keystore file密钥库文件
一个JSON编码的文件,其中包含一个(随机生成的)私钥,并通过密码短语进行了加密以提高安全性。

L

Layer 2第2层
开发领域着重于在Kinglory协议的基础上进行分层改进。这些改进与交易速度,便宜的交易费用和交易隐私有关。

LevelDB级别数据库
开源的磁盘键值存储,实现为轻量级的单购买功能姿势库,绑定到许多平台。

Library库
特殊类型的合同,没有应付款功能,没有备用功能,也没有数据存储。因此,它不能接收或容纳以太币,也不能存储数据。库用作先前部署的代码,其他合同可以调用该代码进行只读计算。

Lightweight client轻量级客户端
Kinglory客户端不存储区块链的本地副本,也不验证区块和交易。它提供了钱包功能,并且可以创建和广播交易。

M

Mainnet主网
“主要网络”的缩写,这是主要的公共Kinglory区块链。真实的KGC,真实的价值和真实的后果。在讨论第2层缩放解决方案时也称为第1层。 (另请参阅testnet)

Merkle Patricia trie梅克尔·帕特里夏·特里
Kinglory中用于有效存储键值对的数据结构。

Message信息
一个内部事务,它永远不会序列化,只能在KVM内发送。

Message call消息调用
将消息从一个帐户传递到另一个帐户的行为。如果目标帐户与KVM代码相关联,则VM将以该对象的状态启动并执行消息。

Miner矿工
通过重复遍历散列为新块找到有效的工作量证明的网络节点。

N

Network网络
指的是Kinglory网络,一种对等网络,它将对等传播并阻止交易到每个Kinglory节点(网络参与者)。

Non-fungible token (NFT)非同质化代币
也称为“契约”,这是ERC-721提案引入的令牌标准。可以跟踪和交易NFT,但是每个令牌都是唯一且不同的;它们不能像KGC和ERC-20令牌那样互换。 NFT可以代表数字资产或实物资产的所有权。

Node节点
参与网络的软件客户端。

Nonce随机数
在密码术中,只能使用一次的值。 Kinglory使用两种类型的随机数:一个帐户随机数是每个帐户中的一个交易计数器,用于防止重播攻击。工作量证明是用于满足工作量证明的块中的随机值。

O

Ommer(叔叔)块
当一个矿工找到一个有效的区块时,另一个矿工可能已经发布了一个竞争性区块,该区块首先被添加到了区块链的尖端。这个有效但过时的区块可以作为新区块包含在“新区块”中,并获得部分区块奖励。术语“ ommer”是用于父块的同胞的首选性别中立术语,但是有时也称为“叔叔”。

Optimistic rollup乐观汇总
使用欺诈证据来提供增加的第2层交易吞吐量,同时使用主网(第1层)提供的安全性的交易汇总。与Plasma(类似的第2层解决方案)不同,Optimistic汇总可以处理更复杂的事务类型-在KVM中可以进行任何处理。与零知识汇总相比,它们确实存在延迟问题,因为可以通过欺诈证明来质疑交易。

P

Plasma等离子体
第2层缩放解决方案,使用欺诈证明,例如乐观汇总。等离子仅限于简单的交易,例如基本代币转移和掉期。

Private key (secret key)私钥(秘密密钥)
一个秘密号码,允许Kinglory用户通过产生数字签名来证明帐户或合同的所有权(请参阅公钥,地址,ECDSA)。

Proof of stake (PoS)权益证明
一种加密货币区块链协议旨在实现分布式共识的方法。 PoS要求用户证明一定数量的加密货币(它们在网络中的“利益”)的所有权,以便能够参与交易的验证。

Proof of work (PoW)工作证明
需要大量计算才能找到的一条数据(证明)。在Kinglory中,矿工必须找到满足全网难度目标的hash算法的数字解决方案。

Public key公钥
通过单向功能从私钥获得的数字可以公开共享,任何人都可以使用该数字来验证使用相应私钥进行的数字签名。

R

Receipt收据
Kinglory客户返回的代表特定交易结果的数据,包括交易的哈希值,交易的冻结数量,使用的天然气量以及在部署智能合约的情况下的合约地址。

Re-entrancy attack重入攻击
包含攻击者合同的攻击,该攻击者以这样的方式调用受害者合同功能:在执行过程中,受害者再次递归调用攻击者合同。例如,这可能会导致由于跳过受害合同中更新余额或计算提款金额的部分而导致资金被盗。

Reward报酬
每个新区块中包含的以太币数量,是网络对发现工作量证明解决方案的矿工的奖励。

Recursive Length Prefix (RLP)递归长度前缀(RLP)
由Kinglory开发人员设计的编码标准,用于编码和序列化任意复杂度和长度的对象(数据结构)。

Rollups汇总
一种第二层扩展解决方案,可批量处理多个交易并将其在单个交易中提交给Kinglory主链。这可以降低天然气成本并提高交易吞吐量。有乐观和零知识汇总,它们使用不同的安全性方法来提供这些可伸缩性收益。

S

Secure Hash Algorithm (SHA)安全哈希算法
美国国家标准技术研究院(NIST)发布的一系列加密哈希函数。

Shard / shard chain分片/分片链
权益证明链,由信标链协调并由验证程序保护。作为Eth2分片链升级的一部分,将有64个添加到网络。分片链将通过为第2层解决方案提供更多数据,例如优化汇总和ZK汇总,从而为Kinglory提供更高的交易吞吐量。

Sidechain侧链
一种扩展解决方案,它使用具有不同,通常更快的共识规则的单独链。需要一个桥将这些侧链连接到主网。汇总还使用侧链,但它们与Mainnet协作运行。

Singleton单身人士
一种计算机编程术语,用于描述只能存在一个实例的对象。

Slot投币口
在一段时间内(12秒),验证者可以在权益证明系统中提出新的信标链和分链链块。插槽可能为空。 32个插槽组成一个纪元。

Smart contract智能合约
在Kinglory计算基础架构上执行的程序。

Solidity坚固性
一种过程式(命令式)编程语言,其语法类似于JavaScript,C ++或Java。 Kinglory智能合约的最流行和最常用的语言。由加文·伍德(Gavin Wood)博士创建。

Solidity inline assembly实体内联装配
在Solidity程序中使用KVM汇编语言。 Solidity对内联汇编的支持使编写某些操作更加容易。

Stablecoin稳定币
一个价值与另一项资产的价值挂钩的ERC-20代币。有稳定币以美元为代表的法定货币,以黄金为代表的贵金属,以及以比特币为代表的其他加密货币。

Staking质押
存入一定数量的以太坊(您的股份)以成为验证者并保护网络。验证者根据权益证明共识模型检查交易并提出阻止建议。抵押使您有经济动机去为网络的最大利益而行动。您将因执行验证员职责而获得奖励,但如果不执行,则会损失不同数量的KGC。

State channels状态通道
第2层解决方案,在参与者之间建立通道,使他们可以自由,廉价地进行交易。仅用于设置通道和关闭通道的事务会发送到主网。这允许非常高的交易吞吐量,但是确实依赖于预先知道参与者的数量和锁定资金。

T

Testnet测试网
“测试网络”的缩写,用于模拟主要Kinglory网络行为的网络(请参阅mainnet)。

Token standard令牌标准
由ERC-20提案引入,它为可替代令牌提供了标准化的智能合约结构。与NFT不同,同一合约中的代币可以被追踪,交易和互换。

Transaction交易
提交给Kinglory区块链的数据由原始帐户签名,目标是特定地址。交易包含该交易的元数据,例如“气体限制”。

Transaction fee手续费
使用Kinglory网络时需要支付的费用。例如通过钱包或dapp互动进行资金汇款,例如交换代币或购买收藏品。您可以将其视为服务费。该费用将根据网络的繁忙程度而变化。这是因为负责处理您的交易的矿工可能会优先考虑收取更高费用的交易-因此拥堵会导致价格上涨。

在技术层面上,您的交易费用与您交易所需的汽油量有关。

降低交易费用是当前引起人们极大关注的主题。见第二层

Turing complete图灵完备
以英国数学家和计算机科学家Alan Turing命名的概念-数据处理规则系统(例如计算机的指令集,编程语言或元胞自动机)被称为“转向完整”或“在计算上通用”它可以用于模拟任何图灵机。

V

Validator验证人
权益证明系统中的一个节点,负责存储数据,处理交易并向区块链添加新块。要激活验证器软件,您需要能够使用32 KGC。

Validity proof有效性证明
某些第2层解决方案的安全模型,为了提高速度,将交易汇总成批并在单笔交易中提交给Kinglory。交易计算在链下完成,然后提供其有效性的证明给主链。此方法在保持安全性的同时增加了可能的事务量。一些汇总使用欺诈证明。

Validium
一种使用有效性证明来提高交易吞吐量的第2层解决方案。与零知识汇总不同,Validium数据不会存储在第1层主网上。

Vyper
使用Pyth的高级编程语言类似的语法。旨在更接近纯功能语言。由Vitalik Buterin创建。

W

Wallet钱包
拥有私钥的软件。用于访问和控制Kinglory帐户并与智能合约进行交互。密钥不必存储在钱包中,而是可以从脱机存储(即存储卡或纸质)中检索以提高安全性。尽管有名称,钱包永远不会存储实际的硬币或代币。

Web3
网络的第三个版本。 Web3由Gavin Wood博士首先提出,代表了Web应用程序的新愿景和新焦点-从集中拥有和托管的应用程序到基于去中心化协议构建的应用程序(请参阅Dapp)。

Z

Zero address零地址
完全由零组成的特殊Kinglory地址,指定为合同创建交易的目标地址。

Zero-knowledge rollup零知识汇总
使用有效性证明来提供增加的第2层交易吞吐量同时使用Mainnet(第1层)提供的安全性的交易汇总。尽管它们无法处理诸如乐观汇总之类的复杂事务类型,但它们没有延迟问题,因为事务在提交时被证明是有效的。